led={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) socket$inet6(0xa, 0xa, 0xffffffff) 05:50:28 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) 05:50:28 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffff9, r1, 0x0) keyctl$search(0xa, r1, &(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, r1) read$char_usb(0xffffffffffffffff, &(0x7f00000001c0)=""/237, 0xed) keyctl$link(0x8, r1, 0xfffffffffffffff9) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 05:50:28 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) 05:50:28 executing program 6: read$char_usb(0xffffffffffffffff, 0x0, 0x0) 05:50:28 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) 05:50:28 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) 05:50:28 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) 05:50:28 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) 05:50:28 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) 05:50:37 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffff9, r1, 0x0) keyctl$search(0xa, r1, &(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, r1) read$char_usb(0xffffffffffffffff, &(0x7f00000001c0)=""/237, 0xed) keyctl$link(0x8, r1, 0xfffffffffffffff9) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) syz_open_dev$char_usb(0xc, 0xb4, 0x1eb) 05:50:37 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) 05:50:37 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) 05:50:37 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) 05:50:37 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:50:37 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffff9, r1, 0x0) keyctl$search(0xa, r1, &(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, r1) read$char_usb(0xffffffffffffffff, &(0x7f00000001c0)=""/237, 0xed) keyctl$link(0x8, r1, 0xfffffffffffffff9) 05:50:37 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) 05:50:37 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) r10 = socket$inet6(0xa, 0xa, 0xffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000001a80)={'syztnl1\x00', &(0x7f0000001a00)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x8c6f, 0x40, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x5}, 0xff37, 0x1, 0xd914, 0x4}}) 05:50:46 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffff9, r1, 0x0) keyctl$search(0xa, r1, &(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, r1) read$char_usb(0xffffffffffffffff, &(0x7f00000001c0)=""/237, 0xed) keyctl$link(0x8, r1, 0xfffffffffffffff9) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) 05:50:46 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) 05:50:46 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:50:46 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) 05:50:46 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) r10 = socket$inet6(0xa, 0xa, 0xffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000001a80)={'syztnl1\x00', &(0x7f0000001a00)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x8c6f, 0x40, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x5}, 0xff37, 0x1, 0xd914, 0x4}}) 05:50:46 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffff9, r1, 0x0) keyctl$search(0xa, r1, &(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, r1) read$char_usb(0xffffffffffffffff, &(0x7f00000001c0)=""/237, 0xed) 05:50:46 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) 05:50:46 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) 05:50:46 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) 05:50:46 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffff9, r1, 0x0) keyctl$search(0xa, r1, &(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, r1) 05:50:46 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) 05:50:46 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) 05:50:46 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) r10 = socket$inet6(0xa, 0xa, 0xffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000001a80)={'syztnl1\x00', &(0x7f0000001a00)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x8c6f, 0x40, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x5}, 0xff37, 0x1, 0xd914, 0x4}}) 05:50:46 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) 05:50:46 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffff9, r1, 0x0) keyctl$search(0xa, r1, &(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, r1) read$char_usb(0xffffffffffffffff, &(0x7f00000001c0)=""/237, 0xed) keyctl$link(0x8, r1, 0xfffffffffffffff9) 05:50:54 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffff9, r1, 0x0) 05:50:54 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) 05:50:54 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) 05:50:54 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:50:54 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) 05:50:54 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:50:54 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffff9, r1, 0x0) keyctl$search(0xa, r1, &(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, r1) read$char_usb(0xffffffffffffffff, &(0x7f00000001c0)=""/237, 0xed) 05:50:54 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) socket$inet6(0xa, 0xa, 0xffffffff) 05:50:54 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) 05:50:54 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) 05:50:54 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffff9, r1, 0x0) 05:50:54 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:50:54 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffff9, r1, 0x0) keyctl$search(0xa, r1, &(0x7f0000000140)='trusted\x00', &(0x7f0000000180)={'syz', 0x3}, r1) 05:50:54 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:50:54 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) 05:50:54 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) 05:50:54 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) 05:50:54 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffff9, r1, 0x0) 05:50:54 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:03 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff9, 0x0, 0x0) 05:51:03 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:03 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, 0x0, r1) 05:51:03 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:51:03 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:03 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:51:03 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) 05:51:03 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:03 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:03 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) 05:51:03 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) 05:51:03 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff9, 0x0, 0x0) 05:51:03 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:13 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xfffffffffffffff9, 0x0, 0x0) 05:51:13 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:13 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) 05:51:13 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:13 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) 05:51:13 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) 05:51:13 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000080)=r0) keyctl$unlink(0x9, 0x0, 0x0) 05:51:13 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:13 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:13 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:13 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) 05:51:13 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) 05:51:13 executing program 4: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:22 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:22 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:22 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) 05:51:22 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:22 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) 05:51:22 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:22 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:22 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) keyctl$unlink(0x9, 0x0, 0x0) 05:51:22 executing program 0: keyctl$unlink(0x9, 0x0, 0x0) 05:51:22 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:22 executing program 4: clone3(0x0, 0x0) 05:51:22 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) 05:51:22 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:22 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) 05:51:22 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) 05:51:22 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:22 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:22 executing program 4: clone3(0x0, 0x0) 05:51:22 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:51:22 executing program 0: clone3(0x0, 0x0) 05:51:22 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) 05:51:31 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) 05:51:31 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:31 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) 05:51:31 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) 05:51:31 executing program 0: clone3(0x0, 0x0) 05:51:31 executing program 4: clone3(0x0, 0x0) 05:51:31 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) 05:51:31 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:31 executing program 7: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:31 executing program 0: clone3(0x0, 0x0) 05:51:31 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) 05:51:40 executing program 7: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:40 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) 05:51:40 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) r10 = socket$inet6(0xa, 0xa, 0xffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000001a80)={'syztnl1\x00', &(0x7f0000001a00)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x8c6f, 0x40, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x5}, 0xff37, 0x1, 0xd914, 0x4}}) 05:51:40 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:40 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) 05:51:40 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) 05:51:40 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) 05:51:40 executing program 4: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:40 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) 05:51:40 executing program 3: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) 05:51:40 executing program 4: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:40 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:51:40 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) 05:51:40 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:40 executing program 7: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) 05:51:40 executing program 3: sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) 05:51:40 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) r10 = socket$inet6(0xa, 0xa, 0xffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000001a80)={'syztnl1\x00', &(0x7f0000001a00)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x8c6f, 0x40, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x5}, 0xff37, 0x1, 0xd914, 0x4}}) 05:51:40 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) 05:51:49 executing program 4: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:49 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) r10 = socket$inet6(0xa, 0xa, 0xffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000001a80)={'syztnl1\x00', &(0x7f0000001a00)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x8c6f, 0x40, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x5}, 0xff37, 0x1, 0xd914, 0x4}}) 05:51:49 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:49 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) 05:51:49 executing program 3: sendmsg$TIPC_CMD_GET_MAX_PORTS(0xffffffffffffffff, 0x0, 0x0) 05:51:49 executing program 1: accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) 05:51:49 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:49 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:49 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) 05:51:49 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:49 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) socket$inet6(0xa, 0xa, 0xffffffff) 05:51:49 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) 05:51:49 executing program 1: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) 05:51:49 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) 05:51:49 executing program 3: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:49 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) 05:51:49 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:49 executing program 5: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:49 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) 05:51:49 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) 05:51:49 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:49 executing program 1: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:51:49 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) 05:51:49 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:58 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) 05:51:58 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) 05:51:58 executing program 3: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:58 executing program 5: clone3(0x0, 0x0) 05:51:58 executing program 2: rt_sigprocmask(0x1, 0x0, &(0x7f0000000040), 0x0) 05:51:58 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:58 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:51:58 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:07 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:07 executing program 5: clone3(0x0, 0x0) 05:52:07 executing program 7: clone3(0x0, 0x0) 05:52:07 executing program 3: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:07 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) 05:52:07 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) 05:52:07 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:07 executing program 2: rt_sigprocmask(0x1, 0x0, &(0x7f0000000040), 0x0) 05:52:07 executing program 5: clone3(0x0, 0x0) 05:52:07 executing program 2: rt_sigprocmask(0x1, 0x0, &(0x7f0000000040), 0x0) 05:52:07 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) 05:52:07 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) 05:52:07 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:08 executing program 7: clone3(0x0, 0x0) 05:52:08 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) 05:52:08 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:17 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) 05:52:17 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:17 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:17 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000), &(0x7f0000000040), 0x8) 05:52:17 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:52:17 executing program 5: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:17 executing program 3: clone3(0x0, 0x0) 05:52:17 executing program 7: clone3(0x0, 0x0) 05:52:17 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:52:17 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) 05:52:17 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:52:17 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000), 0x0, 0x8) 05:52:17 executing program 6: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) 05:52:17 executing program 3: clone3(0x0, 0x0) 05:52:17 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:17 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) 05:52:17 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:52:27 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:27 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000), 0x0, 0x8) 05:52:27 executing program 3: clone3(0x0, 0x0) 05:52:27 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:52:27 executing program 6: rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) 05:52:27 executing program 5: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:27 executing program 1: clone3(0x0, 0x0) 05:52:27 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x8}, 0x58) 05:52:27 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000), 0x0, 0x8) 05:52:27 executing program 6: rt_sigprocmask(0x0, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) 05:52:27 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:27 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:27 executing program 1: clone3(0x0, 0x0) 05:52:27 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:52:27 executing program 6: rt_sigprocmask(0x0, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) 05:52:27 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000), 0x0, 0x8) 05:52:38 executing program 1: clone3(0x0, 0x0) 05:52:38 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:38 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x6}, 0x58) 05:52:38 executing program 6: rt_sigprocmask(0x0, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) 05:52:38 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) 05:52:38 executing program 5: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:38 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000), 0x0, 0x8) 05:52:38 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:38 executing program 1: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:38 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x5}, 0x58) 05:52:38 executing program 2: rt_sigprocmask(0x1, &(0x7f0000000000), 0x0, 0x8) 05:52:38 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:38 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) 05:52:38 executing program 6: rt_sigprocmask(0x2, 0x0, &(0x7f00000001c0), 0x0) 05:52:38 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:38 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x4}, 0x58) 05:52:38 executing program 1: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:38 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:47 executing program 1: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:47 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 05:52:47 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000000), 0x0, 0x8) 05:52:47 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:47 executing program 6: rt_sigprocmask(0x2, 0x0, &(0x7f00000001c0), 0x0) 05:52:47 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) 05:52:47 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:47 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:47 executing program 6: rt_sigprocmask(0x2, 0x0, &(0x7f00000001c0), 0x0) 05:52:47 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) 05:52:47 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:47 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:52:47 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) 05:52:48 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:48 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:48 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:48 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:57 executing program 6: rt_sigprocmask(0x2, &(0x7f0000000180), &(0x7f00000001c0), 0x8) 05:52:57 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_open(0x0, 0x0) 05:52:57 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x1}, 0x58) 05:52:57 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:57 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:52:57 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:57 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:57 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:57 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:52:57 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)}, 0x58) 05:52:57 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:52:57 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) pidfd_open(0x0, 0x0) 05:52:57 executing program 6: rt_sigprocmask(0x2, &(0x7f0000000180), 0x0, 0x8) 05:52:57 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:57 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:52:57 executing program 2: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:52:57 executing program 0: pidfd_open(0x0, 0x0) 05:52:57 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)}, 0x58) 05:53:07 executing program 6: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)}, 0x58) 05:53:07 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:07 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:07 executing program 2: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:07 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:53:07 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:07 executing program 4: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)}, 0x58) 05:53:07 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:07 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x8}, 0x58) 05:53:07 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:07 executing program 6: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)}, 0x58) 05:53:07 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:07 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:07 executing program 6: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)}, 0x58) 05:53:07 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:53:07 executing program 2: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:17 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x6}, 0x58) 05:53:17 executing program 2: clone3(0x0, 0x0) 05:53:17 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:17 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:17 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:17 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:17 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:17 executing program 6: clone3(0x0, 0x0) 05:53:18 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:18 executing program 2: clone3(0x0, 0x0) 05:53:18 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:26 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:26 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:26 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:26 executing program 2: clone3(0x0, 0x0) 05:53:26 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x5}, 0x58) 05:53:26 executing program 6: clone3(0x0, 0x0) 05:53:26 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:26 executing program 0: clone3(0x0, 0x0) 05:53:26 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x4}, 0x58) 05:53:26 executing program 6: clone3(0x0, 0x0) 05:53:27 executing program 0: clone3(0x0, 0x0) 05:53:27 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:27 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 05:53:27 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)}, 0x58) 05:53:36 executing program 0: clone3(0x0, 0x0) 05:53:36 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:36 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) 05:53:36 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:36 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:36 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:36 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:53:36 executing program 4: clone3(0x0, 0x0) 05:53:36 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:36 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x1}, 0x58) 05:53:36 executing program 4: clone3(0x0, 0x0) 05:53:36 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:36 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:53:36 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:37 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:37 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)}, 0x58) 05:53:37 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:37 executing program 4: clone3(0x0, 0x0) 05:53:37 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:37 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:45 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:53:45 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:45 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:45 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:45 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)}, 0x58) 05:53:45 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:45 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:53:45 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:45 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:45 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:45 executing program 5: clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000680)}, 0x58) 05:53:45 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:45 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:53:54 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:53:54 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:53:54 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:54 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:53:54 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:54 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:54 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:54 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:53:54 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:53:54 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x8}, 0x58) 05:53:54 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:55 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:55 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:53:55 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:53:55 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:53:55 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:55 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:53:55 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:53:55 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:53:55 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x8}, 0x58) 05:54:05 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:54:05 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:54:05 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x8}, 0x58) 05:54:05 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:54:05 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:54:05 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:05 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:54:05 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:54:05 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:54:05 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:54:05 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:54:05 executing program 5: clone3(0x0, 0x0) 05:54:05 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:05 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:54:05 executing program 6: clone3(0x0, 0x0) 05:54:16 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:54:16 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x8}, 0x58) 05:54:16 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x7}, 0x58) 05:54:16 executing program 5: clone3(0x0, 0x0) 05:54:16 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:54:16 executing program 6: clone3(0x0, 0x0) 05:54:16 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:54:16 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:54:16 executing program 5: clone3(0x0, 0x0) 05:54:16 executing program 6: clone3(0x0, 0x0) 05:54:16 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:16 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:54:16 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:54:17 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:54:17 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:54:26 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:54:26 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x7}, 0x58) 05:54:26 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x7}, 0x58) 05:54:26 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:26 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:54:26 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x8}, 0x58) 05:54:26 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:54:26 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:26 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:54:26 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x7}, 0x58) 05:54:26 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x7}, 0x58) 05:54:26 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:54:26 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:54:26 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:54:26 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:26 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:54:26 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:27 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) 05:54:27 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:54:27 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:54:27 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x7}, 0x58) 05:54:43 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x6}, 0x58) 05:54:43 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x7}, 0x58) 05:54:43 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:54:43 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:43 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:43 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:43 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) 05:54:43 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x6}, 0x58) 05:54:43 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x5}, 0x58) 05:54:43 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) 05:54:43 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:54:43 executing program 6: clone3(0x0, 0x0) 05:54:43 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x6}, 0x58) 05:54:43 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) 05:54:43 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:52 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) 05:54:52 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x5}, 0x58) 05:54:52 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:52 executing program 6: clone3(0x0, 0x0) 05:54:52 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x4}, 0x58) 05:54:52 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) 05:54:52 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:54:52 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x8}, 0x58) 05:54:52 executing program 6: clone3(0x0, 0x0) 05:54:52 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x8}, 0x58) 05:54:52 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) 05:54:52 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:03 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) 05:55:03 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x6}, 0x58) 05:55:03 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x8}, 0x58) 05:55:03 executing program 4: clone3(0x0, 0x0) 05:55:03 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 05:55:03 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:55:03 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x4}, 0x58) 05:55:03 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:03 executing program 4: clone3(0x0, 0x0) 05:55:03 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:03 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:03 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:55:03 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 05:55:03 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x7}, 0x58) 05:55:03 executing program 4: clone3(0x0, 0x0) 05:55:03 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x5}, 0x58) 05:55:03 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) 05:55:15 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x6}, 0x58) 05:55:15 executing program 5: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:15 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) 05:55:15 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:55:15 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:15 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0], 0x3}, 0x58) 05:55:15 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:15 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:15 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:15 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2}, 0x58) 05:55:15 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:15 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:15 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x6}, 0x58) 05:55:15 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) 05:55:15 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x7}, 0x58) 05:55:24 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:24 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:24 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2}, 0x58) 05:55:24 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff], 0x1}, 0x58) 05:55:24 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x6}, 0x58) 05:55:24 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:24 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:24 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:25 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:25 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:55:25 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:55:25 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:25 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:25 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:25 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:25 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x6}, 0x58) 05:55:25 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2}, 0x58) 05:55:25 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:55:34 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:34 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 05:55:34 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2}, 0x58) 05:55:34 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:34 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:34 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) 05:55:34 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:55:34 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2}, 0x58) 05:55:34 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) 05:55:34 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, 0x0}, 0x58) 05:55:42 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) 05:55:42 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:55:42 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) 05:55:42 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 05:55:42 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) 05:55:42 executing program 5: clone3(0x0, 0x0) 05:55:42 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:55:42 executing program 0: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:55:42 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) 05:55:42 executing program 5: clone3(0x0, 0x0) 05:55:42 executing program 1: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) 05:55:42 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:42 executing program 5: clone3(0x0, 0x0) 05:55:42 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 05:55:42 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:42 executing program 7: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff], 0x2}, 0x58) 05:55:43 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, 0x0}, 0x58) 05:55:43 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:43 executing program 1: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:43 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:43 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:43 executing program 5: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:43 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:43 executing program 1: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:55:43 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:52 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 05:55:52 executing program 0: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:52 executing program 1: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:52 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:52 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:52 executing program 5: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, 0x0, 0x0, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:52 executing program 3: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:52 executing program 4: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, 0x0, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:55:52 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 05:56:00 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 1) 05:56:00 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0], 0x6}, 0x58) 05:56:00 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), 0x0, {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:56:00 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) r10 = socket$inet6(0xa, 0xa, 0xffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000001a80)={'syztnl1\x00', &(0x7f0000001a00)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x8c6f, 0x40, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x5}, 0xff37, 0x1, 0xd914, 0x4}}) 05:56:00 executing program 5: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:56:00 executing program 4: rt_sigprocmask(0x1, 0x0, &(0x7f0000000040), 0x0) 05:56:00 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) r10 = socket$inet6(0xa, 0xa, 0xffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000001a80)={'syztnl1\x00', &(0x7f0000001a00)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x8c6f, 0x40, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x5}, 0xff37, 0x1, 0xd914, 0x4}}) 05:56:00 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 1) [ 2688.872721] FAULT_INJECTION: forcing a failure. [ 2688.872721] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 2688.874195] CPU: 1 UID: 0 PID: 16467 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2688.874228] Tainted: [W]=WARN [ 2688.874235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2688.874246] Call Trace: [ 2688.874253] [ 2688.874260] dump_stack_lvl+0xfa/0x120 [ 2688.874301] should_fail_ex+0x4d7/0x5e0 [ 2688.874330] _copy_from_user+0x30/0xd0 [ 2688.874358] copy_clone_args_from_user+0x152/0x7a0 [ 2688.874395] ? find_held_lock+0x2b/0x80 [ 2688.874427] ? get_pid_task+0xfd/0x250 [ 2688.874449] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 2688.874485] ? get_pid_task+0x107/0x250 [ 2688.874505] ? proc_fail_nth_write+0x97/0x220 [ 2688.874528] ? find_held_lock+0x2b/0x80 [ 2688.874558] ? ksys_write+0x121/0x240 [ 2688.874577] ? lock_is_held_type+0x9e/0x120 [ 2688.874614] __do_sys_clone3+0xa5/0x280 [ 2688.874640] ? __pfx___do_sys_clone3+0x10/0x10 [ 2688.874664] ? __mutex_unlock_slowpath+0x157/0x750 [ 2688.874694] ? __pfx_vfs_write+0x3/0x10 [ 2688.874718] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2688.874753] ? __fget_files+0x20d/0x3b0 [ 2688.874779] ? fput+0x6a/0x100 [ 2688.874805] ? ksys_write+0x1a3/0x240 [ 2688.874825] ? __pfx_ksys_write+0x10/0x10 [ 2688.874849] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2688.874875] do_syscall_64+0xbf/0x360 [ 2688.874895] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2688.874916] RIP: 0033:0x7fb9f533db19 [ 2688.874930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2688.874950] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2688.874969] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2688.874983] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2688.874995] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2688.875007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2688.875019] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2688.875047] [ 2688.895269] FAULT_INJECTION: forcing a failure. [ 2688.895269] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2688.896280] CPU: 1 UID: 0 PID: 16474 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2688.896300] Tainted: [W]=WARN [ 2688.896305] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2688.896313] Call Trace: [ 2688.896317] [ 2688.896322] dump_stack_lvl+0xfa/0x120 [ 2688.896343] should_fail_ex+0x4d7/0x5e0 [ 2688.896360] _copy_from_user+0x30/0xd0 [ 2688.896377] copy_clone_args_from_user+0x152/0x7a0 [ 2688.896399] ? find_held_lock+0x2b/0x80 [ 2688.896419] ? get_pid_task+0xfd/0x250 [ 2688.896432] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 2688.896456] ? get_pid_task+0x107/0x250 [ 2688.896469] ? proc_fail_nth_write+0x97/0x220 [ 2688.896483] ? find_held_lock+0x2b/0x80 [ 2688.896503] ? ksys_write+0x121/0x240 [ 2688.896516] ? lock_is_held_type+0x9e/0x120 [ 2688.896536] __do_sys_clone3+0xa5/0x280 [ 2688.896550] ? __pfx___do_sys_clone3+0x10/0x10 [ 2688.896567] ? __mutex_unlock_slowpath+0x157/0x750 [ 2688.896586] ? __pfx_vfs_write+0x3/0x10 [ 2688.896612] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2688.896634] ? __fget_files+0x20d/0x3b0 [ 2688.896655] ? fput+0x6a/0x100 [ 2688.896671] ? ksys_write+0x1a3/0x240 [ 2688.896685] ? __pfx_ksys_write+0x10/0x10 [ 2688.896700] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2688.896716] do_syscall_64+0xbf/0x360 [ 2688.896729] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2688.896742] RIP: 0033:0x7f232c718b19 [ 2688.896752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2688.896764] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2688.896777] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2688.896786] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2688.896793] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2688.896802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2688.896809] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2688.896826] 05:56:01 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) r10 = socket$inet6(0xa, 0xa, 0xffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000001a80)={'syztnl1\x00', &(0x7f0000001a00)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x8c6f, 0x40, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x5}, 0xff37, 0x1, 0xd914, 0x4}}) 05:56:01 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0], 0x5}, 0x58) 05:56:01 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) r10 = socket$inet6(0xa, 0xa, 0xffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000001a80)={'syztnl1\x00', &(0x7f0000001a00)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x8c6f, 0x40, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x5}, 0xff37, 0x1, 0xd914, 0x4}}) 05:56:01 executing program 4: rt_sigprocmask(0x1, 0x0, &(0x7f0000000040), 0x0) 05:56:01 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 1) 05:56:01 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 2) 05:56:01 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 2) 05:56:01 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) r10 = socket$inet6(0xa, 0xa, 0xffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000001a80)={'syztnl1\x00', &(0x7f0000001a00)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x8c6f, 0x40, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x5}, 0xff37, 0x1, 0xd914, 0x4}}) [ 2689.050741] FAULT_INJECTION: forcing a failure. [ 2689.050741] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2689.051793] CPU: 0 UID: 0 PID: 16488 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2689.051814] Tainted: [W]=WARN [ 2689.051817] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2689.051825] Call Trace: [ 2689.051830] [ 2689.051834] dump_stack_lvl+0xfa/0x120 [ 2689.051860] should_fail_ex+0x4d7/0x5e0 [ 2689.051878] _copy_from_user+0x30/0xd0 [ 2689.051895] copy_clone_args_from_user+0x152/0x7a0 [ 2689.051918] ? find_held_lock+0x2b/0x80 [ 2689.051937] ? get_pid_task+0xfd/0x250 [ 2689.051952] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 2689.051974] ? get_pid_task+0x107/0x250 [ 2689.051986] ? proc_fail_nth_write+0x97/0x220 [ 2689.052001] ? find_held_lock+0x2b/0x80 [ 2689.052019] ? ksys_write+0x121/0x240 [ 2689.052033] ? lock_is_held_type+0x9e/0x120 [ 2689.052054] __do_sys_clone3+0xa5/0x280 [ 2689.052067] ? __pfx___do_sys_clone3+0x10/0x10 [ 2689.052082] ? __mutex_unlock_slowpath+0x157/0x750 [ 2689.052101] ? __pfx_vfs_write+0x3/0x10 [ 2689.052115] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2689.052136] ? __fget_files+0x20d/0x3b0 [ 2689.052152] ? fput+0x6a/0x100 [ 2689.052168] ? ksys_write+0x1a3/0x240 [ 2689.052181] ? __pfx_ksys_write+0x10/0x10 [ 2689.052195] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2689.052212] do_syscall_64+0xbf/0x360 [ 2689.052224] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2689.052237] RIP: 0033:0x7f6826af1b19 [ 2689.052247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2689.052260] RSP: 002b:00007f6824067188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2689.052272] RAX: ffffffffffffffda RBX: 00007f6826c04f60 RCX: 00007f6826af1b19 [ 2689.052280] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2689.052288] RBP: 00007f68240671d0 R08: 0000000000000000 R09: 0000000000000000 [ 2689.052296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2689.052303] R13: 00007fff21cdf45f R14: 00007f6824067300 R15: 0000000000022000 [ 2689.052319] [ 2689.055298] FAULT_INJECTION: forcing a failure. [ 2689.055298] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2689.069094] CPU: 1 UID: 0 PID: 16490 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2689.069115] Tainted: [W]=WARN [ 2689.069119] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2689.069127] Call Trace: [ 2689.069131] [ 2689.069136] dump_stack_lvl+0xfa/0x120 [ 2689.069165] should_fail_ex+0x4d7/0x5e0 [ 2689.069184] _copy_from_user+0x30/0xd0 [ 2689.069201] copy_clone_args_from_user+0x4ba/0x7a0 [ 2689.069225] ? get_pid_task+0xfd/0x250 [ 2689.069239] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 2689.069263] ? find_held_lock+0x2b/0x80 [ 2689.069282] ? ksys_write+0x121/0x240 [ 2689.069296] ? lock_is_held_type+0x9e/0x120 [ 2689.069316] __do_sys_clone3+0xa5/0x280 [ 2689.069330] ? __pfx___do_sys_clone3+0x10/0x10 [ 2689.069350] ? __fget_files+0x20d/0x3b0 [ 2689.069367] ? fput+0x6a/0x100 [ 2689.069382] ? ksys_write+0x1a3/0x240 [ 2689.069394] ? __pfx_ksys_write+0x10/0x10 [ 2689.069408] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2689.069425] do_syscall_64+0xbf/0x360 [ 2689.069437] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2689.069451] RIP: 0033:0x7fb9f533db19 [ 2689.069460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2689.069472] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2689.069484] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2689.069492] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2689.069499] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2689.069507] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2689.069514] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2689.069530] [ 2689.085017] FAULT_INJECTION: forcing a failure. [ 2689.085017] name fail_usercopy, interval 1, probability 0, space 0, times 0 05:56:01 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 1) [ 2689.085940] CPU: 1 UID: 0 PID: 16491 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2689.085958] Tainted: [W]=WARN [ 2689.085962] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2689.085969] Call Trace: [ 2689.085973] [ 2689.085977] dump_stack_lvl+0xfa/0x120 [ 2689.085996] should_fail_ex+0x4d7/0x5e0 [ 2689.086011] _copy_from_user+0x30/0xd0 [ 2689.086026] copy_clone_args_from_user+0x4ba/0x7a0 [ 2689.086046] ? get_pid_task+0xfd/0x250 [ 2689.086058] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 2689.086081] ? find_held_lock+0x2b/0x80 [ 2689.086098] ? ksys_write+0x121/0x240 [ 2689.086109] ? lock_is_held_type+0x9e/0x120 [ 2689.086127] __do_sys_clone3+0xa5/0x280 [ 2689.086139] ? __pfx___do_sys_clone3+0x10/0x10 [ 2689.086159] ? __fget_files+0x20d/0x3b0 [ 2689.086174] ? fput+0x6a/0x100 [ 2689.086188] ? ksys_write+0x1a3/0x240 [ 2689.086200] ? __pfx_ksys_write+0x10/0x10 [ 2689.086213] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2689.086227] do_syscall_64+0xbf/0x360 [ 2689.086239] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2689.086251] RIP: 0033:0x7f232c718b19 [ 2689.086259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2689.086271] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2689.086282] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2689.086290] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2689.086297] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2689.086304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2689.086311] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2689.086326] [ 2689.130892] FAULT_INJECTION: forcing a failure. [ 2689.130892] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2689.131873] CPU: 0 UID: 0 PID: 16493 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2689.131893] Tainted: [W]=WARN [ 2689.131897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2689.131905] Call Trace: [ 2689.131909] [ 2689.131914] dump_stack_lvl+0xfa/0x120 [ 2689.131939] should_fail_ex+0x4d7/0x5e0 [ 2689.131957] _copy_from_user+0x30/0xd0 [ 2689.131974] copy_clone_args_from_user+0x152/0x7a0 [ 2689.131997] ? find_held_lock+0x2b/0x80 [ 2689.132016] ? get_pid_task+0xfd/0x250 [ 2689.132030] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 2689.132052] ? get_pid_task+0x107/0x250 [ 2689.132065] ? proc_fail_nth_write+0x97/0x220 [ 2689.132080] ? find_held_lock+0x2b/0x80 [ 2689.132098] ? ksys_write+0x121/0x240 [ 2689.132112] ? lock_is_held_type+0x9e/0x120 [ 2689.132133] __do_sys_clone3+0xa5/0x280 [ 2689.132146] ? __pfx___do_sys_clone3+0x10/0x10 [ 2689.132161] ? __mutex_unlock_slowpath+0x157/0x750 [ 2689.132180] ? __pfx_vfs_write+0x3/0x10 [ 2689.132194] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 2689.132215] ? __fget_files+0x20d/0x3b0 [ 2689.132230] ? fput+0x6a/0x100 [ 2689.132247] ? ksys_write+0x1a3/0x240 [ 2689.132259] ? __pfx_ksys_write+0x10/0x10 [ 2689.132274] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2689.132290] do_syscall_64+0xbf/0x360 [ 2689.132302] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2689.132315] RIP: 0033:0x7f3a168c2b19 [ 2689.132325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2689.132337] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2689.132350] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2689.132358] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2689.132366] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2689.132373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2689.132381] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2689.132397] 05:56:10 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 05:56:10 executing program 4: rt_sigprocmask(0x1, 0x0, &(0x7f0000000040), 0x0) 05:56:10 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 2) 05:56:10 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 3) 05:56:10 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) r10 = socket$inet6(0xa, 0xa, 0xffffffff) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r10, 0x89f4, &(0x7f0000001a80)={'syztnl1\x00', &(0x7f0000001a00)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x3f, 0x8c6f, 0x40, @private1={0xfc, 0x1, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x5}, 0xff37, 0x1, 0xd914, 0x4}}) 05:56:10 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) socket$inet6(0xa, 0xa, 0xffffffff) [ 2698.321556] FAULT_INJECTION: forcing a failure. [ 2698.321556] name failslab, interval 1, probability 0, space 0, times 1 [ 2698.322577] CPU: 1 UID: 0 PID: 16500 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2698.322596] Tainted: [W]=WARN [ 2698.322604] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2698.322612] Call Trace: [ 2698.322616] [ 2698.322621] dump_stack_lvl+0xfa/0x120 [ 2698.322646] should_fail_ex+0x4d7/0x5e0 [ 2698.322664] should_failslab+0xc2/0x120 [ 2698.322680] kmem_cache_alloc_node_noprof+0x79/0x690 [ 2698.322701] ? copy_process+0x3da/0x73c0 [ 2698.322714] ? copy_process+0x461/0x73c0 [ 2698.322729] ? copy_process+0x461/0x73c0 [ 2698.322740] copy_process+0x461/0x73c0 [ 2698.322750] ? __pfx__kstrtoull+0x10/0x10 [ 2698.322772] ? lock_acquire+0x15e/0x2f0 [ 2698.322786] ? __might_fault+0xe0/0x190 [ 2698.322804] ? __pfx_copy_process+0x10/0x10 [ 2698.322816] ? __might_fault+0xe0/0x190 [ 2698.322831] ? _copy_from_user+0x5b/0xd0 [ 2698.322849] kernel_clone+0xea/0x7f0 [ 2698.322860] ? get_pid_task+0xfd/0x250 [ 2698.322874] ? __pfx_kernel_clone+0x10/0x10 [ 2698.322890] ? find_held_lock+0x2b/0x80 [ 2698.322908] ? ksys_write+0x121/0x240 [ 2698.322922] ? lock_is_held_type+0x9e/0x120 [ 2698.322941] __do_sys_clone3+0x1f5/0x280 [ 2698.322954] ? __pfx___do_sys_clone3+0x10/0x10 [ 2698.322974] ? __fget_files+0x20d/0x3b0 [ 2698.322990] ? fput+0x6a/0x100 [ 2698.323005] ? ksys_write+0x1a3/0x240 [ 2698.323017] ? __pfx_ksys_write+0x10/0x10 [ 2698.323030] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2698.323046] do_syscall_64+0xbf/0x360 [ 2698.323058] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2698.323071] RIP: 0033:0x7f232c718b19 [ 2698.323080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2698.323092] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2698.323104] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2698.323112] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2698.323119] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2698.323126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2698.323133] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2698.323148] 05:56:10 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 2) 05:56:10 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 3) [ 2698.391312] FAULT_INJECTION: forcing a failure. [ 2698.391312] name failslab, interval 1, probability 0, space 0, times 0 [ 2698.392395] CPU: 1 UID: 0 PID: 16511 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2698.392416] Tainted: [W]=WARN [ 2698.392421] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2698.392429] Call Trace: [ 2698.392433] [ 2698.392438] dump_stack_lvl+0xfa/0x120 [ 2698.392466] should_fail_ex+0x4d7/0x5e0 [ 2698.392484] should_failslab+0xc2/0x120 [ 2698.392501] kmem_cache_alloc_node_noprof+0x79/0x690 [ 2698.392522] ? copy_process+0x3da/0x73c0 [ 2698.392537] ? copy_process+0x461/0x73c0 [ 2698.392552] ? copy_process+0x461/0x73c0 [ 2698.392564] copy_process+0x461/0x73c0 [ 2698.392576] ? __pfx__kstrtoull+0x10/0x10 [ 2698.392602] ? lock_acquire+0x15e/0x2f0 [ 2698.392618] ? __might_fault+0xe0/0x190 [ 2698.392636] ? __pfx_copy_process+0x10/0x10 [ 2698.392649] ? __might_fault+0xe0/0x190 [ 2698.392666] ? _copy_from_user+0x5b/0xd0 [ 2698.392684] kernel_clone+0xea/0x7f0 [ 2698.392696] ? get_pid_task+0xfd/0x250 [ 2698.392719] ? __pfx_kernel_clone+0x10/0x10 05:56:10 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) [ 2698.392736] ? find_held_lock+0x2b/0x80 [ 2698.392756] ? ksys_write+0x121/0x240 [ 2698.392770] ? lock_is_held_type+0x9e/0x120 [ 2698.392792] __do_sys_clone3+0x1f5/0x280 [ 2698.392805] ? __pfx___do_sys_clone3+0x10/0x10 [ 2698.392827] ? __fget_files+0x20d/0x3b0 [ 2698.392843] ? fput+0x6a/0x100 [ 2698.392860] ? ksys_write+0x1a3/0x240 [ 2698.392872] ? __pfx_ksys_write+0x10/0x10 [ 2698.392887] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2698.392904] do_syscall_64+0xbf/0x360 [ 2698.392917] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2698.392931] RIP: 0033:0x7f6826af1b19 [ 2698.392941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2698.392954] RSP: 002b:00007f6824067188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2698.392967] RAX: ffffffffffffffda RBX: 00007f6826c04f60 RCX: 00007f6826af1b19 [ 2698.392976] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2698.392984] RBP: 00007f68240671d0 R08: 0000000000000000 R09: 0000000000000000 [ 2698.392992] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2698.393000] R13: 00007fff21cdf45f R14: 00007f6824067300 R15: 0000000000022000 05:56:10 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 4) [ 2698.393016] 05:56:10 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) [ 2698.395026] FAULT_INJECTION: forcing a failure. [ 2698.395026] name failslab, interval 1, probability 0, space 0, times 0 [ 2698.430005] CPU: 0 UID: 0 PID: 16512 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2698.430046] Tainted: [W]=WARN [ 2698.430053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2698.430067] Call Trace: [ 2698.430074] [ 2698.430082] dump_stack_lvl+0xfa/0x120 [ 2698.430128] should_fail_ex+0x4d7/0x5e0 [ 2698.430160] should_failslab+0xc2/0x120 [ 2698.430188] kmem_cache_alloc_node_noprof+0x79/0x690 [ 2698.430225] ? copy_process+0x3da/0x73c0 [ 2698.430248] ? copy_process+0x461/0x73c0 [ 2698.430276] ? copy_process+0x461/0x73c0 [ 2698.430297] copy_process+0x461/0x73c0 [ 2698.430317] ? __pfx__kstrtoull+0x10/0x10 [ 2698.430357] ? lock_acquire+0x15e/0x2f0 [ 2698.430383] ? __might_fault+0xe0/0x190 [ 2698.430414] ? __pfx_copy_process+0x10/0x10 [ 2698.430437] ? __might_fault+0xe0/0x190 [ 2698.430475] ? _copy_from_user+0x5b/0xd0 [ 2698.430524] kernel_clone+0xea/0x7f0 [ 2698.430553] ? get_pid_task+0xfd/0x250 [ 2698.430577] ? __pfx_kernel_clone+0x10/0x10 [ 2698.430617] ? find_held_lock+0x2b/0x80 [ 2698.430650] ? ksys_write+0x121/0x240 [ 2698.430674] ? lock_is_held_type+0x9e/0x120 [ 2698.430710] __do_sys_clone3+0x1f5/0x280 [ 2698.430733] ? __pfx___do_sys_clone3+0x10/0x10 [ 2698.430772] ? __fget_files+0x20d/0x3b0 [ 2698.430801] ? fput+0x6a/0x100 [ 2698.430829] ? ksys_write+0x1a3/0x240 [ 2698.430851] ? __pfx_ksys_write+0x10/0x10 [ 2698.430877] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2698.430906] do_syscall_64+0xbf/0x360 [ 2698.430928] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2698.430951] RIP: 0033:0x7fb9f533db19 [ 2698.430971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2698.430993] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2698.431015] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2698.431030] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2698.431044] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2698.431057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2698.431071] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2698.431101] [ 2698.451593] FAULT_INJECTION: forcing a failure. [ 2698.451593] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2698.460337] CPU: 1 UID: 0 PID: 16515 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2698.460357] Tainted: [W]=WARN [ 2698.460362] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2698.460369] Call Trace: [ 2698.460374] [ 2698.460379] dump_stack_lvl+0xfa/0x120 [ 2698.460408] should_fail_ex+0x4d7/0x5e0 [ 2698.460426] _copy_from_user+0x30/0xd0 [ 2698.460442] copy_clone_args_from_user+0x4ba/0x7a0 [ 2698.460465] ? get_pid_task+0xfd/0x250 [ 2698.460479] ? __pfx_copy_clone_args_from_user+0x10/0x10 [ 2698.460505] ? find_held_lock+0x2b/0x80 [ 2698.460526] ? ksys_write+0x121/0x240 [ 2698.460540] ? lock_is_held_type+0x9e/0x120 [ 2698.460560] __do_sys_clone3+0xa5/0x280 [ 2698.460573] ? __pfx___do_sys_clone3+0x10/0x10 [ 2698.460593] ? __fget_files+0x20d/0x3b0 [ 2698.460613] ? fput+0x6a/0x100 [ 2698.460629] ? ksys_write+0x1a3/0x240 [ 2698.460640] ? __pfx_ksys_write+0x10/0x10 [ 2698.460654] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2698.460670] do_syscall_64+0xbf/0x360 [ 2698.460682] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2698.460695] RIP: 0033:0x7f3a168c2b19 [ 2698.460704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2698.460723] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2698.460735] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2698.460743] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2698.460751] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2698.460759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2698.460766] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2698.460782] 05:56:10 executing program 4: rt_sigprocmask(0x0, 0x0, &(0x7f0000000040), 0x0) 05:56:10 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) 05:56:10 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 3) 05:56:10 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) socket$inet6(0xa, 0xa, 0xffffffff) 05:56:10 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 4) 05:56:10 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 3) 05:56:10 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) 05:56:10 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:56:10 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001940)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001900)={&(0x7f0000001080)={0x86c, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r1}, {0x260, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x8001, 0x97, 0x81}]}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @name={{0x24}, {0x5}, {0xb, 0x4, 'random\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x7c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xa}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x200}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x218, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0xf3, 0xac, 0x9, 0x45}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x800}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r9}}}]}}, {{0x8}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x4c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x1c, 0x4, [{0xb38, 0x0, 0x0, 0x7}, {0xb7, 0x41, 0x6, 0x4d}, {0xfc00, 0x80, 0x8, 0xe0000000}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x2e}}}]}}]}, 0x86c}, 0x1, 0x0, 0x0, 0x20004400}, 0x2) 05:56:10 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 5) [ 2698.711269] FAULT_INJECTION: forcing a failure. [ 2698.711269] name failslab, interval 1, probability 0, space 0, times 0 [ 2698.713168] CPU: 0 UID: 0 PID: 16535 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2698.713205] Tainted: [W]=WARN [ 2698.713212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2698.713225] Call Trace: [ 2698.713232] [ 2698.713241] dump_stack_lvl+0xfa/0x120 [ 2698.713282] should_fail_ex+0x4d7/0x5e0 [ 2698.713313] should_failslab+0xc2/0x120 [ 2698.713341] kmem_cache_alloc_node_noprof+0x79/0x690 [ 2698.713377] ? copy_process+0x3da/0x73c0 [ 2698.713401] ? copy_process+0x461/0x73c0 [ 2698.713429] ? copy_process+0x461/0x73c0 [ 2698.713450] copy_process+0x461/0x73c0 [ 2698.713472] ? __pfx__kstrtoull+0x10/0x10 [ 2698.713511] ? lock_acquire+0x15e/0x2f0 [ 2698.713537] ? __might_fault+0xe0/0x190 [ 2698.713569] ? __pfx_copy_process+0x10/0x10 [ 2698.713592] ? __might_fault+0xe0/0x190 [ 2698.713631] ? _copy_from_user+0x5b/0xd0 [ 2698.713664] kernel_clone+0xea/0x7f0 [ 2698.713686] ? get_pid_task+0xfd/0x250 [ 2698.713711] ? __pfx_kernel_clone+0x10/0x10 [ 2698.713742] ? find_held_lock+0x2b/0x80 [ 2698.713775] ? ksys_write+0x121/0x240 [ 2698.713800] ? lock_is_held_type+0x9e/0x120 [ 2698.713836] __do_sys_clone3+0x1f5/0x280 [ 2698.713860] ? __pfx___do_sys_clone3+0x10/0x10 [ 2698.713899] ? __fget_files+0x20d/0x3b0 [ 2698.713929] ? fput+0x6a/0x100 [ 2698.713958] ? ksys_write+0x1a3/0x240 [ 2698.713980] ? __pfx_ksys_write+0x10/0x10 [ 2698.714007] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2698.714036] do_syscall_64+0xbf/0x360 [ 2698.714058] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2698.714081] RIP: 0033:0x7f3a168c2b19 [ 2698.714099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2698.714121] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2698.714143] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2698.714159] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2698.714173] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2698.714186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2698.714200] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2698.714230] 05:56:10 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) [ 2698.839738] FAULT_INJECTION: forcing a failure. [ 2698.839738] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 2698.841895] CPU: 0 UID: 0 PID: 16541 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2698.841936] Tainted: [W]=WARN [ 2698.841945] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2698.841959] Call Trace: [ 2698.841967] [ 2698.841976] dump_stack_lvl+0xfa/0x120 [ 2698.842020] should_fail_ex+0x4d7/0x5e0 [ 2698.842053] should_fail_alloc_page+0xe0/0x110 [ 2698.842087] prepare_alloc_pages+0x1af/0x500 [ 2698.842123] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2698.842171] ? lock_acquire+0x15e/0x2f0 [ 2698.842200] ? __memcg_slab_post_alloc_hook+0x443/0x9d0 [ 2698.842245] ? find_held_lock+0x2b/0x80 [ 2698.842283] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2698.842335] ? __create_object+0x59/0x80 [ 2698.842372] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 2698.842402] ? kmem_cache_alloc_node_noprof+0x277/0x690 [ 2698.842443] ? __asan_memset+0x24/0x50 [ 2698.842475] __alloc_pages_noprof+0xc/0x1b0 [ 2698.842512] copy_process+0x4f5/0x73c0 [ 2698.842536] ? __pfx__kstrtoull+0x10/0x10 [ 2698.842580] ? lock_acquire+0x15e/0x2f0 [ 2698.842616] ? __might_fault+0xe0/0x190 [ 2698.842649] ? __pfx_copy_process+0x10/0x10 [ 2698.842676] ? __might_fault+0xe0/0x190 [ 2698.842710] ? _copy_from_user+0x5b/0xd0 [ 2698.842746] kernel_clone+0xea/0x7f0 [ 2698.842771] ? get_pid_task+0xfd/0x250 [ 2698.842797] ? __pfx_kernel_clone+0x10/0x10 [ 2698.842832] ? find_held_lock+0x2b/0x80 [ 2698.842869] ? ksys_write+0x121/0x240 [ 2698.842895] ? lock_is_held_type+0x9e/0x120 [ 2698.842935] __do_sys_clone3+0x1f5/0x280 [ 2698.842962] ? __pfx___do_sys_clone3+0x10/0x10 [ 2698.843006] ? __fget_files+0x20d/0x3b0 [ 2698.843037] ? fput+0x6a/0x100 [ 2698.843069] ? ksys_write+0x1a3/0x240 [ 2698.843094] ? __pfx_ksys_write+0x10/0x10 [ 2698.843124] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2698.843155] do_syscall_64+0xbf/0x360 [ 2698.843180] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2698.843205] RIP: 0033:0x7f232c718b19 [ 2698.843224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2698.843249] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2698.843273] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2698.843290] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2698.843306] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2698.843321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2698.843337] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2698.843369] 05:56:19 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 05:56:19 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 6) 05:56:19 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 4) 05:56:19 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 4) 05:56:19 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 5) 05:56:19 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x89f4, &(0x7f0000001040)={'syztnl2\x00', &(0x7f0000000fc0)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x8, 0x81, 0x20, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x10, 0x700, 0xe7}}) 05:56:19 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 05:56:19 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) [ 2707.153979] FAULT_INJECTION: forcing a failure. [ 2707.153979] name failslab, interval 1, probability 0, space 0, times 0 [ 2707.155019] CPU: 0 UID: 0 PID: 16551 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2707.155038] Tainted: [W]=WARN [ 2707.155042] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2707.155049] Call Trace: [ 2707.155053] [ 2707.155058] dump_stack_lvl+0xfa/0x120 [ 2707.155081] should_fail_ex+0x4d7/0x5e0 [ 2707.155098] ? prepare_creds+0x2c/0x7e0 [ 2707.155112] should_failslab+0xc2/0x120 [ 2707.155127] kmem_cache_alloc_noprof+0x72/0x690 [ 2707.155141] ? lock_release+0xc8/0x290 [ 2707.155158] ? prepare_creds+0x2c/0x7e0 [ 2707.155171] prepare_creds+0x2c/0x7e0 [ 2707.155185] copy_creds+0x7a/0xa20 [ 2707.155201] copy_process+0xf1f/0x73c0 [ 2707.155213] ? __pfx__kstrtoull+0x10/0x10 [ 2707.155238] ? __pfx_copy_process+0x10/0x10 [ 2707.155250] ? __might_fault+0xe0/0x190 [ 2707.155267] ? _copy_from_user+0x5b/0xd0 [ 2707.155284] kernel_clone+0xea/0x7f0 [ 2707.155295] ? get_pid_task+0xfd/0x250 [ 2707.155308] ? __pfx_kernel_clone+0x10/0x10 [ 2707.155324] ? find_held_lock+0x2b/0x80 [ 2707.155341] ? ksys_write+0x121/0x240 [ 2707.155355] ? lock_is_held_type+0x9e/0x120 [ 2707.155375] __do_sys_clone3+0x1f5/0x280 [ 2707.155387] ? __pfx___do_sys_clone3+0x10/0x10 [ 2707.155407] ? __fget_files+0x20d/0x3b0 [ 2707.155422] ? fput+0x6a/0x100 [ 2707.155437] ? ksys_write+0x1a3/0x240 [ 2707.155449] ? __pfx_ksys_write+0x10/0x10 [ 2707.155462] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2707.155477] do_syscall_64+0xbf/0x360 [ 2707.155489] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2707.155502] RIP: 0033:0x7f232c718b19 [ 2707.155511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2707.155522] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2707.155534] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2707.155542] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2707.155549] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2707.155556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2707.155562] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2707.155577] [ 2707.186843] FAULT_INJECTION: forcing a failure. [ 2707.186843] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2707.189158] CPU: 1 UID: 0 PID: 16553 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2707.189199] Tainted: [W]=WARN [ 2707.189208] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2707.189223] Call Trace: [ 2707.189232] [ 2707.189242] dump_stack_lvl+0xfa/0x120 [ 2707.189289] should_fail_ex+0x4d7/0x5e0 [ 2707.189325] _copy_to_user+0x32/0xd0 [ 2707.189360] simple_read_from_buffer+0xe0/0x180 [ 2707.189403] proc_fail_nth_read+0x18a/0x240 [ 2707.189433] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2707.189462] ? security_file_permission+0x22/0x90 [ 2707.189504] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 2707.189532] vfs_read+0x1eb/0xc70 [ 2707.189565] ? __pfx_vfs_read+0x10/0x10 [ 2707.189593] ? lock_release+0xc8/0x290 [ 2707.189637] ? __fget_files+0x20d/0x3b0 [ 2707.189675] ksys_read+0x121/0x240 [ 2707.189700] ? __pfx_ksys_read+0x10/0x10 [ 2707.189730] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2707.189763] do_syscall_64+0xbf/0x360 [ 2707.189789] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2707.189816] RIP: 0033:0x7f29f5be969c [ 2707.189835] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2707.189860] RSP: 002b:00007f29f31ac170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2707.189885] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f29f5be969c [ 2707.189903] RDX: 000000000000000f RSI: 00007f29f31ac1e0 RDI: 0000000000000003 [ 2707.189918] RBP: 00007f29f31ac1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2707.189934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2707.189949] R13: 00007ffd8d8780ff R14: 00007f29f31ac300 R15: 0000000000022000 [ 2707.189984] [ 2707.227492] FAULT_INJECTION: forcing a failure. [ 2707.227492] name fail_page_alloc, interval 1, probability 0, space 0, times 0 05:56:19 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 7) [ 2707.229328] CPU: 1 UID: 0 PID: 16561 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2707.229365] Tainted: [W]=WARN [ 2707.229372] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2707.229385] Call Trace: [ 2707.229393] [ 2707.229401] dump_stack_lvl+0xfa/0x120 [ 2707.229439] should_fail_ex+0x4d7/0x5e0 [ 2707.229470] should_fail_alloc_page+0xe0/0x110 [ 2707.229502] prepare_alloc_pages+0x1af/0x500 [ 2707.229535] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2707.229580] ? lock_acquire+0x15e/0x2f0 [ 2707.229614] ? __memcg_slab_post_alloc_hook+0x443/0x9d0 [ 2707.229654] ? find_held_lock+0x2b/0x80 [ 2707.229691] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2707.229738] ? __create_object+0x59/0x80 [ 2707.229772] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 2707.229801] ? kmem_cache_alloc_node_noprof+0x277/0x690 [ 2707.229839] ? __asan_memset+0x24/0x50 05:56:19 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000ec0)) [ 2707.229868] __alloc_pages_noprof+0xc/0x1b0 [ 2707.229903] copy_process+0x4f5/0x73c0 [ 2707.229927] ? __pfx__kstrtoull+0x10/0x10 [ 2707.229967] ? lock_acquire+0x15e/0x2f0 [ 2707.229993] ? __might_fault+0xe0/0x190 [ 2707.230025] ? __pfx_copy_process+0x10/0x10 [ 2707.230050] ? __might_fault+0xe0/0x190 [ 2707.230081] ? _copy_from_user+0x5b/0xd0 [ 2707.230115] kernel_clone+0xea/0x7f0 [ 2707.230138] ? get_pid_task+0xfd/0x250 [ 2707.230163] ? __pfx_kernel_clone+0x10/0x10 [ 2707.230195] ? find_held_lock+0x2b/0x80 [ 2707.230230] ? ksys_write+0x121/0x240 [ 2707.230253] ? lock_is_held_type+0x9e/0x120 [ 2707.230292] __do_sys_clone3+0x1f5/0x280 [ 2707.230316] ? __pfx___do_sys_clone3+0x10/0x10 [ 2707.230357] ? __fget_files+0x20d/0x3b0 [ 2707.230385] ? fput+0x6a/0x100 [ 2707.230415] ? ksys_write+0x1a3/0x240 [ 2707.230439] ? __pfx_ksys_write+0x10/0x10 [ 2707.230466] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2707.230495] do_syscall_64+0xbf/0x360 [ 2707.230518] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2707.230541] RIP: 0033:0x7f6826af1b19 [ 2707.230558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2707.230580] RSP: 002b:00007f6824067188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2707.230603] RAX: ffffffffffffffda RBX: 00007f6826c04f60 RCX: 00007f6826af1b19 [ 2707.230619] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2707.230633] RBP: 00007f68240671d0 R08: 0000000000000000 R09: 0000000000000000 [ 2707.230647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2707.230661] R13: 00007fff21cdf45f R14: 00007f6824067300 R15: 0000000000022000 [ 2707.230692] [ 2707.280488] FAULT_INJECTION: forcing a failure. [ 2707.280488] name fail_page_alloc, interval 1, probability 0, space 0, times 0 05:56:19 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 5) [ 2707.282507] CPU: 1 UID: 0 PID: 16564 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2707.282547] Tainted: [W]=WARN [ 2707.282556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2707.282569] Call Trace: [ 2707.282578] [ 2707.282587] dump_stack_lvl+0xfa/0x120 [ 2707.282636] should_fail_ex+0x4d7/0x5e0 [ 2707.282669] should_fail_alloc_page+0xe0/0x110 [ 2707.282702] prepare_alloc_pages+0x1af/0x500 [ 2707.282737] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2707.282786] ? lock_acquire+0x15e/0x2f0 [ 2707.282815] ? __memcg_slab_post_alloc_hook+0x443/0x9d0 [ 2707.282859] ? find_held_lock+0x2b/0x80 [ 2707.282898] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2707.282951] ? __create_object+0x59/0x80 [ 2707.282988] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 2707.283020] ? kmem_cache_alloc_node_noprof+0x277/0x690 [ 2707.283062] ? __asan_memset+0x24/0x50 [ 2707.283094] __alloc_pages_noprof+0xc/0x1b0 [ 2707.283132] copy_process+0x4f5/0x73c0 [ 2707.283157] ? __pfx__kstrtoull+0x10/0x10 [ 2707.283201] ? lock_acquire+0x15e/0x2f0 [ 2707.283230] ? __might_fault+0xe0/0x190 [ 2707.283264] ? __pfx_copy_process+0x10/0x10 [ 2707.283292] ? __might_fault+0xe0/0x190 [ 2707.283327] ? _copy_from_user+0x5b/0xd0 [ 2707.283364] kernel_clone+0xea/0x7f0 [ 2707.283390] ? get_pid_task+0xfd/0x250 [ 2707.283416] ? __pfx_kernel_clone+0x10/0x10 [ 2707.283452] ? find_held_lock+0x2b/0x80 [ 2707.283490] ? ksys_write+0x121/0x240 [ 2707.283517] ? lock_is_held_type+0x9e/0x120 [ 2707.283558] __do_sys_clone3+0x1f5/0x280 [ 2707.283585] ? __pfx___do_sys_clone3+0x10/0x10 [ 2707.283630] ? __fget_files+0x20d/0x3b0 [ 2707.283662] ? fput+0x6a/0x100 [ 2707.283694] ? ksys_write+0x1a3/0x240 [ 2707.283721] ? __pfx_ksys_write+0x10/0x10 [ 2707.283751] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2707.283782] do_syscall_64+0xbf/0x360 [ 2707.283807] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2707.283833] RIP: 0033:0x7fb9f533db19 [ 2707.283852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2707.283877] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2707.283902] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2707.283919] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2707.283935] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2707.283951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2707.283966] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2707.284000] [ 2707.390920] FAULT_INJECTION: forcing a failure. [ 2707.390920] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2707.393062] CPU: 1 UID: 0 PID: 16569 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2707.393102] Tainted: [W]=WARN [ 2707.393110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2707.393124] Call Trace: [ 2707.393132] [ 2707.393142] dump_stack_lvl+0xfa/0x120 [ 2707.393185] should_fail_ex+0x4d7/0x5e0 [ 2707.393219] should_fail_alloc_page+0xe0/0x110 [ 2707.393252] prepare_alloc_pages+0x1af/0x500 [ 2707.393286] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2707.393333] ? lock_acquire+0x15e/0x2f0 [ 2707.393361] ? __memcg_slab_post_alloc_hook+0x443/0x9d0 [ 2707.393404] ? find_held_lock+0x2b/0x80 [ 2707.393442] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2707.393493] ? __create_object+0x59/0x80 [ 2707.393529] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 2707.393559] ? kmem_cache_alloc_node_noprof+0x277/0x690 [ 2707.393599] ? __asan_memset+0x24/0x50 [ 2707.393639] __alloc_pages_noprof+0xc/0x1b0 [ 2707.393675] copy_process+0x4f5/0x73c0 [ 2707.393700] ? __pfx__kstrtoull+0x10/0x10 [ 2707.393742] ? lock_acquire+0x15e/0x2f0 [ 2707.393770] ? __might_fault+0xe0/0x190 [ 2707.393803] ? __pfx_copy_process+0x10/0x10 [ 2707.393829] ? __might_fault+0xe0/0x190 [ 2707.393862] ? _copy_from_user+0x5b/0xd0 [ 2707.393897] kernel_clone+0xea/0x7f0 [ 2707.393922] ? get_pid_task+0xfd/0x250 [ 2707.393948] ? __pfx_kernel_clone+0x10/0x10 [ 2707.393982] ? find_held_lock+0x2b/0x80 [ 2707.394018] ? ksys_write+0x121/0x240 [ 2707.394044] ? lock_is_held_type+0x9e/0x120 [ 2707.394083] __do_sys_clone3+0x1f5/0x280 [ 2707.394109] ? __pfx___do_sys_clone3+0x10/0x10 [ 2707.394151] ? __fget_files+0x20d/0x3b0 [ 2707.394182] ? fput+0x6a/0x100 [ 2707.394213] ? ksys_write+0x1a3/0x240 [ 2707.394238] ? __pfx_ksys_write+0x10/0x10 [ 2707.394267] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2707.394298] do_syscall_64+0xbf/0x360 [ 2707.394322] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2707.394347] RIP: 0033:0x7f3a168c2b19 [ 2707.394366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2707.394390] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2707.394414] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2707.394430] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2707.394446] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2707.394461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2707.394475] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2707.394507] 05:56:19 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) 05:56:19 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000e80)={'syztnl0\x00', &(0x7f0000000e00)={'syztnl1\x00', 0x0, 0x10, 0x7, 0x8, 0x5, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8, 0x700, 0xc45, 0x7}}) 05:56:19 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 8) 05:56:19 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:56:19 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 05:56:19 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000dc0)={'gre0\x00', &(0x7f0000000d40)={'erspan0\x00', 0x0, 0x80, 0x10, 0x4, 0x2, {{0x9, 0x4, 0x3, 0x10, 0x24, 0x64, 0x0, 0x81, 0x29, 0x0, @private=0xa010102, @remote, {[@timestamp={0x44, 0x8, 0xf5, 0x0, 0x3, [0x1f]}, @ra={0x94, 0x4, 0x1}, @end]}}}}}) 05:56:19 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 5) [ 2707.515085] FAULT_INJECTION: forcing a failure. [ 2707.515085] name failslab, interval 1, probability 0, space 0, times 0 [ 2707.516798] CPU: 0 UID: 0 PID: 16580 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2707.516829] Tainted: [W]=WARN [ 2707.516834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2707.516842] Call Trace: [ 2707.516847] [ 2707.516852] dump_stack_lvl+0xfa/0x120 [ 2707.516882] should_fail_ex+0x4d7/0x5e0 [ 2707.516901] should_failslab+0xc2/0x120 [ 2707.516919] __kmalloc_noprof+0xc8/0x6e0 [ 2707.516939] ? __create_object+0x59/0x80 [ 2707.516959] ? security_prepare_creds+0x101/0x160 [ 2707.516980] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 2707.516999] ? security_prepare_creds+0x101/0x160 [ 2707.517019] security_prepare_creds+0x101/0x160 [ 2707.517040] prepare_creds+0x579/0x7e0 [ 2707.517058] copy_creds+0x7a/0xa20 [ 2707.517075] copy_process+0xf1f/0x73c0 [ 2707.517089] ? __pfx__kstrtoull+0x10/0x10 [ 2707.517116] ? __pfx_copy_process+0x10/0x10 [ 2707.517130] ? __might_fault+0xe0/0x190 [ 2707.517149] ? _copy_from_user+0x5b/0xd0 [ 2707.517167] kernel_clone+0xea/0x7f0 [ 2707.517180] ? get_pid_task+0xfd/0x250 [ 2707.517195] ? __pfx_kernel_clone+0x10/0x10 [ 2707.517212] ? find_held_lock+0x2b/0x80 [ 2707.517232] ? ksys_write+0x121/0x240 [ 2707.517246] ? lock_is_held_type+0x9e/0x120 [ 2707.517268] __do_sys_clone3+0x1f5/0x280 [ 2707.517281] ? __pfx___do_sys_clone3+0x10/0x10 [ 2707.517302] ? __fget_files+0x20d/0x3b0 [ 2707.517320] ? fput+0x6a/0x100 [ 2707.517336] ? ksys_write+0x1a3/0x240 [ 2707.517348] ? __pfx_ksys_write+0x10/0x10 [ 2707.517363] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2707.517380] do_syscall_64+0xbf/0x360 [ 2707.517393] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2707.517407] RIP: 0033:0x7f232c718b19 [ 2707.517417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2707.517430] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2707.517442] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2707.517451] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2707.517459] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2707.517467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2707.517474] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2707.517490] [ 2707.556448] FAULT_INJECTION: forcing a failure. [ 2707.556448] name failslab, interval 1, probability 0, space 0, times 0 [ 2707.558490] CPU: 1 UID: 0 PID: 16582 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2707.558527] Tainted: [W]=WARN [ 2707.558535] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2707.558548] Call Trace: [ 2707.558556] [ 2707.558565] dump_stack_lvl+0xfa/0x120 [ 2707.558615] should_fail_ex+0x4d7/0x5e0 [ 2707.558646] ? prepare_creds+0x2c/0x7e0 [ 2707.558673] should_failslab+0xc2/0x120 [ 2707.558701] kmem_cache_alloc_noprof+0x72/0x690 [ 2707.558725] ? lock_release+0xc8/0x290 [ 2707.558759] ? prepare_creds+0x2c/0x7e0 [ 2707.558784] prepare_creds+0x2c/0x7e0 [ 2707.558813] copy_creds+0x7a/0xa20 [ 2707.558845] copy_process+0xf1f/0x73c0 [ 2707.558868] ? __pfx__kstrtoull+0x10/0x10 [ 2707.558916] ? __pfx_copy_process+0x10/0x10 [ 2707.558940] ? __might_fault+0xe0/0x190 [ 2707.558972] ? _copy_from_user+0x5b/0xd0 [ 2707.559005] kernel_clone+0xea/0x7f0 [ 2707.559028] ? get_pid_task+0xfd/0x250 [ 2707.559052] ? __pfx_kernel_clone+0x10/0x10 [ 2707.559084] ? find_held_lock+0x2b/0x80 [ 2707.559118] ? ksys_write+0x121/0x240 [ 2707.559143] ? lock_is_held_type+0x9e/0x120 [ 2707.559180] __do_sys_clone3+0x1f5/0x280 [ 2707.559204] ? __pfx___do_sys_clone3+0x10/0x10 [ 2707.559244] ? __fget_files+0x20d/0x3b0 [ 2707.559274] ? fput+0x6a/0x100 [ 2707.559303] ? ksys_write+0x1a3/0x240 [ 2707.559326] ? __pfx_ksys_write+0x10/0x10 [ 2707.559353] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2707.559382] do_syscall_64+0xbf/0x360 [ 2707.559405] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2707.559429] RIP: 0033:0x7f6826af1b19 [ 2707.559446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2707.559469] RSP: 002b:00007f6824067188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2707.559491] RAX: ffffffffffffffda RBX: 00007f6826c04f60 RCX: 00007f6826af1b19 [ 2707.559506] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2707.559520] RBP: 00007f68240671d0 R08: 0000000000000000 R09: 0000000000000000 [ 2707.559534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2707.559548] R13: 00007fff21cdf45f R14: 00007f6824067300 R15: 0000000000022000 [ 2707.559578] 05:56:28 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 6) 05:56:28 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 6) 05:56:28 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000c40)) 05:56:28 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 9) 05:56:28 executing program 4: rt_sigprocmask(0x8, 0x0, 0x0, 0x0) 05:56:28 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 05:56:28 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:56:28 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 6) [ 2716.539756] FAULT_INJECTION: forcing a failure. [ 2716.539756] name failslab, interval 1, probability 0, space 0, times 0 [ 2716.541914] CPU: 1 UID: 0 PID: 16596 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2716.541957] Tainted: [W]=WARN [ 2716.541965] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2716.541980] Call Trace: [ 2716.541989] [ 2716.541999] dump_stack_lvl+0xfa/0x120 [ 2716.542046] should_fail_ex+0x4d7/0x5e0 [ 2716.542081] ? prepare_creds+0x2c/0x7e0 [ 2716.542111] should_failslab+0xc2/0x120 [ 2716.542143] kmem_cache_alloc_noprof+0x72/0x690 [ 2716.542171] ? lock_release+0xc8/0x290 [ 2716.542208] ? prepare_creds+0x2c/0x7e0 [ 2716.542237] prepare_creds+0x2c/0x7e0 [ 2716.542270] copy_creds+0x7a/0xa20 [ 2716.542305] copy_process+0xf1f/0x73c0 [ 2716.542331] ? __pfx__kstrtoull+0x10/0x10 [ 2716.542386] ? __pfx_copy_process+0x10/0x10 [ 2716.542413] ? __might_fault+0xe0/0x190 [ 2716.542449] ? _copy_from_user+0x5b/0xd0 [ 2716.542486] kernel_clone+0xea/0x7f0 [ 2716.542512] ? get_pid_task+0xfd/0x250 [ 2716.542539] ? __pfx_kernel_clone+0x10/0x10 [ 2716.542575] ? find_held_lock+0x2b/0x80 [ 2716.542622] ? ksys_write+0x121/0x240 [ 2716.542650] ? lock_is_held_type+0x9e/0x120 [ 2716.542692] __do_sys_clone3+0x1f5/0x280 [ 2716.542719] ? __pfx___do_sys_clone3+0x10/0x10 [ 2716.542764] ? __fget_files+0x20d/0x3b0 [ 2716.542798] ? fput+0x6a/0x100 [ 2716.542830] ? ksys_write+0x1a3/0x240 [ 2716.542856] ? __pfx_ksys_write+0x10/0x10 [ 2716.542887] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2716.542920] do_syscall_64+0xbf/0x360 [ 2716.542945] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2716.542972] RIP: 0033:0x7f3a168c2b19 [ 2716.542992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2716.543016] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2716.543041] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2716.543059] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2716.543074] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2716.543090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2716.543105] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2716.543140] 05:56:28 executing program 4: rt_sigprocmask(0x8000000, 0x0, 0x0, 0x0) [ 2716.609114] FAULT_INJECTION: forcing a failure. [ 2716.609114] name failslab, interval 1, probability 0, space 0, times 0 [ 2716.610194] CPU: 0 UID: 0 PID: 16602 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2716.610215] Tainted: [W]=WARN [ 2716.610219] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2716.610228] Call Trace: [ 2716.610232] [ 2716.610237] dump_stack_lvl+0xfa/0x120 [ 2716.610267] should_fail_ex+0x4d7/0x5e0 [ 2716.610287] ? prepare_creds+0x2c/0x7e0 [ 2716.610302] should_failslab+0xc2/0x120 [ 2716.610319] kmem_cache_alloc_noprof+0x72/0x690 [ 2716.610334] ? lock_release+0xc8/0x290 [ 2716.610353] ? prepare_creds+0x2c/0x7e0 [ 2716.610366] prepare_creds+0x2c/0x7e0 [ 2716.610381] copy_creds+0x7a/0xa20 [ 2716.610397] copy_process+0xf1f/0x73c0 [ 2716.610411] ? __pfx__kstrtoull+0x10/0x10 [ 2716.610437] ? __pfx_copy_process+0x10/0x10 [ 2716.610451] ? __might_fault+0xe0/0x190 [ 2716.610476] ? _copy_from_user+0x5b/0xd0 [ 2716.610495] kernel_clone+0xea/0x7f0 [ 2716.610507] ? get_pid_task+0xfd/0x250 [ 2716.610521] ? __pfx_kernel_clone+0x10/0x10 [ 2716.610537] ? find_held_lock+0x2b/0x80 [ 2716.610555] ? ksys_write+0x121/0x240 [ 2716.610571] ? lock_is_held_type+0x9e/0x120 [ 2716.610592] __do_sys_clone3+0x1f5/0x280 [ 2716.610609] ? __pfx___do_sys_clone3+0x10/0x10 [ 2716.610629] ? __fget_files+0x20d/0x3b0 [ 2716.610650] ? fput+0x6a/0x100 [ 2716.610665] ? ksys_write+0x1a3/0x240 [ 2716.610677] ? __pfx_ksys_write+0x10/0x10 [ 2716.610691] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2716.610708] do_syscall_64+0xbf/0x360 [ 2716.610720] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2716.610734] RIP: 0033:0x7fb9f533db19 [ 2716.610743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2716.610755] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2716.610767] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2716.610776] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2716.610783] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2716.610791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2716.610798] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2716.610814] 05:56:39 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 10) 05:56:39 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x4}, 0x58) 05:56:39 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000c00)={'syztnl1\x00', &(0x7f0000000b40)={'tunl0\x00', 0x0, 0x7800, 0x80, 0x9, 0x800, {{0x19, 0x4, 0x2, 0x9, 0x64, 0x66, 0x0, 0x6b, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010102, {[@timestamp_prespec={0x44, 0x4c, 0xbf, 0x3, 0x6, [{@private=0xa010102, 0x8}, {@empty, 0x3}, {@dev={0xac, 0x14, 0x14, 0x2c}, 0x400}, {@rand_addr=0x64010101}, {@dev={0xac, 0x14, 0x14, 0x27}, 0x2}, {@loopback}, {@local, 0xf1}, {@multicast1, 0x9d}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x877f}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:56:39 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 7) 05:56:39 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) 05:56:39 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 7) 05:56:39 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 7) 05:56:39 executing program 4: rt_sigprocmask(0x800000000000000, 0x0, 0x0, 0x0) [ 2727.765175] FAULT_INJECTION: forcing a failure. [ 2727.765175] name failslab, interval 1, probability 0, space 0, times 0 [ 2727.766985] CPU: 1 UID: 0 PID: 16617 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2727.767022] Tainted: [W]=WARN [ 2727.767029] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2727.767043] Call Trace: [ 2727.767051] [ 2727.767059] dump_stack_lvl+0xfa/0x120 [ 2727.767104] should_fail_ex+0x4d7/0x5e0 [ 2727.767136] should_failslab+0xc2/0x120 [ 2727.767165] __kmalloc_noprof+0xc8/0x6e0 [ 2727.767197] ? __create_object+0x59/0x80 [ 2727.767232] ? security_prepare_creds+0x101/0x160 [ 2727.767270] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 2727.767303] ? security_prepare_creds+0x101/0x160 [ 2727.767340] security_prepare_creds+0x101/0x160 [ 2727.767380] prepare_creds+0x579/0x7e0 [ 2727.767411] copy_creds+0x7a/0xa20 [ 2727.767442] copy_process+0xf1f/0x73c0 [ 2727.767465] ? __pfx__kstrtoull+0x10/0x10 [ 2727.767513] ? __pfx_copy_process+0x10/0x10 [ 2727.767538] ? __might_fault+0xe0/0x190 [ 2727.767570] ? _copy_from_user+0x5b/0xd0 [ 2727.767610] kernel_clone+0xea/0x7f0 [ 2727.767633] ? get_pid_task+0xfd/0x250 [ 2727.767658] ? __pfx_kernel_clone+0x10/0x10 [ 2727.767689] ? find_held_lock+0x2b/0x80 [ 2727.767725] ? ksys_write+0x121/0x240 [ 2727.767749] ? lock_is_held_type+0x9e/0x120 [ 2727.767786] __do_sys_clone3+0x1f5/0x280 [ 2727.767810] ? __pfx___do_sys_clone3+0x10/0x10 [ 2727.767850] ? __fget_files+0x20d/0x3b0 [ 2727.767879] ? fput+0x6a/0x100 [ 2727.767908] ? ksys_write+0x1a3/0x240 [ 2727.767932] ? __pfx_ksys_write+0x10/0x10 [ 2727.767958] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2727.767987] do_syscall_64+0xbf/0x360 [ 2727.768010] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2727.768034] RIP: 0033:0x7f6826af1b19 [ 2727.768052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2727.768075] RSP: 002b:00007f6824067188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2727.768097] RAX: ffffffffffffffda RBX: 00007f6826c04f60 RCX: 00007f6826af1b19 [ 2727.768113] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2727.768127] RBP: 00007f68240671d0 R08: 0000000000000000 R09: 0000000000000000 [ 2727.768141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2727.768155] R13: 00007fff21cdf45f R14: 00007f6824067300 R15: 0000000000022000 [ 2727.768184] [ 2727.779393] FAULT_INJECTION: forcing a failure. [ 2727.779393] name failslab, interval 1, probability 0, space 0, times 0 [ 2727.803562] CPU: 0 UID: 0 PID: 16622 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2727.803599] Tainted: [W]=WARN [ 2727.803612] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2727.803625] Call Trace: [ 2727.803632] [ 2727.803641] dump_stack_lvl+0xfa/0x120 [ 2727.803679] should_fail_ex+0x4d7/0x5e0 [ 2727.803708] ? dup_fd+0x4d/0xa80 [ 2727.803728] should_failslab+0xc2/0x120 [ 2727.803755] kmem_cache_alloc_noprof+0x72/0x690 [ 2727.803788] ? dup_fd+0x4d/0xa80 [ 2727.803808] dup_fd+0x4d/0xa80 [ 2727.803836] copy_process+0x2112/0x73c0 [ 2727.803858] ? __pfx__kstrtoull+0x10/0x10 [ 2727.803906] ? __pfx_copy_process+0x10/0x10 [ 2727.803930] ? __might_fault+0xe0/0x190 [ 2727.803962] ? _copy_from_user+0x5b/0xd0 [ 2727.803995] kernel_clone+0xea/0x7f0 [ 2727.804017] ? get_pid_task+0xfd/0x250 [ 2727.804041] ? __pfx_kernel_clone+0x10/0x10 [ 2727.804073] ? find_held_lock+0x2b/0x80 [ 2727.804107] ? ksys_write+0x121/0x240 [ 2727.804131] ? lock_is_held_type+0x9e/0x120 [ 2727.804168] __do_sys_clone3+0x1f5/0x280 [ 2727.804193] ? __pfx___do_sys_clone3+0x10/0x10 [ 2727.804233] ? __fget_files+0x20d/0x3b0 [ 2727.804261] ? fput+0x6a/0x100 [ 2727.804290] ? ksys_write+0x1a3/0x240 [ 2727.804314] ? __pfx_ksys_write+0x10/0x10 [ 2727.804341] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2727.804369] do_syscall_64+0xbf/0x360 [ 2727.804391] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2727.804415] RIP: 0033:0x7f232c718b19 [ 2727.804432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2727.804454] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2727.804476] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2727.804491] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2727.804505] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2727.804519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2727.804533] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2727.804563] 05:56:39 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x8) 05:56:39 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'syztnl0\x00', &(0x7f0000000940)={'syztnl0\x00', 0x0, 0x20, 0x20, 0x0, 0xf9e, {{0x30, 0x4, 0x0, 0x7, 0xc0, 0x67, 0x0, 0xd6, 0x2f, 0x0, @rand_addr=0x64010102, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xc5, 0x1, 0xa, [{@empty}, {@loopback, 0x7fffffff}]}, @timestamp={0x44, 0x2c, 0x11, 0x0, 0x8, [0x5, 0x8, 0x400, 0x7ff, 0x8, 0x8, 0x733d, 0x5, 0x20, 0x8]}, @lsrr={0x83, 0xb, 0x35, [@private=0xa010102, @broadcast]}, @lsrr={0x83, 0x1b, 0xe9, [@remote, @empty, @multicast1, @rand_addr=0x64010101, @broadcast, @local]}, @rr={0x7, 0x7, 0x7e, [@initdev={0xac, 0x1e, 0x0, 0x0}]}, @ssrr={0x89, 0x23, 0x4d, [@multicast2, @empty, @broadcast, @multicast2, @multicast2, @dev={0xac, 0x14, 0x14, 0x16}, @loopback, @loopback]}, @ra={0x94, 0x4}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x12, "ce523241f2556a73fc1e3bf1a493c26f"}, @noop]}}}}}) 05:56:39 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 8) 05:56:40 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) 05:56:40 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0], 0x3}, 0x58) 05:56:40 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x8000000) 05:56:50 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000880)={'batadv_slave_1\x00'}) 05:56:50 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 8) 05:56:50 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 11) 05:56:50 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 9) 05:56:50 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 8) 05:56:50 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:56:50 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x800000000000000) 05:56:50 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x8) [ 2738.668292] FAULT_INJECTION: forcing a failure. [ 2738.668292] name failslab, interval 1, probability 0, space 0, times 0 [ 2738.669418] CPU: 0 UID: 0 PID: 16648 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2738.669442] Tainted: [W]=WARN [ 2738.669447] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2738.669455] Call Trace: [ 2738.669461] [ 2738.669466] dump_stack_lvl+0xfa/0x120 [ 2738.669495] should_fail_ex+0x4d7/0x5e0 [ 2738.669517] should_failslab+0xc2/0x120 [ 2738.669536] __kmalloc_noprof+0xc8/0x6e0 [ 2738.669557] ? __create_object+0x59/0x80 [ 2738.669580] ? security_prepare_creds+0x101/0x160 [ 2738.669609] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 2738.669630] ? security_prepare_creds+0x101/0x160 [ 2738.669654] security_prepare_creds+0x101/0x160 [ 2738.669679] prepare_creds+0x579/0x7e0 [ 2738.669699] copy_creds+0x7a/0xa20 [ 2738.669719] copy_process+0xf1f/0x73c0 [ 2738.669734] ? __pfx__kstrtoull+0x10/0x10 [ 2738.669765] ? __pfx_copy_process+0x10/0x10 [ 2738.669781] ? __might_fault+0xe0/0x190 [ 2738.669802] ? _copy_from_user+0x5b/0xd0 [ 2738.669823] kernel_clone+0xea/0x7f0 [ 2738.669837] ? get_pid_task+0xfd/0x250 [ 2738.669854] ? __pfx_kernel_clone+0x10/0x10 [ 2738.669874] ? find_held_lock+0x2b/0x80 [ 2738.669897] ? ksys_write+0x121/0x240 [ 2738.669912] ? lock_is_held_type+0x9e/0x120 [ 2738.669936] __do_sys_clone3+0x1f5/0x280 [ 2738.669952] ? __pfx___do_sys_clone3+0x10/0x10 [ 2738.669976] ? __fget_files+0x20d/0x3b0 [ 2738.669995] ? fput+0x6a/0x100 [ 2738.670014] ? ksys_write+0x1a3/0x240 [ 2738.670029] ? __pfx_ksys_write+0x10/0x10 [ 2738.670046] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2738.670065] do_syscall_64+0xbf/0x360 [ 2738.670080] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2738.670096] RIP: 0033:0x7f3a168c2b19 [ 2738.670107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2738.670122] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2738.670136] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2738.670146] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2738.670155] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2738.670164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2738.670173] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2738.670191] [ 2738.671537] FAULT_INJECTION: forcing a failure. [ 2738.671537] name failslab, interval 1, probability 0, space 0, times 0 [ 2738.714486] CPU: 1 UID: 0 PID: 16646 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2738.714528] Tainted: [W]=WARN [ 2738.714536] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2738.714550] Call Trace: [ 2738.714557] [ 2738.714566] dump_stack_lvl+0xfa/0x120 [ 2738.714617] should_fail_ex+0x4d7/0x5e0 [ 2738.714649] ? dup_fd+0x4d/0xa80 [ 2738.714670] should_failslab+0xc2/0x120 [ 2738.714699] kmem_cache_alloc_noprof+0x72/0x690 [ 2738.714734] ? dup_fd+0x4d/0xa80 [ 2738.714756] dup_fd+0x4d/0xa80 [ 2738.714785] copy_process+0x2112/0x73c0 [ 2738.714810] ? __pfx__kstrtoull+0x10/0x10 [ 2738.714860] ? __pfx_copy_process+0x10/0x10 [ 2738.714886] ? __might_fault+0xe0/0x190 [ 2738.714920] ? _copy_from_user+0x5b/0xd0 [ 2738.714955] kernel_clone+0xea/0x7f0 [ 2738.714979] ? get_pid_task+0xfd/0x250 [ 2738.715005] ? __pfx_kernel_clone+0x10/0x10 [ 2738.715038] ? find_held_lock+0x2b/0x80 [ 2738.715076] ? ksys_write+0x121/0x240 [ 2738.715101] ? lock_is_held_type+0x9e/0x120 [ 2738.715140] __do_sys_clone3+0x1f5/0x280 [ 2738.715166] ? __pfx___do_sys_clone3+0x10/0x10 [ 2738.715209] ? __fget_files+0x20d/0x3b0 [ 2738.715239] ? fput+0x6a/0x100 [ 2738.715270] ? ksys_write+0x1a3/0x240 [ 2738.715295] ? __pfx_ksys_write+0x10/0x10 [ 2738.715324] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2738.715354] do_syscall_64+0xbf/0x360 [ 2738.715377] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2738.715402] RIP: 0033:0x7f6826af1b19 [ 2738.715421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2738.715445] RSP: 002b:00007f6824067188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2738.715470] RAX: ffffffffffffffda RBX: 00007f6826c04f60 RCX: 00007f6826af1b19 [ 2738.715486] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2738.715502] RBP: 00007f68240671d0 R08: 0000000000000000 R09: 0000000000000000 [ 2738.715517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2738.715532] R13: 00007fff21cdf45f R14: 00007f6824067300 R15: 0000000000022000 [ 2738.715563] 05:56:50 executing program 4: sched_setscheduler(0x0, 0x5, &(0x7f0000000080)) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f00000001c0)={0x1, 0x2, 0x2, 0x9}, 0x10) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x1c, r0, 0x200, 0x70bd23, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000200)={[0x2]}, &(0x7f0000000240), 0x8) sched_getparam(0x0, &(0x7f0000000180)) 05:56:50 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000840)) 05:56:50 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 9) [ 2738.831716] FAULT_INJECTION: forcing a failure. [ 2738.831716] name failslab, interval 1, probability 0, space 0, times 0 [ 2738.832811] CPU: 0 UID: 0 PID: 16665 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2738.832832] Tainted: [W]=WARN [ 2738.832836] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2738.832844] Call Trace: [ 2738.832849] [ 2738.832854] dump_stack_lvl+0xfa/0x120 [ 2738.832880] should_fail_ex+0x4d7/0x5e0 [ 2738.832899] should_failslab+0xc2/0x120 [ 2738.832915] __kmalloc_noprof+0xc8/0x6e0 [ 2738.832934] ? __create_object+0x59/0x80 [ 2738.832954] ? security_prepare_creds+0x101/0x160 [ 2738.832976] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 2738.832994] ? security_prepare_creds+0x101/0x160 [ 2738.833015] security_prepare_creds+0x101/0x160 [ 2738.833037] prepare_creds+0x579/0x7e0 [ 2738.833055] copy_creds+0x7a/0xa20 [ 2738.833073] copy_process+0xf1f/0x73c0 [ 2738.833086] ? __pfx__kstrtoull+0x10/0x10 [ 2738.833113] ? __pfx_copy_process+0x10/0x10 [ 2738.833127] ? __might_fault+0xe0/0x190 [ 2738.833153] ? _copy_from_user+0x5b/0xd0 [ 2738.833172] kernel_clone+0xea/0x7f0 [ 2738.833185] ? get_pid_task+0xfd/0x250 [ 2738.833199] ? __pfx_kernel_clone+0x10/0x10 [ 2738.833217] ? find_held_lock+0x2b/0x80 [ 2738.833237] ? ksys_write+0x121/0x240 [ 2738.833250] ? lock_is_held_type+0x9e/0x120 [ 2738.833272] __do_sys_clone3+0x1f5/0x280 [ 2738.833285] ? __pfx___do_sys_clone3+0x10/0x10 [ 2738.833307] ? __fget_files+0x20d/0x3b0 [ 2738.833324] ? fput+0x6a/0x100 [ 2738.833341] ? ksys_write+0x1a3/0x240 [ 2738.833354] ? __pfx_ksys_write+0x10/0x10 [ 2738.833369] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2738.833385] do_syscall_64+0xbf/0x360 [ 2738.833399] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2738.833412] RIP: 0033:0x7fb9f533db19 [ 2738.833422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2738.833435] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2738.833448] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2738.833457] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2738.833464] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2738.833472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2738.833480] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2738.833497] 05:56:50 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) 05:56:51 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 10) 05:56:51 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x8) 05:56:51 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 12) 05:56:51 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 9) 05:56:51 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) clone3(&(0x7f00000006c0)={0x3e7e5e8d3eb023bd, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x9}, 0x58) [ 2738.950360] FAULT_INJECTION: forcing a failure. [ 2738.950360] name failslab, interval 1, probability 0, space 0, times 0 [ 2738.951444] CPU: 0 UID: 0 PID: 16670 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2738.951464] Tainted: [W]=WARN [ 2738.951469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2738.951477] Call Trace: [ 2738.951481] [ 2738.951486] dump_stack_lvl+0xfa/0x120 [ 2738.951511] should_fail_ex+0x4d7/0x5e0 [ 2738.951529] should_failslab+0xc2/0x120 [ 2738.951546] __kmalloc_cache_noprof+0x73/0x690 [ 2738.951566] ? alloc_fdtable+0x9e/0x2d0 [ 2738.951586] ? find_held_lock+0x2b/0x80 [ 2738.951613] ? alloc_fdtable+0x9e/0x2d0 [ 2738.951631] alloc_fdtable+0x9e/0x2d0 [ 2738.951652] dup_fd+0x6ef/0xa80 [ 2738.951667] copy_process+0x2112/0x73c0 [ 2738.951681] ? __pfx__kstrtoull+0x10/0x10 [ 2738.951707] ? __pfx_copy_process+0x10/0x10 [ 2738.951720] ? __might_fault+0xe0/0x190 [ 2738.951738] ? _copy_from_user+0x5b/0xd0 [ 2738.951756] kernel_clone+0xea/0x7f0 [ 2738.951769] ? get_pid_task+0xfd/0x250 [ 2738.951783] ? __pfx_kernel_clone+0x10/0x10 [ 2738.951800] ? find_held_lock+0x2b/0x80 [ 2738.951818] ? ksys_write+0x121/0x240 [ 2738.951832] ? lock_is_held_type+0x9e/0x120 [ 2738.951853] __do_sys_clone3+0x1f5/0x280 [ 2738.951866] ? __pfx___do_sys_clone3+0x10/0x10 [ 2738.951887] ? __fget_files+0x20d/0x3b0 [ 2738.951903] ? fput+0x6a/0x100 [ 2738.951919] ? ksys_write+0x1a3/0x240 [ 2738.951931] ? __pfx_ksys_write+0x10/0x10 [ 2738.951946] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2738.951962] do_syscall_64+0xbf/0x360 [ 2738.951975] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2738.951988] RIP: 0033:0x7f232c718b19 [ 2738.951998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2738.952010] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2738.952022] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2738.952030] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2738.952038] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2738.952046] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2738.952053] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2738.952069] 05:56:51 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) 05:56:51 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x8) [ 2739.054155] FAULT_INJECTION: forcing a failure. [ 2739.054155] name failslab, interval 1, probability 0, space 0, times 0 [ 2739.056156] CPU: 1 UID: 0 PID: 16682 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2739.056193] Tainted: [W]=WARN [ 2739.056201] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2739.056214] Call Trace: [ 2739.056221] [ 2739.056230] dump_stack_lvl+0xfa/0x120 [ 2739.056271] should_fail_ex+0x4d7/0x5e0 [ 2739.056304] should_failslab+0xc2/0x120 [ 2739.056332] __kmalloc_noprof+0xc8/0x6e0 [ 2739.056364] ? __create_object+0x59/0x80 [ 2739.056399] ? security_prepare_creds+0x101/0x160 [ 2739.056435] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 2739.056469] ? security_prepare_creds+0x101/0x160 [ 2739.056504] security_prepare_creds+0x101/0x160 [ 2739.056544] prepare_creds+0x579/0x7e0 [ 2739.056575] copy_creds+0x7a/0xa20 [ 2739.056613] copy_process+0xf1f/0x73c0 [ 2739.056637] ? __pfx__kstrtoull+0x10/0x10 [ 2739.056685] ? __pfx_copy_process+0x10/0x10 [ 2739.056709] ? __might_fault+0xe0/0x190 [ 2739.056742] ? _copy_from_user+0x5b/0xd0 [ 2739.056775] kernel_clone+0xea/0x7f0 [ 2739.056797] ? get_pid_task+0xfd/0x250 [ 2739.056822] ? __pfx_kernel_clone+0x10/0x10 [ 2739.056854] ? find_held_lock+0x2b/0x80 [ 2739.056889] ? ksys_write+0x121/0x240 [ 2739.056913] ? lock_is_held_type+0x9e/0x120 [ 2739.056950] __do_sys_clone3+0x1f5/0x280 [ 2739.056974] ? __pfx___do_sys_clone3+0x10/0x10 [ 2739.057014] ? __fget_files+0x20d/0x3b0 [ 2739.057046] ? fput+0x6a/0x100 [ 2739.057075] ? ksys_write+0x1a3/0x240 [ 2739.057099] ? __pfx_ksys_write+0x10/0x10 [ 2739.057125] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2739.057166] do_syscall_64+0xbf/0x360 [ 2739.057189] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2739.057212] RIP: 0033:0x7f6826af1b19 [ 2739.057230] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2739.057252] RSP: 002b:00007f6824067188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2739.057275] RAX: ffffffffffffffda RBX: 00007f6826c04f60 RCX: 00007f6826af1b19 [ 2739.057291] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2739.057305] RBP: 00007f68240671d0 R08: 0000000000000000 R09: 0000000000000000 [ 2739.057319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2739.057332] R13: 00007fff21cdf45f R14: 00007f6824067300 R15: 0000000000022000 [ 2739.057363] [ 2739.111120] FAULT_INJECTION: forcing a failure. [ 2739.111120] name failslab, interval 1, probability 0, space 0, times 0 [ 2739.112054] CPU: 0 UID: 0 PID: 16687 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2739.112074] Tainted: [W]=WARN [ 2739.112078] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2739.112085] Call Trace: [ 2739.112090] [ 2739.112095] dump_stack_lvl+0xfa/0x120 [ 2739.112118] should_fail_ex+0x4d7/0x5e0 [ 2739.112136] ? dup_fd+0x4d/0xa80 [ 2739.112147] should_failslab+0xc2/0x120 [ 2739.112163] kmem_cache_alloc_noprof+0x72/0x690 [ 2739.112181] ? dup_fd+0x4d/0xa80 [ 2739.112192] dup_fd+0x4d/0xa80 [ 2739.112207] copy_process+0x2112/0x73c0 [ 2739.112220] ? __pfx__kstrtoull+0x10/0x10 [ 2739.112247] ? __pfx_copy_process+0x10/0x10 [ 2739.112260] ? __might_fault+0xe0/0x190 [ 2739.112278] ? _copy_from_user+0x5b/0xd0 [ 2739.112295] kernel_clone+0xea/0x7f0 [ 2739.112308] ? get_pid_task+0xfd/0x250 [ 2739.112321] ? __pfx_kernel_clone+0x10/0x10 [ 2739.112338] ? find_held_lock+0x2b/0x80 [ 2739.112358] ? ksys_write+0x121/0x240 [ 2739.112371] ? lock_is_held_type+0x9e/0x120 [ 2739.112392] __do_sys_clone3+0x1f5/0x280 [ 2739.112405] ? __pfx___do_sys_clone3+0x10/0x10 [ 2739.112426] ? __fget_files+0x20d/0x3b0 [ 2739.112441] ? fput+0x6a/0x100 [ 2739.112457] ? ksys_write+0x1a3/0x240 [ 2739.112470] ? __pfx_ksys_write+0x10/0x10 [ 2739.112484] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2739.112500] do_syscall_64+0xbf/0x360 [ 2739.112513] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2739.112526] RIP: 0033:0x7fb9f533db19 [ 2739.112535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2739.112547] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2739.112559] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2739.112568] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2739.112576] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2739.112583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2739.112591] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2739.112611] 05:56:51 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 10) 05:56:51 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) set_robust_list(&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, 0x18) 05:56:51 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 10) 05:56:51 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 13) 05:56:51 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) [ 2739.156504] FAULT_INJECTION: forcing a failure. [ 2739.156504] name failslab, interval 1, probability 0, space 0, times 0 [ 2739.158462] CPU: 1 UID: 0 PID: 16691 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2739.158502] Tainted: [W]=WARN [ 2739.158510] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2739.158524] Call Trace: [ 2739.158532] [ 2739.158541] dump_stack_lvl+0xfa/0x120 [ 2739.158586] should_fail_ex+0x4d7/0x5e0 [ 2739.158626] ? dup_fd+0x4d/0xa80 [ 2739.158648] should_failslab+0xc2/0x120 [ 2739.158678] kmem_cache_alloc_noprof+0x72/0x690 [ 2739.158713] ? dup_fd+0x4d/0xa80 [ 2739.158735] dup_fd+0x4d/0xa80 [ 2739.158764] copy_process+0x2112/0x73c0 [ 2739.158790] ? __pfx__kstrtoull+0x10/0x10 [ 2739.158841] ? __pfx_copy_process+0x10/0x10 [ 2739.158867] ? __might_fault+0xe0/0x190 [ 2739.158901] ? _copy_from_user+0x5b/0xd0 [ 2739.158937] kernel_clone+0xea/0x7f0 [ 2739.158961] ? get_pid_task+0xfd/0x250 [ 2739.158987] ? __pfx_kernel_clone+0x10/0x10 [ 2739.159021] ? find_held_lock+0x2b/0x80 [ 2739.159059] ? ksys_write+0x121/0x240 [ 2739.159085] ? lock_is_held_type+0x9e/0x120 [ 2739.159125] __do_sys_clone3+0x1f5/0x280 [ 2739.159151] ? __pfx___do_sys_clone3+0x10/0x10 [ 2739.159193] ? __fget_files+0x20d/0x3b0 [ 2739.159223] ? fput+0x6a/0x100 [ 2739.159255] ? ksys_write+0x1a3/0x240 [ 2739.159280] ? __pfx_ksys_write+0x10/0x10 [ 2739.159308] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2739.159340] do_syscall_64+0xbf/0x360 [ 2739.159364] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2739.159390] RIP: 0033:0x7f3a168c2b19 [ 2739.159408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2739.159432] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2739.159456] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2739.159473] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2739.159488] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2739.159503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2739.159518] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2739.159550] 05:56:59 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 11) 05:56:59 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 14) 05:56:59 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) 05:56:59 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) set_robust_list(&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, 0x18) 05:56:59 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 11) 05:56:59 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 11) 05:56:59 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) 05:56:59 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, 0x0, 0x10, 0x70bd2b, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000002}, 0x0) [ 2747.930011] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=16709 comm=syz-executor.4 [ 2747.935898] FAULT_INJECTION: forcing a failure. [ 2747.935898] name failslab, interval 1, probability 0, space 0, times 0 [ 2747.936592] FAULT_INJECTION: forcing a failure. [ 2747.936592] name failslab, interval 1, probability 0, space 0, times 0 [ 2747.937724] CPU: 0 UID: 0 PID: 16710 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2747.937763] Tainted: [W]=WARN [ 2747.937770] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2747.937783] Call Trace: [ 2747.937791] [ 2747.937799] dump_stack_lvl+0xfa/0x120 [ 2747.937842] should_fail_ex+0x4d7/0x5e0 [ 2747.937874] should_failslab+0xc2/0x120 [ 2747.937902] __kvmalloc_node_noprof+0x111/0x760 [ 2747.937925] ? trace_kmalloc+0x1f/0xb0 [ 2747.937952] ? __kmalloc_cache_noprof+0x26f/0x690 [ 2747.937987] ? alloc_fdtable+0xf2/0x2d0 [ 2747.938029] ? alloc_fdtable+0xf2/0x2d0 [ 2747.938063] alloc_fdtable+0xf2/0x2d0 [ 2747.938101] dup_fd+0x6ef/0xa80 [ 2747.938129] copy_process+0x2112/0x73c0 [ 2747.938153] ? __pfx__kstrtoull+0x10/0x10 [ 2747.938200] ? __pfx_copy_process+0x10/0x10 [ 2747.938225] ? __might_fault+0xe0/0x190 [ 2747.938257] ? _copy_from_user+0x5b/0xd0 [ 2747.938290] kernel_clone+0xea/0x7f0 [ 2747.938312] ? get_pid_task+0xfd/0x250 [ 2747.938337] ? __pfx_kernel_clone+0x10/0x10 [ 2747.938369] ? find_held_lock+0x2b/0x80 [ 2747.938404] ? ksys_write+0x121/0x240 [ 2747.938428] ? lock_is_held_type+0x9e/0x120 [ 2747.938465] __do_sys_clone3+0x1f5/0x280 [ 2747.938490] ? __pfx___do_sys_clone3+0x10/0x10 [ 2747.938529] ? __fget_files+0x20d/0x3b0 [ 2747.938557] ? fput+0x6a/0x100 [ 2747.938587] ? ksys_write+0x1a3/0x240 [ 2747.938617] ? __pfx_ksys_write+0x10/0x10 [ 2747.938644] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2747.938674] do_syscall_64+0xbf/0x360 [ 2747.938696] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2747.938720] RIP: 0033:0x7f232c718b19 [ 2747.938738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2747.938760] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2747.938783] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2747.938799] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2747.938813] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2747.938827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2747.938840] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2747.938870] [ 2747.972470] CPU: 1 UID: 0 PID: 16712 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2747.972507] Tainted: [W]=WARN [ 2747.972515] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2747.972528] Call Trace: [ 2747.972536] [ 2747.972545] dump_stack_lvl+0xfa/0x120 [ 2747.972587] should_fail_ex+0x4d7/0x5e0 [ 2747.972626] should_failslab+0xc2/0x120 [ 2747.972655] __kmalloc_cache_noprof+0x73/0x690 [ 2747.972691] ? alloc_fdtable+0x9e/0x2d0 [ 2747.972725] ? find_held_lock+0x2b/0x80 [ 2747.972764] ? alloc_fdtable+0x9e/0x2d0 [ 2747.972797] alloc_fdtable+0x9e/0x2d0 [ 2747.972832] dup_fd+0x6ef/0xa80 [ 2747.972860] copy_process+0x2112/0x73c0 [ 2747.972883] ? __pfx__kstrtoull+0x10/0x10 [ 2747.972930] ? __pfx_copy_process+0x10/0x10 [ 2747.972953] ? __might_fault+0xe0/0x190 [ 2747.972986] ? _copy_from_user+0x5b/0xd0 [ 2747.973018] kernel_clone+0xea/0x7f0 [ 2747.973039] ? get_pid_task+0xfd/0x250 [ 2747.973064] ? __pfx_kernel_clone+0x10/0x10 [ 2747.973095] ? find_held_lock+0x2b/0x80 [ 2747.973127] ? ksys_write+0x121/0x240 [ 2747.973151] ? lock_is_held_type+0x9e/0x120 [ 2747.973187] __do_sys_clone3+0x1f5/0x280 [ 2747.973210] ? __pfx___do_sys_clone3+0x10/0x10 [ 2747.973265] ? __fget_files+0x20d/0x3b0 [ 2747.973293] ? fput+0x6a/0x100 [ 2747.973322] ? ksys_write+0x1a3/0x240 [ 2747.973344] ? __pfx_ksys_write+0x10/0x10 [ 2747.973370] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2747.973399] do_syscall_64+0xbf/0x360 [ 2747.973421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2747.973445] RIP: 0033:0x7f6826af1b19 [ 2747.973462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2747.973483] RSP: 002b:00007f6824067188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2747.973505] RAX: ffffffffffffffda RBX: 00007f6826c04f60 RCX: 00007f6826af1b19 [ 2747.973520] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2747.973534] RBP: 00007f68240671d0 R08: 0000000000000000 R09: 0000000000000000 [ 2747.973547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2747.973561] R13: 00007fff21cdf45f R14: 00007f6824067300 R15: 0000000000022000 [ 2747.973590] 05:57:09 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 12) 05:57:09 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) (fail_nth: 12) 05:57:09 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) 05:57:09 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 15) 05:57:09 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) set_robust_list(&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, 0x18) 05:57:09 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) accept4(0xffffffffffffffff, &(0x7f0000000200)=@nl, &(0x7f0000000280)=0x80, 0x0) 05:57:09 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 12) 05:57:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x400, 0x70bd29, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040000}, 0x4) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0x10, 0x70bd2b, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_STA_PLINK_ACTION={0x5}, @NL80211_ATTR_OPMODE_NOTIF={0x5, 0xc2, 0x80}, @NL80211_ATTR_STA_TX_POWER_SETTING={0x5, 0x113, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x4870) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) [ 2757.732405] FAULT_INJECTION: forcing a failure. [ 2757.732405] name failslab, interval 1, probability 0, space 0, times 0 [ 2757.734071] CPU: 1 UID: 0 PID: 16733 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2757.734108] Tainted: [W]=WARN [ 2757.734115] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2757.734128] Call Trace: [ 2757.734136] [ 2757.734145] dump_stack_lvl+0xfa/0x120 [ 2757.734187] should_fail_ex+0x4d7/0x5e0 [ 2757.734219] should_failslab+0xc2/0x120 [ 2757.734253] __kmalloc_cache_noprof+0x73/0x690 [ 2757.734290] ? alloc_fdtable+0x9e/0x2d0 [ 2757.734325] ? find_held_lock+0x2b/0x80 [ 2757.734365] ? alloc_fdtable+0x9e/0x2d0 [ 2757.734399] alloc_fdtable+0x9e/0x2d0 [ 2757.734437] dup_fd+0x6ef/0xa80 [ 2757.734465] copy_process+0x2112/0x73c0 [ 2757.734488] ? __pfx__kstrtoull+0x10/0x10 [ 2757.734536] ? __pfx_copy_process+0x10/0x10 [ 2757.734561] ? __might_fault+0xe0/0x190 [ 2757.734593] ? _copy_from_user+0x5b/0xd0 [ 2757.734632] kernel_clone+0xea/0x7f0 [ 2757.734655] ? get_pid_task+0xfd/0x250 [ 2757.734679] ? __pfx_kernel_clone+0x10/0x10 [ 2757.734711] ? find_held_lock+0x2b/0x80 [ 2757.734745] ? ksys_write+0x121/0x240 [ 2757.734769] ? lock_is_held_type+0x9e/0x120 [ 2757.734807] __do_sys_clone3+0x1f5/0x280 [ 2757.734831] ? __pfx___do_sys_clone3+0x10/0x10 [ 2757.734870] ? __fget_files+0x20d/0x3b0 [ 2757.734898] ? fput+0x6a/0x100 [ 2757.734927] ? ksys_write+0x1a3/0x240 [ 2757.734951] ? __pfx_ksys_write+0x10/0x10 [ 2757.734977] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2757.735007] do_syscall_64+0xbf/0x360 [ 2757.735029] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2757.735053] RIP: 0033:0x7fb9f533db19 [ 2757.735070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2757.735092] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2757.735115] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2757.735130] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2757.735144] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2757.735158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2757.735172] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2757.735202] [ 2757.775494] FAULT_INJECTION: forcing a failure. [ 2757.775494] name failslab, interval 1, probability 0, space 0, times 0 [ 2757.776555] CPU: 0 UID: 0 PID: 16736 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2757.776576] Tainted: [W]=WARN [ 2757.776581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2757.776589] Call Trace: [ 2757.776593] 05:57:09 executing program 5: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:57:09 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) set_robust_list(&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, 0x18) [ 2757.776602] dump_stack_lvl+0xfa/0x120 [ 2757.776632] should_fail_ex+0x4d7/0x5e0 [ 2757.776651] should_failslab+0xc2/0x120 [ 2757.776669] __kmalloc_cache_noprof+0x73/0x690 [ 2757.776690] ? alloc_fdtable+0x9e/0x2d0 [ 2757.776711] ? find_held_lock+0x2b/0x80 [ 2757.776734] ? alloc_fdtable+0x9e/0x2d0 [ 2757.776752] alloc_fdtable+0x9e/0x2d0 [ 2757.776772] dup_fd+0x6ef/0xa80 [ 2757.776788] copy_process+0x2112/0x73c0 [ 2757.776802] ? __pfx__kstrtoull+0x10/0x10 [ 2757.776829] ? __pfx_copy_process+0x10/0x10 [ 2757.776842] ? __might_fault+0xe0/0x190 [ 2757.776860] ? _copy_from_user+0x5b/0xd0 [ 2757.776878] kernel_clone+0xea/0x7f0 [ 2757.776891] ? get_pid_task+0xfd/0x250 [ 2757.776905] ? __pfx_kernel_clone+0x10/0x10 [ 2757.776922] ? find_held_lock+0x2b/0x80 [ 2757.776940] ? ksys_write+0x121/0x240 [ 2757.776954] ? lock_is_held_type+0x9e/0x120 [ 2757.776976] __do_sys_clone3+0x1f5/0x280 [ 2757.776989] ? __pfx___do_sys_clone3+0x10/0x10 [ 2757.777010] ? __fget_files+0x20d/0x3b0 [ 2757.777026] ? fput+0x6a/0x100 [ 2757.777042] ? ksys_write+0x1a3/0x240 [ 2757.777055] ? __pfx_ksys_write+0x10/0x10 [ 2757.777069] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2757.777086] do_syscall_64+0xbf/0x360 [ 2757.777099] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2757.777113] RIP: 0033:0x7f3a168c2b19 [ 2757.777123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2757.777136] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2757.777148] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2757.777157] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2757.777165] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2757.777173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2757.777180] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2757.777197] 05:57:09 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000180)={[0x100000001]}, &(0x7f00000001c0), 0x8) 05:57:09 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) 05:57:09 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 16) 05:57:09 executing program 2: set_robust_list(&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, 0x18) 05:57:10 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 13) 05:57:10 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 13) [ 2757.938445] FAULT_INJECTION: forcing a failure. [ 2757.938445] name failslab, interval 1, probability 0, space 0, times 0 [ 2757.939460] CPU: 0 UID: 0 PID: 16751 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2757.939481] Tainted: [W]=WARN [ 2757.939485] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2757.939493] Call Trace: [ 2757.939497] [ 2757.939502] dump_stack_lvl+0xfa/0x120 [ 2757.939531] should_fail_ex+0x4d7/0x5e0 [ 2757.939550] should_failslab+0xc2/0x120 [ 2757.939567] __kvmalloc_node_noprof+0x111/0x760 [ 2757.939580] ? trace_kmalloc+0x1f/0xb0 [ 2757.939600] ? __kmalloc_cache_noprof+0x26f/0x690 [ 2757.939619] ? alloc_fdtable+0x163/0x2d0 [ 2757.939646] ? alloc_fdtable+0x163/0x2d0 [ 2757.939665] alloc_fdtable+0x163/0x2d0 [ 2757.939685] dup_fd+0x6ef/0xa80 [ 2757.939701] copy_process+0x2112/0x73c0 [ 2757.939715] ? __pfx__kstrtoull+0x10/0x10 [ 2757.939742] ? __pfx_copy_process+0x10/0x10 [ 2757.939755] ? __might_fault+0xe0/0x190 [ 2757.939773] ? _copy_from_user+0x5b/0xd0 [ 2757.939791] kernel_clone+0xea/0x7f0 [ 2757.939804] ? get_pid_task+0xfd/0x250 [ 2757.939818] ? __pfx_kernel_clone+0x10/0x10 [ 2757.939835] ? find_held_lock+0x2b/0x80 [ 2757.939855] ? ksys_write+0x121/0x240 [ 2757.939869] ? lock_is_held_type+0x9e/0x120 [ 2757.939890] __do_sys_clone3+0x1f5/0x280 [ 2757.939903] ? __pfx___do_sys_clone3+0x10/0x10 [ 2757.939925] ? __fget_files+0x20d/0x3b0 [ 2757.939940] ? fput+0x6a/0x100 [ 2757.939956] ? ksys_write+0x1a3/0x240 [ 2757.939969] ? __pfx_ksys_write+0x10/0x10 [ 2757.939983] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2757.940000] do_syscall_64+0xbf/0x360 [ 2757.940013] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2757.940026] RIP: 0033:0x7f232c718b19 [ 2757.940036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2757.940050] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2757.940062] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2757.940071] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2757.940079] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2757.940087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2757.940094] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2757.940111] 05:57:10 executing program 5: clone3(&(0x7f00000006c0)={0x2, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:57:10 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) getsockname(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000200)=0x80) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc5}, 0xc80c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB='P\x00\x003', @ANYRES16=0x0, @ANYBLOB="000326bd7000ffdbdf2501000000060001004e20000005000200020000001400090020010000000000000000000000000001050002000a00000008000800ac1414bb06000a004e240000"], 0x50}, 0x1, 0x0, 0x0, 0x810}, 0x8062815) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), r0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="f17828bd5000fddbdf250300000008000300000000000800030005000000432c0bba62d1ed8cb55143563a80ca1d5555937ee6c1b47a94aef61d7fe8e48055044cabcdda0016242142edf10ebc0389cc033b82df9fe5f748f9ad94a2571c6b4351cd971de34bcd64f02c5fdbfe9629e439f6c146f30d2af9b82909112ba0725bb4d2f18caa91f259a2d80145780ee88816708af29fc22309a4c9a5334af645df34b442478df0dae364b3be9b286d6160a1cbd2de1804d00b5a85921b823992dc4a2b21cd5c63465af023238c1fb77d699c432c54b48782130f240f"], 0x24}, 0x1, 0x0, 0x0, 0x4040001}, 0x20008094) 05:57:10 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) pidfd_open(0x0, 0x0) 05:57:10 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 17) 05:57:21 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) 05:57:21 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) 05:57:21 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 14) 05:57:21 executing program 5: clone3(&(0x7f00000006c0)={0x3, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:57:21 executing program 2: set_robust_list(0x0, 0x0) 05:57:21 executing program 4: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@ax25={{0x3, @default}, [@null, @bcast, @bcast, @bcast, @remote, @netrom, @bcast, @rose]}, &(0x7f0000000080)=0x80) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:57:21 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 18) 05:57:21 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 14) [ 2769.554226] FAULT_INJECTION: forcing a failure. [ 2769.554226] name failslab, interval 1, probability 0, space 0, times 0 [ 2769.554333] FAULT_INJECTION: forcing a failure. [ 2769.554333] name failslab, interval 1, probability 0, space 0, times 0 [ 2769.556508] CPU: 1 UID: 0 PID: 16782 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2769.556558] Tainted: [W]=WARN [ 2769.556568] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2769.556586] Call Trace: [ 2769.556596] [ 2769.556617] dump_stack_lvl+0xfa/0x120 [ 2769.556672] should_fail_ex+0x4d7/0x5e0 [ 2769.556715] should_failslab+0xc2/0x120 [ 2769.556753] __kvmalloc_node_noprof+0x111/0x760 [ 2769.556784] ? trace_kmalloc+0x1f/0xb0 [ 2769.556819] ? __kmalloc_cache_noprof+0x26f/0x690 [ 2769.556866] ? alloc_fdtable+0xf2/0x2d0 [ 2769.556923] ? alloc_fdtable+0xf2/0x2d0 [ 2769.556969] alloc_fdtable+0xf2/0x2d0 [ 2769.557019] dup_fd+0x6ef/0xa80 [ 2769.557056] copy_process+0x2112/0x73c0 [ 2769.557088] ? __pfx__kstrtoull+0x10/0x10 [ 2769.557151] ? __pfx_copy_process+0x10/0x10 [ 2769.557184] ? __might_fault+0xe0/0x190 [ 2769.557226] ? _copy_from_user+0x5b/0xd0 [ 2769.557270] kernel_clone+0xea/0x7f0 [ 2769.557301] ? get_pid_task+0xfd/0x250 [ 2769.557334] ? __pfx_kernel_clone+0x10/0x10 [ 2769.557376] ? find_held_lock+0x2b/0x80 [ 2769.557423] ? ksys_write+0x121/0x240 [ 2769.557456] ? lock_is_held_type+0x9e/0x120 [ 2769.557524] __do_sys_clone3+0x1f5/0x280 [ 2769.557557] ? __pfx___do_sys_clone3+0x10/0x10 [ 2769.557610] ? __fget_files+0x20d/0x3b0 [ 2769.557647] ? fput+0x6a/0x100 [ 2769.557686] ? ksys_write+0x1a3/0x240 [ 2769.557718] ? __pfx_ksys_write+0x10/0x10 [ 2769.557754] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2769.557792] do_syscall_64+0xbf/0x360 [ 2769.557822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2769.557854] RIP: 0033:0x7f3a168c2b19 [ 2769.557877] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2769.557907] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2769.557937] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2769.557958] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2769.557976] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2769.557995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2769.558014] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2769.558054] [ 2769.589423] CPU: 0 UID: 0 PID: 16785 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2769.589462] Tainted: [W]=WARN [ 2769.589469] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2769.589492] Call Trace: [ 2769.589501] [ 2769.589510] dump_stack_lvl+0xfa/0x120 [ 2769.589558] should_fail_ex+0x4d7/0x5e0 [ 2769.589591] should_failslab+0xc2/0x120 [ 2769.589627] __kvmalloc_node_noprof+0x111/0x760 [ 2769.589652] ? trace_kmalloc+0x1f/0xb0 [ 2769.589680] ? __kmalloc_cache_noprof+0x26f/0x690 [ 2769.589716] ? alloc_fdtable+0xf2/0x2d0 [ 2769.589759] ? alloc_fdtable+0xf2/0x2d0 [ 2769.589794] alloc_fdtable+0xf2/0x2d0 [ 2769.589831] dup_fd+0x6ef/0xa80 [ 2769.589860] copy_process+0x2112/0x73c0 [ 2769.589885] ? __pfx__kstrtoull+0x10/0x10 [ 2769.589934] ? __pfx_copy_process+0x10/0x10 [ 2769.589959] ? __might_fault+0xe0/0x190 [ 2769.589992] ? _copy_from_user+0x5b/0xd0 [ 2769.590025] kernel_clone+0xea/0x7f0 [ 2769.590048] ? get_pid_task+0xfd/0x250 [ 2769.590075] ? __pfx_kernel_clone+0x10/0x10 [ 2769.590106] ? find_held_lock+0x2b/0x80 [ 2769.590143] ? ksys_write+0x121/0x240 [ 2769.590168] ? lock_is_held_type+0x9e/0x120 [ 2769.590207] __do_sys_clone3+0x1f5/0x280 [ 2769.590231] ? __pfx___do_sys_clone3+0x10/0x10 [ 2769.590271] ? __fget_files+0x20d/0x3b0 [ 2769.590300] ? fput+0x6a/0x100 [ 2769.590330] ? ksys_write+0x1a3/0x240 [ 2769.590353] ? __pfx_ksys_write+0x10/0x10 [ 2769.590380] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2769.590410] do_syscall_64+0xbf/0x360 [ 2769.590434] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2769.590459] RIP: 0033:0x7fb9f533db19 [ 2769.590477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2769.590500] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2769.590523] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2769.590539] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2769.590553] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2769.590567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2769.590581] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2769.590611] [ 2769.628034] FAULT_INJECTION: forcing a failure. [ 2769.628034] name failslab, interval 1, probability 0, space 0, times 0 [ 2769.629944] CPU: 0 UID: 0 PID: 16784 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2769.629986] Tainted: [W]=WARN [ 2769.629995] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2769.630009] Call Trace: [ 2769.630017] [ 2769.630028] dump_stack_lvl+0xfa/0x120 [ 2769.630070] should_fail_ex+0x4d7/0x5e0 [ 2769.630104] ? copy_fs_struct+0x49/0x350 [ 2769.630135] should_failslab+0xc2/0x120 [ 2769.630166] kmem_cache_alloc_noprof+0x72/0x690 [ 2769.630203] ? copy_fs_struct+0x49/0x350 [ 2769.630234] copy_fs_struct+0x49/0x350 [ 2769.630268] copy_process+0x2f66/0x73c0 [ 2769.630294] ? __pfx__kstrtoull+0x10/0x10 [ 2769.630349] ? __pfx_copy_process+0x10/0x10 [ 2769.630378] ? __might_fault+0xe0/0x190 [ 2769.630414] ? _copy_from_user+0x5b/0xd0 [ 2769.630452] kernel_clone+0xea/0x7f0 [ 2769.630478] ? get_pid_task+0xfd/0x250 [ 2769.630506] ? __pfx_kernel_clone+0x10/0x10 [ 2769.630543] ? find_held_lock+0x2b/0x80 [ 2769.630582] ? ksys_write+0x121/0x240 [ 2769.630618] ? lock_is_held_type+0x9e/0x120 [ 2769.630660] __do_sys_clone3+0x1f5/0x280 [ 2769.630688] ? __pfx___do_sys_clone3+0x10/0x10 [ 2769.630735] ? __fget_files+0x20d/0x3b0 [ 2769.630768] ? fput+0x6a/0x100 [ 2769.630801] ? ksys_write+0x1a3/0x240 [ 2769.630829] ? __pfx_ksys_write+0x10/0x10 [ 2769.630860] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2769.630893] do_syscall_64+0xbf/0x360 [ 2769.630919] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2769.630945] RIP: 0033:0x7f232c718b19 [ 2769.630965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2769.630991] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2769.631016] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2769.631034] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2769.631050] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2769.631067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2769.631083] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2769.631117] 05:57:21 executing program 1: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) 05:57:21 executing program 0: rt_sigprocmask(0x1, &(0x7f0000000000)={[0xfccd]}, &(0x7f0000000040), 0x8) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) 05:57:21 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 15) 05:57:21 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xffffffff) rt_sigprocmask(0x0, 0x0, 0x0, 0xffffffffffffff7a) 05:57:21 executing program 5: clone3(&(0x7f00000006c0)={0x4, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:57:21 executing program 2: set_robust_list(0x0, 0x0) 05:57:30 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 19) 05:57:30 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 16) 05:57:30 executing program 5: clone3(&(0x7f00000006c0)={0x5, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:57:30 executing program 2: set_robust_list(0x0, 0x0) 05:57:30 executing program 1: pidfd_send_signal(0xffffffffffffffff, 0x2c, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) 05:57:30 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, &(0x7f00000000c0), 0x8) 05:57:30 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 15) 05:57:30 executing program 4: rt_sigprocmask(0x1, 0x0, 0x0, 0x0) [ 2778.674962] FAULT_INJECTION: forcing a failure. [ 2778.674962] name failslab, interval 1, probability 0, space 0, times 0 [ 2778.677148] CPU: 1 UID: 0 PID: 16807 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2778.677193] Tainted: [W]=WARN [ 2778.677202] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2778.677218] Call Trace: [ 2778.677227] [ 2778.677237] dump_stack_lvl+0xfa/0x120 [ 2778.677286] should_fail_ex+0x4d7/0x5e0 [ 2778.677325] should_failslab+0xc2/0x120 [ 2778.677359] __kvmalloc_node_noprof+0x111/0x760 [ 2778.677387] ? trace_kmalloc+0x1f/0xb0 [ 2778.677419] ? __kmalloc_cache_noprof+0x26f/0x690 [ 2778.677462] ? alloc_fdtable+0x163/0x2d0 [ 2778.677513] ? alloc_fdtable+0x163/0x2d0 [ 2778.677554] alloc_fdtable+0x163/0x2d0 [ 2778.677621] dup_fd+0x6ef/0xa80 [ 2778.677655] copy_process+0x2112/0x73c0 [ 2778.677684] ? __pfx__kstrtoull+0x10/0x10 [ 2778.677741] ? __pfx_copy_process+0x10/0x10 [ 2778.677771] ? __might_fault+0xe0/0x190 [ 2778.677809] ? _copy_from_user+0x5b/0xd0 [ 2778.677849] kernel_clone+0xea/0x7f0 [ 2778.677876] ? get_pid_task+0xfd/0x250 [ 2778.677906] ? __pfx_kernel_clone+0x10/0x10 [ 2778.677944] ? find_held_lock+0x2b/0x80 [ 2778.677986] ? ksys_write+0x121/0x240 [ 2778.678015] ? lock_is_held_type+0x9e/0x120 [ 2778.678060] __do_sys_clone3+0x1f5/0x280 [ 2778.678089] ? __pfx___do_sys_clone3+0x10/0x10 [ 2778.678137] ? __fget_files+0x20d/0x3b0 [ 2778.678172] ? fput+0x6a/0x100 [ 2778.678207] ? ksys_write+0x1a3/0x240 [ 2778.678235] ? __pfx_ksys_write+0x10/0x10 [ 2778.678267] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2778.678302] do_syscall_64+0xbf/0x360 [ 2778.678329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2778.678358] RIP: 0033:0x7f3a168c2b19 [ 2778.678379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2778.678405] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2778.678432] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2778.678451] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2778.678468] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2778.678485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2778.678502] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2778.678538] 05:57:30 executing program 5: clone3(&(0x7f00000006c0)={0x6, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:57:30 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 16) 05:57:30 executing program 4: rt_sigprocmask(0x1, 0x0, 0x0, 0x0) 05:57:30 executing program 0: rt_sigprocmask(0x0, 0x0, &(0x7f00000000c0), 0x0) 05:57:30 executing program 2: set_robust_list(&(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, 0x18) [ 2778.851539] FAULT_INJECTION: forcing a failure. [ 2778.851539] name failslab, interval 1, probability 0, space 0, times 0 [ 2778.852518] CPU: 0 UID: 0 PID: 16826 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2778.852539] Tainted: [W]=WARN [ 2778.852543] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2778.852551] Call Trace: [ 2778.852556] [ 2778.852560] dump_stack_lvl+0xfa/0x120 [ 2778.852586] should_fail_ex+0x4d7/0x5e0 [ 2778.852608] should_failslab+0xc2/0x120 [ 2778.852625] __kvmalloc_node_noprof+0x111/0x760 [ 2778.852638] ? trace_kmalloc+0x1f/0xb0 [ 2778.852653] ? __kmalloc_cache_noprof+0x26f/0x690 [ 2778.852672] ? alloc_fdtable+0x163/0x2d0 [ 2778.852696] ? alloc_fdtable+0x163/0x2d0 [ 2778.852714] alloc_fdtable+0x163/0x2d0 [ 2778.852734] dup_fd+0x6ef/0xa80 [ 2778.852750] copy_process+0x2112/0x73c0 [ 2778.852764] ? __pfx__kstrtoull+0x10/0x10 [ 2778.852790] ? __pfx_copy_process+0x10/0x10 [ 2778.852803] ? __might_fault+0xe0/0x190 [ 2778.852820] ? _copy_from_user+0x5b/0xd0 [ 2778.852838] kernel_clone+0xea/0x7f0 [ 2778.852850] ? get_pid_task+0xfd/0x250 [ 2778.852864] ? __pfx_kernel_clone+0x10/0x10 [ 2778.852881] ? find_held_lock+0x2b/0x80 [ 2778.852901] ? ksys_write+0x121/0x240 [ 2778.852914] ? lock_is_held_type+0x9e/0x120 [ 2778.852935] __do_sys_clone3+0x1f5/0x280 [ 2778.852948] ? __pfx___do_sys_clone3+0x10/0x10 [ 2778.852969] ? __fget_files+0x20d/0x3b0 [ 2778.852984] ? fput+0x6a/0x100 [ 2778.853001] ? ksys_write+0x1a3/0x240 [ 2778.853013] ? __pfx_ksys_write+0x10/0x10 [ 2778.853027] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2778.853044] do_syscall_64+0xbf/0x360 [ 2778.853058] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2778.853073] RIP: 0033:0x7fb9f533db19 [ 2778.853084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2778.853096] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2778.853109] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2778.853117] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2778.853125] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2778.853132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2778.853140] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2778.853156] 05:57:31 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 17) 05:57:31 executing program 1: pidfd_send_signal(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x18, 0x0, 0x9}, 0x0) 05:57:31 executing program 0: rt_sigprocmask(0x0, 0x0, &(0x7f00000000c0), 0x0) 05:57:40 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 17) 05:57:40 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 18) 05:57:40 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) sendmsg$sock(r0, &(0x7f0000001540)={&(0x7f0000000140)=@ll={0x11, 0x6, 0x0, 0x1, 0x40, 0x6, @random="a3286af1819d"}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000001580)="2bc7e003753bd0313c41a86c49bdb813c6f1214dc5f9abf888cf6455ac11c971d35e4714197f99bb30e8123d4a43ce0b9e4bb48dd4950bbb8ef75eb374d27b8f143226c8a98d99577885db8f56d796ade1a89049f0185a50459ab8e61fcb75e348a4cb90ee6359a75108d0ecdba4922a083bb379187fbd7211bfbe8fc25e5d38d2251e4e0cf1382f488c29763276d0bf0e20f24a86be1671bab653069e26433db000f61ce0a83bd6c563e598e5fe84795ffd01eacf261a66e73357ad0df13e0ea1df981c4dbfaac0aeed1be739b07b46492dd42fe4d447959dd865613d065eb8", 0xf9}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000001c0)="b8bdb5147de3e017d9679e15e1ef54c7ea2dd3739556c6308eeaf6fc2905e287cbe1b7fcbffe28397ef079fa512118b8aaa13b9f24578793564d1bc9ac1e197a5bf0b0e3857a5c86d4ef7556f1eea453e98769cfc84fdab86b5ada5a06c0c7ddef1545751ddad9b1f2591eb728b9a9870483b53b9224ca59d4a283981828167ce431513f49e0769aeb07dea632578eee61093dfe53b996ed0f3844865254818148178ae57537430c7823a6083ed2", 0xae}, {&(0x7f00000013c0)="5f01759ccf17b5767e433c832ff0103807f861f0bdfa2200ee6dcfdc9b44d15cef9458e3440f3235a87f72b0d74b4ed97b1a52301d2eeec699d3b07e3d0bd6a1b67e4aa7fb21e92ca02890bacbd9b892f6d63a8273b031b56b73ca8cd63de9187ef887bf399e3b89976b4592fffd6bc53825a07e241e727967a7a747f582a13d66a51ed4d9082fa5c78841c5661b3ae30febdf4139444a6b40ec6ef030f475da63fc7e5b6232e5dbd5dc673936efe550bf63a9e806d2c6d986d4d35e3ee161c989b734374343a5472291b270040291a3", 0xd0}], 0x4, &(0x7f0000001500)=[@txtime={{0x0, 0x1, 0x3d, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x6}}], 0x30}, 0x4004804) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x20, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x8050) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:57:40 executing program 5: clone3(&(0x7f00000006c0)={0x7, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:57:40 executing program 1: pidfd_send_signal(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:57:40 executing program 0: rt_sigprocmask(0x0, 0x0, &(0x7f00000000c0), 0x0) 05:57:40 executing program 2: set_robust_list(&(0x7f0000000100), 0x18) 05:57:40 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 20) [ 2788.552701] FAULT_INJECTION: forcing a failure. [ 2788.552701] name failslab, interval 1, probability 0, space 0, times 0 [ 2788.554931] CPU: 1 UID: 0 PID: 16856 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2788.554980] Tainted: [W]=WARN [ 2788.554990] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2788.555007] Call Trace: [ 2788.555017] [ 2788.555029] dump_stack_lvl+0xfa/0x120 [ 2788.555083] should_fail_ex+0x4d7/0x5e0 [ 2788.555124] ? copy_fs_struct+0x49/0x350 [ 2788.555159] should_failslab+0xc2/0x120 [ 2788.555196] kmem_cache_alloc_noprof+0x72/0x690 [ 2788.555240] ? copy_fs_struct+0x49/0x350 [ 2788.555274] copy_fs_struct+0x49/0x350 [ 2788.555313] copy_process+0x2f66/0x73c0 [ 2788.555344] ? __pfx__kstrtoull+0x10/0x10 [ 2788.555409] ? __pfx_copy_process+0x10/0x10 [ 2788.555444] ? __might_fault+0xe0/0x190 [ 2788.555485] ? _copy_from_user+0x5b/0xd0 [ 2788.555529] kernel_clone+0xea/0x7f0 [ 2788.555559] ? get_pid_task+0xfd/0x250 [ 2788.555592] ? __pfx_kernel_clone+0x10/0x10 [ 2788.555642] ? find_held_lock+0x2b/0x80 [ 2788.555688] ? ksys_write+0x121/0x240 [ 2788.555721] ? lock_is_held_type+0x9e/0x120 [ 2788.555770] __do_sys_clone3+0x1f5/0x280 [ 2788.555803] ? __pfx___do_sys_clone3+0x10/0x10 [ 2788.555855] ? __fget_files+0x20d/0x3b0 [ 2788.555894] ? fput+0x6a/0x100 [ 2788.555932] ? ksys_write+0x1a3/0x240 [ 2788.555963] ? __pfx_ksys_write+0x10/0x10 [ 2788.555999] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2788.556038] do_syscall_64+0xbf/0x360 [ 2788.556074] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2788.556105] RIP: 0033:0x7f3a168c2b19 [ 2788.556128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2788.556158] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2788.556187] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2788.556207] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2788.556226] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2788.556245] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2788.556263] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2788.556302] [ 2788.595351] FAULT_INJECTION: forcing a failure. [ 2788.595351] name failslab, interval 1, probability 0, space 0, times 0 [ 2788.597180] CPU: 1 UID: 0 PID: 16859 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2788.597219] Tainted: [W]=WARN [ 2788.597227] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2788.597240] Call Trace: [ 2788.597247] [ 2788.597255] dump_stack_lvl+0xfa/0x120 [ 2788.597294] should_fail_ex+0x4d7/0x5e0 [ 2788.597325] ? copy_process+0x227f/0x73c0 [ 2788.597348] should_failslab+0xc2/0x120 [ 2788.597377] kmem_cache_alloc_noprof+0x72/0x690 [ 2788.597403] ? do_raw_spin_unlock+0x53/0x220 [ 2788.597446] ? copy_process+0x227f/0x73c0 [ 2788.597469] copy_process+0x227f/0x73c0 [ 2788.597492] ? __pfx__kstrtoull+0x10/0x10 [ 2788.597543] ? __pfx_copy_process+0x10/0x10 [ 2788.597569] ? __might_fault+0xe0/0x190 [ 2788.597609] ? _copy_from_user+0x5b/0xd0 [ 2788.597644] kernel_clone+0xea/0x7f0 [ 2788.597669] ? get_pid_task+0xfd/0x250 [ 2788.597704] ? __pfx_kernel_clone+0x10/0x10 [ 2788.597738] ? find_held_lock+0x2b/0x80 [ 2788.597774] ? ksys_write+0x121/0x240 [ 2788.597799] ? lock_is_held_type+0x9e/0x120 [ 2788.597837] __do_sys_clone3+0x1f5/0x280 [ 2788.597863] ? __pfx___do_sys_clone3+0x10/0x10 [ 2788.597905] ? __fget_files+0x20d/0x3b0 [ 2788.597936] ? fput+0x6a/0x100 [ 2788.597966] ? ksys_write+0x1a3/0x240 [ 2788.597991] ? __pfx_ksys_write+0x10/0x10 [ 2788.598020] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2788.598049] do_syscall_64+0xbf/0x360 [ 2788.598073] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2788.598097] RIP: 0033:0x7f232c718b19 [ 2788.598115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2788.598139] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2788.598162] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2788.598178] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2788.598193] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2788.598208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2788.598223] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2788.598254] 05:57:40 executing program 5: clone3(&(0x7f00000006c0)={0x8, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:57:40 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x8) 05:57:40 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 18) 05:57:40 executing program 5: clone3(&(0x7f00000006c0)={0x9, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:57:40 executing program 4: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x20000000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), r0) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000980)={0x1bc, r3, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_HEADER={0x4}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_EEE_MODES_OURS={0x164, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff7fff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0xcd, 0x4, "a5541670953250b9222a4b5bcae925d84b932170d47dc08901fc062b4943500de45548cb8f6aace81a3c6c11688cf611d4b0f267fc332d57800c6fb796e1b3491f083b0ecc0a7682294f980cec04a08af8be32789bbf1b85fcd842b4fefdc631f9da6626da9d635e2b6efb591b609274b9652c8e1a6e325ae23e2afd701f826c4a48652817b536d665c6509a9374d91a66a0125f8a92f406abc773cb4b5a31927a7156642f5a7add6657c32e323df9899fc5772a5a8a3c92cb228473b81b14069e00e49368e7ea9db9"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x54, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '},&-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x830fb85ad065bcd6}, 0x4000880) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x4, 0x3, 0x0, 0x9, 0x10, @loopback, @dev={0xfe, 0x80, '\x00', 0x43}, 0x8, 0x7800, 0x7f80000, 0x2}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="5c020000", @ANYRES16=0x0, @ANYBLOB="000829bd7000fddbdf25130000004800018014000200776731000000000000000000000000001400020077673200000000000000000000000000080003000100000014000200677265746170300000000000000000009400018008000100", @ANYRES32=0x0, @ANYBLOB="140002007465616d5f736c6176655f310000000014000200766c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f31000014000200677265746170300000000000000000001400020076657468315f6d616376746170000000140002006970366772657461703000000000000008000100", @ANYRES32=r1, @ANYBLOB="340001801400020069705f767469300000000000000000001400020067656e657665300000000000000000000800030000000000180001801400020076657468315f766c616e0000000000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="540001800800030002000000140002006d6163766c616e31000000000000000008000300000000000800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="14e801086272696467655f736c76655f3000003800018008000300030000000800010000080394cd54b0687109593af4380bcbb79c233b0b871a5e786e568a52c9584cc66148b3bff4eb875d60f836210ee8dc527869862ee617b9da451675dbecf802bdd29a166b907474a9e8f351b8ac667ad89914f36f0a8631a2a21884e8bf560b0154a375ca348e210685bf20936dafd35f1d2d340eaf171400ec7c71", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002007767320000000000000000000000000008000300010000002c000180080003000300000008000100", @ANYRES32=r4, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="4800018008000300010000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e64000000140002006d6163766c616e310000000000000000"], 0x25c}, 0x1, 0x0, 0x0, 0x40004}, 0x4000041) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@nl, &(0x7f0000000180)=0x80) r5 = socket(0x22, 0x80000, 0x5) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) sendmsg$NL80211_CMD_SET_WIPHY(r5, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r6, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x4}, @NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x3}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0xc, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x9}]}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0x14, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMAX={0x6, 0x4, 0x4}, @NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x7}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4800) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) [ 2788.776797] FAULT_INJECTION: forcing a failure. [ 2788.776797] name failslab, interval 1, probability 0, space 0, times 0 [ 2788.777778] CPU: 0 UID: 0 PID: 16871 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2788.777800] Tainted: [W]=WARN [ 2788.777804] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2788.777812] Call Trace: [ 2788.777817] [ 2788.777823] dump_stack_lvl+0xfa/0x120 [ 2788.777852] should_fail_ex+0x4d7/0x5e0 [ 2788.777871] ? copy_fs_struct+0x49/0x350 [ 2788.777887] should_failslab+0xc2/0x120 [ 2788.777905] kmem_cache_alloc_noprof+0x72/0x690 [ 2788.777924] ? copy_fs_struct+0x49/0x350 [ 2788.777938] copy_fs_struct+0x49/0x350 [ 2788.777954] copy_process+0x2f66/0x73c0 [ 2788.777968] ? __pfx__kstrtoull+0x10/0x10 [ 2788.777995] ? __pfx_copy_process+0x10/0x10 [ 2788.778009] ? __might_fault+0xe0/0x190 [ 2788.778027] ? _copy_from_user+0x5b/0xd0 [ 2788.778046] kernel_clone+0xea/0x7f0 [ 2788.778058] ? get_pid_task+0xfd/0x250 [ 2788.778072] ? __pfx_kernel_clone+0x10/0x10 [ 2788.778089] ? find_held_lock+0x2b/0x80 [ 2788.778109] ? ksys_write+0x121/0x240 [ 2788.778123] ? lock_is_held_type+0x9e/0x120 [ 2788.778144] __do_sys_clone3+0x1f5/0x280 [ 2788.778158] ? __pfx___do_sys_clone3+0x10/0x10 [ 2788.778179] ? __fget_files+0x20d/0x3b0 [ 2788.778195] ? fput+0x6a/0x100 [ 2788.778212] ? ksys_write+0x1a3/0x240 [ 2788.778225] ? __pfx_ksys_write+0x10/0x10 [ 2788.778243] do_syscall_64+0xbf/0x360 [ 2788.778255] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2788.778269] RIP: 0033:0x7fb9f533db19 [ 2788.778279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2788.778292] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2788.778305] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2788.778314] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2788.778322] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2788.778330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2788.778337] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2788.778354] 05:57:50 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 21) 05:57:50 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 19) 05:57:50 executing program 5: clone3(&(0x7f00000006c0)={0xd, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:57:50 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 19) 05:57:50 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd004220}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x6, 0x87, 0xb4, 0x5b, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x700, 0x80, 0x2, 0x5}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x20, 0x700, 0x8001, 0x6, {{0x15, 0x4, 0x1, 0x1b, 0x54, 0x65, 0x0, 0x1, 0x29, 0x0, @empty, @empty, {[@ra={0x94, 0x4}, @ra={0x94, 0x4}, @cipso={0x86, 0xb, 0x2, [{0x6, 0x3, ':'}, {0x5, 0x2}]}, @ssrr={0x89, 0x17, 0xae, [@loopback, @private=0xa010100, @loopback, @loopback, @rand_addr=0x64010102]}, @timestamp={0x44, 0x14, 0xa, 0x0, 0x8, [0x80000000, 0x100, 0xd92, 0xd1b]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x7800, 0x8000, 0x9, 0x4, {{0x16, 0x4, 0x0, 0x3, 0x58, 0x66, 0x0, 0x2a, 0x29, 0x0, @loopback, @broadcast, {[@rr={0x7, 0x13, 0xdb, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3a}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @timestamp_addr={0x44, 0x1c, 0x2a, 0x1, 0x8, [{@multicast1, 0x401}, {@local, 0x40}, {@local, 0xef5}]}, @timestamp={0x44, 0x4, 0x7b, 0x0, 0x8}, @rr={0x7, 0xf, 0x98, [@rand_addr=0x64010100, @broadcast, @rand_addr=0x64010102]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f0000000440)={'ip_vti0\x00', 0x0, 0x1, 0x1, 0xd7a7, 0x1, {{0xa, 0x4, 0x2, 0xa, 0x28, 0x67, 0x0, 0xf0, 0x4, 0x0, @remote, @empty, {[@timestamp={0x44, 0x10, 0x91, 0x0, 0x3, [0x101, 0x3, 0x6]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000640)={'syztnl1\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x29, 0x0, 0xff, 0x4, 0x1, @dev={0xfe, 0x80, '\x00', 0x16}, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x7800, 0x7, 0x1, 0x3}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'syztnl0\x00', &(0x7f0000000680)={'syztnl0\x00', 0x0, 0x20, 0x1, 0xfffffe01, 0xfffffffd, {{0x6, 0x4, 0x2, 0x26, 0x18, 0x65, 0x0, 0x6f, 0x29, 0x0, @multicast2, @loopback, {[@ra={0x94, 0x4}]}}}}}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000cc0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000700)={0x57c, 0x0, 0x4, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r1}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffff1b9}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xce02}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x31}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xf5}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0x1a8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x400}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x178, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x58}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x57c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 05:57:50 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x8) 05:57:50 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x20000000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), r0) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000980)={0x1bc, r3, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_HEADER={0x4}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_EEE_MODES_OURS={0x164, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff7fff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0xcd, 0x4, "a5541670953250b9222a4b5bcae925d84b932170d47dc08901fc062b4943500de45548cb8f6aace81a3c6c11688cf611d4b0f267fc332d57800c6fb796e1b3491f083b0ecc0a7682294f980cec04a08af8be32789bbf1b85fcd842b4fefdc631f9da6626da9d635e2b6efb591b609274b9652c8e1a6e325ae23e2afd701f826c4a48652817b536d665c6509a9374d91a66a0125f8a92f406abc773cb4b5a31927a7156642f5a7add6657c32e323df9899fc5772a5a8a3c92cb228473b81b14069e00e49368e7ea9db9"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x54, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '},&-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x830fb85ad065bcd6}, 0x4000880) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x4, 0x3, 0x0, 0x9, 0x10, @loopback, @dev={0xfe, 0x80, '\x00', 0x43}, 0x8, 0x7800, 0x7f80000, 0x2}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="5c020000", @ANYRES16=0x0, @ANYBLOB="000829bd7000fddbdf25130000004800018014000200776731000000000000000000000000001400020077673200000000000000000000000000080003000100000014000200677265746170300000000000000000009400018008000100", @ANYRES32=0x0, @ANYBLOB="140002007465616d5f736c6176655f310000000014000200766c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f31000014000200677265746170300000000000000000001400020076657468315f6d616376746170000000140002006970366772657461703000000000000008000100", @ANYRES32=r1, @ANYBLOB="340001801400020069705f767469300000000000000000001400020067656e657665300000000000000000000800030000000000180001801400020076657468315f766c616e0000000000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="540001800800030002000000140002006d6163766c616e31000000000000000008000300000000000800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="14e801086272696467655f736c76655f3000003800018008000300030000000800010000080394cd54b0687109593af4380bcbb79c233b0b871a5e786e568a52c9584cc66148b3bff4eb875d60f836210ee8dc527869862ee617b9da451675dbecf802bdd29a166b907474a9e8f351b8ac667ad89914f36f0a8631a2a21884e8bf560b0154a375ca348e210685bf20936dafd35f1d2d340eaf171400ec7c71", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002007767320000000000000000000000000008000300010000002c000180080003000300000008000100", @ANYRES32=r4, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="4800018008000300010000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e64000000140002006d6163766c616e310000000000000000"], 0x25c}, 0x1, 0x0, 0x0, 0x40004}, 0x4000041) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@nl, &(0x7f0000000180)=0x80) r5 = socket(0x22, 0x80000, 0x5) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) sendmsg$NL80211_CMD_SET_WIPHY(r5, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r6, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x4}, @NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x3}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0xc, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x9}]}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0x14, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMAX={0x6, 0x4, 0x4}, @NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x7}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4800) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:57:50 executing program 1: set_robust_list(0x0, 0x0) 05:57:50 executing program 1: set_robust_list(0x0, 0x0) 05:57:50 executing program 5: clone3(&(0x7f00000006c0)={0x11, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:57:50 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x820}, 0x44) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x100, 0x1004, 0x25dfdbfb, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000890) 05:57:50 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f00000000c0), 0x8) 05:57:50 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 22) 05:57:50 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 20) 05:57:50 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x20000000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), r0) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000980)={0x1bc, r3, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_HEADER={0x4}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_EEE_MODES_OURS={0x164, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff7fff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0xcd, 0x4, "a5541670953250b9222a4b5bcae925d84b932170d47dc08901fc062b4943500de45548cb8f6aace81a3c6c11688cf611d4b0f267fc332d57800c6fb796e1b3491f083b0ecc0a7682294f980cec04a08af8be32789bbf1b85fcd842b4fefdc631f9da6626da9d635e2b6efb591b609274b9652c8e1a6e325ae23e2afd701f826c4a48652817b536d665c6509a9374d91a66a0125f8a92f406abc773cb4b5a31927a7156642f5a7add6657c32e323df9899fc5772a5a8a3c92cb228473b81b14069e00e49368e7ea9db9"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x54, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '},&-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x830fb85ad065bcd6}, 0x4000880) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x4, 0x3, 0x0, 0x9, 0x10, @loopback, @dev={0xfe, 0x80, '\x00', 0x43}, 0x8, 0x7800, 0x7f80000, 0x2}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="5c020000", @ANYRES16=0x0, @ANYBLOB="000829bd7000fddbdf25130000004800018014000200776731000000000000000000000000001400020077673200000000000000000000000000080003000100000014000200677265746170300000000000000000009400018008000100", @ANYRES32=0x0, @ANYBLOB="140002007465616d5f736c6176655f310000000014000200766c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f31000014000200677265746170300000000000000000001400020076657468315f6d616376746170000000140002006970366772657461703000000000000008000100", @ANYRES32=r1, @ANYBLOB="340001801400020069705f767469300000000000000000001400020067656e657665300000000000000000000800030000000000180001801400020076657468315f766c616e0000000000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="540001800800030002000000140002006d6163766c616e31000000000000000008000300000000000800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="14e801086272696467655f736c76655f3000003800018008000300030000000800010000080394cd54b0687109593af4380bcbb79c233b0b871a5e786e568a52c9584cc66148b3bff4eb875d60f836210ee8dc527869862ee617b9da451675dbecf802bdd29a166b907474a9e8f351b8ac667ad89914f36f0a8631a2a21884e8bf560b0154a375ca348e210685bf20936dafd35f1d2d340eaf171400ec7c71", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002007767320000000000000000000000000008000300010000002c000180080003000300000008000100", @ANYRES32=r4, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="4800018008000300010000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e64000000140002006d6163766c616e310000000000000000"], 0x25c}, 0x1, 0x0, 0x0, 0x40004}, 0x4000041) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@nl, &(0x7f0000000180)=0x80) r5 = socket(0x22, 0x80000, 0x5) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) sendmsg$NL80211_CMD_SET_WIPHY(r5, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r6, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x4}, @NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x3}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0xc, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x9}]}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0x14, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMAX={0x6, 0x4, 0x4}, @NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x7}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4800) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:57:50 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 20) 05:57:50 executing program 1: set_robust_list(0x0, 0x0) [ 2798.804042] FAULT_INJECTION: forcing a failure. [ 2798.804042] name failslab, interval 1, probability 0, space 0, times 0 [ 2798.805753] CPU: 1 UID: 0 PID: 16910 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2798.805803] Tainted: [W]=WARN [ 2798.805811] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2798.805824] Call Trace: [ 2798.805832] [ 2798.805841] dump_stack_lvl+0xfa/0x120 [ 2798.805884] should_fail_ex+0x4d7/0x5e0 [ 2798.805915] ? copy_process+0x3e5d/0x73c0 [ 2798.805939] should_failslab+0xc2/0x120 [ 2798.805967] kmem_cache_alloc_noprof+0x72/0x690 [ 2798.805991] ? copy_process+0x23b0/0x73c0 [ 2798.806021] ? copy_process+0x3e5d/0x73c0 [ 2798.806043] copy_process+0x3e5d/0x73c0 [ 2798.806064] ? __pfx__kstrtoull+0x10/0x10 [ 2798.806119] ? __pfx_copy_process+0x10/0x10 [ 2798.806143] ? __might_fault+0xe0/0x190 [ 2798.806175] ? _copy_from_user+0x5b/0xd0 [ 2798.806208] kernel_clone+0xea/0x7f0 [ 2798.806231] ? get_pid_task+0xfd/0x250 [ 2798.806256] ? __pfx_kernel_clone+0x10/0x10 [ 2798.806287] ? find_held_lock+0x2b/0x80 [ 2798.806323] ? ksys_write+0x121/0x240 [ 2798.806347] ? lock_is_held_type+0x9e/0x120 [ 2798.806385] __do_sys_clone3+0x1f5/0x280 [ 2798.806409] ? __pfx___do_sys_clone3+0x10/0x10 [ 2798.806448] ? __fget_files+0x20d/0x3b0 [ 2798.806477] ? fput+0x6a/0x100 [ 2798.806507] ? ksys_write+0x1a3/0x240 [ 2798.806530] ? __pfx_ksys_write+0x10/0x10 [ 2798.806556] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2798.806585] do_syscall_64+0xbf/0x360 [ 2798.806615] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2798.806639] RIP: 0033:0x7f232c718b19 [ 2798.806657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2798.806679] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2798.806702] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2798.806718] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2798.806732] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2798.806746] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2798.806760] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2798.806789] [ 2798.832844] FAULT_INJECTION: forcing a failure. [ 2798.832844] name failslab, interval 1, probability 0, space 0, times 0 [ 2798.837234] CPU: 0 UID: 0 PID: 16914 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2798.837264] Tainted: [W]=WARN [ 2798.837270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2798.837281] Call Trace: [ 2798.837287] [ 2798.837294] dump_stack_lvl+0xfa/0x120 [ 2798.837330] should_fail_ex+0x4d7/0x5e0 [ 2798.837356] ? copy_process+0x227f/0x73c0 [ 2798.837376] should_failslab+0xc2/0x120 [ 2798.837399] kmem_cache_alloc_noprof+0x72/0x690 [ 2798.837419] ? do_raw_spin_unlock+0x53/0x220 [ 2798.837450] ? copy_process+0x227f/0x73c0 [ 2798.837467] copy_process+0x227f/0x73c0 [ 2798.837484] ? __pfx__kstrtoull+0x10/0x10 [ 2798.837522] ? __pfx_copy_process+0x10/0x10 [ 2798.837541] ? __might_fault+0xe0/0x190 [ 2798.837566] ? _copy_from_user+0x5b/0xd0 [ 2798.837592] kernel_clone+0xea/0x7f0 [ 2798.837616] ? get_pid_task+0xfd/0x250 [ 2798.837635] ? __pfx_kernel_clone+0x10/0x10 [ 2798.837660] ? find_held_lock+0x2b/0x80 [ 2798.837688] ? ksys_write+0x121/0x240 [ 2798.837708] ? lock_is_held_type+0x9e/0x120 [ 2798.837739] __do_sys_clone3+0x1f5/0x280 [ 2798.837758] ? __pfx___do_sys_clone3+0x10/0x10 [ 2798.837798] ? __fget_files+0x20d/0x3b0 [ 2798.837822] ? fput+0x6a/0x100 [ 2798.837846] ? ksys_write+0x1a3/0x240 05:57:50 executing program 4: rt_sigprocmask(0x2, 0x0, 0x0, 0x0) [ 2798.837864] ? __pfx_ksys_write+0x10/0x10 [ 2798.837890] do_syscall_64+0xbf/0x360 [ 2798.837908] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2798.837926] RIP: 0033:0x7fb9f533db19 [ 2798.837940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2798.837958] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2798.837975] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2798.837987] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2798.837998] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2798.838009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2798.838020] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2798.838043] 05:57:50 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000080)={[0xffff]}, 0x0, 0x8) 05:57:50 executing program 5: clone3(&(0x7f00000006c0)={0xf4, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:57:51 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 05:57:51 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd004220}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x6, 0x87, 0xb4, 0x5b, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x700, 0x80, 0x2, 0x5}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x20, 0x700, 0x8001, 0x6, {{0x15, 0x4, 0x1, 0x1b, 0x54, 0x65, 0x0, 0x1, 0x29, 0x0, @empty, @empty, {[@ra={0x94, 0x4}, @ra={0x94, 0x4}, @cipso={0x86, 0xb, 0x2, [{0x6, 0x3, ':'}, {0x5, 0x2}]}, @ssrr={0x89, 0x17, 0xae, [@loopback, @private=0xa010100, @loopback, @loopback, @rand_addr=0x64010102]}, @timestamp={0x44, 0x14, 0xa, 0x0, 0x8, [0x80000000, 0x100, 0xd92, 0xd1b]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x7800, 0x8000, 0x9, 0x4, {{0x16, 0x4, 0x0, 0x3, 0x58, 0x66, 0x0, 0x2a, 0x29, 0x0, @loopback, @broadcast, {[@rr={0x7, 0x13, 0xdb, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3a}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @timestamp_addr={0x44, 0x1c, 0x2a, 0x1, 0x8, [{@multicast1, 0x401}, {@local, 0x40}, {@local, 0xef5}]}, @timestamp={0x44, 0x4, 0x7b, 0x0, 0x8}, @rr={0x7, 0xf, 0x98, [@rand_addr=0x64010100, @broadcast, @rand_addr=0x64010102]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f0000000440)={'ip_vti0\x00', 0x0, 0x1, 0x1, 0xd7a7, 0x1, {{0xa, 0x4, 0x2, 0xa, 0x28, 0x67, 0x0, 0xf0, 0x4, 0x0, @remote, @empty, {[@timestamp={0x44, 0x10, 0x91, 0x0, 0x3, [0x101, 0x3, 0x6]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000640)={'syztnl1\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x29, 0x0, 0xff, 0x4, 0x1, @dev={0xfe, 0x80, '\x00', 0x16}, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x7800, 0x7, 0x1, 0x3}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'syztnl0\x00', &(0x7f0000000680)={'syztnl0\x00', 0x0, 0x20, 0x1, 0xfffffe01, 0xfffffffd, {{0x6, 0x4, 0x2, 0x26, 0x18, 0x65, 0x0, 0x6f, 0x29, 0x0, @multicast2, @loopback, {[@ra={0x94, 0x4}]}}}}}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000cc0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000700)={0x57c, 0x0, 0x4, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r1}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffff1b9}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xce02}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x31}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xf5}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0x1a8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x400}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x178, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x58}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x57c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 05:57:51 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x20000000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), r0) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000980)={0x1bc, r3, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_HEADER={0x4}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_EEE_MODES_OURS={0x164, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff7fff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0xcd, 0x4, "a5541670953250b9222a4b5bcae925d84b932170d47dc08901fc062b4943500de45548cb8f6aace81a3c6c11688cf611d4b0f267fc332d57800c6fb796e1b3491f083b0ecc0a7682294f980cec04a08af8be32789bbf1b85fcd842b4fefdc631f9da6626da9d635e2b6efb591b609274b9652c8e1a6e325ae23e2afd701f826c4a48652817b536d665c6509a9374d91a66a0125f8a92f406abc773cb4b5a31927a7156642f5a7add6657c32e323df9899fc5772a5a8a3c92cb228473b81b14069e00e49368e7ea9db9"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x54, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '},&-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x830fb85ad065bcd6}, 0x4000880) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x4, 0x3, 0x0, 0x9, 0x10, @loopback, @dev={0xfe, 0x80, '\x00', 0x43}, 0x8, 0x7800, 0x7f80000, 0x2}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="5c020000", @ANYRES16=0x0, @ANYBLOB="000829bd7000fddbdf25130000004800018014000200776731000000000000000000000000001400020077673200000000000000000000000000080003000100000014000200677265746170300000000000000000009400018008000100", @ANYRES32=0x0, @ANYBLOB="140002007465616d5f736c6176655f310000000014000200766c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f31000014000200677265746170300000000000000000001400020076657468315f6d616376746170000000140002006970366772657461703000000000000008000100", @ANYRES32=r1, @ANYBLOB="340001801400020069705f767469300000000000000000001400020067656e657665300000000000000000000800030000000000180001801400020076657468315f766c616e0000000000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="540001800800030002000000140002006d6163766c616e31000000000000000008000300000000000800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="14e801086272696467655f736c76655f3000003800018008000300030000000800010000080394cd54b0687109593af4380bcbb79c233b0b871a5e786e568a52c9584cc66148b3bff4eb875d60f836210ee8dc527869862ee617b9da451675dbecf802bdd29a166b907474a9e8f351b8ac667ad89914f36f0a8631a2a21884e8bf560b0154a375ca348e210685bf20936dafd35f1d2d340eaf171400ec7c71", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002007767320000000000000000000000000008000300010000002c000180080003000300000008000100", @ANYRES32=r4, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="4800018008000300010000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e64000000140002006d6163766c616e310000000000000000"], 0x25c}, 0x1, 0x0, 0x0, 0x40004}, 0x4000041) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@nl, &(0x7f0000000180)=0x80) r5 = socket(0x22, 0x80000, 0x5) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) sendmsg$NL80211_CMD_SET_WIPHY(r5, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r6, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x4}, @NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x3}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0xc, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x9}]}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0x14, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMAX={0x6, 0x4, 0x4}, @NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x7}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4800) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:57:51 executing program 5: clone3(&(0x7f00000006c0)={0x261, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:58:00 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 23) 05:58:00 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 21) 05:58:00 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 21) 05:58:00 executing program 5: clone3(&(0x7f00000006c0)={0x27d, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:58:00 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x20000000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), r0) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000980)={0x1bc, r3, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_HEADER={0x4}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_EEE_MODES_OURS={0x164, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff7fff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0xcd, 0x4, "a5541670953250b9222a4b5bcae925d84b932170d47dc08901fc062b4943500de45548cb8f6aace81a3c6c11688cf611d4b0f267fc332d57800c6fb796e1b3491f083b0ecc0a7682294f980cec04a08af8be32789bbf1b85fcd842b4fefdc631f9da6626da9d635e2b6efb591b609274b9652c8e1a6e325ae23e2afd701f826c4a48652817b536d665c6509a9374d91a66a0125f8a92f406abc773cb4b5a31927a7156642f5a7add6657c32e323df9899fc5772a5a8a3c92cb228473b81b14069e00e49368e7ea9db9"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x54, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '},&-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x830fb85ad065bcd6}, 0x4000880) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x4, 0x3, 0x0, 0x9, 0x10, @loopback, @dev={0xfe, 0x80, '\x00', 0x43}, 0x8, 0x7800, 0x7f80000, 0x2}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="5c020000", @ANYRES16=0x0, @ANYBLOB="000829bd7000fddbdf25130000004800018014000200776731000000000000000000000000001400020077673200000000000000000000000000080003000100000014000200677265746170300000000000000000009400018008000100", @ANYRES32=0x0, @ANYBLOB="140002007465616d5f736c6176655f310000000014000200766c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f31000014000200677265746170300000000000000000001400020076657468315f6d616376746170000000140002006970366772657461703000000000000008000100", @ANYRES32=r1, @ANYBLOB="340001801400020069705f767469300000000000000000001400020067656e657665300000000000000000000800030000000000180001801400020076657468315f766c616e0000000000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="540001800800030002000000140002006d6163766c616e31000000000000000008000300000000000800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="14e801086272696467655f736c76655f3000003800018008000300030000000800010000080394cd54b0687109593af4380bcbb79c233b0b871a5e786e568a52c9584cc66148b3bff4eb875d60f836210ee8dc527869862ee617b9da451675dbecf802bdd29a166b907474a9e8f351b8ac667ad89914f36f0a8631a2a21884e8bf560b0154a375ca348e210685bf20936dafd35f1d2d340eaf171400ec7c71", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002007767320000000000000000000000000008000300010000002c000180080003000300000008000100", @ANYRES32=r4, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="4800018008000300010000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e64000000140002006d6163766c616e310000000000000000"], 0x25c}, 0x1, 0x0, 0x0, 0x40004}, 0x4000041) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@nl, &(0x7f0000000180)=0x80) r5 = socket(0x22, 0x80000, 0x5) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) sendmsg$NL80211_CMD_SET_WIPHY(r5, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x44, r6, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x4}, @NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x3}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0xc, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x9}]}, @NL80211_ATTR_WIPHY_TXQ_PARAMS={0x14, 0x25, 0x0, 0x1, [@NL80211_TXQ_ATTR_CWMAX={0x6, 0x4, 0x4}, @NL80211_TXQ_ATTR_CWMIN={0x6, 0x3, 0x7}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x40000}, 0x4800) 05:58:00 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="71000000086280cede133a19eb41da14b52eb20c9b861b65906c8a976a50b59c2a7f00000086dee8708959329bb66f18e7c24ffa06fe89485cab08f432dd5bace436914a00000000000000004cecb96f344959cd322e4c386bdece11d20e96eb8e55a468ef65190f283a63abbc8761ad44034cadecc1750f96f3f6739fb684dc2b0f10f41302627a4b33984c04692b45d2975f362ab030bb6849eb5d1beadda33b601381", @ANYRES32, @ANYRES16], 0x68}, 0x1, 0x0, 0x0, 0x24040001}, 0x840) rt_sigprocmask(0x3, &(0x7f0000000040)={[0xb79]}, &(0x7f0000000240), 0x8) 05:58:00 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd004220}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x6, 0x87, 0xb4, 0x5b, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x700, 0x80, 0x2, 0x5}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x20, 0x700, 0x8001, 0x6, {{0x15, 0x4, 0x1, 0x1b, 0x54, 0x65, 0x0, 0x1, 0x29, 0x0, @empty, @empty, {[@ra={0x94, 0x4}, @ra={0x94, 0x4}, @cipso={0x86, 0xb, 0x2, [{0x6, 0x3, ':'}, {0x5, 0x2}]}, @ssrr={0x89, 0x17, 0xae, [@loopback, @private=0xa010100, @loopback, @loopback, @rand_addr=0x64010102]}, @timestamp={0x44, 0x14, 0xa, 0x0, 0x8, [0x80000000, 0x100, 0xd92, 0xd1b]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x7800, 0x8000, 0x9, 0x4, {{0x16, 0x4, 0x0, 0x3, 0x58, 0x66, 0x0, 0x2a, 0x29, 0x0, @loopback, @broadcast, {[@rr={0x7, 0x13, 0xdb, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3a}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @timestamp_addr={0x44, 0x1c, 0x2a, 0x1, 0x8, [{@multicast1, 0x401}, {@local, 0x40}, {@local, 0xef5}]}, @timestamp={0x44, 0x4, 0x7b, 0x0, 0x8}, @rr={0x7, 0xf, 0x98, [@rand_addr=0x64010100, @broadcast, @rand_addr=0x64010102]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f0000000440)={'ip_vti0\x00', 0x0, 0x1, 0x1, 0xd7a7, 0x1, {{0xa, 0x4, 0x2, 0xa, 0x28, 0x67, 0x0, 0xf0, 0x4, 0x0, @remote, @empty, {[@timestamp={0x44, 0x10, 0x91, 0x0, 0x3, [0x101, 0x3, 0x6]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000640)={'syztnl1\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x29, 0x0, 0xff, 0x4, 0x1, @dev={0xfe, 0x80, '\x00', 0x16}, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x7800, 0x7, 0x1, 0x3}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'syztnl0\x00', &(0x7f0000000680)={'syztnl0\x00', 0x0, 0x20, 0x1, 0xfffffe01, 0xfffffffd, {{0x6, 0x4, 0x2, 0x26, 0x18, 0x65, 0x0, 0x6f, 0x29, 0x0, @multicast2, @loopback, {[@ra={0x94, 0x4}]}}}}}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000cc0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000700)={0x57c, 0x0, 0x4, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r1}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffff1b9}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xce02}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x31}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xf5}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0x1a8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x400}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x178, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x58}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x57c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 05:58:00 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) getsockname(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000200)=0x80) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc5}, 0xc80c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB='P\x00\x003', @ANYRES16=0x0, @ANYBLOB="000326bd7000ffdbdf2501000000060001004e20000005000200020000001400090020010000000000000000000000000001050002000a00000008000800ac1414bb06000a004e240000"], 0x50}, 0x1, 0x0, 0x0, 0x810}, 0x8062815) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), r0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="f17828bd5000fddbdf250300000008000300000000000800030005000000432c0bba62d1ed8cb55143563a80ca1d5555937ee6c1b47a94aef61d7fe8e48055044cabcdda0016242142edf10ebc0389cc033b82df9fe5f748f9ad94a2571c6b4351cd971de34bcd64f02c5fdbfe9629e439f6c146f30d2af9b82909112ba0725bb4d2f18caa91f259a2d80145780ee88816708af29fc22309a4c9a5334af645df34b442478df0dae364b3be9b286d6160a1cbd2de1804d00b5a85921b823992dc4a2b21cd5c63465af023238c1fb77d699c432c54b48782130f240f"], 0x24}, 0x1, 0x0, 0x0, 0x4040001}, 0x20008094) 05:58:00 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd004220}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x6, 0x87, 0xb4, 0x5b, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x700, 0x80, 0x2, 0x5}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x20, 0x700, 0x8001, 0x6, {{0x15, 0x4, 0x1, 0x1b, 0x54, 0x65, 0x0, 0x1, 0x29, 0x0, @empty, @empty, {[@ra={0x94, 0x4}, @ra={0x94, 0x4}, @cipso={0x86, 0xb, 0x2, [{0x6, 0x3, ':'}, {0x5, 0x2}]}, @ssrr={0x89, 0x17, 0xae, [@loopback, @private=0xa010100, @loopback, @loopback, @rand_addr=0x64010102]}, @timestamp={0x44, 0x14, 0xa, 0x0, 0x8, [0x80000000, 0x100, 0xd92, 0xd1b]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x7800, 0x8000, 0x9, 0x4, {{0x16, 0x4, 0x0, 0x3, 0x58, 0x66, 0x0, 0x2a, 0x29, 0x0, @loopback, @broadcast, {[@rr={0x7, 0x13, 0xdb, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3a}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @timestamp_addr={0x44, 0x1c, 0x2a, 0x1, 0x8, [{@multicast1, 0x401}, {@local, 0x40}, {@local, 0xef5}]}, @timestamp={0x44, 0x4, 0x7b, 0x0, 0x8}, @rr={0x7, 0xf, 0x98, [@rand_addr=0x64010100, @broadcast, @rand_addr=0x64010102]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f0000000440)={'ip_vti0\x00', 0x0, 0x1, 0x1, 0xd7a7, 0x1, {{0xa, 0x4, 0x2, 0xa, 0x28, 0x67, 0x0, 0xf0, 0x4, 0x0, @remote, @empty, {[@timestamp={0x44, 0x10, 0x91, 0x0, 0x3, [0x101, 0x3, 0x6]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000640)={'syztnl1\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x29, 0x0, 0xff, 0x4, 0x1, @dev={0xfe, 0x80, '\x00', 0x16}, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x7800, 0x7, 0x1, 0x3}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'syztnl0\x00', &(0x7f0000000680)={'syztnl0\x00', 0x0, 0x20, 0x1, 0xfffffe01, 0xfffffffd, {{0x6, 0x4, 0x2, 0x26, 0x18, 0x65, 0x0, 0x6f, 0x29, 0x0, @multicast2, @loopback, {[@ra={0x94, 0x4}]}}}}}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000cc0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000700)={0x57c, 0x0, 0x4, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r1}, {0x174, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xfffff1b9}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xce02}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x31}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xf5}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0x1a8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x400}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}]}}, {{0x8}, {0x178, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x58}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r7}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xffff}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x57c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 05:58:00 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) getegid() 05:58:00 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x20000000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), r0) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000980)={0x1bc, r3, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_HEADER={0x4}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_EEE_MODES_OURS={0x164, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff7fff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0xcd, 0x4, "a5541670953250b9222a4b5bcae925d84b932170d47dc08901fc062b4943500de45548cb8f6aace81a3c6c11688cf611d4b0f267fc332d57800c6fb796e1b3491f083b0ecc0a7682294f980cec04a08af8be32789bbf1b85fcd842b4fefdc631f9da6626da9d635e2b6efb591b609274b9652c8e1a6e325ae23e2afd701f826c4a48652817b536d665c6509a9374d91a66a0125f8a92f406abc773cb4b5a31927a7156642f5a7add6657c32e323df9899fc5772a5a8a3c92cb228473b81b14069e00e49368e7ea9db9"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x54, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '},&-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x830fb85ad065bcd6}, 0x4000880) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x4, 0x3, 0x0, 0x9, 0x10, @loopback, @dev={0xfe, 0x80, '\x00', 0x43}, 0x8, 0x7800, 0x7f80000, 0x2}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="5c020000", @ANYRES16=0x0, @ANYBLOB="000829bd7000fddbdf25130000004800018014000200776731000000000000000000000000001400020077673200000000000000000000000000080003000100000014000200677265746170300000000000000000009400018008000100", @ANYRES32=0x0, @ANYBLOB="140002007465616d5f736c6176655f310000000014000200766c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f31000014000200677265746170300000000000000000001400020076657468315f6d616376746170000000140002006970366772657461703000000000000008000100", @ANYRES32=r1, @ANYBLOB="340001801400020069705f767469300000000000000000001400020067656e657665300000000000000000000800030000000000180001801400020076657468315f766c616e0000000000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="540001800800030002000000140002006d6163766c616e31000000000000000008000300000000000800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="14e801086272696467655f736c76655f3000003800018008000300030000000800010000080394cd54b0687109593af4380bcbb79c233b0b871a5e786e568a52c9584cc66148b3bff4eb875d60f836210ee8dc527869862ee617b9da451675dbecf802bdd29a166b907474a9e8f351b8ac667ad89914f36f0a8631a2a21884e8bf560b0154a375ca348e210685bf20936dafd35f1d2d340eaf171400ec7c71", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002007767320000000000000000000000000008000300010000002c000180080003000300000008000100", @ANYRES32=r4, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="4800018008000300010000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e64000000140002006d6163766c616e310000000000000000"], 0x25c}, 0x1, 0x0, 0x0, 0x40004}, 0x4000041) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@nl, &(0x7f0000000180)=0x80) socket(0x22, 0x80000, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r0) 05:58:00 executing program 5: clone3(&(0x7f00000006c0)={0x2dc, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:58:00 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) getsockname(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000200)=0x80) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc5}, 0xc80c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB='P\x00\x003', @ANYRES16=0x0, @ANYBLOB="000326bd7000ffdbdf2501000000060001004e20000005000200020000001400090020010000000000000000000000000001050002000a00000008000800ac1414bb06000a004e240000"], 0x50}, 0x1, 0x0, 0x0, 0x810}, 0x8062815) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), r0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="f17828bd5000fddbdf250300000008000300000000000800030005000000432c0bba62d1ed8cb55143563a80ca1d5555937ee6c1b47a94aef61d7fe8e48055044cabcdda0016242142edf10ebc0389cc033b82df9fe5f748f9ad94a2571c6b4351cd971de34bcd64f02c5fdbfe9629e439f6c146f30d2af9b82909112ba0725bb4d2f18caa91f259a2d80145780ee88816708af29fc22309a4c9a5334af645df34b442478df0dae364b3be9b286d6160a1cbd2de1804d00b5a85921b823992dc4a2b21cd5c63465af023238c1fb77d699c432c54b48782130f240f"], 0x24}, 0x1, 0x0, 0x0, 0x4040001}, 0x20008094) 05:58:00 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd004220}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x6, 0x87, 0xb4, 0x5b, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x700, 0x80, 0x2, 0x5}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x20, 0x700, 0x8001, 0x6, {{0x15, 0x4, 0x1, 0x1b, 0x54, 0x65, 0x0, 0x1, 0x29, 0x0, @empty, @empty, {[@ra={0x94, 0x4}, @ra={0x94, 0x4}, @cipso={0x86, 0xb, 0x2, [{0x6, 0x3, ':'}, {0x5, 0x2}]}, @ssrr={0x89, 0x17, 0xae, [@loopback, @private=0xa010100, @loopback, @loopback, @rand_addr=0x64010102]}, @timestamp={0x44, 0x14, 0xa, 0x0, 0x8, [0x80000000, 0x100, 0xd92, 0xd1b]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x7800, 0x8000, 0x9, 0x4, {{0x16, 0x4, 0x0, 0x3, 0x58, 0x66, 0x0, 0x2a, 0x29, 0x0, @loopback, @broadcast, {[@rr={0x7, 0x13, 0xdb, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3a}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @timestamp_addr={0x44, 0x1c, 0x2a, 0x1, 0x8, [{@multicast1, 0x401}, {@local, 0x40}, {@local, 0xef5}]}, @timestamp={0x44, 0x4, 0x7b, 0x0, 0x8}, @rr={0x7, 0xf, 0x98, [@rand_addr=0x64010100, @broadcast, @rand_addr=0x64010102]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f0000000440)={'ip_vti0\x00', 0x0, 0x1, 0x1, 0xd7a7, 0x1, {{0xa, 0x4, 0x2, 0xa, 0x28, 0x67, 0x0, 0xf0, 0x4, 0x0, @remote, @empty, {[@timestamp={0x44, 0x10, 0x91, 0x0, 0x3, [0x101, 0x3, 0x6]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000640)={'syztnl1\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x29, 0x0, 0xff, 0x4, 0x1, @dev={0xfe, 0x80, '\x00', 0x16}, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x7800, 0x7, 0x1, 0x3}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000006c0)={'syztnl0\x00', &(0x7f0000000680)={'syztnl0\x00', 0x0, 0x20, 0x1, 0xfffffe01, 0xfffffffd, {{0x6, 0x4, 0x2, 0x26, 0x18, 0x65, 0x0, 0x6f, 0x29, 0x0, @multicast2, @loopback, {[@ra={0x94, 0x4}]}}}}}) 05:58:00 executing program 4: getuid() rt_sigprocmask(0x2, 0x0, 0x0, 0x0) fork() 05:58:00 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 24) [ 2808.549990] FAULT_INJECTION: forcing a failure. [ 2808.549990] name failslab, interval 1, probability 0, space 0, times 0 [ 2808.551364] CPU: 0 UID: 0 PID: 16977 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2808.551386] Tainted: [W]=WARN [ 2808.551390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2808.551398] Call Trace: [ 2808.551403] [ 2808.551407] dump_stack_lvl+0xfa/0x120 [ 2808.551437] should_fail_ex+0x4d7/0x5e0 [ 2808.551456] ? copy_process+0x3a63/0x73c0 [ 2808.551471] should_failslab+0xc2/0x120 [ 2808.551488] kmem_cache_alloc_noprof+0x72/0x690 [ 2808.551502] ? lockdep_init_map_type+0x4b/0x240 [ 2808.551520] ? __raw_spin_lock_init+0x3a/0x110 [ 2808.551539] ? copy_process+0x3a63/0x73c0 [ 2808.551551] copy_process+0x3a63/0x73c0 [ 2808.551563] ? __pfx__kstrtoull+0x10/0x10 [ 2808.551590] ? __pfx_copy_process+0x10/0x10 [ 2808.551608] ? __might_fault+0xe0/0x190 [ 2808.551626] ? _copy_from_user+0x5b/0xd0 [ 2808.551645] kernel_clone+0xea/0x7f0 [ 2808.551658] ? get_pid_task+0xfd/0x250 [ 2808.551672] ? __pfx_kernel_clone+0x10/0x10 [ 2808.551689] ? find_held_lock+0x2b/0x80 [ 2808.551709] ? ksys_write+0x121/0x240 [ 2808.551724] ? lock_is_held_type+0x9e/0x120 [ 2808.551745] __do_sys_clone3+0x1f5/0x280 [ 2808.551759] ? __pfx___do_sys_clone3+0x10/0x10 [ 2808.551780] ? __fget_files+0x20d/0x3b0 [ 2808.551797] ? fput+0x6a/0x100 [ 2808.551813] ? ksys_write+0x1a3/0x240 [ 2808.551826] ? __pfx_ksys_write+0x10/0x10 [ 2808.551841] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2808.551858] do_syscall_64+0xbf/0x360 [ 2808.551871] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2808.551885] RIP: 0033:0x7f232c718b19 [ 2808.551895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2808.551908] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2808.551921] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2808.551930] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2808.551938] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2808.551946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2808.551954] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2808.551970] 05:58:09 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 22) 05:58:09 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 25) 05:58:09 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd004220}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x6, 0x87, 0xb4, 0x5b, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x700, 0x80, 0x2, 0x5}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x20, 0x700, 0x8001, 0x6, {{0x15, 0x4, 0x1, 0x1b, 0x54, 0x65, 0x0, 0x1, 0x29, 0x0, @empty, @empty, {[@ra={0x94, 0x4}, @ra={0x94, 0x4}, @cipso={0x86, 0xb, 0x2, [{0x6, 0x3, ':'}, {0x5, 0x2}]}, @ssrr={0x89, 0x17, 0xae, [@loopback, @private=0xa010100, @loopback, @loopback, @rand_addr=0x64010102]}, @timestamp={0x44, 0x14, 0xa, 0x0, 0x8, [0x80000000, 0x100, 0xd92, 0xd1b]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x7800, 0x8000, 0x9, 0x4, {{0x16, 0x4, 0x0, 0x3, 0x58, 0x66, 0x0, 0x2a, 0x29, 0x0, @loopback, @broadcast, {[@rr={0x7, 0x13, 0xdb, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3a}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @timestamp_addr={0x44, 0x1c, 0x2a, 0x1, 0x8, [{@multicast1, 0x401}, {@local, 0x40}, {@local, 0xef5}]}, @timestamp={0x44, 0x4, 0x7b, 0x0, 0x8}, @rr={0x7, 0xf, 0x98, [@rand_addr=0x64010100, @broadcast, @rand_addr=0x64010102]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f0000000440)={'ip_vti0\x00', 0x0, 0x1, 0x1, 0xd7a7, 0x1, {{0xa, 0x4, 0x2, 0xa, 0x28, 0x67, 0x0, 0xf0, 0x4, 0x0, @remote, @empty, {[@timestamp={0x44, 0x10, 0x91, 0x0, 0x3, [0x101, 0x3, 0x6]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000640)={'syztnl1\x00', &(0x7f00000005c0)={'syztnl1\x00', 0x0, 0x29, 0x0, 0xff, 0x4, 0x1, @dev={0xfe, 0x80, '\x00', 0x16}, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x7800, 0x7, 0x1, 0x3}}) 05:58:09 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) getsockname(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000200)=0x80) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc5}, 0xc80c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB='P\x00\x003', @ANYRES16=0x0, @ANYBLOB="000326bd7000ffdbdf2501000000060001004e20000005000200020000001400090020010000000000000000000000000001050002000a00000008000800ac1414bb06000a004e240000"], 0x50}, 0x1, 0x0, 0x0, 0x810}, 0x8062815) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), r0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="f17828bd5000fddbdf250300000008000300000000000800030005000000432c0bba62d1ed8cb55143563a80ca1d5555937ee6c1b47a94aef61d7fe8e48055044cabcdda0016242142edf10ebc0389cc033b82df9fe5f748f9ad94a2571c6b4351cd971de34bcd64f02c5fdbfe9629e439f6c146f30d2af9b82909112ba0725bb4d2f18caa91f259a2d80145780ee88816708af29fc22309a4c9a5334af645df34b442478df0dae364b3be9b286d6160a1cbd2de1804d00b5a85921b823992dc4a2b21cd5c63465af023238c1fb77d699c432c54b48782130f240f"], 0x24}, 0x1, 0x0, 0x0, 0x4040001}, 0x20008094) 05:58:09 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x20000000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), r0) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000980)={0x1bc, r3, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_HEADER={0x4}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_EEE_MODES_OURS={0x164, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff7fff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0xcd, 0x4, "a5541670953250b9222a4b5bcae925d84b932170d47dc08901fc062b4943500de45548cb8f6aace81a3c6c11688cf611d4b0f267fc332d57800c6fb796e1b3491f083b0ecc0a7682294f980cec04a08af8be32789bbf1b85fcd842b4fefdc631f9da6626da9d635e2b6efb591b609274b9652c8e1a6e325ae23e2afd701f826c4a48652817b536d665c6509a9374d91a66a0125f8a92f406abc773cb4b5a31927a7156642f5a7add6657c32e323df9899fc5772a5a8a3c92cb228473b81b14069e00e49368e7ea9db9"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x54, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '},&-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x830fb85ad065bcd6}, 0x4000880) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x4, 0x3, 0x0, 0x9, 0x10, @loopback, @dev={0xfe, 0x80, '\x00', 0x43}, 0x8, 0x7800, 0x7f80000, 0x2}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="5c020000", @ANYRES16=0x0, @ANYBLOB="000829bd7000fddbdf25130000004800018014000200776731000000000000000000000000001400020077673200000000000000000000000000080003000100000014000200677265746170300000000000000000009400018008000100", @ANYRES32=0x0, @ANYBLOB="140002007465616d5f736c6176655f310000000014000200766c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f31000014000200677265746170300000000000000000001400020076657468315f6d616376746170000000140002006970366772657461703000000000000008000100", @ANYRES32=r1, @ANYBLOB="340001801400020069705f767469300000000000000000001400020067656e657665300000000000000000000800030000000000180001801400020076657468315f766c616e0000000000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="540001800800030002000000140002006d6163766c616e31000000000000000008000300000000000800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="14e801086272696467655f736c76655f3000003800018008000300030000000800010000080394cd54b0687109593af4380bcbb79c233b0b871a5e786e568a52c9584cc66148b3bff4eb875d60f836210ee8dc527869862ee617b9da451675dbecf802bdd29a166b907474a9e8f351b8ac667ad89914f36f0a8631a2a21884e8bf560b0154a375ca348e210685bf20936dafd35f1d2d340eaf171400ec7c71", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002007767320000000000000000000000000008000300010000002c000180080003000300000008000100", @ANYRES32=r4, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="4800018008000300010000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e64000000140002006d6163766c616e310000000000000000"], 0x25c}, 0x1, 0x0, 0x0, 0x40004}, 0x4000041) getsockname(0xffffffffffffffff, &(0x7f0000000100)=@nl, &(0x7f0000000180)=0x80) socket(0x22, 0x80000, 0x5) 05:58:09 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 22) 05:58:09 executing program 4: bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfe, 0x40000000}, 0xc) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r1, 0x0, 0x20000000) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000001180)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001140)={&(0x7f00000010c0)={0x4c, 0x0, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x4}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) inotify_add_watch(r0, 0x0, 0x20000000) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfb, 0x80000000}, 0xc) rt_sigprocmask(0x1, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r3, 0x0, 0x20000000) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r3, &(0x7f0000001040)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0xd64, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0xff, 0x35}}}}, [@NL80211_PMSR_ATTR_PEERS={0x960, 0x5, 0x0, 0x1, [{0x2dc, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x17}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x2}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xffffffff}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x1b0, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x50, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6e}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x8c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x22fb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1000}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x5c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7ff}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xc4, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xa8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x80}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x114, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x8c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xffff}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1a}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x78, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x70, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x401}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1a}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x520, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x190, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x138, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xfb}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xd7}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xb79}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x54, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x20}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x120, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xdc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x401}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x23c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x10c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x40}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x800}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xc8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x18}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x18}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x54, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xa}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x4c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x13}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x101}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x7}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x57}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x10, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}]}, @NL80211_PMSR_ATTR_PEERS={0x4}, @NL80211_PMSR_ATTR_PEERS={0x14, 0x5, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}]}, @NL80211_PMSR_ATTR_PEERS={0x3cc, 0x5, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2e}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x2}, @NL80211_ATTR_CHANNEL_WIDTH={0x8}]}]}, {0x1f4, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x44, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x6}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2e}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x170, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xa0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x60, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7fff}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x34, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x263}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x1c}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x4}]}]}, {0x104, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2bc}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x12}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_REQ={0x7c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x12}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xeb}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xffff}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x4}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xd}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xb}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x6}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x4}, @NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}]}]}, {0x9c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xb}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1680}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16ee}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x15}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x99e}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2a5}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0xf0}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}]}]}]}, 0xd64}, 0x1, 0x0, 0x0, 0x4008000}, 0x4000) inotify_add_watch(r2, 0x0, 0x20000000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)) sendmsg$MPTCP_PM_CMD_GET_ADDR(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x74, 0x0, 0x100, 0x70bd26, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_ADDR={0x40, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @rand_addr=0x64010101}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @empty}]}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x80) 05:58:09 executing program 5: clone3(&(0x7f00000006c0)={0x300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2816.979430] FAULT_INJECTION: forcing a failure. [ 2816.979430] name failslab, interval 1, probability 0, space 0, times 0 [ 2816.980398] CPU: 0 UID: 0 PID: 16985 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2816.980422] Tainted: [W]=WARN [ 2816.980427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2816.980437] Call Trace: [ 2816.980442] [ 2816.980447] dump_stack_lvl+0xfa/0x120 [ 2816.980473] should_fail_ex+0x4d7/0x5e0 [ 2816.980491] ? copy_process+0x3e5d/0x73c0 [ 2816.980505] should_failslab+0xc2/0x120 [ 2816.980524] kmem_cache_alloc_noprof+0x72/0x690 [ 2816.980542] ? copy_process+0x23b0/0x73c0 [ 2816.980558] ? copy_process+0x3e5d/0x73c0 [ 2816.980570] copy_process+0x3e5d/0x73c0 [ 2816.980581] ? __pfx__kstrtoull+0x10/0x10 [ 2816.980613] ? __pfx_copy_process+0x10/0x10 [ 2816.980626] ? __might_fault+0xe0/0x190 [ 2816.980644] ? _copy_from_user+0x5b/0xd0 [ 2816.980662] kernel_clone+0xea/0x7f0 [ 2816.980677] ? get_pid_task+0xfd/0x250 [ 2816.980694] ? __pfx_kernel_clone+0x10/0x10 [ 2816.980715] ? find_held_lock+0x2b/0x80 [ 2816.980734] ? ksys_write+0x121/0x240 [ 2816.980748] ? lock_is_held_type+0x9e/0x120 [ 2816.980769] __do_sys_clone3+0x1f5/0x280 [ 2816.980782] ? __pfx___do_sys_clone3+0x10/0x10 [ 2816.980804] ? __fget_files+0x20d/0x3b0 [ 2816.980821] ? fput+0x6a/0x100 [ 2816.980836] ? ksys_write+0x1a3/0x240 [ 2816.980849] ? __pfx_ksys_write+0x10/0x10 [ 2816.980863] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2816.980880] do_syscall_64+0xbf/0x360 [ 2816.980892] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2816.980905] RIP: 0033:0x7fb9f533db19 [ 2816.980915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2816.980928] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2816.980940] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2816.980949] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2816.980956] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2816.980964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2816.980971] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2816.980987] 05:58:09 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd004220}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x6, 0x87, 0xb4, 0x5b, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x700, 0x80, 0x2, 0x5}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x20, 0x700, 0x8001, 0x6, {{0x15, 0x4, 0x1, 0x1b, 0x54, 0x65, 0x0, 0x1, 0x29, 0x0, @empty, @empty, {[@ra={0x94, 0x4}, @ra={0x94, 0x4}, @cipso={0x86, 0xb, 0x2, [{0x6, 0x3, ':'}, {0x5, 0x2}]}, @ssrr={0x89, 0x17, 0xae, [@loopback, @private=0xa010100, @loopback, @loopback, @rand_addr=0x64010102]}, @timestamp={0x44, 0x14, 0xa, 0x0, 0x8, [0x80000000, 0x100, 0xd92, 0xd1b]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x7800, 0x8000, 0x9, 0x4, {{0x16, 0x4, 0x0, 0x3, 0x58, 0x66, 0x0, 0x2a, 0x29, 0x0, @loopback, @broadcast, {[@rr={0x7, 0x13, 0xdb, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3a}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @timestamp_addr={0x44, 0x1c, 0x2a, 0x1, 0x8, [{@multicast1, 0x401}, {@local, 0x40}, {@local, 0xef5}]}, @timestamp={0x44, 0x4, 0x7b, 0x0, 0x8}, @rr={0x7, 0xf, 0x98, [@rand_addr=0x64010100, @broadcast, @rand_addr=0x64010102]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000004c0)={'gretap0\x00', &(0x7f0000000440)={'ip_vti0\x00', 0x0, 0x1, 0x1, 0xd7a7, 0x1, {{0xa, 0x4, 0x2, 0xa, 0x28, 0x67, 0x0, 0xf0, 0x4, 0x0, @remote, @empty, {[@timestamp={0x44, 0x10, 0x91, 0x0, 0x3, [0x101, 0x3, 0x6]}, @end]}}}}}) [ 2817.022522] FAULT_INJECTION: forcing a failure. [ 2817.022522] name failslab, interval 1, probability 0, space 0, times 0 [ 2817.024541] CPU: 1 UID: 0 PID: 16995 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2817.024580] Tainted: [W]=WARN [ 2817.024588] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2817.024608] Call Trace: [ 2817.024620] [ 2817.024629] dump_stack_lvl+0xfa/0x120 [ 2817.024674] should_fail_ex+0x4d7/0x5e0 [ 2817.024707] ? copy_process+0x3e5d/0x73c0 [ 2817.024732] should_failslab+0xc2/0x120 [ 2817.024761] kmem_cache_alloc_noprof+0x72/0x690 [ 2817.024787] ? copy_process+0x23b0/0x73c0 [ 2817.024819] ? copy_process+0x3e5d/0x73c0 [ 2817.024842] copy_process+0x3e5d/0x73c0 [ 2817.024866] ? __pfx__kstrtoull+0x10/0x10 [ 2817.024917] ? __pfx_copy_process+0x10/0x10 [ 2817.024943] ? __might_fault+0xe0/0x190 [ 2817.024977] ? _copy_from_user+0x5b/0xd0 [ 2817.025012] kernel_clone+0xea/0x7f0 [ 2817.025037] ? get_pid_task+0xfd/0x250 [ 2817.025063] ? __pfx_kernel_clone+0x10/0x10 [ 2817.025097] ? find_held_lock+0x2b/0x80 [ 2817.025134] ? ksys_write+0x121/0x240 [ 2817.025161] ? lock_is_held_type+0x9e/0x120 [ 2817.025201] __do_sys_clone3+0x1f5/0x280 [ 2817.025227] ? __pfx___do_sys_clone3+0x10/0x10 [ 2817.025269] ? __fget_files+0x20d/0x3b0 [ 2817.025300] ? fput+0x6a/0x100 [ 2817.025331] ? ksys_write+0x1a3/0x240 [ 2817.025356] ? __pfx_ksys_write+0x10/0x10 [ 2817.025385] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2817.025416] do_syscall_64+0xbf/0x360 [ 2817.025440] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2817.025465] RIP: 0033:0x7f3a168c2b19 [ 2817.025484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2817.025508] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2817.025532] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2817.025548] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2817.025564] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2817.025579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2817.025593] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2817.025625] 05:58:09 executing program 5: clone3(&(0x7f00000006c0)={0x500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:58:17 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 23) 05:58:17 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x20000000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), r0) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000980)={0x1bc, r3, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_HEADER={0x4}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_EEE_MODES_OURS={0x164, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff7fff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0xcd, 0x4, "a5541670953250b9222a4b5bcae925d84b932170d47dc08901fc062b4943500de45548cb8f6aace81a3c6c11688cf611d4b0f267fc332d57800c6fb796e1b3491f083b0ecc0a7682294f980cec04a08af8be32789bbf1b85fcd842b4fefdc631f9da6626da9d635e2b6efb591b609274b9652c8e1a6e325ae23e2afd701f826c4a48652817b536d665c6509a9374d91a66a0125f8a92f406abc773cb4b5a31927a7156642f5a7add6657c32e323df9899fc5772a5a8a3c92cb228473b81b14069e00e49368e7ea9db9"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x54, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '},&-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x830fb85ad065bcd6}, 0x4000880) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x4, 0x3, 0x0, 0x9, 0x10, @loopback, @dev={0xfe, 0x80, '\x00', 0x43}, 0x8, 0x7800, 0x7f80000, 0x2}}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r0, &(0x7f0000000640)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000680)=ANY=[@ANYBLOB="5c020000", @ANYRES16=0x0, @ANYBLOB="000829bd7000fddbdf25130000004800018014000200776731000000000000000000000000001400020077673200000000000000000000000000080003000100000014000200677265746170300000000000000000009400018008000100", @ANYRES32=0x0, @ANYBLOB="140002007465616d5f736c6176655f310000000014000200766c616e30000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="140002006261746164765f736c6176655f31000014000200677265746170300000000000000000001400020076657468315f6d616376746170000000140002006970366772657461703000000000000008000100", @ANYRES32=r1, @ANYBLOB="340001801400020069705f767469300000000000000000001400020067656e657665300000000000000000000800030000000000180001801400020076657468315f766c616e0000000000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="540001800800030002000000140002006d6163766c616e31000000000000000008000300000000000800030003000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="14e801086272696467655f736c76655f3000003800018008000300030000000800010000080394cd54b0687109593af4380bcbb79c233b0b871a5e786e568a52c9584cc66148b3bff4eb875d60f836210ee8dc527869862ee617b9da451675dbecf802bdd29a166b907474a9e8f351b8ac667ad89914f36f0a8631a2a21884e8bf560b0154a375ca348e210685bf20936dafd35f1d2d340eaf171400ec7c71", @ANYRES32=0x0, @ANYBLOB="0800030002000000140002007767320000000000000000000000000008000300010000002c000180080003000300000008000100", @ANYRES32=r4, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000000c00018008000100", @ANYRES32=0x0, @ANYBLOB="4800018008000300010000001400020076657468315f746f5f687372000000001400020076657468305f746f5f626f6e64000000140002006d6163766c616e310000000000000000"], 0x25c}, 0x1, 0x0, 0x0, 0x40004}, 0x4000041) socket(0x22, 0x80000, 0x5) 05:58:17 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 23) 05:58:17 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd004220}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x6, 0x87, 0xb4, 0x5b, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x700, 0x80, 0x2, 0x5}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x20, 0x700, 0x8001, 0x6, {{0x15, 0x4, 0x1, 0x1b, 0x54, 0x65, 0x0, 0x1, 0x29, 0x0, @empty, @empty, {[@ra={0x94, 0x4}, @ra={0x94, 0x4}, @cipso={0x86, 0xb, 0x2, [{0x6, 0x3, ':'}, {0x5, 0x2}]}, @ssrr={0x89, 0x17, 0xae, [@loopback, @private=0xa010100, @loopback, @loopback, @rand_addr=0x64010102]}, @timestamp={0x44, 0x14, 0xa, 0x0, 0x8, [0x80000000, 0x100, 0xd92, 0xd1b]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000400)={'ip_vti0\x00', &(0x7f0000000380)={'gre0\x00', 0x0, 0x7800, 0x8000, 0x9, 0x4, {{0x16, 0x4, 0x0, 0x3, 0x58, 0x66, 0x0, 0x2a, 0x29, 0x0, @loopback, @broadcast, {[@rr={0x7, 0x13, 0xdb, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3a}, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote]}, @timestamp_addr={0x44, 0x1c, 0x2a, 0x1, 0x8, [{@multicast1, 0x401}, {@local, 0x40}, {@local, 0xef5}]}, @timestamp={0x44, 0x4, 0x7b, 0x0, 0x8}, @rr={0x7, 0xf, 0x98, [@rand_addr=0x64010100, @broadcast, @rand_addr=0x64010102]}]}}}}}) 05:58:17 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_ASSOCIATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r0, 0x200, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8}, @val={0xc, 0x99, {0x5679, 0x7a}}}}, [@NL80211_ATTR_VHT_CAPABILITY_MASK={0x10, 0xb0, {0x800, {0x1ff, 0x8001, 0x2, 0x4}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40040}, 0x8000000) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:58:17 executing program 5: clone3(&(0x7f00000006c0)={0x600, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:58:17 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 26) 05:58:17 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) getsockname(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000200)=0x80) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc5}, 0xc80c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB='P\x00\x003', @ANYRES16=0x0, @ANYBLOB="000326bd7000ffdbdf2501000000060001004e20000005000200020000001400090020010000000000000000000000000001050002000a00000008000800ac1414bb06000a004e240000"], 0x50}, 0x1, 0x0, 0x0, 0x810}, 0x8062815) syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), r0) 05:58:17 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd004220}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x6, 0x87, 0xb4, 0x5b, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x700, 0x80, 0x2, 0x5}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000280)) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'syztnl1\x00', 0x0, 0x20, 0x700, 0x8001, 0x6, {{0x15, 0x4, 0x1, 0x1b, 0x54, 0x65, 0x0, 0x1, 0x29, 0x0, @empty, @empty, {[@ra={0x94, 0x4}, @ra={0x94, 0x4}, @cipso={0x86, 0xb, 0x2, [{0x6, 0x3, ':'}, {0x5, 0x2}]}, @ssrr={0x89, 0x17, 0xae, [@loopback, @private=0xa010100, @loopback, @loopback, @rand_addr=0x64010102]}, @timestamp={0x44, 0x14, 0xa, 0x0, 0x8, [0x80000000, 0x100, 0xd92, 0xd1b]}]}}}}}) [ 2825.678229] FAULT_INJECTION: forcing a failure. [ 2825.678229] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2825.680136] CPU: 1 UID: 0 PID: 17023 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2825.680174] Tainted: [W]=WARN [ 2825.680182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2825.680195] Call Trace: [ 2825.680204] [ 2825.680213] dump_stack_lvl+0xfa/0x120 [ 2825.680255] should_fail_ex+0x4d7/0x5e0 [ 2825.680288] should_fail_alloc_page+0xe0/0x110 [ 2825.680320] prepare_alloc_pages+0x1af/0x500 [ 2825.680348] ? lock_acquire+0x15e/0x2f0 [ 2825.680381] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2825.680418] ? lock_release+0xc8/0x290 [ 2825.680448] ? __is_insn_slot_addr+0x140/0x290 [ 2825.680489] ? kernel_text_address+0x5b/0xc0 [ 2825.680521] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2825.680561] ? __lock_acquire+0x694/0x1b70 [ 2825.680593] ? __lock_acquire+0x694/0x1b70 [ 2825.680631] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2825.680663] ? policy_nodemask+0xeb/0x4e0 [ 2825.680702] alloc_pages_mpol+0xed/0x340 [ 2825.680738] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2825.680773] ? lock_release+0xc8/0x290 [ 2825.680807] alloc_pages_noprof+0xa1/0x380 [ 2825.680844] pgd_alloc+0x4d/0x610 [ 2825.680884] mm_init+0x711/0x1170 [ 2825.680911] copy_process+0x3ab7/0x73c0 [ 2825.680934] ? __pfx__kstrtoull+0x10/0x10 [ 2825.680984] ? __pfx_copy_process+0x10/0x10 [ 2825.681009] ? __might_fault+0xe0/0x190 [ 2825.681043] ? _copy_from_user+0x5b/0xd0 [ 2825.681077] kernel_clone+0xea/0x7f0 [ 2825.681100] ? get_pid_task+0xfd/0x250 [ 2825.681125] ? __pfx_kernel_clone+0x10/0x10 [ 2825.681159] ? find_held_lock+0x2b/0x80 [ 2825.681194] ? ksys_write+0x121/0x240 [ 2825.681219] ? lock_is_held_type+0x9e/0x120 [ 2825.681258] __do_sys_clone3+0x1f5/0x280 [ 2825.681283] ? __pfx___do_sys_clone3+0x10/0x10 [ 2825.681324] ? __fget_files+0x20d/0x3b0 [ 2825.681355] ? fput+0x6a/0x100 [ 2825.681385] ? ksys_write+0x1a3/0x240 [ 2825.681409] ? __pfx_ksys_write+0x10/0x10 [ 2825.681437] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2825.681467] do_syscall_64+0xbf/0x360 [ 2825.681491] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2825.681515] RIP: 0033:0x7f232c718b19 [ 2825.681534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2825.681556] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2825.681579] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2825.681596] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2825.681610] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2825.681625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2825.681639] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2825.681670] 05:58:17 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 24) 05:58:17 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) 05:58:17 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd004220}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x6, 0x87, 0xb4, 0x5b, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x700, 0x80, 0x2, 0x5}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000280)) 05:58:17 executing program 5: clone3(&(0x7f00000006c0)={0x700, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2825.787101] FAULT_INJECTION: forcing a failure. [ 2825.787101] name failslab, interval 1, probability 0, space 0, times 0 [ 2825.788176] CPU: 0 UID: 0 PID: 17032 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2825.788198] Tainted: [W]=WARN [ 2825.788202] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2825.788210] Call Trace: [ 2825.788214] [ 2825.788219] dump_stack_lvl+0xfa/0x120 [ 2825.788246] should_fail_ex+0x4d7/0x5e0 [ 2825.788264] ? copy_process+0x3a63/0x73c0 [ 2825.788278] should_failslab+0xc2/0x120 [ 2825.788294] kmem_cache_alloc_noprof+0x72/0x690 [ 2825.788308] ? lockdep_init_map_type+0x4b/0x240 [ 2825.788326] ? __raw_spin_lock_init+0x3a/0x110 [ 2825.788345] ? copy_process+0x3a63/0x73c0 [ 2825.788357] copy_process+0x3a63/0x73c0 [ 2825.788369] ? __pfx__kstrtoull+0x10/0x10 [ 2825.788396] ? __pfx_copy_process+0x10/0x10 [ 2825.788409] ? __might_fault+0xe0/0x190 [ 2825.788427] ? _copy_from_user+0x5b/0xd0 [ 2825.788445] kernel_clone+0xea/0x7f0 [ 2825.788458] ? get_pid_task+0xfd/0x250 [ 2825.788471] ? __pfx_kernel_clone+0x10/0x10 [ 2825.788489] ? find_held_lock+0x2b/0x80 [ 2825.788508] ? ksys_write+0x121/0x240 [ 2825.788522] ? lock_is_held_type+0x9e/0x120 [ 2825.788543] __do_sys_clone3+0x1f5/0x280 [ 2825.788556] ? __pfx___do_sys_clone3+0x10/0x10 [ 2825.788578] ? __fget_files+0x20d/0x3b0 [ 2825.788598] ? fput+0x6a/0x100 [ 2825.788615] ? ksys_write+0x1a3/0x240 [ 2825.788627] ? __pfx_ksys_write+0x10/0x10 [ 2825.788642] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2825.788658] do_syscall_64+0xbf/0x360 [ 2825.788671] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2825.788684] RIP: 0033:0x7fb9f533db19 [ 2825.788694] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2825.788707] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2825.788720] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2825.788728] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2825.788736] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2825.788744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2825.788752] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2825.788768] 05:58:17 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) getsockname(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000200)=0x80) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc5}, 0xc80c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB='P\x00\x003', @ANYRES16=0x0, @ANYBLOB="000326bd7000ffdbdf2501000000060001004e20000005000200020000001400090020010000000000000000000000000001050002000a00000008000800ac1414bb06000a004e240000"], 0x50}, 0x1, 0x0, 0x0, 0x810}, 0x8062815) 05:58:17 executing program 5: clone3(&(0x7f00000006c0)={0x900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:58:17 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd004220}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x6, 0x87, 0xb4, 0x5b, 0x8, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, 0x700, 0x80, 0x2, 0x5}}) 05:58:27 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x20000000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), r0) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000980)={0x1bc, r3, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_HEADER={0x4}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_EEE_MODES_OURS={0x164, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff7fff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0xcd, 0x4, "a5541670953250b9222a4b5bcae925d84b932170d47dc08901fc062b4943500de45548cb8f6aace81a3c6c11688cf611d4b0f267fc332d57800c6fb796e1b3491f083b0ecc0a7682294f980cec04a08af8be32789bbf1b85fcd842b4fefdc631f9da6626da9d635e2b6efb591b609274b9652c8e1a6e325ae23e2afd701f826c4a48652817b536d665c6509a9374d91a66a0125f8a92f406abc773cb4b5a31927a7156642f5a7add6657c32e323df9899fc5772a5a8a3c92cb228473b81b14069e00e49368e7ea9db9"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x54, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '},&-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x830fb85ad065bcd6}, 0x4000880) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000340)={'syztnl0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x4, 0x3, 0x0, 0x9, 0x10, @loopback, @dev={0xfe, 0x80, '\x00', 0x43}, 0x8, 0x7800, 0x7f80000, 0x2}}) socket(0x22, 0x80000, 0x5) 05:58:27 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) getsockname(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000200)=0x80) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x201, 0x0, 0x0, {0x0, 0x0, 0x1}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc5}, 0xc80c) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) 05:58:27 executing program 5: clone3(&(0x7f00000006c0)={0xd00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:58:27 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 25) 05:58:27 executing program 4: sendmsg$NL80211_CMD_JOIN_IBSS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xc0, 0x0, 0x1, 0x70bd27, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x10001, 0x4a}}}}, [@NL80211_ATTR_CONTROL_PORT={0x4}, @NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_MESH_CONFIG={0x44, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_SYNC_OFFSET_MAX_NEIGHBOR={0x8, 0x15, 0x99}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5, 0x11, 0x1}, @NL80211_MESHCONF_HT_OPMODE={0x6, 0x16, 0x14}, @NL80211_MESHCONF_HT_OPMODE={0x6, 0x16, 0x3}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x2}, @NL80211_MESHCONF_HWMP_PREQ_MIN_INTERVAL={0x6, 0xc, 0xb8bb}, @NL80211_MESHCONF_ELEMENT_TTL={0x5}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0x68}]}, @NL80211_ATTR_KEYS={0x54, 0x51, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "364efa74c4"}, @NL80211_KEY_DEFAULT={0x4}]}, {0x18, 0x0, 0x0, 0x1, [@NL80211_KEY_TYPE={0x8}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac05}, @NL80211_KEY_DEFAULT={0x4}]}, {0x20, 0x0, 0x0, 0x1, [@NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DATA_WEP40={0x9, 0x1, "cdb537feef"}, @NL80211_KEY_MODE={0x5}, @NL80211_KEY_DEFAULT_MGMT={0x4}]}]}]}, 0xc0}}, 0x20040000) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:58:27 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 24) 05:58:27 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd004220}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x6c, 0x0, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @remote}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) 05:58:27 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 27) 05:58:27 executing program 5: clone3(&(0x7f00000006c0)={0x1100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2835.216503] FAULT_INJECTION: forcing a failure. [ 2835.216503] name failslab, interval 1, probability 0, space 0, times 0 [ 2835.218382] CPU: 0 UID: 0 PID: 17069 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2835.218423] Tainted: [W]=WARN [ 2835.218431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2835.218446] Call Trace: [ 2835.218454] [ 2835.218464] dump_stack_lvl+0xfa/0x120 [ 2835.218509] should_fail_ex+0x4d7/0x5e0 [ 2835.218543] ? copy_process+0x3a63/0x73c0 [ 2835.218569] should_failslab+0xc2/0x120 [ 2835.218607] kmem_cache_alloc_noprof+0x72/0x690 [ 2835.218634] ? lockdep_init_map_type+0x4b/0x240 [ 2835.218667] ? __raw_spin_lock_init+0x3a/0x110 [ 2835.218705] ? copy_process+0x3a63/0x73c0 [ 2835.218729] copy_process+0x3a63/0x73c0 [ 2835.218753] ? __pfx__kstrtoull+0x10/0x10 [ 2835.218805] ? __pfx_copy_process+0x10/0x10 [ 2835.218832] ? __might_fault+0xe0/0x190 [ 2835.218866] ? _copy_from_user+0x5b/0xd0 [ 2835.218902] kernel_clone+0xea/0x7f0 [ 2835.218927] ? get_pid_task+0xfd/0x250 [ 2835.218954] ? __pfx_kernel_clone+0x10/0x10 [ 2835.218988] ? find_held_lock+0x2b/0x80 [ 2835.219025] ? ksys_write+0x121/0x240 [ 2835.219052] ? lock_is_held_type+0x9e/0x120 [ 2835.219092] __do_sys_clone3+0x1f5/0x280 [ 2835.219118] ? __pfx___do_sys_clone3+0x10/0x10 [ 2835.219161] ? __fget_files+0x20d/0x3b0 [ 2835.219193] ? fput+0x6a/0x100 [ 2835.219224] ? ksys_write+0x1a3/0x240 [ 2835.219250] ? __pfx_ksys_write+0x10/0x10 [ 2835.219279] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2835.219310] do_syscall_64+0xbf/0x360 [ 2835.219335] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2835.219361] RIP: 0033:0x7f3a168c2b19 [ 2835.219379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2835.219404] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2835.219428] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2835.219445] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2835.219461] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2835.219476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2835.219491] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2835.219523] 05:58:27 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) connect(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x2, {0xa, 0x4e20, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x9}}}, 0x80) rt_sigprocmask(0x2, 0x0, 0x0, 0xfffffffffffffef6) 05:58:27 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) getsockname(r0, &(0x7f0000000180)=@isdn, &(0x7f0000000200)=0x80) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) 05:58:27 executing program 1: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) 05:58:27 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x20000000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), r0) sendmsg$ETHTOOL_MSG_EEE_SET(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000580)={&(0x7f0000000980)={0x1bc, r3, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_HEADER={0x4}, @ETHTOOL_A_EEE_ENABLED={0x5, 0x5, 0x1}, @ETHTOOL_A_EEE_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_EEE_MODES_OURS={0x164, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff7fff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff001}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_VALUE={0xcd, 0x4, "a5541670953250b9222a4b5bcae925d84b932170d47dc08901fc062b4943500de45548cb8f6aace81a3c6c11688cf611d4b0f267fc332d57800c6fb796e1b3491f083b0ecc0a7682294f980cec04a08af8be32789bbf1b85fcd842b4fefdc631f9da6626da9d635e2b6efb591b609274b9652c8e1a6e325ae23e2afd701f826c4a48652817b536d665c6509a9374d91a66a0125f8a92f406abc773cb4b5a31927a7156642f5a7add6657c32e323df9899fc5772a5a8a3c92cb228473b81b14069e00e49368e7ea9db9"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x8}, @ETHTOOL_A_BITSET_BITS={0x54, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '},&-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x830fb85ad065bcd6}, 0x4000880) socket(0x22, 0x80000, 0x5) 05:58:27 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 26) [ 2835.516796] FAULT_INJECTION: forcing a failure. [ 2835.516796] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2835.518744] CPU: 1 UID: 0 PID: 17087 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2835.518784] Tainted: [W]=WARN [ 2835.518793] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2835.518807] Call Trace: [ 2835.518815] [ 2835.518824] dump_stack_lvl+0xfa/0x120 [ 2835.518868] should_fail_ex+0x4d7/0x5e0 [ 2835.518902] should_fail_alloc_page+0xe0/0x110 [ 2835.518934] prepare_alloc_pages+0x1af/0x500 [ 2835.518963] ? lock_acquire+0x15e/0x2f0 [ 2835.518995] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2835.519041] ? __lock_acquire+0x694/0x1b70 [ 2835.519070] ? css_rstat_updated+0x1b8/0x4d0 [ 2835.519106] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2835.519156] ? __lock_acquire+0x694/0x1b70 [ 2835.519186] ? __print_lock_name+0x42/0x100 [ 2835.519226] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2835.519259] ? policy_nodemask+0xeb/0x4e0 [ 2835.519301] alloc_pages_mpol+0xed/0x340 [ 2835.519337] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2835.519374] ? lock_release+0xc8/0x290 [ 2835.519409] alloc_pages_noprof+0xa1/0x380 [ 2835.519447] pgd_alloc+0x4d/0x610 [ 2835.519488] mm_init+0x711/0x1170 [ 2835.519515] copy_process+0x3ab7/0x73c0 [ 2835.519538] ? __pfx__kstrtoull+0x10/0x10 [ 2835.519587] ? __pfx_copy_process+0x10/0x10 [ 2835.519619] ? __might_fault+0xe0/0x190 [ 2835.519652] ? _copy_from_user+0x5b/0xd0 [ 2835.519686] kernel_clone+0xea/0x7f0 [ 2835.519710] ? get_pid_task+0xfd/0x250 [ 2835.519736] ? __pfx_kernel_clone+0x10/0x10 [ 2835.519768] ? find_held_lock+0x2b/0x80 [ 2835.519802] ? ksys_write+0x121/0x240 [ 2835.519827] ? lock_is_held_type+0x9e/0x120 [ 2835.519867] __do_sys_clone3+0x1f5/0x280 [ 2835.519894] ? __pfx___do_sys_clone3+0x10/0x10 [ 2835.519936] ? __fget_files+0x20d/0x3b0 [ 2835.519967] ? fput+0x6a/0x100 [ 2835.519997] ? ksys_write+0x1a3/0x240 [ 2835.520021] ? __pfx_ksys_write+0x10/0x10 [ 2835.520048] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2835.520078] do_syscall_64+0xbf/0x360 [ 2835.520100] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2835.520125] RIP: 0033:0x7fb9f533db19 [ 2835.520144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2835.520168] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2835.520190] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2835.520206] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2835.520221] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2835.520235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2835.520249] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2835.520280] 05:58:35 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r1, 0x0, 0x20000000) syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), r0) socket(0x22, 0x80000, 0x5) 05:58:35 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 27) 05:58:35 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) 05:58:35 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x8002, 0x0) 05:58:35 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 28) 05:58:35 executing program 4: rt_sigprocmask(0x2, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={@local, 0x34}) getsockname$netlink(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) 05:58:35 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 25) 05:58:35 executing program 5: clone3(&(0x7f00000006c0)={0x2000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:58:35 executing program 1: openat$hwrng(0xffffffffffffff9c, 0x0, 0x8002, 0x0) 05:58:35 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 29) 05:58:35 executing program 1: openat$hwrng(0xffffffffffffff9c, 0x0, 0x8002, 0x0) 05:58:36 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x7]}, &(0x7f0000000040), 0x8) 05:58:36 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000), &(0x7f0000000040), 0x8) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) 05:58:36 executing program 5: clone3(&(0x7f00000006c0)={0x3f00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2843.936458] FAULT_INJECTION: forcing a failure. [ 2843.936458] name failslab, interval 1, probability 0, space 0, times 0 [ 2843.937479] CPU: 0 UID: 0 PID: 17115 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2843.937500] Tainted: [W]=WARN [ 2843.937504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2843.937512] Call Trace: [ 2843.937516] [ 2843.937521] dump_stack_lvl+0xfa/0x120 [ 2843.937549] should_fail_ex+0x4d7/0x5e0 [ 2843.937568] ? mas_dup_build+0x5ce/0x1690 [ 2843.937580] should_failslab+0xc2/0x120 [ 2843.937600] kmem_cache_alloc_noprof+0x72/0x690 [ 2843.937620] ? mas_dup_build+0x5ce/0x1690 [ 2843.937631] mas_dup_build+0x5ce/0x1690 [ 2843.937649] __mt_dup+0xed/0x1f0 [ 2843.937660] ? __pfx___mt_dup+0x10/0x10 [ 2843.937670] ? lock_acquire+0x15e/0x2f0 [ 2843.937690] ? get_mm_exe_file+0x27/0x1a0 [ 2843.937703] ? find_held_lock+0x2b/0x80 [ 2843.937727] ? get_mm_exe_file+0x96/0x1a0 [ 2843.937741] dup_mmap+0x373/0x1d10 [ 2843.937767] ? __pfx_dup_mmap+0x10/0x10 [ 2843.937792] ? lock_is_held_type+0x9e/0x120 [ 2843.937817] copy_process+0x3ad5/0x73c0 [ 2843.937832] ? __pfx__kstrtoull+0x10/0x10 [ 2843.937859] ? __pfx_copy_process+0x10/0x10 [ 2843.937872] ? __might_fault+0xe0/0x190 [ 2843.937890] ? _copy_from_user+0x5b/0xd0 [ 2843.937908] kernel_clone+0xea/0x7f0 [ 2843.937921] ? get_pid_task+0xfd/0x250 [ 2843.937935] ? __pfx_kernel_clone+0x10/0x10 [ 2843.937953] ? find_held_lock+0x2b/0x80 [ 2843.937971] ? ksys_write+0x121/0x240 [ 2843.937985] ? lock_is_held_type+0x9e/0x120 [ 2843.938005] __do_sys_clone3+0x1f5/0x280 [ 2843.938018] ? __pfx___do_sys_clone3+0x10/0x10 [ 2843.938040] ? __fget_files+0x20d/0x3b0 [ 2843.938057] ? fput+0x6a/0x100 [ 2843.938074] ? ksys_write+0x1a3/0x240 [ 2843.938086] ? __pfx_ksys_write+0x10/0x10 [ 2843.938101] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2843.938118] do_syscall_64+0xbf/0x360 [ 2843.938130] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2843.938144] RIP: 0033:0x7f232c718b19 [ 2843.938154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2843.938166] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2843.938178] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2843.938187] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2843.938194] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2843.938202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2843.938209] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2843.938226] 05:58:36 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 26) 05:58:36 executing program 1: openat$hwrng(0xffffffffffffff9c, 0x0, 0x8002, 0x0) 05:58:36 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r1, 0x0, 0x20000000) socket(0x22, 0x80000, 0x5) 05:58:36 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 28) 05:58:36 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 30) 05:58:36 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000000)={[0x200]}, &(0x7f0000000040), 0x8) [ 2844.138194] FAULT_INJECTION: forcing a failure. [ 2844.138194] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2844.140336] CPU: 1 UID: 0 PID: 17129 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2844.140379] Tainted: [W]=WARN [ 2844.140387] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2844.140403] Call Trace: [ 2844.140412] [ 2844.140422] dump_stack_lvl+0xfa/0x120 [ 2844.140470] should_fail_ex+0x4d7/0x5e0 [ 2844.140506] should_fail_alloc_page+0xe0/0x110 [ 2844.140541] prepare_alloc_pages+0x1af/0x500 [ 2844.140572] ? lock_acquire+0x15e/0x2f0 [ 2844.140615] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2844.140663] ? __is_insn_slot_addr+0x140/0x290 [ 2844.140709] ? __lock_acquire+0x694/0x1b70 [ 2844.140739] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2844.140791] ? __lock_acquire+0x694/0x1b70 [ 2844.140822] ? __print_lock_name+0x42/0x100 [ 2844.140863] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2844.140898] ? policy_nodemask+0xeb/0x4e0 [ 2844.140941] alloc_pages_mpol+0xed/0x340 [ 2844.140986] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2844.141025] ? lock_release+0xc8/0x290 [ 2844.141062] alloc_pages_noprof+0xa1/0x380 [ 2844.141104] pgd_alloc+0x4d/0x610 [ 2844.141147] mm_init+0x711/0x1170 [ 2844.141176] copy_process+0x3ab7/0x73c0 [ 2844.141202] ? __pfx__kstrtoull+0x10/0x10 [ 2844.141256] ? __pfx_copy_process+0x10/0x10 [ 2844.141284] ? __might_fault+0xe0/0x190 [ 2844.141320] ? _copy_from_user+0x5b/0xd0 [ 2844.141358] kernel_clone+0xea/0x7f0 [ 2844.141384] ? get_pid_task+0xfd/0x250 [ 2844.141412] ? __pfx_kernel_clone+0x10/0x10 [ 2844.141448] ? find_held_lock+0x2b/0x80 [ 2844.141487] ? ksys_write+0x121/0x240 [ 2844.141514] ? lock_is_held_type+0x9e/0x120 [ 2844.141556] __do_sys_clone3+0x1f5/0x280 [ 2844.141584] ? __pfx___do_sys_clone3+0x10/0x10 [ 2844.141629] ? __fget_files+0x20d/0x3b0 [ 2844.141662] ? fput+0x6a/0x100 [ 2844.141695] ? ksys_write+0x1a3/0x240 [ 2844.141722] ? __pfx_ksys_write+0x10/0x10 [ 2844.141753] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2844.141785] do_syscall_64+0xbf/0x360 [ 2844.141812] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2844.141838] RIP: 0033:0x7f3a168c2b19 [ 2844.141858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2844.141884] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2844.141909] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2844.141927] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2844.141943] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2844.141959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2844.141974] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2844.142008] 05:58:45 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 31) 05:58:45 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) 05:58:45 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 27) 05:58:45 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 05:58:45 executing program 5: clone3(&(0x7f00000006c0)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:58:45 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000040)={[0x1]}, 0x0, 0x8) 05:58:45 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) socket(0x22, 0x80000, 0x5) 05:58:45 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 29) [ 2853.673545] FAULT_INJECTION: forcing a failure. [ 2853.673545] name failslab, interval 1, probability 0, space 0, times 0 [ 2853.674970] CPU: 0 UID: 0 PID: 17153 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2853.675002] Tainted: [W]=WARN [ 2853.675008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2853.675019] Call Trace: [ 2853.675025] [ 2853.675032] dump_stack_lvl+0xfa/0x120 [ 2853.675071] should_fail_ex+0x4d7/0x5e0 [ 2853.675098] ? mas_dup_build+0x5ce/0x1690 [ 2853.675116] should_failslab+0xc2/0x120 [ 2853.675140] kmem_cache_alloc_noprof+0x72/0x690 [ 2853.675169] ? mas_dup_build+0x5ce/0x1690 [ 2853.675186] mas_dup_build+0x5ce/0x1690 [ 2853.675214] __mt_dup+0xed/0x1f0 [ 2853.675231] ? __pfx___mt_dup+0x10/0x10 [ 2853.675247] ? lock_acquire+0x15e/0x2f0 [ 2853.675276] ? get_mm_exe_file+0x27/0x1a0 [ 2853.675297] ? find_held_lock+0x2b/0x80 [ 2853.675334] ? get_mm_exe_file+0x96/0x1a0 [ 2853.675356] dup_mmap+0x373/0x1d10 [ 2853.675394] ? __pfx_dup_mmap+0x10/0x10 [ 2853.675432] ? lock_is_held_type+0x9e/0x120 [ 2853.675466] copy_process+0x3ad5/0x73c0 [ 2853.675485] ? __pfx__kstrtoull+0x10/0x10 [ 2853.675527] ? __pfx_copy_process+0x10/0x10 [ 2853.675547] ? __might_fault+0xe0/0x190 [ 2853.675575] ? _copy_from_user+0x5b/0xd0 [ 2853.675610] kernel_clone+0xea/0x7f0 [ 2853.675629] ? get_pid_task+0xfd/0x250 [ 2853.675651] ? __pfx_kernel_clone+0x10/0x10 [ 2853.675678] ? find_held_lock+0x2b/0x80 [ 2853.675706] ? ksys_write+0x121/0x240 [ 2853.675728] ? lock_is_held_type+0x9e/0x120 [ 2853.675758] __do_sys_clone3+0x1f5/0x280 [ 2853.675779] ? __pfx___do_sys_clone3+0x10/0x10 [ 2853.675813] ? __fget_files+0x20d/0x3b0 [ 2853.675839] ? fput+0x6a/0x100 [ 2853.675864] ? ksys_write+0x1a3/0x240 [ 2853.675883] ? __pfx_ksys_write+0x10/0x10 [ 2853.675906] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2853.675931] do_syscall_64+0xbf/0x360 [ 2853.675950] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2853.675971] RIP: 0033:0x7fb9f533db19 [ 2853.675986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2853.676005] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2853.676023] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2853.676037] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2853.676048] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2853.676060] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2853.676072] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2853.676103] [ 2853.709537] FAULT_INJECTION: forcing a failure. [ 2853.709537] name failslab, interval 1, probability 0, space 0, times 0 [ 2853.710833] CPU: 0 UID: 0 PID: 17158 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2853.710862] Tainted: [W]=WARN [ 2853.710868] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2853.710879] Call Trace: [ 2853.710885] [ 2853.710892] dump_stack_lvl+0xfa/0x120 [ 2853.710924] should_fail_ex+0x4d7/0x5e0 [ 2853.710948] should_failslab+0xc2/0x120 [ 2853.710970] kmem_cache_alloc_bulk_noprof+0x6d/0x4d0 [ 2853.710996] mas_dup_build+0xc58/0x1690 [ 2853.711023] __mt_dup+0xed/0x1f0 [ 2853.711040] ? __pfx___mt_dup+0x10/0x10 [ 2853.711056] ? lock_acquire+0x15e/0x2f0 [ 2853.711082] ? get_mm_exe_file+0x27/0x1a0 [ 2853.711101] ? find_held_lock+0x2b/0x80 [ 2853.711136] ? get_mm_exe_file+0x96/0x1a0 [ 2853.711157] dup_mmap+0x373/0x1d10 [ 2853.711194] ? __pfx_dup_mmap+0x10/0x10 [ 2853.711231] ? lock_is_held_type+0x9e/0x120 [ 2853.711264] copy_process+0x3ad5/0x73c0 [ 2853.711282] ? __pfx__kstrtoull+0x10/0x10 [ 2853.711321] ? __pfx_copy_process+0x10/0x10 [ 2853.711341] ? __might_fault+0xe0/0x190 [ 2853.711367] ? _copy_from_user+0x5b/0xd0 [ 2853.711395] kernel_clone+0xea/0x7f0 [ 2853.711414] ? get_pid_task+0xfd/0x250 [ 2853.711434] ? __pfx_kernel_clone+0x10/0x10 [ 2853.711460] ? find_held_lock+0x2b/0x80 [ 2853.711488] ? ksys_write+0x121/0x240 [ 2853.711508] ? lock_is_held_type+0x9e/0x120 [ 2853.711537] __do_sys_clone3+0x1f5/0x280 [ 2853.711557] ? __pfx___do_sys_clone3+0x10/0x10 [ 2853.711591] ? __fget_files+0x20d/0x3b0 [ 2853.711621] ? fput+0x6a/0x100 [ 2853.711645] ? ksys_write+0x1a3/0x240 [ 2853.711664] ? __pfx_ksys_write+0x10/0x10 [ 2853.711686] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2853.711710] do_syscall_64+0xbf/0x360 [ 2853.711729] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2853.711748] RIP: 0033:0x7f232c718b19 [ 2853.711762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2853.711780] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2853.711798] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2853.711810] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2853.711822] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2853.711833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2853.711845] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2853.711870] 05:58:45 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000040)={0x218, 0x0, 0x10, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_EEE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}, @ETHTOOL_A_EEE_TX_LPI_TIMER={0x8, 0x7, 0x8}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_MODES_OURS={0x1d4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x80, 0x5, "663b2416f49a40a2766853fb11a3a14cadd1478e34ad660a088e1f87ce1a5cc103ceaad8b97859efbe78c81e42021e9dbea353f9fe2e71a749d313446d734265d13ee3b2fbc2876984b7d2a1bb7a4be628be88c9ca82540d1f90a2e6e43fc1e94af8fdf4cfb88eb9d3dc6e74a4916a9cfadadaeb3c9e7522191225fb"}, @ETHTOOL_A_BITSET_BITS={0x40, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '^#\xa5@!&\\\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}]}, {0x4}]}, @ETHTOOL_A_BITSET_BITS={0x74, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffa}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000001}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '%/\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '-\':{\\(/[%:^$$}\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '-.:&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x58, 0x4, "7a1259d8218d2592282be419074834bd286cef43c9161d59308b0224fdf209c267a53391a969262ac307ff63db5c4a7974b10a8c968fbbd6af73e75f54a7b76f424db229a10b30fd6c6297a654e1244d7fbb043c"}, @ETHTOOL_A_BITSET_VALUE={0x37, 0x4, "1a6068d02cb68c3552c75e6a1e7c31ab17dda2d96f9d74574fabe4bdc15609e9ef5dd050fcc5f593819c73c5e1a04ab2a8b54c"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}]}, 0x218}, 0x1, 0x0, 0x0, 0x400}, 0x4004000) 05:58:45 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x10080, 0x0) 05:58:45 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 28) 05:58:45 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 32) 05:58:45 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 05:58:45 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 30) 05:58:45 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000280)={'tunl0\x00', &(0x7f0000000200)={'ip_vti0\x00', 0x0, 0x40, 0x8, 0x469, 0xfffffffb, {{0x13, 0x4, 0x3, 0x3c, 0x4c, 0x66, 0x0, 0x8, 0x2f, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x2b}, {[@ssrr={0x89, 0xf, 0x58, [@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x3e}]}, @timestamp={0x44, 0x1c, 0x2d, 0x0, 0x6, [0x80000000, 0x6f, 0xa0d, 0x1, 0x7, 0x80000000]}, @rr={0x7, 0xb, 0x26, [@empty, @local]}]}}}}}) socket(0x22, 0x80000, 0x5) [ 2853.900767] FAULT_INJECTION: forcing a failure. [ 2853.900767] name failslab, interval 1, probability 0, space 0, times 0 [ 2853.902080] CPU: 0 UID: 0 PID: 17169 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2853.902108] Tainted: [W]=WARN [ 2853.902113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2853.902123] Call Trace: [ 2853.902130] [ 2853.902136] dump_stack_lvl+0xfa/0x120 [ 2853.902172] should_fail_ex+0x4d7/0x5e0 [ 2853.902196] ? mas_dup_build+0x5ce/0x1690 [ 2853.902212] should_failslab+0xc2/0x120 [ 2853.902234] kmem_cache_alloc_noprof+0x72/0x690 [ 2853.902259] ? mas_dup_build+0x5ce/0x1690 [ 2853.902274] mas_dup_build+0x5ce/0x1690 [ 2853.902298] __mt_dup+0xed/0x1f0 [ 2853.902313] ? __pfx___mt_dup+0x10/0x10 [ 2853.902327] ? lock_acquire+0x15e/0x2f0 [ 2853.902352] ? get_mm_exe_file+0x27/0x1a0 [ 2853.902370] ? find_held_lock+0x2b/0x80 [ 2853.902412] ? get_mm_exe_file+0x96/0x1a0 [ 2853.902431] dup_mmap+0x373/0x1d10 [ 2853.902464] ? __pfx_dup_mmap+0x10/0x10 [ 2853.902498] ? lock_is_held_type+0x9e/0x120 [ 2853.902533] copy_process+0x3ad5/0x73c0 [ 2853.902549] ? __pfx__kstrtoull+0x10/0x10 [ 2853.902585] ? __pfx_copy_process+0x10/0x10 [ 2853.902608] ? __might_fault+0xe0/0x190 [ 2853.902632] ? _copy_from_user+0x5b/0xd0 [ 2853.902657] kernel_clone+0xea/0x7f0 [ 2853.902673] ? get_pid_task+0xfd/0x250 [ 2853.902692] ? __pfx_kernel_clone+0x10/0x10 [ 2853.902716] ? find_held_lock+0x2b/0x80 [ 2853.902741] ? ksys_write+0x121/0x240 [ 2853.902759] ? lock_is_held_type+0x9e/0x120 [ 2853.902785] __do_sys_clone3+0x1f5/0x280 [ 2853.902803] ? __pfx___do_sys_clone3+0x10/0x10 [ 2853.902833] ? __fget_files+0x20d/0x3b0 [ 2853.902856] ? fput+0x6a/0x100 [ 2853.902878] ? ksys_write+0x1a3/0x240 [ 2853.902895] ? __pfx_ksys_write+0x10/0x10 [ 2853.902914] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2853.902936] do_syscall_64+0xbf/0x360 [ 2853.902953] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2853.902971] RIP: 0033:0x7f232c718b19 [ 2853.902984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2853.903000] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2853.903017] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2853.903028] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2853.903038] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2853.903049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2853.903059] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2853.903082] 05:58:55 executing program 5: clone3(&(0x7f00000006c0)={0x6102, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:58:55 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 33) 05:58:55 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 31) 05:58:55 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x10080, 0x0) 05:58:55 executing program 4: rt_sigprocmask(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x9, &(0x7f0000000000)={@mcast2}, 0x14) 05:58:55 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 05:58:55 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 29) 05:58:55 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) socket(0x22, 0x80000, 0x5) 05:58:55 executing program 1: clone3(&(0x7f00000006c0)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2863.197692] FAULT_INJECTION: forcing a failure. [ 2863.197692] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2863.198770] CPU: 0 UID: 0 PID: 17183 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2863.198791] Tainted: [W]=WARN [ 2863.198796] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2863.198804] Call Trace: [ 2863.198808] [ 2863.198813] dump_stack_lvl+0xfa/0x120 [ 2863.198841] should_fail_ex+0x4d7/0x5e0 [ 2863.198860] should_fail_alloc_page+0xe0/0x110 [ 2863.198878] prepare_alloc_pages+0x1af/0x500 [ 2863.198893] ? lock_acquire+0x15e/0x2f0 [ 2863.198911] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2863.198934] ? __is_insn_slot_addr+0x140/0x290 [ 2863.198957] ? __lock_acquire+0x694/0x1b70 [ 2863.198972] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2863.198996] ? __lock_acquire+0x694/0x1b70 [ 2863.199011] ? __print_lock_name+0x42/0x100 [ 2863.199031] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2863.199047] ? policy_nodemask+0xeb/0x4e0 [ 2863.199069] alloc_pages_mpol+0xed/0x340 [ 2863.199087] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2863.199106] ? lock_release+0xc8/0x290 [ 2863.199124] alloc_pages_noprof+0xa1/0x380 [ 2863.199143] pgd_alloc+0x4d/0x610 [ 2863.199164] mm_init+0x711/0x1170 [ 2863.199179] copy_process+0x3ab7/0x73c0 [ 2863.199191] ? __pfx__kstrtoull+0x10/0x10 [ 2863.199218] ? __pfx_copy_process+0x10/0x10 [ 2863.199231] ? __might_fault+0xe0/0x190 [ 2863.199249] ? _copy_from_user+0x5b/0xd0 [ 2863.199267] kernel_clone+0xea/0x7f0 [ 2863.199279] ? get_pid_task+0xfd/0x250 [ 2863.199293] ? __pfx_kernel_clone+0x10/0x10 [ 2863.199310] ? find_held_lock+0x2b/0x80 [ 2863.199328] ? ksys_write+0x121/0x240 [ 2863.199343] ? lock_is_held_type+0x9e/0x120 [ 2863.199363] __do_sys_clone3+0x1f5/0x280 [ 2863.199376] ? __pfx___do_sys_clone3+0x10/0x10 [ 2863.199397] ? __fget_files+0x20d/0x3b0 [ 2863.199414] ? fput+0x6a/0x100 [ 2863.199430] ? ksys_write+0x1a3/0x240 [ 2863.199443] ? __pfx_ksys_write+0x10/0x10 [ 2863.199457] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2863.199473] do_syscall_64+0xbf/0x360 [ 2863.199486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2863.199499] RIP: 0033:0x7f3a168c2b19 [ 2863.199509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2863.199521] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2863.199533] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2863.199542] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2863.199549] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2863.199557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2863.199564] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2863.199580] 05:58:55 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x6]}, 0x0, 0x8) [ 2863.278195] FAULT_INJECTION: forcing a failure. [ 2863.278195] name failslab, interval 1, probability 0, space 0, times 0 [ 2863.279988] CPU: 1 UID: 0 PID: 17199 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2863.280042] Tainted: [W]=WARN [ 2863.280053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2863.280068] Call Trace: [ 2863.280077] [ 2863.280086] dump_stack_lvl+0xfa/0x120 [ 2863.280129] should_fail_ex+0x4d7/0x5e0 [ 2863.280162] should_failslab+0xc2/0x120 [ 2863.280191] kmem_cache_alloc_bulk_noprof+0x6d/0x4d0 [ 2863.280223] mas_dup_build+0xc58/0x1690 [ 2863.280257] __mt_dup+0xed/0x1f0 [ 2863.280278] ? __pfx___mt_dup+0x10/0x10 [ 2863.280297] ? lock_acquire+0x15e/0x2f0 [ 2863.280331] ? get_mm_exe_file+0x27/0x1a0 [ 2863.280355] ? find_held_lock+0x2b/0x80 [ 2863.280400] ? get_mm_exe_file+0x96/0x1a0 [ 2863.280425] dup_mmap+0x373/0x1d10 [ 2863.280471] ? __pfx_dup_mmap+0x10/0x10 [ 2863.280517] ? lock_is_held_type+0x9e/0x120 [ 2863.280558] copy_process+0x3ad5/0x73c0 [ 2863.280581] ? __pfx__kstrtoull+0x10/0x10 [ 2863.280640] ? __pfx_copy_process+0x10/0x10 [ 2863.280664] ? __might_fault+0xe0/0x190 [ 2863.280697] ? _copy_from_user+0x5b/0xd0 [ 2863.280730] kernel_clone+0xea/0x7f0 [ 2863.280753] ? get_pid_task+0xfd/0x250 [ 2863.280778] ? __pfx_kernel_clone+0x10/0x10 [ 2863.280811] ? find_held_lock+0x2b/0x80 [ 2863.280845] ? ksys_write+0x121/0x240 [ 2863.280870] ? lock_is_held_type+0x9e/0x120 [ 2863.280907] __do_sys_clone3+0x1f5/0x280 [ 2863.280931] ? __pfx___do_sys_clone3+0x10/0x10 [ 2863.280989] ? __fget_files+0x20d/0x3b0 [ 2863.281036] ? fput+0x6a/0x100 [ 2863.281081] ? ksys_write+0x1a3/0x240 [ 2863.281116] ? __pfx_ksys_write+0x10/0x10 [ 2863.281145] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2863.281176] do_syscall_64+0xbf/0x360 [ 2863.281199] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2863.281224] RIP: 0033:0x7fb9f533db19 [ 2863.281242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2863.281264] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2863.281287] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2863.281303] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2863.281317] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2863.281331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2863.281345] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2863.281376] 05:59:04 executing program 4: rt_sigprocmask(0x1, 0x0, 0x0, 0x0) 05:59:04 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 30) 05:59:04 executing program 1: clone3(&(0x7f00000006c0)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:04 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 34) 05:59:04 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x10080, 0x0) 05:59:04 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 32) 05:59:04 executing program 5: clone3(&(0x7f00000006c0)={0x7d02, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:04 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) socket(0x22, 0x80000, 0x5) 05:59:04 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000c40)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000040)={0xbb8, 0x1, 0x5, 0x201, 0x0, 0x0, {0x7, 0x0, 0x3}, [{{0x254, 0x1, {{0x2, 0x401}, 0x0, 0x0, 0x5, 0xcee, 0x9, 'syz0\x00', "3db8b344d54341deccc1ff44aac913acbd0eac0e811c1a7c9ff02c6feb668aac", "c00832d776490ad8382296d661090dc2d79a9cb7486eae134e61f2cf500bbf98", [{0x4000, 0x7fff, {0x1, 0x9}}, {0x101, 0xfff, {0x2, 0x8000}}, {0x400, 0x2, {0x0, 0xa49}}, {0x6, 0x1, {0x2, 0x80}}, {0x7, 0x8001, {0x1, 0xc5a3}}, {0xff, 0x0, {0x2, 0xe6d}}, {0x5, 0x530, {0x2, 0x2}}, {0x0, 0x6, {0x1, 0x5fd}}, {0x35f, 0x8, {0x0, 0x100}}, {0xb7, 0x6, {0x2, 0x7fff}}, {0x1f, 0xef17, {0x2, 0x29}}, {0x7, 0x0, {0x2, 0x2}}, {0x401, 0xe7, {0x3, 0x8}}, {0x8, 0x7, {0x1, 0x538}}, {0x1f, 0x401, {0x1, 0x1f}}, {0x101, 0x0, {0x1, 0x8}}, {0x2, 0x9, {0x3, 0x6d}}, {0x3a, 0x8, {0x0, 0x7}}, {0x8, 0xcce, {0x0, 0x7}}, {0x2, 0x1, {0x0, 0x10000}}, {0x9, 0x40, {0x3, 0xffff}}, {0x6, 0x8f, {0x5, 0x8}}, {0x6, 0x2}, {0x200, 0x7fff, {0x3, 0x4}}, {0x3ff, 0xff, {0x2}}, {0x4, 0x1000, {0x2, 0x400000}}, {0x145, 0x7ff, {0x3, 0x3}}, {0x40, 0xff77, {0x3, 0x8}}, {0x7f, 0x81, {0x2, 0x6}}, {0x6, 0x7f, {0x0, 0x3f}}, {0x7ff, 0x3, {0x2, 0x80000000}}, {0x60c, 0x6, {0x1, 0x4}}, {0xa37f, 0x2, {0x0, 0x7}}, {0x7, 0x1, {0x2, 0x4}}, {0x3, 0x1, {0x0, 0x6}}, {0x3f, 0x4, {0x1, 0x8}}, {0x0, 0x401, {0x2}}, {0x1, 0x8, {0x0, 0x7fffffff}}, {0x1, 0x5, {0x0, 0x1800000}}, {0x7, 0x4c, {0x2, 0x5}}]}}}, {{0x254, 0x1, {{0x0, 0x3ff}, 0x7, 0x7d, 0x3, 0x180, 0x1f, 'syz0\x00', "68848567c1938c4b30d375286eaf866440b01d20276d3f85b3901eba48d035a0", "4b3747de716e3a2fc5b03fadbe7b61fff8bda94b1eaeecb2a3619539fe38d55b", [{0x8, 0xffff, {0x3, 0x7}}, {0x0, 0x3, {0x0, 0x8}}, {0x4, 0x2, {0x2, 0x985f}}, {0x9d7b, 0x2, {0x0, 0x1}}, {0x5, 0x92c3, {0x0, 0x7}}, {0x1e, 0x800, {0x0, 0x10000}}, {0x8a, 0x3, {0x1, 0x4}}, {0x8, 0x20, {0x3, 0x800}}, {0x7, 0x156e, {0x0, 0xe7da}}, {0x40, 0x4, {0x3, 0x9}}, {0x1ff, 0x1, {0x0, 0x3}}, {0x6, 0x0, {0x3, 0x3}}, {0x2c, 0x9, {0x3, 0x493e}}, {0x8, 0x101, {0x1, 0x2}}, {0x5, 0x5, {0x1, 0x20}}, {0x1, 0x0, {0x3, 0x1}}, {0x2, 0x4, {0x0, 0x10000}}, {0x4, 0x55, {0x0, 0x8}}, {0x60, 0x0, {0x2, 0x1ff}}, {0x28f, 0x63cc, {0x1, 0x40}}, {0x6, 0xffff, {0x2, 0x7fff}}, {0xa000, 0x6, {0x3, 0x8}}, {0x2, 0x5, {0x3, 0x5}}, {0x6, 0x80, {0x3, 0x1}}, {0x1000, 0xba, {0x2, 0x5}}, {0x5, 0x0, {0x3, 0x25}}, {0x9, 0xfff7, {0x1, 0x4}}, {0x200, 0x1f, {0x0, 0x494}}, {0x3f, 0x8, {0x2, 0x5}}, {0x0, 0x3, {0x0, 0x8}}, {0x8, 0x1ff, {0x0, 0xfffffff8}}, {0x1000, 0x400}, {0x8, 0x1ad, {0x2, 0xfe0}}, {0x3, 0xfa9, {0x3, 0x3}}, {0x80, 0x5, {0x2, 0xe6f3}}, {0x0, 0x1, {0x0, 0x8}}, {0x5, 0x75, {0x1, 0x6}}, {0x2e0, 0xffff, {0x2, 0x7}}, {0x0, 0x8, {0x1, 0x6}}, {0x0, 0xf6c8, {0x2, 0x54}}]}}}, {{0x254, 0x1, {{0x2}, 0x8, 0x4, 0x4000, 0x8, 0x2, 'syz0\x00', "1bf552ab8a252c8d557b95e98e9c31420fd3ffb12b97df56892e9c3534098a41", "eea8dbad1964de1b33537e4a437d922439e230fd9008f6c84ebd20eeff642d07", [{0xa4, 0x0, {0x0, 0x7}}, {0x81, 0xeea5, {0x0, 0x7}}, {0x0, 0x166, {0x2, 0x80}}, {0x400, 0x3, {0x2, 0x401}}, {0x1, 0x7, {0x3, 0x1f}}, {0x1000, 0xfffe, {0x47c909ff29e356d5, 0x5}}, {0x1f, 0x4, {0x3, 0x6}}, {0x2, 0x1, {0x3, 0x40}}, {0x4, 0x8, {0x1, 0xffffff05}}, {0xf0, 0x3ff, {0x0, 0x3}}, {0x2, 0x3, {0x0, 0x9}}, {0x5, 0x8, {0x1ec70f8f7fc1839, 0x8}}, {0x0, 0x0, {0x0, 0xcacd}}, {0x7f, 0x3f, {0x1, 0x10000}}, {0x1, 0x4, {0x2, 0x3}}, {0x100, 0x6, {0x1, 0xffffffff}}, {0x4, 0x9e, {0x2, 0x1}}, {0x3, 0x9, {0x0, 0x9}}, {0x1, 0x7, {0x2, 0x4}}, {0x6, 0x4, {0x1, 0x80000001}}, {0xff, 0x1, {0x1, 0x7}}, {0x1, 0x2, {0x3, 0x80}}, {0x0, 0x8, {0x1, 0x80}}, {0x2, 0x6, {0x2, 0x2c600000}}, {0x7fff, 0x1, {0x2, 0x1}}, {0x800, 0x5, {0x3}}, {0x400, 0x3, {0x3, 0x4}}, {0x1, 0x1f, {0x0, 0x8}}, {0xff5c, 0x4, {0x2, 0x8000}}, {0x3ff, 0x926, {0x3, 0x9}}, {0x9, 0x8000, {0x0, 0x2b}}, {0x1, 0x7, {0x1, 0x20}}, {0xad1, 0x200, {0x1, 0xffffffff}}, {0x9, 0x101, {0x1, 0x8001}}, {0x6, 0x42, {0xbf09954a20fe5e08, 0x8}}, {0x200, 0x7, {0x0, 0x9}}, {0x8, 0x1, {0x1, 0xfffffffd}}, {0x1, 0x2c, {0x0, 0x9}}, {0xfbff, 0x401, {0x3, 0x9}}, {0x5, 0x7f, {0x1, 0x3}}]}}}, {{0x254, 0x1, {{0x1, 0x5}, 0x81, 0x9, 0xff, 0x7, 0x16, 'syz1\x00', "e711e9e2273a5e4edd1dadb17333904e4d2fee2f1a323b5736c669950bf6097d", "0eecc25b95465733238215a27325fcfcf48c41a93a74d892ba91a060f958c9dc", [{0x7ff, 0x5, {0x0, 0x9}}, {0x2, 0x9, {0x0, 0x9db}}, {0x5, 0x3, {0x3, 0xfffffffc}}, {0x2, 0x2, {0x8dc1c348b8743d9c, 0x9f}}, {0x4, 0x8, {0x1, 0x6}}, {0x6a8, 0x7ff, {0x3, 0x1}}, {0x0, 0x8, {0x2, 0xe7ad}}, {0x4000, 0x8, {0x1, 0x4}}, {0x7, 0x3, {0x2, 0xa3}}, {0x8, 0x6, {0x2, 0x4}}, {0xdb9, 0x6, {0x1, 0x1}}, {0x81, 0x6, {0x0, 0x3}}, {0x5e7, 0x3, {0x3, 0xff}}, {0x2, 0x9, {0x1, 0xa716}}, {0x1, 0xfd52, {0x0, 0xffffe759}}, {0x4, 0x40, {0x3, 0x6d3800}}, {0x4, 0x40, {0x2, 0x9}}, {0x7f, 0x8000, {0x1, 0x21c}}, {0x9, 0x7, {0x3, 0x1f20}}, {0x7f, 0x1000, {0x2, 0xffffffff}}, {0xfdf9, 0x7ff, {0x0, 0x1}}, {0xc1, 0x7, {0x2, 0x6}}, {0xfff7, 0x1, {0x0, 0x1}}, {0x7, 0x9, {0x2, 0xfffffffc}}, {0x7, 0x0, {0x1, 0x3f}}, {0xe5, 0x9, {0x3, 0x7}}, {0x1, 0x1000, {0x3, 0xf349}}, {0x8, 0x40, {0x2, 0x1}}, {0x7, 0x2, {0x2, 0x7}}, {0x6, 0x7fff, {0x3, 0x8}}, {0x988, 0x2, {0x1, 0x477}}, {0x7fff, 0x4, {0x1, 0x7fffffff}}, {0x8, 0x7f, {0x2, 0x3286}}, {0x1, 0x6, {0x2, 0x17c00000}}, {0x400, 0x9, {0x1, 0xa8}}, {0x120, 0x3, {0x2, 0xdd}}, {0x8ddf, 0xfec2, {0x1, 0xfff}}, {0x5, 0x0, {0x0, 0x68}}, {0x101, 0xffc1, {0x2}}, {0x1ff, 0x0, {0x0, 0x3}}]}}}, {{0x254, 0x1, {{0x3}, 0x20, 0x6, 0xff, 0x0, 0x3, 'syz0\x00', "9685c2e2dbef8e4574587cc85e7633eaff6658125e99e155416906da19c03e83", "df5dc8a4b82a113323fef68384872fe84d49bd1243dc1cd25a80960b0b80f991", [{0x6, 0x8001, {0x3, 0xfffffffc}}, {0xfff, 0x7, {0x2}}, {0x3ff, 0x1ff, {0x1, 0x80000001}}, {0x101, 0x800, {0x3, 0x101}}, {0x3, 0x9, {0x0, 0x6}}, {0xff, 0x800, {0x3, 0x8001}}, {0x100, 0xfffc, {0x1, 0xad65}}, {0x1ff, 0x8ca9, {0x2}}, {0x8b06, 0xff, {0x1, 0xffffffff}}, {0x8, 0x3, {0x1, 0x6}}, {0x0, 0x4, {0x3, 0x3}}, {0x9, 0xff, {0x1}}, {0x9, 0x81, {0x0, 0x4}}, {0x5, 0xbe5, {0x3, 0x8}}, {0x2, 0x3f, {0x2, 0x5}}, {0x2, 0x3, {0x1, 0x80000000}}, {0x7fff, 0xb92d, {0x2, 0xffff}}, {0x4, 0x0, {0x2, 0x3ff}}, {0x8a, 0x70, {0x0, 0xd5}}, {0x5c, 0x0, {0x2, 0x20}}, {0x400, 0x6, {0x3}}, {0x1, 0x896, {0x1, 0x5844cc09}}, {0x8, 0xef06}, {0x1, 0x29, {0x0, 0x2}}, {0x101, 0xa9, {0x3, 0x4}}, {0xf800, 0x8, {0x1, 0x8}}, {0x1000, 0xa4, {0x2, 0x101}}, {0x7fff, 0x1}, {0x0, 0x2, {0x2, 0xfffffbff}}, {0x9, 0xd, {0x0, 0x8}}, {0x1f, 0x228, {0x3}}, {0xe8e, 0xff, {0x0, 0x6}}, {0x81e, 0x3, {0x3, 0x80000000}}, {0x3, 0x7, {0x0, 0x1}}, {0x9, 0x1, {0x0, 0x9}}, {0x4, 0x80, {0x1, 0xfff}}, {0x1, 0x7, {0x0, 0x1f}}, {0xff80, 0x9, {0x1}}, {0x338, 0x3ff, {0x1, 0x5a5}}, {0x1, 0x57, {0x2, 0x2}}]}}}]}, 0xbb8}, 0x1, 0x0, 0x0, 0x50}, 0x24040810) rt_sigprocmask(0x2, 0x0, 0x0, 0x0) 05:59:04 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x10080, 0x0) 05:59:04 executing program 5: clone3(&(0x7f00000006c0)={0xdc02, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:04 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 33) 05:59:04 executing program 4: rt_sigprocmask(0x2, 0x0, 0x0, 0x0) 05:59:04 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) 05:59:04 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 35) 05:59:04 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r2) keyctl$search(0xa, r1, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, r0) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:04 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 31) 05:59:04 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) 05:59:15 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 36) 05:59:15 executing program 1: clone3(&(0x7f00000006c0)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:15 executing program 5: clone3(&(0x7f00000006c0)={0xf400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:15 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 34) 05:59:15 executing program 2: sendmsg$NFT_MSG_GETCHAIN(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES32], 0x28}, 0x1, 0x0, 0x0, 0x2}, 0x0) socket(0x22, 0x80000, 0x5) 05:59:15 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) 05:59:15 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 32) 05:59:15 executing program 4: sendmsg$NLBL_UNLABEL_C_STATICLIST(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x5}, 0x4000000) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) [ 2883.579920] FAULT_INJECTION: forcing a failure. [ 2883.579920] name failslab, interval 1, probability 0, space 0, times 0 [ 2883.582091] CPU: 1 UID: 0 PID: 17254 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2883.582133] Tainted: [W]=WARN [ 2883.582141] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2883.582156] Call Trace: [ 2883.582164] [ 2883.582174] dump_stack_lvl+0xfa/0x120 [ 2883.582221] should_fail_ex+0x4d7/0x5e0 [ 2883.582257] ? vm_area_dup+0x25/0x6f0 [ 2883.582284] should_failslab+0xc2/0x120 [ 2883.582315] kmem_cache_alloc_noprof+0x72/0x690 [ 2883.582343] ? find_held_lock+0x2b/0x80 [ 2883.582383] ? dup_mmap+0x5d3/0x1d10 [ 2883.582424] ? vm_area_dup+0x25/0x6f0 [ 2883.582450] vm_area_dup+0x25/0x6f0 [ 2883.582480] dup_mmap+0x80d/0x1d10 [ 2883.582531] ? __pfx_dup_mmap+0x10/0x10 [ 2883.582583] ? lock_is_held_type+0x9e/0x120 [ 2883.582637] copy_process+0x3ad5/0x73c0 [ 2883.582664] ? __pfx__kstrtoull+0x10/0x10 [ 2883.582734] ? __pfx_copy_process+0x10/0x10 [ 2883.582761] ? __might_fault+0xe0/0x190 [ 2883.582798] ? _copy_from_user+0x5b/0xd0 [ 2883.582836] kernel_clone+0xea/0x7f0 [ 2883.582862] ? get_pid_task+0xfd/0x250 [ 2883.582890] ? __pfx_kernel_clone+0x10/0x10 [ 2883.582927] ? find_held_lock+0x2b/0x80 [ 2883.582965] ? ksys_write+0x121/0x240 [ 2883.582993] ? lock_is_held_type+0x9e/0x120 [ 2883.583035] __do_sys_clone3+0x1f5/0x280 [ 2883.583063] ? __pfx___do_sys_clone3+0x10/0x10 [ 2883.583110] ? __fget_files+0x20d/0x3b0 [ 2883.583145] ? fput+0x6a/0x100 [ 2883.583178] ? ksys_write+0x1a3/0x240 [ 2883.583204] ? __pfx_ksys_write+0x10/0x10 [ 2883.583235] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2883.583269] do_syscall_64+0xbf/0x360 [ 2883.583295] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2883.583322] RIP: 0033:0x7f232c718b19 [ 2883.583342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2883.583366] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2883.583392] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2883.583409] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2883.583425] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2883.583441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2883.583456] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2883.583493] [ 2883.665007] FAULT_INJECTION: forcing a failure. [ 2883.665007] name failslab, interval 1, probability 0, space 0, times 0 [ 2883.666881] CPU: 1 UID: 0 PID: 17269 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2883.666921] Tainted: [W]=WARN [ 2883.666929] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2883.666943] Call Trace: [ 2883.666951] [ 2883.666960] dump_stack_lvl+0xfa/0x120 [ 2883.667006] should_fail_ex+0x4d7/0x5e0 [ 2883.667039] ? mas_dup_build+0x5ce/0x1690 [ 2883.667061] should_failslab+0xc2/0x120 [ 2883.667092] kmem_cache_alloc_noprof+0x72/0x690 [ 2883.667128] ? mas_dup_build+0x5ce/0x1690 [ 2883.667150] mas_dup_build+0x5ce/0x1690 [ 2883.667185] __mt_dup+0xed/0x1f0 [ 2883.667207] ? __pfx___mt_dup+0x10/0x10 [ 2883.667228] ? lock_acquire+0x15e/0x2f0 [ 2883.667264] ? get_mm_exe_file+0x27/0x1a0 [ 2883.667289] ? find_held_lock+0x2b/0x80 [ 2883.667337] ? get_mm_exe_file+0x96/0x1a0 [ 2883.667365] dup_mmap+0x373/0x1d10 [ 2883.667413] ? __pfx_dup_mmap+0x10/0x10 [ 2883.667462] ? lock_is_held_type+0x9e/0x120 [ 2883.667505] copy_process+0x3ad5/0x73c0 [ 2883.667529] ? __pfx__kstrtoull+0x10/0x10 [ 2883.667582] ? __pfx_copy_process+0x10/0x10 [ 2883.667615] ? __might_fault+0xe0/0x190 [ 2883.667650] ? _copy_from_user+0x5b/0xd0 [ 2883.667686] kernel_clone+0xea/0x7f0 [ 2883.667711] ? get_pid_task+0xfd/0x250 [ 2883.667737] ? __pfx_kernel_clone+0x10/0x10 [ 2883.667772] ? find_held_lock+0x2b/0x80 [ 2883.667809] ? ksys_write+0x121/0x240 [ 2883.667836] ? lock_is_held_type+0x9e/0x120 [ 2883.667875] __do_sys_clone3+0x1f5/0x280 [ 2883.667901] ? __pfx___do_sys_clone3+0x10/0x10 [ 2883.667945] ? __fget_files+0x20d/0x3b0 [ 2883.667978] ? fput+0x6a/0x100 [ 2883.668009] ? ksys_write+0x1a3/0x240 [ 2883.668034] ? __pfx_ksys_write+0x10/0x10 [ 2883.668063] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2883.668095] do_syscall_64+0xbf/0x360 [ 2883.668119] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2883.668145] RIP: 0033:0x7f3a168c2b19 [ 2883.668164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2883.668188] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2883.668212] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2883.668229] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2883.668244] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2883.668259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2883.668274] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2883.668307] 05:59:15 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r2) keyctl$search(0xa, r1, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, r0) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:15 executing program 4: r0 = clone3(&(0x7f0000000280)={0x812800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x1e}, &(0x7f00000000c0)=""/111, 0x6f, &(0x7f0000000140)=""/244, &(0x7f0000000240)}, 0x58) process_vm_writev(r0, &(0x7f00000017c0)=[{&(0x7f0000000300)=""/76, 0x4c}, {&(0x7f0000000380)=""/247, 0xf7}, {&(0x7f0000000480)=""/190, 0xbe}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/87, 0x57}, {&(0x7f00000015c0)=""/161, 0xa1}, {&(0x7f0000001680)=""/133, 0x85}, {&(0x7f0000001740)}, {&(0x7f0000001780)=""/4, 0x4}], 0x9, &(0x7f0000001c00)=[{&(0x7f0000001880)=""/57, 0x39}, {&(0x7f00000018c0)=""/70, 0x46}, {&(0x7f0000001940)=""/9, 0x9}, {&(0x7f0000001980)=""/111, 0x6f}, {&(0x7f0000001a00)=""/31, 0x1f}, {&(0x7f0000001a40)=""/170, 0xaa}, {&(0x7f0000001b00)=""/248, 0xf8}], 0x7, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 05:59:15 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 33) 05:59:15 executing program 5: clone3(&(0x7f00000006c0)={0x20010, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:16 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 37) 05:59:16 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 35) 05:59:16 executing program 2: socket(0x22, 0x80000, 0x5) 05:59:16 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r2) keyctl$search(0xa, r1, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, r0) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:16 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) r1 = inotify_add_watch(r0, 0x0, 0x20000000) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000003c0)={'gretap0\x00', &(0x7f00000002c0)={'tunl0\x00', 0x0, 0x786, 0x40, 0x0, 0x80, {{0x2d, 0x4, 0x3, 0xc, 0xb4, 0x68, 0x0, 0x20, 0x2f, 0x0, @local, @empty, {[@ra={0x94, 0x4}, @rr={0x7, 0x1f, 0x8e, [@rand_addr=0x64010100, @remote, @private=0xa010101, @dev={0xac, 0x14, 0x14, 0x26}, @multicast2, @empty, @local]}, @noop, @lsrr={0x83, 0x13, 0x8a, [@multicast1, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @ssrr={0x89, 0x7, 0x44, [@private=0xa010102]}, @end, @cipso={0x86, 0x35, 0x3, [{0x2, 0xe, "8b3c0664d91799d85dec0973"}, {0x1, 0x8, "28db9bae3c49"}, {0x1, 0xe, "0581d47800374a5105397cf1"}, {0x6, 0xb, "b3c45b52ea5b390b60"}]}, @timestamp_addr={0x44, 0x1c, 0xc4, 0x1, 0xa, [{@local, 0x20}, {@multicast2, 0x8}, {@loopback, 0x6}]}, @rr={0x7, 0xf, 0x70, [@multicast2, @private=0xa010102, @rand_addr=0x64010100]}]}}}}}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000005c0), r0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000700)={'tunl0\x00', &(0x7f0000000600)={'syztnl1\x00', r2, 0x10, 0x7800, 0x785, 0x55c23ef6, {{0x29, 0x4, 0x1, 0x2, 0xa4, 0x65, 0x0, 0xff, 0x0, 0x0, @broadcast, @remote, {[@timestamp_addr={0x44, 0x4, 0x39, 0x1, 0x5}, @timestamp_addr={0x44, 0x2c, 0x7d, 0x1, 0x9, [{@local, 0x81}, {@local, 0x1}, {@multicast1, 0xff}, {@dev={0xac, 0x14, 0x14, 0x2b}, 0x40}, {@rand_addr=0x64010102, 0x1f}]}, @rr={0x7, 0xf, 0x93, [@rand_addr=0x64010102, @private=0xa010100, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp_addr={0x44, 0x34, 0xe4, 0x1, 0x7, [{@broadcast, 0x8}, {@loopback, 0x80000000}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x7}, {@multicast2, 0xf85}, {@broadcast, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}]}, @noop, @end, @ssrr={0x89, 0x1b, 0x1e, [@local, @rand_addr=0x64010101, @private=0xa010100, @remote, @dev={0xac, 0x14, 0x14, 0x26}, @multicast2]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f00000007c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000780)={&(0x7f0000000740)={0x2c, r3, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x20}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x14}, 0x1) inotify_rm_watch(r0, r1) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000540)={'gre0\x00', &(0x7f0000000400)={'ip_vti0\x00', r2, 0x10, 0x7800, 0x8, 0x1, {{0x3e, 0x4, 0x3, 0x1, 0xf8, 0x64, 0x0, 0x5, 0x29, 0x0, @remote, @loopback, {[@timestamp_addr={0x44, 0x1c, 0x9a, 0x1, 0xe, [{@empty, 0xd85}, {@local, 0x400}, {@dev={0xac, 0x14, 0x14, 0x34}, 0x10000}]}, @timestamp_addr={0x44, 0x24, 0x12, 0x1, 0x3, [{@multicast1, 0x8}, {@dev={0xac, 0x14, 0x14, 0x17}, 0x10000}, {@empty, 0x3f}, {@rand_addr=0x64010102, 0x4}]}, @cipso={0x86, 0x58, 0xffffffffffffffff, [{0x5, 0xa, "75edc558cee538a8"}, {0x5, 0x9, "4b6b06dff969e3"}, {0x2, 0x8, "4d438caa8565"}, {0x3, 0x4, "8ff6"}, {0x5, 0xf, "a1c501e9fd74db5980df743694"}, {0x2, 0x10, "df7fd7388afd1b0a0e5f230eeddb"}, {0x0, 0x2}, {0x2, 0x4, "ab70"}, {0x0, 0xe, "d205b2c67e7cfab9d70dbd06"}]}, @end, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x22, 0x3, [{0x6, 0xa, "652d29b484614084"}, {0x5, 0xd, "f48c8b2fb682399bffe69d"}, {0x0, 0x5, "e24828"}]}, @end, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0xc, 0xb6, 0x1, 0xe, [{@broadcast, 0x1400000}]}, @timestamp_prespec={0x44, 0x14, 0xd1, 0x3, 0x4, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7fff}, {@local, 0x7fff}]}]}}}}}) rt_sigprocmask(0x0, &(0x7f0000000240)={[0x1]}, &(0x7f0000000280), 0x8) r5 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="a687c1719522458ac5b5c99faca311521586e88071d25a450161e0ac2dbb0412b1aff4d1a91f4de30ed06d3d7a894e6aac8ea0deb1e32780316b3e00d9f3cb3dbf42b746e76ce2dfaeb1e34d1b5087f16d7abe14b75a6dfe4c7c3a5f2121bfd1869633f83f308c10eb4994ed8263b4fd986670dd1bd75c51903acd41af49035582772b0b9849e5d9bfd1a9badad3e154ad2cd3540d6fcbdc9707ee7fa5ce8774621a077ab93ff6d81c5639e778c1e9702ab483474ef197e75b8619f71d011589816f1e183656cb88fa04c236c19d39fda338e6602de04e910416f41f6c207f4ca94d0899bd3549ee80077051", 0xec, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000180)={r5}, &(0x7f00000001c0)=""/94, 0x5e, 0x0) 05:59:26 executing program 5: clone3(&(0x7f00000006c0)={0x20200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:26 executing program 1: clone3(0x0, 0x0) 05:59:26 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 34) 05:59:26 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 36) 05:59:26 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r2) keyctl$search(0xa, r1, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r0) keyctl$search(0xa, 0x0, &(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x1}, r0) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:26 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 38) 05:59:26 executing program 2: socket(0x0, 0x80000, 0x5) 05:59:26 executing program 4: rt_sigprocmask(0x2, 0x0, 0x0, 0x0) [ 2894.289427] FAULT_INJECTION: forcing a failure. [ 2894.289427] name failslab, interval 1, probability 0, space 0, times 0 [ 2894.291474] CPU: 1 UID: 0 PID: 17309 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2894.291518] Tainted: [W]=WARN [ 2894.291527] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2894.291542] Call Trace: [ 2894.291552] [ 2894.291562] dump_stack_lvl+0xfa/0x120 [ 2894.291619] should_fail_ex+0x4d7/0x5e0 [ 2894.291660] ? vm_area_dup+0x25/0x6f0 [ 2894.291689] should_failslab+0xc2/0x120 [ 2894.291722] kmem_cache_alloc_noprof+0x72/0x690 [ 2894.291762] ? vm_area_dup+0x25/0x6f0 [ 2894.291788] ? __vm_enough_memory+0x188/0x400 [ 2894.291817] vm_area_dup+0x25/0x6f0 [ 2894.291849] dup_mmap+0x80d/0x1d10 [ 2894.291901] ? __pfx_dup_mmap+0x10/0x10 [ 2894.291956] ? lock_is_held_type+0x9e/0x120 [ 2894.292002] copy_process+0x3ad5/0x73c0 [ 2894.292030] ? __pfx__kstrtoull+0x10/0x10 [ 2894.292089] ? __pfx_copy_process+0x10/0x10 [ 2894.292118] ? __might_fault+0xe0/0x190 [ 2894.292155] ? _copy_from_user+0x5b/0xd0 [ 2894.292195] kernel_clone+0xea/0x7f0 [ 2894.292222] ? get_pid_task+0xfd/0x250 [ 2894.292252] ? __pfx_kernel_clone+0x10/0x10 [ 2894.292290] ? find_held_lock+0x2b/0x80 [ 2894.292332] ? ksys_write+0x121/0x240 [ 2894.292361] ? lock_is_held_type+0x9e/0x120 [ 2894.292404] __do_sys_clone3+0x1f5/0x280 [ 2894.292433] ? __pfx___do_sys_clone3+0x10/0x10 [ 2894.292482] ? __fget_files+0x20d/0x3b0 [ 2894.292518] ? fput+0x6a/0x100 [ 2894.292552] ? ksys_write+0x1a3/0x240 [ 2894.292580] ? __pfx_ksys_write+0x10/0x10 [ 2894.292612] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2894.292647] do_syscall_64+0xbf/0x360 [ 2894.292674] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2894.292702] RIP: 0033:0x7f232c718b19 [ 2894.292723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2894.292750] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2894.292776] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2894.292795] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2894.292811] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2894.292828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2894.292844] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2894.292881] [ 2894.292965] FAULT_INJECTION: forcing a failure. [ 2894.292965] name failslab, interval 1, probability 0, space 0, times 0 [ 2894.327193] CPU: 0 UID: 0 PID: 17311 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2894.327229] Tainted: [W]=WARN [ 2894.327237] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2894.327249] Call Trace: [ 2894.327257] [ 2894.327266] dump_stack_lvl+0xfa/0x120 [ 2894.327303] should_fail_ex+0x4d7/0x5e0 [ 2894.327333] ? vm_area_dup+0x25/0x6f0 [ 2894.327355] should_failslab+0xc2/0x120 05:59:26 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x1, 0x5) [ 2894.327381] kmem_cache_alloc_noprof+0x72/0x690 [ 2894.327405] ? find_held_lock+0x2b/0x80 [ 2894.327438] ? dup_mmap+0x5d3/0x1d10 [ 2894.327474] ? vm_area_dup+0x25/0x6f0 [ 2894.327496] vm_area_dup+0x25/0x6f0 [ 2894.327523] dup_mmap+0x80d/0x1d10 [ 2894.327566] ? __pfx_dup_mmap+0x10/0x10 [ 2894.327618] ? lock_is_held_type+0x9e/0x120 [ 2894.327656] copy_process+0x3ad5/0x73c0 [ 2894.327678] ? __pfx__kstrtoull+0x10/0x10 [ 2894.327731] ? __pfx_copy_process+0x10/0x10 [ 2894.327756] ? __might_fault+0xe0/0x190 [ 2894.327787] ? _copy_from_user+0x5b/0xd0 [ 2894.327820] kernel_clone+0xea/0x7f0 [ 2894.327842] ? get_pid_task+0xfd/0x250 [ 2894.327866] ? __pfx_kernel_clone+0x10/0x10 [ 2894.327898] ? find_held_lock+0x2b/0x80 [ 2894.327931] ? ksys_write+0x121/0x240 [ 2894.327954] ? lock_is_held_type+0x9e/0x120 [ 2894.327990] __do_sys_clone3+0x1f5/0x280 [ 2894.328014] ? __pfx___do_sys_clone3+0x10/0x10 [ 2894.328055] ? __fget_files+0x20d/0x3b0 [ 2894.328084] ? fput+0x6a/0x100 [ 2894.328113] ? ksys_write+0x1a3/0x240 [ 2894.328136] ? __pfx_ksys_write+0x10/0x10 [ 2894.328163] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2894.328191] do_syscall_64+0xbf/0x360 [ 2894.328214] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2894.328237] RIP: 0033:0x7fb9f533db19 [ 2894.328253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2894.328276] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2894.328297] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2894.328313] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2894.328326] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2894.328340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2894.328354] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2894.328385] 05:59:26 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r2) keyctl$search(0xa, r1, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x2}, r2) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r0) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:26 executing program 5: clone3(&(0x7f00000006c0)={0x80000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:26 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 39) 05:59:26 executing program 1: clone3(0x0, 0x0) 05:59:26 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r2) keyctl$search(0xa, r1, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x2}, r2) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:37 executing program 1: clone3(0x0, 0x0) 05:59:37 executing program 5: clone3(&(0x7f00000006c0)={0x101000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:37 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000000)={@private1, 0x73}) 05:59:37 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r2) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:37 executing program 2: socket(0x0, 0x80000, 0x5) 05:59:37 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 37) 05:59:37 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 35) 05:59:37 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 40) 05:59:37 executing program 4: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x200, 0x70bd2a, 0xffc0000, {{}, {@void, @void}}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040004}, 0x4000004) 05:59:37 executing program 1: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:37 executing program 5: clone3(&(0x7f00000006c0)={0x104000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:37 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r2) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:37 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 41) 05:59:37 executing program 2: socket(0x0, 0x80000, 0x5) 05:59:37 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 38) 05:59:37 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 36) 05:59:37 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x8]}, &(0x7f0000000040), 0x8) [ 2905.399004] FAULT_INJECTION: forcing a failure. [ 2905.399004] name failslab, interval 1, probability 0, space 0, times 0 [ 2905.400730] CPU: 0 UID: 0 PID: 17368 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2905.400767] Tainted: [W]=WARN [ 2905.400774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2905.400788] Call Trace: [ 2905.400796] [ 2905.400806] dump_stack_lvl+0xfa/0x120 [ 2905.400850] should_fail_ex+0x4d7/0x5e0 [ 2905.400883] ? vm_area_dup+0x25/0x6f0 [ 2905.400908] should_failslab+0xc2/0x120 [ 2905.400937] kmem_cache_alloc_noprof+0x72/0x690 [ 2905.400972] ? vm_area_dup+0x25/0x6f0 [ 2905.400994] ? __vm_enough_memory+0x188/0x400 [ 2905.401020] vm_area_dup+0x25/0x6f0 [ 2905.401046] dup_mmap+0x80d/0x1d10 [ 2905.401091] ? __pfx_dup_mmap+0x10/0x10 [ 2905.401137] ? lock_is_held_type+0x9e/0x120 [ 2905.401178] copy_process+0x3ad5/0x73c0 [ 2905.401202] ? __pfx__kstrtoull+0x10/0x10 [ 2905.401252] ? __pfx_copy_process+0x10/0x10 [ 2905.401276] ? __might_fault+0xe0/0x190 [ 2905.401308] ? _copy_from_user+0x5b/0xd0 [ 2905.401342] kernel_clone+0xea/0x7f0 [ 2905.401365] ? get_pid_task+0xfd/0x250 [ 2905.401390] ? __pfx_kernel_clone+0x10/0x10 [ 2905.401422] ? find_held_lock+0x2b/0x80 [ 2905.401458] ? ksys_write+0x121/0x240 [ 2905.401483] ? lock_is_held_type+0x9e/0x120 [ 2905.401520] __do_sys_clone3+0x1f5/0x280 [ 2905.401544] ? __pfx___do_sys_clone3+0x10/0x10 [ 2905.401585] ? __fget_files+0x20d/0x3b0 [ 2905.401623] ? fput+0x6a/0x100 [ 2905.401653] ? ksys_write+0x1a3/0x240 [ 2905.401676] ? __pfx_ksys_write+0x10/0x10 [ 2905.401703] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2905.401733] do_syscall_64+0xbf/0x360 [ 2905.401756] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2905.401780] RIP: 0033:0x7fb9f533db19 [ 2905.401798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2905.401821] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2905.401844] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2905.401860] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2905.401874] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2905.401888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2905.401902] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2905.401934] 05:59:37 executing program 1: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:37 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:37 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000100), 0x0, 0x8) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x200, 0x6, 0x25dfdbff, {{}, {}, {0x14, 0x18, {0x10001, @bearer=@l2={'eth', 0x3a, 'ip6tnl0\x00'}}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x800}, 0x41) 05:59:37 executing program 2: socket(0x22, 0x0, 0x5) 05:59:48 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 39) 05:59:48 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r1) keyctl$search(0xa, r1, &(0x7f0000000080)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, r0) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:48 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 37) 05:59:48 executing program 1: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:48 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 42) 05:59:48 executing program 4: rt_sigprocmask(0x1, 0x0, 0x0, 0x41) rt_sigprocmask(0x3, &(0x7f0000000000)={[0x2ce3]}, &(0x7f0000000040), 0x8) 05:59:48 executing program 2: socket(0x22, 0x0, 0x0) 05:59:48 executing program 5: clone3(&(0x7f00000006c0)={0x401000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2916.401708] FAULT_INJECTION: forcing a failure. [ 2916.401708] name failslab, interval 1, probability 0, space 0, times 0 [ 2916.403467] CPU: 1 UID: 0 PID: 17393 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2916.403502] Tainted: [W]=WARN [ 2916.403509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2916.403522] Call Trace: [ 2916.403529] [ 2916.403538] dump_stack_lvl+0xfa/0x120 [ 2916.403584] should_fail_ex+0x4d7/0x5e0 [ 2916.403621] ? anon_vma_fork+0xe6/0x630 [ 2916.403651] should_failslab+0xc2/0x120 [ 2916.403678] kmem_cache_alloc_noprof+0x72/0x690 [ 2916.403700] ? anon_vma_clone+0x3be/0x570 [ 2916.403738] ? anon_vma_fork+0xe6/0x630 [ 2916.403767] anon_vma_fork+0xe6/0x630 [ 2916.403796] ? vm_area_dup+0x3e7/0x6f0 [ 2916.403823] dup_mmap+0x1207/0x1d10 [ 2916.403865] ? __pfx_dup_mmap+0x10/0x10 [ 2916.403909] ? lock_is_held_type+0x9e/0x120 [ 2916.403947] copy_process+0x3ad5/0x73c0 [ 2916.403969] ? __pfx__kstrtoull+0x10/0x10 [ 2916.404016] ? __pfx_copy_process+0x10/0x10 [ 2916.404039] ? __might_fault+0xe0/0x190 [ 2916.404069] ? _copy_from_user+0x5b/0xd0 [ 2916.404101] kernel_clone+0xea/0x7f0 [ 2916.404122] ? get_pid_task+0xfd/0x250 [ 2916.404146] ? __pfx_kernel_clone+0x10/0x10 [ 2916.404177] ? find_held_lock+0x2b/0x80 [ 2916.404211] ? ksys_write+0x121/0x240 [ 2916.404234] ? lock_is_held_type+0x9e/0x120 [ 2916.404268] __do_sys_clone3+0x1f5/0x280 [ 2916.404291] ? __pfx___do_sys_clone3+0x10/0x10 [ 2916.404331] ? __fget_files+0x20d/0x3b0 [ 2916.404364] ? fput+0x6a/0x100 [ 2916.404392] ? ksys_write+0x1a3/0x240 [ 2916.404413] ? __pfx_ksys_write+0x10/0x10 [ 2916.404439] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2916.404467] do_syscall_64+0xbf/0x360 [ 2916.404489] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2916.404512] RIP: 0033:0x7f232c718b19 [ 2916.404529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2916.404550] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2916.404571] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2916.404586] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2916.404599] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2916.404612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2916.404624] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2916.404655] 05:59:48 executing program 4: rt_sigprocmask(0x1, 0x0, 0x0, 0x0) 05:59:48 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000001a40), 0x0, 0x0, 0x0, r1) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:48 executing program 5: clone3(&(0x7f00000006c0)={0x1000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:48 executing program 1: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:48 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 38) 05:59:48 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 43) 05:59:48 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 40) 05:59:48 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2916.718322] FAULT_INJECTION: forcing a failure. [ 2916.718322] name failslab, interval 1, probability 0, space 0, times 0 [ 2916.720023] CPU: 1 UID: 0 PID: 17417 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2916.720058] Tainted: [W]=WARN [ 2916.720065] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2916.720077] Call Trace: [ 2916.720085] [ 2916.720094] dump_stack_lvl+0xfa/0x120 [ 2916.720133] should_fail_ex+0x4d7/0x5e0 [ 2916.720162] ? vm_area_dup+0x25/0x6f0 [ 2916.720185] should_failslab+0xc2/0x120 [ 2916.720211] kmem_cache_alloc_noprof+0x72/0x690 [ 2916.720242] ? vm_area_dup+0x25/0x6f0 [ 2916.720263] ? __vm_enough_memory+0x188/0x400 [ 2916.720286] vm_area_dup+0x25/0x6f0 [ 2916.720310] dup_mmap+0x80d/0x1d10 [ 2916.720352] ? __pfx_dup_mmap+0x10/0x10 [ 2916.720395] ? lock_is_held_type+0x9e/0x120 [ 2916.720432] copy_process+0x3ad5/0x73c0 [ 2916.720454] ? __pfx__kstrtoull+0x10/0x10 [ 2916.720500] ? __pfx_copy_process+0x10/0x10 [ 2916.720523] ? __might_fault+0xe0/0x190 [ 2916.720552] ? _copy_from_user+0x5b/0xd0 [ 2916.720584] kernel_clone+0xea/0x7f0 [ 2916.720612] ? get_pid_task+0xfd/0x250 [ 2916.720636] ? __pfx_kernel_clone+0x10/0x10 [ 2916.720667] ? find_held_lock+0x2b/0x80 [ 2916.720699] ? ksys_write+0x121/0x240 [ 2916.720723] ? lock_is_held_type+0x9e/0x120 [ 2916.720757] __do_sys_clone3+0x1f5/0x280 [ 2916.720779] ? __pfx___do_sys_clone3+0x10/0x10 [ 2916.720818] ? __fget_files+0x20d/0x3b0 [ 2916.720847] ? fput+0x6a/0x100 [ 2916.720874] ? ksys_write+0x1a3/0x240 [ 2916.720896] ? __pfx_ksys_write+0x10/0x10 [ 2916.720921] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2916.720949] do_syscall_64+0xbf/0x360 [ 2916.720971] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2916.720993] RIP: 0033:0x7f3a168c2b19 [ 2916.721010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2916.721031] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2916.721052] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2916.721066] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2916.721079] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2916.721092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2916.721105] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2916.721135] 05:59:58 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:58 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 41) 05:59:58 executing program 2: clone3(&(0x7f00000006c0)={0x1000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:58 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x200, 0x70bd2a, 0xffc0000, {{}, {@void, @void}}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040004}, 0x4000004) 05:59:58 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 39) 05:59:58 executing program 5: clone3(&(0x7f00000006c0)={0x2000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 05:59:58 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 44) 05:59:58 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, r2, 0x800, 0x70bd2d, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x36}, @void, @val={0xc, 0x99, {0x0, 0x5d}}}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x10040010}, 0x4000) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x8070bd2b, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x8010) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r3, 0x0, 0x20000000) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r4, 0x0, 0x20000000) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000400), r3) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)={0x84, r5, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x81}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}]}, 0x84}}, 0x800) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f00000005c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x6c, r6, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}, @MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x3f}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @rand_addr=' \x01\x00'}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000050}, 0x40031) sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x4, 0x70bd2b, 0x25dfdbfd, {{}, {}, {0x8, 0x2, 0xc603}}, ["", "", "", "", "", ""]}, 0x24}}, 0x40800) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) [ 2926.435385] FAULT_INJECTION: forcing a failure. [ 2926.435385] name failslab, interval 1, probability 0, space 0, times 0 [ 2926.436433] CPU: 0 UID: 0 PID: 17437 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2926.436454] Tainted: [W]=WARN [ 2926.436458] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2926.436466] Call Trace: [ 2926.436470] [ 2926.436475] dump_stack_lvl+0xfa/0x120 [ 2926.436502] should_fail_ex+0x4d7/0x5e0 [ 2926.436521] ? anon_vma_fork+0x1f4/0x630 [ 2926.436540] should_failslab+0xc2/0x120 [ 2926.436557] kmem_cache_alloc_noprof+0x72/0x690 [ 2926.436570] ? anon_vma_clone+0x3be/0x570 [ 2926.436596] ? anon_vma_fork+0x1f4/0x630 [ 2926.436614] anon_vma_fork+0x1f4/0x630 [ 2926.436634] dup_mmap+0x1207/0x1d10 [ 2926.436659] ? __pfx_dup_mmap+0x10/0x10 [ 2926.436685] ? lock_is_held_type+0x9e/0x120 [ 2926.436707] copy_process+0x3ad5/0x73c0 [ 2926.436721] ? __pfx__kstrtoull+0x10/0x10 [ 2926.436749] ? __pfx_copy_process+0x10/0x10 [ 2926.436763] ? __might_fault+0xe0/0x190 [ 2926.436780] ? _copy_from_user+0x5b/0xd0 [ 2926.436799] kernel_clone+0xea/0x7f0 [ 2926.436812] ? get_pid_task+0xfd/0x250 [ 2926.436826] ? __pfx_kernel_clone+0x10/0x10 [ 2926.436844] ? find_held_lock+0x2b/0x80 [ 2926.436865] ? ksys_write+0x121/0x240 [ 2926.436879] ? lock_is_held_type+0x9e/0x120 [ 2926.436899] __do_sys_clone3+0x1f5/0x280 [ 2926.436913] ? __pfx___do_sys_clone3+0x10/0x10 [ 2926.436935] ? __fget_files+0x20d/0x3b0 [ 2926.436953] ? fput+0x6a/0x100 [ 2926.436969] ? ksys_write+0x1a3/0x240 [ 2926.436982] ? __pfx_ksys_write+0x10/0x10 [ 2926.436997] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2926.437014] do_syscall_64+0xbf/0x360 [ 2926.437027] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2926.437040] RIP: 0033:0x7f232c718b19 [ 2926.437050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2926.437063] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2926.437076] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2926.437084] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2926.437092] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2926.437100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2926.437107] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2926.437125] 05:59:58 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x200, 0x70bd2a, 0xffc0000, {{}, {@void, @void}}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040004}, 0x4000004) 05:59:58 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 45) 05:59:58 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x200, 0x70bd2a, 0xffc0000, {{}, {@void, @void}}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040004}, 0x4000004) 05:59:58 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:58 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) 05:59:58 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 05:59:58 executing program 5: clone3(&(0x7f00000006c0)={0x3000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:07 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 46) 06:00:07 executing program 5: clone3(&(0x7f00000006c0)={0x4000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:07 executing program 0: msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4) 06:00:07 executing program 2: clone3(&(0x7f00000006c0)={0x1000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:07 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 42) 06:00:07 executing program 4: sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x0, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5d}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @remote}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000001}, 0x4) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 06:00:07 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 40) 06:00:07 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) [ 2935.763581] FAULT_INJECTION: forcing a failure. [ 2935.763581] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2935.764779] CPU: 0 UID: 0 PID: 17482 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2935.764799] Tainted: [W]=WARN [ 2935.764803] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2935.764810] Call Trace: [ 2935.764814] [ 2935.764819] dump_stack_lvl+0xfa/0x120 [ 2935.764844] should_fail_ex+0x4d7/0x5e0 [ 2935.764861] should_fail_alloc_page+0xe0/0x110 [ 2935.764878] prepare_alloc_pages+0x1af/0x500 [ 2935.764895] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2935.764912] ? __is_insn_slot_addr+0x136/0x290 [ 2935.764934] ? __is_insn_slot_addr+0x140/0x290 [ 2935.764953] ? kernel_text_address+0x5b/0xc0 [ 2935.764969] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2935.764986] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 2935.765003] ? arch_stack_walk+0x9c/0xf0 [ 2935.765017] ? __lock_acquire+0x694/0x1b70 [ 2935.765035] ? __lock_acquire+0x694/0x1b70 [ 2935.765048] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2935.765063] ? policy_nodemask+0xeb/0x4e0 [ 2935.765083] alloc_pages_mpol+0xed/0x340 [ 2935.765100] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2935.765122] alloc_pages_noprof+0xa1/0x380 [ 2935.765141] __pud_alloc+0x3f/0x7c0 [ 2935.765159] copy_page_range+0x37d1/0x5140 [ 2935.765178] ? __lock_acquire+0x694/0x1b70 [ 2935.765199] ? __lock_acquire+0xc65/0x1b70 [ 2935.765212] ? lock_is_held_type+0x9e/0x120 [ 2935.765234] ? __pfx_copy_page_range+0x10/0x10 [ 2935.765251] ? mas_destroy+0x5ce/0x9c0 [ 2935.765268] ? mas_store+0x17b/0x540 [ 2935.765281] ? __pfx_mas_store+0x10/0x10 [ 2935.765292] ? lock_release+0xc8/0x290 [ 2935.765311] ? lock_is_held_type+0x9e/0x120 [ 2935.765329] dup_mmap+0xd2f/0x1d10 [ 2935.765351] ? __pfx_dup_mmap+0x10/0x10 [ 2935.765374] ? lock_is_held_type+0x9e/0x120 [ 2935.765394] copy_process+0x3ad5/0x73c0 [ 2935.765406] ? __pfx__kstrtoull+0x10/0x10 [ 2935.765432] ? __pfx_copy_process+0x10/0x10 [ 2935.765445] ? __might_fault+0xe0/0x190 [ 2935.765461] ? _copy_from_user+0x5b/0xd0 [ 2935.765478] kernel_clone+0xea/0x7f0 [ 2935.765489] ? get_pid_task+0xfd/0x250 [ 2935.765501] ? __pfx_kernel_clone+0x10/0x10 [ 2935.765518] ? find_held_lock+0x2b/0x80 [ 2935.765535] ? ksys_write+0x121/0x240 [ 2935.765548] ? lock_is_held_type+0x9e/0x120 [ 2935.765567] __do_sys_clone3+0x1f5/0x280 [ 2935.765579] ? __pfx___do_sys_clone3+0x10/0x10 [ 2935.765604] ? __fget_files+0x20d/0x3b0 [ 2935.765620] ? fput+0x6a/0x100 [ 2935.765635] ? ksys_write+0x1a3/0x240 [ 2935.765647] ? __pfx_ksys_write+0x10/0x10 [ 2935.765661] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2935.765676] do_syscall_64+0xbf/0x360 [ 2935.765688] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2935.765701] RIP: 0033:0x7f232c718b19 [ 2935.765710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2935.765721] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2935.765733] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2935.765741] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2935.765748] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2935.765755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2935.765762] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2935.765778] [ 2935.815119] FAULT_INJECTION: forcing a failure. [ 2935.815119] name failslab, interval 1, probability 0, space 0, times 0 [ 2935.817108] CPU: 1 UID: 0 PID: 17491 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2935.817147] Tainted: [W]=WARN [ 2935.817155] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2935.817170] Call Trace: [ 2935.817177] [ 2935.817187] dump_stack_lvl+0xfa/0x120 [ 2935.817231] should_fail_ex+0x4d7/0x5e0 [ 2935.817264] ? anon_vma_fork+0xe6/0x630 [ 2935.817298] should_failslab+0xc2/0x120 [ 2935.817328] kmem_cache_alloc_noprof+0x72/0x690 [ 2935.817354] ? anon_vma_clone+0x3be/0x570 [ 2935.817397] ? anon_vma_fork+0xe6/0x630 [ 2935.817431] anon_vma_fork+0xe6/0x630 [ 2935.817465] ? vm_area_dup+0x3e7/0x6f0 [ 2935.817495] dup_mmap+0x1207/0x1d10 [ 2935.817542] ? __pfx_dup_mmap+0x10/0x10 [ 2935.817599] ? lock_is_held_type+0x9e/0x120 [ 2935.817642] copy_process+0x3ad5/0x73c0 06:00:07 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) [ 2935.817668] ? __pfx__kstrtoull+0x10/0x10 [ 2935.817720] ? __pfx_copy_process+0x10/0x10 [ 2935.817747] ? __might_fault+0xe0/0x190 [ 2935.817781] ? _copy_from_user+0x5b/0xd0 [ 2935.817818] kernel_clone+0xea/0x7f0 [ 2935.817842] ? get_pid_task+0xfd/0x250 [ 2935.817868] ? __pfx_kernel_clone+0x10/0x10 [ 2935.817903] ? find_held_lock+0x2b/0x80 [ 2935.817942] ? ksys_write+0x121/0x240 [ 2935.817968] ? lock_is_held_type+0x9e/0x120 [ 2935.818007] __do_sys_clone3+0x1f5/0x280 [ 2935.818034] ? __pfx___do_sys_clone3+0x10/0x10 [ 2935.818078] ? __fget_files+0x20d/0x3b0 [ 2935.818111] ? fput+0x6a/0x100 [ 2935.818143] ? ksys_write+0x1a3/0x240 [ 2935.818168] ? __pfx_ksys_write+0x10/0x10 [ 2935.818197] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2935.818229] do_syscall_64+0xbf/0x360 [ 2935.818254] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2935.818279] RIP: 0033:0x7fb9f533db19 [ 2935.818298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2935.818322] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2935.818346] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2935.818363] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2935.818378] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2935.818393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2935.818407] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2935.818441] 06:00:07 executing program 5: clone3(&(0x7f00000006c0)={0x5000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2935.940295] cgroup: fork rejected by pids controller in /syz5 06:00:08 executing program 1: add_key$user(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) 06:00:08 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) pidfd_open(0xffffffffffffffff, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001100)={'gretap0\x00', &(0x7f0000001080)={'gretap0\x00', 0x0, 0x8000, 0x8000, 0x2, 0x1, {{0xd, 0x4, 0x2, 0x4, 0x34, 0x68, 0x0, 0x0, 0x4, 0x0, @private=0xa010100, @rand_addr=0x64010101, {[@ssrr={0x89, 0xb, 0x34, [@multicast2, @broadcast]}, @noop, @ssrr={0x89, 0xf, 0x4b, [@dev={0xac, 0x14, 0x14, 0x27}, @loopback, @private=0xa010101]}, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000011c0)={'syztnl2\x00', &(0x7f0000001140)={'syztnl0\x00', r0, 0x8000, 0x700, 0x1, 0x40000000, {{0x12, 0x4, 0x0, 0x2b, 0x48, 0x68, 0x0, 0xfe, 0x29, 0x0, @empty, @broadcast, {[@timestamp_prespec={0x44, 0x34, 0x7d, 0x3, 0x9, [{@loopback, 0x7fffffff}, {@rand_addr=0x64010102, 0x5}, {@empty, 0x5}, {@broadcast, 0x8001}, {@remote, 0x20}, {@local, 0xfffffff9}]}]}}}}}) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r2, 0x0, 0x20000000) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f00000012c0)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001280)={&(0x7f0000001240)={0x40, 0x0, 0x20, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r1}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000810}, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r3, 0x0, 0x20000000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001000)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff3000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000)="c3f6df8e23ec8f54bbb0cbbd37122454072afb4ea906cc9509b0353058f3d4cdce032fe186aed1d561dd91780a43efc9de27289bff34c40bc309f7edaed133bae6e9e3d73db9bcec30ea25063e6183de757401484389ddf4e59e2922f10e17009e23615bbd8f84086d4cf05228ee00c5c8508618cfa6291828800ed51fc12a23ba7cb2945f778c8710032ce3699f27ecd77727930406000dd1d401d7c12899eef5b2ef434d24569e1cc8ca6e3e02740fb1e1e6617c5739339ed90c2fba72e9320a189ec51810b8fb27f192e1f8b94f354082d84cac638cc057afe237f128dc8c355a36ccaf2c93cc72e44d40b0777f015ba66de8af2770713515304d71a44f980286f3799d1601821a34b6174bdd363280fdb8510097d91426cf64a81c2a9a582d9655749cf940591930adf878f4a194b85ff2c9633e5aed1d959641685097f9cc54b49636cbfd9e6d3d3eb04730984fc4d295a4eeb9a8cbf0695fb99234651e0bd13e26df7331514257b56175fcd2ced4e102bd80c81e87d50bcde5bf4ba6109b40cbbf934835bad52a493421d5f75a5008dcaccf866ff43884e2a2dafdbee86f59b8064e4bfc5af8c64dc2372b241c91c725096bf48a4ed546c427ab5d66acb5c9388a29c646dfcf8bcf4ec2c149449c45dd85d56c4a92897ac7c0a1838779fd81bda3da2b5c36e385dc3ffcf7f5e92a20ef011d9dced37280a6b3cd41e5fe5648d8f487e5805b302bc635bc4bf9aaaa8727e05e31082809ba2acd3f57f20b088e708889d4357bf97f223e126f31701f7e78a50a1ad936b13e645b098a6d03436c6a5fd374c5b36c7f267d66cfa7313d172e099650dbc9e52aecddda3be15c45a360b8907e0e637bbc2697ccb7896c48061fe72cac083a0178880d544ac9a0d103c3886b529d80646683d828af158437c3dccbf35754f8c3cd17f705548fdd4433df19668b73a0de5d8b21045ddb335d71a2fc8f2c3fe2f821e83fd04f2cc340f223e299effdf89bc598ed16ab232ffd3ce1083053de6e5fdd60ee10ece503c14fd93dfd62f35a95b65e315fc8705ff02415c1a9db392e0be45d9d6795e6ea9b1a633c25733cea9b3defe5b5415097df3caa554cc1181e353d5b80a7a57e04c2484c3ff0162d30199c9c22878e8c328ee1da1ceb16948d2bdbb61366effc67ca564a27d19ee74b1bff7f14d2898cc8a9b054198643e5fbc89ccd9722b567aab83090cb2097d3f6fd9b4137bb106e6159fef4604f69933532e06542c2660fb7039e7bbce06d05226bae710001f6df81ffc4cc26c7c640bb16faa7eb28bfa9e2d9ec5a1396f1f6c236027d5e279ea453b0dad7ced30e5764093e171e55697be7049b978170c07d8239ae835e3ba31e00a542afa3abb877d20368ab5838bcbbbf70c8fc7550650db498a81182c30747350c9dfba9c36d572bdf7859382f1eb0e0b8a92a640ca63531f559a695c98cb277b2c023cf31b0c211315f649a421cee066017c6d41b92a0e7aa048c1d42f1ea1a499fce22ac3aa8b6aae05c3da60e0889b44b84b548484d7813081bb20b5bd82687b95868c5a07159ccc2b24c55b887e31182a5dcfe069e16268ed189e31b5f1232df11eefd28c0dcb12869808fad1c76efca867e3585e58cb4551e77b2f3d62e357b4385d6baa4b761d00a7a8b6ff922ee6a239f9b8c79ac3a3c780ebad0f1e6f908f5f06472badbec22e0589a08fbeaf61092684de171d32030d5e3d5dfd6c3ee2483c32e78fb7efbc2bbd8a90543f00468cb1af54938dc398641d3074d41f3824c93efcca45ed181afa017d753e58c68ecb76134370d35896a995d950b510d515ba5ba904c882e53dd9877e5f550f269d5a3bdbe2ea85dd7c94d7b46664bec434220f627fa00ffc50af39c0a27f5ab6a23dccc849f953d6c0912bc06176df8aec90c2e908276585c71a68248f1467440ebf67edb018a0c97bba7678ea64f661fbbd7f19e1725d353810f792e611f225b7f1f01052a59d9794d4af00f1ce0aa57cae77294ca1211686b688566af5ba08580a31523bd06bfb6e0e4dd041837a3d34383aae38087414907d49ac4227aa91789d315883769b8772e5a9b69086a55e8eb71e2d2e117a4b386729749e497da6269e06431339b662d6cc2bdce888743b4d18f92e035044ed7e1716a93b1301adfdc602ae0c26694d3ff0ec8b67ca6956640bb8a6f8c9b1774a088efc710f256a9e8dd157a0dcfc2dcd63cd41a03f6f53519784f753601abc6822285380225bbb43fb8705c34af99a8d78db7a4515c014966cca039dbcb75b6c54141dab6f726a1d92d19d4c6b36cb10306700ffa69f83564bb272e9d12bb6cfc56ea837cadb07ee690f3843ffecfd8df9f516a187c68c12aa1cb3cade104bad58bf1ff17a694f5dc8030bae1422519831d74e03fd5e25adde868b59517d282682d3a958bfb4925792081b18197aed01b90b8b52435ac882878d13e48141ae0e0afe949867f591f6e69a768b86dcbf9d2fe258b2013cc56a6efb71ed5ebfd3638e74e2dc7ab75add8702a1f5ae13e8b4fef2c3a84982923d4ccc49d9b9e53b6b458a9d1b1669da6f9a9096ce160bc4749835dce9ed4e17b2cac0b8e768cca8497aee5d95df3fa5e00336d98ae123a3107562ad379f6a808482f8415bb05304949ee650a89dec5ee00c700d8471155df4f23d74c2cc448824793be665df4074a4a7aec655fedd2ced9217956d6fbea85b9779c50cf69f1f39eddb7ee843fc4dacb7ca9795fc4e78b9ef6266bd2eb4d0dcc9291086d10545e020b10b2313a9f96c006666527b416ce505bc46a3fa2af8e29d0bbe1e5f21b05fd6bbe99d755ea30e094bf19d546902ca82a7dfb97218e682bd1be052931d72407e1fe727ac9d636625765d4e6c1994dfabb13742595a1dd1b15eb67646a7eb9318354aba69c2b455feab44eb52eafb2f6ea55fc065315811050c1b23b064e8817dc7cea83851343bae1cd426578374a5b90de3f2addba3747557c6e60a1a8cbee9314a39cfcea1ba371e9db0394d58569730f477b4fd9305711a5e1b01f4405aa8a378d745e85f5673eeae83f836d315f5c0ecb351fd0dd861e94ef5c5522ec472897b05782c16ca73faf9f768b1d30ab0f39ec9d1de79b688220fbd5610d4d573f30023747a1134e0e6c48ff93b22e8c1be0d7669deba29d301660ce20ea7b897889617dfb0fabe41354388f96710195f1effd97a62dcacf32ffd8963e07bacd73672add9bdb63f41cd1d6abbe26b3a4379be0b5a0e35954d638a5aac91b76356270a88cf817090b56ab7663ae90f8d9b334d543556c46d617a0d88362b6d82ac8289d112133f630fa9948319526bdf2bf4434584f7fe641e06ced5632cfdd3a12afb32a2714f21e95824419d64f813c19b26e85da87390bcfac6d732db7aa512d10abe5ce068e8801e256474dc53eafb3f719ed31a6cf79c50c88bc20fe9ade6beb845800a3688c6cf8f2e356b32320b4c045c291b4c9c2d11329951e94665f3024f5f2ce67318acd8daad99a500d15581777148c27f036255b990d4816fac14a813dcb6de7351c8a96764ea1eec39d03ce605d6781c822816423a1808a0fde4cdf743d5c81f94778ab5f9c7ecaa6b1f4df39162ba8a8f686243ee7001d29bfb5e9cc1a5437a360ba3c5f59c1986cd2f9ccb04b3b8641d9c63890687eb38d63984c0b2b2e854ddb9531751e148e5f02a8c4c0be9f8a5ec7efffc37908b92d9ef031befd2e85e13da7b553afef7fc9984e87d449cb052f070afde7af978f800490c5590ab020e723c01e619b23dfae94a72a17fefb5016de4ab31d5d96d6dd1a2b9e7a9f017461b146087200f36b5a2abcaa15621238eabe08da58938b22a2b734585c42adad583bacac17bd6ba3fdd96f78a044ccfebe422fae3dc91ea0fa984de68cd69a818f2e210d9b1c7b7a7556d016b75c9b4b6e54b179f2cb708d35eb35b426e31ed42908d220daafbfb1361f18397d9224f7e97c677481c0aacb22e6e1f71681b73ef7b762cf24d29a2eaa449f8c506a05f6d5d3761a0a7f433d21e55b5b4aac5ae66a542dfec827da80487e5296e4b259f8557fdb6ec8b426cf5cd36ad2a15c9a037f7b99c5ab829fbc5e643ad0e65fe087d9b8754c5f1cca66b52c09f714cd61d51086b38060953f8f6933386608ae77f7f7fec398a2c352fb0a76bd443c3932f180117892e4b28354c99c5f5ff6c91ee7b6421d345fa4d0d1a66dda70d53c76045680404df32ee30c5ebb69a3dd37cae6b927e71a20447515f52bea1a5e6e4a5a86c02586f68b8e5c50ad9066d4bd7c69fa543ba9cabc1b1558e142556eb80004d7da4ca35d497f94adeaac7b77b897e897fa1cfbb6f843251066430d2b4bf95582b609124d1c10b8e17bfe580ba3a8a8751d13fcdc6de894f0f5c6dc58be523b135f6aec68ac6e07da25b4bcb9b12d2309ebb851a048b1e95e945ec6d34033523fcd2b3a0b467ecc8050b2a3e8cc0543f9059fd7adaba0c97b134e07eb3b9684e893f4d4a521b43738aff9ba425053a2afd6bf44e9de48cdf3028044923634c4d28d3039b7b652b1feb23b7d03dbc391b96f103c0bec6cb0f3bace1d5d244f00255df771e34f24996af4f5afb9a141a60c617d28fc8bbe6311ef80c2ae8d58b10a7a4649b5432423aa9c55011959be6139d07343e38c626c777b4b0a06d632de1a415daeaabe277540148b57b781f0eac2e0b5a437e96b214be24209bd2466ef2343a733b9219b41ff80dfe352f749b898b16547db6bbd0a502e618a2ea62537d7962bae1857e75eebc00b7e39f409c08fc5d95cb8d93aa4f20fd9daa0d886562bdc0c92015ff9e70977cddb58f8381dcfa742acfab511a0b36148c925a00bfcfa5cd5c4a947da4a0e1aa09f71f0316b575eaeff54e95ed61c940b43669c37bef7ddd5876bc35e914c459864f6eb2e8944adfbf8eddd85ae846885dcd99ddf430c5235bcbfaba8ca152d8ab57d3eac29b89aa9568daeb5d9c574eb097c1a76512cbfe2ddbd3c1b289749568871258450b0cd12e90c083e2e9a67e0913b4b4b3f72b26257f666e02b09d6db42d424bde8213875bc527a90cee21a8461942d86476b032da9d31bf5caddb5851f41880a1f170a5dc8782e37906ce99b3d529d51cf78bd375bd36ac80db8e0953647ab0f1f8c133ff66a346d403f2d157a3739f8e09bdb6936a5386ee88f9f8a509237c01d5148d7c28b44840a4e4c85f926524ebad4d8b98fc80b6df21bb1b9546ccd49801a0d58b13192dbca3fd5f7f85dc42c45cbc14b17abc3f038fcd051c4f494bf40aab02f75d01cadbd25aa0c6ca42a3e6e576fe8063f6baa06ff370c6ea8dfe1d849ab2ae2685f7423de643576f013c294bdac6f4f7742e5ee89be2e2d59cfbd2528ec03ccbc06090e2a188de8bea5ea57dde107ca9f5fba3de1d5e5e36dffdc04af83ee6d446217d4e5d7f438662425e34518a9590c7613fac2d7c93e02d5d392a8e92b2a34927e06b95d7734ad9939149a5e53130b9c52e12dc2ebb49711fe8ba0eb011ae735d7408804eb9b0c798a2a61eac1e9b492a9ad54cb84ccfb2723bac05080a01f1159bacad2a84874f827e361f97c90e42686838a2d30d7f06f0ae76b392095fb8516be217d3be8fa9105201745bc710919f0c78a4b5330ec6684bb0aa41e04f1e568e348d6abf19c7bebeb1cb64330d4c904b735f3856565dd480d16991ce3bc510c5d674700310fb4dbdc351e70d32a42a9823e7e03a766227f1af36cabc438d5190282940294ca908eb503fe736f8f1b9755", 0x1000, r3}, 0x68) 06:00:08 executing program 0: msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 06:00:08 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 47) [ 2935.994704] FAULT_INJECTION: forcing a failure. [ 2935.994704] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2935.995745] CPU: 0 UID: 0 PID: 17507 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2935.995765] Tainted: [W]=WARN [ 2935.995769] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2935.995777] Call Trace: [ 2935.995782] [ 2935.995786] dump_stack_lvl+0xfa/0x120 [ 2935.995812] should_fail_ex+0x4d7/0x5e0 [ 2935.995831] should_fail_alloc_page+0xe0/0x110 [ 2935.995849] prepare_alloc_pages+0x1af/0x500 [ 2935.995867] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2935.995886] ? __is_insn_slot_addr+0x136/0x290 [ 2935.995911] ? __is_insn_slot_addr+0x140/0x290 [ 2935.995931] ? kernel_text_address+0x5b/0xc0 [ 2935.995948] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2935.995967] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 2935.995985] ? arch_stack_walk+0x9c/0xf0 [ 2935.995998] ? look_up_lock_class+0x56/0x150 [ 2935.996023] ? __lock_acquire+0xc65/0x1b70 [ 2935.996037] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2935.996054] ? policy_nodemask+0xeb/0x4e0 [ 2935.996075] alloc_pages_mpol+0xed/0x340 [ 2935.996094] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2935.996113] ? find_held_lock+0x2b/0x80 [ 2935.996132] ? __pud_alloc+0x571/0x7c0 [ 2935.996153] alloc_pages_noprof+0xa1/0x380 [ 2935.996173] __pmd_alloc+0x3b/0x980 [ 2935.996192] copy_page_range+0x375e/0x5140 [ 2935.996212] ? __lock_acquire+0x694/0x1b70 [ 2935.996234] ? __lock_acquire+0xc65/0x1b70 [ 2935.996249] ? lock_is_held_type+0x9e/0x120 [ 2935.996271] ? __pfx_copy_page_range+0x10/0x10 [ 2935.996289] ? mas_destroy+0x5ce/0x9c0 [ 2935.996308] ? mas_store+0x17b/0x540 [ 2935.996322] ? __pfx_mas_store+0x10/0x10 [ 2935.996334] ? lock_release+0xc8/0x290 [ 2935.996354] ? lock_is_held_type+0x9e/0x120 [ 2935.996374] dup_mmap+0xd2f/0x1d10 [ 2935.996398] ? __pfx_dup_mmap+0x10/0x10 [ 2935.996422] ? lock_is_held_type+0x9e/0x120 [ 2935.996443] copy_process+0x3ad5/0x73c0 [ 2935.996457] ? __pfx__kstrtoull+0x10/0x10 [ 2935.996483] ? __pfx_copy_process+0x10/0x10 [ 2935.996496] ? __might_fault+0xe0/0x190 [ 2935.996514] ? _copy_from_user+0x5b/0xd0 [ 2935.996532] kernel_clone+0xea/0x7f0 [ 2935.996544] ? get_pid_task+0xfd/0x250 [ 2935.996557] ? __pfx_kernel_clone+0x10/0x10 [ 2935.996575] ? find_held_lock+0x2b/0x80 [ 2935.996598] ? ksys_write+0x121/0x240 [ 2935.996612] ? lock_is_held_type+0x9e/0x120 [ 2935.996631] __do_sys_clone3+0x1f5/0x280 [ 2935.996644] ? __pfx___do_sys_clone3+0x10/0x10 [ 2935.996667] ? __fget_files+0x20d/0x3b0 [ 2935.996684] ? fput+0x6a/0x100 [ 2935.996700] ? ksys_write+0x1a3/0x240 [ 2935.996713] ? __pfx_ksys_write+0x10/0x10 [ 2935.996727] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2935.996746] do_syscall_64+0xbf/0x360 [ 2935.996758] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2935.996772] RIP: 0033:0x7f232c718b19 [ 2935.996782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2935.996794] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2935.996807] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2935.996815] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2935.996823] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2935.996830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2935.996838] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2935.996854] 06:00:18 executing program 1: add_key$user(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) 06:00:18 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 48) 06:00:18 executing program 2: clone3(&(0x7f00000006c0)={0x1000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:18 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@dev={0xfe, 0x80, '\x00', 0x16}, 0x25}) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x1]}, &(0x7f0000000040), 0x8) 06:00:18 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 41) 06:00:18 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 43) 06:00:18 executing program 5: clone3(&(0x7f00000006c0)={0x6000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:18 executing program 0: msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) [ 2946.098501] FAULT_INJECTION: forcing a failure. [ 2946.098501] name failslab, interval 1, probability 0, space 0, times 0 [ 2946.099996] CPU: 0 UID: 0 PID: 17525 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2946.100023] Tainted: [W]=WARN [ 2946.100029] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2946.100039] Call Trace: [ 2946.100045] [ 2946.100051] dump_stack_lvl+0xfa/0x120 [ 2946.100084] should_fail_ex+0x4d7/0x5e0 [ 2946.100108] ? __pmd_alloc+0x98/0x980 [ 2946.100132] should_failslab+0xc2/0x120 [ 2946.100152] kmem_cache_alloc_noprof+0x72/0x690 [ 2946.100171] ? __pud_alloc+0x571/0x7c0 [ 2946.100199] ? __pmd_alloc+0x98/0x980 [ 2946.100222] __pmd_alloc+0x98/0x980 [ 2946.100248] copy_page_range+0x375e/0x5140 [ 2946.100274] ? __lock_acquire+0x694/0x1b70 [ 2946.100308] ? __lock_acquire+0xc65/0x1b70 [ 2946.100326] ? lock_is_held_type+0x9e/0x120 [ 2946.100358] ? __pfx_copy_page_range+0x10/0x10 [ 2946.100382] ? mas_destroy+0x5ce/0x9c0 [ 2946.100406] ? mas_store+0x17b/0x540 [ 2946.100425] ? __pfx_mas_store+0x10/0x10 [ 2946.100441] ? lock_release+0xc8/0x290 [ 2946.100470] ? lock_is_held_type+0x9e/0x120 [ 2946.100496] dup_mmap+0xd2f/0x1d10 [ 2946.100529] ? __pfx_dup_mmap+0x10/0x10 [ 2946.100563] ? lock_is_held_type+0x9e/0x120 [ 2946.100597] copy_process+0x3ad5/0x73c0 [ 2946.100615] ? __pfx__kstrtoull+0x10/0x10 [ 2946.100652] ? __pfx_copy_process+0x10/0x10 [ 2946.100669] ? __might_fault+0xe0/0x190 [ 2946.100693] ? _copy_from_user+0x5b/0xd0 [ 2946.100717] kernel_clone+0xea/0x7f0 [ 2946.100734] ? get_pid_task+0xfd/0x250 [ 2946.100752] ? __pfx_kernel_clone+0x10/0x10 [ 2946.100776] ? find_held_lock+0x2b/0x80 [ 2946.100801] ? ksys_write+0x121/0x240 [ 2946.100820] ? lock_is_held_type+0x9e/0x120 [ 2946.100847] __do_sys_clone3+0x1f5/0x280 [ 2946.100865] ? __pfx___do_sys_clone3+0x10/0x10 [ 2946.100895] ? __fget_files+0x20d/0x3b0 [ 2946.100918] ? fput+0x6a/0x100 [ 2946.100939] ? ksys_write+0x1a3/0x240 [ 2946.100956] ? __pfx_ksys_write+0x10/0x10 [ 2946.100976] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2946.100999] do_syscall_64+0xbf/0x360 [ 2946.101015] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2946.101033] RIP: 0033:0x7f232c718b19 [ 2946.101047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2946.101063] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2946.101080] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2946.101092] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2946.101102] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2946.101112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2946.101122] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2946.101146] 06:00:18 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) 06:00:18 executing program 1: add_key$user(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) 06:00:18 executing program 0: msync(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 06:00:18 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 44) 06:00:18 executing program 1: add_key$user(&(0x7f0000000140), 0x0, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) [ 2946.286268] FAULT_INJECTION: forcing a failure. [ 2946.286268] name failslab, interval 1, probability 0, space 0, times 0 [ 2946.287623] CPU: 0 UID: 0 PID: 17539 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2946.287649] Tainted: [W]=WARN [ 2946.287654] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2946.287664] Call Trace: [ 2946.287669] [ 2946.287675] dump_stack_lvl+0xfa/0x120 [ 2946.287706] should_fail_ex+0x4d7/0x5e0 [ 2946.287728] ? anon_vma_fork+0x1f4/0x630 [ 2946.287752] should_failslab+0xc2/0x120 [ 2946.287772] kmem_cache_alloc_noprof+0x72/0x690 [ 2946.287789] ? anon_vma_clone+0x3be/0x570 [ 2946.287816] ? anon_vma_fork+0x1f4/0x630 [ 2946.287838] anon_vma_fork+0x1f4/0x630 [ 2946.287863] dup_mmap+0x1207/0x1d10 [ 2946.287894] ? __pfx_dup_mmap+0x10/0x10 [ 2946.287925] ? lock_is_held_type+0x9e/0x120 [ 2946.287953] copy_process+0x3ad5/0x73c0 [ 2946.287970] ? __pfx__kstrtoull+0x10/0x10 [ 2946.288004] ? __pfx_copy_process+0x10/0x10 [ 2946.288020] ? __might_fault+0xe0/0x190 [ 2946.288042] ? _copy_from_user+0x5b/0xd0 [ 2946.288065] kernel_clone+0xea/0x7f0 [ 2946.288081] ? get_pid_task+0xfd/0x250 [ 2946.288098] ? __pfx_kernel_clone+0x10/0x10 [ 2946.288120] ? find_held_lock+0x2b/0x80 [ 2946.288145] ? ksys_write+0x121/0x240 [ 2946.288162] ? lock_is_held_type+0x9e/0x120 [ 2946.288187] __do_sys_clone3+0x1f5/0x280 [ 2946.288204] ? __pfx___do_sys_clone3+0x10/0x10 [ 2946.288232] ? __fget_files+0x20d/0x3b0 [ 2946.288253] ? fput+0x6a/0x100 [ 2946.288273] ? ksys_write+0x1a3/0x240 [ 2946.288289] ? __pfx_ksys_write+0x10/0x10 [ 2946.288308] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2946.288329] do_syscall_64+0xbf/0x360 [ 2946.288344] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2946.288361] RIP: 0033:0x7fb9f533db19 [ 2946.288373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2946.288389] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2946.288405] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2946.288415] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2946.288425] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2946.288434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2946.288443] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2946.288465] 06:00:18 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 42) 06:00:18 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 45) 06:00:18 executing program 4: sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x44, 0x0, 0x800, 0x70bd25, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x18, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @empty}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x40000) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 06:00:28 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 49) 06:00:28 executing program 1: add_key$user(&(0x7f0000000140), 0x0, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) 06:00:28 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 43) 06:00:28 executing program 4: openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs2/binder1\x00', 0x800, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 06:00:28 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) 06:00:28 executing program 5: clone3(&(0x7f00000006c0)={0x7000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:28 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 46) 06:00:28 executing program 2: clone3(0x0, 0x0) 06:00:28 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) getsockname(r0, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80) [ 2956.149437] FAULT_INJECTION: forcing a failure. [ 2956.149437] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2956.150479] CPU: 1 UID: 0 PID: 17569 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2956.150500] Tainted: [W]=WARN [ 2956.150504] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2956.150511] Call Trace: [ 2956.150516] [ 2956.150521] dump_stack_lvl+0xfa/0x120 [ 2956.150547] should_fail_ex+0x4d7/0x5e0 [ 2956.150566] should_fail_alloc_page+0xe0/0x110 [ 2956.150585] prepare_alloc_pages+0x1af/0x500 [ 2956.150607] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2956.150626] ? __is_insn_slot_addr+0x136/0x290 [ 2956.150651] ? __is_insn_slot_addr+0x140/0x290 [ 2956.150671] ? kernel_text_address+0x5b/0xc0 [ 2956.150688] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2956.150707] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 2956.150725] ? arch_stack_walk+0x9c/0xf0 [ 2956.150745] ? __lock_acquire+0x694/0x1b70 [ 2956.150764] ? __lock_acquire+0x694/0x1b70 [ 2956.150778] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2956.150795] ? policy_nodemask+0xeb/0x4e0 [ 2956.150815] alloc_pages_mpol+0xed/0x340 [ 2956.150834] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2956.150858] alloc_pages_noprof+0xa1/0x380 [ 2956.150878] __pud_alloc+0x3f/0x7c0 [ 2956.150898] copy_page_range+0x37d1/0x5140 [ 2956.150918] ? __lock_acquire+0x694/0x1b70 [ 2956.150941] ? __lock_acquire+0xc65/0x1b70 [ 2956.150955] ? lock_is_held_type+0x9e/0x120 [ 2956.150978] ? __pfx_copy_page_range+0x10/0x10 [ 2956.150997] ? mas_destroy+0x5ce/0x9c0 [ 2956.151015] ? mas_store+0x17b/0x540 [ 2956.151029] ? __pfx_mas_store+0x10/0x10 [ 2956.151041] ? lock_release+0xc8/0x290 [ 2956.151062] ? lock_is_held_type+0x9e/0x120 [ 2956.151082] dup_mmap+0xd2f/0x1d10 [ 2956.151106] ? __pfx_dup_mmap+0x10/0x10 [ 2956.151131] ? lock_is_held_type+0x9e/0x120 [ 2956.151151] copy_process+0x3ad5/0x73c0 [ 2956.151165] ? __pfx__kstrtoull+0x10/0x10 [ 2956.151192] ? __pfx_copy_process+0x10/0x10 [ 2956.151205] ? __might_fault+0xe0/0x190 [ 2956.151222] ? _copy_from_user+0x5b/0xd0 [ 2956.151241] kernel_clone+0xea/0x7f0 [ 2956.151255] ? get_pid_task+0xfd/0x250 [ 2956.151272] ? __pfx_kernel_clone+0x10/0x10 [ 2956.151290] ? find_held_lock+0x2b/0x80 [ 2956.151309] ? ksys_write+0x121/0x240 [ 2956.151324] ? lock_is_held_type+0x9e/0x120 [ 2956.151343] __do_sys_clone3+0x1f5/0x280 [ 2956.151356] ? __pfx___do_sys_clone3+0x10/0x10 [ 2956.151379] ? __fget_files+0x20d/0x3b0 [ 2956.151396] ? fput+0x6a/0x100 [ 2956.151412] ? ksys_write+0x1a3/0x240 [ 2956.151425] ? __pfx_ksys_write+0x10/0x10 [ 2956.151439] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2956.151456] do_syscall_64+0xbf/0x360 [ 2956.151479] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2956.151492] RIP: 0033:0x7fb9f533db19 [ 2956.151502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2956.151514] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2956.151527] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2956.151535] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2956.151543] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2956.151550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2956.151558] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2956.151575] 06:00:28 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) 06:00:28 executing program 1: add_key$user(&(0x7f0000000140), 0x0, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b5cbba66c0e34758e5d055544d58feeb05bfa2d42f88ca709b131b0c4a4dcb63a9dc84b6e28425b13986b46717cf4c1da192c73f4eaf3448362b6866877c09e3d42f765e499c4ecdbebf19bce8efc826c415b8692d53532f8cb6a4525a97be6c754cbf9a602cf258bb85306f5795a8b", 0xdf, 0xfffffffffffffffb) 06:00:28 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 44) 06:00:28 executing program 2: clone3(0x0, 0x0) 06:00:28 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 47) 06:00:28 executing program 0: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 2956.309380] FAULT_INJECTION: forcing a failure. [ 2956.309380] name failslab, interval 1, probability 0, space 0, times 0 [ 2956.311453] CPU: 1 UID: 0 PID: 17580 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2956.311485] Tainted: [W]=WARN [ 2956.311490] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2956.311497] Call Trace: [ 2956.311502] [ 2956.311507] dump_stack_lvl+0xfa/0x120 [ 2956.311533] should_fail_ex+0x4d7/0x5e0 [ 2956.311551] ? anon_vma_fork+0x1f4/0x630 [ 2956.311570] should_failslab+0xc2/0x120 [ 2956.311590] kmem_cache_alloc_noprof+0x72/0x690 [ 2956.311603] ? anon_vma_clone+0x3be/0x570 [ 2956.311625] ? anon_vma_fork+0x1f4/0x630 [ 2956.311643] anon_vma_fork+0x1f4/0x630 [ 2956.311663] dup_mmap+0x1207/0x1d10 [ 2956.311687] ? __pfx_dup_mmap+0x10/0x10 [ 2956.311713] ? lock_is_held_type+0x9e/0x120 [ 2956.311735] copy_process+0x3ad5/0x73c0 [ 2956.311749] ? __pfx__kstrtoull+0x10/0x10 [ 2956.311776] ? __pfx_copy_process+0x10/0x10 [ 2956.311790] ? __might_fault+0xe0/0x190 [ 2956.311808] ? _copy_from_user+0x5b/0xd0 [ 2956.311826] kernel_clone+0xea/0x7f0 [ 2956.311838] ? get_pid_task+0xfd/0x250 [ 2956.311853] ? __pfx_kernel_clone+0x10/0x10 [ 2956.311870] ? find_held_lock+0x2b/0x80 [ 2956.311891] ? ksys_write+0x121/0x240 [ 2956.311905] ? lock_is_held_type+0x9e/0x120 [ 2956.311925] __do_sys_clone3+0x1f5/0x280 [ 2956.311938] ? __pfx___do_sys_clone3+0x10/0x10 [ 2956.311960] ? __fget_files+0x20d/0x3b0 [ 2956.311977] ? fput+0x6a/0x100 [ 2956.311994] ? ksys_write+0x1a3/0x240 [ 2956.312006] ? __pfx_ksys_write+0x10/0x10 [ 2956.312021] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2956.312040] do_syscall_64+0xbf/0x360 [ 2956.312056] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2956.312069] RIP: 0033:0x7f3a168c2b19 [ 2956.312080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2956.312093] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2956.312105] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2956.312114] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2956.312122] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2956.312129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2956.312137] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2956.312154] 06:00:28 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={[0xa4b]}, &(0x7f0000000040), 0x8) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 06:00:28 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 50) [ 2956.431229] FAULT_INJECTION: forcing a failure. [ 2956.431229] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2956.432993] CPU: 0 UID: 0 PID: 17590 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2956.433030] Tainted: [W]=WARN [ 2956.433037] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2956.433051] Call Trace: [ 2956.433059] [ 2956.433067] dump_stack_lvl+0xfa/0x120 [ 2956.433109] should_fail_ex+0x4d7/0x5e0 [ 2956.433140] should_fail_alloc_page+0xe0/0x110 [ 2956.433171] prepare_alloc_pages+0x1af/0x500 [ 2956.433203] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2956.433236] ? __is_insn_slot_addr+0x136/0x290 [ 2956.433279] ? __is_insn_slot_addr+0x140/0x290 [ 2956.433314] ? kernel_text_address+0x5b/0xc0 [ 2956.433343] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2956.433376] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 2956.433405] ? arch_stack_walk+0x9c/0xf0 [ 2956.433427] ? look_up_lock_class+0x56/0x150 [ 2956.433470] ? __lock_acquire+0xc65/0x1b70 [ 2956.433495] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2956.433524] ? policy_nodemask+0xeb/0x4e0 [ 2956.433560] alloc_pages_mpol+0xed/0x340 [ 2956.433600] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2956.433634] ? find_held_lock+0x2b/0x80 [ 2956.433666] ? __pud_alloc+0x571/0x7c0 [ 2956.433701] alloc_pages_noprof+0xa1/0x380 [ 2956.433736] __pmd_alloc+0x3b/0x980 [ 2956.433770] copy_page_range+0x375e/0x5140 [ 2956.433822] ? __lock_acquire+0xc65/0x1b70 [ 2956.433847] ? lock_is_held_type+0x9e/0x120 [ 2956.433886] ? __pfx_copy_page_range+0x10/0x10 [ 2956.433918] ? mas_destroy+0x5ce/0x9c0 [ 2956.433949] ? mas_store+0x17b/0x540 [ 2956.433973] ? __pfx_mas_store+0x10/0x10 [ 2956.433995] ? lock_release+0xc8/0x290 [ 2956.434031] ? lock_is_held_type+0x9e/0x120 [ 2956.434065] dup_mmap+0xd2f/0x1d10 [ 2956.434107] ? __pfx_dup_mmap+0x10/0x10 [ 2956.434151] ? lock_is_held_type+0x9e/0x120 [ 2956.434187] copy_process+0x3ad5/0x73c0 [ 2956.434210] ? __pfx__kstrtoull+0x10/0x10 [ 2956.434256] ? __pfx_copy_process+0x10/0x10 [ 2956.434279] ? __might_fault+0xe0/0x190 [ 2956.434310] ? _copy_from_user+0x5b/0xd0 [ 2956.434342] kernel_clone+0xea/0x7f0 [ 2956.434363] ? get_pid_task+0xfd/0x250 [ 2956.434386] ? __pfx_kernel_clone+0x10/0x10 [ 2956.434417] ? find_held_lock+0x2b/0x80 [ 2956.434449] ? ksys_write+0x121/0x240 [ 2956.434473] ? lock_is_held_type+0x9e/0x120 [ 2956.434507] __do_sys_clone3+0x1f5/0x280 [ 2956.434530] ? __pfx___do_sys_clone3+0x10/0x10 [ 2956.434570] ? __fget_files+0x20d/0x3b0 [ 2956.434598] ? fput+0x6a/0x100 [ 2956.434626] ? ksys_write+0x1a3/0x240 [ 2956.434648] ? __pfx_ksys_write+0x10/0x10 [ 2956.434674] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2956.434702] do_syscall_64+0xbf/0x360 [ 2956.434723] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2956.434746] RIP: 0033:0x7fb9f533db19 [ 2956.434763] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2956.434786] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2956.434808] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2956.434823] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2956.434836] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2956.434850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2956.434863] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2956.434893] [ 2956.438395] FAULT_INJECTION: forcing a failure. [ 2956.438395] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2956.462987] CPU: 1 UID: 0 PID: 17592 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2956.463009] Tainted: [W]=WARN [ 2956.463013] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2956.463022] Call Trace: [ 2956.463027] [ 2956.463033] dump_stack_lvl+0xfa/0x120 [ 2956.463061] should_fail_ex+0x4d7/0x5e0 [ 2956.463081] should_fail_alloc_page+0xe0/0x110 [ 2956.463100] prepare_alloc_pages+0x1af/0x500 [ 2956.463119] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2956.463139] ? __is_insn_slot_addr+0x136/0x290 [ 2956.463165] ? __is_insn_slot_addr+0x140/0x290 [ 2956.463186] ? kernel_text_address+0x5b/0xc0 [ 2956.463204] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2956.463223] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 2956.463242] ? arch_stack_walk+0x9c/0xf0 [ 2956.463256] ? look_up_lock_class+0x56/0x150 [ 2956.463282] ? __lock_acquire+0xc65/0x1b70 [ 2956.463297] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2956.463314] ? policy_nodemask+0xeb/0x4e0 [ 2956.463335] alloc_pages_mpol+0xed/0x340 [ 2956.463356] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2956.463375] ? find_held_lock+0x2b/0x80 [ 2956.463395] ? __pud_alloc+0x571/0x7c0 [ 2956.463416] alloc_pages_noprof+0xa1/0x380 [ 2956.463436] __pmd_alloc+0x3b/0x980 [ 2956.463456] copy_page_range+0x375e/0x5140 [ 2956.463489] ? __lock_acquire+0x694/0x1b70 [ 2956.463512] ? __lock_acquire+0xc65/0x1b70 [ 2956.463527] ? lock_is_held_type+0x9e/0x120 [ 2956.463549] ? __pfx_copy_page_range+0x10/0x10 [ 2956.463568] ? mas_destroy+0x5ce/0x9c0 [ 2956.463591] ? mas_store+0x17b/0x540 [ 2956.463605] ? __pfx_mas_store+0x10/0x10 [ 2956.463617] ? lock_release+0xc8/0x290 [ 2956.463638] ? lock_is_held_type+0x9e/0x120 [ 2956.463660] dup_mmap+0xd2f/0x1d10 [ 2956.463688] ? __pfx_dup_mmap+0x10/0x10 [ 2956.463713] ? lock_is_held_type+0x9e/0x120 [ 2956.463734] copy_process+0x3ad5/0x73c0 [ 2956.463748] ? __pfx__kstrtoull+0x10/0x10 [ 2956.463775] ? __pfx_copy_process+0x10/0x10 [ 2956.463789] ? __might_fault+0xe0/0x190 [ 2956.463806] ? _copy_from_user+0x5b/0xd0 [ 2956.463825] kernel_clone+0xea/0x7f0 [ 2956.463837] ? get_pid_task+0xfd/0x250 [ 2956.463851] ? __pfx_kernel_clone+0x10/0x10 [ 2956.463873] ? find_held_lock+0x2b/0x80 [ 2956.463893] ? ksys_write+0x121/0x240 [ 2956.463908] ? lock_is_held_type+0x9e/0x120 [ 2956.463928] __do_sys_clone3+0x1f5/0x280 [ 2956.463942] ? __pfx___do_sys_clone3+0x10/0x10 [ 2956.463964] ? __fget_files+0x20d/0x3b0 [ 2956.463982] ? fput+0x6a/0x100 [ 2956.463998] ? ksys_write+0x1a3/0x240 [ 2956.464011] ? __pfx_ksys_write+0x10/0x10 [ 2956.464026] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2956.464043] do_syscall_64+0xbf/0x360 [ 2956.464057] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2956.464071] RIP: 0033:0x7f232c718b19 [ 2956.464081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2956.464094] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2956.464106] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2956.464115] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2956.464123] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2956.464130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2956.464138] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2956.464156] 06:00:37 executing program 2: clone3(0x0, 0x0) 06:00:37 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 48) 06:00:37 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 06:00:37 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) 06:00:37 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 45) 06:00:37 executing program 5: clone3(&(0x7f00000006c0)={0x9000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:37 executing program 4: rt_sigprocmask(0x1, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x5]}, &(0x7f0000000040), 0x8) 06:00:37 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 51) [ 2965.289003] FAULT_INJECTION: forcing a failure. [ 2965.289003] name failslab, interval 1, probability 0, space 0, times 0 [ 2965.289962] CPU: 0 UID: 0 PID: 17607 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2965.289981] Tainted: [W]=WARN [ 2965.289985] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2965.289992] Call Trace: [ 2965.289997] [ 2965.290002] dump_stack_lvl+0xfa/0x120 [ 2965.290028] should_fail_ex+0x4d7/0x5e0 [ 2965.290046] ? ptlock_alloc+0x21/0x70 [ 2965.290057] should_failslab+0xc2/0x120 [ 2965.290072] kmem_cache_alloc_noprof+0x72/0x690 [ 2965.290090] ? ptlock_alloc+0x21/0x70 [ 2965.290100] ptlock_alloc+0x21/0x70 [ 2965.290110] pte_alloc_one+0x86/0x360 [ 2965.290129] __pte_alloc+0x6c/0x360 [ 2965.290144] ? __pfx___pte_alloc+0x10/0x10 [ 2965.290159] ? _raw_spin_unlock+0x1e/0x40 [ 2965.290174] ? __pmd_alloc+0x3f9/0x980 [ 2965.290192] copy_page_range+0x313f/0x5140 [ 2965.290227] ? __pfx_copy_page_range+0x10/0x10 [ 2965.290244] ? mas_destroy+0x5ce/0x9c0 [ 2965.290262] ? mas_store+0x17b/0x540 [ 2965.290275] ? __pfx_mas_store+0x10/0x10 [ 2965.290286] ? lock_release+0xc8/0x290 [ 2965.290307] ? lock_is_held_type+0x9e/0x120 [ 2965.290326] dup_mmap+0xd2f/0x1d10 [ 2965.290349] ? __pfx_dup_mmap+0x10/0x10 [ 2965.290372] ? lock_is_held_type+0x9e/0x120 [ 2965.290392] copy_process+0x3ad5/0x73c0 [ 2965.290404] ? __pfx__kstrtoull+0x10/0x10 [ 2965.290429] ? __pfx_copy_process+0x10/0x10 [ 2965.290441] ? __might_fault+0xe0/0x190 [ 2965.290457] ? _copy_from_user+0x5b/0xd0 [ 2965.290474] kernel_clone+0xea/0x7f0 [ 2965.290486] ? get_pid_task+0xfd/0x250 [ 2965.290500] ? __pfx_kernel_clone+0x10/0x10 [ 2965.290516] ? find_held_lock+0x2b/0x80 [ 2965.290534] ? ksys_write+0x121/0x240 [ 2965.290547] ? lock_is_held_type+0x9e/0x120 [ 2965.290565] __do_sys_clone3+0x1f5/0x280 [ 2965.290578] ? __pfx___do_sys_clone3+0x10/0x10 [ 2965.290603] ? __fget_files+0x20d/0x3b0 [ 2965.290619] ? fput+0x6a/0x100 [ 2965.290634] ? ksys_write+0x1a3/0x240 [ 2965.290646] ? __pfx_ksys_write+0x10/0x10 [ 2965.290660] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2965.290676] do_syscall_64+0xbf/0x360 [ 2965.290688] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2965.290701] RIP: 0033:0x7f232c718b19 [ 2965.290711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2965.290722] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2965.290735] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2965.290743] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2965.290750] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2965.290757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2965.290764] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2965.290781] [ 2965.317420] FAULT_INJECTION: forcing a failure. [ 2965.317420] name failslab, interval 1, probability 0, space 0, times 0 [ 2965.318374] CPU: 0 UID: 0 PID: 17613 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2965.318392] Tainted: [W]=WARN [ 2965.318396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2965.318402] Call Trace: [ 2965.318405] [ 2965.318410] dump_stack_lvl+0xfa/0x120 [ 2965.318429] should_fail_ex+0x4d7/0x5e0 [ 2965.318443] ? __pmd_alloc+0x98/0x980 [ 2965.318458] should_failslab+0xc2/0x120 [ 2965.318472] kmem_cache_alloc_noprof+0x72/0x690 [ 2965.318484] ? __pud_alloc+0x571/0x7c0 [ 2965.318504] ? __pmd_alloc+0x98/0x980 [ 2965.318519] __pmd_alloc+0x98/0x980 [ 2965.318538] copy_page_range+0x375e/0x5140 [ 2965.318556] ? __lock_acquire+0x694/0x1b70 [ 2965.318578] ? __lock_acquire+0xc65/0x1b70 [ 2965.318595] ? lock_is_held_type+0x9e/0x120 [ 2965.318616] ? __pfx_copy_page_range+0x10/0x10 [ 2965.318633] ? mas_destroy+0x5ce/0x9c0 [ 2965.318649] ? mas_store+0x17b/0x540 [ 2965.318662] ? __pfx_mas_store+0x10/0x10 [ 2965.318674] ? lock_release+0xc8/0x290 [ 2965.318693] ? lock_is_held_type+0x9e/0x120 [ 2965.318712] dup_mmap+0xd2f/0x1d10 [ 2965.318734] ? __pfx_dup_mmap+0x10/0x10 [ 2965.318757] ? lock_is_held_type+0x9e/0x120 [ 2965.318777] copy_process+0x3ad5/0x73c0 [ 2965.318788] ? __pfx__kstrtoull+0x10/0x10 [ 2965.318812] ? __pfx_copy_process+0x10/0x10 [ 2965.318825] ? __might_fault+0xe0/0x190 [ 2965.318841] ? _copy_from_user+0x5b/0xd0 [ 2965.318858] kernel_clone+0xea/0x7f0 [ 2965.318869] ? get_pid_task+0xfd/0x250 [ 2965.318881] ? __pfx_kernel_clone+0x10/0x10 [ 2965.318898] ? find_held_lock+0x2b/0x80 [ 2965.318915] ? ksys_write+0x121/0x240 [ 2965.318927] ? lock_is_held_type+0x9e/0x120 [ 2965.318945] __do_sys_clone3+0x1f5/0x280 [ 2965.318957] ? __pfx___do_sys_clone3+0x10/0x10 [ 2965.318978] ? __fget_files+0x20d/0x3b0 [ 2965.318994] ? fput+0x6a/0x100 [ 2965.319008] ? ksys_write+0x1a3/0x240 [ 2965.319020] ? __pfx_ksys_write+0x10/0x10 [ 2965.319033] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2965.319048] do_syscall_64+0xbf/0x360 [ 2965.319059] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2965.319071] RIP: 0033:0x7fb9f533db19 [ 2965.319079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2965.319091] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2965.319102] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2965.319110] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2965.319117] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2965.319124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2965.319131] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2965.319148] 06:00:37 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r1, 0x0, 0x20000000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$sock(r2, &(0x7f0000000240)={&(0x7f00000002c0)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e24, 0x1}}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000340)="b545cd113a1be5b7240a73de6ab0032b057d31af1d4cd62625e743ac66e5c3562c6b6c5f5e5c12de0f74890cba39b1aa70cda96250c30fe04002e9d207a14ba654f5672631edc391374476e92b97d6bcd8b7bd27ae0153395817b1db6b3b4993c9b18eefc45e89f5", 0x68}, {&(0x7f00000003c0)="735835323e7c0b136f2e90776003953cb53eada193c7d06ca1a498839a3de5fc94fa7c82318d33137c0422c8b480acc02cd4edbe0d9e65769f9c835851ac787baf70", 0x42}, {&(0x7f0000000440)="0250a8756f8f349828fab079cfd5ec49379f5f6971bbdeb4e2859a6b063643029f4ed998ffff29e99f6fc59c1e13d385e781075bc1b156ec375856c8daa038aca7a0af0bc0bb63b3cfbd9f2500d0d36a341691a382691e12cf414c289f665b4b9e2f0cbfa2930cdf5b385517b3616de553d9a5715a2f186fbf207050fb7a5c96e61be6579f082c9f9dc3989a6929a09305bedd4ba7d85e48dd2395e1ce28807d3a1a878351d9040cb8a97cd6ddac098edb393e8ba520c61d7c5fd62990e08d741da8", 0xc2}, {&(0x7f0000000540)="9949843eed7c76536ce7c458843bf67e4268237bf7eccafbfb5f9b208e17468db2e75b8a6999d495b279a96f10dd1c0ff7d682bbf4c0d4f600a46430e422ca3561cf30be5559c6ecbb8002de1857c24754a228cc63c78473ea2d985e", 0x5c}, {&(0x7f00000005c0)="a770b4c5f3f9a97d12b4d0fb3837c8fcc244f798fc420ed3e4e7379ae055b215ea22bfb82cb859f15620100cefee5bb4b0e10a2d5138c468d4a2f696bbb89b5033f8f45d9fad2a00aac9061ddf4e35418164b73ca7c30a21b73496438843741c9667dd8d8e7d5850615ae1dc03ab3cf41a3ada91acbeabdf49533f7e0de6d4bc36a50ec2ccf06631c0689135c2072bc19f379029172c88e787e0d80e0c0ce95cd77b46ec05c00b3d0e5337bae089074b5c6e7758f9c7f937b00417589201e78cb98e23a82665caf36c47a1b49187b4493451441e9f0152c56c6b6e52602d378c1e62312e9a6dcf2b103f936e16bed4e629be56", 0xf3}, {&(0x7f0000000100)}, {&(0x7f00000006c0)="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", 0xfc}, {&(0x7f00000007c0)="0c9eb4b01604be30807243941288771b1ee4e4528148e706c7bae2309da9d3150192af9e8280119ae07386955a44c32256733e556d0d68c4c3f50cb46c049164e3650725ba21212ab0687332c18a6e5484a961c02bb459ac1fe70d4696ee8625", 0x60}, {&(0x7f0000000840)="4998c00eca7dc0d69fd08cb62be507ea04dc34b6aa7937434a98ba4043106c259bd277a589598da480cc3ed69c5300a7f577d86767dfbaaa3fe213b4b84ea6b4792c30efbd4f1bb2568b2e19c3cf9d39937e9b0f48330ce7", 0x58}, {&(0x7f00000008c0)="8efb70df384e6f5dce14ab697d7a8364c672619947ecc913bcfbe12f1abbd3c871acb6a0cfa603ec2c833373dba2f032ed0801ad2288e4fadaaa3db4627529500460104a84075675fb9058f3d1856d99aea5b34358953a1e4f1b9ff7ca3c5c0cc0271f363c765468d4a195ea", 0x6c}], 0xa}, 0x4000811) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="1f000000188924811e3917c26c8a331498ddc9155ccb7bb2367ac6f29158f0f9a4134aa3d4f7bce228d42840aa11cc9999fa880c4e1377d38fef7aeb3faacf8dbfb424115c6e67e25a4e10a144879b39fce293f7fc21de3194c5911c2ba7164827723860f48071b81e6187cd7e71c4ca4206be77b574522b8ade3b716cd4eafb4897a134e014b1911a0830e30f13d7ac1bf4578e45bcb1f98dc747d9eb0e4fd7f02cb4d800b7fd263d83a90992f3b3ba07731314c92bb7", @ANYRES16=0x0, @ANYBLOB="080029bd7000fddbdf2501000000000000000b000000000c001473797a3000000000"], 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) 06:00:37 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:37 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) 06:00:37 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 06:00:37 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 46) 06:00:37 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 52) 06:00:37 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0x68]}, 0x0, 0x8) 06:00:37 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 49) 06:00:37 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:48 executing program 2: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:48 executing program 5: clone3(&(0x7f00000006c0)={0xd000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:48 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 06:00:48 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 53) 06:00:48 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 47) 06:00:48 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) 06:00:48 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 50) 06:00:48 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x3, 0x9) r1 = gettid() perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x3, 0x60, 0x81, 0x80, 0x0, 0x20000000, 0x80000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x4, @perf_bp={&(0x7f0000000200), 0xe}, 0x81, 0x7fffffff, 0x80000000, 0x9, 0x0, 0x7fff, 0xec6, 0x0, 0x7, 0x0, 0x1}, r1, 0x9, 0xffffffffffffffff, 0x3) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_ADT={0x30, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'ip6gre0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffe}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x1ff}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffff821}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x13}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x138}}, 0x8000) [ 2976.187008] FAULT_INJECTION: forcing a failure. [ 2976.187008] name failslab, interval 1, probability 0, space 0, times 0 [ 2976.188718] CPU: 0 UID: 0 PID: 17651 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2976.188757] Tainted: [W]=WARN [ 2976.188764] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2976.188779] Call Trace: [ 2976.188787] [ 2976.188797] dump_stack_lvl+0xfa/0x120 [ 2976.188841] should_fail_ex+0x4d7/0x5e0 [ 2976.188874] ? vm_area_dup+0x25/0x6f0 [ 2976.188900] should_failslab+0xc2/0x120 [ 2976.188929] kmem_cache_alloc_noprof+0x72/0x690 [ 2976.188955] ? find_held_lock+0x2b/0x80 [ 2976.188993] ? dup_mmap+0x5d3/0x1d10 [ 2976.189034] ? vm_area_dup+0x25/0x6f0 [ 2976.189058] vm_area_dup+0x25/0x6f0 [ 2976.189085] dup_mmap+0x80d/0x1d10 [ 2976.189136] ? __pfx_dup_mmap+0x10/0x10 [ 2976.189200] ? lock_is_held_type+0x9e/0x120 [ 2976.189243] copy_process+0x3ad5/0x73c0 [ 2976.189267] ? __pfx__kstrtoull+0x10/0x10 [ 2976.189317] ? __pfx_copy_process+0x10/0x10 [ 2976.189342] ? __might_fault+0xe0/0x190 [ 2976.189375] ? _copy_from_user+0x5b/0xd0 [ 2976.189408] kernel_clone+0xea/0x7f0 [ 2976.189432] ? get_pid_task+0xfd/0x250 [ 2976.189457] ? __pfx_kernel_clone+0x10/0x10 [ 2976.189489] ? find_held_lock+0x2b/0x80 [ 2976.189524] ? ksys_write+0x121/0x240 [ 2976.189549] ? lock_is_held_type+0x9e/0x120 [ 2976.189585] __do_sys_clone3+0x1f5/0x280 [ 2976.189619] ? __pfx___do_sys_clone3+0x10/0x10 [ 2976.189660] ? __fget_files+0x20d/0x3b0 [ 2976.189692] ? fput+0x6a/0x100 [ 2976.189722] ? ksys_write+0x1a3/0x240 [ 2976.189746] ? __pfx_ksys_write+0x10/0x10 [ 2976.189773] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2976.189803] do_syscall_64+0xbf/0x360 [ 2976.189827] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2976.189851] RIP: 0033:0x7f232c718b19 [ 2976.189869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2976.189893] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2976.189916] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2976.189932] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2976.189946] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2976.189961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2976.189975] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2976.190006] [ 2976.221152] FAULT_INJECTION: forcing a failure. [ 2976.221152] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2976.223261] CPU: 1 UID: 0 PID: 17657 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2976.223302] Tainted: [W]=WARN [ 2976.223310] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2976.223326] Call Trace: [ 2976.223334] [ 2976.223344] dump_stack_lvl+0xfa/0x120 [ 2976.223384] FAULT_INJECTION: forcing a failure. [ 2976.223384] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2976.223391] should_fail_ex+0x4d7/0x5e0 [ 2976.223427] should_fail_alloc_page+0xe0/0x110 [ 2976.223461] prepare_alloc_pages+0x1af/0x500 [ 2976.223491] ? __is_insn_slot_addr+0x136/0x290 [ 2976.223534] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2976.223579] ? kernel_text_address+0x5b/0xc0 [ 2976.223620] ? __kernel_text_address+0xd/0x40 [ 2976.223650] ? unwind_get_return_address+0x59/0xa0 [ 2976.223703] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 2976.223736] ? arch_stack_walk+0x9c/0xf0 [ 2976.223762] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 06:00:48 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) [ 2976.223811] ? __lock_acquire+0xc65/0x1b70 06:00:48 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 2976.223848] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2976.223881] ? policy_nodemask+0xeb/0x4e0 [ 2976.223922] alloc_pages_mpol+0xed/0x340 [ 2976.223960] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2976.224008] alloc_pages_noprof+0xa1/0x380 [ 2976.224047] pte_alloc_one+0x1e/0x360 [ 2976.224085] __pte_alloc+0x6c/0x360 [ 2976.224117] ? __pfx___pte_alloc+0x10/0x10 [ 2976.224150] ? _raw_spin_unlock+0x1e/0x40 [ 2976.224181] ? __pmd_alloc+0x3f9/0x980 [ 2976.224220] copy_page_range+0x313f/0x5140 [ 2976.224293] ? __pfx_copy_page_range+0x10/0x10 [ 2976.224331] ? mas_destroy+0x5ce/0x9c0 [ 2976.224366] ? mas_store+0x17b/0x540 [ 2976.224393] ? __pfx_mas_store+0x10/0x10 [ 2976.224418] ? lock_release+0xc8/0x290 [ 2976.224459] ? lock_is_held_type+0x9e/0x120 [ 2976.224499] dup_mmap+0xd2f/0x1d10 [ 2976.224547] ? __pfx_dup_mmap+0x10/0x10 [ 2976.224597] ? lock_is_held_type+0x9e/0x120 [ 2976.224639] copy_process+0x3ad5/0x73c0 [ 2976.224664] ? __pfx__kstrtoull+0x10/0x10 [ 2976.224717] ? __pfx_copy_process+0x10/0x10 [ 2976.224744] ? __might_fault+0xe0/0x190 [ 2976.224778] ? _copy_from_user+0x5b/0xd0 [ 2976.224814] kernel_clone+0xea/0x7f0 [ 2976.224839] ? get_pid_task+0xfd/0x250 [ 2976.224866] ? __pfx_kernel_clone+0x10/0x10 [ 2976.224901] ? find_held_lock+0x2b/0x80 [ 2976.224938] ? ksys_write+0x121/0x240 [ 2976.224965] ? lock_is_held_type+0x9e/0x120 [ 2976.225005] __do_sys_clone3+0x1f5/0x280 [ 2976.225031] ? __pfx___do_sys_clone3+0x10/0x10 [ 2976.225077] ? __fget_files+0x20d/0x3b0 [ 2976.225111] ? fput+0x6a/0x100 [ 2976.225144] ? ksys_write+0x1a3/0x240 [ 2976.225169] ? __pfx_ksys_write+0x10/0x10 [ 2976.225199] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2976.225231] do_syscall_64+0xbf/0x360 [ 2976.225255] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2976.225281] RIP: 0033:0x7fb9f533db19 [ 2976.225300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2976.225325] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2976.225349] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2976.225366] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2976.225382] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2976.225397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2976.225412] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2976.225447] [ 2976.274051] CPU: 0 UID: 0 PID: 17653 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2976.274102] Tainted: [W]=WARN [ 2976.274110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2976.274127] Call Trace: [ 2976.274138] [ 2976.274150] dump_stack_lvl+0xfa/0x120 [ 2976.274208] should_fail_ex+0x4d7/0x5e0 [ 2976.274240] should_fail_alloc_page+0xe0/0x110 [ 2976.274271] prepare_alloc_pages+0x1af/0x500 [ 2976.274305] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2976.274341] ? __is_insn_slot_addr+0x136/0x290 [ 2976.274386] ? __is_insn_slot_addr+0x140/0x290 [ 2976.274425] ? kernel_text_address+0x5b/0xc0 [ 2976.274454] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2976.274490] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 2976.274522] ? arch_stack_walk+0x9c/0xf0 [ 2976.274546] ? look_up_lock_class+0x56/0x150 [ 2976.274602] ? __lock_acquire+0xc65/0x1b70 [ 2976.274628] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2976.274659] ? policy_nodemask+0xeb/0x4e0 [ 2976.274698] alloc_pages_mpol+0xed/0x340 [ 2976.274733] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2976.274770] ? find_held_lock+0x2b/0x80 [ 2976.274804] ? __pud_alloc+0x571/0x7c0 [ 2976.274841] alloc_pages_noprof+0xa1/0x380 [ 2976.274878] __pmd_alloc+0x3b/0x980 [ 2976.274915] copy_page_range+0x375e/0x5140 [ 2976.274952] ? __lock_acquire+0x694/0x1b70 [ 2976.274995] ? __lock_acquire+0xc65/0x1b70 [ 2976.275022] ? lock_is_held_type+0x9e/0x120 [ 2976.275063] ? __pfx_copy_page_range+0x10/0x10 [ 2976.275098] ? mas_destroy+0x5ce/0x9c0 [ 2976.275138] ? mas_store+0x17b/0x540 [ 2976.275175] ? __pfx_mas_store+0x10/0x10 [ 2976.275207] ? lock_release+0xc8/0x290 [ 2976.275265] ? lock_is_held_type+0x9e/0x120 [ 2976.275303] dup_mmap+0xd2f/0x1d10 [ 2976.275348] ? __pfx_dup_mmap+0x10/0x10 [ 2976.275394] ? lock_is_held_type+0x9e/0x120 [ 2976.275434] copy_process+0x3ad5/0x73c0 [ 2976.275457] ? __pfx__kstrtoull+0x10/0x10 [ 2976.275506] ? __pfx_copy_process+0x10/0x10 [ 2976.275530] ? __might_fault+0xe0/0x190 [ 2976.275562] ? _copy_from_user+0x5b/0xd0 [ 2976.275597] kernel_clone+0xea/0x7f0 [ 2976.275619] ? get_pid_task+0xfd/0x250 [ 2976.275646] ? __pfx_kernel_clone+0x10/0x10 [ 2976.275694] ? find_held_lock+0x2b/0x80 [ 2976.275731] ? ksys_write+0x121/0x240 [ 2976.275755] ? lock_is_held_type+0x9e/0x120 [ 2976.275792] __do_sys_clone3+0x1f5/0x280 [ 2976.275816] ? __pfx___do_sys_clone3+0x10/0x10 [ 2976.275858] ? __fget_files+0x20d/0x3b0 [ 2976.275888] ? fput+0x6a/0x100 [ 2976.275918] ? ksys_write+0x1a3/0x240 [ 2976.275941] ? __pfx_ksys_write+0x10/0x10 [ 2976.275969] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2976.275998] do_syscall_64+0xbf/0x360 [ 2976.276020] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2976.276043] RIP: 0033:0x7f3a168c2b19 [ 2976.276061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2976.276085] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2976.276107] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2976.276126] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2976.276146] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2976.276166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2976.276186] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2976.276238] 06:00:48 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 48) 06:00:48 executing program 4: sendmsg$NL80211_CMD_SET_MAC_ACL(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, 0x0, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x7ff, 0x73}}}}, [@NL80211_ATTR_ACL_POLICY={0x8}, @NL80211_ATTR_MAC_ADDRS={0x4}, @NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x8004}, 0x20040840) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="00012d01000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000840}, 0x10) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x29, 0x9, 0x40, 0x2, 0x6, @mcast2, @dev={0xfe, 0x80, '\x00', 0x18}, 0x700, 0x700, 0x9, 0x20}}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000002c0)=""/117, &(0x7f0000000340)=0x75) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, 0x0, 0x0, 0x70bd2d, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040010}, 0x40000) r1 = socket$inet6(0xa, 0x0, 0x9) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000480)={@mcast2, r0}, 0x14) 06:00:48 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 54) 06:00:48 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 51) [ 2976.494312] FAULT_INJECTION: forcing a failure. [ 2976.494312] name failslab, interval 1, probability 0, space 0, times 0 [ 2976.496211] CPU: 0 UID: 0 PID: 17667 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2976.496248] Tainted: [W]=WARN [ 2976.496255] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2976.496269] Call Trace: [ 2976.496276] [ 2976.496285] dump_stack_lvl+0xfa/0x120 [ 2976.496328] should_fail_ex+0x4d7/0x5e0 [ 2976.496358] ? __pmd_alloc+0x98/0x980 [ 2976.496388] should_failslab+0xc2/0x120 [ 2976.496415] kmem_cache_alloc_noprof+0x72/0x690 [ 2976.496439] ? __pud_alloc+0x571/0x7c0 [ 2976.496475] ? __pmd_alloc+0x98/0x980 [ 2976.496504] __pmd_alloc+0x98/0x980 [ 2976.496538] copy_page_range+0x375e/0x5140 [ 2976.496572] ? __lock_acquire+0x694/0x1b70 [ 2976.496625] ? __lock_acquire+0xc65/0x1b70 [ 2976.496650] ? lock_is_held_type+0x9e/0x120 [ 2976.496691] ? __pfx_copy_page_range+0x10/0x10 [ 2976.496722] ? mas_destroy+0x5ce/0x9c0 [ 2976.496754] ? mas_store+0x17b/0x540 [ 2976.496778] ? __pfx_mas_store+0x10/0x10 [ 2976.496799] ? lock_release+0xc8/0x290 [ 2976.496836] ? lock_is_held_type+0x9e/0x120 [ 2976.496870] dup_mmap+0xd2f/0x1d10 [ 2976.496912] ? __pfx_dup_mmap+0x10/0x10 [ 2976.496956] ? lock_is_held_type+0x9e/0x120 [ 2976.496992] copy_process+0x3ad5/0x73c0 [ 2976.497014] ? __pfx__kstrtoull+0x10/0x10 [ 2976.497062] ? __pfx_copy_process+0x10/0x10 [ 2976.497084] ? __might_fault+0xe0/0x190 [ 2976.497115] ? _copy_from_user+0x5b/0xd0 [ 2976.497147] kernel_clone+0xea/0x7f0 [ 2976.497168] ? get_pid_task+0xfd/0x250 [ 2976.497192] ? __pfx_kernel_clone+0x10/0x10 [ 2976.497223] ? find_held_lock+0x2b/0x80 [ 2976.497256] ? ksys_write+0x121/0x240 [ 2976.497280] ? lock_is_held_type+0x9e/0x120 [ 2976.497314] __do_sys_clone3+0x1f5/0x280 [ 2976.497338] ? __pfx___do_sys_clone3+0x10/0x10 [ 2976.497377] ? __fget_files+0x20d/0x3b0 [ 2976.497406] ? fput+0x6a/0x100 [ 2976.497434] ? ksys_write+0x1a3/0x240 [ 2976.497456] ? __pfx_ksys_write+0x10/0x10 [ 2976.497482] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2976.497511] do_syscall_64+0xbf/0x360 [ 2976.497532] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2976.497555] RIP: 0033:0x7f3a168c2b19 [ 2976.497572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2976.497593] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2976.497614] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2976.497629] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2976.497643] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2976.497656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2976.497669] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2976.497700] 06:00:48 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) 06:00:48 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) [ 2976.553230] FAULT_INJECTION: forcing a failure. [ 2976.553230] name failslab, interval 1, probability 0, space 0, times 0 [ 2976.555173] CPU: 1 UID: 0 PID: 17670 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2976.555212] Tainted: [W]=WARN [ 2976.555220] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2976.555234] Call Trace: [ 2976.555242] [ 2976.555251] dump_stack_lvl+0xfa/0x120 [ 2976.555295] should_fail_ex+0x4d7/0x5e0 [ 2976.555328] ? ptlock_alloc+0x21/0x70 [ 2976.555350] should_failslab+0xc2/0x120 [ 2976.555379] kmem_cache_alloc_noprof+0x72/0x690 [ 2976.555414] ? ptlock_alloc+0x21/0x70 [ 2976.555433] ptlock_alloc+0x21/0x70 [ 2976.555455] pte_alloc_one+0x86/0x360 [ 2976.555491] __pte_alloc+0x6c/0x360 [ 2976.555521] ? __pfx___pte_alloc+0x10/0x10 [ 2976.555552] ? _raw_spin_unlock+0x1e/0x40 [ 2976.555582] ? __pmd_alloc+0x3f9/0x980 [ 2976.555626] copy_page_range+0x313f/0x5140 [ 2976.555707] ? __pfx_copy_page_range+0x10/0x10 [ 2976.555745] ? mas_destroy+0x5ce/0x9c0 [ 2976.555779] ? mas_store+0x17b/0x540 [ 2976.555804] ? __pfx_mas_store+0x10/0x10 [ 2976.555828] ? lock_release+0xc8/0x290 [ 2976.555868] ? lock_is_held_type+0x9e/0x120 [ 2976.555906] dup_mmap+0xd2f/0x1d10 [ 2976.555951] ? __pfx_dup_mmap+0x10/0x10 [ 2976.555997] ? lock_is_held_type+0x9e/0x120 [ 2976.556037] copy_process+0x3ad5/0x73c0 [ 2976.556061] ? __pfx__kstrtoull+0x10/0x10 [ 2976.556112] ? __pfx_copy_process+0x10/0x10 [ 2976.556137] ? __might_fault+0xe0/0x190 [ 2976.556169] ? _copy_from_user+0x5b/0xd0 [ 2976.556203] kernel_clone+0xea/0x7f0 [ 2976.556227] ? get_pid_task+0xfd/0x250 [ 2976.556252] ? __pfx_kernel_clone+0x10/0x10 [ 2976.556285] ? find_held_lock+0x2b/0x80 [ 2976.556320] ? ksys_write+0x121/0x240 [ 2976.556346] ? lock_is_held_type+0x9e/0x120 [ 2976.556382] __do_sys_clone3+0x1f5/0x280 [ 2976.556407] ? __pfx___do_sys_clone3+0x10/0x10 [ 2976.556449] ? __fget_files+0x20d/0x3b0 [ 2976.556480] ? fput+0x6a/0x100 [ 2976.556510] ? ksys_write+0x1a3/0x240 [ 2976.556533] ? __pfx_ksys_write+0x10/0x10 [ 2976.556561] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2976.556591] do_syscall_64+0xbf/0x360 [ 2976.556615] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2976.556639] RIP: 0033:0x7fb9f533db19 [ 2976.556657] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2976.556680] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2976.556703] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2976.556719] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2976.556734] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2976.556748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2976.556762] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2976.556794] 06:00:58 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) 06:00:58 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 49) 06:00:58 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 55) 06:00:58 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) 06:00:58 executing program 5: clone3(&(0x7f00000006c0)={0x10000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:58 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 52) 06:00:58 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 06:00:58 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x3, 0x9) r1 = gettid() perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x3, 0x60, 0x81, 0x80, 0x0, 0x20000000, 0x80000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x4, @perf_bp={&(0x7f0000000200), 0xe}, 0x81, 0x7fffffff, 0x80000000, 0x9, 0x0, 0x7fff, 0xec6, 0x0, 0x7, 0x0, 0x1}, r1, 0x9, 0xffffffffffffffff, 0x3) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_ADT={0x30, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'ip6gre0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffe}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x1ff}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffff821}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x13}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x138}}, 0x8000) 06:00:58 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b", 0x70, 0xfffffffffffffffb) 06:00:58 executing program 5: clone3(&(0x7f00000006c0)={0x11000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2986.698506] FAULT_INJECTION: forcing a failure. [ 2986.698506] name failslab, interval 1, probability 0, space 0, times 0 [ 2986.700254] CPU: 0 UID: 0 PID: 17704 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2986.700292] Tainted: [W]=WARN [ 2986.700300] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2986.700315] Call Trace: [ 2986.700322] [ 2986.700331] dump_stack_lvl+0xfa/0x120 [ 2986.700374] should_fail_ex+0x4d7/0x5e0 [ 2986.700407] ? vm_area_dup+0x25/0x6f0 [ 2986.700431] should_failslab+0xc2/0x120 [ 2986.700460] kmem_cache_alloc_noprof+0x72/0x690 [ 2986.700486] ? find_held_lock+0x2b/0x80 [ 2986.700521] ? dup_mmap+0x5d3/0x1d10 [ 2986.700559] ? vm_area_dup+0x25/0x6f0 [ 2986.700582] vm_area_dup+0x25/0x6f0 [ 2986.700616] dup_mmap+0x80d/0x1d10 [ 2986.700661] ? __pfx_dup_mmap+0x10/0x10 [ 2986.700708] ? lock_is_held_type+0x9e/0x120 [ 2986.700749] copy_process+0x3ad5/0x73c0 [ 2986.700773] ? __pfx__kstrtoull+0x10/0x10 [ 2986.700823] ? __pfx_copy_process+0x10/0x10 [ 2986.700848] ? __might_fault+0xe0/0x190 [ 2986.700880] ? _copy_from_user+0x5b/0xd0 [ 2986.700914] kernel_clone+0xea/0x7f0 [ 2986.700937] ? get_pid_task+0xfd/0x250 [ 2986.700962] ? __pfx_kernel_clone+0x10/0x10 [ 2986.700995] ? find_held_lock+0x2b/0x80 [ 2986.701030] ? ksys_write+0x121/0x240 [ 2986.701055] ? lock_is_held_type+0x9e/0x120 [ 2986.701092] __do_sys_clone3+0x1f5/0x280 [ 2986.701117] ? __pfx___do_sys_clone3+0x10/0x10 [ 2986.701158] ? __fget_files+0x20d/0x3b0 [ 2986.701189] ? fput+0x6a/0x100 [ 2986.701218] ? ksys_write+0x1a3/0x240 [ 2986.701242] ? __pfx_ksys_write+0x10/0x10 [ 2986.701269] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2986.701300] do_syscall_64+0xbf/0x360 [ 2986.701323] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2986.701347] RIP: 0033:0x7f232c718b19 [ 2986.701365] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2986.701388] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2986.701411] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2986.701427] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2986.701442] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2986.701456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2986.701470] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2986.701502] 06:00:58 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 53) 06:00:58 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de", 0x1, 0xfffffffffffffffb) 06:00:58 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 50) 06:00:58 executing program 4: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x7f}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40008c45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000001600)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x68, r1, 0x800, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x0, @media='ib\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xc800}, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001440)={&(0x7f00000011c0)={0x258, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_MODES_OURS={0x10c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x25, 0x5, "9678ce60a6e1b1909ba2080ea804acbde346ad65d45a11961c98d2ec5cdd1268d3"}, @ETHTOOL_A_BITSET_VALUE={0x24, 0x4, "8a89b0ceab12ae77e3a4a044234777535ab0135ff059654c2e14cb6f8d942e97"}, @ETHTOOL_A_BITSET_BITS={0xbc, 0x3, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb3ec}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1935}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3a83}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[.^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '#\\\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*[\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xf4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xea, 0x4, "ac899a4479260e958e52fb521e00418436a6153286c3d9c625f035c1cdf03983270ee8753cebd94ee4331ed8c27258eb3fe6c02740c581ed816de1cace803d1943d5467b1a3a0e5f6e7b2356be0a049e3562ea07cfcd0ded24181010364d3af2e591d41fc53cf1431729edc9204076283c2f5a5bed5fc5953f3eea27d3abbcc0d1184743c3804ffd7c99bdf669d7f2516e9744241102b73334981db8fdd52dfd8819bf869cd366cf806ec87ea838d6aecdff816918f1db18052549135a5df90444d47d2eed8789c8047a586a6113da44bb5d0c41175222d969fcaefccfb2abf38ad53e8b2a47"}]}, @ETHTOOL_A_EEE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0x258}, 0x1, 0x0, 0x0, 0x2404e080}, 0x20000800) kexec_load(0x1, 0x2, &(0x7f0000001140)=[{&(0x7f0000000040)="36b652e9c21b66de276e24d77013ab4130d4d5d3e3702a74efc5b1db3e53149dd8c92e880877e612ed47817197ebb197bd52ea", 0x33, 0x10001, 0x31c}, {&(0x7f0000000140)="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", 0x1000, 0x2, 0x8}], 0x2a0000) 06:00:58 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x3, 0x9) r1 = gettid() perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x3, 0x60, 0x81, 0x80, 0x0, 0x20000000, 0x80000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x4, @perf_bp={&(0x7f0000000200), 0xe}, 0x81, 0x7fffffff, 0x80000000, 0x9, 0x0, 0x7fff, 0xec6, 0x0, 0x7, 0x0, 0x1}, r1, 0x9, 0xffffffffffffffff, 0x3) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_ADT={0x30, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'ip6gre0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffe}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x1ff}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffff821}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x13}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x138}}, 0x8000) [ 2986.830387] FAULT_INJECTION: forcing a failure. [ 2986.830387] name failslab, interval 1, probability 0, space 0, times 0 [ 2986.831345] CPU: 1 UID: 0 PID: 17710 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2986.831366] Tainted: [W]=WARN [ 2986.831371] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2986.831379] Call Trace: [ 2986.831385] [ 2986.831391] dump_stack_lvl+0xfa/0x120 [ 2986.831418] should_fail_ex+0x4d7/0x5e0 [ 2986.831436] ? vm_area_dup+0x25/0x6f0 [ 2986.831451] should_failslab+0xc2/0x120 [ 2986.831467] kmem_cache_alloc_noprof+0x72/0x690 [ 2986.831480] ? find_held_lock+0x2b/0x80 [ 2986.831501] ? dup_mmap+0x5d3/0x1d10 [ 2986.831522] ? vm_area_dup+0x25/0x6f0 [ 2986.831534] vm_area_dup+0x25/0x6f0 [ 2986.831549] dup_mmap+0x80d/0x1d10 [ 2986.831573] ? __pfx_dup_mmap+0x10/0x10 [ 2986.831601] ? lock_is_held_type+0x9e/0x120 [ 2986.831623] copy_process+0x3ad5/0x73c0 [ 2986.831637] ? __pfx__kstrtoull+0x10/0x10 [ 2986.831664] ? __pfx_copy_process+0x10/0x10 [ 2986.831678] ? __might_fault+0xe0/0x190 [ 2986.831695] ? _copy_from_user+0x5b/0xd0 [ 2986.831714] kernel_clone+0xea/0x7f0 [ 2986.831726] ? get_pid_task+0xfd/0x250 [ 2986.831740] ? __pfx_kernel_clone+0x10/0x10 [ 2986.831758] ? find_held_lock+0x2b/0x80 [ 2986.831776] ? ksys_write+0x121/0x240 [ 2986.831801] ? lock_is_held_type+0x9e/0x120 [ 2986.831821] __do_sys_clone3+0x1f5/0x280 [ 2986.831834] ? __pfx___do_sys_clone3+0x10/0x10 [ 2986.831856] ? __fget_files+0x20d/0x3b0 [ 2986.831874] ? fput+0x6a/0x100 [ 2986.831890] ? ksys_write+0x1a3/0x240 [ 2986.831903] ? __pfx_ksys_write+0x10/0x10 [ 2986.831917] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2986.831934] do_syscall_64+0xbf/0x360 [ 2986.831948] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2986.831961] RIP: 0033:0x7fb9f533db19 [ 2986.831971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2986.831984] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2986.831997] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 2986.832006] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2986.832014] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 2986.832022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2986.832029] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 2986.832047] 06:00:58 executing program 0: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b", 0x70, 0xfffffffffffffffb) 06:00:58 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) 06:00:58 executing program 5: clone3(&(0x7f00000006c0)={0x1fffefff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:59 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 56) [ 2986.917695] FAULT_INJECTION: forcing a failure. [ 2986.917695] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2986.919754] CPU: 0 UID: 0 PID: 17718 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2986.919803] Tainted: [W]=WARN [ 2986.919811] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2986.919826] Call Trace: [ 2986.919833] [ 2986.919843] dump_stack_lvl+0xfa/0x120 [ 2986.919888] should_fail_ex+0x4d7/0x5e0 [ 2986.919922] should_fail_alloc_page+0xe0/0x110 [ 2986.919954] prepare_alloc_pages+0x1af/0x500 [ 2986.919988] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2986.920024] ? __is_insn_slot_addr+0x136/0x290 [ 2986.920069] ? __is_insn_slot_addr+0x140/0x290 [ 2986.920107] ? kernel_text_address+0x5b/0xc0 [ 2986.920138] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2986.920174] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 2986.920205] ? arch_stack_walk+0x9c/0xf0 [ 2986.920229] ? look_up_lock_class+0x56/0x150 [ 2986.920275] ? __lock_acquire+0xc65/0x1b70 [ 2986.920302] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2986.920334] ? policy_nodemask+0xeb/0x4e0 [ 2986.920372] alloc_pages_mpol+0xed/0x340 [ 2986.920407] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2986.920443] ? find_held_lock+0x2b/0x80 [ 2986.920479] ? __pud_alloc+0x571/0x7c0 [ 2986.920517] alloc_pages_noprof+0xa1/0x380 [ 2986.920554] __pmd_alloc+0x3b/0x980 [ 2986.920597] copy_page_range+0x375e/0x5140 [ 2986.920635] ? __lock_acquire+0x694/0x1b70 [ 2986.920677] ? __lock_acquire+0xc65/0x1b70 [ 2986.920704] ? lock_is_held_type+0x9e/0x120 [ 2986.920745] ? __pfx_copy_page_range+0x10/0x10 [ 2986.920779] ? mas_destroy+0x5ce/0x9c0 [ 2986.920813] ? mas_store+0x17b/0x540 [ 2986.920839] ? __pfx_mas_store+0x10/0x10 [ 2986.920861] ? lock_release+0xc8/0x290 [ 2986.920900] ? lock_is_held_type+0x9e/0x120 [ 2986.920936] dup_mmap+0xd2f/0x1d10 [ 2986.920981] ? __pfx_dup_mmap+0x10/0x10 [ 2986.921028] ? lock_is_held_type+0x9e/0x120 [ 2986.921067] copy_process+0x3ad5/0x73c0 [ 2986.921091] ? __pfx__kstrtoull+0x10/0x10 [ 2986.921141] ? __pfx_copy_process+0x10/0x10 [ 2986.921166] ? __might_fault+0xe0/0x190 [ 2986.921199] ? _copy_from_user+0x5b/0xd0 [ 2986.921233] kernel_clone+0xea/0x7f0 [ 2986.921258] ? get_pid_task+0xfd/0x250 [ 2986.921285] ? __pfx_kernel_clone+0x10/0x10 [ 2986.921317] ? find_held_lock+0x2b/0x80 [ 2986.921351] ? ksys_write+0x121/0x240 [ 2986.921377] ? lock_is_held_type+0x9e/0x120 [ 2986.921414] __do_sys_clone3+0x1f5/0x280 [ 2986.921439] ? __pfx___do_sys_clone3+0x10/0x10 [ 2986.921480] ? __fget_files+0x20d/0x3b0 [ 2986.921511] ? fput+0x6a/0x100 [ 2986.921540] ? ksys_write+0x1a3/0x240 [ 2986.921564] ? __pfx_ksys_write+0x10/0x10 [ 2986.921592] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2986.921622] do_syscall_64+0xbf/0x360 [ 2986.921645] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2986.921670] RIP: 0033:0x7f3a168c2b19 [ 2986.921688] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2986.921711] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2986.921734] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2986.921751] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2986.921765] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2986.921780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2986.921794] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2986.921827] 06:00:59 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) 06:00:59 executing program 5: clone3(&(0x7f00000006c0)={0x20000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:00:59 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x3, 0x9) r1 = gettid() perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x3, 0x60, 0x81, 0x80, 0x0, 0x20000000, 0x80000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x4, @perf_bp={&(0x7f0000000200), 0xe}, 0x81, 0x7fffffff, 0x80000000, 0x9, 0x0, 0x7fff, 0xec6, 0x0, 0x7, 0x0, 0x1}, r1, 0x9, 0xffffffffffffffff, 0x3) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_ADT={0x30, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'ip6gre0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffe}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x1ff}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffff821}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x13}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x138}}, 0x8000) [ 2987.099697] FAULT_INJECTION: forcing a failure. [ 2987.099697] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2987.100748] CPU: 1 UID: 0 PID: 17733 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2987.100769] Tainted: [W]=WARN [ 2987.100773] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2987.100781] Call Trace: [ 2987.100786] [ 2987.100791] dump_stack_lvl+0xfa/0x120 [ 2987.100817] should_fail_ex+0x4d7/0x5e0 [ 2987.100837] should_fail_alloc_page+0xe0/0x110 [ 2987.100856] prepare_alloc_pages+0x1af/0x500 [ 2987.100871] ? __is_insn_slot_addr+0x136/0x290 [ 2987.100894] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 2987.100917] ? kernel_text_address+0x5b/0xc0 [ 2987.100934] ? __kernel_text_address+0xd/0x40 [ 2987.100949] ? unwind_get_return_address+0x59/0xa0 [ 2987.100970] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 2987.100988] ? arch_stack_walk+0x9c/0xf0 [ 2987.101002] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 2987.101026] ? __lock_acquire+0xc65/0x1b70 [ 2987.101045] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 2987.101062] ? policy_nodemask+0xeb/0x4e0 [ 2987.101083] alloc_pages_mpol+0xed/0x340 [ 2987.101105] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 2987.101129] alloc_pages_noprof+0xa1/0x380 [ 2987.101149] pte_alloc_one+0x1e/0x360 [ 2987.101168] __pte_alloc+0x6c/0x360 [ 2987.101185] ? __pfx___pte_alloc+0x10/0x10 [ 2987.101201] ? _raw_spin_unlock+0x1e/0x40 [ 2987.101218] ? __pmd_alloc+0x3f9/0x980 [ 2987.101237] copy_page_range+0x313f/0x5140 [ 2987.101274] ? __pfx_copy_page_range+0x10/0x10 [ 2987.101293] ? mas_destroy+0x5ce/0x9c0 [ 2987.101312] ? mas_store+0x17b/0x540 [ 2987.101326] ? __pfx_mas_store+0x10/0x10 [ 2987.101338] ? lock_release+0xc8/0x290 [ 2987.101359] ? lock_is_held_type+0x9e/0x120 [ 2987.101379] dup_mmap+0xd2f/0x1d10 [ 2987.101404] ? __pfx_dup_mmap+0x10/0x10 [ 2987.101428] ? lock_is_held_type+0x9e/0x120 [ 2987.101449] copy_process+0x3ad5/0x73c0 [ 2987.101462] ? __pfx__kstrtoull+0x10/0x10 [ 2987.101490] ? __pfx_copy_process+0x10/0x10 [ 2987.101503] ? __might_fault+0xe0/0x190 [ 2987.101520] ? _copy_from_user+0x5b/0xd0 [ 2987.101539] kernel_clone+0xea/0x7f0 [ 2987.101551] ? get_pid_task+0xfd/0x250 [ 2987.101565] ? __pfx_kernel_clone+0x10/0x10 [ 2987.101583] ? find_held_lock+0x2b/0x80 [ 2987.101606] ? ksys_write+0x121/0x240 [ 2987.101620] ? lock_is_held_type+0x9e/0x120 [ 2987.101640] __do_sys_clone3+0x1f5/0x280 [ 2987.101653] ? __pfx___do_sys_clone3+0x10/0x10 [ 2987.101676] ? __fget_files+0x20d/0x3b0 [ 2987.101693] ? fput+0x6a/0x100 [ 2987.101709] ? ksys_write+0x1a3/0x240 [ 2987.101722] ? __pfx_ksys_write+0x10/0x10 [ 2987.101736] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2987.101753] do_syscall_64+0xbf/0x360 [ 2987.101766] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2987.101779] RIP: 0033:0x7f232c718b19 [ 2987.101789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2987.101802] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2987.101815] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2987.101823] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2987.101831] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2987.101839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2987.101846] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2987.101863] 06:00:59 executing program 0: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b", 0x70, 0xfffffffffffffffb) 06:01:08 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 54) 06:01:08 executing program 0: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b", 0x70, 0xfffffffffffffffb) 06:01:08 executing program 5: clone3(&(0x7f00000006c0)={0x3f000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:01:08 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 51) 06:01:08 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 57) 06:01:08 executing program 1: add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) 06:01:08 executing program 4: setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), r0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x74, r2, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0x2}, @ETHTOOL_A_CHANNELS_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000000}, 0x40801) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r3, 0x0, 0x20000000) sendmsg$sock(r3, &(0x7f0000000440)={&(0x7f0000000340)=@ethernet={0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x11}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="2c7d08db34dc13a2e3fc6489971c9d6d", 0x10}], 0x1}, 0x2) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="3c00000087f32c0acfd59a50045417f690c7655a0acd1a8117a7f797618215e275032f9e4938e57e3a29ef29c705fe810381", @ANYRES16=0x0, @ANYBLOB="300328bd7000fddbdf25040000002800018008000100", @ANYRES32=r4, @ANYBLOB="bf6b02007866726d3000000000000000000000000800030001000000"], 0x3c}, 0x1, 0x0, 0x0, 0x48080}, 0x48040) rt_sigprocmask(0x2, 0x0, 0x0, 0x5) 06:01:08 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x3, 0x9) gettid() sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_ADT={0x30, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'ip6gre0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffe}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x1ff}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffff821}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x13}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x138}}, 0x8000) [ 2996.298007] FAULT_INJECTION: forcing a failure. [ 2996.298007] name failslab, interval 1, probability 0, space 0, times 0 [ 2996.299059] CPU: 1 UID: 0 PID: 17761 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2996.299079] Tainted: [W]=WARN [ 2996.299083] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2996.299090] Call Trace: [ 2996.299094] [ 2996.299099] dump_stack_lvl+0xfa/0x120 [ 2996.299123] should_fail_ex+0x4d7/0x5e0 [ 2996.299141] ? vm_area_dup+0x25/0x6f0 [ 2996.299153] should_failslab+0xc2/0x120 [ 2996.299168] kmem_cache_alloc_noprof+0x72/0x690 [ 2996.299186] ? vm_area_dup+0x25/0x6f0 [ 2996.299197] ? __vm_enough_memory+0x188/0x400 [ 2996.299211] vm_area_dup+0x25/0x6f0 [ 2996.299224] dup_mmap+0x80d/0x1d10 [ 2996.299247] ? __pfx_dup_mmap+0x10/0x10 [ 2996.299270] ? lock_is_held_type+0x9e/0x120 [ 2996.299291] copy_process+0x3ad5/0x73c0 [ 2996.299304] ? __pfx__kstrtoull+0x10/0x10 [ 2996.299330] ? __pfx_copy_process+0x10/0x10 [ 2996.299342] ? __might_fault+0xe0/0x190 [ 2996.299358] ? _copy_from_user+0x5b/0xd0 [ 2996.299376] kernel_clone+0xea/0x7f0 [ 2996.299387] ? get_pid_task+0xfd/0x250 [ 2996.299400] ? __pfx_kernel_clone+0x10/0x10 [ 2996.299417] ? find_held_lock+0x2b/0x80 [ 2996.299435] ? ksys_write+0x121/0x240 [ 2996.299449] ? lock_is_held_type+0x9e/0x120 [ 2996.299467] __do_sys_clone3+0x1f5/0x280 [ 2996.299479] ? __pfx___do_sys_clone3+0x10/0x10 [ 2996.299500] ? __fget_files+0x20d/0x3b0 [ 2996.299517] ? fput+0x6a/0x100 [ 2996.299531] ? ksys_write+0x1a3/0x240 [ 2996.299543] ? __pfx_ksys_write+0x10/0x10 [ 2996.299557] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2996.299573] do_syscall_64+0xbf/0x360 [ 2996.299589] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2996.299601] RIP: 0033:0x7f232c718b19 [ 2996.299614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2996.299626] RSP: 002b:00007f2329c8e188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2996.299638] RAX: ffffffffffffffda RBX: 00007f232c82bf60 RCX: 00007f232c718b19 [ 2996.299646] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2996.299653] RBP: 00007f2329c8e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2996.299660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2996.299668] R13: 00007fffe27c6d5f R14: 00007f2329c8e300 R15: 0000000000022000 [ 2996.299684] [ 2996.318478] FAULT_INJECTION: forcing a failure. [ 2996.318478] name failslab, interval 1, probability 0, space 0, times 0 [ 2996.319385] CPU: 1 UID: 0 PID: 17759 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 2996.319403] Tainted: [W]=WARN [ 2996.319407] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2996.319414] Call Trace: [ 2996.319418] [ 2996.319422] dump_stack_lvl+0xfa/0x120 [ 2996.319441] should_fail_ex+0x4d7/0x5e0 [ 2996.319455] ? ptlock_alloc+0x21/0x70 [ 2996.319466] should_failslab+0xc2/0x120 [ 2996.319479] kmem_cache_alloc_noprof+0x72/0x690 [ 2996.319496] ? ptlock_alloc+0x21/0x70 [ 2996.319506] ptlock_alloc+0x21/0x70 [ 2996.319516] pte_alloc_one+0x86/0x360 [ 2996.319534] __pte_alloc+0x6c/0x360 [ 2996.319549] ? __pfx___pte_alloc+0x10/0x10 [ 2996.319564] ? _raw_spin_unlock+0x1e/0x40 [ 2996.319578] ? __pmd_alloc+0x3f9/0x980 [ 2996.319601] copy_page_range+0x313f/0x5140 [ 2996.319635] ? __pfx_copy_page_range+0x10/0x10 [ 2996.319652] ? mas_destroy+0x5ce/0x9c0 [ 2996.319670] ? mas_store+0x17b/0x540 [ 2996.319682] ? __pfx_mas_store+0x10/0x10 [ 2996.319694] ? lock_release+0xc8/0x290 [ 2996.319713] ? lock_is_held_type+0x9e/0x120 [ 2996.319732] dup_mmap+0xd2f/0x1d10 [ 2996.319754] ? __pfx_dup_mmap+0x10/0x10 [ 2996.319778] ? lock_is_held_type+0x9e/0x120 [ 2996.319797] copy_process+0x3ad5/0x73c0 [ 2996.319808] ? __pfx__kstrtoull+0x10/0x10 [ 2996.319833] ? __pfx_copy_process+0x10/0x10 [ 2996.319845] ? __might_fault+0xe0/0x190 [ 2996.319861] ? _copy_from_user+0x5b/0xd0 [ 2996.319878] kernel_clone+0xea/0x7f0 [ 2996.319890] ? get_pid_task+0xfd/0x250 [ 2996.319911] ? __pfx_kernel_clone+0x10/0x10 [ 2996.319927] ? find_held_lock+0x2b/0x80 [ 2996.319944] ? ksys_write+0x121/0x240 [ 2996.319956] ? lock_is_held_type+0x9e/0x120 [ 2996.319975] __do_sys_clone3+0x1f5/0x280 [ 2996.319987] ? __pfx___do_sys_clone3+0x10/0x10 [ 2996.320008] ? __fget_files+0x20d/0x3b0 [ 2996.320023] ? fput+0x6a/0x100 [ 2996.320038] ? ksys_write+0x1a3/0x240 [ 2996.320049] ? __pfx_ksys_write+0x10/0x10 [ 2996.320063] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 2996.320078] do_syscall_64+0xbf/0x360 [ 2996.320089] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 2996.320101] RIP: 0033:0x7f3a168c2b19 [ 2996.320109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2996.320120] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 2996.320131] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 2996.320139] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 2996.320146] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 2996.320154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2996.320161] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 2996.320177] 06:01:08 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x7f}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40008c45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000001600)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x68, r1, 0x800, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x0, @media='ib\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xc800}, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001440)={&(0x7f00000011c0)={0x258, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_MODES_OURS={0x10c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x25, 0x5, "9678ce60a6e1b1909ba2080ea804acbde346ad65d45a11961c98d2ec5cdd1268d3"}, @ETHTOOL_A_BITSET_VALUE={0x24, 0x4, "8a89b0ceab12ae77e3a4a044234777535ab0135ff059654c2e14cb6f8d942e97"}, @ETHTOOL_A_BITSET_BITS={0xbc, 0x3, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb3ec}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1935}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3a83}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[.^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '#\\\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*[\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xf4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xea, 0x4, "ac899a4479260e958e52fb521e00418436a6153286c3d9c625f035c1cdf03983270ee8753cebd94ee4331ed8c27258eb3fe6c02740c581ed816de1cace803d1943d5467b1a3a0e5f6e7b2356be0a049e3562ea07cfcd0ded24181010364d3af2e591d41fc53cf1431729edc9204076283c2f5a5bed5fc5953f3eea27d3abbcc0d1184743c3804ffd7c99bdf669d7f2516e9744241102b73334981db8fdd52dfd8819bf869cd366cf806ec87ea838d6aecdff816918f1db18052549135a5df90444d47d2eed8789c8047a586a6113da44bb5d0c41175222d969fcaefccfb2abf38ad53e8b2a47"}]}, @ETHTOOL_A_EEE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0x258}, 0x1, 0x0, 0x0, 0x2404e080}, 0x20000800) kexec_load(0x1, 0x2, &(0x7f0000001140)=[{&(0x7f0000000040)="36b652e9c21b66de276e24d77013ab4130d4d5d3e3702a74efc5b1db3e53149dd8c92e880877e612ed47817197ebb197bd52ea", 0x33, 0x10001, 0x31c}, {&(0x7f0000000140)="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", 0x1000, 0x2, 0x8}], 0x2a0000) 06:01:08 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x9]}, &(0x7f0000000040), 0x8) socket$inet_udplite(0x2, 0x2, 0x88) rt_sigprocmask(0x2, &(0x7f0000000080)={[0x4]}, 0x0, 0x8) 06:01:08 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x3, 0x9) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_ADT={0x30, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'ip6gre0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffe}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x1ff}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffff821}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x13}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x138}}, 0x8000) [ 2996.424049] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list 06:01:16 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 58) 06:01:16 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x7f}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40008c45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000001600)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x68, r1, 0x800, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x0, @media='ib\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xc800}, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001440)={&(0x7f00000011c0)={0x258, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_MODES_OURS={0x10c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x25, 0x5, "9678ce60a6e1b1909ba2080ea804acbde346ad65d45a11961c98d2ec5cdd1268d3"}, @ETHTOOL_A_BITSET_VALUE={0x24, 0x4, "8a89b0ceab12ae77e3a4a044234777535ab0135ff059654c2e14cb6f8d942e97"}, @ETHTOOL_A_BITSET_BITS={0xbc, 0x3, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb3ec}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1935}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3a83}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[.^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '#\\\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*[\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xf4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xea, 0x4, "ac899a4479260e958e52fb521e00418436a6153286c3d9c625f035c1cdf03983270ee8753cebd94ee4331ed8c27258eb3fe6c02740c581ed816de1cace803d1943d5467b1a3a0e5f6e7b2356be0a049e3562ea07cfcd0ded24181010364d3af2e591d41fc53cf1431729edc9204076283c2f5a5bed5fc5953f3eea27d3abbcc0d1184743c3804ffd7c99bdf669d7f2516e9744241102b73334981db8fdd52dfd8819bf869cd366cf806ec87ea838d6aecdff816918f1db18052549135a5df90444d47d2eed8789c8047a586a6113da44bb5d0c41175222d969fcaefccfb2abf38ad53e8b2a47"}]}, @ETHTOOL_A_EEE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0x258}, 0x1, 0x0, 0x0, 0x2404e080}, 0x20000800) kexec_load(0x1, 0x2, &(0x7f0000001140)=[{&(0x7f0000000040)="36b652e9c21b66de276e24d77013ab4130d4d5d3e3702a74efc5b1db3e53149dd8c92e880877e612ed47817197ebb197bd52ea", 0x33, 0x10001, 0x31c}, {&(0x7f0000000140)="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", 0x1000, 0x2, 0x8}], 0x2a0000) 06:01:16 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_ADT={0x30, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'ip6gre0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffe}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x1ff}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffff821}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x13}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x138}}, 0x8000) 06:01:16 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 55) 06:01:16 executing program 0: add_key$user(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b", 0x70, 0xfffffffffffffffb) 06:01:16 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 52) 06:01:16 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000040)) getrlimit(0x3, &(0x7f0000000000)) 06:01:16 executing program 5: clone3(&(0x7f00000006c0)={0x40000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:01:16 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000000)={[0x7fff]}, &(0x7f0000000040), 0x8) 06:01:16 executing program 0: add_key$user(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b", 0x70, 0xfffffffffffffffb) [ 3004.823774] FAULT_INJECTION: forcing a failure. [ 3004.823774] name failslab, interval 1, probability 0, space 0, times 0 [ 3004.825800] CPU: 1 UID: 0 PID: 17791 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 3004.825840] Tainted: [W]=WARN [ 3004.825849] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3004.825863] Call Trace: [ 3004.825872] [ 3004.825881] dump_stack_lvl+0xfa/0x120 [ 3004.825926] should_fail_ex+0x4d7/0x5e0 [ 3004.825960] ? vm_area_dup+0x25/0x6f0 [ 3004.825986] should_failslab+0xc2/0x120 [ 3004.826017] kmem_cache_alloc_noprof+0x72/0x690 [ 3004.826043] ? find_held_lock+0x2b/0x80 [ 3004.826083] ? dup_mmap+0x5d3/0x1d10 [ 3004.826122] ? vm_area_dup+0x25/0x6f0 [ 3004.826148] vm_area_dup+0x25/0x6f0 [ 3004.826176] dup_mmap+0x80d/0x1d10 [ 3004.826224] ? __pfx_dup_mmap+0x10/0x10 [ 3004.826274] ? lock_is_held_type+0x9e/0x120 [ 3004.826323] copy_process+0x3ad5/0x73c0 [ 3004.826349] ? __pfx__kstrtoull+0x10/0x10 [ 3004.826402] ? __pfx_copy_process+0x10/0x10 [ 3004.826429] ? __might_fault+0xe0/0x190 [ 3004.826463] ? _copy_from_user+0x5b/0xd0 [ 3004.826500] kernel_clone+0xea/0x7f0 [ 3004.826525] ? get_pid_task+0xfd/0x250 [ 3004.826552] ? __pfx_kernel_clone+0x10/0x10 [ 3004.826594] ? find_held_lock+0x2b/0x80 [ 3004.826631] ? ksys_write+0x121/0x240 [ 3004.826658] ? lock_is_held_type+0x9e/0x120 [ 3004.826697] __do_sys_clone3+0x1f5/0x280 [ 3004.826724] ? __pfx___do_sys_clone3+0x10/0x10 [ 3004.826769] ? __fget_files+0x20d/0x3b0 [ 3004.826801] ? fput+0x6a/0x100 [ 3004.826833] ? ksys_write+0x1a3/0x240 [ 3004.826858] ? __pfx_ksys_write+0x10/0x10 [ 3004.826888] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 3004.826920] do_syscall_64+0xbf/0x360 [ 3004.826945] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3004.826971] RIP: 0033:0x7fb9f533db19 [ 3004.826989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3004.827014] RSP: 002b:00007fb9f28b3188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3004.827038] RAX: ffffffffffffffda RBX: 00007fb9f5450f60 RCX: 00007fb9f533db19 [ 3004.827055] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 3004.827071] RBP: 00007fb9f28b31d0 R08: 0000000000000000 R09: 0000000000000000 [ 3004.827086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3004.827101] R13: 00007ffe5e80ac9f R14: 00007fb9f28b3300 R15: 0000000000022000 [ 3004.827136] 06:01:26 executing program 5: clone3(&(0x7f00000006c0)={0x61020000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:01:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x21c9f58c7e188199}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x800, 0x70bd2d, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4004000}, 0x40000a0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000000)={[0x80]}, 0x0, 0x8) 06:01:26 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 53) 06:01:26 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_ADT={0x30, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'ip6gre0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffe}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x1ff}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffff821}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x13}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x138}}, 0x8000) [ 3014.774754] FAULT_INJECTION: forcing a failure. [ 3014.774754] name failslab, interval 1, probability 0, space 0, times 0 [ 3014.775838] CPU: 1 UID: 0 PID: 17812 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 3014.775859] Tainted: [W]=WARN [ 3014.775863] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 3014.775871] Call Trace: [ 3014.775875] [ 3014.775880] dump_stack_lvl+0xfa/0x120 [ 3014.775906] should_fail_ex+0x4d7/0x5e0 [ 3014.775925] ? vm_area_dup+0x25/0x6f0 [ 3014.775939] should_failslab+0xc2/0x120 [ 3014.775954] kmem_cache_alloc_noprof+0x72/0x690 [ 3014.775968] ? find_held_lock+0x2b/0x80 [ 3014.775989] ? dup_mmap+0x5d3/0x1d10 [ 3014.776009] ? vm_area_dup+0x25/0x6f0 [ 3014.776022] vm_area_dup+0x25/0x6f0 [ 3014.776036] dup_mmap+0x80d/0x1d10 [ 3014.776060] ? __pfx_dup_mmap+0x10/0x10 [ 3014.776085] ? lock_is_held_type+0x9e/0x120 06:01:26 executing program 0: add_key$user(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b", 0x70, 0xfffffffffffffffb) 06:01:26 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 59) 06:01:26 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 56) 06:01:26 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x7f}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40008c45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000001600)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x68, r1, 0x800, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x0, @media='ib\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xc800}, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001440)={&(0x7f00000011c0)={0x258, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@ETHTOOL_A_EEE_MODES_OURS={0x10c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x25, 0x5, "9678ce60a6e1b1909ba2080ea804acbde346ad65d45a11961c98d2ec5cdd1268d3"}, @ETHTOOL_A_BITSET_VALUE={0x24, 0x4, "8a89b0ceab12ae77e3a4a044234777535ab0135ff059654c2e14cb6f8d942e97"}, @ETHTOOL_A_BITSET_BITS={0xbc, 0x3, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xb3ec}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1935}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3a83}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[.^\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '!+\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '#\\\\\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '*[\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5, 0x6, 0x1}, @ETHTOOL_A_EEE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_MODES_OURS={0xf4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xea, 0x4, "ac899a4479260e958e52fb521e00418436a6153286c3d9c625f035c1cdf03983270ee8753cebd94ee4331ed8c27258eb3fe6c02740c581ed816de1cace803d1943d5467b1a3a0e5f6e7b2356be0a049e3562ea07cfcd0ded24181010364d3af2e591d41fc53cf1431729edc9204076283c2f5a5bed5fc5953f3eea27d3abbcc0d1184743c3804ffd7c99bdf669d7f2516e9744241102b73334981db8fdd52dfd8819bf869cd366cf806ec87ea838d6aecdff816918f1db18052549135a5df90444d47d2eed8789c8047a586a6113da44bb5d0c41175222d969fcaefccfb2abf38ad53e8b2a47"}]}, @ETHTOOL_A_EEE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0x258}, 0x1, 0x0, 0x0, 0x2404e080}, 0x20000800) kexec_load(0x1, 0x2, &(0x7f0000001140)=[{&(0x7f0000000040)="36b652e9c21b66de276e24d77013ab4130d4d5d3e3702a74efc5b1db3e53149dd8c92e880877e612ed47817197ebb197bd52ea", 0x33, 0x10001, 0x31c}, {&(0x7f0000000140)="ecc512e9a862d02c3051a2f808cd5af042ad9c41518846462d36275e0c9ed65ec4a304aca848043e76a106469d2ed8ad4fa7ff8e3022099fd24b9c94d76b00ee1207290507669a825a4eb70477214680354d965cce501aab599168b96a857242e5390d80cc367046451a6d8942d628675c7dc91d9aaa6ee0058f6ba2f32a4f3221e9de269007aadea0ba4341ff856c187d0b0caede51dfbc4638ea7cdb27d2873b2b511c7b6f3f48205dd6e783f52221348ee584323a025e050bec96e93858f0c07bbcfc757e23ac1985ae3a23ca6c95ff5cde62c4e8a32b0800ef6e956d440892d5929530a2c2cb4fc4c2aba70c03753a2e83dbf446d641e79b59194efdaa76631045259057c50740e92297960d4c1fd085c57db6f57bedd892087352f0229d8751915c7925bb7dfb9e4d1ed4ecbb7269d78e1a8512edb478bf930ab9abbb105ad5b7e8899ad53a98b7132853813fbbb8edf50bcc2171429666975b3b244ba16dfa81dc1c38e67e97797dbdf6a9a264dc2c4768cb0b2586023d27b8a9edd222a0bbfc246b804b273beeb253393d105074fd3fbca9d088c981cfa70daefe1b050d80715c2790426c4e60358e5c48fbec62fb459c6b62e238cff854cd5d8b6b20fa276017e30adbfd57bddea17afde01f8c3b78e76b3456f03debf969f3e17b1a0a7a5d3fc3c9761040e812e3df787d7dd39cffd91573ad75cbf55a6960db7b3015414e675e27aa718525e12160bf2c7583d5a69f463463ccb6994955ce4c5f36e1ebeba4a52519525deb3e4aa426c5f680f77c054b3fd796bc4eb3eaf69e1a437ae0bea008cd945e4c64712ac80c9587513d3984eb90765a6b95e46a9da8e32b80cad69d6e9d4ea293395ea02895158d4f0a3cd264627e14b4bfd7895bcc086707e1d8f0b0d0499b280883c4e7829b21caa04a2c46741f1e73d78289bf3a2b22579e0246224353e21739d41f2ef47f5052a3dc40ad413c9cfdb619a013ce8be126707c12d2dba827533d8197a486f2c79ec444fac151ebe08dc360d1cbc92f02096b6208ef1513f6aa812cf8ef5ffaf82516283c90a285bd492a65ed0bb2ffb9a925b87a4855bcced2a2dcde5f83fcb0befac680a16085af7c71bbcb5ab9b0ecf13fd11c1d69e17d5164d46d203be25f92bf4db08c485022524c59d3b7e82e58cc128daca80e0b265a7ffa5af7fa135472febbb3e6de0e7bfaa67ec0277282f8989663cadcb198b6448d2d7b78eac7b4b146488d92e98a26349cacb0904b329cdfe066b5f720e07ab201ddac75163e713f96fb5e029e84c25bbb123d6fa293f5f78189d4c61cafb8d68600d60bfef5e4104ca9cf689485e948ae940f437a96ed4bd380f97893c0d4167a730f4ab632670d6ed8471df762aa647af62b8477a893839ae8b07a0d7926ce3f179a0edc1aa4ff48270bd977de94c6518edbf70a65077897734fcdd30ed41d7eb8c136069f61b4eec124dc2b8d8bc627703969caa3f7d71e11aa8b7d5ddd6d5b1236c83bd93c2869273c50745a1e684bcdc74e9b55ecd9f0fe11790358910b642f394b356602f4cbeca2205683d71cb5e85a36722a2996c0651ada914f94a1dcc8de7f54e805ce3e35a9fe3f7e4e508de3fcc7d820a9a09deaedb2ac3ce71272e650d65642b3945be6b2f5ceb69dc966ecd34a905ab951fe36042b97fcd127cde5da4a052ae433310675653c761a4ebaf19d7fef2a76aee7ea186cb6361923a74ebda55908e5f787a6e45cf7a87493ed03cfdc521d3a48e65e891767938ab2e83fddad1f997333cec62f259a2becfe51c9d6d43afe7142028f4a4f2c5af6ce9a71bdd0775bb7ab55d7219109700c8a371ecc90c1e8c5d1300094008552e0c948be15bf5c9142bc1c19d3fc765deba1cd2cddfff73de2a88a721752636a049f9543bc2748947b03012c8fb3ffc0a2bc71523aeb4aee0f27ad4635f7dc24557af89347dd3322e9235c40077a6041cc055ca722982f41da459f5a5313e0bdcfb324fa0337a937b368ee4d773603cf8e346b469d3904ae0ec621088fc001f5111cc3c1e3ce5ee4ccb70db11de23a12f778a58d0d4dccfdc27a97fbe226fdf3baa77b35698747a3dcbcf7747d01f6dd6bb5cf57df09d8f6e7c65e3d9e053c715b75709a79e61bc35dd0444561279c2aef45c526af80411590f5bca28d4bd4520173fe27d4d5ca1e0fbeecd1f7ded516a3a562a9b5376664a68b2b4f50b551de8686fe476983c329f633aa781d8c622fb75bbf74428c68ef15dda4cc94e0759d2c2ab8673bba199c3d2acf964c8f30f830562e703bc78c500d137751f962c2d3de20753388418baca3fde9d222608568eb7dea32fd12802afa083507cc85d83eae281792705d716c69446ddcabc76dfe251a80ec499f8d9611a367ffc67b8f94dbf363a591d29f07a3dab2c429e544d811c7051df756f8887b8c1c278cae32ceb3d340840d6136d2cb01b040fa22a54b43478b78fd41a7f04379a7e5262a3ddeefde9b202d354b8c8a43ac11326dbcda3bc16244e50940d4155b074870f8246e51bc2ba070b4ab2549c1fc3207cac1eea0bc649ba6c30040cdf6a9043ead15ee394af3204f0e404c5c2d3210ab485dc572748ace23bba1fd71dc923390851fece29f9a9d216225dc23e3a3d3f12e0c629c7df38f3c76b98bde40b919e578ea27c6cbc7eb40b32244fb63eb98e203d3ce5e153f41c3492a507ed4fd7dd2a8b26632333bfff259a3c3e61621090343e2c3df7c54f592689b5314f4b6842e0f32729eba5e3d139134089913d0f7b3c53c31504c459e91dcc1ae2e5120e8bb06099a520a5a4dfa2a79e2acd8cd24a1edefffd3107b621c3da210186b5c0354dadf74fe68428fafa7795a5931c61f1b29facc125a24395932e45a52ac4b3bd23363cdf6fe82461244ee0c8b230d242bab0b1be6f64a38ed3db16d9fe0bddf5804bd7b961cf2ce23ee66dcfdc56a2605348a81a308a2d32928042712bb6ad015e8bab83be30f04b43f7ffeceb621f35a2caf0f31a8c6491e6278b5d2e086311fc6800dd69aa5c7650694c84aca11b0f8bb8f8dcc29747c23a617c8cf27b23b4d33e25a555d5ca8c586722084284c1b0934d869c1f1a77e8b5a49b9a08be3b6e979e00fed98e490afac04d87ee48a02135f0763c8cc2a9a049fe2411c1064c95a75991b51c57fcde01c8864ab17234348416ef4173d3c585f7b5573eae2df99a97a2b9e27eba3ebbf8daa0c54854807cbc2d9058f7f548b2f3c3e8bfec1318d9baabed5c07600b60bf939873404707420160c7494fc1c7a9c0bcc6999a84b9ad25d7abfee277a589a230f7d6f5020b701fd5001c32294ef10cbdeaa55a5aa91504313795f3f29cf0875b48f6abecc9d3dd1c2f5799e27f40ef413945ad5fe92ec7f9b01cb5c4836fec988c177ce128dfce0b421c93b364c8b654762bef3ce4f5e0da9c8d8c049c48b63f274f502375e83aaf954cee02b80646684e4fd165cdda02920ba095b8fc9e1b1376c9d445ed5e4f6db7c8de12720066838e31937fe707bfd86ce2e90b76b4d26e4dea507a947cd2d44f730910743170a6c0638a995f5ebfba7a028523d2eb2033e3c8a0cebe2dd8c3d0b1a7ce136535be0bf000b097717fd3477c0eebc681d6345d89fceb8e453d8db0e2205159192cca768d954ed2c7a2ab05e7fef4a17a515ed784167cded87c25d4ed06a8996953c3427e9cb537591e1724f6906b14397892538dc1cc5c6bb4a1025d484788202ecd0063bb6f99ed1a09fb9f4fce43a38fc019fb867fa2a3ef79a81f716953674b03627a135ad6b91b95c4b3dbc09593af14244272919d484e88e4dd17a9373ec8f8b052f60d24d463d633437dde4dfbfe365539a1e0ab60950385263cfa5ad2c5a67094c23757e9b6503b21732a98d279b3182ad2be8f62b0a8b53f7a30ddb1265efb3055743f77aaf879a548d3accca892bf12f85c59e29c3656892d0d1c989fbbddfc76dc2d55bbd9b2ba3fe0d90e358345ea38b0d1cd71e60fd44eb88c108ffa561e90498125aecf32dd4a2d3f5ad1b31537ffc98356de91ec89bbb47aa93fb89d85a21017667b2608439735549243f4988ac32d31e376ae702cebe91e07fd51524f90daa60707920d09bd43a837c3b74050bac2b1ab4dd1534b61177804604659a470301cd88b8b689a8726e2f5a832ea578c2ecaf68e1bb206dd1ac1924199c98ead2ba6a189762ee8cfa4a9be9a11ef6c3fbfd101f0833ddd25fd2f2d3d378bf2999b1f635a55104afac06a376b41bded75fb0715e5086cded4d7f34f36efeef767c7b4703d5d364134167983e04d9e5b53cb6c7a17404567a800e9e334f6e28078b6266c84a7e6fc4219ab27ac0685b232642a7cb373a290ccb1f13f91b3b4d96a1fc891a5eec8f8efb56d6e8ecdd4a69924b653f9fe423bfdce5eb001a2269fd14f28331148a471bd9eaf9add23713e54504de03a4be7b011aaaa9a404fe4993b6aaea1c6be2a7f08b26ae44c5adb4f2b1f2fe384c8842d6b066cd5023a44d5af8d8a544653c942300281d96337da70114f1888fe50686f33209036c8eab1771cb377e91db3025261f1543a34a5178b4af9875b528bd3773047d4d88b9a75aacbd99cfb1bec227dab79a0aefd572302623c3efedd027491a44e27a53addcbd1484ca422bba9bc389f6a7b92635b225199051ff309222a4dfa6b45428ca0a0845888afc0505a93b345f5fcd8298a3084712426cb6019ce13e69cfc60ce1cab57e98a4de0ccfe9515cb65846af2a9ee8787f982794a5b1e4329bd7683cd7a0e3a2ac89c615c73938b1f9a9b0742b0b51efc2b31b46967d1c17eca273f56bb1fe80a71b609b9fcf617a0eab8d01d863a2d4a1d382087d682692794c2faee92696b88bc44cea2b7a5de4a9a613e88177244af22e468f632dd8506aaabb181f0cd8c9028b583bf06a40fa497c2d43b516584a44ea6ee978ddffe3b7ff9519b86e4a855f1009efd5f9580cad88f988fdbeb306d7d74eacc6f278385137e00f556fba3428f14ba8a459cfbc88733cfe8153547f00343324e6db08953610cbd3c2cd9cf7d3fa69979281ae9f29429df547c0cd044398a90538e27c9b065233a1fa57cca2f808781108054b8d450d457b28c0a1142f0a022e929cd69fdbea4bb4ad1a1465f3c69cfd6709c5259934166d15bd562058732b3a191eb3b9bf97dcffe25413dc52287c65c505413eb19f1c345dc6d424c34fe697d6c8dc2d9922a4a93c25fa43d02aede0f50cf722e950341b8c338f2903f104ebcf4f3939ca94a62d0aeb74383c755f5b19aa48b13a64588d5032f11dcde08efcfa6b6b5aa4f2213242ffaa0ef52e07dacb20ce8a0a66435ac76c61fc775d48557718cf09727ad81d2d4a18abdf7d1cb3e85b1578616fcd148dfd71cf25b18130ae2b4d02c58ce0caa999c420b77ec50e550b0127ab79b316243a824b8f49b09254caf4b31c76cb569da16c8a9d124967c760bc3335114108142b7ef065e8f64838521f906fbf61f358e5d426de7235bdc95626cd4695118067d333a4b6f2f62e1f0ce86bdaee5de0771e03deaa557830e3555212188d1a74a3eb9b251fbedf7d02a644ab0d78acfdfe12446cc9a25bb58128249285dfd1cf47259e79dcf8be9392da3e92f9518c0cbb6fd63cb2c906cb24080132e27b09d2395bda37ec57bcf6d835c23553ae59c33f4eb399392d7c2ecc5be67a0632f3f996e4d44be177378443f1b347d739142d815e25edc1c44874d0d5fd78b086635a9451940ada260c80e1c0ac80221d87ed2065c673", 0x1000, 0x2, 0x8}], 0x2a0000) [ 3014.776115] copy_process+0x3ad5/0x73c0 [ 3014.776129] ? __pfx__kstrtoull+0x10/0x10 [ 3014.776157] ? __pfx_copy_process+0x10/0x10 [ 3014.776170] ? __might_fault+0xe0/0x190 [ 3014.776187] ? _copy_from_user+0x5b/0xd0 [ 3014.776206] kernel_clone+0xea/0x7f0 [ 3014.776218] ? get_pid_task+0xfd/0x250 [ 3014.776232] ? __pfx_kernel_clone+0x10/0x10 [ 3014.776250] ? find_held_lock+0x2b/0x80 [ 3014.776269] ? ksys_write+0x121/0x240 [ 3014.776283] ? lock_is_held_type+0x9e/0x120 [ 3014.776303] __do_sys_clone3+0x1f5/0x280 [ 3014.776316] ? __pfx___do_sys_clone3+0x10/0x10 [ 3014.776339] ? __fget_files+0x20d/0x3b0 [ 3014.776356] ? fput+0x6a/0x100 [ 3014.776372] ? ksys_write+0x1a3/0x240 [ 3014.776385] ? __pfx_ksys_write+0x10/0x10 [ 3014.776400] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 3014.776416] do_syscall_64+0xbf/0x360 [ 3014.776429] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3014.776443] RIP: 0033:0x7f3a168c2b19 [ 3014.776453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 3014.776465] RSP: 002b:00007f3a13e38188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 3014.776478] RAX: ffffffffffffffda RBX: 00007f3a169d5f60 RCX: 00007f3a168c2b19 [ 3014.776486] RDX: 0000000000000000 RSI: 0000000000000058 RDI: 00000000200006c0 [ 3014.776494] RBP: 00007f3a13e381d0 R08: 0000000000000000 R09: 0000000000000000 [ 3014.776502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 3014.776510] R13: 00007ffd7bb8390f R14: 00007f3a13e38300 R15: 0000000000022000 [ 3014.776527] 06:01:26 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_ADT={0x30, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'ip6gre0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffe}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x1ff}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffff821}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x13}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x138}}, 0x8000) 06:01:26 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 54) 06:01:26 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x1000000000000) gettid() 06:01:27 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x7f}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40008c45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000001600)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x68, r1, 0x800, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x0, @media='ib\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xc800}, 0x0) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) kexec_load(0x1, 0x2, &(0x7f0000001140)=[{&(0x7f0000000040)="36b652e9c21b66de276e24d77013ab4130d4d5d3e3702a74efc5b1db3e53149dd8c92e880877e612ed47817197ebb197bd52ea", 0x33, 0x10001, 0x31c}, {&(0x7f0000000140)="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", 0x1000, 0x2, 0x8}], 0x2a0000) 06:01:27 executing program 2: r0 = socket(0xa, 0x3, 0x9) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_ADT={0x30, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'ip6gre0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffe}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x1ff}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffff821}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x13}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x138}}, 0x8000) 06:01:27 executing program 0: add_key$user(&(0x7f0000000140), 0x0, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b", 0x70, 0xfffffffffffffffb) 06:01:27 executing program 6: clone3(&(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x4}, 0x58) (fail_nth: 55) [ 3015.003402] unregister_netdevice: waiting for lo to become free. Usage count = 0 06:01:27 executing program 2: r0 = socket(0x0, 0x3, 0x9) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_ADT={0x30, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'ip6gre0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffe}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x1ff}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffff821}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x13}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x138}}, 0x8000) 06:01:27 executing program 1: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x24, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0x7f}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x40008c45) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/partitions\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x20000000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000001600)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x68, r1, 0x800, 0x70bd27, 0x25dfdbfe, {{}, {}, {0x4c, 0x18, {0x0, @media='ib\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0xc800}, 0x0) kexec_load(0x1, 0x2, &(0x7f0000001140)=[{&(0x7f0000000040)="36b652e9c21b66de276e24d77013ab4130d4d5d3e3702a74efc5b1db3e53149dd8c92e880877e612ed47817197ebb197bd52ea", 0x33, 0x10001, 0x31c}, {&(0x7f0000000140)="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", 0x1000, 0x2, 0x8}], 0x2a0000) 06:01:27 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder0\x00', 0x802, 0x0) 06:01:27 executing program 0: add_key$user(&(0x7f0000000140), 0x0, &(0x7f00000001c0)="de38164600cc9f224724934c00dbcd0e4f836b0ba84c578d52c5940858e4d950b1c90bd134ceb76207825fde49adb9db7b228613c8d38b96bdc8ae2ec253b2db762073b1a1609c9101efae2d3fdae8a383b6cba0fa95e3afffe14b5a799555405780ee03deb3b031f7141a6b4230b71b", 0x70, 0xfffffffffffffffb) 06:01:27 executing program 3: clone3(&(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000400), &(0x7f0000000440), {0x2f}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x3}, 0x58) (fail_nth: 57) 06:01:27 executing program 7: clone3(&(0x7f00000006c0)={0x0, &(0x7f00000003c0), 0x0, 0x0, {}, &(0x7f0000000480)=""/238, 0xee, &(0x7f0000000580)=""/215, &(0x7f0000000680)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) (fail_nth: 60) 06:01:27 executing program 5: clone3(&(0x7f00000006c0)={0x7bffffff, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 06:01:27 executing program 2: r0 = socket(0x0, 0x3, 0x9) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x138, 0x9, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0xa}, [@IPSET_ATTR_ADT={0x30, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x5}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}}]}, @IPSET_ATTR_ADT={0x84, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1f}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBMARK={0xc, 0x1b, 0x1, 0x0, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010102}}}, {0x18, 0x7, 0x0, 0x1, @IPSET_ATTR_IFACE={0x14, 0x17, 'ip6gre0\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0xfffffffffffffffe}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR2={0x5, 0x15, 0x6}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @multicast}}]}, @IPSET_ATTR_ADT={0x14, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x1ff}}]}, @IPSET_ATTR_DATA={0x54, 0x7, 0x0, 0x1, [@IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x2}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x8}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffff821}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x13}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x80}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_IFACE={0x14, 0x17, 'macvlan1\x00'}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x138}}, 0x8000) VM DIAGNOSIS: 06:01:27 Registers: info registers vcpu 0 RAX=dffffc0000000000 RBX=ffff8880181f7610 RCX=0000000000000000 RDX=1ffff1100303eeb4 RSI=0000000000000000 RDI=ffff8880181f75e8 RBP=ffff88801c50d280 RSP=ffff8880181f7528 R8 =0000000000000001 R9 =0000000000000000 R10=ffff8880181f7578 R11=ffff88806ce3cb70 R12=0000000000000000 R13=ffff8880181f75a0 R14=ffff88801c50d280 R15=ffff8880181f7578 RIP=ffffffff8135a8f0 RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 000055557b5f8400 00000000 00000000 GS =0000 ffff8880e55dd000 00000000 00000000 LDT=0000 fffffe4c00000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000558e018a2488 CR3=00000000299dd000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007f6826bd87c000007f6826bd87c8 XMM02=00007f6826bd87e000007f6826bd87c0 XMM03=00007f6826bd87c800007f6826bd87c0 XMM04=ffffffff0000ff00000000ff00000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=fffffbfff0c8758a RBX=fffffbfff0c8758b RCX=ffffffff815b6f68 RDX=0000000000000001 RSI=0000000000000008 RDI=ffffffff8643ac50 RBP=fffffbfff0c8758a RSP=ffff88806cf08d78 R8 =0000000000000000 R9 =fffffbfff0c8758a R10=ffffffff8643ac57 R11=0000000000000000 R12=0000000000000200 R13=ffff8880e56dd000 R14=ffff88806cf37df0 R15=ffff88806cf37da8 RIP=ffffffff81aff09b RFL=00000083 [--S---C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00005555880f5400 00000000 00000000 GS =0000 ffff8880e56dd000 00000000 00000000 LDT=0000 fffffe5800000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f1c980bf718 CR3=0000000017f1b000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007f1c9ac517c000007f1c9ac517c8 XMM02=00007f1c9ac517e000007f1c9ac517c0 XMM03=00007f1c9ac517c800007f1c9ac517c0 XMM04=00000000000000000000000000000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000