last executing test programs: 4m8.92047801s ago: executing program 0 (id=2745): sendmsg$auto_GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8010}, 0x4000804) lstat$auto(0x0, &(0x7f0000000180)={0x10, 0x2, 0x101, 0x5, 0x0, 0x0, 0x0, 0x200000fa9b, 0xfffffffffffffff9, 0x7ffffffffffffffe, 0x4, 0x3, 0x7fffffffffff7ffb, 0x5f3, 0x7, 0x4, 0x6}) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x89fc, &(0x7f0000000040)={'bridge0\x00'}) (fail_nth: 1) 4m7.681925793s ago: executing program 0 (id=2748): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/controlC1\x00', 0x20040, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f00000001c0)={{@inferred, 0x4, 0x10001, 0xb, "58a732e4f73a26bf0d5924b32c7f641b870461318add2e31420cdc66f14f4a240781b1b1800084506f73bc9d", @raw=0x8}, 0x2, 0xffff, 0x7, @inferred, @reserved="38375c405233ea8084784ddb1ace232c64399d87d409eb2f36d9f5448c1a43dc0bc791e19ab07197dc0632c073769fc9ed53676560dcc714f73920aadc483b09c3db58638027c9a49fc0e13e708b5345bab5d2778d3d93c3603302c831a6ed35975cb34dec29bd40216793a5fa5f100f4ca171b9b25d1a79a874213d41233f2e", "7f7b9de47b25a51c538a7d273180a5557f2fee0f40bee5d4326cf95d0fdf2bfd6619bf3854e89bbbc59a3196305de800cf9c54a11afb0c248781267baa0ea51f"}) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) sendmsg$auto_NL80211_CMD_TDLS_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0}, 0xc885) vmsplice$auto(0x1, &(0x7f0000000000)={0x0, 0x5}, 0x6, 0x8) arch_prctl$auto_ARCH_GET_FS(0x1003, 0x7fffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f00000000c0), r2) sendmsg$auto_NL80211_CMD_SET_SAR_SPECS(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f00000005c0)={0x20, r3, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c080}, 0x44) r4 = syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000000dc0), r0) sendmsg$auto_IPVS_CMD_GET_DEST(r0, &(0x7f0000003a40)={0x0, 0x0, &(0x7f0000003a00)={&(0x7f0000000e80)={0x1c, r4, 0xc0dce8a66cb0a7ff, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x5, 0x2, 0x0, 0x1, [@generic="f1"]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040011}, 0x40010) 4m7.042895042s ago: executing program 0 (id=2754): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) close_range$auto(0x2, 0xa, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_l2tp(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$auto_L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x5c, r1, 0x1, 0x70bd25, 0x25dfdbf7, {0x1, 0x0, 0x3f00}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x58}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}]}, 0x5c}, 0x1, 0x0, 0x0, 0x44000}, 0x0) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) syz_clone(0x80000000, &(0x7f0000000100)="8e72776275f4da6ee33885b0911cdcde86803f5fdd61ac1812cbe924", 0x1c, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="aa755db997766484a85b5a75d7b8efcc") fstat$auto(r2, &(0x7f0000000000)={0x5, 0x80000001, 0x3, 0x9, 0xee01, 0x0, 0x0, 0xffffffffffffff91, 0xfd4, 0x2, 0xec, 0x4, 0x80000000081, 0x8, 0x2, 0xfffffffffffffff0}) openat$auto_vmuser_fops_vmci_host(0xffffffffffffff9c, &(0x7f0000000040), 0x20200, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1a00"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x10007}, 0x3, 0x0) 4m6.322007211s ago: executing program 0 (id=2757): mmap$auto(0x7, 0x7, 0xdf, 0x30, 0x69a5, 0x7) write$auto_ocfs2_control_fops_stack_user(0xffffffffffffffff, &(0x7f0000003900)='\t', 0x1) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/nfs/parameters/nfs_idmap_cache_timeout\x00', 0xc2902, 0x0) read$auto(r0, 0x0, 0x20) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0001, 0x15) epoll_create$auto(0x4) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/system/cpu/cpuidle/current_governor\x00', 0xa42, 0x0) sendfile$auto(r1, r1, 0x0, 0x1) (fail_nth: 1) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) r2 = io_uring_setup$auto(0x6, 0x0) r3 = io_uring_setup$auto(0x40, &(0x7f00000001c0)={0x3, 0x5, 0xbc, 0x9, 0x5b77b906, 0x0, 0xffffffffffffffff, [0xcfa, 0xe5d, 0x6], {0x6, 0x38, 0x9, 0x80004, 0x4, 0x3, 0x3ff, 0x7fffffff, 0xffff}, {0x2, 0x9, 0x7, 0x2, 0x0, 0xffff13a7, 0x80000006, 0x44a0, 0x1001}}) r4 = socket(0x11, 0x80003, 0x300) setsockopt$auto(r4, 0x107, 0xf, 0x0, 0x6) capset$auto(0x0, &(0x7f0000000000)={0x80000001, 0x6, 0x5c}) sendfile$auto(r2, r3, &(0x7f0000000180)=0x4, 0xfe) sendmmsg$auto(r4, &(0x7f0000000140)={{&(0x7f0000000000), 0x5ac, &(0x7f0000000100)={&(0x7f0000000200), 0x7}, 0x5, 0x0, 0x5, 0x1}, 0x5}, 0x4, 0x100) unshare$auto(0x40000080) unshare$auto(0x40000080) clone$auto(0x9001, 0x5, 0xffffffffffffffff, 0xfffffffffffffffc, 0x5) creat$auto(&(0x7f0000000040)='./file0\x00', 0x7) r5 = epoll_create$auto(0x3e) r6 = socket(0x1, 0x3, 0x0) epoll_ctl$auto(r5, 0x1, r6, 0x0) 4m5.233303384s ago: executing program 0 (id=2758): mmap$auto(0x7, 0x7, 0xdf, 0x30, 0x69a5, 0x7) write$auto_ocfs2_control_fops_stack_user(0xffffffffffffffff, &(0x7f0000003900)='\t', 0x1) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/nfs/parameters/nfs_idmap_cache_timeout\x00', 0xc2902, 0x0) read$auto(r0, 0x0, 0x20) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0001, 0x15) epoll_create$auto(0x4) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/system/cpu/cpuidle/current_governor\x00', 0xa42, 0x0) sendfile$auto(r1, r1, 0x0, 0x1) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) r2 = io_uring_setup$auto(0x6, 0x0) r3 = io_uring_setup$auto(0x40, &(0x7f00000001c0)={0x3, 0x5, 0xbc, 0x9, 0x5b77b906, 0x0, 0xffffffffffffffff, [0xcfa, 0xe5d, 0x6], {0x6, 0x38, 0x9, 0x80004, 0x4, 0x3, 0x3ff, 0x7fffffff, 0xffff}, {0x2, 0x9, 0x7, 0x2, 0x0, 0xffff13a7, 0x80000006, 0x44a0, 0x1001}}) r4 = socket(0x11, 0x80003, 0x300) setsockopt$auto(r4, 0x107, 0xf, 0x0, 0x6) capset$auto(0x0, &(0x7f0000000000)={0x80000001, 0x6, 0x5c}) sendfile$auto(r2, r3, &(0x7f0000000180)=0x4, 0xfe) sendmmsg$auto(r4, &(0x7f0000000140)={{&(0x7f0000000000), 0x5ac, &(0x7f0000000100)={&(0x7f0000000200), 0x7}, 0x5, 0x0, 0x5, 0x1}, 0x5}, 0x4, 0x100) unshare$auto(0x40000080) unshare$auto(0x40000080) clone$auto(0x9001, 0x5, 0xffffffffffffffff, 0xfffffffffffffffc, 0x5) creat$auto(&(0x7f0000000040)='./file0\x00', 0x7) r5 = epoll_create$auto(0x3e) r6 = socket(0x1, 0x3, 0x0) epoll_ctl$auto(r5, 0x1, r6, 0x0) (fail_nth: 1) 4m2.349077164s ago: executing program 0 (id=2765): add_key$auto_KEY_SPEC_REQKEY_AUTH_KEY(0x0, 0x0, 0x0, 0x8, 0xfffffffffffffff9) r0 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000800)='/dev/tty0\x00', 0x102, 0x0) write$auto_console_fops_tty_io(r0, &(0x7f0000000000)="c80d1b5d399b4b", 0xfdef) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0xffffffffffffffff, 0x8000) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) r1 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS2\x00', 0x0, 0x0) ioctl$auto_TCFLSH2(r1, 0x5453, 0x0) msgctl$auto_MSG_INFO(0x5, 0xc, &(0x7f0000000280)={{0x9, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x287f, 0x2, 0x3}, 0x0, 0x0, 0x7fffffff, 0x9, 0xb, 0xffffffff, 0xfffffffffffffffe, 0x1, 0xfc2, 0x26f, @inferred, @raw=0x9}) setresgid$auto(0x0, 0xffffffffffffffff, r2) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x59, &(0x7f0000000080)={0x7fffffff, 0x1d, 0x3000, 0x6, 0x7, 0x400a, 0xffffffffffffffff, [], {0x6, 0x6, 0x8c48, 0x29b, 0x3, 0x7f, 0x0, 0x6}, {0x100, 0x1, 0x52, 0x85, 0x2, 0x1a7b870a, 0x76c5, 0x8, 0x100000000}}) io_uring_register$auto(0x2, 0x9, 0x0, 0x0) socket(0x1d, 0x2, 0x6) r3 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$auto(0x3, &(0x7f0000000040)=@can={0x1d, r4, 0xfd}, 0x6a) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0xa, 0x3, 0xe, 0x940, 0xfffffff8, 0x3, 0x1004, 0x1, 0x9, 0x5, 0x6, 0x7, 0x1001000, 0x8, 0x2, 0x3, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa]}, 0x4, 0x40000081) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="11002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r5 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r5, &(0x7f0000000240)={0x0, 0x52, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x8044) mmap$auto(0x0, 0xeb80, 0xdf, 0xeb1, 0xffffffffffffffff, 0x8000) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x288202, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) 3m47.310230648s ago: executing program 32 (id=2765): add_key$auto_KEY_SPEC_REQKEY_AUTH_KEY(0x0, 0x0, 0x0, 0x8, 0xfffffffffffffff9) r0 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000800)='/dev/tty0\x00', 0x102, 0x0) write$auto_console_fops_tty_io(r0, &(0x7f0000000000)="c80d1b5d399b4b", 0xfdef) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0xffffffffffffffff, 0x8000) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) r1 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS2\x00', 0x0, 0x0) ioctl$auto_TCFLSH2(r1, 0x5453, 0x0) msgctl$auto_MSG_INFO(0x5, 0xc, &(0x7f0000000280)={{0x9, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x287f, 0x2, 0x3}, 0x0, 0x0, 0x7fffffff, 0x9, 0xb, 0xffffffff, 0xfffffffffffffffe, 0x1, 0xfc2, 0x26f, @inferred, @raw=0x9}) setresgid$auto(0x0, 0xffffffffffffffff, r2) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x59, &(0x7f0000000080)={0x7fffffff, 0x1d, 0x3000, 0x6, 0x7, 0x400a, 0xffffffffffffffff, [], {0x6, 0x6, 0x8c48, 0x29b, 0x3, 0x7f, 0x0, 0x6}, {0x100, 0x1, 0x52, 0x85, 0x2, 0x1a7b870a, 0x76c5, 0x8, 0x100000000}}) io_uring_register$auto(0x2, 0x9, 0x0, 0x0) socket(0x1d, 0x2, 0x6) r3 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$auto(0x3, &(0x7f0000000040)=@can={0x1d, r4, 0xfd}, 0x6a) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0xa, 0x3, 0xe, 0x940, 0xfffffff8, 0x3, 0x1004, 0x1, 0x9, 0x5, 0x6, 0x7, 0x1001000, 0x8, 0x2, 0x3, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffe, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xa]}, 0x4, 0x40000081) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="11002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r5 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r5, &(0x7f0000000240)={0x0, 0x52, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x8044) mmap$auto(0x0, 0xeb80, 0xdf, 0xeb1, 0xffffffffffffffff, 0x8000) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x288202, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) 5.043816377s ago: executing program 4 (id=3767): write$auto(0xffffffffffffffff, &(0x7f0000000080)='0\x00\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94&\x81\xe2\x13\x8f\xea#\xf8F\xbbOO]e[\xbb\xf9\xcd\xc0\xc9\x00\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\b\xc1\x04z\xd0I>\x8f\x00\xe5\x1c*\xed`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\f};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xcbA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xdeL/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(', 0xa) unshare$auto(0x40000080) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) listen$auto(0x3, 0x81) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r1 = prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x2003f2, 0x15) syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x24048084) madvise$auto(0x0, 0x200007, 0x19) openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, 0x0, 0x103003, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = openat$auto_zero_fops_mem(0xffffffffffffff9c, &(0x7f0000000340), 0x80200, 0x0) r4 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/net/snmp\x00', 0x40, 0x0) pread64$auto(r4, 0x0, 0x80000000, 0x9fffffffd) pread64$auto(r3, &(0x7f0000000240)='\x03W\x96l\x15\x0f\xff\x00'/21, 0x100000002, 0x100000001) mq_notify$auto(0xffffffffffffffff, &(0x7f0000000180)={@sival_ptr=0x0, @inferred, 0x0, @_sigev_thread={0x0, 0x0}}) mq_timedsend$auto(r1, 0x0, 0x2, 0x9, 0x0) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x1000000) 4.806600295s ago: executing program 1 (id=3768): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) write$auto(0x1, 0x0, 0x80000000) unshare$auto(0x40000080) mmap$auto(0x0, 0x40009, 0x7, 0x9b72, 0x7, 0x28000) ioctl$auto_SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000000)={{0x0, 0x2, 0x0, 0x1a, 0x0, 0xfffffffffffffffc, 0x5}, 0x6}, 0x1, 0x401) r0 = socket(0xa, 0x5, 0x84) sendto$auto(r0, 0x0, 0x401, 0x6358c0, &(0x7f0000000000)=@generic={0xa, "e2e18340cba8fe8000"}, 0x1c) mmap$auto(0xfff, 0x9, 0xfffffffffffffffb, 0x200000eb0, 0x401, 0x701cf82a) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/mm/transparent_hugepage/hugepages-2048kB/enabled\x00', 0x22b42, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/snd_hda_intel/parameters/power_save\x00', 0x80002, 0x0) read$auto_ptdump_fops_(0xffffffffffffffff, &(0x7f00000000c0)=""/32, 0x20) sendfile$auto(r1, r1, 0x0, 0x6) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) select$auto(0x5, 0x0, 0x0, &(0x7f0000000500)={[0x1ff, 0x0, 0x7, 0xfff, 0x948b, 0x0, 0x15f4da0a, 0x3, 0x402, 0x8, 0x4, 0x4, 0x6d41, 0x4, 0xa, 0xfffffffffffffdfa]}, 0x0) write$auto(r2, &(0x7f0000000400), 0x100000a3d9) sendmsg$auto_HWSIM_CMD_NEW_RADIO(0xffffffffffffffff, &(0x7f0000001e00)={0x0, 0x0, &(0x7f0000001dc0)={&(0x7f0000001e40)=ANY=[@ANYBLOB=' \x00\x00', @ANYBLOB="010027bd7000fbdbdf25040000000800170008000000"], 0x20}, 0x1, 0x0, 0x0, 0x220000c1}, 0xc0) setpriority$auto(0x2, 0x0, 0x80000) ioctl$auto_EXT4_IOC_SETVERSION_OLD(0xffffffffffffffff, 0x40087602, &(0x7f0000000280)="d5fe11b10faac2e41beb8dce6fbe442c9d14469b57d6defbfdd6bcc877acd73557fc74c6ed7ff4f02afe5f85291baf877400934d252b0a23e5976afbb730a822777f4881fd11b05ad1ad49f68bb850924b8ef83296fe46b500e2119f9b15a4cc94a12bfde33f0c64be955bb26593cea7761df9ab62ea97fed47f810822eb17edd4f514e9fdcfd5b8babef4b60883d3b877f263c2eddf7158082f51eb8e7afc2157e930bdf6a1ad6948f6457e1365437ec549e149d1d29eae85325e54e7878a9ecdd87fbac17f93a7800339026b46ba71a3c545b3d17012b32386152970eb3f967fd6a1ae7243cc184a81a16bc277362bfe43df") close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0xec8, 0x2, 0x100000000009b72, 0xffffffffffffffff, 0x28000) r3 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/net/dev_snmp6/syz_tun\x00', 0x1cb422, 0x0) pread64$auto(r3, 0x0, 0x6b, 0x270) madvise$auto_MADV_SEQUENTIAL(0xb, 0x2000000000000, 0x2) r4 = io_uring_setup$auto(0x59, &(0x7f0000000080)={0x7fffffff, 0xd, 0x3000, 0x6, 0x7, 0xa, 0xffffffffffffffff, [], {0x6, 0x6, 0x8c48, 0x29b, 0x8, 0x7f, 0x101, 0x6, 0x3}, {0x100, 0x1, 0x52, 0x5, 0x2, 0x1a7b870a, 0x76c4, 0x8, 0x100000000}}) r5 = socket(0x10, 0x1, 0x0) sendmsg$auto_SMC_NETLINK_ENABLE_SEID(r5, &(0x7f0000000140)={&(0x7f0000000000)={0x2d, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={0x0, 0xa0}}, 0x20040804) ioctl$auto_SNDCTL_DSP_GETBLKSIZE(r4, 0xc0045004, &(0x7f0000000400)="aa28145cfb099b851bfc0b7ef406b71e0f1845f6ccfeb0dcd52d49971a446814b1e9dbd8320c2356dfb24bff5112961ccc4133e0be07abd6ae6adb9418616662a5bf4df2875ea09e9b6d5fb08075423ef94a24ec8b68d5927f8214d978d6f8752dc9937040f5065af62f3ea05b3b3d6a06bb52a570e8216812f1dee635026e267e8173d4dfbd95816ef32742c213181a85c2c3cd3e916f658a4766f70f05de3180c57cc2523d577ff9ee65f71937fde1a5584ef5c5bf5ec3c0507b89dad30dd43a0bec15750f970d4016a92f310e1ae753") select$auto(0xe, 0x0, 0x0, &(0x7f0000000200)={[0x8, 0xffffffffffffff49, 0x5, 0x1823, 0x800000000004, 0x1, 0x5, 0x19, 0x10, 0x5, 0x2002dde, 0x2, 0xfffffffffffffffa, 0xab, 0x0, 0x1]}, &(0x7f0000000040)={0x0, 0x7}) 4.798547433s ago: executing program 2 (id=3769): socket(0xa, 0x3, 0x3b) socket$nl_generic(0x10, 0x3, 0x10) connect$auto(0x3, &(0x7f0000000000)=@generic={0xa, "0000e100"}, 0x58) quotactl$auto(0x9, 0x0, 0x62a0, 0x0) mmap$auto(0x0, 0x2000c, 0xdf, 0xe31, 0x40000000000a5, 0x8000) syz_genetlink_get_family_id$auto_802_15_4_mac(&(0x7f0000000100), 0xffffffffffffffff) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sg0\x00', 0x800, 0x0) ioctl$auto_SG_NEXT_CMD_LEN(r0, 0x2283, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x700, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) epoll_create$auto(0x3ff) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, 0x0, 0x101000, 0x0) madvise$auto(0x3f, 0x2003f0, 0x17) mmap$auto(0x5, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x4000000007ffc) unshare$auto(0x8000000) sendmsg$auto_THERMAL_GENL_CMD_TZ_GET_TEMP(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x800, 0x70bd25, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40010}, 0x810) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00', @ANYBLOB="00042cbd7000fb3d89cb809172a3320003008000400088"], 0x24}, 0x1, 0x0, 0x0, 0x20008010}, 0x400d0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="720100", @ANYBLOB], 0x1ac}}, 0x40000) semget$auto(0x0, 0x2e4a, 0x8000) 4.685444783s ago: executing program 3 (id=3770): socket(0x28, 0x5, 0x0) msgctl$auto_IPC_INFO(0x4, 0x3, &(0x7f0000000180)={{0x0, 0xee01, 0xee00, 0x2, 0x7f17, 0x9, 0x9c30}, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x3, 0x9, 0xffffffffffffffff, 0x2, 0x2, 0x7fffffff, 0x6, 0x8, 0x5, @inferred=0xffffffffffffffff, @raw=0x4}) r1 = getegid() setfsgid$auto(r1) msgctl$auto_MSG_INFO(0x8001, 0xc, &(0x7f0000000300)={{0x2, r0, r1, 0xffff8000, 0xc, 0x2, 0x9}, &(0x7f0000000280)=0x2, &(0x7f00000002c0)=0xa3, 0x42d, 0x6, 0x4177ad48, 0xffffffff, 0x2, 0xfffa, 0x7, 0xf49, @raw=0xffffffff, @raw=0x9}) openat$auto_proc_mem_operations_base(0xffffffffffffff9c, 0x0, 0x40, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000002340)='/dev/binderfs/binder0\x00', 0x0, 0x0) mmap$auto(0x0, 0x5, 0xfffffffffffffe01, 0x8011, 0x3, 0x8000) mmap$auto(0x0, 0x5, 0xfffffffffffffe01, 0x8011, 0x3, 0x8000) sendmsg$auto_ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x20000054) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) getrandom$auto(0x0, 0x6000000, 0x3) pipe$auto(&(0x7f0000000040)=r2) ioctl$auto_TUNGETVNETBE2(r3, 0x800454df, &(0x7f00000000c0)=0x2) mmap$auto(0x0, 0x810004, 0x2000000efb, 0x8000000008011, r2, 0x8000) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) r4 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r4, &(0x7f0000000200)={0x0, 0x7}, 0x4) openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/tracing/per_cpu/cpu1/trace_pipe_raw\x00', 0x0, 0x0) openat$auto_snapshot_fops_user(0xffffffffffffff9c, &(0x7f0000000000), 0x8001, 0x0) 3.741068389s ago: executing program 2 (id=3771): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xfffffffffffffffe, 0x8000) socket(0x6, 0x3, 0x37) mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x4) r0 = socket(0x26, 0x5, 0x8c68) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x101e41, 0x0) ioperm$auto(0xfffffffffffffff7, 0x5, 0x4000005) futex_waitv$auto(0x0, 0x7ff, 0x8, &(0x7f00000000c0)={0x1000000004, 0x10}, 0x4) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$auto_uinput_fops_uinput(0xffffffffffffff9c, 0x0, 0x40, 0x0) read$auto(0xffffffffffffffff, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x140082, 0x0) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000100)='/dev/admmidi2\x00', 0x8e100, 0x0) read$auto_snd_rawmidi_f_ops_rawmidi(r3, &(0x7f00000002c0)=""/157, 0x9d) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) close_range$auto(0x2, 0x8, 0x0) close_range$auto(0x2, 0x8, 0x0) sysfs$auto(0x2, 0x7, 0x0) lsm_list_modules$auto(0x0, 0x0, 0x0) r4 = ioctl$auto_TUNATTACHFILTER(r0, 0x401054d5, 0x0) ioctl$auto_virtual_ncidev_fops_virtual_ncidev(r4, 0x6, 0x0) futex_wake$auto(&(0x7f0000000140)="adf3e16812f6e5", 0x8, 0x6, 0x6) ioctl$auto_BLKRRPART(r4, 0x125f, 0x0) r5 = openat$auto_dvb_demux_fops_dmxdev(0xffffffffffffff9c, &(0x7f0000000280), 0x141182, 0x0) ioctl$auto_dvb_demux_fops_dmxdev(r5, 0x40146f2c, 0x0) unshare$auto(0x40000080) setsockopt$auto(r1, 0xd0, 0x800000e4, 0x0, 0x569) r6 = openat$auto_bm_register_operations_binfmt_misc(0xffffffffffffff9c, &(0x7f0000000040), 0x20580, 0x0) mmap$auto(0x0, 0x80000000005, 0x2, 0x9b73, r6, 0x8000) mincore$auto(0x1000, 0x8001, 0x0) 3.687078796s ago: executing program 1 (id=3772): mmap$auto(0x0, 0x2020009, 0x3, 0xf8, 0xfffffffffffffffa, 0x8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth0\x00'}) close_range$auto(0x0, 0xffffffffffffffff, 0x2) socket(0xa, 0x2, 0x0) r1 = socket(0x18, 0x5, 0x1) connect$auto(r1, &(0x7f0000000000)=@in={0x2, 0x100}, 0x3a) open(&(0x7f00000000c0)='./file0\x00', 0x161342, 0x130) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/devices/platform/dummy_hcd.4/usb5/descriptors\x00', 0x18b940, 0x0) sendfile$auto(0x1, 0x3, 0x0, 0x7fffefff) r2 = socket(0x22, 0x2, 0x1) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x402, 0x0) openat$auto_drm_edid_fops_drm_debugfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/dri/vkms/Virtual-1/edid_override\x00', 0x2082, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xf8, 0xfffffffffffffffa, 0x8000) syslog$auto(0x9, &(0x7f0000000080)='..\x00k\xac\x8c\x1d\x0e\x98\x80\xd2\xaf\xa1\xf2\x1e\xe1R1\xa2\x8e\xce\xa0\x17\bI3\'\xc5tw\xd7\x1d\xa6\xf4#+\xfa\xd7\x01\xb9j<\v\xf47\n\xa7\xd2\x8b\x11e1\xb3\xfdd\x04\xa9 1q\x97\xc4,\xa9^\xc1\xb6\xa1q\x0f\xd1\x013\x87l\xb9\x1e\x05\x90\xa2', 0x7) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)) getdents64$auto(r3, 0x0, 0x4000001d) fstat$auto(r2, 0x0) madvise$auto(0x0, 0x2003f2, 0x15) 3.405516872s ago: executing program 1 (id=3773): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r0 = socket(0x15, 0x5, 0x0) timer_create$auto_CLOCK_MONOTONIC(0x1, &(0x7f00000000c0)={@sival_int=0xffff, @raw=0x80000000, 0x2, @_sigev_thread={0x0, 0x0}}, 0x0) setsockopt$auto(r0, 0x114, 0x8, 0x0, 0x4) read$auto_minstrel_ht_stat_csv_fops_rc80211_minstrel_ht_debugfs(0xffffffffffffffff, &(0x7f0000000100)=""/251, 0xfb) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x1e, 0x5, 0x0) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) fanotify_init$auto(0x5, 0x0) mmap$auto(0x0, 0x400005, 0xffffffffffeffffe, 0x9b72, 0xc76, 0x8000) r2 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="0100", @ANYBLOB=']'], 0x1ac}}, 0x40000) recvmmsg$auto(r2, &(0x7f0000000140)={{0x0, 0x1, &(0x7f0000000080)={0x0, 0x400}, 0x5, 0x0, 0x3, 0x8}, 0x803}, 0xfffffff9, 0x10, 0x0) write$auto(0x3, 0x0, 0x100082) close_range$auto(0x2, 0x8, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$auto_KVM_GET_MSRS(r1, 0x4008ae89, &(0x7f00000000c0)={0xdd, 0x0, [{0x400000b1, 0x402}]}) ioctl$auto(0x3, 0x89e0, 0x91) 3.379646102s ago: executing program 3 (id=3774): socket(0x28, 0x5, 0x0) msgctl$auto_IPC_INFO(0x4, 0x3, &(0x7f0000000180)={{0x0, 0xee01, 0xee00, 0x2, 0x7f17, 0x9, 0x9c30}, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x3, 0x9, 0xffffffffffffffff, 0x2, 0x2, 0x7fffffff, 0x6, 0x8, 0x5, @inferred=0xffffffffffffffff, @raw=0x4}) r1 = getegid() setfsgid$auto(r1) msgctl$auto_MSG_INFO(0x8001, 0xc, &(0x7f0000000300)={{0x2, r0, r1, 0xffff8000, 0xc, 0x2, 0x9}, &(0x7f0000000280)=0x2, &(0x7f00000002c0)=0xa3, 0x42d, 0x6, 0x4177ad48, 0xffffffff, 0x2, 0xfffa, 0x7, 0xf49, @raw=0xffffffff, @raw=0x9}) openat$auto_proc_mem_operations_base(0xffffffffffffff9c, 0x0, 0x40, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x5, 0xfffffffffffffe01, 0x8011, 0x3, 0x8000) mmap$auto(0x0, 0x5, 0xfffffffffffffe01, 0x8011, 0x3, 0x8000) sendmsg$auto_ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x20000054) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) getrandom$auto(0x0, 0x6000000, 0x3) pipe$auto(&(0x7f0000000040)=r2) ioctl$auto_TUNGETVNETBE2(r3, 0x800454df, &(0x7f00000000c0)=0x2) mmap$auto(0x0, 0x810004, 0x2000000efb, 0x8000000008011, r2, 0x8000) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r4, 0x0, 0x20) r5 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r5, &(0x7f0000000200)={0x0, 0x7}, 0x4) r6 = openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/tracing/per_cpu/cpu1/trace_pipe_raw\x00', 0x0, 0x0) ioctl$auto_FIDEDUPERANGE(r6, 0xc0189436, 0x1000000000007ffd) openat$auto_snapshot_fops_user(0xffffffffffffff9c, &(0x7f0000000000), 0x8001, 0x0) ioctl$auto_BLKRRPART(r2, 0x125f, 0x0) madvise$auto(0x0, 0x400053, 0x9) 3.212938756s ago: executing program 2 (id=3775): r0 = timerfd_create$auto_CLOCK_MONOTONIC(0x1, 0x83c) getsockopt$auto_SO_DEBUG(r0, 0x5, 0x1, &(0x7f0000000080)='\x00', &(0x7f00000000c0)=0xfffffffb) pidfd_send_signal$auto_PIDFD_SELF_THREAD_GROUP(0xffffffffffffd8ef, 0xa2ab, &(0x7f0000000000)={@_si_pad}, 0xed65) 3.077399767s ago: executing program 2 (id=3776): mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) socket(0xa, 0x3, 0x3b) connect$auto(0x3, &(0x7f0000000000)=@generic={0xa, "0000e100"}, 0x58) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(r0, 0xfffffffffffff000, 0x2) landlock_create_ruleset$auto(&(0x7f0000000000)={0xff, 0x400000000000401, 0x9}, 0x9, 0x0) landlock_restrict_self$auto(r0, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x0, 0xfffffffffffff000, 0x2) landlock_create_ruleset$auto(&(0x7f0000000000)={0x0, 0x401, 0xb1d4}, 0x9, 0x0) landlock_restrict_self$auto(r1, 0x0) mmap$auto(0x0, 0x200009, 0x2, 0x40eb1, 0x602, 0x300000000000) getcwd$auto(0x0, 0xffffffffffffffff) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) mmap$auto(0x0, 0x202000a, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) r2 = socket(0x10, 0x2, 0xc) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x18}, 0x1, 0x0, 0x0, 0x60008004}, 0x4000050) socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/mac80211_hwsim/hwsim0/ieee80211/phy0/rfkill2/state\x00', 0x181c01, 0x0) write$auto(r3, &(0x7f0000000040), 0x9) sendmsg$auto_OVS_DP_CMD_NEW(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0f0026bd7000fcdbdf9907"], 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB='U'], 0x1ac}}, 0x4004) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc6}, 0x1, 0x0, 0x2, 0xd}, 0xd69}, 0x3, 0x0) keyctl$auto(0x1d, 0xffffffffffffffff, 0x8, 0x5, 0x8) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, 0x0, 0xc800) 2.887745174s ago: executing program 2 (id=3777): mmap$auto(0x0, 0x201fffe, 0x3, 0x18, 0xffffffffffffffff, 0x7fff) r0 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/kernel/watchdog_thresh\x00', 0x20402, 0x0) write$auto_proc_sys_file_operations_proc_sysctl(r0, 0x0, 0x0) semctl$auto(0x2, 0xff, 0x1, 0x7ff) mmap$auto(0x4, 0x2000000000000009, 0x4, 0x8000000eb1, r0, 0x8000) mmap$auto(0x0, 0x2020007, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x0, 0x5, 0x0) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual/net/sit0/statistics/tx_compressed\x00', 0x80000, 0x0) r2 = socket(0x2, 0x1, 0x106) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages_mempolicy\x00', 0xa001, 0x0) close_range$auto(0x2, 0x8, 0x0) socketpair$auto(0x1e, 0x5, 0x9, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x8c00, 0x0) ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$auto(0x3, 0xc048aec8, r1) madvise$auto(0x0, 0xffffffffffff0005, 0x17) madvise$auto(0x0, 0xffffffffffff0001, 0x15) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) lremovexattr$auto(0x0, 0x0) set_mempolicy$auto(0x2005, &(0x7f0000000080)=0x87e, 0x4) mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb0, r2, 0x6) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/bus/usb-serial/drivers/digi_4/new_id\x00', 0x183841, 0x0) sysfs$auto(0x2, 0x100000000000038, 0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/kernel/unprivileged_bpf_disabled\x00', 0x282, 0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv6/conf/veth0/accept_ra_pinfo\x00', 0x2000, 0x0) 2.876762018s ago: executing program 4 (id=3778): socket(0xa, 0x3, 0x3b) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) connect$auto(0x3, &(0x7f0000000000)=@generic={0xa, "0000e100"}, 0x58) quotactl$auto(0x9, 0x0, 0x62a0, 0x0) mmap$auto(0x0, 0x2000c, 0xdf, 0xe31, 0x40000000000a5, 0x8000) syz_genetlink_get_family_id$auto_802_15_4_mac(&(0x7f0000000100), 0xffffffffffffffff) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) setsockopt$auto(0x3, 0x1, 0x4c, 0x0, 0x9) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sg0\x00', 0x800, 0x0) ioctl$auto_SG_NEXT_CMD_LEN(r0, 0x2283, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x700, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) epoll_create$auto(0x3ff) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, 0x0, 0x101000, 0x0) madvise$auto(0x3f, 0x2003f0, 0x17) mmap$auto(0x5, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x4000000007ffc) unshare$auto(0x8000000) sendmsg$auto_THERMAL_GENL_CMD_TZ_GET_TEMP(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@THERMAL_GENL_ATTR_TZ_CDEV_WEIGHT={0x8, 0xc, 0x6}, @THERMAL_GENL_ATTR_THRESHOLD_DIRECTION={0x8, 0x1b, 0x100}, @THERMAL_GENL_ATTR_TZ_TRIP_HYST={0x8, 0x9, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40010}, 0x810) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042cbd7000fb3d89cb809172a3320003008000400088"], 0x24}, 0x1, 0x0, 0x0, 0x20008010}, 0x400d0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="180027"], 0x1ac}}, 0x40000) semget$auto(0x0, 0x2e4a, 0x8000) 1.853696063s ago: executing program 4 (id=3779): socket(0x28, 0x5, 0x0) msgctl$auto_IPC_INFO(0x4, 0x3, &(0x7f0000000180)={{0x0, 0xee01, 0xee00, 0x2, 0x7f17, 0x9, 0x9c30}, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x3, 0x9, 0xffffffffffffffff, 0x2, 0x2, 0x7fffffff, 0x6, 0x8, 0x5, @inferred=0xffffffffffffffff, @raw=0x4}) r1 = getegid() setfsgid$auto(r1) msgctl$auto_MSG_INFO(0x8001, 0xc, &(0x7f0000000300)={{0x2, r0, r1, 0xffff8000, 0xc, 0x2, 0x9}, &(0x7f0000000280)=0x2, &(0x7f00000002c0)=0xa3, 0x42d, 0x6, 0x4177ad48, 0xffffffff, 0x2, 0xfffa, 0x7, 0xf49, @raw=0xffffffff, @raw=0x9}) openat$auto_proc_mem_operations_base(0xffffffffffffff9c, 0x0, 0x40, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000002340)='/dev/binderfs/binder0\x00', 0x0, 0x0) mmap$auto(0x0, 0x5, 0xfffffffffffffe01, 0x8011, 0x3, 0x8000) mmap$auto(0x0, 0x5, 0xfffffffffffffe01, 0x8011, 0x3, 0x8000) sendmsg$auto_ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x20000054) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) getrandom$auto(0x0, 0x6000000, 0x3) pipe$auto(&(0x7f0000000040)=r2) ioctl$auto_TUNGETVNETBE2(r3, 0x800454df, &(0x7f00000000c0)=0x2) mmap$auto(0x0, 0x810004, 0x2000000efb, 0x8000000008011, r2, 0x8000) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) r4 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r4, &(0x7f0000000200)={0x0, 0x7}, 0x4) openat$auto_snapshot_fops_user(0xffffffffffffff9c, &(0x7f0000000000), 0x8001, 0x0) 1.667077106s ago: executing program 1 (id=3780): r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/tty34\x00', 0x620880, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r1 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/controlC1\x00', 0x80, 0x0) ioctl$auto(r1, 0x80dc5521, r0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = socketpair$auto(0x1, 0x5, 0x8000000000000000, 0x0) r3 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sda\x00', 0x8001, 0x0) ioctl$auto(r3, 0x5393, r2) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$auto_NL80211_CMD_FRAME(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x20000014}, 0x30000051) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000000)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="010027"], 0x24}, 0x1, 0x0, 0x0, 0x4088}, 0x20000010) r4 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200", @ANYBLOB="5de1"], 0x1ac}}, 0x40000) recvmmsg$auto(r4, &(0x7f0000000040)={{0x0, 0x5, 0x0, 0x5, 0x0, 0x200002, 0x13}, 0x6}, 0xfffffff9, 0x10, 0x0) r5 = socket(0x1e, 0x4, 0x0) setsockopt$auto(r5, 0x10f, 0x87, 0x0, 0x14) 1.589817025s ago: executing program 3 (id=3781): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0xc, 0x400009, 0xdf, 0x7b, 0xffffffffffffffff, 0x10000000400000) r0 = openat$auto_snd_timer_f_ops_timer(0xffffffffffffff9c, &(0x7f0000001cc0), 0x0, 0x0) ioctl$auto_SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x2, 0x200800, 0xffffffff, 0xfffffffb}, "0dd7fd004929347eeeccdf0732f77b1f6de0d6d51768a257a97ca5e9ca6310ea"}) ioctl$auto_SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, 0x0) mmap$auto(0x0, 0x80000000006, 0xdf, 0x9b72, 0x2, 0x8000) r1 = openat$auto_drm_crtc_crc_data_fops_drm_debugfs_crc(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x161343, 0x580f790b2ef4c33) copy_file_range$auto(r1, 0x0, r2, 0x0, 0x21c3, 0x0) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/btrfs/features/supported_checksums\x00', 0x40a00, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r3, &(0x7f0000000080)=""/19, 0x13) inotify_add_watch$auto(r1, 0x0, 0x1) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) r4 = fanotify_init$auto(0x5, 0x2000000000002) openat$auto_mISDN_fops_timerdev(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f00000002c0)=ANY=[@ANYRES16=r3, @ANYRESDEC=r1], 0x2c}, 0x1, 0x0, 0x0, 0x4c811}, 0x4011) r5 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000000c0), 0xe0180, 0x0) read$auto_l2cap_debugfs_fops_(r2, &(0x7f0000000140)=""/115, 0x73) r6 = ioctl$auto_KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$auto(0x3, 0x8e68, 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$auto(r6, 0x4020ae76, r7) r8 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptye4\x00', 0x20080, 0x0) pipe$auto(&(0x7f0000000200)=r2) ioctl$auto_BCH_IOCTL_DISK_SET_STATE(0xffffffffffffffff, 0x4010bc08, &(0x7f0000000100)={0x6, 0x5, '\x00', 0xffffffffffff5bba}) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r9 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptya1\x00', 0x20080, 0x0) ioctl$auto_SNDCTL_TMR_CONTINUE(r9, 0x40045431, 0x0) ioctl$auto_SNDCTL_TMR_CONTINUE(r8, 0x802c542a, 0x0) 1.372240612s ago: executing program 1 (id=3782): socket(0x28, 0x5, 0x0) msgctl$auto_IPC_INFO(0x4, 0x3, &(0x7f0000000180)={{0x0, 0xee01, 0xee00, 0x2, 0x7f17, 0x9, 0x9c30}, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x3, 0x9, 0xffffffffffffffff, 0x2, 0x2, 0x7fffffff, 0x6, 0x8, 0x5, @inferred=0xffffffffffffffff, @raw=0x4}) r1 = getegid() setfsgid$auto(r1) msgctl$auto_MSG_INFO(0x8001, 0xc, &(0x7f0000000300)={{0x2, r0, r1, 0xffff8000, 0xc, 0x2, 0x9}, &(0x7f0000000280)=0x2, &(0x7f00000002c0)=0xa3, 0x42d, 0x6, 0x4177ad48, 0xffffffff, 0x2, 0xfffa, 0x7, 0xf49, @raw=0xffffffff, @raw=0x9}) openat$auto_proc_mem_operations_base(0xffffffffffffff9c, 0x0, 0x40, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000002340)='/dev/binderfs/binder0\x00', 0x0, 0x0) mmap$auto(0x0, 0x5, 0xfffffffffffffe01, 0x8011, 0x3, 0x8000) mmap$auto(0x0, 0x5, 0xfffffffffffffe01, 0x8011, 0x3, 0x8000) sendmsg$auto_ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x20000054) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) getrandom$auto(0x0, 0x6000000, 0x3) pipe$auto(&(0x7f0000000040)=r2) ioctl$auto_TUNGETVNETBE2(r3, 0x800454df, &(0x7f00000000c0)=0x2) mmap$auto(0x0, 0x810004, 0x2000000efb, 0x8000000008011, r2, 0x8000) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) r4 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r4, &(0x7f0000000200)={0x0, 0x7}, 0x4) openat$auto_snapshot_fops_user(0xffffffffffffff9c, &(0x7f0000000000), 0x8001, 0x0) 1.232362295s ago: executing program 3 (id=3783): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) socket(0x2b, 0x1, 0x0) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000100)='/dev/tty51\x00', 0x80, 0x0) read$auto(r0, 0x0, 0x6) ioctl$auto_TIOCVHANGUP2(r0, 0x5437, 0x0) write$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffffff, 0x0, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @multicast2}, 0x6a) r1 = openat$auto_drm_connector_fops_drm_debugfs(0xffffffffffffff9c, &(0x7f0000001200)='/sys/kernel/debug/dri/vkms/Writeback-1/force\x00', 0x60041, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000306b87000fedbdf250300000004000800040003800c0016"], 0x28}}, 0x4c810) socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_CTRL_CMD_GETPOLICY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="0700000000000000df250a"], 0x14}, 0x1, 0x0, 0x0, 0x20008000}, 0x10004010) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1800"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) write$auto_drm_connector_fops_drm_debugfs(r1, &(0x7f0000001240)="b3827964b69f25ba34ba41a7", 0xc) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) socket(0x10, 0x2, 0x14) socket(0x11, 0x80003, 0x300) socket(0x1d, 0x2, 0x7) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) socket(0x1, 0x80805, 0x1ff) inotify_init1$auto(0x3000000000000) mmap$auto(0x0, 0x2020009, 0x126, 0xf8, 0xffffffffffffffff, 0x8000) socketpair$auto(0x1, 0x5, 0x8000000000000000, 0x0) bind$auto(0x3, &(0x7f0000000040)=@ethernet={0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1cc5087217524dd0}}, 0x6a) close_range$auto(0x2, 0x8, 0x0) sendmsg$auto_ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000000040)=ANY=[@ANYBLOB="010027bd7000ffdb"], 0x28}, 0x1, 0x0, 0x0, 0x90}, 0x0) 966.776704ms ago: executing program 3 (id=3784): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xfffffffffffffffe, 0x8000) socket(0x6, 0x3, 0x37) mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x4) r0 = socket(0x26, 0x5, 0x8c68) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x101e41, 0x0) ioperm$auto(0xfffffffffffffff7, 0x5, 0x4000005) futex_waitv$auto(0x0, 0x7ff, 0x8, &(0x7f00000000c0)={0x1000000004, 0x10}, 0x4) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x2000, 0x0) openat$auto_uinput_fops_uinput(0xffffffffffffff9c, 0x0, 0x40, 0x0) read$auto(0xffffffffffffffff, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x140082, 0x0) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000100)='/dev/admmidi2\x00', 0x8e100, 0x0) read$auto_snd_rawmidi_f_ops_rawmidi(r3, &(0x7f00000002c0)=""/157, 0x9d) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) close_range$auto(0x2, 0x8, 0x0) close_range$auto(0x2, 0x8, 0x0) sysfs$auto(0x2, 0x7, 0x0) lsm_list_modules$auto(0x0, 0x0, 0x0) r4 = ioctl$auto_TUNATTACHFILTER(r0, 0x401054d5, 0x0) ioctl$auto_virtual_ncidev_fops_virtual_ncidev(r4, 0x6, 0x0) futex_wake$auto(&(0x7f0000000140)="adf3e16812f6e5", 0x8, 0x6, 0x6) ioctl$auto_BLKRRPART(r4, 0x125f, 0x0) r5 = openat$auto_dvb_demux_fops_dmxdev(0xffffffffffffff9c, &(0x7f0000000280), 0x141182, 0x0) ioctl$auto_dvb_demux_fops_dmxdev(r5, 0x40146f2c, 0x0) unshare$auto(0x40000080) setsockopt$auto(r1, 0xd0, 0x800000e4, 0x0, 0x569) r6 = openat$auto_bm_register_operations_binfmt_misc(0xffffffffffffff9c, &(0x7f0000000040), 0x20580, 0x0) mmap$auto(0x0, 0x80000000005, 0x2, 0x9b73, r6, 0x8000) mincore$auto(0x1000, 0x8001, 0x0) 950.870696ms ago: executing program 4 (id=3785): openat$auto_clear_warn_once_fops_(0xffffffffffffff9c, &(0x7f0000000000), 0x608800, 0x0) (async) openat$auto_clear_warn_once_fops_(0xffffffffffffff9c, &(0x7f0000000000), 0x608800, 0x0) r0 = openat$auto_objects_fops_(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$auto(0x0, 0x1, 0xa, 0xeb1, r0, 0xe2e) r1 = socket(0xa, 0x801, 0x84) getsockopt$auto(r1, 0x84, 0x71, 0x0, &(0x7f0000000280)=0x22a) 934.507475ms ago: executing program 2 (id=3786): write$auto(0xffffffffffffffff, &(0x7f0000000080)='0\x00\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94&\x81\xe2\x13\x8f\xea#\xf8F\xbbOO]e[\xbb\xf9\xcd\xc0\xc9\x00\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\b\xc1\x04z\xd0I>\x8f\x00\xe5\x1c*\xed`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\f};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xcbA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xdeL/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(', 0xa) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) listen$auto(0x3, 0x81) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x6, 0x202000a, 0xfffffffc, 0x110, 0xfffffffffffffffa, 0x7ffc) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x1, 0xffd, 0x8) madvise$auto(0x0, 0x2003f2, 0x15) syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x24048084) madvise$auto(0x0, 0x200007, 0x19) openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, 0x0, 0x103003, 0x0) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00'}) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001400c7"], 0x2c}, 0x1, 0x0, 0x0, 0x4000001}, 0xc080) r2 = socket(0x10, 0x2, 0x4) write$auto(r2, &(0x7f0000000000)='-\x00', 0x2fb) recvfrom$auto(r2, &(0x7f00000004c0), 0xd, 0x10, 0x0, 0x0) ioctl$auto_KVM_CREATE_VM(r1, 0xae01, 0x0) openat$auto_zero_fops_mem(0xffffffffffffff9c, &(0x7f0000000340), 0x80200, 0x0) r3 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/net/snmp\x00', 0x40, 0x0) pread64$auto(r3, 0x0, 0x80000000, 0x9fffffffd) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) r4 = socket(0x2, 0x1, 0x0) close_range$auto(0x2, 0xa, 0x0) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) getsockopt$auto(r4, 0x6, 0x23, 0x0, 0x0) 736.789142ms ago: executing program 4 (id=3787): close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000680)='/sys/devices/virtual/net/nr14/proto_down\x00', 0x82902, 0x0) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x189401, 0x0) r1 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptyy5\x00', 0x121141, 0x0) ioctl$auto_TIOCGWINSZ(r1, 0x5413, &(0x7f00000001c0)) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) r3 = ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$auto(0x3, 0xae60, 0x10000000000402) sendmmsg$auto(0xffffffffffffffff, &(0x7f00000002c0)={{0x0, 0x9, &(0x7f0000000080)={&(0x7f0000000180)="cb7978ababe605edf078e6f2726ae03e663c080c0d6c169eec931ca2ea579299bf44495b1fe078f2e9c5586ae69caa", 0x1}, 0xfffffffffffffff7, 0x0, 0x5, 0x24b}, 0x800}, 0x8, 0xff) statmount$auto(0x0, &(0x7f0000000300)={0x7, 0x6, 0x1, 0xf0dd, 0x2, 0x1, 0xff, 0xbad, 0xd0, 0xae0000000000, 0x8001, 0x1e2b, 0x8, 0x7fff, 0x9, 0x46c8ace, 0x80000001, 0x400000, 0x3ff, 0x66, 0xc2a, 0x2, 0xbf64, 0x4, 0x7, 0x4, 0x9, 0x8, 0x8001, 0xa, 0x9, [0x101, 0xe3, 0x5, 0x1, 0x7, 0x40000000000000e, 0x2000000000003, 0x8, 0xe, 0xffffffffffffa7e2, 0x2000000000000000, 0x1, 0x4b, 0x5, 0x9, 0x8, 0xffffffffffffff96, 0x7fffffff, 0xa1a4, 0xcf, 0x7fffffffffffffff, 0xffffffffffffff40, 0x6, 0x1a, 0x8000000000000000, 0x2c4, 0x9, 0xe, 0x3c, 0x9, 0x4, 0xfffffffffffffff8, 0x6, 0x3, 0x9, 0x3, 0x7fffffff, 0xc, 0x142, 0xe29, 0x2, 0x7, 0x7]}, 0x2, 0xef) ioctl$auto(0x3, 0xae41, r0) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_REMOVE(r3, 0xc0405519, &(0x7f0000000100)={@raw=0x200, 0x101, 0xa, 0xd, "89a0c92d84f9721930a1c0287258ee92b987c05514a351242d17b765311ba68beb3646150e2203ae51eae85b", @raw=0xffff}) ioctl$auto_KVM_GET_MSRS(r0, 0x4400ae8f, &(0x7f00000000c0)={0xdd}) ioctl$auto_KVM_CREATE_VM(r0, 0xae80, 0x0) 462.885752ms ago: executing program 3 (id=3788): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'veth0_to_team\x00'}) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x14be02, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) preadv2$auto(r0, &(0x7f0000000280)={0x0, 0x8000001f}, 0x6, 0x3, 0x4, 0x2e) ioctl$auto_BLKFLSBUF(r0, 0x1261, 0x0) openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, 0x0, 0x42, 0x0) mmap$auto(0x4, 0xa00006, 0x2, 0x100000000040eb1, 0x602, 0x300000000000) ioctl$auto_USBDEVFS_DISCSIGNAL(0xffffffffffffffff, 0x8010550e, &(0x7f0000000540)={0xfff, &(0x7f0000000180)="f2e37aa851f172bd24308737938225756749a2cd058f981d81224e731c1514b4fd0290f2fb02e666a68c1d72ad5615b16c73b5c0cedf17801dfece4a243f6e3a47ecc1c5db92b3500cefe0e7c269c25cd32701679442d287388dedeedd83d20b9d079d0a971a993bfa4a4499f8631caa1722a7a93bf39c2535ea752a9b05e21efeebdeaa71269153bdd6ba4fac9b230a6653e8cbaf66e11ea7c105"}) rseq$auto(&(0x7f0000000b80)={0x5, 0x8, 0x9416, 0x4, 0xe, 0x6, "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"}, 0x80000002, 0x8, 0xfd) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) open(&(0x7f0000000000)='./file0\x00', 0x161342, 0x112) rt_sigsuspend$auto(0x0, 0x8) close_range$auto(0x2, 0x8, 0x0) openat$auto_rfkill_fops_core(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x208840, 0x0) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x60980, 0x0) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto(0x3, 0xae41, r3) ioctl$auto_KVM_GET_MSRS(r1, 0x4008ae89, &(0x7f00000003c0)={0x2, 0x0, [{0x1c5, 0xe3, 0xe}]}) socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/event0\x00', 0x2000, 0x0) ioctl$auto_EVIOCGMASK(r4, 0x80104592, &(0x7f0000000000)={0x2000, 0x800004, 0x105}) ioctl$auto(0x3, 0x80004509, 0x10000000000402) ioctl$auto(0x3, 0x800005411, 0x38) mbind$auto(0x0, 0x800605, 0x1, &(0x7f0000000500)=0xffff, 0xa, 0x1) futex_wake$auto(0x0, 0x5, 0x4, 0xa) 394.153217ms ago: executing program 4 (id=3789): openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000140), 0x2002, 0x0) mprotect$auto(0x1ffffffff000, 0x100004, 0x6) (fail_nth: 1) 0s ago: executing program 1 (id=3790): socket(0x28, 0x5, 0x0) msgctl$auto_IPC_INFO(0x4, 0x3, &(0x7f0000000180)={{0x0, 0xee01, 0xee00, 0x2, 0x7f17, 0x9, 0x9c30}, &(0x7f0000000100)=0x6, &(0x7f0000000140)=0x3, 0x9, 0xffffffffffffffff, 0x2, 0x2, 0x7fffffff, 0x6, 0x8, 0x5, @inferred=0xffffffffffffffff, @raw=0x4}) r1 = getegid() setfsgid$auto(r1) msgctl$auto_MSG_INFO(0x8001, 0xc, &(0x7f0000000300)={{0x2, r0, r1, 0xffff8000, 0xc, 0x2, 0x9}, &(0x7f0000000280)=0x2, &(0x7f00000002c0)=0xa3, 0x42d, 0x6, 0x4177ad48, 0xffffffff, 0x2, 0xfffa, 0x7, 0xf49, @raw=0xffffffff, @raw=0x9}) openat$auto_proc_mem_operations_base(0xffffffffffffff9c, 0x0, 0x40, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x5, 0xfffffffffffffe01, 0x8011, 0x3, 0x8000) mmap$auto(0x0, 0x5, 0xfffffffffffffe01, 0x8011, 0x3, 0x8000) sendmsg$auto_ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, 0x0, 0x20000054) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) getrandom$auto(0x0, 0x6000000, 0x3) pipe$auto(&(0x7f0000000040)=r2) ioctl$auto_TUNGETVNETBE2(r3, 0x800454df, &(0x7f00000000c0)=0x2) mmap$auto(0x0, 0x810004, 0x2000000efb, 0x8000000008011, r2, 0x8000) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r4, 0x0, 0x20) r5 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r5, &(0x7f0000000200)={0x0, 0x7}, 0x4) r6 = openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/tracing/per_cpu/cpu1/trace_pipe_raw\x00', 0x0, 0x0) ioctl$auto_FIDEDUPERANGE(r6, 0xc0189436, 0x1000000000007ffd) openat$auto_snapshot_fops_user(0xffffffffffffff9c, &(0x7f0000000000), 0x8001, 0x0) ioctl$auto_BLKRRPART(r2, 0x125f, 0x0) madvise$auto(0x0, 0x400053, 0x9) kernel console output (not intermixed with test programs): xc3/0x1f0 [ 1361.394683][T25390] ksys_unshare+0x473/0xad0 [ 1361.394719][T25390] ? __pfx_ksys_unshare+0x10/0x10 [ 1361.394767][T25390] __x64_sys_unshare+0x31/0x40 [ 1361.394798][T25390] do_syscall_64+0x106/0xf80 [ 1361.394833][T25390] ? clear_bhb_loop+0x40/0x90 [ 1361.394867][T25390] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1361.394896][T25390] RIP: 0033:0x7f6e5619c799 [ 1361.394923][T25390] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1361.394951][T25390] RSP: 002b:00007f6e56fb0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1361.394976][T25390] RAX: ffffffffffffffda RBX: 00007f6e56415fa0 RCX: 00007f6e5619c799 [ 1361.394995][T25390] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1361.395012][T25390] RBP: 00007f6e56232c99 R08: 0000000000000000 R09: 0000000000000000 [ 1361.395029][T25390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1361.395045][T25390] R13: 00007f6e56416038 R14: 00007f6e56415fa0 R15: 00007ffe0582ffb8 [ 1361.395083][T25390] [ 1361.638373][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.644693][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 1361.953284][T25402] random: crng reseeded on system resumption [ 1361.972460][T25402] FAULT_INJECTION: forcing a failure. [ 1361.972460][T25402] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.996573][T25402] CPU: 0 UID: 0 PID: 25402 Comm: syz.4.3552 Tainted: G L syzkaller #0 PREEMPT(full) [ 1361.996616][T25402] Tainted: [L]=SOFTLOCKUP [ 1361.996627][T25402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1361.996642][T25402] Call Trace: [ 1361.996652][T25402] [ 1361.996662][T25402] dump_stack_lvl+0x100/0x190 [ 1361.996708][T25402] should_fail_ex.cold+0x5/0xa [ 1361.996749][T25402] should_failslab+0xc2/0x120 [ 1361.996779][T25402] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1361.996815][T25402] ? memory_bm_create+0x14d/0xba0 [ 1361.996861][T25402] memory_bm_create+0x14d/0xba0 [ 1361.996919][T25402] create_basic_memory_bitmaps+0x10b/0x350 [ 1361.996955][T25402] snapshot_open+0x230/0x2a0 [ 1361.996986][T25402] ? __pfx_snapshot_open+0x10/0x10 [ 1361.997019][T25402] misc_open+0x26d/0x450 [ 1361.997051][T25402] ? __pfx_misc_open+0x10/0x10 [ 1361.997081][T25402] chrdev_open+0x234/0x6a0 [ 1361.997109][T25402] ? __pfx_apparmor_file_open+0x10/0x10 [ 1361.997152][T25402] ? __pfx_chrdev_open+0x10/0x10 [ 1361.997184][T25402] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1361.997222][T25402] do_dentry_open+0x6d8/0x1660 [ 1361.997249][T25402] ? __pfx_chrdev_open+0x10/0x10 [ 1361.997287][T25402] vfs_open+0x82/0x3f0 [ 1361.997326][T25402] path_openat+0x208c/0x31a0 [ 1361.997371][T25402] ? __pfx_path_openat+0x10/0x10 [ 1361.997415][T25402] do_file_open+0x20e/0x430 [ 1361.997448][T25402] ? __pfx_do_file_open+0x10/0x10 [ 1361.997504][T25402] ? alloc_fd+0x476/0x790 [ 1361.997534][T25402] ? do_getname+0x191/0x390 [ 1361.997570][T25402] do_sys_openat2+0x10d/0x1e0 [ 1361.997606][T25402] ? __pfx_do_sys_openat2+0x10/0x10 [ 1361.997641][T25402] ? find_held_lock+0x2b/0x80 [ 1361.997673][T25402] __x64_sys_openat+0x12d/0x210 [ 1361.997708][T25402] ? __pfx___x64_sys_openat+0x10/0x10 [ 1361.997765][T25402] do_syscall_64+0x106/0xf80 [ 1361.997806][T25402] ? clear_bhb_loop+0x40/0x90 [ 1361.997840][T25402] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1361.997868][T25402] RIP: 0033:0x7f284f59c799 [ 1361.997889][T25402] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1361.997920][T25402] RSP: 002b:00007f285042d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1361.997947][T25402] RAX: ffffffffffffffda RBX: 00007f284f816090 RCX: 00007f284f59c799 [ 1361.997966][T25402] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1361.997984][T25402] RBP: 00007f284f632c99 R08: 0000000000000000 R09: 0000000000000000 [ 1361.998002][T25402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1361.998019][T25402] R13: 00007f284f816128 R14: 00007f284f816090 R15: 00007ffd4c1c7d18 [ 1361.998058][T25402] [ 1363.008981][T25425] netlink: 350 bytes leftover after parsing attributes in process `syz.2.3558'. [ 1364.581065][T25445] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 1364.615448][T25445] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 1364.646411][T25445] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 1364.666337][T25445] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 1365.073489][T25469] random: crng reseeded on system resumption [ 1365.085754][T25469] FAULT_INJECTION: forcing a failure. [ 1365.085754][T25469] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1365.142835][T25469] CPU: 1 UID: 0 PID: 25469 Comm: syz.3.3566 Tainted: G L syzkaller #0 PREEMPT(full) [ 1365.142863][T25469] Tainted: [L]=SOFTLOCKUP [ 1365.142869][T25469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1365.142878][T25469] Call Trace: [ 1365.142884][T25469] [ 1365.142891][T25469] dump_stack_lvl+0x100/0x190 [ 1365.142918][T25469] should_fail_ex.cold+0x5/0xa [ 1365.142933][T25469] ? prepare_alloc_pages+0x16d/0x5f0 [ 1365.142952][T25469] should_fail_alloc_page+0xeb/0x140 [ 1365.142969][T25469] prepare_alloc_pages+0x1f0/0x5f0 [ 1365.142990][T25469] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1365.143027][T25469] ? stack_trace_save+0x8e/0xc0 [ 1365.143043][T25469] ? __pfx_stack_trace_save+0x10/0x10 [ 1365.143057][T25469] ? arch_stack_walk+0xa6/0xf0 [ 1365.143072][T25469] ? stack_depot_save_flags+0x27/0x9d0 [ 1365.143091][T25469] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1365.143116][T25469] ? kasan_save_stack+0x3f/0x50 [ 1365.143137][T25469] ? kasan_save_stack+0x30/0x50 [ 1365.143157][T25469] ? kasan_save_track+0x14/0x30 [ 1365.143178][T25469] ? __kasan_kmalloc+0xaa/0xb0 [ 1365.143199][T25469] ? memory_bm_create+0x14d/0xba0 [ 1365.143220][T25469] ? create_basic_memory_bitmaps+0x10b/0x350 [ 1365.143235][T25469] ? snapshot_open+0x230/0x2a0 [ 1365.143249][T25469] ? misc_open+0x26d/0x450 [ 1365.143267][T25469] ? do_sys_openat2+0x10d/0x1e0 [ 1365.143284][T25469] ? __x64_sys_openat+0x12d/0x210 [ 1365.143301][T25469] ? do_syscall_64+0x106/0xf80 [ 1365.143321][T25469] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1365.143341][T25469] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1365.143366][T25469] ? policy_nodemask+0xed/0x4f0 [ 1365.143384][T25469] alloc_pages_mpol+0x1fb/0x550 [ 1365.143400][T25469] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1365.143421][T25469] alloc_pages_noprof+0x131/0x390 [ 1365.143437][T25469] get_zeroed_page_noprof+0x18/0xb0 [ 1365.143454][T25469] get_image_page+0x18/0x1a0 [ 1365.143476][T25469] memory_bm_create+0x9bd/0xba0 [ 1365.143506][T25469] create_basic_memory_bitmaps+0x10b/0x350 [ 1365.143529][T25469] snapshot_open+0x230/0x2a0 [ 1365.143545][T25469] ? __pfx_snapshot_open+0x10/0x10 [ 1365.143562][T25469] misc_open+0x26d/0x450 [ 1365.143578][T25469] ? __pfx_misc_open+0x10/0x10 [ 1365.143594][T25469] chrdev_open+0x234/0x6a0 [ 1365.143609][T25469] ? __pfx_apparmor_file_open+0x10/0x10 [ 1365.143632][T25469] ? __pfx_chrdev_open+0x10/0x10 [ 1365.143648][T25469] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1365.143668][T25469] do_dentry_open+0x6d8/0x1660 [ 1365.143683][T25469] ? __pfx_chrdev_open+0x10/0x10 [ 1365.143703][T25469] vfs_open+0x82/0x3f0 [ 1365.143724][T25469] path_openat+0x208c/0x31a0 [ 1365.143752][T25469] ? __pfx_path_openat+0x10/0x10 [ 1365.143795][T25469] do_file_open+0x20e/0x430 [ 1365.143823][T25469] ? __pfx_do_file_open+0x10/0x10 [ 1365.143854][T25469] ? alloc_fd+0x476/0x790 [ 1365.143871][T25469] ? do_getname+0x191/0x390 [ 1365.143890][T25469] do_sys_openat2+0x10d/0x1e0 [ 1365.143909][T25469] ? __pfx_do_sys_openat2+0x10/0x10 [ 1365.143930][T25469] ? __fget_files+0x21f/0x3d0 [ 1365.143947][T25469] __x64_sys_openat+0x12d/0x210 [ 1365.143967][T25469] ? __pfx___x64_sys_openat+0x10/0x10 [ 1365.143993][T25469] do_syscall_64+0x106/0xf80 [ 1365.144019][T25469] ? clear_bhb_loop+0x40/0x90 [ 1365.144038][T25469] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1365.144054][T25469] RIP: 0033:0x7fcdadf9c799 [ 1365.144068][T25469] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1365.144083][T25469] RSP: 002b:00007fcdac1d5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1365.144098][T25469] RAX: ffffffffffffffda RBX: 00007fcdae216090 RCX: 00007fcdadf9c799 [ 1365.144108][T25469] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1365.144118][T25469] RBP: 00007fcdae032c99 R08: 0000000000000000 R09: 0000000000000000 [ 1365.144128][T25469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1365.144137][T25469] R13: 00007fcdae216128 R14: 00007fcdae216090 R15: 00007ffe332441f8 [ 1365.144157][T25469] [ 1365.600448][T25466] random: crng reseeded on system resumption [ 1365.618530][T25466] FAULT_INJECTION: forcing a failure. [ 1365.618530][T25466] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1365.641023][T25466] CPU: 0 UID: 0 PID: 25466 Comm: syz.4.3567 Tainted: G L syzkaller #0 PREEMPT(full) [ 1365.641069][T25466] Tainted: [L]=SOFTLOCKUP [ 1365.641080][T25466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1365.641097][T25466] Call Trace: [ 1365.641108][T25466] [ 1365.641119][T25466] dump_stack_lvl+0x100/0x190 [ 1365.641167][T25466] should_fail_ex.cold+0x5/0xa [ 1365.641196][T25466] ? prepare_alloc_pages+0x16d/0x5f0 [ 1365.641233][T25466] should_fail_alloc_page+0xeb/0x140 [ 1365.641266][T25466] prepare_alloc_pages+0x1f0/0x5f0 [ 1365.641305][T25466] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1365.641351][T25466] ? __alloc_frozen_pages_noprof+0x2b1/0x2ba0 [ 1365.641405][T25466] ? stack_trace_save+0x8e/0xc0 [ 1365.641434][T25466] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1365.641482][T25466] ? stack_depot_save_flags+0x27/0x9d0 [ 1365.641506][T25466] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1365.641532][T25466] ? kasan_save_stack+0x3f/0x50 [ 1365.641554][T25466] ? kasan_save_stack+0x30/0x50 [ 1365.641575][T25466] ? kasan_save_track+0x14/0x30 [ 1365.641601][T25466] ? do_sys_openat2+0x10d/0x1e0 [ 1365.641619][T25466] ? __x64_sys_openat+0x12d/0x210 [ 1365.641636][T25466] ? do_syscall_64+0x106/0xf80 [ 1365.641656][T25466] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1365.641672][T25466] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1365.641698][T25466] ? policy_nodemask+0xed/0x4f0 [ 1365.641716][T25466] alloc_pages_mpol+0x1fb/0x550 [ 1365.641733][T25466] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1365.641750][T25466] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1365.641768][T25466] alloc_pages_noprof+0x131/0x390 [ 1365.641785][T25466] get_zeroed_page_noprof+0x18/0xb0 [ 1365.641801][T25466] get_image_page+0x18/0x1a0 [ 1365.641825][T25466] alloc_rtree_node+0x3c/0xb0 [ 1365.641847][T25466] memory_bm_create+0x65e/0xba0 [ 1365.641878][T25466] create_basic_memory_bitmaps+0xbd/0x350 [ 1365.641897][T25466] snapshot_open+0x230/0x2a0 [ 1365.641914][T25466] ? __pfx_snapshot_open+0x10/0x10 [ 1365.641931][T25466] misc_open+0x26d/0x450 [ 1365.641949][T25466] ? __pfx_misc_open+0x10/0x10 [ 1365.641965][T25466] chrdev_open+0x234/0x6a0 [ 1365.641982][T25466] ? __pfx_apparmor_file_open+0x10/0x10 [ 1365.642009][T25466] ? __pfx_chrdev_open+0x10/0x10 [ 1365.642026][T25466] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1365.642046][T25466] do_dentry_open+0x6d8/0x1660 [ 1365.642060][T25466] ? __pfx_chrdev_open+0x10/0x10 [ 1365.642081][T25466] vfs_open+0x82/0x3f0 [ 1365.642101][T25466] path_openat+0x208c/0x31a0 [ 1365.642123][T25466] ? __pfx_path_openat+0x10/0x10 [ 1365.642146][T25466] do_file_open+0x20e/0x430 [ 1365.642162][T25466] ? __pfx_do_file_open+0x10/0x10 [ 1365.642191][T25466] ? alloc_fd+0x476/0x790 [ 1365.642207][T25466] ? do_getname+0x191/0x390 [ 1365.642227][T25466] do_sys_openat2+0x10d/0x1e0 [ 1365.642245][T25466] ? __pfx_do_sys_openat2+0x10/0x10 [ 1365.642265][T25466] ? find_held_lock+0x2b/0x80 [ 1365.642284][T25466] __x64_sys_openat+0x12d/0x210 [ 1365.642304][T25466] ? __pfx___x64_sys_openat+0x10/0x10 [ 1365.642330][T25466] do_syscall_64+0x106/0xf80 [ 1365.642349][T25466] ? clear_bhb_loop+0x40/0x90 [ 1365.642367][T25466] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1365.642383][T25466] RIP: 0033:0x7f284f59c799 [ 1365.642397][T25466] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1365.642412][T25466] RSP: 002b:00007f285044e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1365.642427][T25466] RAX: ffffffffffffffda RBX: 00007f284f815fa0 RCX: 00007f284f59c799 [ 1365.642437][T25466] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1365.642448][T25466] RBP: 00007f284f632c99 R08: 0000000000000000 R09: 0000000000000000 [ 1365.642458][T25466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1365.642495][T25466] R13: 00007f284f816038 R14: 00007f284f815fa0 R15: 00007ffd4c1c7d18 [ 1365.642530][T25466] [ 1366.070058][T21286] Bluetooth: hci4: command 0x0406 tx timeout [ 1366.389829][T25478] netlink: 350 bytes leftover after parsing attributes in process `syz.2.3571'. [ 1366.640169][T21286] Bluetooth: hci1: command 0x0406 tx timeout [ 1366.710568][T21286] Bluetooth: hci3: command 0x0c1a tx timeout [ 1366.716598][T21286] Bluetooth: hci0: command 0x0406 tx timeout [ 1366.737869][T25488] random: crng reseeded on system resumption [ 1366.766425][T25488] FAULT_INJECTION: forcing a failure. [ 1366.766425][T25488] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1366.812188][T25490] kvm: vcpu 4: requested lapic timer restore with starting count register 0x390=4294967104 (137438947328 ns) > initial count (6624 ns). Using initial count to start timer. [ 1366.826049][T25488] CPU: 0 UID: 0 PID: 25488 Comm: syz.4.3573 Tainted: G L syzkaller #0 PREEMPT(full) [ 1366.826094][T25488] Tainted: [L]=SOFTLOCKUP [ 1366.826105][T25488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1366.826122][T25488] Call Trace: [ 1366.826131][T25488] [ 1366.826142][T25488] dump_stack_lvl+0x100/0x190 [ 1366.826188][T25488] should_fail_ex.cold+0x5/0xa [ 1366.826215][T25488] ? prepare_alloc_pages+0x16d/0x5f0 [ 1366.826251][T25488] should_fail_alloc_page+0xeb/0x140 [ 1366.826283][T25488] prepare_alloc_pages+0x1f0/0x5f0 [ 1366.826322][T25488] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1366.826368][T25488] ? __alloc_frozen_pages_noprof+0x2b1/0x2ba0 [ 1366.826421][T25488] ? stack_trace_save+0x8e/0xc0 [ 1366.826450][T25488] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1366.826491][T25488] ? stack_depot_save_flags+0x27/0x9d0 [ 1366.826525][T25488] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1366.826571][T25488] ? kasan_save_stack+0x3f/0x50 [ 1366.826611][T25488] ? kasan_save_stack+0x30/0x50 [ 1366.826650][T25488] ? kasan_save_track+0x14/0x30 [ 1366.826699][T25488] ? do_sys_openat2+0x10d/0x1e0 [ 1366.826731][T25488] ? __x64_sys_openat+0x12d/0x210 [ 1366.826764][T25488] ? do_syscall_64+0x106/0xf80 [ 1366.826801][T25488] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1366.826832][T25488] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1366.826878][T25488] ? policy_nodemask+0xed/0x4f0 [ 1366.826915][T25488] alloc_pages_mpol+0x1fb/0x550 [ 1366.826949][T25488] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1366.826981][T25488] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1366.827017][T25488] alloc_pages_noprof+0x131/0x390 [ 1366.827049][T25488] get_zeroed_page_noprof+0x18/0xb0 [ 1366.827080][T25488] get_image_page+0x18/0x1a0 [ 1366.827121][T25488] alloc_rtree_node+0x3c/0xb0 [ 1366.827164][T25488] memory_bm_create+0x65e/0xba0 [ 1366.827222][T25488] create_basic_memory_bitmaps+0x10b/0x350 [ 1366.827258][T25488] snapshot_open+0x230/0x2a0 [ 1366.827288][T25488] ? __pfx_snapshot_open+0x10/0x10 [ 1366.827319][T25488] misc_open+0x26d/0x450 [ 1366.827350][T25488] ? __pfx_misc_open+0x10/0x10 [ 1366.827380][T25488] chrdev_open+0x234/0x6a0 [ 1366.827407][T25488] ? __pfx_apparmor_file_open+0x10/0x10 [ 1366.827450][T25488] ? __pfx_chrdev_open+0x10/0x10 [ 1366.827481][T25488] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1366.827517][T25488] do_dentry_open+0x6d8/0x1660 [ 1366.827544][T25488] ? __pfx_chrdev_open+0x10/0x10 [ 1366.827581][T25488] vfs_open+0x82/0x3f0 [ 1366.827619][T25488] path_openat+0x208c/0x31a0 [ 1366.827661][T25488] ? __pfx_path_openat+0x10/0x10 [ 1366.827704][T25488] do_file_open+0x20e/0x430 [ 1366.827734][T25488] ? __pfx_do_file_open+0x10/0x10 [ 1366.827790][T25488] ? alloc_fd+0x476/0x790 [ 1366.827820][T25488] ? do_getname+0x191/0x390 [ 1366.827858][T25488] do_sys_openat2+0x10d/0x1e0 [ 1366.827893][T25488] ? __pfx_do_sys_openat2+0x10/0x10 [ 1366.827938][T25488] ? find_held_lock+0x2b/0x80 [ 1366.827975][T25488] __x64_sys_openat+0x12d/0x210 [ 1366.828012][T25488] ? __pfx___x64_sys_openat+0x10/0x10 [ 1366.828063][T25488] do_syscall_64+0x106/0xf80 [ 1366.828099][T25488] ? clear_bhb_loop+0x40/0x90 [ 1366.828132][T25488] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1366.828161][T25488] RIP: 0033:0x7f284f59c799 [ 1366.828185][T25488] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1366.828213][T25488] RSP: 002b:00007f285040c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1366.828241][T25488] RAX: ffffffffffffffda RBX: 00007f284f816180 RCX: 00007f284f59c799 [ 1366.828261][T25488] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1366.828281][T25488] RBP: 00007f284f632c99 R08: 0000000000000000 R09: 0000000000000000 [ 1366.828299][T25488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1366.828317][T25488] R13: 00007f284f816218 R14: 00007f284f816180 R15: 00007ffd4c1c7d18 [ 1366.828356][T25488] [ 1368.159679][T25512] FAULT_INJECTION: forcing a failure. [ 1368.159679][T25512] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1368.181095][T25512] CPU: 1 UID: 0 PID: 25512 Comm: syz.4.3578 Tainted: G L syzkaller #0 PREEMPT(full) [ 1368.181139][T25512] Tainted: [L]=SOFTLOCKUP [ 1368.181149][T25512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1368.181165][T25512] Call Trace: [ 1368.181176][T25512] [ 1368.181188][T25512] dump_stack_lvl+0x100/0x190 [ 1368.181236][T25512] should_fail_ex.cold+0x5/0xa [ 1368.181268][T25512] _copy_from_user+0x2e/0xd0 [ 1368.181298][T25512] memdup_user_nul+0x6c/0x120 [ 1368.181323][T25512] handle_policy_update+0x1a4/0xf00 [ 1368.181357][T25512] ? __pfx___might_resched+0x10/0x10 [ 1368.181401][T25512] ? lock_acquire+0x1cf/0x380 [ 1368.181435][T25512] ? __pfx_handle_policy_update+0x10/0x10 [ 1368.181469][T25512] ? apparmor_capable+0x1d7/0x4d0 [ 1368.181495][T25512] ? bpf_lsm_capable+0x9/0x10 [ 1368.181521][T25512] ? security_capable+0x80/0x260 [ 1368.181560][T25512] safesetid_gid_file_write+0x87/0xc0 [ 1368.181596][T25512] vfs_write+0x2aa/0x1070 [ 1368.181634][T25512] ? __pfx_safesetid_gid_file_write+0x10/0x10 [ 1368.181670][T25512] ? __pfx_vfs_write+0x10/0x10 [ 1368.181706][T25512] ? __fget_files+0x215/0x3d0 [ 1368.181736][T25512] ? __fget_files+0x21f/0x3d0 [ 1368.181768][T25512] ksys_write+0x12a/0x250 [ 1368.181790][T25512] ? __pfx_ksys_write+0x10/0x10 [ 1368.181822][T25512] do_syscall_64+0x106/0xf80 [ 1368.181854][T25512] ? clear_bhb_loop+0x40/0x90 [ 1368.181884][T25512] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1368.181910][T25512] RIP: 0033:0x7f284f59c799 [ 1368.181931][T25512] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1368.181955][T25512] RSP: 002b:00007f285044e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1368.181979][T25512] RAX: ffffffffffffffda RBX: 00007f284f815fa0 RCX: 00007f284f59c799 [ 1368.181995][T25512] RDX: 0000000000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 1368.182011][T25512] RBP: 00007f284f632c99 R08: 0000000000000000 R09: 0000000000000000 [ 1368.182026][T25512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1368.182042][T25512] R13: 00007f284f816038 R14: 00007f284f815fa0 R15: 00007ffd4c1c7d18 [ 1368.182077][T25512] [ 1369.762160][T25537] random: crng reseeded on system resumption [ 1369.770882][T25537] FAULT_INJECTION: forcing a failure. [ 1369.770882][T25537] name failslab, interval 1, probability 0, space 0, times 0 [ 1369.865206][T25537] CPU: 1 UID: 0 PID: 25537 Comm: syz.2.3584 Tainted: G L syzkaller #0 PREEMPT(full) [ 1369.865254][T25537] Tainted: [L]=SOFTLOCKUP [ 1369.865265][T25537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1369.865284][T25537] Call Trace: [ 1369.865294][T25537] [ 1369.865306][T25537] dump_stack_lvl+0x100/0x190 [ 1369.865353][T25537] should_fail_ex.cold+0x5/0xa [ 1369.865389][T25537] should_failslab+0xc2/0x120 [ 1369.865421][T25537] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1369.865458][T25537] ? create_basic_memory_bitmaps+0xeb/0x350 [ 1369.865498][T25537] create_basic_memory_bitmaps+0xeb/0x350 [ 1369.865534][T25537] snapshot_open+0x230/0x2a0 [ 1369.865566][T25537] ? __pfx_snapshot_open+0x10/0x10 [ 1369.865600][T25537] misc_open+0x26d/0x450 [ 1369.865633][T25537] ? __pfx_misc_open+0x10/0x10 [ 1369.865664][T25537] chrdev_open+0x234/0x6a0 [ 1369.865692][T25537] ? __pfx_apparmor_file_open+0x10/0x10 [ 1369.865733][T25537] ? __pfx_chrdev_open+0x10/0x10 [ 1369.865763][T25537] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1369.865800][T25537] do_dentry_open+0x6d8/0x1660 [ 1369.865828][T25537] ? __pfx_chrdev_open+0x10/0x10 [ 1369.865865][T25537] vfs_open+0x82/0x3f0 [ 1369.865903][T25537] path_openat+0x208c/0x31a0 [ 1369.865943][T25537] ? __pfx_path_openat+0x10/0x10 [ 1369.865986][T25537] do_file_open+0x20e/0x430 [ 1369.866018][T25537] ? __pfx_do_file_open+0x10/0x10 [ 1369.866074][T25537] ? alloc_fd+0x476/0x790 [ 1369.866106][T25537] ? do_getname+0x191/0x390 [ 1369.866145][T25537] do_sys_openat2+0x10d/0x1e0 [ 1369.866206][T25537] ? __pfx_do_sys_openat2+0x10/0x10 [ 1369.866245][T25537] ? find_held_lock+0x2b/0x80 [ 1369.866281][T25537] __x64_sys_openat+0x12d/0x210 [ 1369.866319][T25537] ? __pfx___x64_sys_openat+0x10/0x10 [ 1369.866369][T25537] do_syscall_64+0x106/0xf80 [ 1369.866406][T25537] ? clear_bhb_loop+0x40/0x90 [ 1369.866442][T25537] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1369.866471][T25537] RIP: 0033:0x7f2c4239c799 [ 1369.866495][T25537] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1369.866522][T25537] RSP: 002b:00007f2c405d5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1369.866549][T25537] RAX: ffffffffffffffda RBX: 00007f2c42616090 RCX: 00007f2c4239c799 [ 1369.866569][T25537] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1369.866588][T25537] RBP: 00007f2c42432c99 R08: 0000000000000000 R09: 0000000000000000 [ 1369.866606][T25537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1369.866623][T25537] R13: 00007f2c42616128 R14: 00007f2c42616090 R15: 00007ffe34a62878 [ 1369.866663][T25537] [ 1370.289347][T25545] netlink: 350 bytes leftover after parsing attributes in process `syz.1.3588'. [ 1370.681439][T25557] random: crng reseeded on system resumption [ 1370.719142][T25557] FAULT_INJECTION: forcing a failure. [ 1370.719142][T25557] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1370.783392][T25557] CPU: 1 UID: 0 PID: 25557 Comm: syz.2.3589 Tainted: G L syzkaller #0 PREEMPT(full) [ 1370.783438][T25557] Tainted: [L]=SOFTLOCKUP [ 1370.783449][T25557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1370.783466][T25557] Call Trace: [ 1370.783475][T25557] [ 1370.783486][T25557] dump_stack_lvl+0x100/0x190 [ 1370.783533][T25557] should_fail_ex.cold+0x5/0xa [ 1370.783560][T25557] ? prepare_alloc_pages+0x16d/0x5f0 [ 1370.783596][T25557] should_fail_alloc_page+0xeb/0x140 [ 1370.783628][T25557] prepare_alloc_pages+0x1f0/0x5f0 [ 1370.783666][T25557] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1370.783728][T25557] ? stack_trace_save+0x8e/0xc0 [ 1370.783757][T25557] ? __pfx_stack_trace_save+0x10/0x10 [ 1370.783784][T25557] ? arch_stack_walk+0xa6/0xf0 [ 1370.783813][T25557] ? stack_depot_save_flags+0x27/0x9d0 [ 1370.783850][T25557] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1370.783898][T25557] ? kasan_save_stack+0x3f/0x50 [ 1370.783940][T25557] ? kasan_save_stack+0x30/0x50 [ 1370.783981][T25557] ? kasan_save_track+0x14/0x30 [ 1370.784020][T25557] ? __kasan_kmalloc+0xaa/0xb0 [ 1370.784059][T25557] ? memory_bm_create+0x14d/0xba0 [ 1370.784100][T25557] ? create_basic_memory_bitmaps+0x10b/0x350 [ 1370.784137][T25557] ? snapshot_open+0x230/0x2a0 [ 1370.784168][T25557] ? misc_open+0x26d/0x450 [ 1370.784203][T25557] ? do_sys_openat2+0x10d/0x1e0 [ 1370.784237][T25557] ? __x64_sys_openat+0x12d/0x210 [ 1370.784272][T25557] ? do_syscall_64+0x106/0xf80 [ 1370.784309][T25557] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1370.784348][T25557] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1370.784397][T25557] ? policy_nodemask+0xed/0x4f0 [ 1370.784431][T25557] alloc_pages_mpol+0x1fb/0x550 [ 1370.784464][T25557] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1370.784505][T25557] alloc_pages_noprof+0x131/0x390 [ 1370.784538][T25557] get_zeroed_page_noprof+0x18/0xb0 [ 1370.784570][T25557] get_image_page+0x18/0x1a0 [ 1370.784613][T25557] memory_bm_create+0x9bd/0xba0 [ 1370.784674][T25557] create_basic_memory_bitmaps+0x10b/0x350 [ 1370.784711][T25557] snapshot_open+0x230/0x2a0 [ 1370.784743][T25557] ? __pfx_snapshot_open+0x10/0x10 [ 1370.784776][T25557] misc_open+0x26d/0x450 [ 1370.784807][T25557] ? __pfx_misc_open+0x10/0x10 [ 1370.784838][T25557] chrdev_open+0x234/0x6a0 [ 1370.784867][T25557] ? __pfx_apparmor_file_open+0x10/0x10 [ 1370.784912][T25557] ? __pfx_chrdev_open+0x10/0x10 [ 1370.784944][T25557] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1370.784983][T25557] do_dentry_open+0x6d8/0x1660 [ 1370.785017][T25557] ? __pfx_chrdev_open+0x10/0x10 [ 1370.785057][T25557] vfs_open+0x82/0x3f0 [ 1370.785101][T25557] path_openat+0x208c/0x31a0 [ 1370.785152][T25557] ? __pfx_path_openat+0x10/0x10 [ 1370.785197][T25557] do_file_open+0x20e/0x430 [ 1370.785231][T25557] ? __pfx_do_file_open+0x10/0x10 [ 1370.785291][T25557] ? alloc_fd+0x476/0x790 [ 1370.785324][T25557] ? do_getname+0x191/0x390 [ 1370.785363][T25557] do_sys_openat2+0x10d/0x1e0 [ 1370.785400][T25557] ? __pfx_do_sys_openat2+0x10/0x10 [ 1370.785439][T25557] ? __fget_files+0x21f/0x3d0 [ 1370.785475][T25557] __x64_sys_openat+0x12d/0x210 [ 1370.785513][T25557] ? __pfx___x64_sys_openat+0x10/0x10 [ 1370.785566][T25557] do_syscall_64+0x106/0xf80 [ 1370.785601][T25557] ? clear_bhb_loop+0x40/0x90 [ 1370.785635][T25557] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1370.785665][T25557] RIP: 0033:0x7f2c4239c799 [ 1370.785688][T25557] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1370.785714][T25557] RSP: 002b:00007f2c405b4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1370.785740][T25557] RAX: ffffffffffffffda RBX: 00007f2c42616180 RCX: 00007f2c4239c799 [ 1370.785758][T25557] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1370.785776][T25557] RBP: 00007f2c42432c99 R08: 0000000000000000 R09: 0000000000000000 [ 1370.785793][T25557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1370.785809][T25557] R13: 00007f2c42616218 R14: 00007f2c42616180 R15: 00007ffe34a62878 [ 1370.785846][T25557] [ 1372.031760][T25574] kvm: vcpu 4: requested lapic timer restore with starting count register 0x390=4294967104 (137438947328 ns) > initial count (6624 ns). Using initial count to start timer. [ 1372.481373][T25587] random: crng reseeded on system resumption [ 1373.313287][T25609] random: crng reseeded on system resumption [ 1373.375755][T25609] FAULT_INJECTION: forcing a failure. [ 1373.375755][T25609] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1373.596493][T25609] CPU: 0 UID: 0 PID: 25609 Comm: syz.3.3604 Tainted: G L syzkaller #0 PREEMPT(full) [ 1373.596522][T25609] Tainted: [L]=SOFTLOCKUP [ 1373.596528][T25609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1373.596538][T25609] Call Trace: [ 1373.596544][T25609] [ 1373.596551][T25609] dump_stack_lvl+0x100/0x190 [ 1373.596578][T25609] should_fail_ex.cold+0x5/0xa [ 1373.596594][T25609] ? prepare_alloc_pages+0x16d/0x5f0 [ 1373.596613][T25609] should_fail_alloc_page+0xeb/0x140 [ 1373.596631][T25609] prepare_alloc_pages+0x1f0/0x5f0 [ 1373.596652][T25609] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1373.596681][T25609] ? stack_trace_save+0x8e/0xc0 [ 1373.596696][T25609] ? __pfx_stack_trace_save+0x10/0x10 [ 1373.596710][T25609] ? arch_stack_walk+0xa6/0xf0 [ 1373.596724][T25609] ? stack_depot_save_flags+0x27/0x9d0 [ 1373.596744][T25609] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1373.596768][T25609] ? kasan_save_stack+0x3f/0x50 [ 1373.596790][T25609] ? kasan_save_stack+0x30/0x50 [ 1373.596811][T25609] ? kasan_save_track+0x14/0x30 [ 1373.596832][T25609] ? __kasan_kmalloc+0xaa/0xb0 [ 1373.596852][T25609] ? memory_bm_create+0x14d/0xba0 [ 1373.596873][T25609] ? create_basic_memory_bitmaps+0x10b/0x350 [ 1373.596888][T25609] ? snapshot_open+0x230/0x2a0 [ 1373.596903][T25609] ? misc_open+0x26d/0x450 [ 1373.596924][T25609] ? do_sys_openat2+0x10d/0x1e0 [ 1373.596941][T25609] ? __x64_sys_openat+0x12d/0x210 [ 1373.596959][T25609] ? do_syscall_64+0x106/0xf80 [ 1373.596980][T25609] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1373.596999][T25609] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1373.597023][T25609] ? policy_nodemask+0xed/0x4f0 [ 1373.597041][T25609] alloc_pages_mpol+0x1fb/0x550 [ 1373.597058][T25609] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1373.597079][T25609] alloc_pages_noprof+0x131/0x390 [ 1373.597096][T25609] get_zeroed_page_noprof+0x18/0xb0 [ 1373.597112][T25609] get_image_page+0x18/0x1a0 [ 1373.597134][T25609] memory_bm_create+0x9bd/0xba0 [ 1373.597166][T25609] create_basic_memory_bitmaps+0x10b/0x350 [ 1373.597185][T25609] snapshot_open+0x230/0x2a0 [ 1373.597201][T25609] ? __pfx_snapshot_open+0x10/0x10 [ 1373.597218][T25609] misc_open+0x26d/0x450 [ 1373.597235][T25609] ? __pfx_misc_open+0x10/0x10 [ 1373.597250][T25609] chrdev_open+0x234/0x6a0 [ 1373.597265][T25609] ? __pfx_apparmor_file_open+0x10/0x10 [ 1373.597288][T25609] ? __pfx_chrdev_open+0x10/0x10 [ 1373.597304][T25609] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1373.597324][T25609] do_dentry_open+0x6d8/0x1660 [ 1373.597338][T25609] ? __pfx_chrdev_open+0x10/0x10 [ 1373.597358][T25609] vfs_open+0x82/0x3f0 [ 1373.597379][T25609] path_openat+0x208c/0x31a0 [ 1373.597401][T25609] ? __pfx_path_openat+0x10/0x10 [ 1373.597432][T25609] do_file_open+0x20e/0x430 [ 1373.597450][T25609] ? __pfx_do_file_open+0x10/0x10 [ 1373.597480][T25609] ? alloc_fd+0x476/0x790 [ 1373.597498][T25609] ? do_getname+0x191/0x390 [ 1373.597518][T25609] do_sys_openat2+0x10d/0x1e0 [ 1373.597538][T25609] ? __pfx_do_sys_openat2+0x10/0x10 [ 1373.597559][T25609] ? __fget_files+0x21f/0x3d0 [ 1373.597577][T25609] __x64_sys_openat+0x12d/0x210 [ 1373.597596][T25609] ? __pfx___x64_sys_openat+0x10/0x10 [ 1373.597623][T25609] do_syscall_64+0x106/0xf80 [ 1373.597642][T25609] ? clear_bhb_loop+0x40/0x90 [ 1373.597661][T25609] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1373.597676][T25609] RIP: 0033:0x7fcdadf9c799 [ 1373.597690][T25609] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1373.597705][T25609] RSP: 002b:00007fcdac1b4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1373.597724][T25609] RAX: ffffffffffffffda RBX: 00007fcdae216180 RCX: 00007fcdadf9c799 [ 1373.597735][T25609] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1373.597745][T25609] RBP: 00007fcdae032c99 R08: 0000000000000000 R09: 0000000000000000 [ 1373.597754][T25609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1373.597763][T25609] R13: 00007fcdae216218 R14: 00007fcdae216180 R15: 00007ffe332441f8 [ 1373.597783][T25609] [ 1374.457918][T25627] FAULT_INJECTION: forcing a failure. [ 1374.457918][T25627] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.499796][T25621] random: crng reseeded on system resumption [ 1374.515737][T25625] kvm: vcpu 4: requested lapic timer restore with starting count register 0x390=4294967104 (137438947328 ns) > initial count (6624 ns). Using initial count to start timer. [ 1374.539766][T25627] CPU: 1 UID: 0 PID: 25627 Comm: syz.4.3611 Tainted: G L syzkaller #0 PREEMPT(full) [ 1374.539810][T25627] Tainted: [L]=SOFTLOCKUP [ 1374.539822][T25627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1374.539839][T25627] Call Trace: [ 1374.539849][T25627] [ 1374.539859][T25627] dump_stack_lvl+0x100/0x190 [ 1374.539908][T25627] should_fail_ex.cold+0x5/0xa [ 1374.539943][T25627] should_failslab+0xc2/0x120 [ 1374.539971][T25627] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1374.540009][T25627] ? rxrpc_lookup_local+0x3f7/0x1220 [ 1374.540047][T25627] rxrpc_lookup_local+0x3f7/0x1220 [ 1374.540085][T25627] ? __pfx_rxrpc_lookup_local+0x10/0x10 [ 1374.540119][T25627] ? __local_bh_enable_ip+0x9e/0x120 [ 1374.540154][T25627] rxrpc_sendmsg+0x34a/0x680 [ 1374.540194][T25627] sock_write_iter+0x524/0x5a0 [ 1374.540223][T25627] ? __pfx_rxrpc_sendmsg+0x10/0x10 [ 1374.540256][T25627] ? __pfx_sock_write_iter+0x10/0x10 [ 1374.540300][T25627] ? bpf_lsm_file_permission+0x9/0x10 [ 1374.540343][T25627] ? security_file_permission+0x76/0x210 [ 1374.540391][T25627] ? rw_verify_area+0xce/0x6d0 [ 1374.540435][T25627] vfs_write+0x6ac/0x1070 [ 1374.540480][T25627] ? __pfx_sock_write_iter+0x10/0x10 [ 1374.540513][T25627] ? __pfx_vfs_write+0x10/0x10 [ 1374.540553][T25627] ? find_held_lock+0x2b/0x80 [ 1374.540605][T25627] ksys_write+0x1f8/0x250 [ 1374.540631][T25627] ? __pfx_ksys_write+0x10/0x10 [ 1374.540669][T25627] do_syscall_64+0x106/0xf80 [ 1374.540707][T25627] ? clear_bhb_loop+0x40/0x90 [ 1374.540743][T25627] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1374.540773][T25627] RIP: 0033:0x7f284f59c799 [ 1374.540797][T25627] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1374.540825][T25627] RSP: 002b:00007f285044e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1374.540852][T25627] RAX: ffffffffffffffda RBX: 00007f284f815fa0 RCX: 00007f284f59c799 [ 1374.540872][T25627] RDX: 0000000000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 1374.540888][T25627] RBP: 00007f284f632c99 R08: 0000000000000000 R09: 0000000000000000 [ 1374.540906][T25627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1374.540924][T25627] R13: 00007f284f816038 R14: 00007f284f815fa0 R15: 00007ffd4c1c7d18 [ 1374.540964][T25627] [ 1374.778079][T25621] FAULT_INJECTION: forcing a failure. [ 1374.778079][T25621] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1374.814147][T25621] CPU: 0 UID: 0 PID: 25621 Comm: syz.1.3608 Tainted: G L syzkaller #0 PREEMPT(full) [ 1374.814196][T25621] Tainted: [L]=SOFTLOCKUP [ 1374.814207][T25621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1374.814225][T25621] Call Trace: [ 1374.814236][T25621] [ 1374.814247][T25621] dump_stack_lvl+0x100/0x190 [ 1374.814296][T25621] should_fail_ex.cold+0x5/0xa [ 1374.814325][T25621] ? prepare_alloc_pages+0x16d/0x5f0 [ 1374.814364][T25621] should_fail_alloc_page+0xeb/0x140 [ 1374.814397][T25621] prepare_alloc_pages+0x1f0/0x5f0 [ 1374.814437][T25621] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1374.814496][T25621] ? stack_trace_save+0x8e/0xc0 [ 1374.814526][T25621] ? __pfx_stack_trace_save+0x10/0x10 [ 1374.814553][T25621] ? arch_stack_walk+0xa6/0xf0 [ 1374.814582][T25621] ? stack_depot_save_flags+0x27/0x9d0 [ 1374.814618][T25621] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1374.814667][T25621] ? kasan_save_stack+0x3f/0x50 [ 1374.814709][T25621] ? kasan_save_stack+0x30/0x50 [ 1374.814750][T25621] ? kasan_save_track+0x14/0x30 [ 1374.814791][T25621] ? __kasan_kmalloc+0xaa/0xb0 [ 1374.814841][T25621] ? memory_bm_create+0x14d/0xba0 [ 1374.814884][T25621] ? create_basic_memory_bitmaps+0x10b/0x350 [ 1374.814914][T25621] ? snapshot_open+0x230/0x2a0 [ 1374.814945][T25621] ? misc_open+0x26d/0x450 [ 1374.814980][T25621] ? do_sys_openat2+0x10d/0x1e0 [ 1374.815011][T25621] ? __x64_sys_openat+0x12d/0x210 [ 1374.815046][T25621] ? do_syscall_64+0x106/0xf80 [ 1374.815084][T25621] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1374.815121][T25621] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1374.815169][T25621] ? policy_nodemask+0xed/0x4f0 [ 1374.815201][T25621] alloc_pages_mpol+0x1fb/0x550 [ 1374.815233][T25621] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1374.815274][T25621] alloc_pages_noprof+0x131/0x390 [ 1374.815305][T25621] get_zeroed_page_noprof+0x18/0xb0 [ 1374.815336][T25621] get_image_page+0x18/0x1a0 [ 1374.815379][T25621] memory_bm_create+0x9bd/0xba0 [ 1374.815439][T25621] create_basic_memory_bitmaps+0x10b/0x350 [ 1374.815475][T25621] snapshot_open+0x230/0x2a0 [ 1374.815506][T25621] ? __pfx_snapshot_open+0x10/0x10 [ 1374.815539][T25621] misc_open+0x26d/0x450 [ 1374.815571][T25621] ? __pfx_misc_open+0x10/0x10 [ 1374.815602][T25621] chrdev_open+0x234/0x6a0 [ 1374.815630][T25621] ? __pfx_apparmor_file_open+0x10/0x10 [ 1374.815677][T25621] ? __pfx_chrdev_open+0x10/0x10 [ 1374.815710][T25621] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1374.815750][T25621] do_dentry_open+0x6d8/0x1660 [ 1374.815778][T25621] ? __pfx_chrdev_open+0x10/0x10 [ 1374.815817][T25621] vfs_open+0x82/0x3f0 [ 1374.815868][T25621] path_openat+0x208c/0x31a0 [ 1374.815913][T25621] ? __pfx_path_openat+0x10/0x10 [ 1374.815959][T25621] do_file_open+0x20e/0x430 [ 1374.815993][T25621] ? __pfx_do_file_open+0x10/0x10 [ 1374.816053][T25621] ? alloc_fd+0x476/0x790 [ 1374.816085][T25621] ? do_getname+0x191/0x390 [ 1374.816124][T25621] do_sys_openat2+0x10d/0x1e0 [ 1374.816160][T25621] ? __pfx_do_sys_openat2+0x10/0x10 [ 1374.816199][T25621] ? __fget_files+0x21f/0x3d0 [ 1374.816235][T25621] __x64_sys_openat+0x12d/0x210 [ 1374.816275][T25621] ? __pfx___x64_sys_openat+0x10/0x10 [ 1374.816328][T25621] do_syscall_64+0x106/0xf80 [ 1374.816366][T25621] ? clear_bhb_loop+0x40/0x90 [ 1374.816400][T25621] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1374.816430][T25621] RIP: 0033:0x7f6e5619c799 [ 1374.816455][T25621] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1374.816484][T25621] RSP: 002b:00007f6e56f8f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1374.816511][T25621] RAX: ffffffffffffffda RBX: 00007f6e56416090 RCX: 00007f6e5619c799 [ 1374.816532][T25621] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1374.816552][T25621] RBP: 00007f6e56232c99 R08: 0000000000000000 R09: 0000000000000000 [ 1374.816570][T25621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1374.816589][T25621] R13: 00007f6e56416128 R14: 00007f6e56416090 R15: 00007ffe0582ffb8 [ 1374.816630][T25621] [ 1375.310601][T25628] random: crng reseeded on system resumption [ 1375.698604][T25644] random: crng reseeded on system resumption [ 1375.955597][T25642] random: crng reseeded on system resumption [ 1375.981757][T25642] FAULT_INJECTION: forcing a failure. [ 1375.981757][T25642] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1376.024907][T25642] CPU: 0 UID: 0 PID: 25642 Comm: syz.1.3613 Tainted: G L syzkaller #0 PREEMPT(full) [ 1376.024955][T25642] Tainted: [L]=SOFTLOCKUP [ 1376.024965][T25642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1376.024982][T25642] Call Trace: [ 1376.024993][T25642] [ 1376.025005][T25642] dump_stack_lvl+0x100/0x190 [ 1376.025054][T25642] should_fail_ex.cold+0x5/0xa [ 1376.025084][T25642] ? prepare_alloc_pages+0x16d/0x5f0 [ 1376.025120][T25642] should_fail_alloc_page+0xeb/0x140 [ 1376.025154][T25642] prepare_alloc_pages+0x1f0/0x5f0 [ 1376.025194][T25642] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1376.025239][T25642] ? __alloc_frozen_pages_noprof+0x2b1/0x2ba0 [ 1376.025294][T25642] ? stack_trace_save+0x8e/0xc0 [ 1376.025324][T25642] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1376.025366][T25642] ? stack_depot_save_flags+0x27/0x9d0 [ 1376.025402][T25642] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1376.025451][T25642] ? kasan_save_stack+0x3f/0x50 [ 1376.025491][T25642] ? kasan_save_stack+0x30/0x50 [ 1376.025532][T25642] ? kasan_save_track+0x14/0x30 [ 1376.025582][T25642] ? do_sys_openat2+0x10d/0x1e0 [ 1376.025616][T25642] ? __x64_sys_openat+0x12d/0x210 [ 1376.025650][T25642] ? do_syscall_64+0x106/0xf80 [ 1376.025689][T25642] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1376.025721][T25642] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1376.025779][T25642] ? policy_nodemask+0xed/0x4f0 [ 1376.025813][T25642] alloc_pages_mpol+0x1fb/0x550 [ 1376.025846][T25642] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1376.025879][T25642] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1376.025917][T25642] alloc_pages_noprof+0x131/0x390 [ 1376.025950][T25642] get_zeroed_page_noprof+0x18/0xb0 [ 1376.025982][T25642] get_image_page+0x18/0x1a0 [ 1376.026026][T25642] alloc_rtree_node+0x3c/0xb0 [ 1376.026073][T25642] memory_bm_create+0x65e/0xba0 [ 1376.026135][T25642] create_basic_memory_bitmaps+0xbd/0x350 [ 1376.026179][T25642] snapshot_open+0x230/0x2a0 [ 1376.026211][T25642] ? __pfx_snapshot_open+0x10/0x10 [ 1376.026243][T25642] misc_open+0x26d/0x450 [ 1376.026276][T25642] ? __pfx_misc_open+0x10/0x10 [ 1376.026306][T25642] chrdev_open+0x234/0x6a0 [ 1376.026334][T25642] ? __pfx_apparmor_file_open+0x10/0x10 [ 1376.026379][T25642] ? __pfx_chrdev_open+0x10/0x10 [ 1376.026410][T25642] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1376.026449][T25642] do_dentry_open+0x6d8/0x1660 [ 1376.026476][T25642] ? __pfx_chrdev_open+0x10/0x10 [ 1376.026515][T25642] vfs_open+0x82/0x3f0 [ 1376.026555][T25642] path_openat+0x208c/0x31a0 [ 1376.026598][T25642] ? __pfx_path_openat+0x10/0x10 [ 1376.026641][T25642] do_file_open+0x20e/0x430 [ 1376.026672][T25642] ? __pfx_do_file_open+0x10/0x10 [ 1376.026728][T25642] ? alloc_fd+0x476/0x790 [ 1376.026768][T25642] ? do_getname+0x191/0x390 [ 1376.026809][T25642] do_sys_openat2+0x10d/0x1e0 [ 1376.026847][T25642] ? __pfx_do_sys_openat2+0x10/0x10 [ 1376.026887][T25642] ? find_held_lock+0x2b/0x80 [ 1376.026925][T25642] __x64_sys_openat+0x12d/0x210 [ 1376.026964][T25642] ? __pfx___x64_sys_openat+0x10/0x10 [ 1376.027016][T25642] do_syscall_64+0x106/0xf80 [ 1376.027054][T25642] ? clear_bhb_loop+0x40/0x90 [ 1376.027089][T25642] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1376.027119][T25642] RIP: 0033:0x7f6e5619c799 [ 1376.027144][T25642] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1376.027172][T25642] RSP: 002b:00007f6e56fb0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1376.027201][T25642] RAX: ffffffffffffffda RBX: 00007f6e56415fa0 RCX: 00007f6e5619c799 [ 1376.027221][T25642] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1376.027240][T25642] RBP: 00007f6e56232c99 R08: 0000000000000000 R09: 0000000000000000 [ 1376.027259][T25642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1376.027276][T25642] R13: 00007f6e56416038 R14: 00007f6e56415fa0 R15: 00007ffe0582ffb8 [ 1376.027318][T25642] [ 1376.029017][T25652] random: crng reseeded on system resumption [ 1376.846819][T25666] random: crng reseeded on system resumption [ 1376.910102][T25666] FAULT_INJECTION: forcing a failure. [ 1376.910102][T25666] name failslab, interval 1, probability 0, space 0, times 0 [ 1376.923250][T25666] CPU: 1 UID: 0 PID: 25666 Comm: syz.1.3623 Tainted: G L syzkaller #0 PREEMPT(full) [ 1376.923294][T25666] Tainted: [L]=SOFTLOCKUP [ 1376.923305][T25666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1376.923323][T25666] Call Trace: [ 1376.923332][T25666] [ 1376.923343][T25666] dump_stack_lvl+0x100/0x190 [ 1376.923390][T25666] should_fail_ex.cold+0x5/0xa [ 1376.923424][T25666] should_failslab+0xc2/0x120 [ 1376.923455][T25666] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1376.923491][T25666] ? memory_bm_create+0x14d/0xba0 [ 1376.923539][T25666] memory_bm_create+0x14d/0xba0 [ 1376.923600][T25666] create_basic_memory_bitmaps+0x10b/0x350 [ 1376.923636][T25666] snapshot_open+0x230/0x2a0 [ 1376.923668][T25666] ? __pfx_snapshot_open+0x10/0x10 [ 1376.923700][T25666] misc_open+0x26d/0x450 [ 1376.923731][T25666] ? __pfx_misc_open+0x10/0x10 [ 1376.923762][T25666] chrdev_open+0x234/0x6a0 [ 1376.923791][T25666] ? __pfx_apparmor_file_open+0x10/0x10 [ 1376.923838][T25666] ? __pfx_chrdev_open+0x10/0x10 [ 1376.923868][T25666] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1376.923903][T25666] do_dentry_open+0x6d8/0x1660 [ 1376.923930][T25666] ? __pfx_chrdev_open+0x10/0x10 [ 1376.923967][T25666] vfs_open+0x82/0x3f0 [ 1376.924005][T25666] path_openat+0x208c/0x31a0 [ 1376.924047][T25666] ? __pfx_path_openat+0x10/0x10 [ 1376.924092][T25666] do_file_open+0x20e/0x430 [ 1376.924123][T25666] ? __pfx_do_file_open+0x10/0x10 [ 1376.924180][T25666] ? alloc_fd+0x476/0x790 [ 1376.924220][T25666] ? do_getname+0x191/0x390 [ 1376.924259][T25666] do_sys_openat2+0x10d/0x1e0 [ 1376.924296][T25666] ? __pfx_do_sys_openat2+0x10/0x10 [ 1376.924334][T25666] ? find_held_lock+0x2b/0x80 [ 1376.924370][T25666] __x64_sys_openat+0x12d/0x210 [ 1376.924407][T25666] ? __pfx___x64_sys_openat+0x10/0x10 [ 1376.924459][T25666] do_syscall_64+0x106/0xf80 [ 1376.924494][T25666] ? clear_bhb_loop+0x40/0x90 [ 1376.924528][T25666] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1376.924556][T25666] RIP: 0033:0x7f6e5619c799 [ 1376.924580][T25666] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1376.924608][T25666] RSP: 002b:00007f6e56fb0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1376.924636][T25666] RAX: ffffffffffffffda RBX: 00007f6e56415fa0 RCX: 00007f6e5619c799 [ 1376.924655][T25666] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1376.924673][T25666] RBP: 00007f6e56232c99 R08: 0000000000000000 R09: 0000000000000000 [ 1376.924691][T25666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1376.924707][T25666] R13: 00007f6e56416038 R14: 00007f6e56415fa0 R15: 00007ffe0582ffb8 [ 1376.924748][T25666] [ 1377.334858][T25673] netlink: 350 bytes leftover after parsing attributes in process `syz.3.3626'. [ 1377.517524][T25672] random: crng reseeded on system resumption [ 1377.559147][T25672] FAULT_INJECTION: forcing a failure. [ 1377.559147][T25672] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1377.572510][T25672] CPU: 1 UID: 0 PID: 25672 Comm: syz.2.3625 Tainted: G L syzkaller #0 PREEMPT(full) [ 1377.572553][T25672] Tainted: [L]=SOFTLOCKUP [ 1377.572563][T25672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1377.572581][T25672] Call Trace: [ 1377.572590][T25672] [ 1377.572601][T25672] dump_stack_lvl+0x100/0x190 [ 1377.572648][T25672] should_fail_ex.cold+0x5/0xa [ 1377.572677][T25672] ? prepare_alloc_pages+0x16d/0x5f0 [ 1377.572713][T25672] should_fail_alloc_page+0xeb/0x140 [ 1377.572747][T25672] prepare_alloc_pages+0x1f0/0x5f0 [ 1377.572784][T25672] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1377.572830][T25672] ? __alloc_frozen_pages_noprof+0x2b1/0x2ba0 [ 1377.572885][T25672] ? stack_trace_save+0x8e/0xc0 [ 1377.572914][T25672] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1377.572956][T25672] ? stack_depot_save_flags+0x27/0x9d0 [ 1377.572990][T25672] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1377.573037][T25672] ? kasan_save_stack+0x3f/0x50 [ 1377.573075][T25672] ? kasan_save_stack+0x30/0x50 [ 1377.573114][T25672] ? kasan_save_track+0x14/0x30 [ 1377.573171][T25672] ? do_sys_openat2+0x10d/0x1e0 [ 1377.573205][T25672] ? __x64_sys_openat+0x12d/0x210 [ 1377.573238][T25672] ? do_syscall_64+0x106/0xf80 [ 1377.573273][T25672] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1377.573306][T25672] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1377.573355][T25672] ? policy_nodemask+0xed/0x4f0 [ 1377.573389][T25672] alloc_pages_mpol+0x1fb/0x550 [ 1377.573422][T25672] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1377.573455][T25672] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1377.573492][T25672] alloc_pages_noprof+0x131/0x390 [ 1377.573524][T25672] get_zeroed_page_noprof+0x18/0xb0 [ 1377.573554][T25672] get_image_page+0x18/0x1a0 [ 1377.573596][T25672] alloc_rtree_node+0x3c/0xb0 [ 1377.573638][T25672] memory_bm_create+0x65e/0xba0 [ 1377.573698][T25672] create_basic_memory_bitmaps+0xbd/0x350 [ 1377.573735][T25672] snapshot_open+0x230/0x2a0 [ 1377.573766][T25672] ? __pfx_snapshot_open+0x10/0x10 [ 1377.573800][T25672] misc_open+0x26d/0x450 [ 1377.573832][T25672] ? __pfx_misc_open+0x10/0x10 [ 1377.573862][T25672] chrdev_open+0x234/0x6a0 [ 1377.573892][T25672] ? __pfx_apparmor_file_open+0x10/0x10 [ 1377.573938][T25672] ? __pfx_chrdev_open+0x10/0x10 [ 1377.573970][T25672] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1377.574008][T25672] do_dentry_open+0x6d8/0x1660 [ 1377.574036][T25672] ? __pfx_chrdev_open+0x10/0x10 [ 1377.574074][T25672] vfs_open+0x82/0x3f0 [ 1377.574114][T25672] path_openat+0x208c/0x31a0 [ 1377.574164][T25672] ? __pfx_path_openat+0x10/0x10 [ 1377.574209][T25672] do_file_open+0x20e/0x430 [ 1377.574240][T25672] ? __pfx_do_file_open+0x10/0x10 [ 1377.574297][T25672] ? alloc_fd+0x476/0x790 [ 1377.574330][T25672] ? do_getname+0x191/0x390 [ 1377.574367][T25672] do_sys_openat2+0x10d/0x1e0 [ 1377.574403][T25672] ? __pfx_do_sys_openat2+0x10/0x10 [ 1377.574441][T25672] ? find_held_lock+0x2b/0x80 [ 1377.574478][T25672] __x64_sys_openat+0x12d/0x210 [ 1377.574515][T25672] ? __pfx___x64_sys_openat+0x10/0x10 [ 1377.574568][T25672] do_syscall_64+0x106/0xf80 [ 1377.574605][T25672] ? clear_bhb_loop+0x40/0x90 [ 1377.574640][T25672] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1377.574669][T25672] RIP: 0033:0x7f2c4239c799 [ 1377.574694][T25672] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1377.574721][T25672] RSP: 002b:00007f2c405f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1377.574748][T25672] RAX: ffffffffffffffda RBX: 00007f2c42615fa0 RCX: 00007f2c4239c799 [ 1377.574768][T25672] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1377.574787][T25672] RBP: 00007f2c42432c99 R08: 0000000000000000 R09: 0000000000000000 [ 1377.574803][T25672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1377.574820][T25672] R13: 00007f2c42616038 R14: 00007f2c42615fa0 R15: 00007ffe34a62878 [ 1377.574860][T25672] [ 1377.962403][T25675] random: crng reseeded on system resumption [ 1378.805505][T25698] random: crng reseeded on system resumption [ 1378.892100][T25698] FAULT_INJECTION: forcing a failure. [ 1378.892100][T25698] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1378.933002][T25698] CPU: 0 UID: 0 PID: 25698 Comm: syz.2.3631 Tainted: G L syzkaller #0 PREEMPT(full) [ 1378.933050][T25698] Tainted: [L]=SOFTLOCKUP [ 1378.933061][T25698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1378.933079][T25698] Call Trace: [ 1378.933089][T25698] [ 1378.933101][T25698] dump_stack_lvl+0x100/0x190 [ 1378.933151][T25698] should_fail_ex.cold+0x5/0xa [ 1378.933181][T25698] ? prepare_alloc_pages+0x16d/0x5f0 [ 1378.933218][T25698] should_fail_alloc_page+0xeb/0x140 [ 1378.933252][T25698] prepare_alloc_pages+0x1f0/0x5f0 [ 1378.933299][T25698] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1378.933347][T25698] ? __alloc_frozen_pages_noprof+0x2b1/0x2ba0 [ 1378.933403][T25698] ? stack_trace_save+0x8e/0xc0 [ 1378.933435][T25698] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1378.933477][T25698] ? stack_depot_save_flags+0x27/0x9d0 [ 1378.933513][T25698] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1378.933568][T25698] ? kasan_save_stack+0x3f/0x50 [ 1378.933609][T25698] ? kasan_save_stack+0x30/0x50 [ 1378.933649][T25698] ? kasan_save_track+0x14/0x30 [ 1378.933699][T25698] ? do_sys_openat2+0x10d/0x1e0 [ 1378.933733][T25698] ? __x64_sys_openat+0x12d/0x210 [ 1378.933767][T25698] ? do_syscall_64+0x106/0xf80 [ 1378.933804][T25698] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1378.933837][T25698] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1378.933888][T25698] ? policy_nodemask+0xed/0x4f0 [ 1378.933921][T25698] alloc_pages_mpol+0x1fb/0x550 [ 1378.933954][T25698] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1378.933985][T25698] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1378.934025][T25698] alloc_pages_noprof+0x131/0x390 [ 1378.934057][T25698] get_zeroed_page_noprof+0x18/0xb0 [ 1378.934090][T25698] get_image_page+0x18/0x1a0 [ 1378.934133][T25698] alloc_rtree_node+0x3c/0xb0 [ 1378.934178][T25698] memory_bm_create+0x65e/0xba0 [ 1378.934238][T25698] create_basic_memory_bitmaps+0x10b/0x350 [ 1378.934276][T25698] snapshot_open+0x230/0x2a0 [ 1378.934308][T25698] ? __pfx_snapshot_open+0x10/0x10 [ 1378.934341][T25698] misc_open+0x26d/0x450 [ 1378.934374][T25698] ? __pfx_misc_open+0x10/0x10 [ 1378.934404][T25698] chrdev_open+0x234/0x6a0 [ 1378.934433][T25698] ? __pfx_apparmor_file_open+0x10/0x10 [ 1378.934478][T25698] ? __pfx_chrdev_open+0x10/0x10 [ 1378.934510][T25698] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1378.934555][T25698] do_dentry_open+0x6d8/0x1660 [ 1378.934584][T25698] ? __pfx_chrdev_open+0x10/0x10 [ 1378.934624][T25698] vfs_open+0x82/0x3f0 [ 1378.934664][T25698] path_openat+0x208c/0x31a0 [ 1378.934708][T25698] ? __pfx_path_openat+0x10/0x10 [ 1378.934753][T25698] do_file_open+0x20e/0x430 [ 1378.934786][T25698] ? __pfx_do_file_open+0x10/0x10 [ 1378.934844][T25698] ? alloc_fd+0x476/0x790 [ 1378.934876][T25698] ? do_getname+0x191/0x390 [ 1378.934914][T25698] do_sys_openat2+0x10d/0x1e0 [ 1378.934951][T25698] ? __pfx_do_sys_openat2+0x10/0x10 [ 1378.934991][T25698] ? __fget_files+0x21f/0x3d0 [ 1378.935025][T25698] __x64_sys_openat+0x12d/0x210 [ 1378.935063][T25698] ? __pfx___x64_sys_openat+0x10/0x10 [ 1378.935116][T25698] do_syscall_64+0x106/0xf80 [ 1378.935154][T25698] ? clear_bhb_loop+0x40/0x90 [ 1378.935189][T25698] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1378.935219][T25698] RIP: 0033:0x7f2c4239c799 [ 1378.935244][T25698] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1378.935274][T25698] RSP: 002b:00007f2c405b4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1378.935302][T25698] RAX: ffffffffffffffda RBX: 00007f2c42616180 RCX: 00007f2c4239c799 [ 1378.935323][T25698] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1378.935343][T25698] RBP: 00007f2c42432c99 R08: 0000000000000000 R09: 0000000000000000 [ 1378.935361][T25698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1378.935379][T25698] R13: 00007f2c42616218 R14: 00007f2c42616180 R15: 00007ffe34a62878 [ 1378.935419][T25698] [ 1379.724450][T25704] FAULT_INJECTION: forcing a failure. [ 1379.724450][T25704] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1379.737747][T25704] CPU: 0 UID: 0 PID: 25704 Comm: syz.3.3633 Tainted: G L syzkaller #0 PREEMPT(full) [ 1379.737792][T25704] Tainted: [L]=SOFTLOCKUP [ 1379.737804][T25704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1379.737822][T25704] Call Trace: [ 1379.737832][T25704] [ 1379.737844][T25704] dump_stack_lvl+0x100/0x190 [ 1379.737892][T25704] should_fail_ex.cold+0x5/0xa [ 1379.737925][T25704] _copy_from_user+0x2e/0xd0 [ 1379.737960][T25704] memdup_user_nul+0x6c/0x120 [ 1379.737989][T25704] handle_policy_update+0x1a4/0xf00 [ 1379.738028][T25704] ? __pfx___might_resched+0x10/0x10 [ 1379.738068][T25704] ? lock_acquire+0x1cf/0x380 [ 1379.738105][T25704] ? __pfx_handle_policy_update+0x10/0x10 [ 1379.738143][T25704] ? apparmor_capable+0x1d7/0x4d0 [ 1379.738173][T25704] ? bpf_lsm_capable+0x9/0x10 [ 1379.738202][T25704] ? security_capable+0x80/0x260 [ 1379.738247][T25704] safesetid_gid_file_write+0x87/0xc0 [ 1379.738322][T25704] vfs_write+0x2aa/0x1070 [ 1379.738368][T25704] ? __pfx_safesetid_gid_file_write+0x10/0x10 [ 1379.738413][T25704] ? __pfx_vfs_write+0x10/0x10 [ 1379.738454][T25704] ? __fget_files+0x215/0x3d0 [ 1379.738491][T25704] ? __fget_files+0x21f/0x3d0 [ 1379.738538][T25704] ksys_write+0x12a/0x250 [ 1379.738565][T25704] ? __pfx_ksys_write+0x10/0x10 [ 1379.738605][T25704] do_syscall_64+0x106/0xf80 [ 1379.738644][T25704] ? clear_bhb_loop+0x40/0x90 [ 1379.738679][T25704] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1379.738709][T25704] RIP: 0033:0x7fcdadf9c799 [ 1379.738732][T25704] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1379.738761][T25704] RSP: 002b:00007fcdac1f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1379.738789][T25704] RAX: ffffffffffffffda RBX: 00007fcdae215fa0 RCX: 00007fcdadf9c799 [ 1379.738808][T25704] RDX: 0000000000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 1379.738826][T25704] RBP: 00007fcdae032c99 R08: 0000000000000000 R09: 0000000000000000 [ 1379.738844][T25704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1379.738862][T25704] R13: 00007fcdae216038 R14: 00007fcdae215fa0 R15: 00007ffe332441f8 [ 1379.738902][T25704] [ 1380.245557][T25715] FAULT_INJECTION: forcing a failure. [ 1380.245557][T25715] name failslab, interval 1, probability 0, space 0, times 0 [ 1380.267198][T25715] CPU: 1 UID: 0 PID: 25715 Comm: syz.3.3639 Tainted: G L syzkaller #0 PREEMPT(full) [ 1380.267242][T25715] Tainted: [L]=SOFTLOCKUP [ 1380.267251][T25715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1380.267275][T25715] Call Trace: [ 1380.267286][T25715] [ 1380.267297][T25715] dump_stack_lvl+0x100/0x190 [ 1380.267345][T25715] should_fail_ex.cold+0x5/0xa [ 1380.267379][T25715] should_failslab+0xc2/0x120 [ 1380.267410][T25715] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1380.267446][T25715] ? handle_policy_update+0xd0/0xf00 [ 1380.267494][T25715] handle_policy_update+0xd0/0xf00 [ 1380.267534][T25715] ? __pfx___might_resched+0x10/0x10 [ 1380.267575][T25715] ? lock_acquire+0x1cf/0x380 [ 1380.267611][T25715] ? __pfx_handle_policy_update+0x10/0x10 [ 1380.267650][T25715] ? apparmor_capable+0x1d7/0x4d0 [ 1380.267681][T25715] ? bpf_lsm_capable+0x9/0x10 [ 1380.267709][T25715] ? security_capable+0x80/0x260 [ 1380.267756][T25715] safesetid_gid_file_write+0x87/0xc0 [ 1380.267798][T25715] vfs_write+0x2aa/0x1070 [ 1380.267841][T25715] ? __pfx_safesetid_gid_file_write+0x10/0x10 [ 1380.267885][T25715] ? __pfx_vfs_write+0x10/0x10 [ 1380.267927][T25715] ? __fget_files+0x215/0x3d0 [ 1380.267971][T25715] ? __fget_files+0x21f/0x3d0 [ 1380.268009][T25715] ksys_write+0x12a/0x250 [ 1380.268037][T25715] ? __pfx_ksys_write+0x10/0x10 [ 1380.268076][T25715] do_syscall_64+0x106/0xf80 [ 1380.268114][T25715] ? clear_bhb_loop+0x40/0x90 [ 1380.268151][T25715] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1380.268181][T25715] RIP: 0033:0x7fcdadf9c799 [ 1380.268204][T25715] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1380.268233][T25715] RSP: 002b:00007fcdac1f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1380.268261][T25715] RAX: ffffffffffffffda RBX: 00007fcdae215fa0 RCX: 00007fcdadf9c799 [ 1380.268281][T25715] RDX: 0000000000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 1380.268299][T25715] RBP: 00007fcdae032c99 R08: 0000000000000000 R09: 0000000000000000 [ 1380.268317][T25715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1380.268338][T25715] R13: 00007fcdae216038 R14: 00007fcdae215fa0 R15: 00007ffe332441f8 [ 1380.268378][T25715] [ 1380.534897][T25709] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input201 [ 1380.982914][T25716] random: crng reseeded on system resumption [ 1381.028763][T25716] FAULT_INJECTION: forcing a failure. [ 1381.028763][T25716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1381.150823][T25716] CPU: 1 UID: 0 PID: 25716 Comm: syz.1.3638 Tainted: G L syzkaller #0 PREEMPT(full) [ 1381.150873][T25716] Tainted: [L]=SOFTLOCKUP [ 1381.150885][T25716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1381.150903][T25716] Call Trace: [ 1381.150914][T25716] [ 1381.150926][T25716] dump_stack_lvl+0x100/0x190 [ 1381.150976][T25716] should_fail_ex.cold+0x5/0xa [ 1381.151004][T25716] ? prepare_alloc_pages+0x16d/0x5f0 [ 1381.151041][T25716] should_fail_alloc_page+0xeb/0x140 [ 1381.151075][T25716] prepare_alloc_pages+0x1f0/0x5f0 [ 1381.151113][T25716] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1381.151169][T25716] ? stack_trace_save+0x8e/0xc0 [ 1381.151200][T25716] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1381.151243][T25716] ? stack_depot_save_flags+0x27/0x9d0 [ 1381.151278][T25716] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1381.151321][T25716] ? kasan_save_stack+0x3f/0x50 [ 1381.151358][T25716] ? kasan_save_stack+0x30/0x50 [ 1381.151406][T25716] ? kasan_save_track+0x14/0x30 [ 1381.151453][T25716] ? do_sys_openat2+0x10d/0x1e0 [ 1381.151489][T25716] ? __x64_sys_openat+0x12d/0x210 [ 1381.151524][T25716] ? do_syscall_64+0x106/0xf80 [ 1381.151560][T25716] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1381.151594][T25716] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1381.151641][T25716] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1381.151689][T25716] ? policy_nodemask+0xed/0x4f0 [ 1381.151723][T25716] alloc_pages_mpol+0x1fb/0x550 [ 1381.151755][T25716] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1381.151794][T25716] alloc_pages_noprof+0x131/0x390 [ 1381.151824][T25716] get_zeroed_page_noprof+0x18/0xb0 [ 1381.151856][T25716] get_image_page+0x18/0x1a0 [ 1381.151900][T25716] memory_bm_create+0x432/0xba0 [ 1381.151957][T25716] create_basic_memory_bitmaps+0x10b/0x350 [ 1381.151992][T25716] snapshot_open+0x230/0x2a0 [ 1381.152021][T25716] ? __pfx_snapshot_open+0x10/0x10 [ 1381.152052][T25716] misc_open+0x26d/0x450 [ 1381.152084][T25716] ? __pfx_misc_open+0x10/0x10 [ 1381.152113][T25716] chrdev_open+0x234/0x6a0 [ 1381.152140][T25716] ? __pfx_apparmor_file_open+0x10/0x10 [ 1381.152184][T25716] ? __pfx_chrdev_open+0x10/0x10 [ 1381.152216][T25716] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1381.152255][T25716] do_dentry_open+0x6d8/0x1660 [ 1381.152283][T25716] ? __pfx_chrdev_open+0x10/0x10 [ 1381.152321][T25716] vfs_open+0x82/0x3f0 [ 1381.152359][T25716] path_openat+0x208c/0x31a0 [ 1381.152410][T25716] ? __pfx_path_openat+0x10/0x10 [ 1381.152455][T25716] do_file_open+0x20e/0x430 [ 1381.152489][T25716] ? __pfx_do_file_open+0x10/0x10 [ 1381.152546][T25716] ? alloc_fd+0x476/0x790 [ 1381.152578][T25716] ? do_getname+0x191/0x390 [ 1381.152616][T25716] do_sys_openat2+0x10d/0x1e0 [ 1381.152650][T25716] ? __pfx_do_sys_openat2+0x10/0x10 [ 1381.152686][T25716] ? __fget_files+0x21f/0x3d0 [ 1381.152718][T25716] __x64_sys_openat+0x12d/0x210 [ 1381.152755][T25716] ? __pfx___x64_sys_openat+0x10/0x10 [ 1381.152802][T25716] do_syscall_64+0x106/0xf80 [ 1381.152839][T25716] ? clear_bhb_loop+0x40/0x90 [ 1381.152874][T25716] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1381.152901][T25716] RIP: 0033:0x7f6e5619c799 [ 1381.152925][T25716] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1381.152953][T25716] RSP: 002b:00007f6e56f8f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1381.152982][T25716] RAX: ffffffffffffffda RBX: 00007f6e56416090 RCX: 00007f6e5619c799 [ 1381.153001][T25716] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1381.153018][T25716] RBP: 00007f6e56232c99 R08: 0000000000000000 R09: 0000000000000000 [ 1381.153034][T25716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1381.153051][T25716] R13: 00007f6e56416128 R14: 00007f6e56416090 R15: 00007ffe0582ffb8 [ 1381.153088][T25716] [ 1382.552884][T25757] kvm: vcpu 4: requested lapic timer restore with starting count register 0x390=4294967104 (137438947328 ns) > initial count (6624 ns). Using initial count to start timer. [ 1382.769224][T25761] FAULT_INJECTION: forcing a failure. [ 1382.769224][T25761] name failslab, interval 1, probability 0, space 0, times 0 [ 1382.782018][T25761] CPU: 1 UID: 0 PID: 25761 Comm: syz.3.3647 Tainted: G L syzkaller #0 PREEMPT(full) [ 1382.782045][T25761] Tainted: [L]=SOFTLOCKUP [ 1382.782051][T25761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1382.782061][T25761] Call Trace: [ 1382.782068][T25761] [ 1382.782075][T25761] dump_stack_lvl+0x100/0x190 [ 1382.782103][T25761] should_fail_ex.cold+0x5/0xa [ 1382.782121][T25761] should_failslab+0xc2/0x120 [ 1382.782138][T25761] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1382.782157][T25761] ? handle_policy_update+0xd0/0xf00 [ 1382.782183][T25761] handle_policy_update+0xd0/0xf00 [ 1382.782204][T25761] ? __pfx___might_resched+0x10/0x10 [ 1382.782226][T25761] ? lock_acquire+0x1cf/0x380 [ 1382.782245][T25761] ? __pfx_handle_policy_update+0x10/0x10 [ 1382.782269][T25761] ? apparmor_capable+0x1d7/0x4d0 [ 1382.782286][T25761] ? bpf_lsm_capable+0x9/0x10 [ 1382.782301][T25761] ? security_capable+0x80/0x260 [ 1382.782326][T25761] safesetid_gid_file_write+0x87/0xc0 [ 1382.782348][T25761] vfs_write+0x2aa/0x1070 [ 1382.782371][T25761] ? __pfx_safesetid_gid_file_write+0x10/0x10 [ 1382.782393][T25761] ? __pfx_vfs_write+0x10/0x10 [ 1382.782415][T25761] ? __fget_files+0x215/0x3d0 [ 1382.782433][T25761] ? __fget_files+0x21f/0x3d0 [ 1382.782452][T25761] ksys_write+0x12a/0x250 [ 1382.782466][T25761] ? __pfx_ksys_write+0x10/0x10 [ 1382.782485][T25761] do_syscall_64+0x106/0xf80 [ 1382.782505][T25761] ? clear_bhb_loop+0x40/0x90 [ 1382.782524][T25761] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1382.782539][T25761] RIP: 0033:0x7fcdadf9c799 [ 1382.782554][T25761] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1382.782568][T25761] RSP: 002b:00007fcdac1f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1382.782583][T25761] RAX: ffffffffffffffda RBX: 00007fcdae215fa0 RCX: 00007fcdadf9c799 [ 1382.782593][T25761] RDX: 0000000000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 1382.782602][T25761] RBP: 00007fcdae032c99 R08: 0000000000000000 R09: 0000000000000000 [ 1382.782611][T25761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1382.782620][T25761] R13: 00007fcdae216038 R14: 00007fcdae215fa0 R15: 00007ffe332441f8 [ 1382.782641][T25761] [ 1383.495979][T25774] FAULT_INJECTION: forcing a failure. [ 1383.495979][T25774] name failslab, interval 1, probability 0, space 0, times 0 [ 1383.589079][T25774] CPU: 0 UID: 0 PID: 25774 Comm: syz.1.3651 Tainted: G L syzkaller #0 PREEMPT(full) [ 1383.589124][T25774] Tainted: [L]=SOFTLOCKUP [ 1383.589135][T25774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1383.589153][T25774] Call Trace: [ 1383.589163][T25774] [ 1383.589174][T25774] dump_stack_lvl+0x100/0x190 [ 1383.589232][T25774] should_fail_ex.cold+0x5/0xa [ 1383.589268][T25774] should_failslab+0xc2/0x120 [ 1383.589298][T25774] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1383.589339][T25774] ? security_inode_alloc+0x3b/0x2c0 [ 1383.589367][T25774] ? lockdep_init_map_type+0x5c/0x250 [ 1383.589409][T25774] security_inode_alloc+0x3b/0x2c0 [ 1383.589439][T25774] inode_init_always_gfp+0xced/0x1040 [ 1383.589473][T25774] alloc_inode+0x8e/0x250 [ 1383.589509][T25774] sock_alloc+0x44/0x280 [ 1383.589546][T25774] ? security_socket_create+0x7f/0x250 [ 1383.589591][T25774] sock_create_lite+0x82/0x120 [ 1383.589635][T25774] __netlink_kernel_create+0xbd/0x750 [ 1383.589679][T25774] ? __pfx___netlink_kernel_create+0x10/0x10 [ 1383.589730][T25774] uevent_net_init+0xf8/0x330 [ 1383.589758][T25774] ? __pfx_uevent_net_init+0x10/0x10 [ 1383.589789][T25774] ? __pfx_uevent_net_rcv+0x10/0x10 [ 1383.589819][T25774] ? __kmalloc_noprof+0x320/0x850 [ 1383.589867][T25774] ? __pfx_uevent_net_init+0x10/0x10 [ 1383.589894][T25774] ops_init+0x1e2/0x5f0 [ 1383.589942][T25774] setup_net+0x118/0x3a0 [ 1383.589984][T25774] ? __pfx_setup_net+0x10/0x10 [ 1383.590023][T25774] ? lockdep_init_map_type+0x5c/0x250 [ 1383.590063][T25774] ? mutex_init_lockep+0x110/0x150 [ 1383.590109][T25774] copy_net_ns+0x46f/0x7c0 [ 1383.590157][T25774] create_new_namespaces+0x3ea/0xac0 [ 1383.590199][T25774] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1383.590243][T25774] ksys_unshare+0x473/0xad0 [ 1383.590281][T25774] ? __pfx_ksys_unshare+0x10/0x10 [ 1383.590330][T25774] __x64_sys_unshare+0x31/0x40 [ 1383.590363][T25774] do_syscall_64+0x106/0xf80 [ 1383.590400][T25774] ? clear_bhb_loop+0x40/0x90 [ 1383.590436][T25774] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1383.590467][T25774] RIP: 0033:0x7f6e5619c799 [ 1383.590490][T25774] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1383.590520][T25774] RSP: 002b:00007f6e56fb0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1383.590548][T25774] RAX: ffffffffffffffda RBX: 00007f6e56415fa0 RCX: 00007f6e5619c799 [ 1383.590567][T25774] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1383.590585][T25774] RBP: 00007f6e56232c99 R08: 0000000000000000 R09: 0000000000000000 [ 1383.590603][T25774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1383.590620][T25774] R13: 00007f6e56416038 R14: 00007f6e56415fa0 R15: 00007ffe0582ffb8 [ 1383.590659][T25774] [ 1383.590701][T25774] kobject_uevent: unable to create netlink socket! [ 1383.664797][T25766] random: crng reseeded on system resumption [ 1383.916360][T25779] dvb_demux: dvb_demux_feed_del: feed not in list (type=0 state=0 pid=ffff) [ 1383.928603][T25779] FAULT_INJECTION: forcing a failure. [ 1383.928603][T25779] name failslab, interval 1, probability 0, space 0, times 0 [ 1383.973988][T25779] CPU: 1 UID: 0 PID: 25779 Comm: syz.2.3653 Tainted: G L syzkaller #0 PREEMPT(full) [ 1383.974035][T25779] Tainted: [L]=SOFTLOCKUP [ 1383.974047][T25779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1383.974065][T25779] Call Trace: [ 1383.974076][T25779] [ 1383.974088][T25779] dump_stack_lvl+0x100/0x190 [ 1383.974135][T25779] should_fail_ex.cold+0x5/0xa [ 1383.974171][T25779] should_failslab+0xc2/0x120 [ 1383.974209][T25779] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1383.974252][T25779] ? security_inode_alloc+0x3b/0x2c0 [ 1383.974282][T25779] ? lockdep_init_map_type+0x5c/0x250 [ 1383.974326][T25779] security_inode_alloc+0x3b/0x2c0 [ 1383.974357][T25779] inode_init_always_gfp+0xced/0x1040 [ 1383.974393][T25779] alloc_inode+0x8e/0x250 [ 1383.974430][T25779] sock_alloc+0x44/0x280 [ 1383.974469][T25779] ? security_socket_create+0x7f/0x250 [ 1383.974515][T25779] sock_create_lite+0x82/0x120 [ 1383.974560][T25779] __netlink_kernel_create+0xbd/0x750 [ 1383.974605][T25779] ? __pfx___netlink_kernel_create+0x10/0x10 [ 1383.974659][T25779] uevent_net_init+0xf8/0x330 [ 1383.974689][T25779] ? __pfx_uevent_net_init+0x10/0x10 [ 1383.974720][T25779] ? __pfx_uevent_net_rcv+0x10/0x10 [ 1383.974752][T25779] ? __kmalloc_noprof+0x320/0x850 [ 1383.974800][T25779] ? __pfx_uevent_net_init+0x10/0x10 [ 1383.974828][T25779] ops_init+0x1e2/0x5f0 [ 1383.974880][T25779] setup_net+0x118/0x3a0 [ 1383.974929][T25779] ? __pfx_setup_net+0x10/0x10 [ 1383.974969][T25779] ? lockdep_init_map_type+0x5c/0x250 [ 1383.975006][T25779] ? mutex_init_lockep+0x110/0x150 [ 1383.975050][T25779] copy_net_ns+0x46f/0x7c0 [ 1383.975093][T25779] create_new_namespaces+0x3ea/0xac0 [ 1383.975131][T25779] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1383.975166][T25779] ksys_unshare+0x473/0xad0 [ 1383.975212][T25779] ? __pfx_ksys_unshare+0x10/0x10 [ 1383.975261][T25779] __x64_sys_unshare+0x31/0x40 [ 1383.975296][T25779] do_syscall_64+0x106/0xf80 [ 1383.975334][T25779] ? clear_bhb_loop+0x40/0x90 [ 1383.975369][T25779] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1383.975400][T25779] RIP: 0033:0x7f2c4239c799 [ 1383.975426][T25779] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1383.975456][T25779] RSP: 002b:00007f2c405f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1383.975485][T25779] RAX: ffffffffffffffda RBX: 00007f2c42615fa0 RCX: 00007f2c4239c799 [ 1383.975505][T25779] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1383.975523][T25779] RBP: 00007f2c42432c99 R08: 0000000000000000 R09: 0000000000000000 [ 1383.975541][T25779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1383.975557][T25779] R13: 00007f2c42616038 R14: 00007f2c42615fa0 R15: 00007ffe34a62878 [ 1383.975597][T25779] [ 1383.976805][T25779] kobject_uevent: unable to create netlink socket! [ 1384.590387][T25782] random: crng reseeded on system resumption Ijn9_UVQ8j@:Un M%Ux[ 1385.562556][T25814] random: crng reseeded on system resumption [ 1385.592990][T25814] FAULT_INJECTION: forcing a failure. [ 1385.592990][T25814] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1385.629768][T25814] CPU: 0 UID: 0 PID: 25814 Comm: syz.4.3660 Tainted: G L syzkaller #0 PREEMPT(full) [ 1385.629811][T25814] Tainted: [L]=SOFTLOCKUP [ 1385.629822][T25814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1385.629839][T25814] Call Trace: [ 1385.629849][T25814] [ 1385.629861][T25814] dump_stack_lvl+0x100/0x190 [ 1385.629908][T25814] should_fail_ex.cold+0x5/0xa [ 1385.629935][T25814] ? prepare_alloc_pages+0x16d/0x5f0 [ 1385.629971][T25814] should_fail_alloc_page+0xeb/0x140 [ 1385.630005][T25814] prepare_alloc_pages+0x1f0/0x5f0 [ 1385.630041][T25814] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1385.630084][T25814] ? __alloc_frozen_pages_noprof+0x2b1/0x2ba0 [ 1385.630138][T25814] ? stack_trace_save+0x8e/0xc0 [ 1385.630167][T25814] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1385.630235][T25814] ? stack_depot_save_flags+0x27/0x9d0 [ 1385.630272][T25814] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1385.630320][T25814] ? kasan_save_stack+0x3f/0x50 [ 1385.630358][T25814] ? kasan_save_stack+0x30/0x50 [ 1385.630396][T25814] ? kasan_save_track+0x14/0x30 [ 1385.630444][T25814] ? do_sys_openat2+0x10d/0x1e0 [ 1385.630476][T25814] ? __x64_sys_openat+0x12d/0x210 [ 1385.630509][T25814] ? do_syscall_64+0x106/0xf80 [ 1385.630547][T25814] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1385.630579][T25814] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1385.630625][T25814] ? policy_nodemask+0xed/0x4f0 [ 1385.630658][T25814] alloc_pages_mpol+0x1fb/0x550 [ 1385.630686][T25814] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1385.630714][T25814] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1385.630751][T25814] alloc_pages_noprof+0x131/0x390 [ 1385.630784][T25814] get_zeroed_page_noprof+0x18/0xb0 [ 1385.630816][T25814] get_image_page+0x18/0x1a0 [ 1385.630859][T25814] alloc_rtree_node+0x3c/0xb0 [ 1385.630903][T25814] memory_bm_create+0x65e/0xba0 [ 1385.630958][T25814] create_basic_memory_bitmaps+0xbd/0x350 [ 1385.630994][T25814] snapshot_open+0x230/0x2a0 [ 1385.631024][T25814] ? __pfx_snapshot_open+0x10/0x10 [ 1385.631057][T25814] misc_open+0x26d/0x450 [ 1385.631087][T25814] ? __pfx_misc_open+0x10/0x10 [ 1385.631115][T25814] chrdev_open+0x234/0x6a0 [ 1385.631141][T25814] ? __pfx_apparmor_file_open+0x10/0x10 [ 1385.631187][T25814] ? __pfx_chrdev_open+0x10/0x10 [ 1385.631230][T25814] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1385.631271][T25814] do_dentry_open+0x6d8/0x1660 [ 1385.631301][T25814] ? __pfx_chrdev_open+0x10/0x10 [ 1385.631339][T25814] vfs_open+0x82/0x3f0 [ 1385.631379][T25814] path_openat+0x208c/0x31a0 [ 1385.631423][T25814] ? __pfx_path_openat+0x10/0x10 [ 1385.631467][T25814] do_file_open+0x20e/0x430 [ 1385.631501][T25814] ? __pfx_do_file_open+0x10/0x10 [ 1385.631559][T25814] ? alloc_fd+0x476/0x790 [ 1385.631592][T25814] ? do_getname+0x191/0x390 [ 1385.631631][T25814] do_sys_openat2+0x10d/0x1e0 [ 1385.631668][T25814] ? __pfx_do_sys_openat2+0x10/0x10 [ 1385.631706][T25814] ? find_held_lock+0x2b/0x80 [ 1385.631743][T25814] __x64_sys_openat+0x12d/0x210 [ 1385.631781][T25814] ? __pfx___x64_sys_openat+0x10/0x10 [ 1385.631834][T25814] do_syscall_64+0x106/0xf80 [ 1385.631871][T25814] ? clear_bhb_loop+0x40/0x90 [ 1385.631907][T25814] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1385.631937][T25814] RIP: 0033:0x7f284f59c799 [ 1385.631962][T25814] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1385.631991][T25814] RSP: 002b:00007f285040c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1385.632020][T25814] RAX: ffffffffffffffda RBX: 00007f284f816180 RCX: 00007f284f59c799 [ 1385.632039][T25814] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1385.632058][T25814] RBP: 00007f284f632c99 R08: 0000000000000000 R09: 0000000000000000 [ 1385.632077][T25814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1385.632094][T25814] R13: 00007f284f816218 R14: 00007f284f816180 R15: 00007ffd4c1c7d18 [ 1385.632135][T25814] [ 1386.145924][T25818] kvm: vcpu 4: requested lapic timer restore with starting count register 0x390=4294967104 (137438947328 ns) > initial count (6624 ns). Using initial count to start timer. [ 1386.797457][T25829] FAULT_INJECTION: forcing a failure. [ 1386.797457][T25829] name failslab, interval 1, probability 0, space 0, times 0 [ 1386.810663][T25829] CPU: 0 UID: 0 PID: 25829 Comm: syz.1.3665 Tainted: G L syzkaller #0 PREEMPT(full) [ 1386.810696][T25829] Tainted: [L]=SOFTLOCKUP [ 1386.810702][T25829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1386.810712][T25829] Call Trace: [ 1386.810717][T25829] [ 1386.810724][T25829] dump_stack_lvl+0x100/0x190 [ 1386.810750][T25829] should_fail_ex.cold+0x5/0xa [ 1386.810769][T25829] should_failslab+0xc2/0x120 [ 1386.810785][T25829] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1386.810805][T25829] ? netdev_init+0xa0/0x3c0 [ 1386.810876][T25829] ? __pfx_proc_create_net_data+0x10/0x10 [ 1386.810901][T25829] ? __pfx_uevent_net_rcv+0x10/0x10 [ 1386.810920][T25829] netdev_init+0xa0/0x3c0 [ 1386.810936][T25829] ? __pfx_netdev_init+0x10/0x10 [ 1386.810951][T25829] ops_init+0x1e2/0x5f0 [ 1386.810975][T25829] setup_net+0x118/0x3a0 [ 1386.811003][T25829] ? __pfx_setup_net+0x10/0x10 [ 1386.811024][T25829] ? lockdep_init_map_type+0x5c/0x250 [ 1386.811045][T25829] ? mutex_init_lockep+0x110/0x150 [ 1386.811068][T25829] copy_net_ns+0x46f/0x7c0 [ 1386.811093][T25829] create_new_namespaces+0x3ea/0xac0 [ 1386.811113][T25829] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1386.811131][T25829] ksys_unshare+0x473/0xad0 [ 1386.811150][T25829] ? __pfx_ksys_unshare+0x10/0x10 [ 1386.811176][T25829] __x64_sys_unshare+0x31/0x40 [ 1386.811194][T25829] do_syscall_64+0x106/0xf80 [ 1386.811213][T25829] ? clear_bhb_loop+0x40/0x90 [ 1386.811232][T25829] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1386.811247][T25829] RIP: 0033:0x7f6e5619c799 [ 1386.811260][T25829] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1386.811275][T25829] RSP: 002b:00007f6e56fb0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1386.811291][T25829] RAX: ffffffffffffffda RBX: 00007f6e56415fa0 RCX: 00007f6e5619c799 [ 1386.811301][T25829] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1386.811311][T25829] RBP: 00007f6e56232c99 R08: 0000000000000000 R09: 0000000000000000 [ 1386.811320][T25829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1386.811330][T25829] R13: 00007f6e56416038 R14: 00007f6e56415fa0 R15: 00007ffe0582ffb8 [ 1386.811351][T25829] [ 1387.081779][T25832] FAULT_INJECTION: forcing a failure. [ 1387.081779][T25832] name failslab, interval 1, probability 0, space 0, times 0 [ 1387.103202][T25832] CPU: 1 UID: 0 PID: 25832 Comm: syz.4.3664 Tainted: G L syzkaller #0 PREEMPT(full) [ 1387.103236][T25832] Tainted: [L]=SOFTLOCKUP [ 1387.103243][T25832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1387.103253][T25832] Call Trace: [ 1387.103259][T25832] [ 1387.103265][T25832] dump_stack_lvl+0x100/0x190 [ 1387.103292][T25832] should_fail_ex.cold+0x5/0xa [ 1387.103311][T25832] should_failslab+0xc2/0x120 [ 1387.103327][T25832] kmem_cache_alloc_node_noprof+0x81/0x6f0 [ 1387.103350][T25832] ? __alloc_skb+0x140/0x710 [ 1387.103372][T25832] __alloc_skb+0x140/0x710 [ 1387.103390][T25832] ? __alloc_skb+0x5b7/0x710 [ 1387.103408][T25832] ? __pfx___alloc_skb+0x10/0x10 [ 1387.103429][T25832] ? __pfx___register_sysctl_table+0x10/0x10 [ 1387.103452][T25832] ? is_module_address+0x69/0xf0 [ 1387.103477][T25832] inet_netconf_notify_devconf+0x9d/0x170 [ 1387.103503][T25832] __devinet_sysctl_register+0x227/0x360 [ 1387.103528][T25832] ? trace_kmalloc+0x101/0x130 [ 1387.103544][T25832] ? __pfx___devinet_sysctl_register+0x10/0x10 [ 1387.103570][T25832] ? __asan_memcpy+0x3c/0x60 [ 1387.103592][T25832] devinet_init_net+0x303/0x8d0 [ 1387.103616][T25832] ? __pfx_devinet_init_net+0x10/0x10 [ 1387.103637][T25832] ops_init+0x1e2/0x5f0 [ 1387.103660][T25832] setup_net+0x118/0x3a0 [ 1387.103681][T25832] ? __pfx_setup_net+0x10/0x10 [ 1387.103701][T25832] ? lockdep_init_map_type+0x5c/0x250 [ 1387.103721][T25832] ? mutex_init_lockep+0x110/0x150 [ 1387.103744][T25832] copy_net_ns+0x46f/0x7c0 [ 1387.103768][T25832] create_new_namespaces+0x3ea/0xac0 [ 1387.103789][T25832] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1387.103806][T25832] ksys_unshare+0x473/0xad0 [ 1387.103826][T25832] ? __pfx_ksys_unshare+0x10/0x10 [ 1387.103851][T25832] __x64_sys_unshare+0x31/0x40 [ 1387.103869][T25832] do_syscall_64+0x106/0xf80 [ 1387.103888][T25832] ? clear_bhb_loop+0x40/0x90 [ 1387.103911][T25832] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1387.103927][T25832] RIP: 0033:0x7f284f59c799 [ 1387.103941][T25832] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1387.103956][T25832] RSP: 002b:00007f285044e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1387.103980][T25832] RAX: ffffffffffffffda RBX: 00007f284f815fa0 RCX: 00007f284f59c799 [ 1387.103990][T25832] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1387.104000][T25832] RBP: 00007f284f632c99 R08: 0000000000000000 R09: 0000000000000000 [ 1387.104009][T25832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1387.104019][T25832] R13: 00007f284f816038 R14: 00007f284f815fa0 R15: 00007ffd4c1c7d18 [ 1387.104040][T25832] [ 1387.682941][T25837] FAULT_INJECTION: forcing a failure. [ 1387.682941][T25837] name failslab, interval 1, probability 0, space 0, times 0 [ 1387.710875][T25837] CPU: 1 UID: 0 PID: 25837 Comm: syz.3.3667 Tainted: G L syzkaller #0 PREEMPT(full) [ 1387.710920][T25837] Tainted: [L]=SOFTLOCKUP [ 1387.710930][T25837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1387.710958][T25837] Call Trace: [ 1387.710967][T25837] [ 1387.710979][T25837] dump_stack_lvl+0x100/0x190 [ 1387.711027][T25837] should_fail_ex.cold+0x5/0xa [ 1387.711061][T25837] should_failslab+0xc2/0x120 [ 1387.711091][T25837] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1387.711127][T25837] ? netdev_init+0xa0/0x3c0 [ 1387.711154][T25837] ? __pfx_proc_create_net_data+0x10/0x10 [ 1387.711197][T25837] ? __pfx_uevent_net_rcv+0x10/0x10 [ 1387.711233][T25837] netdev_init+0xa0/0x3c0 [ 1387.711261][T25837] ? __pfx_netdev_init+0x10/0x10 [ 1387.711288][T25837] ops_init+0x1e2/0x5f0 [ 1387.711331][T25837] setup_net+0x118/0x3a0 [ 1387.711370][T25837] ? __pfx_setup_net+0x10/0x10 [ 1387.711407][T25837] ? lockdep_init_map_type+0x5c/0x250 [ 1387.711444][T25837] ? mutex_init_lockep+0x110/0x150 [ 1387.711487][T25837] copy_net_ns+0x46f/0x7c0 [ 1387.711533][T25837] create_new_namespaces+0x3ea/0xac0 [ 1387.711572][T25837] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1387.711606][T25837] ksys_unshare+0x473/0xad0 [ 1387.711642][T25837] ? __pfx_ksys_unshare+0x10/0x10 [ 1387.711691][T25837] __x64_sys_unshare+0x31/0x40 [ 1387.711723][T25837] do_syscall_64+0x106/0xf80 [ 1387.711760][T25837] ? clear_bhb_loop+0x40/0x90 [ 1387.711794][T25837] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1387.711823][T25837] RIP: 0033:0x7fcdadf9c799 [ 1387.711847][T25837] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1387.711876][T25837] RSP: 002b:00007fcdac1f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1387.711903][T25837] RAX: ffffffffffffffda RBX: 00007fcdae215fa0 RCX: 00007fcdadf9c799 [ 1387.711921][T25837] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1387.711946][T25837] RBP: 00007fcdae032c99 R08: 0000000000000000 R09: 0000000000000000 [ 1387.711964][T25837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1387.711982][T25837] R13: 00007fcdae216038 R14: 00007fcdae215fa0 R15: 00007ffe332441f8 [ 1387.712021][T25837] [ 1388.477789][T25852] random: crng reseeded on system resumption [ 1388.987140][T25868] random: crng reseeded on system resumption [ 1389.311800][T25874] FAULT_INJECTION: forcing a failure. [ 1389.311800][T25874] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.326224][T25874] CPU: 0 UID: 0 PID: 25874 Comm: syz.3.3675 Tainted: G L syzkaller #0 PREEMPT(full) [ 1389.326271][T25874] Tainted: [L]=SOFTLOCKUP [ 1389.326283][T25874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1389.326301][T25874] Call Trace: [ 1389.326312][T25874] [ 1389.326321][T25874] dump_stack_lvl+0x100/0x190 [ 1389.326365][T25874] should_fail_ex.cold+0x5/0xa [ 1389.326399][T25874] should_failslab+0xc2/0x120 [ 1389.326428][T25874] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 1389.326471][T25874] ? sock_alloc_inode+0x25/0x1c0 [ 1389.326509][T25874] ? __pfx_sock_alloc_inode+0x10/0x10 [ 1389.326534][T25874] sock_alloc_inode+0x25/0x1c0 [ 1389.326556][T25874] alloc_inode+0x68/0x250 [ 1389.326577][T25874] sock_alloc+0x44/0x280 [ 1389.326597][T25874] ? security_socket_create+0x7f/0x250 [ 1389.326621][T25874] sock_create_lite+0x82/0x120 [ 1389.326645][T25874] __netlink_kernel_create+0xbd/0x750 [ 1389.326669][T25874] ? __pfx___netlink_kernel_create+0x10/0x10 [ 1389.326697][T25874] uevent_net_init+0xf8/0x330 [ 1389.326713][T25874] ? __pfx_uevent_net_init+0x10/0x10 [ 1389.326729][T25874] ? __pfx_uevent_net_rcv+0x10/0x10 [ 1389.326745][T25874] ? __kmalloc_noprof+0x320/0x850 [ 1389.326769][T25874] ? __pfx_uevent_net_init+0x10/0x10 [ 1389.326783][T25874] ops_init+0x1e2/0x5f0 [ 1389.326806][T25874] setup_net+0x118/0x3a0 [ 1389.326836][T25874] ? __pfx_setup_net+0x10/0x10 [ 1389.326858][T25874] ? lockdep_init_map_type+0x5c/0x250 [ 1389.326879][T25874] ? mutex_init_lockep+0x110/0x150 [ 1389.326902][T25874] copy_net_ns+0x46f/0x7c0 [ 1389.326926][T25874] create_new_namespaces+0x3ea/0xac0 [ 1389.326946][T25874] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1389.326965][T25874] ksys_unshare+0x473/0xad0 [ 1389.326984][T25874] ? __pfx_ksys_unshare+0x10/0x10 [ 1389.327009][T25874] __x64_sys_unshare+0x31/0x40 [ 1389.327027][T25874] do_syscall_64+0x106/0xf80 [ 1389.327046][T25874] ? clear_bhb_loop+0x40/0x90 [ 1389.327065][T25874] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1389.327080][T25874] RIP: 0033:0x7fcdadf9c799 [ 1389.327094][T25874] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1389.327109][T25874] RSP: 002b:00007fcdac1f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1389.327123][T25874] RAX: ffffffffffffffda RBX: 00007fcdae215fa0 RCX: 00007fcdadf9c799 [ 1389.327134][T25874] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1389.327144][T25874] RBP: 00007fcdae032c99 R08: 0000000000000000 R09: 0000000000000000 [ 1389.327153][T25874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1389.327163][T25874] R13: 00007fcdae216038 R14: 00007fcdae215fa0 R15: 00007ffe332441f8 [ 1389.327183][T25874] [ 1389.327190][T25874] kobject_uevent: unable to create netlink socket! [ 1389.968790][T25886] FAULT_INJECTION: forcing a failure. [ 1389.968790][T25886] name failslab, interval 1, probability 0, space 0, times 0 [ 1389.985832][T25886] CPU: 0 UID: 0 PID: 25886 Comm: syz.3.3677 Tainted: G L syzkaller #0 PREEMPT(full) [ 1389.985859][T25886] Tainted: [L]=SOFTLOCKUP [ 1389.985865][T25886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1389.985875][T25886] Call Trace: [ 1389.985881][T25886] [ 1389.985888][T25886] dump_stack_lvl+0x100/0x190 [ 1389.985915][T25886] should_fail_ex.cold+0x5/0xa [ 1389.985933][T25886] ? __register_sysctl_table+0xac/0x1650 [ 1389.985956][T25886] should_failslab+0xc2/0x120 [ 1389.985972][T25886] __kmalloc_noprof+0xe0/0x850 [ 1389.985997][T25886] __register_sysctl_table+0xac/0x1650 [ 1389.986020][T25886] ? is_module_address+0x5f/0xf0 [ 1389.986041][T25886] ? __pfx___register_sysctl_table+0x10/0x10 [ 1389.986063][T25886] ? is_module_address+0x69/0xf0 [ 1389.986081][T25886] ? register_net_sysctl_sz+0x222/0x430 [ 1389.986104][T25886] ? __asan_memcpy+0x3c/0x60 [ 1389.986127][T25886] sysctl_core_net_init+0xe6/0x290 [ 1389.986145][T25886] ? __pfx_sysctl_core_net_init+0x10/0x10 [ 1389.986162][T25886] ops_init+0x1e2/0x5f0 [ 1389.986185][T25886] setup_net+0x118/0x3a0 [ 1389.986208][T25886] ? __pfx_setup_net+0x10/0x10 [ 1389.986227][T25886] ? lockdep_init_map_type+0x5c/0x250 [ 1389.986247][T25886] ? mutex_init_lockep+0x110/0x150 [ 1389.986270][T25886] copy_net_ns+0x46f/0x7c0 [ 1389.986293][T25886] create_new_namespaces+0x3ea/0xac0 [ 1389.986314][T25886] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1389.986331][T25886] ksys_unshare+0x473/0xad0 [ 1389.986351][T25886] ? __pfx_ksys_unshare+0x10/0x10 [ 1389.986376][T25886] __x64_sys_unshare+0x31/0x40 [ 1389.986394][T25886] do_syscall_64+0x106/0xf80 [ 1389.986413][T25886] ? clear_bhb_loop+0x40/0x90 [ 1389.986431][T25886] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1389.986446][T25886] RIP: 0033:0x7fcdadf9c799 [ 1389.986460][T25886] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1389.986475][T25886] RSP: 002b:00007fcdac1f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1389.986490][T25886] RAX: ffffffffffffffda RBX: 00007fcdae215fa0 RCX: 00007fcdadf9c799 [ 1389.986501][T25886] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1389.986510][T25886] RBP: 00007fcdae032c99 R08: 0000000000000000 R09: 0000000000000000 [ 1389.986520][T25886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1389.986529][T25886] R13: 00007fcdae216038 R14: 00007fcdae215fa0 R15: 00007ffe332441f8 [ 1389.986549][T25886] [ 1390.797444][T25894] FAULT_INJECTION: forcing a failure. [ 1390.797444][T25894] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.870287][T25894] CPU: 1 UID: 0 PID: 25894 Comm: syz.2.3678 Tainted: G L syzkaller #0 PREEMPT(full) [ 1390.870333][T25894] Tainted: [L]=SOFTLOCKUP [ 1390.870345][T25894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1390.870363][T25894] Call Trace: [ 1390.870372][T25894] [ 1390.870383][T25894] dump_stack_lvl+0x100/0x190 [ 1390.870432][T25894] should_fail_ex.cold+0x5/0xa [ 1390.870465][T25894] ? sk_prot_alloc+0x10b/0x2a0 [ 1390.870491][T25894] should_failslab+0xc2/0x120 [ 1390.870521][T25894] __kmalloc_noprof+0xe0/0x850 [ 1390.870561][T25894] ? security_inode_alloc+0xcf/0x2c0 [ 1390.870598][T25894] sk_prot_alloc+0x10b/0x2a0 [ 1390.870628][T25894] sk_alloc+0x36/0xe80 [ 1390.870663][T25894] __netlink_create+0x5e/0x2c0 [ 1390.870703][T25894] __netlink_kernel_create+0xed/0x750 [ 1390.870757][T25894] ? __pfx___netlink_kernel_create+0x10/0x10 [ 1390.870797][T25894] ? find_held_lock+0x2b/0x80 [ 1390.870825][T25894] ? audit_net_init+0x190/0x440 [ 1390.870857][T25894] ? audit_net_init+0x190/0x440 [ 1390.870899][T25894] audit_net_init+0x1ae/0x440 [ 1390.870935][T25894] ? __pfx_audit_net_init+0x10/0x10 [ 1390.870969][T25894] ? rcu_is_watching+0x12/0xc0 [ 1390.871011][T25894] ? __pfx_audit_receive+0x10/0x10 [ 1390.871050][T25894] ? __pfx_audit_multicast_bind+0x10/0x10 [ 1390.871089][T25894] ? __pfx_audit_multicast_unbind+0x10/0x10 [ 1390.871133][T25894] ? __kmalloc_noprof+0x320/0x850 [ 1390.871180][T25894] ? __pfx_audit_net_init+0x10/0x10 [ 1390.871214][T25894] ops_init+0x1e2/0x5f0 [ 1390.871258][T25894] setup_net+0x118/0x3a0 [ 1390.871297][T25894] ? __pfx_setup_net+0x10/0x10 [ 1390.871334][T25894] ? lockdep_init_map_type+0x5c/0x250 [ 1390.871370][T25894] ? mutex_init_lockep+0x110/0x150 [ 1390.871410][T25894] copy_net_ns+0x46f/0x7c0 [ 1390.871452][T25894] create_new_namespaces+0x3ea/0xac0 [ 1390.871489][T25894] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1390.871523][T25894] ksys_unshare+0x473/0xad0 [ 1390.871561][T25894] ? __pfx_ksys_unshare+0x10/0x10 [ 1390.871611][T25894] __x64_sys_unshare+0x31/0x40 [ 1390.871645][T25894] do_syscall_64+0x106/0xf80 [ 1390.871683][T25894] ? clear_bhb_loop+0x40/0x90 [ 1390.871729][T25894] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1390.871759][T25894] RIP: 0033:0x7f2c4239c799 [ 1390.871785][T25894] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1390.871815][T25894] RSP: 002b:00007f2c405f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1390.871845][T25894] RAX: ffffffffffffffda RBX: 00007f2c42615fa0 RCX: 00007f2c4239c799 [ 1390.871865][T25894] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1390.871883][T25894] RBP: 00007f2c42432c99 R08: 0000000000000000 R09: 0000000000000000 [ 1390.871901][T25894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1390.871919][T25894] R13: 00007f2c42616038 R14: 00007f2c42615fa0 R15: 00007ffe34a62878 [ 1390.871961][T25894] [ 1391.242772][T25894] audit: cannot initialize netlink socket in namespace [ 1391.489462][T25902] FAULT_INJECTION: forcing a failure. [ 1391.489462][T25902] name failslab, interval 1, probability 0, space 0, times 0 [ 1391.512613][T25902] CPU: 0 UID: 0 PID: 25902 Comm: syz.3.3680 Tainted: G L syzkaller #0 PREEMPT(full) [ 1391.512659][T25902] Tainted: [L]=SOFTLOCKUP [ 1391.512670][T25902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1391.512687][T25902] Call Trace: [ 1391.512696][T25902] [ 1391.512706][T25902] dump_stack_lvl+0x100/0x190 [ 1391.512753][T25902] should_fail_ex.cold+0x5/0xa [ 1391.512786][T25902] should_failslab+0xc2/0x120 [ 1391.512819][T25902] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1391.512861][T25902] ? security_inode_alloc+0x3b/0x2c0 [ 1391.512891][T25902] ? lockdep_init_map_type+0x5c/0x250 [ 1391.512935][T25902] security_inode_alloc+0x3b/0x2c0 [ 1391.512967][T25902] inode_init_always_gfp+0xced/0x1040 [ 1391.513003][T25902] alloc_inode+0x8e/0x250 [ 1391.513040][T25902] sock_alloc+0x44/0x280 [ 1391.513080][T25902] ? security_socket_create+0x7f/0x250 [ 1391.513127][T25902] __sock_create+0xc2/0x860 [ 1391.513173][T25902] udp_sock_create6+0xc7/0x6a0 [ 1391.513216][T25902] ? __pfx_udp_sock_create6+0x10/0x10 [ 1391.513263][T25902] ? crng_make_state+0x477/0x6c0 [ 1391.513290][T25902] ? lockdep_hardirqs_on+0x78/0x100 [ 1391.513329][T25902] ? crng_make_state+0x2b0/0x6c0 [ 1391.513362][T25902] rxrpc_open_socket+0x206/0x6b0 [ 1391.513393][T25902] ? __pfx_rxrpc_open_socket+0x10/0x10 [ 1391.513443][T25902] ? rcu_is_watching+0x12/0xc0 [ 1391.513490][T25902] rxrpc_lookup_local+0xac7/0x1220 [ 1391.513527][T25902] ? __pfx_rxrpc_lookup_local+0x10/0x10 [ 1391.513561][T25902] ? __local_bh_enable_ip+0x9e/0x120 [ 1391.513596][T25902] rxrpc_sendmsg+0x34a/0x680 [ 1391.513635][T25902] sock_write_iter+0x524/0x5a0 [ 1391.513662][T25902] ? __pfx_rxrpc_sendmsg+0x10/0x10 [ 1391.513694][T25902] ? __pfx_sock_write_iter+0x10/0x10 [ 1391.513738][T25902] ? bpf_lsm_file_permission+0x9/0x10 [ 1391.513780][T25902] ? security_file_permission+0x76/0x210 [ 1391.513815][T25902] ? rw_verify_area+0xce/0x6d0 [ 1391.513858][T25902] vfs_write+0x6ac/0x1070 [ 1391.513903][T25902] ? __pfx_sock_write_iter+0x10/0x10 [ 1391.513936][T25902] ? __pfx_vfs_write+0x10/0x10 [ 1391.513977][T25902] ? find_held_lock+0x2b/0x80 [ 1391.514029][T25902] ksys_write+0x1f8/0x250 [ 1391.514056][T25902] ? __pfx_ksys_write+0x10/0x10 [ 1391.514095][T25902] do_syscall_64+0x106/0xf80 [ 1391.514132][T25902] ? clear_bhb_loop+0x40/0x90 [ 1391.514174][T25902] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1391.514205][T25902] RIP: 0033:0x7fcdadf9c799 [ 1391.514230][T25902] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1391.514260][T25902] RSP: 002b:00007fcdac1f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1391.514289][T25902] RAX: ffffffffffffffda RBX: 00007fcdae215fa0 RCX: 00007fcdadf9c799 [ 1391.514309][T25902] RDX: 0000000000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 1391.514326][T25902] RBP: 00007fcdae032c99 R08: 0000000000000000 R09: 0000000000000000 [ 1391.514341][T25902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1391.514356][T25902] R13: 00007fcdae216038 R14: 00007fcdae215fa0 R15: 00007ffe332441f8 [ 1391.514393][T25902] [ 1391.514428][T25902] socket: no more sockets [ 1392.006543][T25912] FAULT_INJECTION: forcing a failure. [ 1392.006543][T25912] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.060751][T25912] CPU: 0 UID: 0 PID: 25912 Comm: syz.3.3685 Tainted: G L syzkaller #0 PREEMPT(full) [ 1392.060796][T25912] Tainted: [L]=SOFTLOCKUP [ 1392.060806][T25912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1392.060823][T25912] Call Trace: [ 1392.060833][T25912] [ 1392.060844][T25912] dump_stack_lvl+0x100/0x190 [ 1392.060891][T25912] should_fail_ex.cold+0x5/0xa [ 1392.060926][T25912] should_failslab+0xc2/0x120 [ 1392.060956][T25912] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1392.060990][T25912] ? uevent_net_init+0xd3/0x330 [ 1392.061027][T25912] uevent_net_init+0xd3/0x330 [ 1392.061056][T25912] ? __pfx_uevent_net_init+0x10/0x10 [ 1392.061087][T25912] ? __pfx_uevent_net_rcv+0x10/0x10 [ 1392.061117][T25912] ? __kmalloc_noprof+0x320/0x850 [ 1392.061161][T25912] ? __pfx_uevent_net_init+0x10/0x10 [ 1392.061187][T25912] ops_init+0x1e2/0x5f0 [ 1392.061231][T25912] setup_net+0x118/0x3a0 [ 1392.061269][T25912] ? __pfx_setup_net+0x10/0x10 [ 1392.061306][T25912] ? lockdep_init_map_type+0x5c/0x250 [ 1392.061342][T25912] ? mutex_init_lockep+0x110/0x150 [ 1392.061382][T25912] copy_net_ns+0x46f/0x7c0 [ 1392.061429][T25912] create_new_namespaces+0x3ea/0xac0 [ 1392.061467][T25912] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1392.061501][T25912] ksys_unshare+0x473/0xad0 [ 1392.061538][T25912] ? __pfx_ksys_unshare+0x10/0x10 [ 1392.061585][T25912] __x64_sys_unshare+0x31/0x40 [ 1392.061618][T25912] do_syscall_64+0x106/0xf80 [ 1392.061667][T25912] ? clear_bhb_loop+0x40/0x90 [ 1392.061701][T25912] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1392.061729][T25912] RIP: 0033:0x7fcdadf9c799 [ 1392.061752][T25912] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1392.061785][T25912] RSP: 002b:00007fcdac1f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1392.061813][T25912] RAX: ffffffffffffffda RBX: 00007fcdae215fa0 RCX: 00007fcdadf9c799 [ 1392.061833][T25912] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1392.061852][T25912] RBP: 00007fcdae032c99 R08: 0000000000000000 R09: 0000000000000000 [ 1392.061869][T25912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1392.061884][T25912] R13: 00007fcdae216038 R14: 00007fcdae215fa0 R15: 00007ffe332441f8 [ 1392.061922][T25912] [ 1392.574338][T25916] random: crng reseeded on system resumption [ 1392.750608][T25928] FAULT_INJECTION: forcing a failure. [ 1392.750608][T25928] name failslab, interval 1, probability 0, space 0, times 0 [ 1392.833245][T25928] CPU: 1 UID: 0 PID: 25928 Comm: syz.4.3689 Tainted: G L syzkaller #0 PREEMPT(full) [ 1392.833295][T25928] Tainted: [L]=SOFTLOCKUP [ 1392.833306][T25928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1392.833324][T25928] Call Trace: [ 1392.833335][T25928] [ 1392.833347][T25928] dump_stack_lvl+0x100/0x190 [ 1392.833397][T25928] should_fail_ex.cold+0x5/0xa [ 1392.833434][T25928] ? sk_prot_alloc+0x10b/0x2a0 [ 1392.833461][T25928] should_failslab+0xc2/0x120 [ 1392.833493][T25928] __kmalloc_noprof+0xe0/0x850 [ 1392.833533][T25928] ? security_inode_alloc+0xcf/0x2c0 [ 1392.833577][T25928] sk_prot_alloc+0x10b/0x2a0 [ 1392.833610][T25928] sk_alloc+0x36/0xe80 [ 1392.833649][T25928] __netlink_create+0x5e/0x2c0 [ 1392.833689][T25928] __netlink_kernel_create+0xed/0x750 [ 1392.833734][T25928] ? __pfx___netlink_kernel_create+0x10/0x10 [ 1392.833788][T25928] uevent_net_init+0xf8/0x330 [ 1392.833819][T25928] ? __pfx_uevent_net_init+0x10/0x10 [ 1392.833851][T25928] ? __pfx_uevent_net_rcv+0x10/0x10 [ 1392.833881][T25928] ? __kmalloc_noprof+0x320/0x850 [ 1392.833929][T25928] ? __pfx_uevent_net_init+0x10/0x10 [ 1392.833957][T25928] ops_init+0x1e2/0x5f0 [ 1392.834002][T25928] setup_net+0x118/0x3a0 [ 1392.834043][T25928] ? __pfx_setup_net+0x10/0x10 [ 1392.834079][T25928] ? lockdep_init_map_type+0x5c/0x250 [ 1392.834119][T25928] ? mutex_init_lockep+0x110/0x150 [ 1392.834163][T25928] copy_net_ns+0x46f/0x7c0 [ 1392.834210][T25928] create_new_namespaces+0x3ea/0xac0 [ 1392.834250][T25928] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1392.834285][T25928] ksys_unshare+0x473/0xad0 [ 1392.834322][T25928] ? __pfx_ksys_unshare+0x10/0x10 [ 1392.834372][T25928] __x64_sys_unshare+0x31/0x40 [ 1392.834407][T25928] do_syscall_64+0x106/0xf80 [ 1392.834444][T25928] ? clear_bhb_loop+0x40/0x90 [ 1392.834479][T25928] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1392.834509][T25928] RIP: 0033:0x7f284f59c799 [ 1392.834534][T25928] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1392.834570][T25928] RSP: 002b:00007f285044e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1392.834599][T25928] RAX: ffffffffffffffda RBX: 00007f284f815fa0 RCX: 00007f284f59c799 [ 1392.834619][T25928] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1392.834638][T25928] RBP: 00007f284f632c99 R08: 0000000000000000 R09: 0000000000000000 [ 1392.834657][T25928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1392.834676][T25928] R13: 00007f284f816038 R14: 00007f284f815fa0 R15: 00007ffd4c1c7d18 [ 1392.834716][T25928] [ 1392.834907][T25928] kobject_uevent: unable to create netlink socket! [ 1393.337516][T25939] FAULT_INJECTION: forcing a failure. [ 1393.337516][T25939] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.362620][T25939] CPU: 0 UID: 0 PID: 25939 Comm: syz.1.3692 Tainted: G L syzkaller #0 PREEMPT(full) [ 1393.362665][T25939] Tainted: [L]=SOFTLOCKUP [ 1393.362676][T25939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1393.362694][T25939] Call Trace: [ 1393.362703][T25939] [ 1393.362714][T25939] dump_stack_lvl+0x100/0x190 [ 1393.362762][T25939] should_fail_ex.cold+0x5/0xa [ 1393.362797][T25939] should_failslab+0xc2/0x120 [ 1393.362826][T25939] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1393.362864][T25939] ? rxrpc_lookup_local+0x3f7/0x1220 [ 1393.362900][T25939] rxrpc_lookup_local+0x3f7/0x1220 [ 1393.362934][T25939] ? __pfx_rxrpc_lookup_local+0x10/0x10 [ 1393.362966][T25939] ? __local_bh_enable_ip+0x9e/0x120 [ 1393.362998][T25939] rxrpc_sendmsg+0x34a/0x680 [ 1393.363045][T25939] sock_write_iter+0x524/0x5a0 [ 1393.363074][T25939] ? __pfx_rxrpc_sendmsg+0x10/0x10 [ 1393.363106][T25939] ? __pfx_sock_write_iter+0x10/0x10 [ 1393.363148][T25939] ? bpf_lsm_file_permission+0x9/0x10 [ 1393.363190][T25939] ? security_file_permission+0x76/0x210 [ 1393.363225][T25939] ? rw_verify_area+0xce/0x6d0 [ 1393.363267][T25939] vfs_write+0x6ac/0x1070 [ 1393.363309][T25939] ? __pfx_sock_write_iter+0x10/0x10 [ 1393.363341][T25939] ? __pfx_vfs_write+0x10/0x10 [ 1393.363380][T25939] ? find_held_lock+0x2b/0x80 [ 1393.363433][T25939] ksys_write+0x1f8/0x250 [ 1393.363458][T25939] ? __pfx_ksys_write+0x10/0x10 [ 1393.363497][T25939] do_syscall_64+0x106/0xf80 [ 1393.363534][T25939] ? clear_bhb_loop+0x40/0x90 [ 1393.363569][T25939] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1393.363599][T25939] RIP: 0033:0x7f6e5619c799 [ 1393.363623][T25939] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1393.363652][T25939] RSP: 002b:00007f6e56fb0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1393.363678][T25939] RAX: ffffffffffffffda RBX: 00007f6e56415fa0 RCX: 00007f6e5619c799 [ 1393.363697][T25939] RDX: 0000000000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 1393.363714][T25939] RBP: 00007f6e56232c99 R08: 0000000000000000 R09: 0000000000000000 [ 1393.363731][T25939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1393.363749][T25939] R13: 00007f6e56416038 R14: 00007f6e56415fa0 R15: 00007ffe0582ffb8 [ 1393.363788][T25939] [ 1393.789799][T25947] random: crng reseeded on system resumption [ 1393.838884][T25950] FAULT_INJECTION: forcing a failure. [ 1393.838884][T25950] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.873918][T25950] CPU: 0 UID: 0 PID: 25950 Comm: syz.2.3694 Tainted: G L syzkaller #0 PREEMPT(full) [ 1393.873968][T25950] Tainted: [L]=SOFTLOCKUP [ 1393.873980][T25950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1393.874008][T25950] Call Trace: [ 1393.874019][T25950] [ 1393.874031][T25950] dump_stack_lvl+0x100/0x190 [ 1393.874080][T25950] should_fail_ex.cold+0x5/0xa [ 1393.874117][T25950] should_failslab+0xc2/0x120 [ 1393.874149][T25950] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1393.874186][T25950] ? handle_policy_update+0xd0/0xf00 [ 1393.874233][T25950] handle_policy_update+0xd0/0xf00 [ 1393.874273][T25950] ? __pfx___might_resched+0x10/0x10 [ 1393.874314][T25950] ? lock_acquire+0x1cf/0x380 [ 1393.874351][T25950] ? __pfx_handle_policy_update+0x10/0x10 [ 1393.874390][T25950] ? apparmor_capable+0x1d7/0x4d0 [ 1393.874422][T25950] ? bpf_lsm_capable+0x9/0x10 [ 1393.874451][T25950] ? security_capable+0x80/0x260 [ 1393.874497][T25950] safesetid_gid_file_write+0x87/0xc0 [ 1393.874540][T25950] vfs_write+0x2aa/0x1070 [ 1393.874584][T25950] ? __pfx_safesetid_gid_file_write+0x10/0x10 [ 1393.874629][T25950] ? __pfx_vfs_write+0x10/0x10 [ 1393.874671][T25950] ? __fget_files+0x215/0x3d0 [ 1393.874708][T25950] ? __fget_files+0x21f/0x3d0 [ 1393.874746][T25950] ksys_write+0x12a/0x250 [ 1393.874773][T25950] ? __pfx_ksys_write+0x10/0x10 [ 1393.874812][T25950] do_syscall_64+0x106/0xf80 [ 1393.874850][T25950] ? clear_bhb_loop+0x40/0x90 [ 1393.874886][T25950] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1393.874917][T25950] RIP: 0033:0x7f2c4239c799 [ 1393.874942][T25950] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1393.874971][T25950] RSP: 002b:00007f2c405f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1393.875006][T25950] RAX: ffffffffffffffda RBX: 00007f2c42615fa0 RCX: 00007f2c4239c799 [ 1393.875025][T25950] RDX: 0000000000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 1393.875043][T25950] RBP: 00007f2c42432c99 R08: 0000000000000000 R09: 0000000000000000 [ 1393.875062][T25950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1393.875078][T25950] R13: 00007f2c42616038 R14: 00007f2c42615fa0 R15: 00007ffe34a62878 [ 1393.875119][T25950] [ 1394.681137][T25970] netlink: 350 bytes leftover after parsing attributes in process `syz.2.3700'. [ 1394.996088][T25980] random: crng reseeded on system resumption [ 1396.287997][T26009] netlink: 350 bytes leftover after parsing attributes in process `syz.1.3712'. [ 1396.639830][T26018] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input202 [ 1397.519220][T26034] random: crng reseeded on system resumption [ 1399.180708][T26066] kvm: vcpu 4: requested lapic timer restore with starting count register 0x390=4294967104 (137438947328 ns) > initial count (6624 ns). Using initial count to start timer. [ 1400.768001][T26089] random: crng reseeded on system resumption [ 1401.084934][T26021] kexec: Could not allocate control_code_buffer [ 1401.612142][T26107] netlink: 350 bytes leftover after parsing attributes in process `syz.1.3736'. [ 1401.837113][T26110] random: crng reseeded on system resumption [ 1401.880104][T26110] FAULT_INJECTION: forcing a failure. [ 1401.880104][T26110] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1401.924514][T26110] CPU: 1 UID: 0 PID: 26110 Comm: syz.4.3735 Tainted: G L syzkaller #0 PREEMPT(full) [ 1401.924563][T26110] Tainted: [L]=SOFTLOCKUP [ 1401.924575][T26110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1401.924593][T26110] Call Trace: [ 1401.924603][T26110] [ 1401.924615][T26110] dump_stack_lvl+0x100/0x190 [ 1401.924662][T26110] should_fail_ex.cold+0x5/0xa [ 1401.924692][T26110] ? prepare_alloc_pages+0x16d/0x5f0 [ 1401.924728][T26110] should_fail_alloc_page+0xeb/0x140 [ 1401.924761][T26110] prepare_alloc_pages+0x1f0/0x5f0 [ 1401.924801][T26110] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1401.924846][T26110] ? __alloc_frozen_pages_noprof+0x2b1/0x2ba0 [ 1401.924900][T26110] ? stack_trace_save+0x8e/0xc0 [ 1401.924930][T26110] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1401.924971][T26110] ? stack_depot_save_flags+0x27/0x9d0 [ 1401.925006][T26110] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1401.925060][T26110] ? kasan_save_stack+0x3f/0x50 [ 1401.925099][T26110] ? kasan_save_stack+0x30/0x50 [ 1401.925135][T26110] ? kasan_save_track+0x14/0x30 [ 1401.925180][T26110] ? do_sys_openat2+0x10d/0x1e0 [ 1401.925212][T26110] ? __x64_sys_openat+0x12d/0x210 [ 1401.925245][T26110] ? do_syscall_64+0x106/0xf80 [ 1401.925282][T26110] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1401.925312][T26110] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1401.925357][T26110] ? policy_nodemask+0xed/0x4f0 [ 1401.925391][T26110] alloc_pages_mpol+0x1fb/0x550 [ 1401.925423][T26110] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1401.925455][T26110] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1401.925502][T26110] alloc_pages_noprof+0x131/0x390 [ 1401.925536][T26110] get_zeroed_page_noprof+0x18/0xb0 [ 1401.925568][T26110] get_image_page+0x18/0x1a0 [ 1401.925611][T26110] alloc_rtree_node+0x3c/0xb0 [ 1401.925653][T26110] memory_bm_create+0x65e/0xba0 [ 1401.925713][T26110] create_basic_memory_bitmaps+0xbd/0x350 [ 1401.925750][T26110] snapshot_open+0x230/0x2a0 [ 1401.925782][T26110] ? __pfx_snapshot_open+0x10/0x10 [ 1401.925815][T26110] misc_open+0x26d/0x450 [ 1401.925847][T26110] ? __pfx_misc_open+0x10/0x10 [ 1401.925877][T26110] chrdev_open+0x234/0x6a0 [ 1401.925905][T26110] ? __pfx_apparmor_file_open+0x10/0x10 [ 1401.925950][T26110] ? __pfx_chrdev_open+0x10/0x10 [ 1401.925981][T26110] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1401.926017][T26110] do_dentry_open+0x6d8/0x1660 [ 1401.926044][T26110] ? __pfx_chrdev_open+0x10/0x10 [ 1401.926089][T26110] vfs_open+0x82/0x3f0 [ 1401.926129][T26110] path_openat+0x208c/0x31a0 [ 1401.926170][T26110] ? __pfx_path_openat+0x10/0x10 [ 1401.926212][T26110] do_file_open+0x20e/0x430 [ 1401.926244][T26110] ? __pfx_do_file_open+0x10/0x10 [ 1401.926301][T26110] ? alloc_fd+0x476/0x790 [ 1401.926332][T26110] ? do_getname+0x191/0x390 [ 1401.926370][T26110] do_sys_openat2+0x10d/0x1e0 [ 1401.926403][T26110] ? __pfx_do_sys_openat2+0x10/0x10 [ 1401.926437][T26110] ? find_held_lock+0x2b/0x80 [ 1401.926471][T26110] __x64_sys_openat+0x12d/0x210 [ 1401.926506][T26110] ? __pfx___x64_sys_openat+0x10/0x10 [ 1401.926557][T26110] do_syscall_64+0x106/0xf80 [ 1401.926592][T26110] ? clear_bhb_loop+0x40/0x90 [ 1401.926626][T26110] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1401.926654][T26110] RIP: 0033:0x7f284f59c799 [ 1401.926677][T26110] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1401.926705][T26110] RSP: 002b:00007f285042d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1401.926734][T26110] RAX: ffffffffffffffda RBX: 00007f284f816090 RCX: 00007f284f59c799 [ 1401.926754][T26110] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1401.926773][T26110] RBP: 00007f284f632c99 R08: 0000000000000000 R09: 0000000000000000 [ 1401.926791][T26110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1401.926808][T26110] R13: 00007f284f816128 R14: 00007f284f816090 R15: 00007ffd4c1c7d18 [ 1401.926848][T26110] [ 1402.364101][T26116] random: crng reseeded on system resumption [ 1402.927598][T26131] random: crng reseeded on system resumption [ 1403.660092][T26156] kvm: vcpu 4: requested lapic timer restore with starting count register 0x390=4294967104 (137438947328 ns) > initial count (6624 ns). Using initial count to start timer. [ 1404.100889][T26159] random: crng reseeded on system resumption [ 1404.790771][T26185] random: crng reseeded on system resumption [ 1405.277245][T26192] random: crng reseeded on system resumption [ 1405.323707][T26192] FAULT_INJECTION: forcing a failure. [ 1405.323707][T26192] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1405.337063][T26192] CPU: 0 UID: 0 PID: 26192 Comm: syz.4.3760 Tainted: G L syzkaller #0 PREEMPT(full) [ 1405.337107][T26192] Tainted: [L]=SOFTLOCKUP [ 1405.337118][T26192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1405.337135][T26192] Call Trace: [ 1405.337146][T26192] [ 1405.337159][T26192] dump_stack_lvl+0x100/0x190 [ 1405.337207][T26192] should_fail_ex.cold+0x5/0xa [ 1405.337233][T26192] ? prepare_alloc_pages+0x16d/0x5f0 [ 1405.337269][T26192] should_fail_alloc_page+0xeb/0x140 [ 1405.337303][T26192] prepare_alloc_pages+0x1f0/0x5f0 [ 1405.337344][T26192] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1405.337389][T26192] ? __alloc_frozen_pages_noprof+0x2b1/0x2ba0 [ 1405.337455][T26192] ? stack_trace_save+0x8e/0xc0 [ 1405.337484][T26192] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1405.337524][T26192] ? stack_depot_save_flags+0x27/0x9d0 [ 1405.337558][T26192] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1405.337601][T26192] ? kasan_save_stack+0x3f/0x50 [ 1405.337638][T26192] ? kasan_save_stack+0x30/0x50 [ 1405.337673][T26192] ? kasan_save_track+0x14/0x30 [ 1405.337714][T26192] ? do_sys_openat2+0x10d/0x1e0 [ 1405.337744][T26192] ? __x64_sys_openat+0x12d/0x210 [ 1405.337775][T26192] ? do_syscall_64+0x106/0xf80 [ 1405.337812][T26192] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1405.337849][T26192] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1405.337899][T26192] ? policy_nodemask+0xed/0x4f0 [ 1405.337931][T26192] alloc_pages_mpol+0x1fb/0x550 [ 1405.337964][T26192] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1405.337995][T26192] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1405.338033][T26192] alloc_pages_noprof+0x131/0x390 [ 1405.338066][T26192] get_zeroed_page_noprof+0x18/0xb0 [ 1405.338098][T26192] get_image_page+0x18/0x1a0 [ 1405.338141][T26192] alloc_rtree_node+0x3c/0xb0 [ 1405.338185][T26192] memory_bm_create+0x65e/0xba0 [ 1405.338247][T26192] create_basic_memory_bitmaps+0xbd/0x350 [ 1405.338284][T26192] snapshot_open+0x230/0x2a0 [ 1405.338315][T26192] ? __pfx_snapshot_open+0x10/0x10 [ 1405.338348][T26192] misc_open+0x26d/0x450 [ 1405.338380][T26192] ? __pfx_misc_open+0x10/0x10 [ 1405.338419][T26192] chrdev_open+0x234/0x6a0 [ 1405.338449][T26192] ? __pfx_apparmor_file_open+0x10/0x10 [ 1405.338495][T26192] ? __pfx_chrdev_open+0x10/0x10 [ 1405.338527][T26192] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1405.338566][T26192] do_dentry_open+0x6d8/0x1660 [ 1405.338594][T26192] ? __pfx_chrdev_open+0x10/0x10 [ 1405.338633][T26192] vfs_open+0x82/0x3f0 [ 1405.338673][T26192] path_openat+0x208c/0x31a0 [ 1405.338716][T26192] ? __pfx_path_openat+0x10/0x10 [ 1405.338760][T26192] do_file_open+0x20e/0x430 [ 1405.338793][T26192] ? __pfx_do_file_open+0x10/0x10 [ 1405.338852][T26192] ? alloc_fd+0x476/0x790 [ 1405.338885][T26192] ? do_getname+0x191/0x390 [ 1405.338923][T26192] do_sys_openat2+0x10d/0x1e0 [ 1405.338960][T26192] ? __pfx_do_sys_openat2+0x10/0x10 [ 1405.338998][T26192] ? find_held_lock+0x2b/0x80 [ 1405.339036][T26192] __x64_sys_openat+0x12d/0x210 [ 1405.339074][T26192] ? __pfx___x64_sys_openat+0x10/0x10 [ 1405.339126][T26192] do_syscall_64+0x106/0xf80 [ 1405.339164][T26192] ? clear_bhb_loop+0x40/0x90 [ 1405.339199][T26192] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1405.339228][T26192] RIP: 0033:0x7f284f59c799 [ 1405.339252][T26192] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1405.339282][T26192] RSP: 002b:00007f285042d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1405.339311][T26192] RAX: ffffffffffffffda RBX: 00007f284f816090 RCX: 00007f284f59c799 [ 1405.339332][T26192] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1405.339351][T26192] RBP: 00007f284f632c99 R08: 0000000000000000 R09: 0000000000000000 [ 1405.339370][T26192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1405.339388][T26192] R13: 00007f284f816128 R14: 00007f284f816090 R15: 00007ffd4c1c7d18 [ 1405.339436][T26192] [ 1407.365492][T26242] random: crng reseeded on system resumption [ 1408.823407][T26273] random: crng reseeded on system resumption [ 1408.926139][T26273] FAULT_INJECTION: forcing a failure. [ 1408.926139][T26273] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1409.104019][T26273] CPU: 0 UID: 0 PID: 26273 Comm: syz.3.3774 Tainted: G L syzkaller #0 PREEMPT(full) [ 1409.104068][T26273] Tainted: [L]=SOFTLOCKUP [ 1409.104079][T26273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1409.104095][T26273] Call Trace: [ 1409.104104][T26273] [ 1409.104115][T26273] dump_stack_lvl+0x100/0x190 [ 1409.104165][T26273] should_fail_ex.cold+0x5/0xa [ 1409.104194][T26273] ? prepare_alloc_pages+0x16d/0x5f0 [ 1409.104230][T26273] should_fail_alloc_page+0xeb/0x140 [ 1409.104261][T26273] prepare_alloc_pages+0x1f0/0x5f0 [ 1409.104299][T26273] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1409.104342][T26273] ? __alloc_frozen_pages_noprof+0x2b1/0x2ba0 [ 1409.104393][T26273] ? stack_trace_save+0x8e/0xc0 [ 1409.104420][T26273] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1409.104460][T26273] ? stack_depot_save_flags+0x27/0x9d0 [ 1409.104498][T26273] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1409.104545][T26273] ? kasan_save_stack+0x3f/0x50 [ 1409.104587][T26273] ? kasan_save_stack+0x30/0x50 [ 1409.104626][T26273] ? kasan_save_track+0x14/0x30 [ 1409.104675][T26273] ? do_sys_openat2+0x10d/0x1e0 [ 1409.104709][T26273] ? __x64_sys_openat+0x12d/0x210 [ 1409.104744][T26273] ? do_syscall_64+0x106/0xf80 [ 1409.104781][T26273] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1409.104814][T26273] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1409.104862][T26273] ? policy_nodemask+0xed/0x4f0 [ 1409.104896][T26273] alloc_pages_mpol+0x1fb/0x550 [ 1409.104929][T26273] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1409.104962][T26273] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1409.105006][T26273] alloc_pages_noprof+0x131/0x390 [ 1409.105041][T26273] get_zeroed_page_noprof+0x18/0xb0 [ 1409.105073][T26273] get_image_page+0x18/0x1a0 [ 1409.105119][T26273] alloc_rtree_node+0x3c/0xb0 [ 1409.105163][T26273] memory_bm_create+0x65e/0xba0 [ 1409.105225][T26273] create_basic_memory_bitmaps+0xbd/0x350 [ 1409.105262][T26273] snapshot_open+0x230/0x2a0 [ 1409.105293][T26273] ? __pfx_snapshot_open+0x10/0x10 [ 1409.105327][T26273] misc_open+0x26d/0x450 [ 1409.105358][T26273] ? __pfx_misc_open+0x10/0x10 [ 1409.105389][T26273] chrdev_open+0x234/0x6a0 [ 1409.105417][T26273] ? __pfx_apparmor_file_open+0x10/0x10 [ 1409.105462][T26273] ? __pfx_chrdev_open+0x10/0x10 [ 1409.105493][T26273] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1409.105532][T26273] do_dentry_open+0x6d8/0x1660 [ 1409.105560][T26273] ? __pfx_chrdev_open+0x10/0x10 [ 1409.105599][T26273] vfs_open+0x82/0x3f0 [ 1409.105637][T26273] path_openat+0x208c/0x31a0 [ 1409.105677][T26273] ? __pfx_path_openat+0x10/0x10 [ 1409.105721][T26273] do_file_open+0x20e/0x430 [ 1409.105754][T26273] ? __pfx_do_file_open+0x10/0x10 [ 1409.105812][T26273] ? alloc_fd+0x476/0x790 [ 1409.105843][T26273] ? do_getname+0x191/0x390 [ 1409.105881][T26273] do_sys_openat2+0x10d/0x1e0 [ 1409.105917][T26273] ? __pfx_do_sys_openat2+0x10/0x10 [ 1409.105955][T26273] ? find_held_lock+0x2b/0x80 [ 1409.105998][T26273] __x64_sys_openat+0x12d/0x210 [ 1409.106037][T26273] ? __pfx___x64_sys_openat+0x10/0x10 [ 1409.106091][T26273] do_syscall_64+0x106/0xf80 [ 1409.106128][T26273] ? clear_bhb_loop+0x40/0x90 [ 1409.106163][T26273] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1409.106192][T26273] RIP: 0033:0x7fcdadf9c799 [ 1409.106216][T26273] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1409.106244][T26273] RSP: 002b:00007fcdac1b4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1409.106272][T26273] RAX: ffffffffffffffda RBX: 00007fcdae216180 RCX: 00007fcdadf9c799 [ 1409.106292][T26273] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1409.106313][T26273] RBP: 00007fcdae032c99 R08: 0000000000000000 R09: 0000000000000000 [ 1409.106331][T26273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1409.106348][T26273] R13: 00007fcdae216218 R14: 00007fcdae216180 R15: 00007ffe332441f8 [ 1409.106389][T26273] [ 1410.213880][T26298] random: crng reseeded on system resumption [ 1410.744581][T26306] random: crng reseeded on system resumption [ 1411.215332][T26321] kvm: vcpu 4: requested lapic timer restore with starting count register 0x390=4294967104 (137438947328 ns) > initial count (6624 ns). Using initial count to start timer. [ 1411.489708][T26329] FAULT_INJECTION: forcing a failure. [ 1411.489708][T26329] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.549822][T26329] CPU: 0 UID: 0 PID: 26329 Comm: syz.4.3789 Tainted: G L syzkaller #0 PREEMPT(full) [ 1411.549847][T26329] Tainted: [L]=SOFTLOCKUP [ 1411.549852][T26329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1411.549861][T26329] Call Trace: [ 1411.549866][T26329] [ 1411.549872][T26329] dump_stack_lvl+0x100/0x190 [ 1411.549898][T26329] should_fail_ex.cold+0x5/0xa [ 1411.549916][T26329] should_failslab+0xc2/0x120 [ 1411.549931][T26329] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1411.549952][T26329] ? anon_vma_clone+0x2bd/0xc70 [ 1411.549973][T26329] anon_vma_clone+0x2bd/0xc70 [ 1411.549995][T26329] dup_anon_vma+0x1c5/0x2f0 [ 1411.550016][T26329] vma_modify+0x16fd/0x2250 [ 1411.550039][T26329] ? __pfx_vma_modify+0x10/0x10 [ 1411.550063][T26329] vma_modify_flags+0x257/0x3d0 [ 1411.550083][T26329] ? __pfx_vma_modify_flags+0x10/0x10 [ 1411.550115][T26329] ? may_expand_vm+0xf3/0x250 [ 1411.550139][T26329] mprotect_fixup+0x209/0xb70 [ 1411.550161][T26329] ? __pfx_mprotect_fixup+0x10/0x10 [ 1411.550181][T26329] ? __pfx_mas_prev+0x10/0x10 [ 1411.550206][T26329] do_mprotect_pkey+0x9e1/0xe70 [ 1411.550230][T26329] ? __pfx_do_mprotect_pkey+0x10/0x10 [ 1411.550250][T26329] ? __mutex_unlock_slowpath+0x15c/0x790 [ 1411.550283][T26329] ? __fget_files+0x21f/0x3d0 [ 1411.550304][T26329] ? __pfx_ksys_write+0x10/0x10 [ 1411.550321][T26329] __x64_sys_mprotect+0x78/0xc0 [ 1411.550338][T26329] ? lockdep_hardirqs_on+0x78/0x100 [ 1411.550358][T26329] do_syscall_64+0x106/0xf80 [ 1411.550377][T26329] ? clear_bhb_loop+0x40/0x90 [ 1411.550394][T26329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1411.550409][T26329] RIP: 0033:0x7f284f59c799 [ 1411.550421][T26329] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1411.550435][T26329] RSP: 002b:00007f285044e028 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 1411.550454][T26329] RAX: ffffffffffffffda RBX: 00007f284f815fa0 RCX: 00007f284f59c799 [ 1411.550464][T26329] RDX: 0000000000000006 RSI: 0000000000100004 RDI: 00001ffffffff000 [ 1411.550473][T26329] RBP: 00007f285044e090 R08: 0000000000000000 R09: 0000000000000000 [ 1411.550482][T26329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1411.550490][T26329] R13: 00007f284f816038 R14: 00007f284f815fa0 R15: 00007ffd4c1c7d18 [ 1411.550510][T26329] [ 1411.839196][T26329] ------------[ cut here ]------------ [ 1411.844830][T26329] anon_vma->num_active_vmas [ 1411.844855][T26329] WARNING: mm/rmap.c:528 at unlink_anon_vmas+0x64e/0x8e0, CPU#0: syz.4.3789/26329 [ 1411.859756][T26329] Modules linked in: [ 1411.863857][T26329] CPU: 0 UID: 0 PID: 26329 Comm: syz.4.3789 Tainted: G L syzkaller #0 PREEMPT(full) [ 1411.876276][T26329] Tainted: [L]=SOFTLOCKUP [ 1411.880585][T26329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1411.890786][T26329] RIP: 0010:unlink_anon_vmas+0x64e/0x8e0 [ 1411.896453][T26329] Code: 8b 40 30 48 39 c3 0f 85 9c 00 00 00 e8 1b 16 a8 ff 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f e9 c8 8a 30 09 e8 03 16 a8 ff 90 <0f> 0b 90 e9 2e ff ff ff e8 f5 15 a8 ff 90 0f 0b 90 e9 e0 fe ff ff [ 1411.916132][T26329] RSP: 0018:ffffc90005a37758 EFLAGS: 00010293 [ 1411.922200][T26329] RAX: 0000000000000000 RBX: ffff8880565db460 RCX: ffffffff82600047 [ 1411.930847][T26329] RDX: ffff88806c9adb80 RSI: ffffffff8260011d RDI: ffff88806c9adb80 [ 1411.939254][T26329] RBP: ffff888031379000 R08: 0000000000000007 R09: 0000000000000000 [ 1411.947263][T26329] R10: ffffffffffffffff R11: 0000000000000000 R12: dffffc0000000000 [ 1411.955296][T26329] R13: ffff888029aed2a0 R14: ffff8880565db470 R15: ffff888029aed2b0 [ 1411.963312][T26329] FS: 0000000000000000(0000) GS:ffff88812434a000(0000) knlGS:0000000000000000 [ 1411.972244][T26329] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1411.979706][T26329] CR2: 0000000000811000 CR3: 000000000e598000 CR4: 00000000003526f0 [ 1411.988350][T26329] Call Trace: [ 1411.991619][T26329] [ 1411.994578][T26329] free_pgtables+0x2e7/0xd80 [ 1411.999163][T26329] ? __pfx_free_pgtables+0x10/0x10 [ 1412.004298][T26329] exit_mmap+0x44c/0xa30 [ 1412.008531][T26329] ? __pfx_exit_mmap+0x10/0x10 [ 1412.013372][T26329] __mmput+0x12a/0x410 [ 1412.017434][T26329] mmput+0x67/0x80 [ 1412.021155][T26329] do_exit+0x819/0x2b60 [ 1412.025324][T26329] ? __pfx_do_exit+0x10/0x10 [ 1412.029901][T26329] ? do_raw_spin_lock+0x128/0x260 [ 1412.034956][T26329] ? find_held_lock+0x2b/0x80 [ 1412.039632][T26329] ? get_signal+0x7e0/0x21e0 [ 1412.044250][T26329] do_group_exit+0xd5/0x2a0 [ 1412.048746][T26329] get_signal+0x1ec7/0x21e0 [ 1412.053277][T26329] ? __pfx_get_signal+0x10/0x10 [ 1412.058131][T26329] ? do_futex+0x192/0x350 [ 1412.062450][T26329] arch_do_signal_or_restart+0x91/0x770 [ 1412.068047][T26329] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1412.074380][T26329] ? __pfx___x64_sys_futex+0x10/0x10 [ 1412.080549][T26329] exit_to_user_mode_loop+0x86/0x4a0 [ 1412.086403][T26329] do_syscall_64+0x668/0xf80 [ 1412.091010][T26329] ? clear_bhb_loop+0x40/0x90 [ 1412.095871][T26329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1412.101755][T26329] RIP: 0033:0x7f284f59c799 [ 1412.106233][T26329] Code: Unable to access opcode bytes at 0x7f284f59c76f. [ 1412.113258][T26329] RSP: 002b:00007f285044e0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1412.121672][T26329] RAX: fffffffffffffe00 RBX: 00007f284f815fa8 RCX: 00007f284f59c799 [ 1412.129652][T26329] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f284f815fa8 [ 1412.137659][T26329] RBP: 00007f284f815fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1412.145648][T26329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1412.153630][T26329] R13: 00007f284f816038 R14: 00007ffd4c1c7c30 R15: 00007ffd4c1c7d18 [ 1412.161613][T26329] [ 1412.164671][T26329] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1412.171952][T26329] CPU: 0 UID: 0 PID: 26329 Comm: syz.4.3789 Tainted: G L syzkaller #0 PREEMPT(full) [ 1412.182877][T26329] Tainted: [L]=SOFTLOCKUP [ 1412.187190][T26329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1412.197223][T26329] Call Trace: [ 1412.200485][T26329] [ 1412.203399][T26329] dump_stack_lvl+0x100/0x190 [ 1412.208073][T26329] vpanic+0x552/0x970 [ 1412.212041][T26329] ? __pfx_vpanic+0x10/0x10 [ 1412.216539][T26329] panic+0xd1/0xe0 [ 1412.220243][T26329] ? __pfx_panic+0x10/0x10 [ 1412.224646][T26329] ? check_panic_on_warn+0x1f/0x90 [ 1412.229749][T26329] check_panic_on_warn.cold+0x19/0x34 [ 1412.235110][T26329] ? unlink_anon_vmas+0x64e/0x8e0 [ 1412.240120][T26329] __warn.cold+0x191/0x348 [ 1412.244521][T26329] __report_bug+0x296/0x3d0 [ 1412.249067][T26329] ? unlink_anon_vmas+0x64e/0x8e0 [ 1412.254081][T26329] ? __pfx___report_bug+0x10/0x10 [ 1412.259090][T26329] ? __lock_acquire+0x4a5/0x2630 [ 1412.264020][T26329] ? unlink_anon_vmas+0x64e/0x8e0 [ 1412.269030][T26329] report_bug+0xb2/0x220 [ 1412.273260][T26329] ? unlink_anon_vmas+0x64e/0x8e0 [ 1412.278287][T26329] handle_bug+0x16a/0x2a0 [ 1412.282608][T26329] exc_invalid_op+0x17/0x50 [ 1412.287115][T26329] asm_exc_invalid_op+0x1a/0x20 [ 1412.291948][T26329] RIP: 0010:unlink_anon_vmas+0x64e/0x8e0 [ 1412.297567][T26329] Code: 8b 40 30 48 39 c3 0f 85 9c 00 00 00 e8 1b 16 a8 ff 48 83 c4 28 5b 5d 41 5c 41 5d 41 5e 41 5f e9 c8 8a 30 09 e8 03 16 a8 ff 90 <0f> 0b 90 e9 2e ff ff ff e8 f5 15 a8 ff 90 0f 0b 90 e9 e0 fe ff ff [ 1412.317159][T26329] RSP: 0018:ffffc90005a37758 EFLAGS: 00010293 [ 1412.323210][T26329] RAX: 0000000000000000 RBX: ffff8880565db460 RCX: ffffffff82600047 [ 1412.331164][T26329] RDX: ffff88806c9adb80 RSI: ffffffff8260011d RDI: ffff88806c9adb80 [ 1412.339119][T26329] RBP: ffff888031379000 R08: 0000000000000007 R09: 0000000000000000 [ 1412.347073][T26329] R10: ffffffffffffffff R11: 0000000000000000 R12: dffffc0000000000 [ 1412.355024][T26329] R13: ffff888029aed2a0 R14: ffff8880565db470 R15: ffff888029aed2b0 [ 1412.362983][T26329] ? unlink_anon_vmas+0x577/0x8e0 [ 1412.367996][T26329] ? unlink_anon_vmas+0x64d/0x8e0 [ 1412.373013][T26329] ? unlink_anon_vmas+0x64d/0x8e0 [ 1412.378047][T26329] free_pgtables+0x2e7/0xd80 [ 1412.382625][T26329] ? __pfx_free_pgtables+0x10/0x10 [ 1412.387732][T26329] exit_mmap+0x44c/0xa30 [ 1412.391962][T26329] ? __pfx_exit_mmap+0x10/0x10 [ 1412.396731][T26329] __mmput+0x12a/0x410 [ 1412.400786][T26329] mmput+0x67/0x80 [ 1412.404492][T26329] do_exit+0x819/0x2b60 [ 1412.408637][T26329] ? __pfx_do_exit+0x10/0x10 [ 1412.413212][T26329] ? do_raw_spin_lock+0x128/0x260 [ 1412.418244][T26329] ? find_held_lock+0x2b/0x80 [ 1412.422902][T26329] ? get_signal+0x7e0/0x21e0 [ 1412.427478][T26329] do_group_exit+0xd5/0x2a0 [ 1412.431971][T26329] get_signal+0x1ec7/0x21e0 [ 1412.436465][T26329] ? __pfx_get_signal+0x10/0x10 [ 1412.441297][T26329] ? do_futex+0x192/0x350 [ 1412.445614][T26329] arch_do_signal_or_restart+0x91/0x770 [ 1412.451146][T26329] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1412.457292][T26329] ? __pfx___x64_sys_futex+0x10/0x10 [ 1412.462568][T26329] exit_to_user_mode_loop+0x86/0x4a0 [ 1412.467839][T26329] do_syscall_64+0x668/0xf80 [ 1412.472417][T26329] ? clear_bhb_loop+0x40/0x90 [ 1412.477083][T26329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1412.482958][T26329] RIP: 0033:0x7f284f59c799 [ 1412.487378][T26329] Code: Unable to access opcode bytes at 0x7f284f59c76f. [ 1412.494378][T26329] RSP: 002b:00007f285044e0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1412.502790][T26329] RAX: fffffffffffffe00 RBX: 00007f284f815fa8 RCX: 00007f284f59c799 [ 1412.510744][T26329] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f284f815fa8 [ 1412.518708][T26329] RBP: 00007f284f815fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1412.526658][T26329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1412.534610][T26329] R13: 00007f284f816038 R14: 00007ffd4c1c7c30 R15: 00007ffd4c1c7d18 [ 1412.542570][T26329] [ 1412.545833][T26329] Kernel Offset: disabled [ 1412.550243][T26329] Rebooting in 86400 seconds..