last executing test programs: 5.156608327s ago: executing program 1 (id=3157): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xc, 0x800008000) r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/oom_adj\x00', 0x300, 0x0) read$auto(r0, 0x0, 0x1f40) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, 0x0, 0x8002, 0x0) writev$auto(r1, &(0x7f00000000c0)={0x0, 0x7}, 0x3) mmap$auto(0x0, 0x400009, 0xdf, 0x9b72, 0x2, 0x8000) 4.894447636s ago: executing program 0 (id=3159): mmap$auto(0xa544, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x0) io_uring_setup$auto(0x6, 0x0) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) socket(0x10, 0x2, 0x4) statmount$auto(0x0, &(0x7f0000000180)={0x3, 0x1, 0x9, 0x7352, 0x3d, 0x65f, 0x1ffde, 0xa, 0x0, 0x2, 0xb, 0x3, 0x5, 0x101, 0xb4, 0x9, 0x6, 0x7ff, 0x84, 0x4, 0x0, 0x7, 0x2000, 0x203, 0x0, 0xb4, 0x4, 0x0, 0x0, 0x0, 0xfffffff9, [0x7, 0x0, 0x68, 0x0, 0x800000100000000, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0xfffffffffffffffe, 0x0, 0x1000000009d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x8, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x2, 0x9, 0xfffffffffffffffe, 0x0, 0x0, 0x3, 0x800000000000000, 0x7e30e0be]}, 0x1fe, 0xf) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) r0 = socket(0x10, 0x2, 0x0) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="11002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x24008004) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) syz_genetlink_get_family_id$auto_tipcv2(0x0, r0) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x0, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x2003f0, 0x15) madvise$auto(0x0, 0x200007, 0x19) lsm_list_modules$auto(0x0, 0x0, 0x2b7cb0f0) openat$auto_fops_atomic_t_ro_(0xffffffffffffff9c, 0x0, 0x1, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) open(&(0x7f0000000040)='./cgroup.cpu/cgroup.procs\x00', 0x101040, 0x33903f3ada88772b) r1 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/pts/ptmx\x00', 0x40001, 0x0) r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/pts/ptmx\x00', 0x0, 0x0) ioctl$auto_TCFLSH2(r2, 0x80045439, 0x0) ioctl$auto_TIOCSETD2(r1, 0x5423, 0x0) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) ioctl$auto(r1, 0x89f2, r1) sendmmsg$auto(r1, &(0x7f0000000200)={{0x0, 0x0, &(0x7f00000000c0)={0x0, 0xfc2}, 0x2, 0x0, 0x1, 0xdc5e}, 0x8}, 0x0, 0x4008) io_submit$auto(0x2, 0x7f, &(0x7f0000000040)=&(0x7f0000000000)={0x2, 0xb, 0x8, 0x3, 0x2, 0x3b, 0xfffffffffffffc00, 0x2, 0x1001, 0x0, 0x6, 0xffffffffffffffff}) ioctl$auto_TUNSETNOCSUM(r3, 0x400454c8, &(0x7f0000000300)=0x7ff) 4.768824904s ago: executing program 1 (id=3160): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x15, 0x5, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0xffff, @remote}, 0x6a) setsockopt$auto(r0, 0x114, 0x1, 0x0, 0x1b) openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x448200, 0x0) r1 = socket(0x10, 0x2, 0x0) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x11, 0x80003, 0x300) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) sendto$auto(0x3, 0x0, 0x13, 0xfffffff9, &(0x7f0000000440)=@xdp={0x2c, 0xdd86, r2, 0x10}, 0x22) unshare$auto(0x40000080) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) socket(0x2b, 0x1, 0x0) ioctl$auto(0x3, 0x8905, 0x38) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) keyctl$auto(0x1f, 0x1, 0x6, 0x3, 0x3ff) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0x2003f2, 0x15) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000803c703940d8953c231ca10c3ad1cfea4f804955b5616bca5e4fc048f1148a98b68220383b15e3458d8517aa01ec8e1a927c0429cb99d50b56468f27456f769a9eacb915b6a5dfc67c2d3315a3beec4e87bd429a200abdba755abb62596e594ae118b1453222bc02a495c9085f5dbe2dd67a5cc71e78b4de85396524bbd3175c73ac4b241f1121889cada29417bbefb8a85706451c4ce45b4e", @ANYRES64=r5, @ANYBLOB="010031bd7000fddbdf250c0000000c0003800800038004000580"], 0x20}}, 0x24048084) madvise$auto(0x0, 0x200007, 0x19) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/kfence/parameters/sample_interval\x00', 0x102, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x101001, 0x0) 4.721764285s ago: executing program 2 (id=3161): mmap$auto(0x0, 0x2020009, 0x7, 0xeb1, 0xfffffffffffffffa, 0x8000) ustat$auto(0x801, 0x0) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/midiC2D0\x00', 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) r1 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/cec4\x00', 0x101901, 0x0) ioctl$auto_CEC_ADAP_S_LOG_ADDRS(r1, 0xc05c6104, &(0x7f0000000100)={'\x00', 0x4, 0x2, 0x0, 0x9b7, 0x9, "0200000002000000997e763f222ce1", '\x00', "0001410c", "ff7f62c9", ["f5404de9641f0000000060c1", "70d9a9a3af9f39d000000001", "ef5ac4927ad89c5c00"]}) ioctl$auto(0x3, 0x4068aea3, r0) 4.637141545s ago: executing program 2 (id=3162): r0 = socket(0x2c, 0x1, 0x1) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0xffffffffffffffff, 0x8000) r1 = socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card1/pcm1p/sub6/xrun_injection\x00', 0x10000, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x4, 0x0, 0x9a6, 0x6) setsockopt$auto(0x3, 0x1, 0x1d, 0x0, 0x8) r2 = socket(0x10, 0x2, 0x0) sendmsg$auto_ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x2000000}, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200", @ANYBLOB="61e1"], 0x1ac}}, 0x40000) recvmmsg$auto(r2, &(0x7f0000000140)={{0x0, 0xfffffffe, 0x0, 0x5, 0x0, 0x200002, 0x8}, 0x801}, 0x9, 0x10, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'wg1\x00'}) setsockopt$auto(0x3, 0x1, 0x41, 0x0, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x80047453, 0x0) r3 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ram6\x00', 0x2000, 0x0) mmap$auto(0x1, 0xe981, 0xdb, 0xeb1, 0x401, 0x8000008004) mlockall$auto(0x7) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/module/i915/parameters/mitigations\x00', 0x80302, 0x0) write$auto(r4, &(0x7f0000000040)='\xcc\x04\x9a\xe1\x82\xdf\xb0v%u\xbe>\xa2]yW\x808\xa8\xc7JY\x9e\xa2\xbcb\xe7\xd1\x91<\x1e\xf1\xdbhQ\x18\x96\x85w\x85\xd5\xca', 0x6) r5 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000100), r1) sendmsg$auto_NL80211_CMD_TDLS_CHANNEL_SWITCH(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000740)={0x8a8, r5, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@NL80211_ATTR_IE={0x632, 0x2a, "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"}, @NL80211_ATTR_WIPHY_SELF_MANAGED_REG={0x4}, @NL80211_ATTR_FILS_DISCOVERY={0xcc, 0x126, 0x0, 0x1, [@NL80211_FILS_DISCOVERY_ATTR_TMPL={0xaf, 0x3, "f040aa3ab8e0f0ed847f0db582849bcde7df88ce04919055895209250d0b2b97cde08c575b396e412a9c5dc98cf860e424262e37de3c3409af1e322d686a0600f45b191e894c80eac9ca4968375c687b6b61fc309b0f0afd87dd69ee0bcdd17648ced9c93cccbda3d234f01f4d0f4b72cf4d53fca697620e3bc088658450940592396112fcb4d8d03702489013660572ecc730a32bbfb95a766ecee7386008e381740606501a7a13d26f7e"}, @NL80211_FILS_DISCOVERY_ATTR_INT_MAX={0x8, 0x2, 0x8}, @NL80211_FILS_DISCOVERY_ATTR_INT_MAX={0x8, 0x2, 0x718}, @NL80211_FILS_DISCOVERY_ATTR_INT_MIN={0x8, 0x1, 0x99}]}, @NL80211_ATTR_SCAN_SSIDS={0x18d, 0x2d, 0x0, 0x1, [@generic="210434eff97255b066d4a77d962a85161cf2a210862eb9c6ef4996f3364098bc1d23ab4d08d56c6625afbb28dc78b5a312be681e4a771624e47e1ac0b2a147a97fb33e9d8edca6371ab4e430acd30bbb4e2ca693b1e1c0cdb3e61ccacdc96b74646aadcff624f241118668ce44a390", @generic="244401d64137729456c38b78f256aab5671a8ca6e55485df6154", @typed={0x8, 0x70, 0x0, 0x0, @fd=r3}, @nested={0x8, 0x123, 0x0, 0x1, [@nested={0x4, 0x52}]}, @typed={0x14, 0x10a, 0x0, 0x0, @ipv6=@loopback}, @generic="00ca48f35ce6f014d68a4608ca53224d0e0186000b0895c5cd0daffab4b274b229ef3c82c84682fdfc564dfcd53c7f59f60018054f4de646b9b3839dd920354ca0cda74523bd635d81ecc16e5ea9e854de9cb8ef8d6a40389c337606853f4b31049feab74c97515ad4247c2e49a68ad7fdb66aad91b68a8283e107b8401fee9439d443288914e4f4fab8d5759e02fcfd520cdb189536a409485701ee6ea12944ab92499b818cd18e744f2bf70c93eb380e2104b40ea74295b4b1c9696a5513de0258c1420b90fb026602b3cc232d0f8ba5559f0cb39ad7097a2e3b5d"]}]}, 0x8a8}, 0x1, 0x0, 0x0, 0x14}, 0x400) ioctl$auto_BLKGETSIZE(r3, 0x1260, 0x0) 4.466391134s ago: executing program 0 (id=3163): r0 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cec2\x00', 0x101000, 0x0) ioctl$auto_CEC_ADAP_S_LOG_ADDRS(r0, 0xc05c6104, &(0x7f00000000c0)={"58f99464", 0x8, 0x6, 0x1, 0x3, 0x5, "4bb69ec4b3f4c14539898e4c5682f5", "347f00", "a630df9d", "a0ed9959", ["cd9196b8fe1a8a7eb90401a9", "2f9c30017721de33c560b95a", "d3fe6c55a78d6932211c9b69", "ea334f1f1e5e27a1320d6edb"]}) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000048c0)='/dev/dsp1\x00', 0x20000, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/netdevsim3/sriov_numvfs\x00', 0x10b142, 0x0) r1 = socket(0x11, 0x2, 0x0) capset$auto(0x0, &(0x7f0000000000)={0x1, 0xa, 0x8}) sendmmsg$auto(r1, &(0x7f00000001c0)={{&(0x7f0000000000), 0x5aa, 0x0, 0x4, 0x0, 0x5, 0x1000}, 0x5}, 0x2, 0x100fe) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB='(\x00\x00\b', @ANYRES16=0x0, @ANYBLOB="1b0026bd7000fddbdf250300000004000800100003800c000a000700000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x4004040}, 0xc800) sendmsg$auto_BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x300, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4c894}, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB=' \x00\''], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x8002, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x9}, 0x3, 0x0) select$auto(0x4, 0x0, &(0x7f0000000100)={[0x9, 0x7, 0xfffffffffffffff9, 0x9, 0x7ff, 0x3, 0x6, 0x2, 0x9, 0xffff, 0x1ff, 0xd, 0x3, 0x200000201, 0x7, 0x6]}, 0x0, 0x0) 4.192653902s ago: executing program 0 (id=3164): madvise$auto(0x0, 0x2000040080000004, 0xe) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x80802, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x261c2, 0xb2) r1 = landlock_create_ruleset$auto(&(0x7f0000000000)={0x4, 0x8000000000001, 0x5}, 0x9, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth0_to_team\x00', 0x0}) sendmsg$auto_NL80211_CMD_SET_WIPHY(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001180)={&(0x7f00000011c0)=ANY=[@ANYRES64=r2, @ANYRES32=r0, @ANYRES8=r1], 0x24}, 0x1, 0x0, 0x0, 0x4a085}, 0x80) sendmsg$auto_ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000001100)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001200)=ANY=[], 0x340}, 0x1, 0x0, 0x0, 0x4000}, 0x4084) landlock_restrict_self$auto(r1, 0x7) openat$auto_configfs_file_operations_configfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/config/target/dbroot\x00', 0x109103, 0x0) mmap$auto(0x0, 0x400008, 0xdb, 0x9b72, 0x2, 0x8000) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f0000000100)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) socket(0x2b, 0x1, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) open(&(0x7f0000000040)='./cgroup.cpu/cgroup.procs\x00', 0x101840, 0x33903f3ada88772b) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0xc800) openat$auto_event_inject_fops_trace(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/tracing/events/vmalloc/purge_vmap_area_lazy/inject\x00', 0x40482, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) mlock$auto(0x36a, 0x80008) mlockall$auto(0x800000000000005) madvise$auto(0x0, 0x200007, 0x19) link$auto(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mmap$auto(0x0, 0x9, 0x3, 0x8012, 0x3, 0x8000) r4 = openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$auto_VHOST_SET_OWNER(r4, 0xaf01, 0x5) 3.657299348s ago: executing program 2 (id=3166): openat$auto_set_tracer_fops_trace(0xffffffffffffff9c, &(0x7f0000000c40)='/sys/kernel/tracing/current_tracer\x00', 0x2, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x25, 0x1, 0x0) openat$auto_snapshot_fops_user(0xffffffffffffff9c, &(0x7f0000000140), 0x180b03, 0x0) socket(0xa, 0x1, 0x100) openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/lru_gen_full\x00', 0xe0003, 0x0) r0 = openat$auto_fuse_dev_operations_fuse_i(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x501, 0x0) ioctl$auto_FUSE_DEV_IOC_CLONE(r0, 0xe503, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x1, 0x948b, 0x1, 0x15f4da0a, 0x1ff, 0x3, 0x62, 0x80000020, 0x7, 0x6d3e, 0x4000000000c, 0x2, 0x4]}, 0x0) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) read$auto(0x3, 0x0, 0x8080) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sda1\x00', 0x4040, 0x0) close_range$auto(0x2, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_rtc_dev_fops_dev(0xffffffffffffff9c, &(0x7f00000001c0), 0x40, 0x0) r1 = gettid() read$auto(0x3, 0x0, 0x80) rt_sigqueueinfo$auto(r1, 0xb, &(0x7f00000001c0)={@siginfo_0_0={0x3, 0x401, 0xfffffffb, @_timer={r1, 0xd, @sival_ptr=0x0, 0x62}}}) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) io_uring_setup$auto(0x6, 0x0) socket(0xa, 0x1, 0x84) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) close_range$auto(0x0, 0xffffeffe, 0x2) pipe$auto(0x0) unshare$auto(0x40000080) setsockopt$auto(0x3, 0x10000000084, 0x7b, 0x0, 0xd) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x4, &(0x7f00000002c0)={0x0, 0xffeb}, 0x1, 0x0, 0x5, 0x7}, 0x8}, 0xffffffff, 0xb00) 3.546252187s ago: executing program 1 (id=3167): mmap$auto(0x0, 0x20009, 0xdf, 0x17, 0x401, 0x8000) prctl$auto(0x3e, 0x4000000000001, 0x0, 0x1, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) r0 = openat$auto_trace_fops_debugfs(0xffffffffffffff9c, &(0x7f0000000040), 0x28003, 0x0) mmap$auto(0x3, 0x4cc, 0x40df, 0x13, r0, 0x8000) close_range$auto(0x2, 0x8, 0x0) r1 = socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) sendmmsg$auto(0x3, 0x0, 0x7, 0x7000000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000000080)='/dev/binderfs/binder0\x00', 0x498401, 0x0) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, 0x0, 0xc0400, 0x0) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) ioctl$auto_USB_RAW_IOCTL_EP0_STALL(r1, 0x550c, 0x0) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) r3 = openat$auto_vmwgfx_driver_fops_vmwgfx_drv(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dri/card1\x00', 0x20142, 0x0) mmap$auto_vmwgfx_driver_fops_vmwgfx_drv(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x100000c, 0x11, r3, 0x100040000) write$auto(r2, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) close_range$auto(0x2, 0x8, 0x0) openat$auto_configfs_file_operations_configfs_internal(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/config/target/core/alua/lu_gps/default_lu_gp/lu_gp_id\x00', 0x2183, 0x0) socketpair$auto(0x9, 0x2, 0xb, 0x0) ioctl$auto_TIOCSETD2(0xffffffffffffffff, 0x5423, 0x0) ioctl$auto(0x3, 0x541b, 0x38) r4 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/net/wireless\x00', 0x80, 0x0) pread64$auto(r4, 0x0, 0x201, 0xc000) openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs1\x00', 0x500, 0x0) fcntl$auto(0x3, 0x4, 0xa553) 3.179635976s ago: executing program 0 (id=3168): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xc, 0x800008000) r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/oom_adj\x00', 0x300, 0x0) read$auto(r0, 0x0, 0x1f40) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x8002, 0x0) writev$auto(r1, 0x0, 0x3) mmap$auto(0x0, 0x400009, 0xdf, 0x9b72, 0x2, 0x8000) 2.456526074s ago: executing program 1 (id=3170): mmap$auto(0x0, 0x2000c, 0xdf, 0x20eb1, 0x40000000000a5, 0x8000) r0 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) sendmsg$auto_THERMAL_GENL_CMD_TZ_GET_TEMP(0xffffffffffffffff, 0x0, 0x405b) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) bpf$auto(0x0, &(0x7f0000000780)=@link_update={0xa, @new_map_fd=0x5, 0x4007, @old_prog_fd=0x13b}, 0xa3) sendmsg$auto_BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000336bd7000fedbdf2502"], 0x24}, 0x1, 0x0, 0x0, 0xc005}, 0x4) mlock$auto(0x1000, 0x6) r1 = syz_genetlink_get_family_id$auto_ovs_flow(&(0x7f0000000380), 0xffffffffffffffff) r2 = gettid() sched_setparam$auto(r2, &(0x7f00000002c0)={0xfffffffa}) r3 = set_tid_address$auto(0x0) syz_open_procfs$namespace(r3, 0x0) sendmsg$auto_OVS_FLOW_CMD_DEL(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000880)={&(0x7f0000000500)=ANY=[@ANYBLOB="739704c08d4498bc43d1b497ea289b59539616e1805b2e0fb75222aac5ea597f84b3c7d73d3a80", @ANYRES16=r1, @ANYBLOB="200026bd7000fedbdf25020000000800018004009d800400018004000780"], 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x846) r4 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) write$auto(r4, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) socket(0x2a, 0x1, 0x2000) eventfd$auto(0x80) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB=' \x00\''], 0x1ac}}, 0x40000) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2, 0x0) r5 = openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/fb0\x00', 0x20401, 0x0) ioctl$auto_FBIOPUT_VSCREENINFO(r5, 0x4601, &(0x7f0000000080)) setgroups$auto(0x8, &(0x7f0000000000)=0x5) r6 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[], 0x1ac}, 0x1, 0x0, 0x0, 0x44814}, 0x2004c0c4) sendmmsg$auto(r6, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080), 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0x400a507}, 0x800}, 0xa, 0x8) write$auto_proc_mem_operations_base(r0, &(0x7f0000000400)="94c5be883ae7ee95e2bff5f990f6f7249475e8960bf6c1ee8796193bfbd249c19c9460ea0c1c18bb983b84aebb8629e8e9e25558c9bfeb22ed79fdab8065d67eec271b56d08971f043224fe7604598e2506e785c6318c1b7696b10324d1e7db02961facdf9fab2640716f07dd1c617dcb6f1bb648821a53f78be14a6dc8f336e92e389609b991019c180950ed085b91123", 0x91) syz_genetlink_get_family_id$auto_smc_pnetid(0x0, 0xffffffffffffffff) r7 = openat$auto_blk_mq_debugfs_fops_blk_mq_debugfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/block/loop9/hctx0/sched_tags_bitmap\x00', 0x101a00, 0x0) read$auto_blk_mq_debugfs_fops_blk_mq_debugfs(r7, &(0x7f0000000340)=""/179, 0xb3) 2.0382872s ago: executing program 0 (id=3172): madvise$auto(0x0, 0x2000040080000004, 0xe) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x80802, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = open(&(0x7f0000000000)='./file0\x00', 0x261c2, 0xb2) r1 = landlock_create_ruleset$auto(&(0x7f0000000000)={0x4, 0x8000000000001, 0x5}, 0x9, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth0_to_team\x00', 0x0}) sendmsg$auto_NL80211_CMD_SET_WIPHY(r1, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001180)={&(0x7f00000011c0)=ANY=[@ANYRES64=r2, @ANYRES32=r0, @ANYRES8=r1], 0x24}, 0x1, 0x0, 0x0, 0x4a085}, 0x80) sendmsg$auto_ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000001100)={&(0x7f0000001080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001200)=ANY=[], 0x340}, 0x1, 0x0, 0x0, 0x4000}, 0x4084) landlock_restrict_self$auto(r1, 0x7) mmap$auto(0x0, 0x400008, 0xdb, 0x9b72, 0x2, 0x8000) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r4 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f0000000100)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) socket(0x2b, 0x1, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) open(&(0x7f0000000040)='./cgroup.cpu/cgroup.procs\x00', 0x101840, 0x33903f3ada88772b) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0xc800) r5 = openat$auto_event_inject_fops_trace(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/tracing/events/vmalloc/purge_vmap_area_lazy/inject\x00', 0x40482, 0x0) writev$auto(r5, &(0x7f0000000000)={&(0x7f0000000000), 0x4}, 0x2) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) statx$auto(r4, 0x0, 0x6d7, 0x80000008, 0x0) mlock$auto(0x36a, 0x80008) mlockall$auto(0x800000000000005) madvise$auto(0x0, 0x200007, 0x19) link$auto(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mmap$auto(0x0, 0x9, 0x3, 0x8012, 0x3, 0x8000) r6 = openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$auto_VHOST_SET_OWNER(r6, 0xaf01, 0x5) 1.8557381s ago: executing program 1 (id=3174): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x15, 0x5, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0xffff, @remote}, 0x6a) setsockopt$auto(r0, 0x114, 0x1, 0x0, 0x1b) openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x448200, 0x0) r1 = socket(0x10, 0x2, 0x0) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x11, 0x80003, 0x300) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) sendto$auto(0x3, 0x0, 0x13, 0xfffffff9, &(0x7f0000000440)=@xdp={0x2c, 0xdd86, r2, 0x10}, 0x22) unshare$auto(0x40000080) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) socket(0x2b, 0x1, 0x0) ioctl$auto(0x3, 0x8905, 0x38) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) keyctl$auto(0x1f, 0x1, 0x6, 0x3, 0x3ff) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x2003f2, 0x15) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000803c703940d8953c231ca10c3ad1cfea4f804955b5616bca5e4fc048f1148a98b68220383b15e3458d8517aa01ec8e1a927c0429cb99d50b56468f27456f769a9eacb915b6a5dfc67c2d3315a3beec4e87bd429a200abdba755abb62596e594ae118b1453222bc02a495c9085f5dbe2dd67a5cc71e78b4de85396524bbd3175c73ac4b241f1121889cada29417bbefb8a85706451c4ce45b4e", @ANYRES64=r5, @ANYBLOB="010031bd7000fddbdf250c0000000c0003800800038004000580"], 0x20}}, 0x24048084) madvise$auto(0x0, 0x200007, 0x19) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/kfence/parameters/sample_interval\x00', 0x102, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x101001, 0x0) 1.751387072s ago: executing program 3 (id=3175): inotify_add_watch$auto(0xffffffffffffffff, 0x0, 0x1000e6e) openat$auto_nvram_misc_fops_nvram(0xffffffffffffff9c, 0x0, 0x200, 0x0) socket(0x29, 0x6, 0x0) openat$auto_vhost_vsock_fops_vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x121900, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x80302, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) select$auto(0xe98, 0x0, 0x0, &(0x7f0000000040)={[0x54e, 0x10000000000005, 0x1, 0x8fd6, 0x948b, 0x5, 0x3392, 0x4, 0x3, 0x3, 0xffffffff, 0x9, 0x3, 0x4, 0x4, 0xfffffffffffffffe]}, 0x0) write$auto(0xffffffffffffffff, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0x7fffffff, 0x8fb, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x1000000000000005, 0x62, 0x8000001f, 0x4, 0x2, 0x9, 0x2, 0x6]}, 0x0) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) r1 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000140)='/proc/scsi/sg/debug\x00', 0x400e42, 0x0) pread64$auto(r1, 0x0, 0x80000006, 0x3) r2 = openat$auto_tomoyo_self_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) read$auto(r2, 0x0, 0xa) write$auto(r2, 0x0, 0x81) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) waitid$auto_P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000340)={@siginfo_0_0={0xffffffff, 0x81, 0x9, @_rt={0x0, 0x0, @sival_ptr=&(0x7f0000000640)="0de4c5c5ad0b640ec78439ac6411c4749553aa4b30690b7d3f60ff29aefb6c7efd524edaa13ddeb640bab7c382454cbc466445fc244d15491814637370085f124fc2dee5c7781db894d75954f4eafe9b33d1649f6c7555af6f39698035823f3666381e0f9f40eecde74591e7d4"}}}, 0xd, &(0x7f00000003c0)={{0x1000, 0x7ce}, {0x10001}, 0x80000001, 0x9, 0x800, 0x0, 0x99e1, 0x9, 0x3ff, 0x200000000009, 0xbb, 0x8205, 0x3, 0xe, 0x0, 0xe}) msgctl$auto_MSG_INFO(0x8, 0xc, &(0x7f0000000280)={{0x9, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x7fffffff, 0x2, 0x1}, 0x0, 0x0, 0x80000003, 0x9, 0x8000006, 0xffffffff, 0xfffffffffffffffe, 0x7ffe, 0xfc2, 0x400, @raw=0x7, @inferred=r4}) setresgid$auto(r5, 0xffffffffffffffff, r5) sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000826bd7000fedbdf250300000008000400b70a0000060007000080000008000200", @ANYRES32=r3, @ANYBLOB="0a0005000180c200000e00000a0001000180c200000e00000a000100000000000000000008000200", @ANYRES32=r3, @ANYBLOB="060006ff05000000080003009b"], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x40) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x3, 0x100) socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="13"], 0x1ac}}, 0x4004) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) r6 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/netdevsim0/del_port\x00', 0xa001, 0x0) write$auto(r6, &(0x7f0000000380)='0\x81=\"\xad/\x8d\b\x00\x18\xa4\xb0\xb4\xd9\x82=~\x17\xfb&L\xeb=j\a\xf1y\xb3\"\xeb\a\xdd\xf4\xf4Ry\xee\xd7\x1e\x1c\x86\x0f\xcf\x7f\xbf\xab\x12{\xc2\xc2*\xc1M+6/v8\xea\xe9\x85s4\xfe\xe5\t\x7fc\xfb7^\xb86J_\x1d1s!\x01\xff\xff\xff\xff\xff\xff\xff\x1dF\xe6\xf6\x17\x10+\xc0\xb0\xafc\x99\xd4\x150Y~\x1e\xe2\xd6x4fW\x13\xc4U`\x9e-X\xd7\xe2H^\fLS`\xfc\xbb\r\f\x00\xeaN\xa5\xd2\x82;\x7f\xa0.\x9a\xfb\x8d\xf3l\xf2\xd3\x95\xc1M5\xcb\xa6I\x067\xe36\xea\xe9\xe3\xf44oT_`8\xb3\xef\x04 \x05K\xf9\x87pl\xac\x86\nE\xc7e\xc5Q\x89\xcd@\x1c\x92\x00\x87\x976\x9f>\xa2\xcfm\xec\r\x11\x7f\x00\x00\x00\xb1\xde@\x02\xce\x03\xb7\xb1\xfb\x9fr\v\xb2\xe3\xc7\b\x85K /zm\x7f\x8fg,p\a\xc8\x7f\xa5\x87\x02\x87\xbbR=A\x00\x1f\x8a\xa7/Q\"J\xbb\xb0m\xf2SP\x84\x84S\xf0\xba\x9a\xf6\xb6`WI\xba\xba*8\x9f\xea\xe8K/\x98\xbc7~>\x12\x9buB\xcb\xe4\x8aKf\xba\x8c\x19m\xe6I\x02\xde\x80\x9d\x87}\xf4\xbd9\xaa\xd6\xdb1]\xde\xa0r\x14\xca56^\x94\xd2\xd8\xe6}9\x91\xb6\xf7\xa1=\x96\x11\xf1\\\xa91\x0e\xd1\xe4z\xc1;Pw!\x8b\xf5{\xc7Xd\xf1\xf2}\x96EVf\xc9\xa8\xcd\xe4\xc9\x8d\x1d7\xd5\x94\\\xb5\r\xd2\xaa\xe6H\xfe)\xb3a\x04\x1eRMl\xa3F\xa8W0\x90\xc9Ky#\x03\xf5~\xd2Z\xe9(\x99\b\x00M\xde\x01]\r\xd09k\xc2\x84\xc1\xabN\x96\x8a6\x98@\xd3\xab\xa8m\xdf\x8d\x1d\b\x82\xfcP\x87\x93\x80\x97Q\x86\x8a\x9c\xf8L\x0f\xa8@VE2\x9d\x1e`#\xd8\xd7M\xd4k1\xe6\x13Y\\\x83E\xd0e\x0eM\xa9Q\xac\x0e\x1d]\a\x19H\x81\xd2\xccF\xc6\xd4\xe2R$\xfa\xd6}\xbdsN\x18\xdf\xf5\xffP\xf5\f\xccL\xef\x83\xb3$\xd4\xf4\xb5\xe6\xd0 \xb9\xa7\x8e6\t\x83q\xef\b\xd2\xdb', 0x1) 1.349946972s ago: executing program 2 (id=3176): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) io_uring_setup$auto(0x1, 0x0) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$auto_KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000040)={0x2, 0x0, [{0x480, 0x400, 0x9}]}) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mtdblock0\x00', 0x14f602, 0x0) r1 = socket(0x2, 0x5, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_ovs_packet(&(0x7f0000001940), 0xffffffffffffffff) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x40, r3, 0x1b, 0x74bd26, 0x25dfdbfd, {}, [@OVS_PACKET_ATTR_PROBE={0x4}, @OVS_PACKET_ATTR_ACTIONS={0x10, 0x3, 0x0, 0x1, [@nested={0xc, 0x9, 0x0, 0x1, [@nested={0x8, 0x1, 0x0, 0x1, [@nested={0x4788, 0x33}]}]}]}, @OVS_PACKET_ATTR_PACKET={0x12, 0x1, "898771f1c19f17790485908286dd"}, @OVS_PACKET_ATTR_KEY={0x4}]}, 0x40}, 0x1, 0x0, 0x0, 0x4004040}, 0xc800) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r4, 0x0, 0x20) r5 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r5, &(0x7f0000000200)={0x0, 0x7}, 0x3) socket(0xa, 0x3, 0x3a) sysfs$auto(0x0, 0x6, 0xfffffffffffffff8) mmap$auto(0x0, 0x20009, 0x6, 0xfffffffffffffffe, 0xffffffffffffffff, 0x8000) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mtdblock0\x00', 0x14f602, 0x0) sendmmsg$auto(r1, &(0x7f0000000140)={{&(0x7f0000000040), 0xfff, &(0x7f00000000c0)={0x0, 0x1feff}, 0x7, 0x0, 0x5, 0xb}, 0xfff}, 0x8, 0x311) 1.281346541s ago: executing program 3 (id=3177): r0 = openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcsa\x00', 0x100, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$auto_SO_BUSY_POLL_BUDGET(r1, 0x1, 0x46, &(0x7f0000000040)='tcp_metrics\x00', 0x9cbf) capset$auto(&(0x7f0000000000)={0x9, 0x0}, &(0x7f0000000080)={0x1, 0x3, 0x9}) r3 = epoll_create$auto(0x9) fcntl$auto(r3, 0x9, r2) msgget$auto(0x0, 0x5) preadv$auto(r0, &(0x7f0000000240)={0x0, 0x8000}, 0x2, 0x3004, 0x6) 1.142058945s ago: executing program 3 (id=3178): close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop6\x00', 0x161e80, 0x0) brk$auto(0x7ffffffff002) r1 = prctl$auto_PR_SET_MM_ENV_END(0x401, 0xb, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) unlinkat$auto(r1, &(0x7f0000000000)='./file0\x00', 0xfffffffa) mmap$auto(0x2, 0x400008, 0xdf, 0x9b72, 0x2, 0x10000000008000) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) read$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffffff, &(0x7f0000001100)=""/4106, 0x100a) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x3, 0x0, 0x787b, 0x7000000) socket(0x10, 0x2, 0x0) sendmmsg$auto(0x4, 0x0, 0x9a6, 0x6) pread64$auto(0xffffffffffffffff, 0x0, 0x200000000003, 0x2f4a3a23) read$auto_proc_pid_set_timerslack_ns_operations_base(0xffffffffffffffff, &(0x7f0000000180)=""/18, 0x12) mmap$auto(0x0, 0x2, 0xffffffffffffffff, 0x44eb1, 0x602, 0x300000000000) r2 = ioctl$auto_KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) pread64$auto(0xffffffffffffffff, 0x0, 0x20000000001, 0x7fff) r3 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv6/conf/ip6_vti0/stable_secret\x00', 0x2, 0x0) writev$auto(r3, &(0x7f0000000300)={&(0x7f0000000200), 0x200}, 0x3) process_madvise$auto_MADV_RANDOM(r2, 0x0, 0xfffffffffffffffb, 0x1, 0xfffffffe) ioctl$auto(0x3, 0x4020afa4, 0xffffffffffffffff) ioctl$auto_SG_GET_RESERVED_SIZE(r0, 0x4c06, 0x0) fcntl$auto_F_SETLEASE(r0, 0x400, 0x0) r4 = openat$auto_proc_coredump_filter_operations_base(0xffffffffffffff9c, &(0x7f00000009c0), 0x100, 0x0) readv$auto(r4, &(0x7f0000000c00)={&(0x7f0000000bc0), 0x8}, 0xe) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x58008}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, 0x0, 0x800, 0x70bd2d, 0x9, {}, [@NL80211_ATTR_FILS_NONCES={0x3a, 0xf3, "7a1210c15d299dc830d4ba63d312060f1ccc154c4cc18bfc461d7559edcc099b9cf664fe64b7fce2b236436f2f4c1b0accedda03e81b"}, @NL80211_ATTR_INACTIVITY_TIMEOUT={0x6, 0x96, 0x3ff}, @NL80211_ATTR_OBSS_COLOR_BITMAP={0xc, 0x12e, 0x3ff}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "95ca6537d4dc671875b7ea86e3817fddb84d79731b45fbc4"}]}, 0x80}, 0x1, 0x0, 0x0, 0xc0}, 0x45) 1.000501029s ago: executing program 2 (id=3179): mmap$auto(0x0, 0x20009, 0xdf, 0x17, 0x401, 0x8000) prctl$auto(0x3e, 0x4000000000001, 0x0, 0x1, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) r0 = openat$auto_trace_fops_debugfs(0xffffffffffffff9c, &(0x7f0000000040), 0x28003, 0x0) mmap$auto(0x3, 0x4cc, 0x40df, 0x13, r0, 0x8000) close_range$auto(0x2, 0x8, 0x0) r1 = socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) sendmmsg$auto(0x3, 0x0, 0x7, 0x7000000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000000080)='/dev/binderfs/binder0\x00', 0x498401, 0x0) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, 0x0, 0xc0400, 0x0) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) ioctl$auto_USB_RAW_IOCTL_EP0_STALL(r1, 0x550c, 0x0) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) r3 = openat$auto_vmwgfx_driver_fops_vmwgfx_drv(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dri/card1\x00', 0x20142, 0x0) mmap$auto_vmwgfx_driver_fops_vmwgfx_drv(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x100000c, 0x11, r3, 0x100040000) write$auto(r2, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) close_range$auto(0x2, 0x8, 0x0) openat$auto_configfs_file_operations_configfs_internal(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/config/target/core/alua/lu_gps/default_lu_gp/lu_gp_id\x00', 0x2183, 0x0) socketpair$auto(0x9, 0x2, 0xb, 0x0) ioctl$auto_TIOCSETD2(0xffffffffffffffff, 0x5423, 0x0) ioctl$auto(0x3, 0x541b, 0x38) r4 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/net/wireless\x00', 0x80, 0x0) pread64$auto(r4, 0x0, 0x201, 0xc000) openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs1\x00', 0x500, 0x0) fcntl$auto(0x3, 0x4, 0xa553) 944.041847ms ago: executing program 3 (id=3180): mmap$auto(0x0, 0x2000009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto__dev_ioctl_fops_dev_ioctl(0xffffffffffffff9c, &(0x7f0000001440), 0x101000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_dma_heap_fops_dma_heap(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x2a8380, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sda1\x00', 0x900, 0x0) io_uring_setup$auto(0x6, 0x0) io_uring_setup$auto(0x83, 0x0) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bus/usb/009/001\x00', 0xa101, 0x0) openat$auto_aoe_fops_aoechr(0xffffffffffffff9c, &(0x7f0000000000)='/dev/etherd/err\x00', 0x2, 0x0) socket(0x10, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/mm/transparent_hugepage/hugepages-64kB/stats/nr_anon\x00', 0x0, 0x0) openat$auto_lowpan_enable_fops_(0xffffffffffffff9c, &(0x7f0000000040), 0x109500, 0x0) openat$auto_vmwgfx_driver_fops_vmwgfx_drv(0xffffffffffffff9c, 0x0, 0x60c40, 0x0) openat$auto_trace_options_core_fops_trace(0xffffffffffffff9c, 0x0, 0x8000, 0x0) openat$auto_dma_heap_fops_dma_heap(0xffffffffffffff9c, 0x0, 0x105000, 0x0) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS2\x00', 0x101e81, 0x0) socketpair$auto(0x4004, 0x7, 0x4, 0x0) ioctl$auto_TCFLSH2(r0, 0x5408, 0x0) 765.042597ms ago: executing program 3 (id=3181): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xc, 0x800008000) r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/oom_adj\x00', 0x300, 0x0) read$auto(r0, 0x0, 0x1f40) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x8002, 0x0) writev$auto(r1, 0x0, 0x3) mmap$auto(0x0, 0x400009, 0xdf, 0x9b72, 0x2, 0x8000) 306.600397ms ago: executing program 0 (id=3182): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x15, 0x5, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0xffff, @remote}, 0x6a) setsockopt$auto(r0, 0x114, 0x1, 0x0, 0x1b) openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x448200, 0x0) r1 = socket(0x10, 0x2, 0x0) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x11, 0x80003, 0x300) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) sendto$auto(0x3, 0x0, 0x13, 0xfffffff9, &(0x7f0000000440)=@xdp={0x2c, 0xdd86, r2, 0x10}, 0x22) unshare$auto(0x40000080) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) socket(0x2b, 0x1, 0x0) ioctl$auto(0x3, 0x8905, 0x38) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x2003f2, 0x15) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="200000803c703940d8953c231ca10c3ad1cfea4f804955b5616bca5e4fc048f1148a98b68220383b15e3458d8517aa01ec8e1a927c0429cb99d50b56468f27456f769a9eacb915b6a5dfc67c2d3315a3beec4e87bd429a200abdba755abb62596e594ae118b1453222bc02a495c9085f5dbe2dd67a5cc71e78b4de85396524bbd3175c73ac4b241f1121889cada29417bbefb8a85706451c4ce45b4e", @ANYRES64=r5, @ANYBLOB="010031bd7000fddbdf250c0000000c0003800800038004000580"], 0x20}}, 0x24048084) madvise$auto(0x0, 0x200007, 0x19) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/kfence/parameters/sample_interval\x00', 0x102, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x101001, 0x0) 165.192133ms ago: executing program 3 (id=3183): mmap$auto(0x0, 0x2000c, 0xdf, 0x20eb1, 0x40000000000a5, 0x8000) r0 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) sendmsg$auto_THERMAL_GENL_CMD_TZ_GET_TEMP(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x405b) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) bpf$auto(0x0, &(0x7f0000000780)=@link_update={0xa, @new_map_fd=0x5, 0x4007, @old_prog_fd=0x13b}, 0xa3) sendmsg$auto_BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000336bd7000fedbdf2502"], 0x24}, 0x1, 0x0, 0x0, 0xc005}, 0x4) mlock$auto(0x1000, 0x6) r1 = syz_genetlink_get_family_id$auto_ovs_flow(&(0x7f0000000380), 0xffffffffffffffff) r2 = gettid() sched_setparam$auto(r2, &(0x7f00000002c0)={0xfffffffa}) r3 = set_tid_address$auto(0x0) syz_open_procfs$namespace(r3, 0x0) sendmsg$auto_OVS_FLOW_CMD_DEL(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000880)={&(0x7f0000000500)=ANY=[@ANYBLOB="739704c08d4498bc43d1b497ea289b59539616e1805b2e0fb75222aac5ea597f84b3c7d73d3a80", @ANYRES16=r1, @ANYBLOB="200026bd7000fedbdf25020000000800018004009d800400018004000780"], 0x24}, 0x1, 0x0, 0x0, 0x41}, 0x846) r4 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) write$auto(r4, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) socket(0x2a, 0x1, 0x2000) eventfd$auto(0x80) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB=' \x00\''], 0x1ac}}, 0x40000) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x2, 0x0) r5 = openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/fb0\x00', 0x20401, 0x0) ioctl$auto_FBIOPUT_VSCREENINFO(r5, 0x4601, &(0x7f0000000080)) setgroups$auto(0x8, &(0x7f0000000000)=0x5) r6 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[], 0x1ac}, 0x1, 0x0, 0x0, 0x44814}, 0x2004c0c4) sendmmsg$auto(r6, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080), 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0x400a507}, 0x800}, 0xa, 0x8) write$auto_proc_mem_operations_base(r0, &(0x7f0000000400)="94c5be883ae7ee95e2bff5f990f6f7249475e8960bf6c1ee8796193bfbd249c19c9460ea0c1c18bb983b84aebb8629e8e9e25558c9bfeb22ed79fdab8065d67eec271b56d08971f043224fe7604598e2506e785c6318c1b7696b10324d1e7db02961facdf9fab2640716f07dd1c617dcb6f1bb648821a53f78be14a6dc8f336e92e389609b991019c180950ed085b91123", 0x91) syz_genetlink_get_family_id$auto_smc_pnetid(0x0, 0xffffffffffffffff) r7 = openat$auto_blk_mq_debugfs_fops_blk_mq_debugfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/block/loop9/hctx0/sched_tags_bitmap\x00', 0x101a00, 0x0) read$auto_blk_mq_debugfs_fops_blk_mq_debugfs(r7, &(0x7f0000000340)=""/179, 0xb3) 102.422016ms ago: executing program 1 (id=3184): mmap$auto(0xa544, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x0) io_uring_setup$auto(0x6, 0x0) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) socket(0x10, 0x2, 0x4) statmount$auto(0x0, &(0x7f0000000180)={0x3, 0x1, 0x9, 0x7352, 0x3d, 0x65f, 0x1ffde, 0xa, 0x0, 0x2, 0xb, 0x3, 0x5, 0x101, 0xb4, 0x9, 0x6, 0x7ff, 0x84, 0x4, 0x0, 0x7, 0x2000, 0x203, 0x0, 0xb4, 0x4, 0x0, 0x0, 0x0, 0xfffffff9, [0x7, 0x0, 0x68, 0x0, 0x800000100000000, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0xfffffffffffffffe, 0x0, 0x1000000009d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x8, 0x0, 0x4, 0x0, 0x1, 0x0, 0x1, 0x2, 0x9, 0xfffffffffffffffe, 0x0, 0x0, 0x3, 0x800000000000000, 0x7e30e0be]}, 0x1fe, 0xf) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) r0 = socket(0x10, 0x2, 0x0) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="11002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x24008004) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) syz_genetlink_get_family_id$auto_tipcv2(0x0, r0) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x0, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x2003f0, 0x15) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, 0x0, 0x8a240, 0x0) lsm_list_modules$auto(0x0, 0x0, 0x2b7cb0f0) openat$auto_fops_atomic_t_ro_(0xffffffffffffff9c, 0x0, 0x1, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) open(&(0x7f0000000040)='./cgroup.cpu/cgroup.procs\x00', 0x101040, 0x33903f3ada88772b) r1 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/pts/ptmx\x00', 0x40001, 0x0) r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/pts/ptmx\x00', 0x0, 0x0) ioctl$auto_TCFLSH2(r2, 0x80045439, 0x0) ioctl$auto_TIOCSETD2(r1, 0x5423, 0x0) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) ioctl$auto(r1, 0x89f2, r1) sendmmsg$auto(r1, &(0x7f0000000200)={{0x0, 0x0, &(0x7f00000000c0)={0x0, 0xfc2}, 0x2, 0x0, 0x1, 0xdc5e}, 0x8}, 0x0, 0x4008) io_submit$auto(0x2, 0x7f, &(0x7f0000000040)=&(0x7f0000000000)={0x2, 0xb, 0x8, 0x3, 0x2, 0x3b, 0xfffffffffffffc00, 0x2, 0x1001, 0x0, 0x6, 0xffffffffffffffff}) ioctl$auto_TUNSETNOCSUM(r3, 0x400454c8, &(0x7f0000000300)=0x7ff) 0s ago: executing program 2 (id=3185): r0 = openat$auto_loop_ctl_fops_loop(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) ioctl$auto_LOOP_CTL_ADD(r0, 0x4c80, 0xfffffffffffffffd) close_range$auto(0x2, 0x8, 0x0) io_cancel$auto(0x6, &(0x7f0000000000)={0x2, 0x8, 0x3, 0x9, 0xe, 0xffffffffffffffff, 0xfffffffffffffffb, 0x5, 0x0, 0x0, 0x3}, &(0x7f0000000040)={0x0, 0x7, 0x4, 0x3}) accept4$auto(r1, &(0x7f0000000100)=@l2={0x1f, 0x3, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x10}, 0x5, 0x1}, &(0x7f0000000140)=0x6, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x15) set_mempolicy$auto(0x6, &(0x7f0000000000)=0x7e, 0x4) move_pages$auto(0x0, 0x1001, 0x0, 0x0, 0x0, 0x0) semctl$auto(0x201, 0xfffffffffffffffa, 0x3, 0x0) r2 = socketpair$auto(0x1, 0x5, 0x8000000000000000, 0x0) r3 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sda\x00', 0x8001, 0x0) mmap$auto(0x0, 0x20809, 0x4000000000df, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) ustat$auto(0x801, 0x0) open(0x0, 0x22240, 0x155) r4 = socket(0x2, 0x2, 0x0) r5 = socket(0x2, 0x1, 0x0) close_range$auto(0x2, 0xffffffffffffffff, 0x0) io_uring_setup$auto(0x59, &(0x7f0000000080)={0x7fffffff, 0xd, 0x2, 0x6, 0x4, 0x8, 0xffffffffffffffff, [], {0x6, 0x6, 0x0, 0x29f, 0x100, 0x7f, 0xffffffff, 0x6, 0x2}, {0x8000100, 0x1, 0x8000052, 0x5, 0x1, 0x40, 0x76c5, 0x9a, 0x100000000}}) socket(0x2b, 0x1, 0x0) socket(0x2, 0x1, 0x106) sendmsg$auto_NL802154_CMD_DEL_INTERFACE(r4, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x20000000) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0xffff, @remote}, 0x6a) listen$auto(0x3, 0x81) sendmmsg$auto(r5, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800009}, 0x5, 0x20000000) close_range$auto(0x2, 0x8000, 0x0) ioctl$auto(r3, 0x5393, r2) openat$auto_userio_fops_userio(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) kernel console output (not intermixed with test programs): nk: 330 bytes leftover after parsing attributes in process `syz.3.2949'. [ 817.594880][T19848] netlink: 'syz.3.2954': attribute type 10 has an invalid length. [ 817.612353][T19848] netlink: 330 bytes leftover after parsing attributes in process `syz.3.2954'. [ 817.811770][ T30] audit: type=1800 audit(1767236878.461:73): pid=19850 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.2955" name="dbroot" dev="configfs" ino=67823 res=0 errno=0 [ 818.118809][T15443] Bluetooth: hci0: unexpected subevent 0x01 length: 3 < 18 [ 818.204946][T19862] FAULT_INJECTION: forcing a failure. [ 818.204946][T19862] name failslab, interval 1, probability 0, space 0, times 0 [ 818.288971][T19862] CPU: 0 UID: 0 PID: 19862 Comm: syz.1.2958 Tainted: G U L syzkaller #0 PREEMPT(full) [ 818.289017][T19862] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 818.289029][T19862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 818.289047][T19862] Call Trace: [ 818.289057][T19862] [ 818.289069][T19862] dump_stack_lvl+0x16c/0x1f0 [ 818.289116][T19862] should_fail_ex+0x512/0x640 [ 818.289149][T19862] ? kmem_cache_alloc_lru_noprof+0x66/0x770 [ 818.289190][T19862] should_failslab+0xc2/0x120 [ 818.289244][T19862] kmem_cache_alloc_lru_noprof+0x87/0x770 [ 818.289280][T19862] ? __pfx___might_resched+0x10/0x10 [ 818.289321][T19862] ? sock_alloc_inode+0x25/0x1c0 [ 818.289372][T19862] ? __pfx_sock_alloc_inode+0x10/0x10 [ 818.289412][T19862] ? sock_alloc_inode+0x25/0x1c0 [ 818.289453][T19862] sock_alloc_inode+0x25/0x1c0 [ 818.289495][T19862] alloc_inode+0x64/0x240 [ 818.289528][T19862] sock_alloc+0x40/0x280 [ 818.289568][T19862] __sock_create+0xc2/0x8a0 [ 818.289620][T19862] __sys_socket+0x14d/0x260 [ 818.289647][T19862] ? __pfx___sys_socket+0x10/0x10 [ 818.289676][T19862] ? do_user_addr_fault+0x843/0x1370 [ 818.289715][T19862] __x64_sys_socket+0x72/0xb0 [ 818.289740][T19862] ? lockdep_hardirqs_on+0x7c/0x110 [ 818.289781][T19862] do_syscall_64+0xcd/0xf80 [ 818.289829][T19862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 818.289858][T19862] RIP: 0033:0x7f78983916e7 [ 818.289881][T19862] Code: f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 818.289910][T19862] RSP: 002b:00007f78991a3fa8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 818.289938][T19862] RAX: ffffffffffffffda RBX: 00007f78985e6270 RCX: 00007f78983916e7 [ 818.289957][T19862] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 818.289975][T19862] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 818.289992][T19862] R10: 0000200000000140 R11: 0000000000000286 R12: 0000000000000000 [ 818.290009][T19862] R13: 00007f78985e6308 R14: 00007f78985e6270 R15: 00007ffd00f218b8 [ 818.290047][T19862] [ 818.290254][T19862] socket: no more sockets [ 818.546401][T19865] FAULT_INJECTION: forcing a failure. [ 818.546401][T19865] name failslab, interval 1, probability 0, space 0, times 0 [ 818.567241][T19865] CPU: 1 UID: 0 PID: 19865 Comm: syz.0.2959 Tainted: G U L syzkaller #0 PREEMPT(full) [ 818.567285][T19865] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 818.567293][T19865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 818.567306][T19865] Call Trace: [ 818.567313][T19865] [ 818.567321][T19865] dump_stack_lvl+0x16c/0x1f0 [ 818.567356][T19865] should_fail_ex+0x512/0x640 [ 818.567380][T19865] ? kmem_cache_alloc_noprof+0x62/0x770 [ 818.567409][T19865] should_failslab+0xc2/0x120 [ 818.567445][T19865] kmem_cache_alloc_noprof+0x83/0x770 [ 818.567470][T19865] ? alloc_empty_file+0x55/0x1e0 [ 818.567497][T19865] ? alloc_empty_file+0x55/0x1e0 [ 818.567517][T19865] alloc_empty_file+0x55/0x1e0 [ 818.567541][T19865] alloc_file_pseudo+0x13a/0x230 [ 818.567565][T19865] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 818.567591][T19865] ? do_raw_spin_unlock+0x172/0x230 [ 818.567619][T19865] __anon_inode_getfile+0xe8/0x280 [ 818.567643][T19865] anon_inode_getfile_fmode+0x37/0xa0 [ 818.567687][T19865] do_eventfd+0x156/0x390 [ 818.567726][T19865] __x64_sys_eventfd+0x32/0x50 [ 818.567764][T19865] do_syscall_64+0xcd/0xf80 [ 818.567811][T19865] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 818.567840][T19865] RIP: 0033:0x7fa39478f7c9 [ 818.567863][T19865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 818.567893][T19865] RSP: 002b:00007fa395626038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 818.567921][T19865] RAX: ffffffffffffffda RBX: 00007fa3949e5fa0 RCX: 00007fa39478f7c9 [ 818.567940][T19865] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 818.567957][T19865] RBP: 00007fa394813f91 R08: 0000000000000000 R09: 0000000000000000 [ 818.567979][T19865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 818.567991][T19865] R13: 00007fa3949e6038 R14: 00007fa3949e5fa0 R15: 00007ffff1177948 [ 818.568019][T19865] [ 818.791373][T19854] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 818.797991][T19854] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 818.804653][T19854] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 818.824255][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 818.830714][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 818.840827][T19865] netlink: 330 bytes leftover after parsing attributes in process `syz.0.2959'. [ 818.857911][T19854] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 819.242134][T19858] netlink: set zone limit has 8 unknown bytes [ 819.526218][T19871] FAULT_INJECTION: forcing a failure. [ 819.526218][T19871] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 819.597074][T19871] CPU: 0 UID: 0 PID: 19871 Comm: syz.0.2960 Tainted: G U L syzkaller #0 PREEMPT(full) [ 819.597110][T19871] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 819.597119][T19871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 819.597132][T19871] Call Trace: [ 819.597139][T19871] [ 819.597147][T19871] dump_stack_lvl+0x16c/0x1f0 [ 819.597182][T19871] should_fail_ex+0x512/0x640 [ 819.597209][T19871] should_fail_alloc_page+0xe7/0x130 [ 819.597245][T19871] prepare_alloc_pages+0x401/0x670 [ 819.597283][T19871] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 819.597317][T19871] ? __lock_acquire+0x436/0x2890 [ 819.597341][T19871] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 819.597371][T19871] ? find_held_lock+0x2b/0x80 [ 819.597402][T19871] ? __lock_acquire+0x436/0x2890 [ 819.597426][T19871] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 819.597461][T19871] ? policy_nodemask+0xea/0x4e0 [ 819.597495][T19871] alloc_pages_mpol+0x1fb/0x550 [ 819.597529][T19871] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 819.597563][T19871] ? __anon_vma_prepare+0x2db/0x5e0 [ 819.597590][T19871] folio_alloc_mpol_noprof+0x36/0x2f0 [ 819.597613][T19871] vma_alloc_folio_noprof+0xed/0x1e0 [ 819.597634][T19871] ? __pfx_vma_alloc_folio_noprof+0x10/0x10 [ 819.597654][T19871] ? __anon_vma_prepare+0x2e2/0x5e0 [ 819.597714][T19871] do_anonymous_page+0xc81/0x2190 [ 819.597758][T19871] __handle_mm_fault+0x1ecf/0x2bb0 [ 819.597799][T19871] ? __pfx___handle_mm_fault+0x10/0x10 [ 819.597867][T19871] handle_mm_fault+0x3fe/0xad0 [ 819.597909][T19871] __get_user_pages+0x54e/0x3590 [ 819.597952][T19871] ? __pfx___get_user_pages+0x10/0x10 [ 819.597992][T19871] populate_vma_page_range+0x267/0x3f0 [ 819.598027][T19871] ? __pfx_populate_vma_page_range+0x10/0x10 [ 819.598061][T19871] ? __pfx_find_vma_intersection+0x10/0x10 [ 819.598094][T19871] ? do_mmap+0x69c/0x1210 [ 819.598127][T19871] __mm_populate+0x1d8/0x380 [ 819.598162][T19871] ? __pfx___mm_populate+0x10/0x10 [ 819.598197][T19871] ? up_write+0x282/0x4e0 [ 819.598223][T19871] vm_mmap_pgoff+0x37f/0x470 [ 819.598256][T19871] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 819.598292][T19871] ? __x64_sys_futex+0x1e0/0x4c0 [ 819.598315][T19871] ? __x64_sys_futex+0x1e9/0x4c0 [ 819.598342][T19871] ksys_mmap_pgoff+0x7d/0x5c0 [ 819.598372][T19871] ? xfd_validate_state+0x61/0x180 [ 819.598391][T19871] ? __pfx_do_writev+0x10/0x10 [ 819.598423][T19871] __x64_sys_mmap+0x125/0x190 [ 819.598446][T19871] do_syscall_64+0xcd/0xf80 [ 819.598481][T19871] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 819.598502][T19871] RIP: 0033:0x7fa39478f7c9 [ 819.598519][T19871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 819.598540][T19871] RSP: 002b:00007fa395626038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 819.598559][T19871] RAX: ffffffffffffffda RBX: 00007fa3949e5fa0 RCX: 00007fa39478f7c9 [ 819.598574][T19871] RDX: 00000000000000df RSI: 0000000000400009 RDI: 0000000000000000 [ 819.598587][T19871] RBP: 00007fa394813f91 R08: 0000000000000002 R09: 0000000000008000 [ 819.598600][T19871] R10: 0000000000009b72 R11: 0000000000000246 R12: 0000000000000000 [ 819.598614][T19871] R13: 00007fa3949e6038 R14: 00007fa3949e5fa0 R15: 00007ffff1177948 [ 819.598641][T19871] [ 820.007761][T15443] Bluetooth: hci4: command 0x040f tx timeout [ 820.265689][T19878] can: request_module (can-proto-0) failed. [ 820.503390][T19892] netlink: 'syz.2.2965': attribute type 10 has an invalid length. [ 820.528042][T19892] netlink: 330 bytes leftover after parsing attributes in process `syz.2.2965'. [ 820.577282][ T30] audit: type=1800 audit(1767236881.221:74): pid=19896 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.2967" name="dbroot" dev="configfs" ino=67964 res=0 errno=0 [ 820.808537][T15443] Bluetooth: hci0: command 0x0c1a tx timeout [ 820.814588][T15443] Bluetooth: hci2: command 0x0c1a tx timeout [ 820.887759][T13424] Bluetooth: hci1: command 0x0c1a tx timeout [ 820.948933][T19905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x78000 [ 820.977925][T19905] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 820.986479][T19905] memcg:ffff88807602c801 [ 821.038027][T19905] anon flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 821.046055][T19905] page_type: f5(slab) [ 821.050246][T19905] raw: 00fff00000000040 ffff88801cec5140 0000000000000000 dead000000000001 [ 821.058909][T19905] raw: 0000000000000000 0000000000130013 00000000f5000000 ffff88807602c801 [ 821.067548][T19905] head: 00fff00000000040 ffff88801cec5140 0000000000000000 dead000000000001 [ 821.076442][T19905] head: 0000000000000000 0000000000130013 00000000f5000000 ffff88807602c801 [ 821.085320][T19905] head: 00fff00000000003 ffffea0001e00001 00000000ffffffff 00000000ffffffff [ 821.102079][T19905] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 821.110892][T19905] page dumped because: unmovable page [ 821.116291][T19905] page_owner tracks the page as allocated [ 821.122152][T19905] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 11784, tgid 11780 (syz.0.1231), ts 423542392433, free_ts 423484219045 [ 821.200313][T19905] post_alloc_hook+0x1af/0x220 [ 821.244225][T19905] get_page_from_freelist+0xd0b/0x31a0 [ 821.249916][T19905] __alloc_frozen_pages_noprof+0x25f/0x2430 [ 821.258268][T19905] alloc_pages_mpol+0x1fb/0x550 [ 821.267073][T19905] new_slab+0x2c3/0x430 [ 821.273785][T19905] ___slab_alloc+0xe18/0x1c90 [ 821.279917][T19905] __slab_alloc.constprop.0+0x63/0x110 [ 821.287756][T19905] kmem_cache_alloc_lru_noprof+0x451/0x770 [ 821.308938][T19905] shmem_alloc_inode+0x25/0x50 [ 821.313729][T19905] alloc_inode+0x64/0x240 [ 821.347766][T19905] new_inode+0x22/0x1c0 [ 821.351978][T19905] shmem_get_inode+0x19a/0xfb0 [ 821.366316][T19905] __shmem_file_setup+0x290/0x350 [ 821.494036][T19905] shmem_zero_setup+0x93/0x1b0 [ 821.526317][T19905] __mmap_region+0x2271/0x2a00 [ 821.613859][T19905] mmap_region+0x1ab/0x3f0 [ 821.621809][T19905] page last free pid 11779 tgid 11776 stack trace: [ 821.670466][T19905] __free_frozen_pages+0x7df/0x1170 [ 821.675694][T19905] __put_partials+0x130/0x170 [ 821.703633][T19919] FAULT_INJECTION: forcing a failure. [ 821.703633][T19919] name failslab, interval 1, probability 0, space 0, times 0 [ 821.754500][T19919] CPU: 1 UID: 0 PID: 19919 Comm: syz.0.2970 Tainted: G U L syzkaller #0 PREEMPT(full) [ 821.754554][T19919] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 821.754568][T19919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 821.754589][T19919] Call Trace: [ 821.754600][T19919] [ 821.754613][T19919] dump_stack_lvl+0x16c/0x1f0 [ 821.754676][T19919] should_fail_ex+0x512/0x640 [ 821.754714][T19919] ? __kmalloc_cache_noprof+0x5f/0x800 [ 821.754759][T19919] should_failslab+0xc2/0x120 [ 821.754812][T19919] __kmalloc_cache_noprof+0x80/0x800 [ 821.754849][T19919] ? __sys_socket+0xac/0x260 [ 821.754879][T19919] ? fput+0x70/0xf0 [ 821.754911][T19919] ? do_eventfd+0x67/0x390 [ 821.754961][T19919] ? do_eventfd+0x67/0x390 [ 821.755002][T19919] do_eventfd+0x67/0x390 [ 821.755052][T19919] ? rcu_is_watching+0x12/0xc0 [ 821.755100][T19919] __x64_sys_eventfd+0x32/0x50 [ 821.755143][T19919] do_syscall_64+0xcd/0xf80 [ 821.755197][T19919] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 821.755230][T19919] RIP: 0033:0x7fa39478f7c9 [ 821.755268][T19919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 821.755300][T19919] RSP: 002b:00007fa395605038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 821.755330][T19919] RAX: ffffffffffffffda RBX: 00007fa3949e6090 RCX: 00007fa39478f7c9 [ 821.755363][T19919] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 821.755380][T19919] RBP: 00007fa394813f91 R08: 0000000000000000 R09: 0000000000000000 [ 821.755398][T19919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 821.755415][T19919] R13: 00007fa3949e6128 R14: 00007fa3949e6090 R15: 00007ffff1177948 [ 821.755453][T19919] [ 821.803606][T19905] qlist_free_all+0x4c/0xf0 [ 822.078016][T19905] kasan_quarantine_reduce+0x195/0x1e0 [ 822.084748][T19905] __kasan_slab_alloc+0x69/0x90 [ 822.104527][T19905] __kmalloc_cache_noprof+0x282/0x800 [ 822.110420][T19905] kset_create_and_add+0x4d/0x190 [ 822.115650][T19905] netdev_register_kobject+0x1ef/0x3d0 [ 822.121687][T19905] register_netdevice+0x13ac/0x21d0 [ 822.127078][T19905] __ip_tunnel_create+0x540/0x6b0 [ 822.132734][T19905] ip_tunnel_init_net+0x22f/0x7d0 [ 822.282943][T19905] ops_init+0x1e2/0x5f0 [ 822.347984][T19905] setup_net+0x11d/0x3a0 [ 822.366468][T19905] copy_net_ns+0x351/0x7c0 [ 822.496968][T19905] create_new_namespaces+0x3ea/0xab0 [ 822.502534][T19905] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 822.881685][ T30] audit: type=1800 audit(1767236883.531:75): pid=19930 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.2971" name="dbroot" dev="configfs" ino=67995 res=0 errno=0 [ 823.268342][T19934] FAULT_INJECTION: forcing a failure. [ 823.268342][T19934] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 823.357849][T19934] CPU: 0 UID: 0 PID: 19934 Comm: syz.1.2973 Tainted: G U L syzkaller #0 PREEMPT(full) [ 823.357897][T19934] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 823.357909][T19934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 823.357925][T19934] Call Trace: [ 823.357936][T19934] [ 823.357947][T19934] dump_stack_lvl+0x16c/0x1f0 [ 823.357999][T19934] should_fail_ex+0x512/0x640 [ 823.358038][T19934] should_fail_alloc_page+0xe7/0x130 [ 823.358086][T19934] prepare_alloc_pages+0x401/0x670 [ 823.358130][T19934] ? stack_trace_save+0x8e/0xc0 [ 823.358181][T19934] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 823.358219][T19934] ? kasan_save_stack+0x33/0x60 [ 823.358257][T19934] ? kasan_save_track+0x14/0x30 [ 823.358300][T19934] ? kasan_save_stack+0x42/0x60 [ 823.358343][T19934] ? __lock_acquire+0x436/0x2890 [ 823.358373][T19934] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 823.358410][T19934] ? __lock_acquire+0x436/0x2890 [ 823.358447][T19934] ? __lock_acquire+0x436/0x2890 [ 823.358480][T19934] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 823.358526][T19934] ? policy_nodemask+0xea/0x4e0 [ 823.358573][T19934] alloc_pages_mpol+0x1fb/0x550 [ 823.358619][T19934] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 823.358666][T19934] ? __anon_vma_prepare+0x2db/0x5e0 [ 823.358704][T19934] folio_alloc_mpol_noprof+0x36/0x2f0 [ 823.358736][T19934] vma_alloc_folio_noprof+0xed/0x1e0 [ 823.358774][T19934] ? __pfx_vma_alloc_folio_noprof+0x10/0x10 [ 823.358804][T19934] ? __anon_vma_prepare+0x2e2/0x5e0 [ 823.358846][T19934] do_anonymous_page+0xc81/0x2190 [ 823.358891][T19934] __handle_mm_fault+0x1ecf/0x2bb0 [ 823.358933][T19934] ? __pfx___handle_mm_fault+0x10/0x10 [ 823.358994][T19934] handle_mm_fault+0x3fe/0xad0 [ 823.359033][T19934] __get_user_pages+0x54e/0x3590 [ 823.359092][T19934] ? __pfx___get_user_pages+0x10/0x10 [ 823.359145][T19934] populate_vma_page_range+0x267/0x3f0 [ 823.359195][T19934] ? __pfx_populate_vma_page_range+0x10/0x10 [ 823.359240][T19934] ? __pfx_find_vma_intersection+0x10/0x10 [ 823.359287][T19934] ? do_mmap+0x69c/0x1210 [ 823.359332][T19934] __mm_populate+0x1d8/0x380 [ 823.359380][T19934] ? __pfx___mm_populate+0x10/0x10 [ 823.359428][T19934] ? up_write+0x282/0x4e0 [ 823.359463][T19934] vm_mmap_pgoff+0x37f/0x470 [ 823.359519][T19934] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 823.359568][T19934] ? __x64_sys_futex+0x1e0/0x4c0 [ 823.359600][T19934] ? __x64_sys_futex+0x1e9/0x4c0 [ 823.359637][T19934] ksys_mmap_pgoff+0x7d/0x5c0 [ 823.359676][T19934] ? xfd_validate_state+0x61/0x180 [ 823.359701][T19934] ? __pfx_do_writev+0x10/0x10 [ 823.359744][T19934] __x64_sys_mmap+0x125/0x190 [ 823.359783][T19934] do_syscall_64+0xcd/0xf80 [ 823.359830][T19934] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 823.359858][T19934] RIP: 0033:0x7f789838f7c9 [ 823.359882][T19934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 823.359910][T19934] RSP: 002b:00007f7899208038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 823.359938][T19934] RAX: ffffffffffffffda RBX: 00007f78985e5fa0 RCX: 00007f789838f7c9 [ 823.359957][T19934] RDX: 00000000000000df RSI: 0000000000400009 RDI: 0000000000000000 [ 823.359974][T19934] RBP: 00007f7898413f91 R08: 0000000000000002 R09: 0000000000008000 [ 823.359991][T19934] R10: 0000000000009b72 R11: 0000000000000246 R12: 0000000000000000 [ 823.360007][T19934] R13: 00007f78985e6038 R14: 00007f78985e5fa0 R15: 00007ffd00f218b8 [ 823.360044][T19934] [ 824.020509][T19769] mkiss: ax0: crc mode is auto. [ 824.118692][ T30] audit: type=1800 audit(1767236884.771:76): pid=19954 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.2976" name="dbroot" dev="configfs" ino=67995 res=0 errno=0 [ 824.199026][T19939] Setting dangerous option i915.mitigations - tainting kernel [ 824.231435][T19939] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 824.300214][T19957] netlink: 'syz.2.2977': attribute type 10 has an invalid length. [ 824.325554][T19957] netlink: 330 bytes leftover after parsing attributes in process `syz.2.2977'. [ 825.050148][T19979] FAULT_INJECTION: forcing a failure. [ 825.050148][T19979] name failslab, interval 1, probability 0, space 0, times 0 [ 825.072196][T19980] input: f¬ as /devices/virtual/input/input39 [ 825.162547][T13424] Bluetooth: hci4: unexpected event 0x3e length: 0 < 1 [ 825.200465][T19979] CPU: 1 UID: 0 PID: 19979 Comm: syz.3.2981 Tainted: G U L syzkaller #0 PREEMPT(full) [ 825.200502][T19979] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 825.200511][T19979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 825.200525][T19979] Call Trace: [ 825.200532][T19979] [ 825.200541][T19979] dump_stack_lvl+0x16c/0x1f0 [ 825.200577][T19979] should_fail_ex+0x512/0x640 [ 825.200608][T19979] ? __kmalloc_cache_noprof+0x5f/0x800 [ 825.200637][T19979] should_failslab+0xc2/0x120 [ 825.200672][T19979] __kmalloc_cache_noprof+0x80/0x800 [ 825.200697][T19979] ? __sys_socket+0xac/0x260 [ 825.200727][T19979] ? fput+0x70/0xf0 [ 825.200747][T19979] ? do_eventfd+0x67/0x390 [ 825.200776][T19979] ? do_eventfd+0x67/0x390 [ 825.200802][T19979] do_eventfd+0x67/0x390 [ 825.200828][T19979] __x64_sys_eventfd+0x32/0x50 [ 825.200856][T19979] do_syscall_64+0xcd/0xf80 [ 825.200889][T19979] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 825.200910][T19979] RIP: 0033:0x7f5d3ff8f7c9 [ 825.200927][T19979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 825.200948][T19979] RSP: 002b:00007f5d40e5a038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 825.200967][T19979] RAX: ffffffffffffffda RBX: 00007f5d401e5fa0 RCX: 00007f5d3ff8f7c9 [ 825.200982][T19979] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 825.200994][T19979] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 825.201007][T19979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 825.201020][T19979] R13: 00007f5d401e6038 R14: 00007f5d401e5fa0 R15: 00007ffe58909dc8 [ 825.201046][T19979] [ 825.468162][T19983] netlink: 330 bytes leftover after parsing attributes in process `syz.3.2981'. [ 825.475493][T19982] zram: Removed device: zram0 [ 826.348567][T19990] FAULT_INJECTION: forcing a failure. [ 826.348567][T19990] name fail_futex, interval 1, probability 0, space 0, times 0 [ 826.348601][T19990] CPU: 0 UID: 0 PID: 19990 Comm: syz.1.2982 Tainted: G U L syzkaller #0 PREEMPT(full) [ 826.348633][T19990] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 826.348641][T19990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 826.348655][T19990] Call Trace: [ 826.348662][T19990] [ 826.348670][T19990] dump_stack_lvl+0x16c/0x1f0 [ 826.348704][T19990] should_fail_ex+0x512/0x640 [ 826.348728][T19990] ? rcu_is_watching+0x12/0xc0 [ 826.348760][T19990] get_futex_key+0x1d0/0x15f0 [ 826.348786][T19990] ? __pfx_get_futex_key+0x10/0x10 [ 826.348810][T19990] ? __pfx____sys_sendmsg+0x10/0x10 [ 826.348842][T19990] futex_wake+0xea/0x530 [ 826.348873][T19990] ? __pfx_futex_wake+0x10/0x10 [ 826.348912][T19990] do_futex+0x1e3/0x350 [ 826.348937][T19990] ? __pfx_do_futex+0x10/0x10 [ 826.348961][T19990] ? fput+0x70/0xf0 [ 826.348982][T19990] ? __sys_sendmsg+0x18c/0x220 [ 826.349010][T19990] __x64_sys_futex+0x1e0/0x4c0 [ 826.349038][T19990] ? __pfx___x64_sys_futex+0x10/0x10 [ 826.349072][T19990] do_syscall_64+0xcd/0xf80 [ 826.349106][T19990] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 826.349128][T19990] RIP: 0033:0x7f789838f7c9 [ 826.349144][T19990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 826.349166][T19990] RSP: 002b:00007f78992080e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 826.349185][T19990] RAX: ffffffffffffffda RBX: 00007f78985e5fa8 RCX: 00007f789838f7c9 [ 826.349200][T19990] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f78985e5fac [ 826.349213][T19990] RBP: 00007f78985e5fa0 R08: 00007f7899209000 R09: 0000000000000000 [ 826.349226][T19990] R10: 0000000000000294 R11: 0000000000000246 R12: 0000000000000000 [ 826.349239][T19990] R13: 00007f78985e6038 R14: 00007ffd00f217d0 R15: 00007ffd00f218b8 [ 826.349265][T19990] [ 826.784242][T19998] can: request_module (can-proto-0) failed. [ 828.803726][T20030] FAULT_INJECTION: forcing a failure. [ 828.803726][T20030] name failslab, interval 1, probability 0, space 0, times 0 [ 828.816592][T20030] CPU: 1 UID: 0 PID: 20030 Comm: syz.1.2992 Tainted: G U L syzkaller #0 PREEMPT(full) [ 828.816642][T20030] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 828.816654][T20030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 828.816673][T20030] Call Trace: [ 828.816683][T20030] [ 828.816694][T20030] dump_stack_lvl+0x16c/0x1f0 [ 828.816743][T20030] should_fail_ex+0x512/0x640 [ 828.816775][T20030] ? kmem_cache_alloc_noprof+0x62/0x770 [ 828.816815][T20030] should_failslab+0xc2/0x120 [ 828.816863][T20030] kmem_cache_alloc_noprof+0x83/0x770 [ 828.816896][T20030] ? security_inode_alloc+0x3b/0x2b0 [ 828.816926][T20030] ? sk_prot_alloc+0x60/0x2a0 [ 828.816976][T20030] ? sk_prot_alloc+0x60/0x2a0 [ 828.817015][T20030] sk_prot_alloc+0x60/0x2a0 [ 828.817060][T20030] sk_alloc+0x36/0xe30 [ 828.817096][T20030] smc_create+0x114/0x2a0 [ 828.817134][T20030] __sock_create+0x339/0x8a0 [ 828.817187][T20030] __sys_socket+0x14d/0x260 [ 828.817211][T20030] ? fdget_pos+0x2b8/0x370 [ 828.817250][T20030] ? __pfx___sys_socket+0x10/0x10 [ 828.817277][T20030] ? xfd_validate_state+0x61/0x180 [ 828.817311][T20030] ? __pfx_ksys_read+0x10/0x10 [ 828.817362][T20030] __x64_sys_socket+0x72/0xb0 [ 828.817387][T20030] ? lockdep_hardirqs_on+0x7c/0x110 [ 828.817430][T20030] do_syscall_64+0xcd/0xf80 [ 828.817474][T20030] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 828.817502][T20030] RIP: 0033:0x7f789838f7c9 [ 828.817524][T20030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 828.817554][T20030] RSP: 002b:00007f7899208038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 828.817583][T20030] RAX: ffffffffffffffda RBX: 00007f78985e5fa0 RCX: 00007f789838f7c9 [ 828.817603][T20030] RDX: 0000000000000001 RSI: 0000000000000001 RDI: 000000000000002b [ 828.817621][T20030] RBP: 00007f7898413f91 R08: 0000000000000000 R09: 0000000000000000 [ 828.817639][T20030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 828.817655][T20030] R13: 00007f78985e6038 R14: 00007f78985e5fa0 R15: 00007ffd00f218b8 [ 828.817698][T20030] [ 828.847789][ T30] audit: type=1800 audit(1767236889.481:77): pid=20029 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.2991" name="dbroot" dev="configfs" ino=69089 res=0 errno=0 [ 829.492614][ T30] audit: type=1800 audit(1767236890.141:78): pid=20034 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.2993" name="lu_gp_id" dev="configfs" ino=68282 res=0 errno=0 [ 830.445695][T20041] FAULT_INJECTION: forcing a failure. [ 830.445695][T20041] name failslab, interval 1, probability 0, space 0, times 0 [ 830.458447][T20041] CPU: 1 UID: 0 PID: 20041 Comm: syz.2.2994 Tainted: G U L syzkaller #0 PREEMPT(full) [ 830.458481][T20041] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 830.458490][T20041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 830.458502][T20041] Call Trace: [ 830.458510][T20041] [ 830.458518][T20041] dump_stack_lvl+0x16c/0x1f0 [ 830.458553][T20041] should_fail_ex+0x512/0x640 [ 830.458576][T20041] ? __kmalloc_cache_noprof+0x5f/0x800 [ 830.458604][T20041] should_failslab+0xc2/0x120 [ 830.458638][T20041] __kmalloc_cache_noprof+0x80/0x800 [ 830.458660][T20041] ? __sys_socket+0xac/0x260 [ 830.458679][T20041] ? fput+0x70/0xf0 [ 830.458698][T20041] ? do_eventfd+0x67/0x390 [ 830.458728][T20041] ? do_eventfd+0x67/0x390 [ 830.458752][T20041] do_eventfd+0x67/0x390 [ 830.458777][T20041] ? rcu_is_watching+0x12/0xc0 [ 830.458808][T20041] __x64_sys_eventfd+0x32/0x50 [ 830.458835][T20041] do_syscall_64+0xcd/0xf80 [ 830.458869][T20041] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 830.458890][T20041] RIP: 0033:0x7fb35f58f7c9 [ 830.458909][T20041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 830.458928][T20041] RSP: 002b:00007fb3603ed038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 830.458947][T20041] RAX: ffffffffffffffda RBX: 00007fb35f7e6090 RCX: 00007fb35f58f7c9 [ 830.458961][T20041] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 830.458974][T20041] RBP: 00007fb35f613f91 R08: 0000000000000000 R09: 0000000000000000 [ 830.458986][T20041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 830.458998][T20041] R13: 00007fb35f7e6128 R14: 00007fb35f7e6090 R15: 00007fff8beba7b8 [ 830.459024][T20041] [ 830.539403][T20043] netlink: 330 bytes leftover after parsing attributes in process `syz.2.2994'. [ 831.288839][T13424] Bluetooth: hci4: unexpected subevent 0x01 length: 123 > 18 [ 831.512232][ T30] audit: type=1800 audit(1767236892.161:79): pid=20062 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.3001" name="dbroot" dev="configfs" ino=69139 res=0 errno=0 [ 831.648320][ T30] audit: type=1800 audit(1767236892.301:80): pid=20073 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.2.3002" name="dbroot" dev="configfs" ino=69139 res=0 errno=0 [ 831.688841][T20057] Setting dangerous option i915.mitigations - tainting kernel [ 831.718977][T20057] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 831.729406][T20073] db_root: cannot open: [ 832.399755][T20080] FAULT_INJECTION: forcing a failure. [ 832.399755][T20080] name failslab, interval 1, probability 0, space 0, times 0 [ 832.476179][T20080] CPU: 0 UID: 0 PID: 20080 Comm: syz.3.3004 Tainted: G U L syzkaller #0 PREEMPT(full) [ 832.476225][T20080] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 832.476237][T20080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 832.476255][T20080] Call Trace: [ 832.476265][T20080] [ 832.476276][T20080] dump_stack_lvl+0x16c/0x1f0 [ 832.476324][T20080] should_fail_ex+0x512/0x640 [ 832.476362][T20080] should_failslab+0xc2/0x120 [ 832.476408][T20080] __kmalloc_cache_noprof+0x80/0x800 [ 832.476443][T20080] ? sctp_add_bind_addr+0xae/0x3f0 [ 832.476487][T20080] ? sctp_add_bind_addr+0xae/0x3f0 [ 832.476524][T20080] sctp_add_bind_addr+0xae/0x3f0 [ 832.476567][T20080] sctp_copy_local_addr_list+0x349/0x550 [ 832.476617][T20080] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 832.476667][T20080] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360 [ 832.476714][T20080] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 832.476764][T20080] sctp_bind_addr_copy+0xe0/0x530 [ 832.476813][T20080] sctp_connect_new_asoc+0x1c9/0x770 [ 832.476849][T20080] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 832.476889][T20080] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 832.476939][T20080] sctp_sendmsg+0x157c/0x1e20 [ 832.476991][T20080] ? __pfx_sctp_sendmsg+0x10/0x10 [ 832.477022][T20080] ? __pfx___might_resched+0x10/0x10 [ 832.477064][T20080] ? __lock_acquire+0x436/0x2890 [ 832.477098][T20080] ? aa_sk_perm+0x2f2/0xae0 [ 832.477137][T20080] ? __pfx_aa_sk_perm+0x10/0x10 [ 832.477182][T20080] ? __pfx_sctp_sendmsg+0x10/0x10 [ 832.477216][T20080] inet_sendmsg+0x11c/0x140 [ 832.477251][T20080] ____sys_sendmsg+0x973/0xc30 [ 832.477300][T20080] ? __pfx_____sys_sendmsg+0x10/0x10 [ 832.477349][T20080] ? find_held_lock+0x2b/0x80 [ 832.477389][T20080] ? futex_unqueue+0x133/0x2c0 [ 832.477427][T20080] ___sys_sendmsg+0x134/0x1d0 [ 832.477468][T20080] ? __pfx____sys_sendmsg+0x10/0x10 [ 832.477505][T20080] ? __pfx___futex_wait+0x10/0x10 [ 832.477543][T20080] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 832.477599][T20080] ? find_held_lock+0x2b/0x80 [ 832.477665][T20080] __sys_sendmmsg+0x200/0x420 [ 832.477708][T20080] ? __pfx___sys_sendmmsg+0x10/0x10 [ 832.477757][T20080] ? __pfx_do_futex+0x10/0x10 [ 832.477808][T20080] ? __x64_sys_openat+0x174/0x210 [ 832.477844][T20080] ? xfd_validate_state+0x61/0x180 [ 832.477880][T20080] __x64_sys_sendmmsg+0x9c/0x100 [ 832.477916][T20080] ? lockdep_hardirqs_on+0x7c/0x110 [ 832.477961][T20080] do_syscall_64+0xcd/0xf80 [ 832.478015][T20080] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 832.478045][T20080] RIP: 0033:0x7f5d3ff8f7c9 [ 832.478067][T20080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 832.478096][T20080] RSP: 002b:00007f5d40e5a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 832.478122][T20080] RAX: ffffffffffffffda RBX: 00007f5d401e5fa0 RCX: 00007f5d3ff8f7c9 [ 832.478140][T20080] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000006 [ 832.478157][T20080] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 832.478174][T20080] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 832.478191][T20080] R13: 00007f5d401e6038 R14: 00007f5d401e5fa0 R15: 00007ffe58909dc8 [ 832.478230][T20080] [ 832.525035][T20083] netlink: 'syz.0.3006': attribute type 10 has an invalid length. [ 832.827765][T20083] netlink: 330 bytes leftover after parsing attributes in process `syz.0.3006'. [ 832.927591][T20087] netlink: 'syz.2.3007': attribute type 10 has an invalid length. [ 832.936556][T20087] netlink: 330 bytes leftover after parsing attributes in process `syz.2.3007'. [ 832.954579][T20092] netlink: 330 bytes leftover after parsing attributes in process `syz.1.3008'. [ 833.237154][ T30] audit: type=1800 audit(1767236893.881:81): pid=20099 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.2.3010" name="dbroot" dev="configfs" ino=68441 res=0 errno=0 [ 833.368311][T13424] Bluetooth: hci4: command 0x040f tx timeout [ 834.369229][T20110] FAULT_INJECTION: forcing a failure. [ 834.369229][T20110] name failslab, interval 1, probability 0, space 0, times 0 [ 834.487867][T20110] CPU: 1 UID: 0 PID: 20110 Comm: syz.3.3012 Tainted: G U L syzkaller #0 PREEMPT(full) [ 834.487905][T20110] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 834.487914][T20110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 834.487928][T20110] Call Trace: [ 834.487936][T20110] [ 834.487945][T20110] dump_stack_lvl+0x16c/0x1f0 [ 834.487980][T20110] should_fail_ex+0x512/0x640 [ 834.488004][T20110] ? __kmalloc_noprof+0xca/0x910 [ 834.488030][T20110] should_failslab+0xc2/0x120 [ 834.488064][T20110] __kmalloc_noprof+0xeb/0x910 [ 834.488087][T20110] ? vhost_dev_set_owner+0x287/0xa50 [ 834.488121][T20110] ? vhost_dev_set_owner+0x287/0xa50 [ 834.488150][T20110] vhost_dev_set_owner+0x287/0xa50 [ 834.488188][T20110] vhost_net_ioctl+0x87f/0x1850 [ 834.488212][T20110] ? do_vfs_ioctl+0x128/0x14f0 [ 834.488238][T20110] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 834.488264][T20110] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 834.488295][T20110] ? find_held_lock+0x2b/0x80 [ 834.488323][T20110] ? hook_file_ioctl_common+0x144/0x410 [ 834.488353][T20110] ? __fget_files+0x20e/0x3c0 [ 834.488387][T20110] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 834.488415][T20110] __x64_sys_ioctl+0x18e/0x210 [ 834.488442][T20110] do_syscall_64+0xcd/0xf80 [ 834.488476][T20110] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 834.488498][T20110] RIP: 0033:0x7f5d3ff8f7c9 [ 834.488514][T20110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 834.488535][T20110] RSP: 002b:00007f5d40e18038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 834.488562][T20110] RAX: ffffffffffffffda RBX: 00007f5d401e6180 RCX: 00007f5d3ff8f7c9 [ 834.488577][T20110] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000005 [ 834.488590][T20110] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 834.488604][T20110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 834.488617][T20110] R13: 00007f5d401e6218 R14: 00007f5d401e6180 R15: 00007ffe58909dc8 [ 834.488644][T20110] [ 834.994486][T20121] FAULT_INJECTION: forcing a failure. [ 834.994486][T20121] name failslab, interval 1, probability 0, space 0, times 0 [ 835.007306][T20121] CPU: 1 UID: 0 PID: 20121 Comm: syz.0.3015 Tainted: G U L syzkaller #0 PREEMPT(full) [ 835.007354][T20121] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 835.007366][T20121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 835.007384][T20121] Call Trace: [ 835.007395][T20121] [ 835.007407][T20121] dump_stack_lvl+0x16c/0x1f0 [ 835.007456][T20121] should_fail_ex+0x512/0x640 [ 835.007488][T20121] ? __kmalloc_cache_noprof+0x5f/0x800 [ 835.007533][T20121] should_failslab+0xc2/0x120 [ 835.007580][T20121] __kmalloc_cache_noprof+0x80/0x800 [ 835.007613][T20121] ? __sys_socket+0xac/0x260 [ 835.007639][T20121] ? fput+0x70/0xf0 [ 835.007668][T20121] ? do_eventfd+0x67/0x390 [ 835.007709][T20121] ? do_eventfd+0x67/0x390 [ 835.007745][T20121] do_eventfd+0x67/0x390 [ 835.007778][T20121] ? rcu_is_watching+0x12/0xc0 [ 835.007821][T20121] __x64_sys_eventfd+0x32/0x50 [ 835.007859][T20121] do_syscall_64+0xcd/0xf80 [ 835.007907][T20121] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 835.007936][T20121] RIP: 0033:0x7fa39478f7c9 [ 835.007959][T20121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 835.007988][T20121] RSP: 002b:00007fa395605038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 835.008016][T20121] RAX: ffffffffffffffda RBX: 00007fa3949e6090 RCX: 00007fa39478f7c9 [ 835.008035][T20121] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 835.008052][T20121] RBP: 00007fa394813f91 R08: 0000000000000000 R09: 0000000000000000 [ 835.008070][T20121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 835.008088][T20121] R13: 00007fa3949e6128 R14: 00007fa3949e6090 R15: 00007ffff1177948 [ 835.008125][T20121] [ 835.409577][T20121] netlink: 330 bytes leftover after parsing attributes in process `syz.0.3015'. [ 835.447812][T13424] Bluetooth: hci4: command 0x040f tx timeout [ 835.703934][T20110] netlink: set zone limit has 8 unknown bytes [ 835.842804][T19981] mkiss: ax0: crc mode is auto. [ 836.059457][T20117] Setting dangerous option i915.mitigations - tainting kernel [ 836.067130][T20117] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 836.724388][T20137] FAULT_INJECTION: forcing a failure. [ 836.724388][T20137] name failslab, interval 1, probability 0, space 0, times 0 [ 836.737189][T20137] CPU: 0 UID: 0 PID: 20137 Comm: syz.3.3017 Tainted: G U L syzkaller #0 PREEMPT(full) [ 836.737234][T20137] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 836.737245][T20137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 836.737262][T20137] Call Trace: [ 836.737271][T20137] [ 836.737282][T20137] dump_stack_lvl+0x16c/0x1f0 [ 836.737331][T20137] should_fail_ex+0x512/0x640 [ 836.737364][T20137] ? __kmalloc_cache_noprof+0x5f/0x800 [ 836.737409][T20137] should_failslab+0xc2/0x120 [ 836.737455][T20137] __kmalloc_cache_noprof+0x80/0x800 [ 836.737490][T20137] ? kernfs_iop_get_link+0x65/0x1670 [ 836.737542][T20137] ? kernfs_iop_get_link+0x65/0x1670 [ 836.737588][T20137] kernfs_iop_get_link+0x65/0x1670 [ 836.737641][T20137] ? atime_needs_update+0x8b/0x710 [ 836.737685][T20137] pick_link+0xc96/0x13b0 [ 836.737721][T20137] ? __pfx_kernfs_iop_get_link+0x10/0x10 [ 836.737773][T20137] step_into_slowpath+0x6c6/0xf50 [ 836.737820][T20137] ? __pfx_step_into_slowpath+0x10/0x10 [ 836.737849][T20137] ? __pfx___up_read+0x10/0x10 [ 836.737874][T20137] ? path_openat+0x17b8/0x3140 [ 836.737906][T20137] ? lookup_fast+0x156/0x610 [ 836.737935][T20137] path_openat+0x10db/0x3140 [ 836.737975][T20137] ? __pfx_path_openat+0x10/0x10 [ 836.738016][T20137] do_filp_open+0x20b/0x470 [ 836.738049][T20137] ? __pfx_do_filp_open+0x10/0x10 [ 836.738098][T20137] ? alloc_fd+0x471/0x7d0 [ 836.738136][T20137] do_sys_openat2+0x121/0x290 [ 836.738159][T20137] ? __pfx_do_sys_openat2+0x10/0x10 [ 836.738192][T20137] __x64_sys_openat+0x174/0x210 [ 836.738217][T20137] ? __pfx___x64_sys_openat+0x10/0x10 [ 836.738251][T20137] do_syscall_64+0xcd/0xf80 [ 836.738285][T20137] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 836.738307][T20137] RIP: 0033:0x7f5d3ff8f7c9 [ 836.738323][T20137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 836.738344][T20137] RSP: 002b:00007f5d40e39038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 836.738364][T20137] RAX: ffffffffffffffda RBX: 00007f5d401e6090 RCX: 00007f5d3ff8f7c9 [ 836.738379][T20137] RDX: 0000000000000100 RSI: 00002000000000c0 RDI: ffffffffffffff9c [ 836.738393][T20137] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 836.738411][T20137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 836.738424][T20137] R13: 00007f5d401e6128 R14: 00007f5d401e6090 R15: 00007ffe58909dc8 [ 836.738451][T20137] [ 837.416332][ T30] audit: type=1800 audit(1767236898.061:82): pid=20146 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.3020" name="lu_gp_id" dev="configfs" ino=68536 res=0 errno=0 [ 837.601240][T20143] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x18000 [ 837.717797][T20143] flags: 0xfff00000002000(reserved|node=0|zone=1|lastcpupid=0x7ff) [ 837.725879][T20143] raw: 00fff00000002000 ffffea0000600008 ffffea0000600008 0000000000000000 [ 837.735220][T20143] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 837.744886][T20143] page dumped because: unmovable page [ 837.750748][T20143] page_owner info is not present (never set?) [ 838.979860][T15443] Bluetooth: hci1: unexpected subevent 0x01 length: 3 < 18 [ 839.009163][T20166] FAULT_INJECTION: forcing a failure. [ 839.009163][T20166] name failslab, interval 1, probability 0, space 0, times 0 [ 839.044114][T20166] CPU: 1 UID: 0 PID: 20166 Comm: syz.3.3024 Tainted: G U L syzkaller #0 PREEMPT(full) [ 839.044186][T20166] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 839.044200][T20166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 839.044220][T20166] Call Trace: [ 839.044231][T20166] [ 839.044244][T20166] dump_stack_lvl+0x16c/0x1f0 [ 839.044300][T20166] should_fail_ex+0x512/0x640 [ 839.044337][T20166] ? __kmalloc_noprof+0xca/0x910 [ 839.044377][T20166] should_failslab+0xc2/0x120 [ 839.044436][T20166] __kmalloc_noprof+0xeb/0x910 [ 839.044474][T20166] ? vhost_dev_set_owner+0x287/0xa50 [ 839.044529][T20166] ? vhost_dev_set_owner+0x287/0xa50 [ 839.044583][T20166] vhost_dev_set_owner+0x287/0xa50 [ 839.044639][T20166] vhost_net_ioctl+0x87f/0x1850 [ 839.044676][T20166] ? do_vfs_ioctl+0x128/0x14f0 [ 839.044713][T20166] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 839.044751][T20166] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 839.044799][T20166] ? find_held_lock+0x2b/0x80 [ 839.044839][T20166] ? hook_file_ioctl_common+0x144/0x410 [ 839.044885][T20166] ? __fget_files+0x20e/0x3c0 [ 839.044935][T20166] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 839.044976][T20166] __x64_sys_ioctl+0x18e/0x210 [ 839.045016][T20166] do_syscall_64+0xcd/0xf80 [ 839.045070][T20166] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 839.045102][T20166] RIP: 0033:0x7f5d3ff8f7c9 [ 839.045127][T20166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 839.045159][T20166] RSP: 002b:00007f5d40e18038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 839.045188][T20166] RAX: ffffffffffffffda RBX: 00007f5d401e6180 RCX: 00007f5d3ff8f7c9 [ 839.045209][T20166] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000005 [ 839.045227][T20166] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 839.045244][T20166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 839.045262][T20166] R13: 00007f5d401e6218 R14: 00007f5d401e6180 R15: 00007ffe58909dc8 [ 839.045313][T20166] [ 839.926932][T20163] netlink: set zone limit has 8 unknown bytes [ 840.393789][T20186] can: request_module (can-proto-0) failed. [ 840.537376][ T30] audit: type=1800 audit(1767236901.181:83): pid=20194 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.3029" name="dbroot" dev="configfs" ino=69504 res=0 errno=0 [ 840.684209][T20176] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 840.734218][T20176] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 840.791179][T20176] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 840.840425][T20176] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 841.303338][ T30] audit: type=1800 audit(1767236901.951:84): pid=20211 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.3030" name="lu_gp_id" dev="configfs" ino=69689 res=0 errno=0 [ 841.928007][T15443] Bluetooth: hci4: command 0x040f tx timeout [ 842.023838][T20218] FAULT_INJECTION: forcing a failure. [ 842.023838][T20218] name failslab, interval 1, probability 0, space 0, times 0 [ 842.158233][T20218] CPU: 1 UID: 0 PID: 20218 Comm: syz.1.3033 Tainted: G U L syzkaller #0 PREEMPT(full) [ 842.158283][T20218] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 842.158294][T20218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 842.158312][T20218] Call Trace: [ 842.158322][T20218] [ 842.158333][T20218] dump_stack_lvl+0x16c/0x1f0 [ 842.158384][T20218] should_fail_ex+0x512/0x640 [ 842.158416][T20218] ? kmem_cache_alloc_noprof+0x62/0x770 [ 842.158457][T20218] should_failslab+0xc2/0x120 [ 842.158503][T20218] kmem_cache_alloc_noprof+0x83/0x770 [ 842.158539][T20218] ? __anon_vma_prepare+0x344/0x5e0 [ 842.158579][T20218] ? __anon_vma_prepare+0x344/0x5e0 [ 842.158610][T20218] __anon_vma_prepare+0x344/0x5e0 [ 842.158641][T20218] ? __pfx___pte_alloc+0x10/0x10 [ 842.158687][T20218] __vmf_anon_prepare+0x11c/0x240 [ 842.158734][T20218] do_anonymous_page+0x59b/0x2190 [ 842.158779][T20218] ? do_raw_spin_unlock+0x172/0x230 [ 842.158836][T20218] ? __pmd_alloc+0x6aa/0x9c0 [ 842.158895][T20218] __handle_mm_fault+0x1ecf/0x2bb0 [ 842.158939][T20218] ? __pfx___handle_mm_fault+0x10/0x10 [ 842.159005][T20218] handle_mm_fault+0x3fe/0xad0 [ 842.159045][T20218] __get_user_pages+0x54e/0x3590 [ 842.159109][T20218] ? __pfx___get_user_pages+0x10/0x10 [ 842.159166][T20218] populate_vma_page_range+0x267/0x3f0 [ 842.159218][T20218] ? __pfx_populate_vma_page_range+0x10/0x10 [ 842.159273][T20218] ? __pfx_find_vma_intersection+0x10/0x10 [ 842.159322][T20218] ? do_mmap+0x69c/0x1210 [ 842.159372][T20218] __mm_populate+0x1d8/0x380 [ 842.159425][T20218] ? __pfx___mm_populate+0x10/0x10 [ 842.159477][T20218] ? up_write+0x282/0x4e0 [ 842.159513][T20218] vm_mmap_pgoff+0x37f/0x470 [ 842.159561][T20218] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 842.159614][T20218] ? __x64_sys_futex+0x1e0/0x4c0 [ 842.159648][T20218] ? __x64_sys_futex+0x1e9/0x4c0 [ 842.159691][T20218] ksys_mmap_pgoff+0x7d/0x5c0 [ 842.159736][T20218] ? xfd_validate_state+0x61/0x180 [ 842.159769][T20218] __x64_sys_mmap+0x125/0x190 [ 842.159805][T20218] do_syscall_64+0xcd/0xf80 [ 842.159840][T20218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 842.159862][T20218] RIP: 0033:0x7f789838f7c9 [ 842.159886][T20218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 842.159908][T20218] RSP: 002b:00007f7899208038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 842.159929][T20218] RAX: ffffffffffffffda RBX: 00007f78985e5fa0 RCX: 00007f789838f7c9 [ 842.159945][T20218] RDX: 00000000000000df RSI: 0000000000400009 RDI: 0000000000000000 [ 842.159959][T20218] RBP: 00007f7898413f91 R08: 0000000000000002 R09: 0000000000008000 [ 842.159984][T20218] R10: 0000000000009b72 R11: 0000000000000246 R12: 0000000000000000 [ 842.159997][T20218] R13: 00007f78985e6038 R14: 00007f78985e5fa0 R15: 00007ffd00f218b8 [ 842.160024][T20218] [ 842.819622][T15443] Bluetooth: hci0: command 0x0c1a tx timeout [ 842.819629][T13424] Bluetooth: hci2: command 0x0c1a tx timeout [ 842.887895][T15443] Bluetooth: hci1: command 0x0c1a tx timeout [ 843.187839][T20250] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input41 [ 843.419132][T20249] FAULT_INJECTION: forcing a failure. [ 843.419132][T20249] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 843.432444][T20249] CPU: 1 UID: 0 PID: 20249 Comm: syz.1.3036 Tainted: G U L syzkaller #0 PREEMPT(full) [ 843.432487][T20249] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 843.432497][T20249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 843.432515][T20249] Call Trace: [ 843.432525][T20249] [ 843.432535][T20249] dump_stack_lvl+0x16c/0x1f0 [ 843.432583][T20249] should_fail_ex+0x512/0x640 [ 843.432618][T20249] _copy_from_user+0x2e/0xd0 [ 843.432651][T20249] copy_msghdr_from_user+0x98/0x160 [ 843.432689][T20249] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 843.432733][T20249] ? __lock_acquire+0x436/0x2890 [ 843.432774][T20249] ___sys_recvmsg+0xdb/0x1a0 [ 843.432811][T20249] ? __pfx____sys_recvmsg+0x10/0x10 [ 843.432867][T20249] ? __pfx___might_resched+0x10/0x10 [ 843.432914][T20249] do_recvmmsg+0x2fe/0x750 [ 843.432956][T20249] ? __pfx_do_recvmmsg+0x10/0x10 [ 843.432999][T20249] ? __mutex_unlock_slowpath+0x161/0x790 [ 843.433055][T20249] ? __fget_files+0x20e/0x3c0 [ 843.433105][T20249] __x64_sys_recvmmsg+0x22a/0x280 [ 843.433146][T20249] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 843.433196][T20249] do_syscall_64+0xcd/0xf80 [ 843.433242][T20249] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 843.433271][T20249] RIP: 0033:0x7f789838f7c9 [ 843.433293][T20249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 843.433321][T20249] RSP: 002b:00007f7899208038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 843.433347][T20249] RAX: ffffffffffffffda RBX: 00007f78985e5fa0 RCX: 00007f789838f7c9 [ 843.433366][T20249] RDX: 000000000000fffd RSI: 0000000000000000 RDI: 0000000000000003 [ 843.433383][T20249] RBP: 00007f7899208090 R08: 0000000000000000 R09: 0000000000000000 [ 843.433399][T20249] R10: 0000000000008000 R11: 0000000000000246 R12: 0000000000000001 [ 843.433416][T20249] R13: 00007f78985e6038 R14: 00007f78985e5fa0 R15: 00007ffd00f218b8 [ 843.433452][T20249] [ 843.875788][T20251] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input42 [ 844.161385][T20268] netlink: 330 bytes leftover after parsing attributes in process `syz.2.3038'. [ 844.497771][ T30] audit: type=1800 audit(1767236905.131:85): pid=20275 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.3040" name="dbroot" dev="configfs" ino=70689 res=0 errno=0 [ 844.719321][T20277] CIFS: No dialect specified on mount. Default has changed to a more secure dialect, SMB2.1 or later (e.g. SMB3.1.1), from CIFS (SMB1). To use the less secure SMB1 dialect to access old servers which do not support SMB3.1.1 (or even SMB3 or SMB2.1) specify vers=1.0 on mount. [ 844.827871][T20277] CIFS mount error: No usable UNC path provided in device string! [ 844.827871][T20277] [ 844.856662][T20277] CIFS: VFS: CIFS mount error: No usable UNC path provided in device string! [ 845.795195][T20293] ERROR: Out of memory at tomoyo_memory_ok. [ 845.934102][ T30] audit: type=1800 audit(1767236906.581:86): pid=20298 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.3046" name="dbroot" dev="configfs" ino=69799 res=0 errno=0 [ 847.073528][T20314] FAULT_INJECTION: forcing a failure. [ 847.073528][T20314] name failslab, interval 1, probability 0, space 0, times 0 [ 847.176914][T20314] CPU: 0 UID: 0 PID: 20314 Comm: syz.1.3048 Tainted: G U L syzkaller #0 PREEMPT(full) [ 847.176966][T20314] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 847.176979][T20314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 847.176997][T20314] Call Trace: [ 847.177008][T20314] [ 847.177019][T20314] dump_stack_lvl+0x16c/0x1f0 [ 847.177068][T20314] should_fail_ex+0x512/0x640 [ 847.177101][T20314] ? __kmalloc_noprof+0xca/0x910 [ 847.177136][T20314] should_failslab+0xc2/0x120 [ 847.177180][T20314] __kmalloc_noprof+0xeb/0x910 [ 847.177212][T20314] ? copy_splice_read+0x1a8/0xc20 [ 847.177261][T20314] ? copy_splice_read+0x1a8/0xc20 [ 847.177301][T20314] ? ktime_get_coarse_real_ts64_mg+0x240/0x300 [ 847.177336][T20314] copy_splice_read+0x1a8/0xc20 [ 847.177386][T20314] ? __pfx_copy_splice_read+0x10/0x10 [ 847.177427][T20314] ? __pfx_current_time+0x10/0x10 [ 847.177457][T20314] ? lock_acquire+0x179/0x330 [ 847.177493][T20314] ? find_held_lock+0x2b/0x80 [ 847.177534][T20314] ? __pfx_copy_splice_read+0x10/0x10 [ 847.177574][T20314] do_splice_read+0x285/0x370 [ 847.177619][T20314] splice_direct_to_actor+0x2a1/0xa30 [ 847.177669][T20314] ? __pfx_direct_splice_actor+0x10/0x10 [ 847.177729][T20314] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 847.177772][T20314] ? do_raw_spin_lock+0x12c/0x2b0 [ 847.177816][T20314] do_splice_direct+0x174/0x240 [ 847.177860][T20314] ? __pfx_do_splice_direct+0x10/0x10 [ 847.177904][T20314] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 847.177952][T20314] ? rw_verify_area+0xcf/0x6c0 [ 847.177991][T20314] do_sendfile+0xb06/0xe50 [ 847.178038][T20314] ? __pfx_do_sendfile+0x10/0x10 [ 847.178076][T20314] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 847.178129][T20314] __x64_sys_sendfile64+0x1d8/0x220 [ 847.178159][T20314] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 847.178186][T20314] ? syscall_user_dispatch+0x78/0x140 [ 847.178233][T20314] do_syscall_64+0xcd/0xf80 [ 847.178279][T20314] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 847.178310][T20314] RIP: 0033:0x7f789838f7c9 [ 847.178347][T20314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 847.178395][T20314] RSP: 002b:00007f78991e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 847.178426][T20314] RAX: ffffffffffffffda RBX: 00007f78985e6090 RCX: 00007f789838f7c9 [ 847.178446][T20314] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 847.178464][T20314] RBP: 00007f7898413f91 R08: 0000000000000000 R09: 0000000000000000 [ 847.178483][T20314] R10: 000000007fffe000 R11: 0000000000000246 R12: 0000000000000000 [ 847.178501][T20314] R13: 00007f78985e6128 R14: 00007f78985e6090 R15: 00007ffd00f218b8 [ 847.178541][T20314] [ 847.529518][T20317] netlink: 330 bytes leftover after parsing attributes in process `syz.0.3050'. [ 847.670203][T20323] FAULT_INJECTION: forcing a failure. [ 847.670203][T20323] name failslab, interval 1, probability 0, space 0, times 0 [ 847.696030][T20323] CPU: 0 UID: 0 PID: 20323 Comm: syz.3.3049 Tainted: G U L syzkaller #0 PREEMPT(full) [ 847.696085][T20323] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 847.696099][T20323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 847.696119][T20323] Call Trace: [ 847.696130][T20323] [ 847.696143][T20323] dump_stack_lvl+0x16c/0x1f0 [ 847.696198][T20323] should_fail_ex+0x512/0x640 [ 847.696236][T20323] ? __kmalloc_cache_noprof+0x5f/0x800 [ 847.696280][T20323] should_failslab+0xc2/0x120 [ 847.696331][T20323] __kmalloc_cache_noprof+0x80/0x800 [ 847.696367][T20323] ? __sys_socket+0xac/0x260 [ 847.696396][T20323] ? fput+0x70/0xf0 [ 847.696434][T20323] ? do_eventfd+0x67/0x390 [ 847.696484][T20323] ? do_eventfd+0x67/0x390 [ 847.696525][T20323] do_eventfd+0x67/0x390 [ 847.696564][T20323] ? rcu_is_watching+0x12/0xc0 [ 847.696613][T20323] __x64_sys_eventfd+0x32/0x50 [ 847.696655][T20323] do_syscall_64+0xcd/0xf80 [ 847.696708][T20323] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 847.696743][T20323] RIP: 0033:0x7f5d3ff8f7c9 [ 847.696770][T20323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 847.696802][T20323] RSP: 002b:00007f5d40e39038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 847.696833][T20323] RAX: ffffffffffffffda RBX: 00007f5d401e6090 RCX: 00007f5d3ff8f7c9 [ 847.696855][T20323] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 847.696874][T20323] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 847.696894][T20323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 847.696913][T20323] R13: 00007f5d401e6128 R14: 00007f5d401e6090 R15: 00007ffe58909dc8 [ 847.696955][T20323] [ 847.824409][T20324] FAULT_INJECTION: forcing a failure. [ 847.824409][T20324] name failslab, interval 1, probability 0, space 0, times 0 [ 847.884769][T20324] CPU: 1 UID: 0 PID: 20324 Comm: syz.0.3051 Tainted: G U L syzkaller #0 PREEMPT(full) [ 847.884818][T20324] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 847.884831][T20324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 847.884850][T20324] Call Trace: [ 847.884861][T20324] [ 847.884873][T20324] dump_stack_lvl+0x16c/0x1f0 [ 847.884925][T20324] should_fail_ex+0x512/0x640 [ 847.884959][T20324] ? __kmalloc_cache_noprof+0x5f/0x800 [ 847.884999][T20324] should_failslab+0xc2/0x120 [ 847.885048][T20324] __kmalloc_cache_noprof+0x80/0x800 [ 847.885083][T20324] ? __sys_socket+0xac/0x260 [ 847.885109][T20324] ? fput+0x70/0xf0 [ 847.885137][T20324] ? do_eventfd+0x67/0x390 [ 847.885181][T20324] ? do_eventfd+0x67/0x390 [ 847.885219][T20324] do_eventfd+0x67/0x390 [ 847.885255][T20324] ? rcu_is_watching+0x12/0xc0 [ 847.885299][T20324] __x64_sys_eventfd+0x32/0x50 [ 847.885349][T20324] do_syscall_64+0xcd/0xf80 [ 847.885396][T20324] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 847.885425][T20324] RIP: 0033:0x7fa39478f7c9 [ 847.885447][T20324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 847.885478][T20324] RSP: 002b:00007fa395605038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 847.885505][T20324] RAX: ffffffffffffffda RBX: 00007fa3949e6090 RCX: 00007fa39478f7c9 [ 847.885524][T20324] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 847.885543][T20324] RBP: 00007fa394813f91 R08: 0000000000000000 R09: 0000000000000000 [ 847.885561][T20324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 847.885579][T20324] R13: 00007fa3949e6128 R14: 00007fa3949e6090 R15: 00007ffff1177948 [ 847.885618][T20324] [ 848.083663][T20310] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3048'. [ 848.159887][T20323] netlink: 342 bytes leftover after parsing attributes in process `syz.3.3049'. [ 848.173694][T20145] mkiss: ax0: crc mode is auto. [ 848.488135][T20322] netlink: 330 bytes leftover after parsing attributes in process `syz.0.3051'. [ 849.648618][T20352] FAULT_INJECTION: forcing a failure. [ 849.648618][T20352] name failslab, interval 1, probability 0, space 0, times 0 [ 849.697234][T20352] CPU: 1 UID: 0 PID: 20352 Comm: syz.3.3058 Tainted: G U L syzkaller #0 PREEMPT(full) [ 849.697274][T20352] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 849.697282][T20352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 849.697294][T20352] Call Trace: [ 849.697301][T20352] [ 849.697309][T20352] dump_stack_lvl+0x16c/0x1f0 [ 849.697344][T20352] should_fail_ex+0x512/0x640 [ 849.697367][T20352] ? fs_reclaim_acquire+0xae/0x150 [ 849.697402][T20352] should_failslab+0xc2/0x120 [ 849.697435][T20352] __kmalloc_noprof+0xeb/0x910 [ 849.697458][T20352] ? tomoyo_encode2+0x100/0x3e0 [ 849.697490][T20352] ? tomoyo_encode2+0x100/0x3e0 [ 849.697518][T20352] tomoyo_encode2+0x100/0x3e0 [ 849.697547][T20352] tomoyo_encode+0x29/0x50 [ 849.697572][T20352] tomoyo_realpath_from_path+0x18f/0x6e0 [ 849.697606][T20352] tomoyo_path_number_perm+0x245/0x580 [ 849.697628][T20352] ? tomoyo_path_number_perm+0x237/0x580 [ 849.697672][T20352] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 849.697707][T20352] ? find_held_lock+0x2b/0x80 [ 849.697760][T20352] ? find_held_lock+0x2b/0x80 [ 849.697784][T20352] ? hook_file_ioctl_common+0x144/0x410 [ 849.697813][T20352] ? __fget_files+0x20e/0x3c0 [ 849.697845][T20352] security_file_ioctl+0x9b/0x240 [ 849.697870][T20352] __x64_sys_ioctl+0xb7/0x210 [ 849.697896][T20352] do_syscall_64+0xcd/0xf80 [ 849.697927][T20352] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 849.697947][T20352] RIP: 0033:0x7f5d3ff8f7c9 [ 849.697962][T20352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 849.697981][T20352] RSP: 002b:00007f5d40e5a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 849.698000][T20352] RAX: ffffffffffffffda RBX: 00007f5d401e5fa0 RCX: 00007f5d3ff8f7c9 [ 849.698013][T20352] RDX: ffffffffffffffff RSI: 00000000800455d1 RDI: 0000000000000003 [ 849.698025][T20352] RBP: 00007f5d40e5a090 R08: 0000000000000000 R09: 0000000000000000 [ 849.698037][T20352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 849.698049][T20352] R13: 00007f5d401e6038 R14: 00007f5d401e5fa0 R15: 00007ffe58909dc8 [ 849.698075][T20352] [ 849.988462][T20352] ERROR: Out of memory at tomoyo_realpath_from_path. [ 850.208222][T20358] FAULT_INJECTION: forcing a failure. [ 850.208222][T20358] name failslab, interval 1, probability 0, space 0, times 0 [ 850.240189][T20358] CPU: 0 UID: 0 PID: 20358 Comm: syz.1.3059 Tainted: G U L syzkaller #0 PREEMPT(full) [ 850.240242][T20358] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 850.240255][T20358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 850.240274][T20358] Call Trace: [ 850.240285][T20358] [ 850.240297][T20358] dump_stack_lvl+0x16c/0x1f0 [ 850.240349][T20358] should_fail_ex+0x512/0x640 [ 850.240385][T20358] ? __kmalloc_cache_noprof+0x5f/0x800 [ 850.240427][T20358] should_failslab+0xc2/0x120 [ 850.240485][T20358] __kmalloc_cache_noprof+0x80/0x800 [ 850.240519][T20358] ? __sys_socket+0xac/0x260 [ 850.240548][T20358] ? fput+0x70/0xf0 [ 850.240576][T20358] ? do_eventfd+0x67/0x390 [ 850.240620][T20358] ? do_eventfd+0x67/0x390 [ 850.240659][T20358] do_eventfd+0x67/0x390 [ 850.240695][T20358] ? rcu_is_watching+0x12/0xc0 [ 850.240740][T20358] __x64_sys_eventfd+0x32/0x50 [ 850.240858][T20358] do_syscall_64+0xcd/0xf80 [ 850.240908][T20358] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 850.240941][T20358] RIP: 0033:0x7f789838f7c9 [ 850.240966][T20358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 850.240997][T20358] RSP: 002b:00007f78991e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 850.241026][T20358] RAX: ffffffffffffffda RBX: 00007f78985e6090 RCX: 00007f789838f7c9 [ 850.241047][T20358] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 850.241067][T20358] RBP: 00007f7898413f91 R08: 0000000000000000 R09: 0000000000000000 [ 850.241087][T20358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 850.241106][T20358] R13: 00007f78985e6128 R14: 00007f78985e6090 R15: 00007ffd00f218b8 [ 850.241157][T20358] [ 850.432142][T20358] netlink: 330 bytes leftover after parsing attributes in process `syz.1.3059'. [ 850.868664][ T30] audit: type=1800 audit(1767236911.521:87): pid=20370 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.3062" name="lu_gp_id" dev="configfs" ino=70827 res=0 errno=0 [ 851.185502][T20360] Setting dangerous option i915.mitigations - tainting kernel [ 851.221855][T20360] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 851.652758][T15443] Bluetooth: hci2: unexpected subevent 0x01 length: 3 < 18 [ 851.691713][T20383] FAULT_INJECTION: forcing a failure. [ 851.691713][T20383] name failslab, interval 1, probability 0, space 0, times 0 [ 851.704561][T20383] CPU: 0 UID: 0 PID: 20383 Comm: syz.2.3067 Tainted: G U L syzkaller #0 PREEMPT(full) [ 851.704612][T20383] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 851.704627][T20383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 851.704646][T20383] Call Trace: [ 851.704658][T20383] [ 851.704670][T20383] dump_stack_lvl+0x16c/0x1f0 [ 851.704724][T20383] should_fail_ex+0x512/0x640 [ 851.704759][T20383] ? __kmalloc_noprof+0xca/0x910 [ 851.704797][T20383] should_failslab+0xc2/0x120 [ 851.704844][T20383] __kmalloc_noprof+0xeb/0x910 [ 851.704878][T20383] ? vhost_dev_set_owner+0x287/0xa50 [ 851.704929][T20383] ? vhost_dev_set_owner+0x287/0xa50 [ 851.704970][T20383] vhost_dev_set_owner+0x287/0xa50 [ 851.705027][T20383] vhost_net_ioctl+0x87f/0x1850 [ 851.705072][T20383] ? do_vfs_ioctl+0x128/0x14f0 [ 851.705110][T20383] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 851.705149][T20383] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 851.705196][T20383] ? find_held_lock+0x2b/0x80 [ 851.705236][T20383] ? hook_file_ioctl_common+0x144/0x410 [ 851.705281][T20383] ? __fget_files+0x20e/0x3c0 [ 851.705341][T20383] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 851.705379][T20383] __x64_sys_ioctl+0x18e/0x210 [ 851.705417][T20383] do_syscall_64+0xcd/0xf80 [ 851.705463][T20383] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 851.705494][T20383] RIP: 0033:0x7fb35f58f7c9 [ 851.705517][T20383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 851.705546][T20383] RSP: 002b:00007fb3603ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 851.705573][T20383] RAX: ffffffffffffffda RBX: 00007fb35f7e6090 RCX: 00007fb35f58f7c9 [ 851.705592][T20383] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000005 [ 851.705609][T20383] RBP: 00007fb35f613f91 R08: 0000000000000000 R09: 0000000000000000 [ 851.705626][T20383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 851.705643][T20383] R13: 00007fb35f7e6128 R14: 00007fb35f7e6090 R15: 00007fff8beba7b8 [ 851.705680][T20383] [ 852.646928][T20382] netlink: set zone limit has 8 unknown bytes [ 853.120502][T20406] netlink: 330 bytes leftover after parsing attributes in process `syz.0.3073'. [ 853.333306][T20411] netlink: 330 bytes leftover after parsing attributes in process `syz.0.3074'. [ 853.708206][ T30] audit: type=1800 audit(1767236914.351:88): pid=20423 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.3077" name="dbroot" dev="configfs" ino=71137 res=0 errno=0 [ 854.261197][ T30] audit: type=1800 audit(1767236914.911:89): pid=20429 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.3079" name="dbroot" dev="configfs" ino=71160 res=0 errno=0 [ 854.898695][T15443] Bluetooth: hci2: unexpected subevent 0x01 length: 3 < 18 [ 854.928731][T20449] FAULT_INJECTION: forcing a failure. [ 854.928731][T20449] name failslab, interval 1, probability 0, space 0, times 0 [ 854.967917][T20449] CPU: 1 UID: 0 PID: 20449 Comm: syz.2.3083 Tainted: G U L syzkaller #0 PREEMPT(full) [ 854.967964][T20449] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 854.967976][T20449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 854.967993][T20449] Call Trace: [ 854.968003][T20449] [ 854.968014][T20449] dump_stack_lvl+0x16c/0x1f0 [ 854.968061][T20449] should_fail_ex+0x512/0x640 [ 854.968094][T20449] ? __kmalloc_noprof+0xca/0x910 [ 854.968128][T20449] should_failslab+0xc2/0x120 [ 854.968173][T20449] __kmalloc_noprof+0xeb/0x910 [ 854.968206][T20449] ? vhost_dev_set_owner+0x287/0xa50 [ 854.968254][T20449] ? vhost_dev_set_owner+0x287/0xa50 [ 854.968294][T20449] vhost_dev_set_owner+0x287/0xa50 [ 854.968348][T20449] vhost_net_ioctl+0x87f/0x1850 [ 854.968384][T20449] ? do_vfs_ioctl+0x128/0x14f0 [ 854.968421][T20449] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 854.968460][T20449] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 854.968505][T20449] ? find_held_lock+0x2b/0x80 [ 854.968543][T20449] ? hook_file_ioctl_common+0x144/0x410 [ 854.968587][T20449] ? __fget_files+0x20e/0x3c0 [ 854.968634][T20449] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 854.968673][T20449] __x64_sys_ioctl+0x18e/0x210 [ 854.968712][T20449] do_syscall_64+0xcd/0xf80 [ 854.968758][T20449] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 854.968798][T20449] RIP: 0033:0x7fb35f58f7c9 [ 854.968822][T20449] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 854.968853][T20449] RSP: 002b:00007fb3603cc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 854.968882][T20449] RAX: ffffffffffffffda RBX: 00007fb35f7e6180 RCX: 00007fb35f58f7c9 [ 854.968902][T20449] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000005 [ 854.968919][T20449] RBP: 00007fb35f613f91 R08: 0000000000000000 R09: 0000000000000000 [ 854.968936][T20449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 854.968954][T20449] R13: 00007fb35f7e6218 R14: 00007fb35f7e6180 R15: 00007fff8beba7b8 [ 854.968992][T20449] [ 855.260571][T20453] netlink: set zone limit has 8 unknown bytes [ 855.828738][T20471] FAULT_INJECTION: forcing a failure. [ 855.828738][T20471] name failslab, interval 1, probability 0, space 0, times 0 [ 855.841487][T20471] CPU: 1 UID: 0 PID: 20471 Comm: syz.1.3080 Tainted: G U L syzkaller #0 PREEMPT(full) [ 855.841534][T20471] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 855.841546][T20471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 855.841563][T20471] Call Trace: [ 855.841573][T20471] [ 855.841584][T20471] dump_stack_lvl+0x16c/0x1f0 [ 855.841632][T20471] should_fail_ex+0x512/0x640 [ 855.841663][T20471] ? __kmalloc_cache_noprof+0x5f/0x800 [ 855.841700][T20471] should_failslab+0xc2/0x120 [ 855.841747][T20471] __kmalloc_cache_noprof+0x80/0x800 [ 855.841779][T20471] ? __sys_socket+0xac/0x260 [ 855.841805][T20471] ? fput+0x70/0xf0 [ 855.841834][T20471] ? do_eventfd+0x67/0x390 [ 855.841876][T20471] ? do_eventfd+0x67/0x390 [ 855.841911][T20471] do_eventfd+0x67/0x390 [ 855.841952][T20471] ? rcu_is_watching+0x12/0xc0 [ 855.841998][T20471] __x64_sys_eventfd+0x32/0x50 [ 855.842038][T20471] do_syscall_64+0xcd/0xf80 [ 855.842087][T20471] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 855.842117][T20471] RIP: 0033:0x7f789838f7c9 [ 855.842140][T20471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 855.842171][T20471] RSP: 002b:00007f78991e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 855.842199][T20471] RAX: ffffffffffffffda RBX: 00007f78985e6090 RCX: 00007f789838f7c9 [ 855.842218][T20471] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 855.842235][T20471] RBP: 00007f7898413f91 R08: 0000000000000000 R09: 0000000000000000 [ 855.842253][T20471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 855.842270][T20471] R13: 00007f78985e6128 R14: 00007f78985e6090 R15: 00007ffd00f218b8 [ 855.842307][T20471] [ 856.089069][T15443] Bluetooth: hci1: unexpected subevent 0x01 length: 3 < 18 [ 856.103530][T20474] FAULT_INJECTION: forcing a failure. [ 856.103530][T20474] name failslab, interval 1, probability 0, space 0, times 0 [ 856.116295][T20474] CPU: 1 UID: 0 PID: 20474 Comm: syz.3.3085 Tainted: G U L syzkaller #0 PREEMPT(full) [ 856.116343][T20474] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 856.116356][T20474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 856.116373][T20474] Call Trace: [ 856.116383][T20474] [ 856.116395][T20474] dump_stack_lvl+0x16c/0x1f0 [ 856.116445][T20474] should_fail_ex+0x512/0x640 [ 856.116477][T20474] ? __kmalloc_noprof+0xca/0x910 [ 856.116513][T20474] should_failslab+0xc2/0x120 [ 856.116558][T20474] __kmalloc_noprof+0xeb/0x910 [ 856.116590][T20474] ? vhost_dev_set_owner+0x287/0xa50 [ 856.116637][T20474] ? vhost_dev_set_owner+0x287/0xa50 [ 856.116686][T20474] vhost_dev_set_owner+0x287/0xa50 [ 856.116740][T20474] vhost_net_ioctl+0x87f/0x1850 [ 856.116775][T20474] ? do_vfs_ioctl+0x128/0x14f0 [ 856.116811][T20474] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 856.116847][T20474] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 856.116892][T20474] ? find_held_lock+0x2b/0x80 [ 856.116930][T20474] ? hook_file_ioctl_common+0x144/0x410 [ 856.116972][T20474] ? __fget_files+0x20e/0x3c0 [ 856.117019][T20474] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 856.117057][T20474] __x64_sys_ioctl+0x18e/0x210 [ 856.117096][T20474] do_syscall_64+0xcd/0xf80 [ 856.117142][T20474] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 856.117172][T20474] RIP: 0033:0x7f5d3ff8f7c9 [ 856.117195][T20474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 856.117224][T20474] RSP: 002b:00007f5d40e18038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 856.117252][T20474] RAX: ffffffffffffffda RBX: 00007f5d401e6180 RCX: 00007f5d3ff8f7c9 [ 856.117271][T20474] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000005 [ 856.117288][T20474] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 856.117305][T20474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 856.117323][T20474] R13: 00007f5d401e6218 R14: 00007f5d401e6180 R15: 00007ffe58909dc8 [ 856.117361][T20474] [ 856.369519][T20466] netlink: 342 bytes leftover after parsing attributes in process `syz.1.3080'. [ 856.386686][T20476] netlink: set zone limit has 8 unknown bytes [ 856.968148][ T30] audit: type=1800 audit(1767236917.611:90): pid=20493 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.3088" name="lu_gp_id" dev="configfs" ino=71264 res=0 errno=0 [ 857.078697][T20497] FAULT_INJECTION: forcing a failure. [ 857.078697][T20497] name failslab, interval 1, probability 0, space 0, times 0 [ 857.123122][T20497] CPU: 1 UID: 0 PID: 20497 Comm: syz.0.3090 Tainted: G U L syzkaller #0 PREEMPT(full) [ 857.123169][T20497] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 857.123180][T20497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 857.123198][T20497] Call Trace: [ 857.123208][T20497] [ 857.123219][T20497] dump_stack_lvl+0x16c/0x1f0 [ 857.123268][T20497] should_fail_ex+0x512/0x640 [ 857.123307][T20497] should_failslab+0xc2/0x120 [ 857.123356][T20497] __kmalloc_cache_noprof+0x80/0x800 [ 857.123393][T20497] ? sctp_add_bind_addr+0xae/0x3f0 [ 857.123443][T20497] ? sctp_add_bind_addr+0xae/0x3f0 [ 857.123480][T20497] sctp_add_bind_addr+0xae/0x3f0 [ 857.123523][T20497] sctp_copy_local_addr_list+0x349/0x550 [ 857.123576][T20497] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 857.123626][T20497] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360 [ 857.123674][T20497] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 857.123723][T20497] sctp_bind_addr_copy+0xe0/0x530 [ 857.123770][T20497] sctp_connect_new_asoc+0x1c9/0x770 [ 857.123805][T20497] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 857.123845][T20497] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 857.123901][T20497] sctp_sendmsg+0x157c/0x1e20 [ 857.123946][T20497] ? __pfx_sctp_sendmsg+0x10/0x10 [ 857.123975][T20497] ? __pfx___might_resched+0x10/0x10 [ 857.124017][T20497] ? __lock_acquire+0x436/0x2890 [ 857.124049][T20497] ? aa_sk_perm+0x2f2/0xae0 [ 857.124090][T20497] ? __pfx_aa_sk_perm+0x10/0x10 [ 857.124155][T20497] ? __pfx_sctp_sendmsg+0x10/0x10 [ 857.124193][T20497] inet_sendmsg+0x11c/0x140 [ 857.124231][T20497] ____sys_sendmsg+0x973/0xc30 [ 857.124283][T20497] ? __pfx_____sys_sendmsg+0x10/0x10 [ 857.124330][T20497] ? trace_sched_set_need_resched_tp+0xf3/0x130 [ 857.124387][T20497] ? __pfx___schedule+0x10/0x10 [ 857.124438][T20497] ___sys_sendmsg+0x134/0x1d0 [ 857.124482][T20497] ? __pfx____sys_sendmsg+0x10/0x10 [ 857.124542][T20497] ? find_held_lock+0x2b/0x80 [ 857.124607][T20497] __sys_sendmmsg+0x200/0x420 [ 857.124654][T20497] ? __pfx___sys_sendmmsg+0x10/0x10 [ 857.124706][T20497] ? __pfx_do_futex+0x10/0x10 [ 857.124759][T20497] ? __x64_sys_openat+0x174/0x210 [ 857.124799][T20497] ? xfd_validate_state+0x61/0x180 [ 857.124837][T20497] __x64_sys_sendmmsg+0x9c/0x100 [ 857.124877][T20497] ? lockdep_hardirqs_on+0x7c/0x110 [ 857.124933][T20497] do_syscall_64+0xcd/0xf80 [ 857.124985][T20497] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 857.125018][T20497] RIP: 0033:0x7fa39478f7c9 [ 857.125043][T20497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 857.125075][T20497] RSP: 002b:00007fa395626038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 857.125106][T20497] RAX: ffffffffffffffda RBX: 00007fa3949e5fa0 RCX: 00007fa39478f7c9 [ 857.125127][T20497] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000006 [ 857.125147][T20497] RBP: 00007fa394813f91 R08: 0000000000000000 R09: 0000000000000000 [ 857.125165][T20497] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 857.125185][T20497] R13: 00007fa3949e6038 R14: 00007fa3949e5fa0 R15: 00007ffff1177948 [ 857.125225][T20497] [ 857.995322][ T30] audit: type=1800 audit(1767236918.641:91): pid=20511 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.3093" name="dbroot" dev="configfs" ino=71302 res=0 errno=0 [ 858.558765][T20521] netlink: 330 bytes leftover after parsing attributes in process `syz.0.3095'. [ 858.625423][T20527] FAULT_INJECTION: forcing a failure. [ 858.625423][T20527] name failslab, interval 1, probability 0, space 0, times 0 [ 858.660625][T20529] netlink: 330 bytes leftover after parsing attributes in process `syz.2.3096'. [ 858.717923][T20527] CPU: 0 UID: 0 PID: 20527 Comm: syz.3.3097 Tainted: G U L syzkaller #0 PREEMPT(full) [ 858.717960][T20527] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 858.717968][T20527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 858.717982][T20527] Call Trace: [ 858.717989][T20527] [ 858.717998][T20527] dump_stack_lvl+0x16c/0x1f0 [ 858.718034][T20527] should_fail_ex+0x512/0x640 [ 858.718058][T20527] ? kmem_cache_alloc_lru_noprof+0x66/0x770 [ 858.718088][T20527] should_failslab+0xc2/0x120 [ 858.718123][T20527] kmem_cache_alloc_lru_noprof+0x87/0x770 [ 858.718148][T20527] ? __debug_object_init+0x2de/0x3d0 [ 858.718181][T20527] ? sock_alloc_inode+0x25/0x1c0 [ 858.718240][T20527] ? __pfx_sock_alloc_inode+0x10/0x10 [ 858.718284][T20527] ? sock_alloc_inode+0x25/0x1c0 [ 858.718321][T20527] sock_alloc_inode+0x25/0x1c0 [ 858.718352][T20527] alloc_inode+0x64/0x240 [ 858.718376][T20527] sock_alloc+0x40/0x280 [ 858.718405][T20527] __sock_create+0xc2/0x8a0 [ 858.718439][T20527] ? lockdep_init_map_type+0x5c/0x270 [ 858.718464][T20527] smc_create+0x15d/0x2a0 [ 858.718493][T20527] __sock_create+0x339/0x8a0 [ 858.718531][T20527] __sys_socket+0x14d/0x260 [ 858.718549][T20527] ? fput+0x70/0xf0 [ 858.718568][T20527] ? __pfx___sys_socket+0x10/0x10 [ 858.718589][T20527] ? xfd_validate_state+0x61/0x180 [ 858.718608][T20527] ? __pfx_ksys_write+0x10/0x10 [ 858.718643][T20527] __x64_sys_socket+0x72/0xb0 [ 858.718661][T20527] ? lockdep_hardirqs_on+0x7c/0x110 [ 858.718699][T20527] do_syscall_64+0xcd/0xf80 [ 858.718733][T20527] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 858.718754][T20527] RIP: 0033:0x7f5d3ff8f7c9 [ 858.718771][T20527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 858.718792][T20527] RSP: 002b:00007f5d40e5a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 858.718812][T20527] RAX: ffffffffffffffda RBX: 00007f5d401e5fa0 RCX: 00007f5d3ff8f7c9 [ 858.718827][T20527] RDX: 0000000000000001 RSI: 0000000000000001 RDI: 000000000000002b [ 858.718841][T20527] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 858.718854][T20527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 858.718867][T20527] R13: 00007f5d401e6038 R14: 00007f5d401e5fa0 R15: 00007ffe58909dc8 [ 858.718894][T20527] [ 858.718904][T20527] socket: no more sockets [ 859.201160][T15443] Bluetooth: hci4: unexpected subevent 0x01 length: 3 < 18 [ 859.258916][T20535] FAULT_INJECTION: forcing a failure. [ 859.258916][T20535] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 859.361028][ T30] audit: type=1800 audit(1767236920.011:92): pid=20538 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.3099" name="dbroot" dev="configfs" ino=71302 res=0 errno=0 [ 859.389453][T20535] CPU: 0 UID: 0 PID: 20535 Comm: syz.0.3098 Tainted: G U L syzkaller #0 PREEMPT(full) [ 859.389487][T20535] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 859.389495][T20535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 859.389508][T20535] Call Trace: [ 859.389515][T20535] [ 859.389523][T20535] dump_stack_lvl+0x16c/0x1f0 [ 859.389558][T20535] should_fail_ex+0x512/0x640 [ 859.389586][T20535] should_fail_alloc_page+0xe7/0x130 [ 859.389621][T20535] prepare_alloc_pages+0x401/0x670 [ 859.389666][T20535] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 859.389693][T20535] ? should_fail_alloc_page+0xee/0x130 [ 859.389729][T20535] ? rcu_is_watching+0x12/0xc0 [ 859.389760][T20535] ? trace_mm_page_alloc+0x11b/0x180 [ 859.389793][T20535] ? __alloc_frozen_pages_noprof+0x292/0x2430 [ 859.389821][T20535] ? kfree+0x2f8/0x6e0 [ 859.389841][T20535] ? tomoyo_path_number_perm+0x470/0x580 [ 859.389864][T20535] ? security_file_ioctl+0x9b/0x240 [ 859.389889][T20535] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 859.389918][T20535] ? kasan_save_stack+0x42/0x60 [ 859.389945][T20535] ? kasan_save_stack+0x33/0x60 [ 859.389972][T20535] ? kasan_save_track+0x14/0x30 [ 859.389999][T20535] ? __kasan_kmalloc+0xaa/0xb0 [ 859.390026][T20535] ? __kmalloc_noprof+0x33d/0x910 [ 859.390047][T20535] ? vhost_dev_set_owner+0x287/0xa50 [ 859.390077][T20535] ? vhost_net_ioctl+0x87f/0x1850 [ 859.390111][T20535] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 859.390145][T20535] ? policy_nodemask+0xea/0x4e0 [ 859.390180][T20535] alloc_pages_mpol+0x1fb/0x550 [ 859.390214][T20535] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 859.390254][T20535] ___kmalloc_large_node+0x10c/0x150 [ 859.390292][T20535] __kmalloc_large_node_noprof+0x1c/0x70 [ 859.390312][T20535] ? lruvec_stat_mod_folio+0x25b/0x3b0 [ 859.390341][T20535] __kmalloc_noprof.cold+0xc/0x62 [ 859.390373][T20535] ? vhost_dev_set_owner+0x191/0xa50 [ 859.390410][T20535] ? vhost_dev_set_owner+0x191/0xa50 [ 859.390439][T20535] vhost_dev_set_owner+0x191/0xa50 [ 859.390477][T20535] vhost_net_ioctl+0x87f/0x1850 [ 859.390502][T20535] ? do_vfs_ioctl+0x128/0x14f0 [ 859.390528][T20535] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 859.390554][T20535] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 859.390585][T20535] ? find_held_lock+0x2b/0x80 [ 859.390612][T20535] ? hook_file_ioctl_common+0x144/0x410 [ 859.390649][T20535] ? __fget_files+0x20e/0x3c0 [ 859.390683][T20535] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 859.390711][T20535] __x64_sys_ioctl+0x18e/0x210 [ 859.390738][T20535] do_syscall_64+0xcd/0xf80 [ 859.390773][T20535] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 859.390794][T20535] RIP: 0033:0x7fa39478f7c9 [ 859.390811][T20535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 859.390832][T20535] RSP: 002b:00007fa3955e4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 859.390851][T20535] RAX: ffffffffffffffda RBX: 00007fa3949e6180 RCX: 00007fa39478f7c9 [ 859.390865][T20535] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000005 [ 859.390878][T20535] RBP: 00007fa394813f91 R08: 0000000000000000 R09: 0000000000000000 [ 859.390891][T20535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 859.390904][T20535] R13: 00007fa3949e6218 R14: 00007fa3949e6180 R15: 00007ffff1177948 [ 859.390932][T20535] [ 859.902629][T20341] mkiss: ax0: crc mode is auto. [ 859.922358][T20535] netlink: set zone limit has 8 unknown bytes [ 860.069779][T20546] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3100'. [ 860.201673][T20548] netlink: 25 bytes leftover after parsing attributes in process `syz.2.3100'. [ 860.280307][ T30] audit: type=1800 audit(1767236920.931:93): pid=20551 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.3101" name="dbroot" dev="configfs" ino=71356 res=0 errno=0 [ 860.705045][T20556] FAULT_INJECTION: forcing a failure. [ 860.705045][T20556] name failslab, interval 1, probability 0, space 0, times 0 [ 860.827964][T20556] CPU: 0 UID: 0 PID: 20556 Comm: syz.3.3102 Tainted: G U L syzkaller #0 PREEMPT(full) [ 860.828009][T20556] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 860.828017][T20556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 860.828031][T20556] Call Trace: [ 860.828038][T20556] [ 860.828047][T20556] dump_stack_lvl+0x16c/0x1f0 [ 860.828084][T20556] should_fail_ex+0x512/0x640 [ 860.828107][T20556] ? __kmalloc_cache_noprof+0x5f/0x800 [ 860.828134][T20556] should_failslab+0xc2/0x120 [ 860.828168][T20556] __kmalloc_cache_noprof+0x80/0x800 [ 860.828191][T20556] ? __sys_socket+0xac/0x260 [ 860.828210][T20556] ? fput+0x70/0xf0 [ 860.828229][T20556] ? do_eventfd+0x67/0x390 [ 860.828264][T20556] ? do_eventfd+0x67/0x390 [ 860.828290][T20556] do_eventfd+0x67/0x390 [ 860.828314][T20556] ? rcu_is_watching+0x12/0xc0 [ 860.828345][T20556] __x64_sys_eventfd+0x32/0x50 [ 860.828373][T20556] do_syscall_64+0xcd/0xf80 [ 860.828406][T20556] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 860.828428][T20556] RIP: 0033:0x7f5d3ff8f7c9 [ 860.828444][T20556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 860.828464][T20556] RSP: 002b:00007f5d40e39038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 860.828484][T20556] RAX: ffffffffffffffda RBX: 00007f5d401e6090 RCX: 00007f5d3ff8f7c9 [ 860.828498][T20556] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 860.828511][T20556] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 860.828524][T20556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 860.828537][T20556] R13: 00007f5d401e6128 R14: 00007f5d401e6090 R15: 00007ffe58909dc8 [ 860.828564][T20556] [ 861.159871][T20556] netlink: 330 bytes leftover after parsing attributes in process `syz.3.3102'. [ 861.309712][ T30] audit: type=1800 audit(1767236921.941:94): pid=20565 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.3104" name="dbroot" dev="configfs" ino=71377 res=0 errno=0 [ 861.711400][ T30] audit: type=1800 audit(1767236922.361:95): pid=20571 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.3105" name="lu_gp_id" dev="configfs" ino=70464 res=0 errno=0 [ 862.228668][T20577] Setting dangerous option i915.mitigations - tainting kernel [ 862.236256][T20577] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 862.714908][T20585] netlink: 330 bytes leftover after parsing attributes in process `syz.1.3107'. [ 863.144399][ T30] audit: type=1800 audit(1767236923.791:96): pid=20592 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.3108" name="lu_gp_id" dev="configfs" ino=71430 res=0 errno=0 [ 863.283471][T15443] Bluetooth: hci4: unexpected subevent 0x01 length: 3 < 18 [ 863.346331][T20597] FAULT_INJECTION: forcing a failure. [ 863.346331][T20597] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 863.468546][T20597] CPU: 1 UID: 0 PID: 20597 Comm: syz.0.3109 Tainted: G U L syzkaller #0 PREEMPT(full) [ 863.468581][T20597] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 863.468589][T20597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 863.468603][T20597] Call Trace: [ 863.468609][T20597] [ 863.468617][T20597] dump_stack_lvl+0x16c/0x1f0 [ 863.468653][T20597] should_fail_ex+0x512/0x640 [ 863.468681][T20597] should_fail_alloc_page+0xe7/0x130 [ 863.468716][T20597] prepare_alloc_pages+0x401/0x670 [ 863.468755][T20597] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 863.468781][T20597] ? should_fail_alloc_page+0xee/0x130 [ 863.468817][T20597] ? rcu_is_watching+0x12/0xc0 [ 863.468847][T20597] ? trace_mm_page_alloc+0x11b/0x180 [ 863.468880][T20597] ? __alloc_frozen_pages_noprof+0x292/0x2430 [ 863.468907][T20597] ? kfree+0x2f8/0x6e0 [ 863.468927][T20597] ? tomoyo_path_number_perm+0x470/0x580 [ 863.468950][T20597] ? security_file_ioctl+0x9b/0x240 [ 863.468975][T20597] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 863.469003][T20597] ? kasan_save_stack+0x42/0x60 [ 863.469031][T20597] ? kasan_save_stack+0x33/0x60 [ 863.469064][T20597] ? kasan_save_track+0x14/0x30 [ 863.469092][T20597] ? __kasan_kmalloc+0xaa/0xb0 [ 863.469118][T20597] ? __kmalloc_noprof+0x33d/0x910 [ 863.469139][T20597] ? vhost_dev_set_owner+0x287/0xa50 [ 863.469169][T20597] ? vhost_net_ioctl+0x87f/0x1850 [ 863.469203][T20597] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 863.469238][T20597] ? policy_nodemask+0xea/0x4e0 [ 863.469272][T20597] alloc_pages_mpol+0x1fb/0x550 [ 863.469307][T20597] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 863.469346][T20597] ___kmalloc_large_node+0x10c/0x150 [ 863.469385][T20597] __kmalloc_large_node_noprof+0x1c/0x70 [ 863.469408][T20597] ? lruvec_stat_mod_folio+0x25b/0x3b0 [ 863.469437][T20597] __kmalloc_noprof.cold+0xc/0x62 [ 863.469469][T20597] ? vhost_dev_set_owner+0x191/0xa50 [ 863.469503][T20597] ? vhost_dev_set_owner+0x191/0xa50 [ 863.469532][T20597] vhost_dev_set_owner+0x191/0xa50 [ 863.469570][T20597] vhost_net_ioctl+0x87f/0x1850 [ 863.469594][T20597] ? do_vfs_ioctl+0x128/0x14f0 [ 863.469621][T20597] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 863.469646][T20597] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 863.469678][T20597] ? find_held_lock+0x2b/0x80 [ 863.469705][T20597] ? hook_file_ioctl_common+0x144/0x410 [ 863.469735][T20597] ? __fget_files+0x20e/0x3c0 [ 863.469769][T20597] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 863.469797][T20597] __x64_sys_ioctl+0x18e/0x210 [ 863.469824][T20597] do_syscall_64+0xcd/0xf80 [ 863.469858][T20597] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 863.469880][T20597] RIP: 0033:0x7fa39478f7c9 [ 863.469896][T20597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 863.469917][T20597] RSP: 002b:00007fa3955e4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 863.469937][T20597] RAX: ffffffffffffffda RBX: 00007fa3949e6180 RCX: 00007fa39478f7c9 [ 863.469952][T20597] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000005 [ 863.469965][T20597] RBP: 00007fa394813f91 R08: 0000000000000000 R09: 0000000000000000 [ 863.469978][T20597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 863.469991][T20597] R13: 00007fa3949e6218 R14: 00007fa3949e6180 R15: 00007ffff1177948 [ 863.470018][T20597] [ 864.272981][ T30] audit: type=1800 audit(1767236924.921:97): pid=20604 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.3111" name="lu_gp_id" dev="configfs" ino=71430 res=0 errno=0 [ 864.350864][T20597] netlink: set zone limit has 8 unknown bytes [ 864.615904][T15443] Bluetooth: hci2: unexpected subevent 0x01 length: 3 < 18 [ 864.729636][T20611] FAULT_INJECTION: forcing a failure. [ 864.729636][T20611] name failslab, interval 1, probability 0, space 0, times 0 [ 864.970051][T20611] CPU: 0 UID: 0 PID: 20611 Comm: syz.2.3112 Tainted: G U L syzkaller #0 PREEMPT(full) [ 864.970090][T20611] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 864.970099][T20611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 864.970112][T20611] Call Trace: [ 864.970119][T20611] [ 864.970128][T20611] dump_stack_lvl+0x16c/0x1f0 [ 864.970166][T20611] should_fail_ex+0x512/0x640 [ 864.970191][T20611] ? kmem_cache_alloc_noprof+0x62/0x770 [ 864.970220][T20611] should_failslab+0xc2/0x120 [ 864.970256][T20611] kmem_cache_alloc_noprof+0x83/0x770 [ 864.970284][T20611] ? security_file_alloc+0x34/0x2b0 [ 864.970336][T20611] ? security_file_alloc+0x34/0x2b0 [ 864.970364][T20611] security_file_alloc+0x34/0x2b0 [ 864.970393][T20611] init_file+0x93/0x4c0 [ 864.970416][T20611] alloc_empty_file+0x73/0x1e0 [ 864.970441][T20611] alloc_file_pseudo+0x13a/0x230 [ 864.970480][T20611] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 864.970505][T20611] ? alloc_fd+0x471/0x7d0 [ 864.970543][T20611] sock_alloc_file+0x50/0x210 [ 864.970575][T20611] __sys_socket+0x1c0/0x260 [ 864.970596][T20611] ? __pfx___sys_socket+0x10/0x10 [ 864.970617][T20611] ? xfd_validate_state+0x61/0x180 [ 864.970644][T20611] __x64_sys_socket+0x72/0xb0 [ 864.970665][T20611] ? lockdep_hardirqs_on+0x7c/0x110 [ 864.970699][T20611] do_syscall_64+0xcd/0xf80 [ 864.970735][T20611] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 864.970757][T20611] RIP: 0033:0x7fb35f5916e7 [ 864.970774][T20611] Code: f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 864.970796][T20611] RSP: 002b:00007fb3603cafa8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 864.970818][T20611] RAX: ffffffffffffffda RBX: 00007fb35f7e6180 RCX: 00007fb35f5916e7 [ 864.970833][T20611] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 864.970847][T20611] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 864.970861][T20611] R10: 0000200000000140 R11: 0000000000000286 R12: 0000000000000000 [ 864.970875][T20611] R13: 00007fb35f7e6218 R14: 00007fb35f7e6180 R15: 00007fff8beba7b8 [ 864.970911][T20611] [ 865.241305][T20611] netlink: set zone limit has 8 unknown bytes [ 865.995561][T20634] FAULT_INJECTION: forcing a failure. [ 865.995561][T20634] name failslab, interval 1, probability 0, space 0, times 0 [ 866.012625][T20634] CPU: 0 UID: 0 PID: 20634 Comm: syz.3.3118 Tainted: G U L syzkaller #0 PREEMPT(full) [ 866.012672][T20634] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 866.012684][T20634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 866.012702][T20634] Call Trace: [ 866.012712][T20634] [ 866.012724][T20634] dump_stack_lvl+0x16c/0x1f0 [ 866.012773][T20634] should_fail_ex+0x512/0x640 [ 866.012806][T20634] ? __kmalloc_cache_noprof+0x5f/0x800 [ 866.012852][T20634] should_failslab+0xc2/0x120 [ 866.012898][T20634] __kmalloc_cache_noprof+0x80/0x800 [ 866.012930][T20634] ? __sys_socket+0xac/0x260 [ 866.012955][T20634] ? fput+0x70/0xf0 [ 866.012982][T20634] ? do_eventfd+0x67/0x390 [ 866.013024][T20634] ? do_eventfd+0x67/0x390 [ 866.013058][T20634] do_eventfd+0x67/0x390 [ 866.013092][T20634] ? rcu_is_watching+0x12/0xc0 [ 866.013137][T20634] __x64_sys_eventfd+0x32/0x50 [ 866.013174][T20634] do_syscall_64+0xcd/0xf80 [ 866.013220][T20634] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 866.013250][T20634] RIP: 0033:0x7f5d3ff8f7c9 [ 866.013273][T20634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 866.013303][T20634] RSP: 002b:00007f5d40e39038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 866.013331][T20634] RAX: ffffffffffffffda RBX: 00007f5d401e6090 RCX: 00007f5d3ff8f7c9 [ 866.013350][T20634] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 866.013367][T20634] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 866.013385][T20634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 866.013402][T20634] R13: 00007f5d401e6128 R14: 00007f5d401e6090 R15: 00007ffe58909dc8 [ 866.013439][T20634] [ 866.236895][T20633] netlink: 330 bytes leftover after parsing attributes in process `syz.3.3118'. [ 866.555173][T20639] netlink: 330 bytes leftover after parsing attributes in process `syz.3.3119'. [ 866.842280][ T30] audit: type=1800 audit(1767236927.491:98): pid=20648 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.3123" name="dbroot" dev="configfs" ino=71715 res=0 errno=0 [ 867.139014][T15443] Bluetooth: hci0: unexpected subevent 0x01 length: 3 < 18 [ 867.481928][T20657] netlink: set zone limit has 8 unknown bytes [ 867.866038][T15443] Bluetooth: hci0: unexpected subevent 0x01 length: 3 < 18 [ 867.904872][T20672] FAULT_INJECTION: forcing a failure. [ 867.904872][T20672] name failslab, interval 1, probability 0, space 0, times 0 [ 867.982001][T20676] FAULT_INJECTION: forcing a failure. [ 867.982001][T20676] name failslab, interval 1, probability 0, space 0, times 0 [ 868.008548][T20676] CPU: 1 UID: 0 PID: 20676 Comm: syz.0.3127 Tainted: G U L syzkaller #0 PREEMPT(full) [ 868.008594][T20676] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 868.008605][T20676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 868.008623][T20676] Call Trace: [ 868.008633][T20676] [ 868.008644][T20676] dump_stack_lvl+0x16c/0x1f0 [ 868.008702][T20676] should_fail_ex+0x512/0x640 [ 868.008735][T20676] ? kmem_cache_alloc_lru_noprof+0x66/0x770 [ 868.008777][T20676] should_failslab+0xc2/0x120 [ 868.008823][T20676] kmem_cache_alloc_lru_noprof+0x87/0x770 [ 868.008862][T20676] ? __d_alloc+0x35/0xa80 [ 868.008894][T20676] ? __d_alloc+0x35/0xa80 [ 868.008920][T20676] __d_alloc+0x35/0xa80 [ 868.008950][T20676] d_alloc_pseudo+0x1c/0xc0 [ 868.008985][T20676] alloc_file_pseudo+0xcf/0x230 [ 868.009018][T20676] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 868.009052][T20676] ? do_raw_spin_unlock+0x172/0x230 [ 868.009092][T20676] __anon_inode_getfile+0xe8/0x280 [ 868.009153][T20676] anon_inode_getfile_fmode+0x37/0xa0 [ 868.009187][T20676] do_eventfd+0x156/0x390 [ 868.009224][T20676] ? rcu_is_watching+0x12/0xc0 [ 868.009269][T20676] __x64_sys_eventfd+0x32/0x50 [ 868.009311][T20676] do_syscall_64+0xcd/0xf80 [ 868.009361][T20676] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 868.009392][T20676] RIP: 0033:0x7fa39478f7c9 [ 868.009416][T20676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 868.009448][T20676] RSP: 002b:00007fa395605038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 868.009477][T20676] RAX: ffffffffffffffda RBX: 00007fa3949e6090 RCX: 00007fa39478f7c9 [ 868.009498][T20676] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 868.009516][T20676] RBP: 00007fa394813f91 R08: 0000000000000000 R09: 0000000000000000 [ 868.009534][T20676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 868.009552][T20676] R13: 00007fa3949e6128 R14: 00007fa3949e6090 R15: 00007ffff1177948 [ 868.009592][T20676] [ 868.253078][T20672] CPU: 0 UID: 0 PID: 20672 Comm: syz.1.3126 Tainted: G U L syzkaller #0 PREEMPT(full) [ 868.253113][T20672] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 868.253121][T20672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 868.253134][T20672] Call Trace: [ 868.253141][T20672] [ 868.253149][T20672] dump_stack_lvl+0x16c/0x1f0 [ 868.253184][T20672] should_fail_ex+0x512/0x640 [ 868.253207][T20672] ? __kmalloc_noprof+0xca/0x910 [ 868.253232][T20672] should_failslab+0xc2/0x120 [ 868.253266][T20672] __kmalloc_noprof+0xeb/0x910 [ 868.253289][T20672] ? vhost_dev_set_owner+0x287/0xa50 [ 868.253323][T20672] ? vhost_dev_set_owner+0x287/0xa50 [ 868.253352][T20672] vhost_dev_set_owner+0x287/0xa50 [ 868.253390][T20672] vhost_net_ioctl+0x87f/0x1850 [ 868.253414][T20672] ? do_vfs_ioctl+0x128/0x14f0 [ 868.253440][T20672] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 868.253466][T20672] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 868.253497][T20672] ? find_held_lock+0x2b/0x80 [ 868.253524][T20672] ? hook_file_ioctl_common+0x144/0x410 [ 868.253554][T20672] ? __fget_files+0x20e/0x3c0 [ 868.253588][T20672] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 868.253616][T20672] __x64_sys_ioctl+0x18e/0x210 [ 868.253643][T20672] do_syscall_64+0xcd/0xf80 [ 868.253677][T20672] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 868.253699][T20672] RIP: 0033:0x7f789838f7c9 [ 868.253716][T20672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 868.253737][T20672] RSP: 002b:00007f78991c6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 868.253757][T20672] RAX: ffffffffffffffda RBX: 00007f78985e6180 RCX: 00007f789838f7c9 [ 868.253771][T20672] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000005 [ 868.253784][T20672] RBP: 00007f7898413f91 R08: 0000000000000000 R09: 0000000000000000 [ 868.253797][T20672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 868.253810][T20672] R13: 00007f78985e6218 R14: 00007f78985e6180 R15: 00007ffd00f218b8 [ 868.253837][T20672] [ 868.501565][T20676] netlink: 330 bytes leftover after parsing attributes in process `syz.0.3127'. [ 868.529710][T20679] netlink: set zone limit has 8 unknown bytes [ 869.345228][T20700] netlink: 330 bytes leftover after parsing attributes in process `syz.0.3131'. [ 870.377878][T20726] FAULT_INJECTION: forcing a failure. [ 870.377878][T20726] name failslab, interval 1, probability 0, space 0, times 0 [ 870.395816][T20726] CPU: 1 UID: 0 PID: 20726 Comm: syz.1.3134 Tainted: G U L syzkaller #0 PREEMPT(full) [ 870.395863][T20726] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 870.395874][T20726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 870.395892][T20726] Call Trace: [ 870.395902][T20726] [ 870.395913][T20726] dump_stack_lvl+0x16c/0x1f0 [ 870.395976][T20726] should_fail_ex+0x512/0x640 [ 870.396010][T20726] ? __kmalloc_cache_noprof+0x5f/0x800 [ 870.396049][T20726] should_failslab+0xc2/0x120 [ 870.396102][T20726] __kmalloc_cache_noprof+0x80/0x800 [ 870.396134][T20726] ? __sys_socket+0xac/0x260 [ 870.396161][T20726] ? fput+0x70/0xf0 [ 870.396187][T20726] ? do_eventfd+0x67/0x390 [ 870.396236][T20726] ? do_eventfd+0x67/0x390 [ 870.396271][T20726] do_eventfd+0x67/0x390 [ 870.396316][T20726] ? rcu_is_watching+0x12/0xc0 [ 870.396380][T20726] __x64_sys_eventfd+0x32/0x50 [ 870.396439][T20726] do_syscall_64+0xcd/0xf80 [ 870.396494][T20726] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 870.396528][T20726] RIP: 0033:0x7f789838f7c9 [ 870.396554][T20726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 870.396587][T20726] RSP: 002b:00007f78991e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 870.396618][T20726] RAX: ffffffffffffffda RBX: 00007f78985e6090 RCX: 00007f789838f7c9 [ 870.396640][T20726] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 870.396660][T20726] RBP: 00007f7898413f91 R08: 0000000000000000 R09: 0000000000000000 [ 870.396680][T20726] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 870.396708][T20726] R13: 00007f78985e6128 R14: 00007f78985e6090 R15: 00007ffd00f218b8 [ 870.396754][T20726] [ 870.605005][T20726] netlink: 330 bytes leftover after parsing attributes in process `syz.1.3134'. [ 870.870734][T15443] Bluetooth: hci2: unexpected subevent 0x01 length: 3 < 18 [ 870.881959][T20739] FAULT_INJECTION: forcing a failure. [ 870.881959][T20739] name failslab, interval 1, probability 0, space 0, times 0 [ 870.894891][T20739] CPU: 1 UID: 0 PID: 20739 Comm: syz.2.3136 Tainted: G U L syzkaller #0 PREEMPT(full) [ 870.894944][T20739] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 870.894958][T20739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 870.894979][T20739] Call Trace: [ 870.894990][T20739] [ 870.895003][T20739] dump_stack_lvl+0x16c/0x1f0 [ 870.895058][T20739] should_fail_ex+0x512/0x640 [ 870.895095][T20739] ? __kmalloc_noprof+0xca/0x910 [ 870.895135][T20739] should_failslab+0xc2/0x120 [ 870.895187][T20739] __kmalloc_noprof+0xeb/0x910 [ 870.895224][T20739] ? vhost_dev_set_owner+0x287/0xa50 [ 870.895289][T20739] ? vhost_dev_set_owner+0x287/0xa50 [ 870.895340][T20739] vhost_dev_set_owner+0x287/0xa50 [ 870.895401][T20739] vhost_net_ioctl+0x87f/0x1850 [ 870.895436][T20739] ? do_vfs_ioctl+0x128/0x14f0 [ 870.895473][T20739] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 870.895508][T20739] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 870.895553][T20739] ? find_held_lock+0x2b/0x80 [ 870.895591][T20739] ? hook_file_ioctl_common+0x144/0x410 [ 870.895634][T20739] ? __fget_files+0x20e/0x3c0 [ 870.895683][T20739] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 870.895722][T20739] __x64_sys_ioctl+0x18e/0x210 [ 870.895759][T20739] do_syscall_64+0xcd/0xf80 [ 870.895807][T20739] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 870.895837][T20739] RIP: 0033:0x7fb35f58f7c9 [ 870.895860][T20739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 870.895889][T20739] RSP: 002b:00007fb3603cc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 870.895915][T20739] RAX: ffffffffffffffda RBX: 00007fb35f7e6180 RCX: 00007fb35f58f7c9 [ 870.895932][T20739] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000004 [ 870.895948][T20739] RBP: 00007fb35f613f91 R08: 0000000000000000 R09: 0000000000000000 [ 870.895962][T20739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 870.895977][T20739] R13: 00007fb35f7e6218 R14: 00007fb35f7e6180 R15: 00007fff8beba7b8 [ 870.896008][T20739] [ 871.172717][T15443] Bluetooth: hci4: unexpected subevent 0x01 length: 3 < 18 [ 871.182742][T20739] netlink: set zone limit has 8 unknown bytes [ 871.213975][T20738] FAULT_INJECTION: forcing a failure. [ 871.213975][T20738] name failslab, interval 1, probability 0, space 0, times 0 [ 871.227726][T20738] CPU: 1 UID: 0 PID: 20738 Comm: syz.3.3135 Tainted: G U L syzkaller #0 PREEMPT(full) [ 871.227771][T20738] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 871.227784][T20738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 871.227800][T20738] Call Trace: [ 871.227810][T20738] [ 871.227821][T20738] dump_stack_lvl+0x16c/0x1f0 [ 871.227870][T20738] should_fail_ex+0x512/0x640 [ 871.227907][T20738] should_failslab+0xc2/0x120 [ 871.227953][T20738] __kmalloc_cache_noprof+0x80/0x800 [ 871.227988][T20738] ? sctp_add_bind_addr+0xae/0x3f0 [ 871.228032][T20738] ? sctp_add_bind_addr+0xae/0x3f0 [ 871.228068][T20738] sctp_add_bind_addr+0xae/0x3f0 [ 871.228111][T20738] sctp_copy_local_addr_list+0x349/0x550 [ 871.228162][T20738] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 871.228211][T20738] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360 [ 871.228260][T20738] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 871.228309][T20738] sctp_bind_addr_copy+0xe0/0x530 [ 871.228357][T20738] sctp_connect_new_asoc+0x1c9/0x770 [ 871.228407][T20738] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 871.228448][T20738] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 871.228495][T20738] sctp_sendmsg+0x157c/0x1e20 [ 871.228537][T20738] ? __pfx_sctp_sendmsg+0x10/0x10 [ 871.228566][T20738] ? __pfx___might_resched+0x10/0x10 [ 871.228607][T20738] ? __lock_acquire+0x436/0x2890 [ 871.228641][T20738] ? aa_sk_perm+0x2f2/0xae0 [ 871.228680][T20738] ? __pfx_aa_sk_perm+0x10/0x10 [ 871.228725][T20738] ? __pfx_sctp_sendmsg+0x10/0x10 [ 871.228759][T20738] inet_sendmsg+0x11c/0x140 [ 871.228793][T20738] ____sys_sendmsg+0x973/0xc30 [ 871.228841][T20738] ? __pfx_____sys_sendmsg+0x10/0x10 [ 871.228883][T20738] ? trace_sched_set_need_resched_tp+0xf3/0x130 [ 871.228937][T20738] ? __pfx___schedule+0x10/0x10 [ 871.228985][T20738] ___sys_sendmsg+0x134/0x1d0 [ 871.229024][T20738] ? __pfx____sys_sendmsg+0x10/0x10 [ 871.229079][T20738] ? find_held_lock+0x2b/0x80 [ 871.229140][T20738] __sys_sendmmsg+0x200/0x420 [ 871.229182][T20738] ? __pfx___sys_sendmmsg+0x10/0x10 [ 871.229231][T20738] ? __pfx_do_futex+0x10/0x10 [ 871.229285][T20738] ? xfd_validate_state+0x61/0x180 [ 871.229320][T20738] __x64_sys_sendmmsg+0x9c/0x100 [ 871.229356][T20738] ? lockdep_hardirqs_on+0x7c/0x110 [ 871.229410][T20738] do_syscall_64+0xcd/0xf80 [ 871.229457][T20738] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 871.229487][T20738] RIP: 0033:0x7f5d3ff8f7c9 [ 871.229509][T20738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 871.229539][T20738] RSP: 002b:00007f5d40e5a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 871.229566][T20738] RAX: ffffffffffffffda RBX: 00007f5d401e5fa0 RCX: 00007f5d3ff8f7c9 [ 871.229585][T20738] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000006 [ 871.229603][T20738] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 871.229620][T20738] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 871.229637][T20738] R13: 00007f5d401e6038 R14: 00007f5d401e5fa0 R15: 00007ffe58909dc8 [ 871.229675][T20738] [ 871.633910][T20743] netlink: set zone limit has 8 unknown bytes [ 871.701441][T20746] FAULT_INJECTION: forcing a failure. [ 871.701441][T20746] name failslab, interval 1, probability 0, space 0, times 0 [ 871.715995][T20746] CPU: 0 UID: 0 PID: 20746 Comm: syz.1.3138 Tainted: G U L syzkaller #0 PREEMPT(full) [ 871.716040][T20746] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 871.716052][T20746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 871.716069][T20746] Call Trace: [ 871.716078][T20746] [ 871.716089][T20746] dump_stack_lvl+0x16c/0x1f0 [ 871.716138][T20746] should_fail_ex+0x512/0x640 [ 871.716176][T20746] should_failslab+0xc2/0x120 [ 871.716234][T20746] __kmalloc_noprof+0xeb/0x910 [ 871.716264][T20746] ? find_held_lock+0x2b/0x80 [ 871.716302][T20746] ? sctp_bind_addrs_to_raw+0x12c/0x3e0 [ 871.716348][T20746] ? sctp_bind_addrs_to_raw+0x12c/0x3e0 [ 871.716385][T20746] sctp_bind_addrs_to_raw+0x12c/0x3e0 [ 871.716428][T20746] ? __lock_acquire+0x436/0x2890 [ 871.716455][T20746] ? __pfx_sctp_bind_addrs_to_raw+0x10/0x10 [ 871.716509][T20746] sctp_make_init+0x148/0xdc0 [ 871.716554][T20746] ? is_bpf_text_address+0x8a/0x1a0 [ 871.716601][T20746] ? bpf_ksym_find+0x124/0x1c0 [ 871.716632][T20746] ? __pfx_sctp_make_init+0x10/0x10 [ 871.716674][T20746] ? kernel_text_address+0x8d/0x100 [ 871.716709][T20746] ? unwind_get_return_address+0x59/0xa0 [ 871.716749][T20746] ? arch_stack_walk+0xa6/0x100 [ 871.716788][T20746] ? sctp_sm_lookup_event+0x15b/0x570 [ 871.716827][T20746] ? __pfx_sctp_sm_lookup_event+0x10/0x10 [ 871.716871][T20746] sctp_sf_do_prm_asoc+0xbf/0x360 [ 871.716902][T20746] ? __pfx_sctp_pname+0x10/0x10 [ 871.716939][T20746] sctp_do_sm+0x181/0x5e00 [ 871.716980][T20746] ? kasan_save_stack+0x42/0x60 [ 871.717019][T20746] ? kasan_save_stack+0x33/0x60 [ 871.717057][T20746] ? kasan_save_track+0x14/0x30 [ 871.717097][T20746] ? __pfx_sctp_do_sm+0x10/0x10 [ 871.717129][T20746] ? sctp_sendmsg+0xe99/0x1e20 [ 871.717161][T20746] ? ____sys_sendmsg+0x973/0xc30 [ 871.717204][T20746] ? ___sys_sendmsg+0x134/0x1d0 [ 871.717239][T20746] ? __sys_sendmmsg+0x200/0x420 [ 871.717274][T20746] ? __x64_sys_sendmmsg+0x9c/0x100 [ 871.717310][T20746] ? do_syscall_64+0xcd/0xf80 [ 871.717394][T20746] ? __sk_mem_raise_allocated+0x77d/0x14f0 [ 871.717444][T20746] sctp_primitive_ASSOCIATE+0x9c/0xd0 [ 871.717484][T20746] sctp_sendmsg_to_asoc+0xa4a/0x1c50 [ 871.717534][T20746] ? sctp_assoc_set_primary+0x177/0x300 [ 871.717591][T20746] ? sctp_assoc_add_peer+0x252/0x1540 [ 871.717629][T20746] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 871.717677][T20746] ? sctp_connect_new_asoc+0x41e/0x770 [ 871.717712][T20746] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 871.717752][T20746] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 871.717801][T20746] sctp_sendmsg+0xe99/0x1e20 [ 871.717843][T20746] ? __pfx_sctp_sendmsg+0x10/0x10 [ 871.717874][T20746] ? __pfx___might_resched+0x10/0x10 [ 871.717914][T20746] ? __lock_acquire+0x436/0x2890 [ 871.717947][T20746] ? aa_sk_perm+0x2f2/0xae0 [ 871.717985][T20746] ? __pfx_aa_sk_perm+0x10/0x10 [ 871.718030][T20746] ? __pfx_sctp_sendmsg+0x10/0x10 [ 871.718064][T20746] inet_sendmsg+0x11c/0x140 [ 871.718103][T20746] ____sys_sendmsg+0x973/0xc30 [ 871.718153][T20746] ? __pfx_____sys_sendmsg+0x10/0x10 [ 871.718205][T20746] ? find_held_lock+0x2b/0x80 [ 871.718242][T20746] ? futex_unqueue+0x133/0x2c0 [ 871.718278][T20746] ___sys_sendmsg+0x134/0x1d0 [ 871.718318][T20746] ? __pfx____sys_sendmsg+0x10/0x10 [ 871.718355][T20746] ? __pfx___futex_wait+0x10/0x10 [ 871.718411][T20746] ? find_held_lock+0x2b/0x80 [ 871.718469][T20746] __sys_sendmmsg+0x200/0x420 [ 871.718511][T20746] ? __pfx___sys_sendmmsg+0x10/0x10 [ 871.718558][T20746] ? __pfx_do_futex+0x10/0x10 [ 871.718619][T20746] ? xfd_validate_state+0x61/0x180 [ 871.718655][T20746] __x64_sys_sendmmsg+0x9c/0x100 [ 871.718694][T20746] ? lockdep_hardirqs_on+0x7c/0x110 [ 871.718737][T20746] do_syscall_64+0xcd/0xf80 [ 871.718783][T20746] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 871.718813][T20746] RIP: 0033:0x7f789838f7c9 [ 871.718836][T20746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 871.718866][T20746] RSP: 002b:00007f7899208038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 871.718894][T20746] RAX: ffffffffffffffda RBX: 00007f78985e5fa0 RCX: 00007f789838f7c9 [ 871.718914][T20746] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000006 [ 871.718931][T20746] RBP: 00007f7898413f91 R08: 0000000000000000 R09: 0000000000000000 [ 871.718949][T20746] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 871.718966][T20746] R13: 00007f78985e6038 R14: 00007f78985e5fa0 R15: 00007ffd00f218b8 [ 871.719005][T20746] [ 872.174962][T20562] mkiss: ax0: crc mode is auto. [ 872.833070][ T30] audit: type=1800 audit(1767236933.481:99): pid=20758 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.3142" name="dbroot" dev="configfs" ino=71955 res=0 errno=0 [ 873.501889][ T30] audit: type=1800 audit(1767236934.151:100): pid=20778 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.3147" name="lu_gp_id" dev="configfs" ino=72997 res=0 errno=0 [ 873.570977][ T30] audit: type=1800 audit(1767236934.221:101): pid=20780 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.3148" name="dbroot" dev="configfs" ino=71955 res=0 errno=0 [ 874.041473][ T30] audit: type=1800 audit(1767236934.691:102): pid=20790 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.2.3149" name="lu_gp_id" dev="configfs" ino=72997 res=0 errno=0 [ 875.009681][T15443] Bluetooth: hci1: unexpected subevent 0x01 length: 3 < 18 [ 875.312136][T20808] netlink: set zone limit has 8 unknown bytes [ 875.347542][T20814] netlink: 'syz.2.3152': attribute type 10 has an invalid length. [ 875.375812][T20814] netlink: 330 bytes leftover after parsing attributes in process `syz.2.3152'. [ 875.716183][ T30] audit: type=1800 audit(1767236936.361:103): pid=20829 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.3154" name="lu_gp_id" dev="configfs" ino=73069 res=0 errno=0 [ 876.165997][T20836] can: request_module (can-proto-0) failed. [ 876.655693][T20846] can: request_module (can-proto-0) failed. [ 877.152599][T20866] netlink: 'syz.0.3163': attribute type 10 has an invalid length. [ 877.177875][T20866] netlink: 330 bytes leftover after parsing attributes in process `syz.0.3163'. [ 877.362657][ T30] audit: type=1800 audit(1767236938.011:104): pid=20869 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.3164" name="dbroot" dev="configfs" ino=72203 res=0 errno=0 [ 877.403319][T20859] Setting dangerous option i915.mitigations - tainting kernel [ 877.411002][T20859] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 877.458052][ T30] audit: type=1800 audit(1767236938.101:105): pid=20871 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.3165" name="dbroot" dev="configfs" ino=72203 res=0 errno=0 [ 877.921851][T20876] random: crng reseeded on system resumption [ 878.096142][ T30] audit: type=1800 audit(1767236938.741:106): pid=20882 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.3167" name="lu_gp_id" dev="configfs" ino=72228 res=0 errno=0 [ 878.611819][T20888] FAULT_INJECTION: forcing a failure. [ 878.611819][T20888] name failslab, interval 1, probability 0, space 0, times 0 [ 878.624558][T20888] CPU: 0 UID: 0 PID: 20888 Comm: syz.3.3169 Tainted: G U L syzkaller #0 PREEMPT(full) [ 878.624596][T20888] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 878.624606][T20888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 878.624620][T20888] Call Trace: [ 878.624628][T20888] [ 878.624637][T20888] dump_stack_lvl+0x16c/0x1f0 [ 878.624678][T20888] should_fail_ex+0x512/0x640 [ 878.624705][T20888] ? __kmalloc_cache_noprof+0x5f/0x800 [ 878.624737][T20888] should_failslab+0xc2/0x120 [ 878.624775][T20888] __kmalloc_cache_noprof+0x80/0x800 [ 878.624803][T20888] ? sctp_stream_init_ext+0x4e/0x1b0 [ 878.624842][T20888] ? sctp_stream_init_ext+0x4e/0x1b0 [ 878.624876][T20888] sctp_stream_init_ext+0x4e/0x1b0 [ 878.624912][T20888] sctp_sendmsg_to_asoc+0x171b/0x1c50 [ 878.624952][T20888] ? sctp_assoc_set_primary+0x177/0x300 [ 878.625000][T20888] ? sctp_assoc_add_peer+0x252/0x1540 [ 878.625029][T20888] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 878.625068][T20888] ? sctp_connect_new_asoc+0x41e/0x770 [ 878.625097][T20888] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 878.625130][T20888] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 878.625171][T20888] sctp_sendmsg+0xe99/0x1e20 [ 878.625205][T20888] ? __pfx_sctp_sendmsg+0x10/0x10 [ 878.625230][T20888] ? __pfx___might_resched+0x10/0x10 [ 878.625273][T20888] ? __lock_acquire+0x436/0x2890 [ 878.625297][T20888] ? aa_sk_perm+0x2f2/0xae0 [ 878.625326][T20888] ? __pfx_aa_sk_perm+0x10/0x10 [ 878.625369][T20888] ? __pfx_sctp_sendmsg+0x10/0x10 [ 878.625393][T20888] inet_sendmsg+0x11c/0x140 [ 878.625418][T20888] ____sys_sendmsg+0x973/0xc30 [ 878.625452][T20888] ? __pfx_____sys_sendmsg+0x10/0x10 [ 878.625486][T20888] ? find_held_lock+0x2b/0x80 [ 878.625513][T20888] ? futex_unqueue+0x133/0x2c0 [ 878.625538][T20888] ___sys_sendmsg+0x134/0x1d0 [ 878.625565][T20888] ? __pfx____sys_sendmsg+0x10/0x10 [ 878.625590][T20888] ? __pfx___futex_wait+0x10/0x10 [ 878.625627][T20888] ? find_held_lock+0x2b/0x80 [ 878.625667][T20888] __sys_sendmmsg+0x200/0x420 [ 878.625696][T20888] ? __pfx___sys_sendmmsg+0x10/0x10 [ 878.625731][T20888] ? __pfx_do_futex+0x10/0x10 [ 878.625765][T20888] ? __x64_sys_openat+0x174/0x210 [ 878.625792][T20888] ? xfd_validate_state+0x61/0x180 [ 878.625816][T20888] __x64_sys_sendmmsg+0x9c/0x100 [ 878.625843][T20888] ? lockdep_hardirqs_on+0x7c/0x110 [ 878.625875][T20888] do_syscall_64+0xcd/0xf80 [ 878.625909][T20888] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 878.625931][T20888] RIP: 0033:0x7f5d3ff8f7c9 [ 878.625947][T20888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 878.625974][T20888] RSP: 002b:00007f5d40e5a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 878.625994][T20888] RAX: ffffffffffffffda RBX: 00007f5d401e5fa0 RCX: 00007f5d3ff8f7c9 [ 878.626007][T20888] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000006 [ 878.626020][T20888] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 878.626033][T20888] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 878.626046][T20888] R13: 00007f5d401e6038 R14: 00007f5d401e5fa0 R15: 00007ffe58909dc8 [ 878.626073][T20888] [ 879.130780][T20890] FAULT_INJECTION: forcing a failure. [ 879.130780][T20890] name failslab, interval 1, probability 0, space 0, times 0 [ 879.167501][T20890] CPU: 1 UID: 0 PID: 20890 Comm: syz.1.3170 Tainted: G U L syzkaller #0 PREEMPT(full) [ 879.167547][T20890] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 879.167555][T20890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 879.167568][T20890] Call Trace: [ 879.167576][T20890] [ 879.167583][T20890] dump_stack_lvl+0x16c/0x1f0 [ 879.167619][T20890] should_fail_ex+0x512/0x640 [ 879.167667][T20890] ? kmem_cache_alloc_noprof+0x62/0x770 [ 879.167713][T20890] should_failslab+0xc2/0x120 [ 879.167760][T20890] kmem_cache_alloc_noprof+0x83/0x770 [ 879.167797][T20890] ? alloc_empty_file+0x55/0x1e0 [ 879.167834][T20890] ? alloc_empty_file+0x55/0x1e0 [ 879.167861][T20890] alloc_empty_file+0x55/0x1e0 [ 879.167894][T20890] alloc_file_pseudo+0x13a/0x230 [ 879.167928][T20890] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 879.167965][T20890] ? do_raw_spin_unlock+0x172/0x230 [ 879.168003][T20890] __anon_inode_getfile+0xe8/0x280 [ 879.168037][T20890] anon_inode_getfile_fmode+0x37/0xa0 [ 879.168071][T20890] do_eventfd+0x156/0x390 [ 879.168108][T20890] __x64_sys_eventfd+0x32/0x50 [ 879.168145][T20890] do_syscall_64+0xcd/0xf80 [ 879.168192][T20890] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 879.168221][T20890] RIP: 0033:0x7f789838f7c9 [ 879.168245][T20890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 879.168274][T20890] RSP: 002b:00007f7899208038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 879.168301][T20890] RAX: ffffffffffffffda RBX: 00007f78985e5fa0 RCX: 00007f789838f7c9 [ 879.168321][T20890] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 879.168338][T20890] RBP: 00007f7898413f91 R08: 0000000000000000 R09: 0000000000000000 [ 879.168355][T20890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 879.168372][T20890] R13: 00007f78985e6038 R14: 00007f78985e5fa0 R15: 00007ffd00f218b8 [ 879.168409][T20890] [ 879.385308][T20892] netlink: 'syz.3.3171': attribute type 10 has an invalid length. [ 879.393241][T20892] netlink: 330 bytes leftover after parsing attributes in process `syz.3.3171'. [ 879.459830][T20890] netlink: 342 bytes leftover after parsing attributes in process `syz.1.3170'. [ 879.636854][T20895] netlink: 'syz.3.3173': attribute type 10 has an invalid length. [ 879.646088][T20895] netlink: 330 bytes leftover after parsing attributes in process `syz.3.3173'. [ 880.012707][T20909] netlink: 330 bytes leftover after parsing attributes in process `syz.3.3175'. [ 880.253338][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 880.261751][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 880.642490][ T30] audit: type=1800 audit(1767236941.291:107): pid=20925 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.2.3179" name="lu_gp_id" dev="configfs" ino=72320 res=0 errno=0 [ 881.545729][T20938] FAULT_INJECTION: forcing a failure. [ 881.545729][T20938] name failslab, interval 1, probability 0, space 0, times 0 [ 881.558591][T20938] CPU: 1 UID: 0 PID: 20938 Comm: syz.3.3183 Tainted: G U L syzkaller #0 PREEMPT(full) [ 881.558642][T20938] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 881.558655][T20938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 881.558674][T20938] Call Trace: [ 881.558685][T20938] [ 881.558698][T20938] dump_stack_lvl+0x16c/0x1f0 [ 881.558746][T20938] should_fail_ex+0x512/0x640 [ 881.558772][T20938] ? __kmalloc_cache_noprof+0x5f/0x800 [ 881.558801][T20938] should_failslab+0xc2/0x120 [ 881.558846][T20938] __kmalloc_cache_noprof+0x80/0x800 [ 881.558869][T20938] ? __sys_socket+0xac/0x260 [ 881.558887][T20938] ? fput+0x70/0xf0 [ 881.558907][T20938] ? do_eventfd+0x67/0x390 [ 881.558953][T20938] ? do_eventfd+0x67/0x390 [ 881.558993][T20938] do_eventfd+0x67/0x390 [ 881.559017][T20938] ? rcu_is_watching+0x12/0xc0 [ 881.559048][T20938] __x64_sys_eventfd+0x32/0x50 [ 881.559075][T20938] do_syscall_64+0xcd/0xf80 [ 881.559109][T20938] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 881.559131][T20938] RIP: 0033:0x7f5d3ff8f7c9 [ 881.559147][T20938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 881.559167][T20938] RSP: 002b:00007f5d40e39038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 881.559187][T20938] RAX: ffffffffffffffda RBX: 00007f5d401e6090 RCX: 00007f5d3ff8f7c9 [ 881.559201][T20938] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 881.559213][T20938] RBP: 00007f5d40013f91 R08: 0000000000000000 R09: 0000000000000000 [ 881.559226][T20938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 881.559239][T20938] R13: 00007f5d401e6128 R14: 00007f5d401e6090 R15: 00007ffe58909dc8 [ 881.559266][T20938] [ 881.759345][T20938] netlink: 342 bytes leftover after parsing attributes in process `syz.3.3183'. [ 882.138637][T20944] ------------[ cut here ]------------ [ 882.144529][T20944] WARNING: block/blk-wbt.c:741 at wbt_init_enable_default+0x4e/0x60, CPU#1: syz.2.3185/20944 [ 882.155063][T20944] Modules linked in: [ 882.159694][T20944] CPU: 1 UID: 0 PID: 20944 Comm: syz.2.3185 Tainted: G U L syzkaller #0 PREEMPT(full) [ 882.172562][T20944] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 882.177964][T20944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 882.188145][T20944] RIP: 0010:wbt_init_enable_default+0x4e/0x60 [ 882.194995][T20944] Code: 07 5b 5d e9 54 96 22 fd e8 4f 96 22 fd 48 89 ef e8 77 fa ff ff 31 ff 89 c3 89 c6 e8 dc 90 22 fd 85 db 74 dd e8 33 96 22 fd 90 <0f> 0b 90 eb d2 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 90 90 90 90 [ 882.214787][T20944] RSP: 0018:ffffc90004cafb88 EFLAGS: 00010283 [ 882.220988][T20944] RAX: 000000000000dfdc RBX: 00000000fffffff4 RCX: ffffc9000fc71000 [ 882.229114][T20944] RDX: 0000000000080000 RSI: ffffffff849bd4bd RDI: 0000000000000005 [ 882.237120][T20944] RBP: ffff88805d620000 R08: 0000000000000005 R09: 0000000000000000 [ 882.245429][T20944] R10: 00000000fffffff4 R11: ffffffff81000130 R12: ffff888029cf2fa8 [ 882.253474][T20944] R13: ffff88805d620390 R14: ffff888029cf2fb8 R15: ffff88805d620090 [ 882.261471][T20944] FS: 00007fb36040e6c0(0000) GS:ffff8881249fc000(0000) knlGS:0000000000000000 [ 882.270445][T20944] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 882.277039][T20944] CR2: 00007fb35f5ee470 CR3: 000000002b140000 CR4: 00000000003526f0 [ 882.285066][T20944] Call Trace: [ 882.288376][T20944] [ 882.291310][T20944] blk_register_queue+0x39e/0x4e0 [ 882.296357][T20944] __add_disk+0x74a/0xf00 [ 882.300729][T20944] add_disk_fwnode+0x13f/0x5d0 [ 882.305537][T20944] loop_add+0x903/0xb70 [ 882.309782][T20944] ? __pfx_loop_add+0x10/0x10 [ 882.314507][T20944] ? find_held_lock+0x2b/0x80 [ 882.319234][T20944] loop_control_ioctl+0x13e/0x640 [ 882.324283][T20944] ? __pfx_loop_control_ioctl+0x10/0x10 [ 882.330004][T20944] ? __pfx_loop_control_ioctl+0x10/0x10 [ 882.335578][T20944] __x64_sys_ioctl+0x18e/0x210 [ 882.340384][T20944] do_syscall_64+0xcd/0xf80 [ 882.344911][T20944] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 882.350957][T20944] RIP: 0033:0x7fb35f58f7c9 [ 882.355391][T20944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 882.375057][T20944] RSP: 002b:00007fb36040e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 882.383511][T20944] RAX: ffffffffffffffda RBX: 00007fb35f7e5fa0 RCX: 00007fb35f58f7c9 [ 882.391516][T20944] RDX: fffffffffffffffd RSI: 0000000000004c80 RDI: 0000000000000003 [ 882.399518][T20944] RBP: 00007fb35f613f91 R08: 0000000000000000 R09: 0000000000000000 [ 882.407493][T20944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 882.415540][T20944] R13: 00007fb35f7e6038 R14: 00007fb35f7e5fa0 R15: 00007fff8beba7b8 [ 882.423573][T20944] [ 882.426592][T20944] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 882.433872][T20944] CPU: 1 UID: 0 PID: 20944 Comm: syz.2.3185 Tainted: G U L syzkaller #0 PREEMPT(full) [ 882.444812][T20944] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 882.450008][T20944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 882.460073][T20944] Call Trace: [ 882.463351][T20944] [ 882.466294][T20944] dump_stack_lvl+0x3d/0x1f0 [ 882.470913][T20944] vpanic+0x640/0x6f0 [ 882.474906][T20944] ? wbt_init_enable_default+0x4e/0x60 [ 882.480380][T20944] panic+0xca/0xd0 [ 882.484114][T20944] ? __pfx_panic+0x10/0x10 [ 882.488554][T20944] check_panic_on_warn+0xab/0xb0 [ 882.493517][T20944] __warn+0x108/0x3c0 [ 882.497507][T20944] __report_bug+0x2a0/0x520 [ 882.502015][T20944] ? wbt_init_enable_default+0x4e/0x60 [ 882.507479][T20944] ? __pfx___report_bug+0x10/0x10 [ 882.512531][T20944] ? wbt_init_enable_default+0x4e/0x60 [ 882.517996][T20944] report_bug+0xb2/0x220 [ 882.522255][T20944] ? wbt_init_enable_default+0x4e/0x60 [ 882.527741][T20944] handle_bug+0x127/0x260 [ 882.532076][T20944] exc_invalid_op+0x17/0x50 [ 882.536587][T20944] asm_exc_invalid_op+0x1a/0x20 [ 882.541443][T20944] RIP: 0010:wbt_init_enable_default+0x4e/0x60 [ 882.547524][T20944] Code: 07 5b 5d e9 54 96 22 fd e8 4f 96 22 fd 48 89 ef e8 77 fa ff ff 31 ff 89 c3 89 c6 e8 dc 90 22 fd 85 db 74 dd e8 33 96 22 fd 90 <0f> 0b 90 eb d2 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 90 90 90 90 [ 882.567140][T20944] RSP: 0018:ffffc90004cafb88 EFLAGS: 00010283 [ 882.573215][T20944] RAX: 000000000000dfdc RBX: 00000000fffffff4 RCX: ffffc9000fc71000 [ 882.581205][T20944] RDX: 0000000000080000 RSI: ffffffff849bd4bd RDI: 0000000000000005 [ 882.589180][T20944] RBP: ffff88805d620000 R08: 0000000000000005 R09: 0000000000000000 [ 882.597236][T20944] R10: 00000000fffffff4 R11: ffffffff81000130 R12: ffff888029cf2fa8 [ 882.605207][T20944] R13: ffff88805d620390 R14: ffff888029cf2fb8 R15: ffff88805d620090 [ 882.613196][T20944] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 882.619265][T20944] ? wbt_init_enable_default+0x4d/0x60 [ 882.624735][T20944] ? wbt_init_enable_default+0x4d/0x60 [ 882.630200][T20944] blk_register_queue+0x39e/0x4e0 [ 882.635241][T20944] __add_disk+0x74a/0xf00 [ 882.639605][T20944] add_disk_fwnode+0x13f/0x5d0 [ 882.644385][T20944] loop_add+0x903/0xb70 [ 882.648562][T20944] ? __pfx_loop_add+0x10/0x10 [ 882.653264][T20944] ? find_held_lock+0x2b/0x80 [ 882.657952][T20944] loop_control_ioctl+0x13e/0x640 [ 882.662996][T20944] ? __pfx_loop_control_ioctl+0x10/0x10 [ 882.668555][T20944] ? __pfx_loop_control_ioctl+0x10/0x10 [ 882.674118][T20944] __x64_sys_ioctl+0x18e/0x210 [ 882.678918][T20944] do_syscall_64+0xcd/0xf80 [ 882.683434][T20944] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 882.689325][T20944] RIP: 0033:0x7fb35f58f7c9 [ 882.693745][T20944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 882.713353][T20944] RSP: 002b:00007fb36040e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 882.721771][T20944] RAX: ffffffffffffffda RBX: 00007fb35f7e5fa0 RCX: 00007fb35f58f7c9 [ 882.729737][T20944] RDX: fffffffffffffffd RSI: 0000000000004c80 RDI: 0000000000000003 [ 882.737709][T20944] RBP: 00007fb35f613f91 R08: 0000000000000000 R09: 0000000000000000 [ 882.745692][T20944] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 882.753660][T20944] R13: 00007fb35f7e6038 R14: 00007fb35f7e5fa0 R15: 00007fff8beba7b8 [ 882.761639][T20944] [ 882.765240][T20944] Kernel Offset: disabled [ 882.769569][T20944] Rebooting in 86400 seconds..