last executing test programs: 7.97775521s ago: executing program 3 (id=2564): openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x14be02, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) r0 = waitid$auto(0x2, 0xffffffffffffffff, &(0x7f0000000000)={@_si_pad}, 0x3, &(0x7f0000000080)={{0x7, 0x80000000}, {0x0, 0xffffffff80000001}, 0x4010, 0x1000, 0x7, 0x1ff, 0x401, 0x1, 0x13f, 0x4, 0x7b, 0x7d3e, 0x5, 0x5, 0x2, 0xfffffffffffff800}) rt_tgsigqueueinfo$auto(0xffffffffffffffff, r0, 0x3, &(0x7f0000000140)={@_si_pad}) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0xb4100, 0x105) r2 = eventfd$auto(0x2) linkat$auto(r1, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x1) r3 = openat$auto_proc_mounts_operations_mnt_namespace(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/mounts\x00', 0x600000, 0x0) timer_create$auto(0x6, &(0x7f00000003c0)={@sival_ptr=&(0x7f0000000980)="21d9e79c4b45193711e9882e8e59b9c6087401f51b52bd9c6cba30175b514e13449af5551a123724f7fbe4e4a4490b14a01f1899388bedb2abd6f0f60ad3a5775599d05e30a983b9e92c257c60c1824ea3d2f2aa55fb520273719b30edd8511632126acc857d0a97af97f1baae356929b1e5793a2b7dedbcc91e9c07443f2d425b95621ebe85bf9029626360303ecea345805adfb98fbe8db7e0507aeb5acc27d2df8fcc060767b7315c74eba0cb91ee2c2b", @inferred=r2, 0x3}, &(0x7f0000000400)=0x3ff) r4 = ioctl$auto_TUNSETOWNER(0xffffffffffffffff, 0x400454cc, &(0x7f0000000440)) linkat$auto(r1, &(0x7f0000000480)='./file0\x00', r4, &(0x7f00000004c0)='./file0\x00', 0x1000) pwrite64$auto(r2, &(0x7f0000000500)=',\\)-$-\x8b]@\x00', 0x4, 0xf) setsockopt$auto_SO_RCVBUF(r4, 0x0, 0x8, 0x0, 0xfffffffb) ioctl$auto_proc_reg_file_ops_compat_inode(0xffffffffffffffff, 0x0, &(0x7f0000000580)) socket(0xa, 0x5, 0x9) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_mac802154_hwsim(&(0x7f0000000680), r5) fchmod$auto(r3, 0xe41) r6 = fanotify_init$auto(0x2, 0x8) r7 = openat$auto_vga_arb_device_fops_vgaarb(0xffffffffffffff9c, &(0x7f00000006c0), 0x3a0, 0x0) mq_timedreceive$auto(r7, &(0x7f0000000700)='\x00', 0x0, &(0x7f0000000740)=0x6, &(0x7f0000000780)={0xa, 0x7ff}) openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/binderfs/binder1\x00', 0x1, 0x0) write$auto_trace_options_core_fops_trace(0xffffffffffffffff, &(0x7f0000000800)="a82152e692da01fe9c2d4f516ed86494736537f7320696bdbada46559506f0e23fac6c77479af1b1529ecb5714f874f1d9ca2f1958143745c7a5acba0f03ee", 0x3f) ioctl$auto_XFS_IOC_ATTRLIST_BY_HANDLE(r2, 0x4058587a, &(0x7f0000000b40)={{r6, &(0x7f0000000840)="58ba1b22b848b6bf265d960edba45a33835f7466aee08983686190c137296d44460b981b1120252d8b51ec3c28f7295904f64ec3023699ee4cbb9ddb61f2668657d623d6ea8c020c3edfdcecd06fc6fb845816cf093a1a4ddf89fe51f591", 0x80000000, &(0x7f00000008c0)="a82e17a2cd632b0fac75fc8c59780ee3deb8cbc9f11c3902dadb36022f5a8f0879d959705377d4188585d54503b67d47ac49be77b2c7c1374d81a2dec241b52557d3a2ab3d768f4863f89fca3b8967e48a5d24e94fe6e62870ff5f7ce67a2dc0e64fa889deab4454793b7e9e3bd654ece0bc73ecc33c51a93766476e1a5dd94b52a9e53eefd7239aa61341d86339a584eac07ed6c94e985af29244e60706a6fab198dd0b0569e491f842f4383f619fd3f4ace1b8a6a7aa52", 0x1, &(0x7f00000002c0)="b490d708b794079725f217d9feebcc70697f56ca1ce9fa153fb59f3c7c30847458709b2527a38702000000a238f0473addb1316e3aa334", &(0x7f0000000a80)=0x4}, {[0x4, 0x80001, 0x2, 0x7]}, 0x4b8, 0xfffffffd, &(0x7f0000000300)="ed9ec360d5f7ed7312f64b233e64ba3cd33113f271c004f6b01a99841dbbd386111c388d312b71178ab71860f6999a1e7ee0f6c681e66f7442cc6eb29d35628655545afb0c7745ee4759ba5c2a8d32c87aee799c3c4a2eb5e8666da989799c03b30d53ad22e049f79a609ab40d6106704d11f8e1ac60de"}) acct$auto(&(0x7f0000000bc0)='/dev/vga_arbiter\x00') sysfs$auto(0x2, 0x0, 0x0) r8 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) openat$auto_fuse_dev_operations_fuse_i(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x0, 0x0) sendfile$auto(r8, r8, 0x0, 0x3) epoll_create$auto(0x8800001) 6.699802273s ago: executing program 2 (id=2567): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/zswap/parameters/compressor\x00', 0xc0002, 0x0) r1 = prctl$auto_SECCOMP_MODE_STRICT(0x7, 0x1, 0x0, 0xffffffffffffff01, 0x32) r2 = syz_genetlink_get_family_id$auto_nlbl_mgmt(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$auto_NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) sendmsg$auto_NLBL_MGMT_C_ADD(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20008005}, 0x80) write$auto_ocfs2_control_fops_stack_user(r0, &(0x7f0000003900)='\t', 0x1) openat$auto_sg_fops_sg(0xffffffffffffff9c, 0x0, 0x8402, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) unshare$auto(0x40000080) unshare$auto(0x21) r3 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) sendmsg$auto_NL80211_CMD_REMAIN_ON_CHANNEL(r3, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="04002abd7000fcdbdf2537100000"], 0x14}, 0x1, 0x0, 0x0, 0x200000c4}, 0x0) openat$auto_kmsg_fops_printk(0xffffffffffffff9c, 0x0, 0x40001, 0x0) r4 = socket(0xa, 0x5, 0x84) sendto$auto(r4, 0x0, 0x401, 0x7f, 0x0, 0x17) listmount$auto(0x0, 0x0, 0x4, 0x101) init_module$auto(0x0, 0xffff9, 0x0) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) close_range$auto(0x2, 0xa, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000840)='/dev/tty6\x00', 0x0, 0x0) r5 = openat$auto_rng_chrdev_ops_core(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) read$auto_rng_chrdev_ops_core(r5, 0x0, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) setgroups$auto(0xe32, 0x0) mmap$auto(0x0, 0x2, 0x2, 0x40eb2, 0x401, 0xffffffffffffff7f) capget$auto(0x0, 0xfffffffffffffffe) clone3$auto(0x0, 0x40) r6 = socket(0xa, 0x5, 0x0) getsockopt$auto(r6, 0x84, 0x21, 0x0, 0x0) get_mempolicy$auto(0x0, 0x0, 0x8, 0x92, 0x917c) 5.870469254s ago: executing program 0 (id=2570): openat$auto_vmuser_fops_vmci_host(0xffffffffffffff9c, 0x0, 0x109001, 0x0) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) write$auto(0xffffffffffffffff, 0x0, 0x8000000000000001) socket(0x29, 0x2, 0x0) accept$auto(0x3, 0x0, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/rpc/auth.unix.ip/flush\x00', 0x40d81, 0x0) openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000140), 0xcb00, 0x0) getpid() openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptyd3\x00', 0x6140, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_nfsd(&(0x7f0000000400), r1) sendmsg$auto_NFSD_CMD_VERSION_SET(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x24000001}, 0x844) getsockopt$auto_SO_MEMINFO(r1, 0x7, 0x37, &(0x7f0000000180)='\x00', &(0x7f00000001c0)=0x5) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000080), r2) unshare$auto(0x40000080) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x76040, 0x0) r3 = openat$auto_mon_fops_binary_mon_bin(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/usbmon0\x00', 0x0, 0x0) ioctl$auto_MON_IOCX_MFETCH(r3, 0xc0109207, &(0x7f0000000100)={0x0, 0x2000004, 0x7}) pread64$auto(r3, 0x0, 0x81, 0xd) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/platform/dummy_udc.5/udc/dummy_udc.5/srp\x00', 0x60301, 0x0) r4 = socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) dup2$auto(0x5, 0x4) splice$auto(0x4, 0x0, r4, 0x0, 0x80000001, 0x7) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/bus/usb/023/001\x00', 0x122202, 0x0) 5.661851244s ago: executing program 2 (id=2571): openat$auto_dynamic_events_ops_trace_dynevent(0xffffffffffffff9c, 0x0, 0x80301, 0x0) setsockopt$auto(0x3, 0x29, 0x46, 0x0, 0x808) io_getevents$auto(0x1, 0x401, 0xfffffffffffffffe, 0x0, 0x0) prctl$auto_PR_GET_TID_ADDRESS(0x28, 0x8000000000002, 0x0, 0x10000000, 0x3) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0) write$auto(r0, &(0x7f0000000040)='//\xf2?', 0x80000000) io_uring_setup$auto(0x59, &(0x7f0000000080)={0x7fffffff, 0x1d, 0x3000, 0x6, 0x7, 0x400a, 0xffffffffffffffff, [], {0x6, 0x7, 0x8c4c, 0x29b, 0x3, 0x7f, 0x0, 0x6}, {0x100, 0x3, 0x52, 0x85, 0x2, 0x1a7b870a, 0x76c5, 0x8, 0x100000000}}) exit$auto(0x6) poll$auto(&(0x7f0000000040)={0x3, 0x500, 0x5}, 0x5, 0x80000000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x800008000) shmdt$auto(0x0) socket(0x5, 0x3, 0x2) read$auto(0xffffffffffffffff, 0x0, 0x20) set_mempolicy$auto(0x6, &(0x7f0000000080)=0x3, 0x21) unshare$auto(0x40000080) r1 = socket(0xa, 0x5, 0x0) chdir$auto(&(0x7f0000000340)='./file1\x00') r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D2\x00', 0x40001, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000200), 0xffffffffffffffff) waitid$auto_P_PID(0x1, 0x0, 0x0, 0xf, &(0x7f0000000440)={{0x7, 0x24}, {0x929a, 0x1ff}, 0x9, 0x3, 0x4032, 0xfffffffffffffff4, 0x4df, 0x0, 0x8, 0x8fb000, 0x0, 0x100, 0x4, 0x3, 0xd, 0x1}) sendmsg$auto_NL80211_CMD_SET_POWER_SAVE(r1, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000380)={0x0, 0xcc0}, 0x1, 0x0, 0x0, 0x10}, 0x8010) write$auto(r2, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) r3 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snd/controlC2\x00', 0x8100, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f0000000040)=0x5) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snd/controlC2\x00', 0x20002, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/net/rpc/auth.rpcsec.context/channel\x00', 0x101002, 0x0) close_range$auto(0xffffffffffffffff, 0xffffffffffffffff, 0x2) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x8, 0xd, 0x7d48, 0x948b, 0x8, 0x15f4da0c, 0x1, 0x3, 0x0, 0x80000001, 0x7, 0x4, 0x5, 0x2, 0x801]}, 0x0) 5.322792378s ago: executing program 3 (id=2572): mmap$auto(0x0, 0x400008, 0xe1, 0x9b72, 0x2, 0x8000) ioctl$auto(0xffffffffffffffff, 0x4b72, 0xffffffffffffffff) syz_clone(0x8000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ovs_vport(&(0x7f0000004680), 0xffffffffffffffff) sendmsg$auto_OVS_VPORT_CMD_DEL(r0, &(0x7f00000049c0)={0x0, 0x0, &(0x7f0000004980)={&(0x7f00000001c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010026bd7000fedbdf250201000000000600070000000000000056d70000000000000600000000000000080000000000000024b0000000000000030000000000000007000000000000000100000000000000"], 0x58}, 0x1, 0x0, 0x0, 0x40040801}, 0x44000) setresuid$auto(0x8, 0x8, 0x0) setfsuid$auto(0x0) r2 = openat$auto_vmwgfx_driver_fops_vmwgfx_drv(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/card1\x00', 0x0, 0x0) ioctl$auto(r2, 0x64c4, 0xffffffffffffffff) r3 = socket(0x1d, 0x2, 0x2007) r4 = getsockopt$auto(r3, 0x6b, 0xdc5a, 0xfffffffffffffffe, 0x0) r5 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS1\x00', 0x20000, 0x0) ioctl$auto_TIOCEXCL2(r5, 0x540c, 0x0) timer_settime$auto(0x0, 0xd80, &(0x7f0000000040)={{0x40000000000026b, 0x4}, {0x0, 0x200000000083}}, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS1\x00', 0x20000, 0x0) r6 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/block/zram0/reset\x00', 0xa001, 0x0) syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000000), r4) write$auto(r6, &(0x7f0000000040)='7\x00\\\xa0\x01\x00\x01\x00\a\x00\x00\x00\xc7k', 0x81) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) bpf$auto(0xf, &(0x7f0000000100)=@task_fd_query={0x2, 0x2, 0x7, 0x0, 0xd, 0x9, 0x9, 0x6, 0x7fff}, 0x8) inotify_init1$auto(0xfffffa6e) fanotify_init$auto(0x8, 0x909) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r7 = socket(0x11, 0x3, 0x2) getsockopt$auto(r7, 0x107, 0xb, 0x0, 0x0) r8 = semctl$auto(0x401, 0x3, 0xfc8, 0x7) move_pages$auto(r8, 0x20, 0x0, 0x0, 0x0, 0x407) 4.816689451s ago: executing program 3 (id=2573): r0 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x20342, 0x0) ioctl$auto_SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x1a9402, 0x0) sendmsg$auto_ETHTOOL_MSG_CABLE_TEST_TDR_ACT(0xffffffffffffffff, 0x0, 0x800) timer_create$auto(0x9, 0x0, 0x0) read$auto(0x3, 0x0, 0x8080) socket(0x23, 0x5, 0xfd) write$auto(0x3, 0x0, 0xffd8) unshare$auto(0x40000080) shmctl$auto_IPC_SET(0x4, 0x1, &(0x7f0000000280)={{0x80, 0xee00, 0xee00, 0xca6d, 0x8, 0x4bd6, 0x5}, 0xd21, 0x5, 0x8000000000000000, 0x1, @inferred=0xffffffffffffffff, @inferred=0xffffffffffffffff, 0x9, 0x0, &(0x7f0000000140)="4f0d6995e943b6bc1919e836e1a6e889b4881e233d3b51e066bb0a054c9e474be535fd", &(0x7f0000000200)="e3ac9b01ee8d985b677531eeeee5cb5bf774d2df4d9ae6dccbc98def20b72c7c2826a585ba3a8d67815abade214708a4ade77c6faa2f2889ca3e7989f32645dd597a3ae1b46e8d8c7e03ae6b8aaa49f6bf64cc5fa98e25"}) fsconfig$auto(r0, 0x800, &(0x7f0000000040)='/sys/devices/LNXSYSTM:00/LNXPWRBN:00/power/wakeup_abort_count\x00', &(0x7f00000000c0)="255a10a413f0b67eb46a5d3ab4c01713457bfd2f9893be1834f04bb39b83c826d483cd28aa0223fcd00a33f52ced396dce3ce3c5d962eac325dfae85e14f6d76f5e97d45b15420b323237dcd47c6261b1f978ef6c6766049bc1fa488100a9d99c4c602f517b76ce1a04867276011829e5b95d0cf974bcce319acdd", r1) write$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffffff, &(0x7f00000001c0)="624d1bfe595046ab5c98199adf260600de16baef6176e6021e1dce210500e8fdffff0000000000fffffffe00a7ed73de11691c13403c82be", 0x7b) process_mrelease$auto(0xffffffffffffffff, 0xa) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) write$auto(0x3, 0x0, 0x100082) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = socket(0x2, 0x1, 0x106) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXPWRBN:00/power/wakeup_abort_count\x00', 0x0, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r3, 0x0, 0x0) bind$auto(r2, &(0x7f0000000000)=@in={0x2, 0x3, @multicast1}, 0x6a) connect$auto(r2, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x23}}, 0x54) ioctl$auto(0x3, 0x80000541b, 0x38) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'veth0_to_bridge\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x40004) read$auto(0x3, 0x0, 0x7fffffff) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x14be02, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) madvise$auto(0x0, 0x2000040080000004, 0xe) 4.485511191s ago: executing program 1 (id=2574): r0 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x20342, 0x0) ioctl$auto_SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x1a9402, 0x0) sendmsg$auto_ETHTOOL_MSG_CABLE_TEST_TDR_ACT(0xffffffffffffffff, 0x0, 0x800) timer_create$auto(0x9, 0x0, 0x0) read$auto(0x3, 0x0, 0x8080) socket(0x23, 0x5, 0xfd) write$auto(0x3, 0x0, 0xffd8) shmctl$auto_IPC_SET(0x4, 0x1, &(0x7f0000000280)={{0x80, 0xee00, 0xee00, 0xca6d, 0x8, 0x4bd6, 0x5}, 0xd21, 0x5, 0x8000000000000000, 0x1, @inferred=0xffffffffffffffff, @inferred=0xffffffffffffffff, 0x9, 0x0, &(0x7f0000000140)="4f0d6995e943b6bc1919e836e1a6e889b4881e233d3b51e066bb0a054c9e474be535fd29da", &(0x7f0000000200)="e3ac9b01ee8d985b677531eeeee5cb5bf774d2df4d9ae6dccbc98def20b72c7c2826a585ba3a8d67815abade214708a4ade77c6faa2f2889ca3e7989f32645dd597a3ae1b46e8d8c7e03ae6b8aaa49f6bf64cc5fa98e25"}) fsconfig$auto(r0, 0x800, &(0x7f0000000040)='/sys/devices/LNXSYSTM:00/LNXPWRBN:00/power/wakeup_abort_count\x00', &(0x7f00000000c0)="255a10a413f0b67eb46a5d3ab4c01713457bfd2f9893be1834f04bb39b83c826d483cd28aa0223fcd00a33f52ced396dce3ce3c5d962eac325dfae85e14f6d76f5e97d45b15420b323237dcd47c6261b1f978ef6c6766049bc1fa488100a9d99c4c602f517b76ce1a04867276011829e5b95d0cf974bcce319acdd", r1) process_mrelease$auto(0xffffffffffffffff, 0xa) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) write$auto(0x3, 0x0, 0x100082) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = socket(0x2, 0x1, 0x106) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXPWRBN:00/power/wakeup_abort_count\x00', 0x0, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r3, 0x0, 0x0) bind$auto(r2, &(0x7f0000000000)=@in={0x2, 0x3, @multicast1}, 0x6a) connect$auto(r2, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x23}}, 0x54) ioctl$auto(0x3, 0x80000541b, 0x38) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'veth0_to_bridge\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x40004) read$auto(0x3, 0x0, 0x7fffffff) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x14be02, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) madvise$auto(0x0, 0x2000040080000004, 0xe) 4.365033594s ago: executing program 0 (id=2575): r0 = openat$auto_proc_pid_attr_operations_base(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x8002, 0x0) exit$auto(0xfff) write$auto_proc_pid_attr_operations_base(r0, 0x0, 0x0) setsockopt$auto_SO_SNDTIMEO_NEW(0xffffffffffffffff, 0x1, 0x43, 0x0, 0x5) r1 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000800)='/dev/tty0\x00', 0x102, 0x0) write$auto_console_fops_tty_io(r1, &(0x7f0000000000)="c80d1b", 0x3) r2 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptyyd\x00', 0x0, 0x0) write$auto_console_fops_tty_io(r2, &(0x7f0000001bc0)="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", 0x409) r3 = openat$auto_configfs_file_operations_configfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/config/target/core/alua/lu_gps/default_lu_gp/members\x00', 0x80, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, r3, 0x8000) mremap$auto(0x4000, 0xfee0, 0x3fd6, 0x3, 0xfffff000) mmap$auto(0x100000000, 0x200000000000008, 0x9, 0x792, 0x2, 0x8000) 4.000940799s ago: executing program 3 (id=2576): openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x14fa02, 0x0) mmap$auto(0x0, 0x810004, 0x400000000ffb, 0x8000000008011, 0x3, 0x8000) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/net/dummy0/carrier\x00', 0xc2061, 0x0) write$auto(r0, &(0x7f0000000440)='0\x00\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94\xf8F\xbb\xa2\xbb>\xade\x18\xbd\xe2\x1c\x89OO]e[\xbb\xf9\xcd\xc0\xc9\x00\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\xef\xc0\x04z\xd0I>\x8f\x00\xe5\x1c*\xed`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\f};\xab\b\x00\x00\x00\x00\x00\x00\x00}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xacA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xdeL/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(\x95\xdfH\xf4\v\xf3CRnz\xc2\x13<\xf0\v\x1f\x14\xf3\xd0\xf2oc!\x81\xea\x83\xa0\r|%\xbf\x02trg\x9a\xe7)\a\xf4\xaa\x05\xc0\xa0r\xd2\x85\x8dH\xd0>\xca\xfc5\x01\x95O4\xca\x95\x1d\x83\xec\nD\x8e\xfb\xce\xd1w\x15:\xe9\x81/B#\xc6\xa1\xfa-\x1b\x8cr\x92nM\xa1\xbb\xe4pd$\xd7\x1b\v\x82\rd\xd2\xaa\v!\xb1}\x92\x89\x8d\xcd\x1e\xc7N\xeeO\x8dO\xe9\xfc\x91\xa1\xa8=R+\a\xb7R\t\f+\x7f\xd5H\x90G=\x9a\r\xb10\x17n\x1b\xf8\v\x11\v\xbb', 0x83) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) sendmsg$auto_NL80211_CMD_PROBE_MESH_LINK(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x10) sysfs$auto(0x2, 0x23, 0x0) r1 = fsopen$auto(0x0, 0x5) fsconfig$auto(r1, 0x8, 0x0, 0x0, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mtdblock0\x00', 0x14fe02, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttynull\x00', 0x0, 0x0) read$auto(0x3, 0x0, 0x7fffffff) ioctl$auto_TIOCSTI2(r2, 0x5412, 0x0) r3 = openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$auto_SNDRV_PCM_IOCTL_HW_PARAMS_OLD2(r3, 0xc1004111, 0x0) r4 = openat$auto_evm_xattr_ops_evm_secfs(0xffffffffffffff9c, &(0x7f0000000140), 0x189000, 0x0) close_range$auto(r1, r0, 0x2) readv$auto(r4, &(0x7f00000018c0)={0x0, 0x1}, 0x9) openat$auto_proc_single_file_operations_base(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/personality\x00', 0x8002, 0x0) r5 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) r6 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/rt_acct\x00', 0x840, 0x0) read$auto_proc_iter_file_ops_compat_inode(r6, &(0x7f0000000180)=""/138, 0x8a) write$auto(r5, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$auto_proc_reg_file_ops_compat_inode(0xffffffffffffffff, &(0x7f0000000300)=""/251, 0xfb) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/dev_snmp6/macvtap0\x00', 0x0, 0x0) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) 3.984607608s ago: executing program 2 (id=2577): openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/controlC1\x00', 0xa02, 0x0) r0 = syz_clone3(&(0x7f0000000500)={0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100), {0x1c}, &(0x7f0000000300)=""/231, 0xe7, 0x0, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0], 0x6}, 0x58) mmap$auto(0x0, 0x400, 0xdf, 0xeb1, 0x1272, 0x8000) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/fail-nth\x00', 0x140242, 0x0) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x0, 0x0) read$auto(r2, 0x0, 0x20) writev$auto(r1, &(0x7f0000000200)={0x0, 0x10}, 0x3) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) mmap$auto(0x0, 0x2, 0xdf, 0xeb1, 0x401, 0x8000) open(&(0x7f0000000800)='./file0\x00', 0x22240, 0x147) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x80, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) move_pages$auto(r0, 0x9, 0x0, 0x0, 0x0, 0x8000000000000000) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000180)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0x4}, 0x1000000000029, 0x0, 0x4000000000007, 0xa505}, 0x800}, 0x4, 0x4008) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) execve$auto(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x22240, 0x154) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x16240, 0x0) execve$auto(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) execve$auto(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000100)=&(0x7f0000000600)='#\xdc\xfe\xd8E\xc8\x8bu4\xd9n\xcb\xca\xc7zw \x96\x9ejh\xad\x9eEc\xae\x1e\x89\x92\x9a\xbbP[B\xae\x9cf)\x15\xac\x90)l\x06\xf0\t\x12\x05zz\xa6\xb3\xce=\x00\x00\x00\x00\x00/\xc4T\x1f\xe5P\xff\xb4\xb7s0\x02\xc5\x81\x93\xc6\xc8\xb6Sp\x1a{8\xfc\xe0,X\xc7BU\xd0\x97\x7f1\x16\x99\x04\xabu/a(\x02\x7f\xbb\xbd\x906\xa8\xce\xee\xcd\xd7\t\x00\xfb\x83\xc8\x8aO\xe9\xbe=\xf7\xf4\x84,\x06\xd3j\x99b\xe6\xf6Y3A\xbb\xa4\xb2\f\x1b\xc3\x8a,g\xc6\xe8[\xdf\x88\x01\x9f7\xb5\x19m\xd8L\x84j\x8c\xec\xdf\x1a\xbd\xc5\x94\xb9\xb7\xd5\xa4\xc0\f-6\xfe\xa8\xed/u\x81_G\xfeR\xbb\x12\x16\xb8*\xa9\xc9\xe81\x9d\x06\xbbC\x17\xbb\xe6|\x97\xabB4J\xed+-\xf8u0/n\xcf\x8b\x95\x9d\xab\xa8\xc47\xa6\x0e\xdeOq\\\xc3\'{\b\xd3m\x94\xc2\xdd{\xeaO\x0e\xe4\xe0\xb9N:\xd60\x17,\x06\xc7B#Y0\x99\xeb\x874\xab?\xc8\x82\xe5\x8f\xb7\x91\xc2\xbe\xb2\x02\xfe\xd3k\xd5\xdcZ\xdcP\x8e+\xd8\xc7C\xcb\x15\x13c\xbf\xe8\xbd\"\x8f3\"\x14\xf8(\xda\x19\xcd\xec\x03.\xd9^\xc3A\xda\r[\x1a\xda\\#/\xd4\xaf\xd0\xe8\xa2\xdd\xc5{\xfa\xe0\x90\x8f\x99lQ\xec\x84h^\x11+\x93\b\xe0c\xe6\xd22\xf9\xa5') mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mbind$auto(0x0, 0xfa9d, 0x8001, &(0x7f0000000280)=0xc9e, 0x400, 0x1) ioctl$auto_KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = openat$auto_proc_pid_numa_maps_operations_internal(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/numa_maps\x00', 0x20000, 0x0) read$auto_proc_sessionid_operations_base(r4, &(0x7f00000000c0)=""/4073, 0xfe9) 3.832965726s ago: executing program 1 (id=2578): ioperm$auto(0x7, 0x6, 0x2) r0 = syz_clone3(&(0x7f00000000c0)={0x2000000, 0x0, 0x0, 0x0, {0x21}, 0x0, 0x0, 0x0, 0x0}, 0x58) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) io_uring_setup$auto(0x6, 0x0) close_range$auto(0x2, 0xffffffffffffffff, 0x0) r1 = open(0x0, 0x22240, 0x55) openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) sendmsg$auto_MACSEC_CMD_ADD_TXSA(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4000005) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual/net/bond0/bonding/primary_reselect\x00', 0x1e2142, 0x0) sendfile$auto(r2, r2, 0x0, 0x7fff) mmap$auto(0x0, 0x2020009, 0x3, 0x9000000eb1, 0xfffffffffffffffa, 0x8000) io_uring_setup$auto(0x4, 0x0) lsm_set_self_attr$auto(0x9, 0x0, 0x80, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_ovs_packet(&(0x7f0000001940), 0xffffffffffffffff) r5 = openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/tracing/per_cpu/cpu0/trace_pipe_raw\x00', 0x9000, 0x0) r6 = openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$auto_VHOST_SET_OWNER(r6, 0xaf01, 0x5) ioctl$auto(r6, 0x4028af11, r5) r7 = openat$auto_nvram_misc_fops_nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) close_range$auto(r5, r7, 0x6) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)={0x88, r4, 0x1b, 0x70bd2c, 0x25dfdbfe, {}, [@OVS_PACKET_ATTR_ACTIONS={0x4}, @OVS_PACKET_ATTR_HASH={0xc, 0xb, 0xffffffffffffffff}, @OVS_PACKET_ATTR_KEY={0x4}, @OVS_PACKET_ATTR_PACKET={0x12, 0x1, "89803500"}, @OVS_PACKET_ATTR_ACTIONS={0x4c, 0x3, 0x0, 0x1, [@nested={0x48, 0xac, 0x0, 0x1, [@nested={0x2c, 0x14e, 0x0, 0x1, [@typed={0x8, 0x61, 0x0, 0x0, @u32=0x8}, @nested={0x4, 0x79}, @typed={0x8, 0xdf, 0x0, 0x0, @pid}, @nested={0x4, 0x61}, @typed={0x8, 0xd9, 0x0, 0x0, @fd=r2}, @typed={0x8, 0x9a, 0x0, 0x0, @ipv4=@multicast2}]}, @typed={0x10, 0xd3, 0x0, 0x0, @str='*A^[\x01\\,.]\'$\x00'}, @typed={0x8, 0xa8, 0x0, 0x0, @u32=0xd160}]}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x4004040}, 0x4800) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1d7aa081d6cf2fed}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xa0, r4, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@OVS_PACKET_ATTR_KEY={0x8a, 0x2, 0x0, 0x1, [@generic="a40f2760fd6018abd6640a0a930e97efb9c690a9ec4d6862afd522dd6ef4aacb0243cb8080038f8fc2002fb24b816049894989c625e46ade85cb226fdc0db468e7115b891dd3aa94a2ddbb699e58e7b58bab59e4d14edc5a1936f1694dfd691129118fdcc9456af71e35341c6777c59a6b0aed8c7f824372500a679fe6cb", @typed={0x8, 0x135, 0x0, 0x0, @pid=r0}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x2400c001}, 0x242c739a8baaa72c) r8 = syz_genetlink_get_family_id$auto_nlbl_mgmt(&(0x7f00000000c0), 0xffffffffffffffff) r9 = socketpair$auto(0xffffffff, 0x6, 0x6, 0x0) sendmsg$auto_NLBL_MGMT_C_PROTOCOLS(r9, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r8, 0x10, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x0) ioctl$auto_IOC_PR_PREEMPT_ABORT(r9, 0x401870cc, &(0x7f0000000300)={0x9, 0x8, 0x0, 0xffee}) r10 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x12de82, 0x0) accept$auto(r10, &(0x7f0000000040)=@qipcrtr={0x2a, 0x1, 0xffffc000}, &(0x7f0000000140)=0x2) ioctl$auto(0x3, 0x80286f4e, r10) 3.171452586s ago: executing program 0 (id=2579): openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000280)='/sys/devices/platform/vhci_hcd.5/usb19/19-0:1.0/usb19-port1/state\x00', 0x18ab02, 0x0) mmap$auto(0x0, 0x202000a, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, 0x0, 0x40802, 0x0) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bus/usb/009/001\x00', 0xa101, 0x0) add_key$auto_KEY_SPEC_USER_KEYRING(&(0x7f0000000040)=')\x00', 0x0, &(0x7f0000000100), 0x2, 0xfffffffffffffffc) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000002180)='/dev/tty1\x00', 0x101000, 0x0) epoll_create1$auto(0x2) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x7fff) socket$nl_generic(0x10, 0x3, 0x10) unshare$auto(0x40000080) write$auto(0xca, 0x0, 0x7) syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000040), 0xffffffffffffffff) r0 = openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f0000000040), 0x262000, 0x0) mmap$auto(0x0, 0x8, 0x0, 0xffffffffffffffff, 0xfffffffffffffffa, 0x8000) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x0, 0x0) setsockopt$auto_SO_PASSSEC(r0, 0x5, 0x22, &(0x7f0000000000)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x9) read$auto(r2, 0x0, 0x20) writev$auto(r1, &(0x7f0000000180)={0x0, 0x7}, 0x3) write$auto(0x3, 0x0, 0xbed) ioctl$auto_VHOST_SET_OWNER(r0, 0xaf01, 0x5) sendmsg$auto_HWSIM_CMD_GET_RADIO(0xffffffffffffffff, 0x0, 0x20000010) syz_genetlink_get_family_id$auto_batadv(0x0, 0xffffffffffffffff) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/system/cpu/cpu0/power/autosuspend_delay_ms\x00', 0x26240, 0x0) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x20342, 0x0) mmap$auto(0x0, 0x400007, 0xe2, 0x9b72, 0xffffffffffffffff, 0x8000) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x7, 0x0) write$auto(r3, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) openat$auto_lowpan_enable_fops_(0xffffffffffffff9c, &(0x7f0000000000), 0x109500, 0x0) 2.817703599s ago: executing program 2 (id=2580): r0 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000800)='/dev/tty0\x00', 0x102, 0x0) openat$auto_mousedev_fops_mousedev(0xffffffffffffff9c, &(0x7f0000001180)='/dev/input/mice\x00', 0x1a1382, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$auto_802_15_4_mac(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$auto_IEEE802154_LLSEC_ADD_KEY(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r2, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_NAME={0x14, 0x1, 'macsec0\x00'}, @IEEE802154_ATTR_CSMA_MIN_BE={0x5, 0x26, 0x2}, @IEEE802154_ATTR_BCN_ORD={0x5, 0x17, 0xff}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x5f}]}, 0x40}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) write$auto_console_fops_tty_io(r0, &(0x7f0000000000)="c80d1b5d399b58", 0x7) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0xc2902, 0x0) mmap$auto(0x0, 0x7, 0xde, 0x9b72, 0x2, 0x8000) ioctl$auto_CEC_DQEVENT(0xffffffffffffffff, 0xc0506107, 0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/kernel/shm_rmid_forced\x00', 0x141241, 0x0) syz_genetlink_get_family_id$auto_nl802154(&(0x7f0000000100), 0xffffffffffffffff) syz_genetlink_get_family_id$auto_smc_gen_netlink(0x0, 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/rpc/nfsd.fh/content\x00', 0x40c80, 0x0) pread64$auto(r4, &(0x7f0000000540)='veth1\x00\xe0,\x17\xa0\xf7\x89Pl\x84K?\x01\x84\xa1i\xe00\x81p\xa0U \f\xdbP`:\xe2\'\xa7\xbf\xbd\x04\x18\xad\x90I^\x99M\xe0W\x14\x11\xf4\xeb\x90:\v\xc5\x13*\xfe\x90\xb1\xa9O\xa5\x05\xaa\x8fTi\xd6\x88Q\xda\xca', 0x20000000003f, 0x1) r5 = syz_genetlink_get_family_id$auto_net_shaper(&(0x7f0000001500), r3) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000001540)={'netdevsim0\x00', 0x0}) sendmsg$auto_NET_SHAPER_CMD_GROUP(r3, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000600)={0x38, r5, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@NET_SHAPER_A_HANDLE={0xc, 0x1, 0x0, 0x1, [@NET_SHAPER_A_HANDLE_SCOPE={0x8, 0x1, 0x3}]}, @NET_SHAPER_A_LEAVES={0x10, 0xa, 0x0, 0x1, [@NET_SHAPER_A_HANDLE={0xc, 0x1, 0x0, 0x1, [@NET_SHAPER_A_HANDLE_SCOPE={0x8, 0x1, 0x2}]}]}, @NET_SHAPER_A_IFINDEX={0x8, 0x8, r6}]}, 0x38}, 0x1, 0x0, 0x0, 0x44000}, 0x14) openat$auto_null_fops_mem(0xffffffffffffff9c, &(0x7f00000002c0), 0x4000, 0x0) prctl$auto(0x23, 0x200000000000009, 0x7fffffffefff, 0x0, 0x0) r7 = openat$auto_proc_pid_cmdline_ops_base(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/cmdline\x00', 0x60502, 0x0) read$auto_proc_pid_cmdline_ops_base(r7, &(0x7f0000000040)=""/159, 0x9f) r8 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/neigh/wlan0/retrans_time_ms\x00', 0xa2202, 0x0) sendfile$auto(r8, r8, 0x0, 0x100200400f) write$auto(0xca, &(0x7f0000000000)='\xa6.\xea\x0f\x14\xb9\xc1\x0f\tf', 0x7b) 2.395867532s ago: executing program 0 (id=2581): openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x80000, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/ext4/sda1/mb_max_to_scan\x00', 0x3c5040, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS0\x00', 0x48140, 0x0) readv$auto(r0, &(0x7f00000000c0)={0x0, 0x5}, 0x3) ioctl$auto_TIOCVHANGUP2(r0, 0x5437, 0x0) r1 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sda1\x00', 0xe6e43, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) wait4$auto(0xffffffffffffffff, 0x0, 0x2, 0x0) getsockname$auto(r1, 0x0, &(0x7f0000000580)=0x840) r2 = open(&(0x7f0000000800)='./file1\x00', 0x163ac1, 0x82) fcntl$auto(r2, 0x400, 0x1) close_range$auto(0x2, 0x8, 0x0) ioctl$auto_BLKFLSBUF(r1, 0x1261, 0x0) lseek$auto(0x3, 0x7fffffffffffffff, 0x1) writev$auto(0x3, &(0x7f0000000100)={0x0, 0x7111}, 0x8) openat$auto_event_inject_fops_trace(0xffffffffffffff9c, &(0x7f0000000300)='/sys/kernel/tracing/events/vmalloc/alloc_vmap_area/inject\x00', 0x2, 0x0) preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xfffffffd}, 0x6, 0x8, 0x5) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000640), r3) r4 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000380), r3) sendmsg$auto_NL80211_CMD_SET_PMK(r3, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x34, r4, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0xb}, @NL80211_ATTR_PMK_REAUTH_THRESHOLD={0x5, 0x120, 0x9}, @NL80211_ATTR_WDEV={0xc, 0x99, 0x7f}, @NL80211_ATTR_CONTROL_PORT={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000800}, 0x20000000) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(r3, &(0x7f0000000200)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000080)={0x14, r4, 0x805, 0x70bd2d, 0x25dfdffb}, 0x14}, 0x1, 0x0, 0x0, 0x4004044}, 0x4008040) sendmsg$auto_NL80211_CMD_DEL_INTERFACE(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)={0x1d8, r4, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_PS_STATE={0x8, 0x5d, 0x1000}, @NL80211_ATTR_TDLS_INITIATOR={0x4}, @NL80211_ATTR_USE_RRM={0x4}, @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, 0x26db}, @NL80211_ATTR_PMKR0_NAME={0xfe, 0x102, "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"}, @NL80211_ATTR_FTM_RESPONDER={0xa4, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_LCI={0x98, 0x2, "96f166967363c987524e97f591e29a3f03c8191a739c1a6859c767c3e14d6cca0eb3e1f3ce9e928a493cd41aca1cb22d6f9d2dcfa912831353b89974857ca7580534ee48a36af6c589fce43f3edc545c40e1a041488bd2e481f1a3f18316672d34ce51615b289771f02cf0e7177f5e042292399c41ced99423d3ab1066c14a6d3164eeb042a2be5dc95ed8a6ca5cf3429ea7de44"}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}, @NL80211_FTM_RESP_ATTR_ENABLED={0x4}]}, @NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x2}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) r5 = openat$auto_ubifs_dir_operations_ubifs(0xffffffffffffff9c, &(0x7f00000015c0)='/sys/devices/virtual/bluetooth/hci7/power\x00', 0x115200, 0x0) mmap$auto(0xce90, 0x9, 0xe, 0x111, r5, 0xd71f) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000000)={{0x0, 0x8000002, 0x0, 0x2000000000000003, 0x0, 0x27, 0x1}, 0x401}, 0x800, 0x80000000) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0x9, 0x3, 0x40, 0x93f, 0x1fee0, 0x3, 0x6, 0xfffffffffffffffe, 0x1ff, 0x5, 0x8005, 0x7, 0xb0, 0x9, 0x5, 0x3, 0x8, 0x4, 0x10, 0xb65, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x802, 0x0, 0x0, [0x2, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffc, 0x0, 0x2d24, 0x9, 0x0, 0x0, 0x80000, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x7fffffffffff, 0x9, 0x0, 0xfffffffffffffff7, 0x13, 0x4, 0x0, 0x0, 0x1000, 0x0, 0x8]}, 0x1fe, 0x82) mmap$auto(0x0, 0x2020009, 0x3, 0x800000000000eb1, 0xfffffffffffffffa, 0x8000) 2.275130873s ago: executing program 2 (id=2582): r0 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000800)='/dev/tty0\x00', 0x102, 0x0) openat$auto_mousedev_fops_mousedev(0xffffffffffffff9c, &(0x7f0000001180)='/dev/input/mice\x00', 0x1a1382, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$auto_802_15_4_mac(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$auto_IEEE802154_LLSEC_ADD_KEY(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r2, 0x10, 0x70bd2b, 0x25dfdbfb, {}, [@IEEE802154_ATTR_DEV_NAME={0x14, 0x1, 'macsec0\x00'}, @IEEE802154_ATTR_CSMA_MIN_BE={0x5, 0x26, 0x2}, @IEEE802154_ATTR_BCN_ORD={0x5, 0x17, 0xff}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x5f}]}, 0x40}, 0x1, 0x0, 0x0, 0x8}, 0x4000000) write$auto_console_fops_tty_io(r0, &(0x7f0000000000)="c80d1b5d399b58", 0x7) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0xc2902, 0x0) mmap$auto(0x0, 0x7, 0xde, 0x9b72, 0x2, 0x8000) ioctl$auto_CEC_DQEVENT(0xffffffffffffffff, 0xc0506107, 0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/kernel/shm_rmid_forced\x00', 0x141241, 0x0) syz_genetlink_get_family_id$auto_nl802154(&(0x7f0000000100), 0xffffffffffffffff) syz_genetlink_get_family_id$auto_smc_gen_netlink(0x0, 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_net_shaper(&(0x7f0000001500), r3) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000001540)={'netdevsim0\x00', 0x0}) sendmsg$auto_NET_SHAPER_CMD_GROUP(r3, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000000600)={0x38, r4, 0x1f, 0x70bd29, 0x25dfdbfe, {}, [@NET_SHAPER_A_HANDLE={0xc, 0x1, 0x0, 0x1, [@NET_SHAPER_A_HANDLE_SCOPE={0x8, 0x1, 0x3}]}, @NET_SHAPER_A_LEAVES={0x10, 0xa, 0x0, 0x1, [@NET_SHAPER_A_HANDLE={0xc, 0x1, 0x0, 0x1, [@NET_SHAPER_A_HANDLE_SCOPE={0x8, 0x1, 0x2}]}]}, @NET_SHAPER_A_IFINDEX={0x8, 0x8, r5}]}, 0x38}, 0x1, 0x0, 0x0, 0x44000}, 0x14) openat$auto_null_fops_mem(0xffffffffffffff9c, &(0x7f00000002c0), 0x4000, 0x0) prctl$auto(0x23, 0x200000000000009, 0x7fffffffefff, 0x0, 0x0) r6 = openat$auto_proc_pid_cmdline_ops_base(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/cmdline\x00', 0x60502, 0x0) read$auto_proc_pid_cmdline_ops_base(r6, &(0x7f0000000040)=""/159, 0x9f) r7 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/neigh/wlan0/retrans_time_ms\x00', 0xa2202, 0x0) sendfile$auto(r7, r7, 0x0, 0x100200400f) write$auto(0xca, &(0x7f0000000000)='\xa6.\xea\x0f\x14\xb9\xc1\x0f\tf', 0x7b) 2.249175585s ago: executing program 1 (id=2583): r0 = openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/input/event1\x00', 0x100, 0x0) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) (async) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual/net/nr14/proto_down\x00', 0x82942, 0x0) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x189401, 0x0) (async) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x189401, 0x0) close_range$auto(0x2, 0x8, 0x0) r4 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) sendmsg$auto_NL80211_CMD_CHANGE_NAN_CONFIG(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=ANY=[@ANYBLOB="14080000", @ANYRES16=0x0, @ANYBLOB="000228bd7000fedbdf2577000000"], 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x20000044) (async) sendmsg$auto_NL80211_CMD_CHANGE_NAN_CONFIG(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000180)=ANY=[@ANYBLOB="14080000", @ANYRES16=0x0, @ANYBLOB="000228bd7000fedbdf2577000000"], 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x20000044) ioctl$auto_KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$auto(0x3, 0xae60, 0x10000000000402) openat$auto_ocfs2_control_fops_stack_user(0xffffffffffffff9c, &(0x7f0000000080), 0x114502, 0x0) (async) openat$auto_ocfs2_control_fops_stack_user(0xffffffffffffff9c, &(0x7f0000000080), 0x114502, 0x0) ioctl$auto(0x3, 0xae41, r0) ioctl$auto_KVM_GET_MSRS(r3, 0x4400ae8f, &(0x7f00000000c0)={0xdd}) ioctl$auto_KVM_CREATE_VM(r1, 0xae80, 0x0) (async) ioctl$auto_KVM_CREATE_VM(r1, 0xae80, 0x0) 1.840802814s ago: executing program 1 (id=2584): r0 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x20342, 0x0) ioctl$auto_SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x1a9402, 0x0) sendmsg$auto_ETHTOOL_MSG_CABLE_TEST_TDR_ACT(0xffffffffffffffff, 0x0, 0x800) timer_create$auto(0x9, 0x0, 0x0) read$auto(0x3, 0x0, 0x8080) socket(0x23, 0x5, 0xfd) write$auto(0x3, 0x0, 0xffd8) shmctl$auto_IPC_SET(0x4, 0x1, &(0x7f0000000280)={{0x80, 0xee00, 0xee00, 0xca6d, 0x8, 0x4bd6, 0x5}, 0xd21, 0x5, 0x8000000000000000, 0x1, @inferred=0xffffffffffffffff, @inferred=0xffffffffffffffff, 0x9, 0x0, &(0x7f0000000140)="4f0d6995e943b6bc1919e836e1a6e889b4881e233d3b51e066bb0a054c9e474be535fd29da", &(0x7f0000000200)="e3ac9b01ee8d985b677531eeeee5cb5bf774d2df4d9ae6dccbc98def20b72c7c2826a585ba3a8d67815abade214708a4ade77c6faa2f2889ca3e7989f32645dd597a3ae1b46e8d8c7e03ae6b8aaa49f6bf64cc5fa98e25"}) write$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffffff, &(0x7f00000001c0)="624d1bfe595046ab5c98199adf260600de16baef6176e6021e1dce210500e8fdffff0000000000fffffffe00a7ed73de11691c13403c82be", 0x7b) process_mrelease$auto(0xffffffffffffffff, 0xa) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) write$auto(0x3, 0x0, 0x100082) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r1 = socket(0x2, 0x1, 0x106) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXPWRBN:00/power/wakeup_abort_count\x00', 0x0, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r2, 0x0, 0x0) bind$auto(r1, &(0x7f0000000000)=@in={0x2, 0x3, @multicast1}, 0x6a) connect$auto(r1, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x23}}, 0x54) ioctl$auto(0x3, 0x80000541b, 0x38) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'veth0_to_bridge\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x40004) read$auto(0x3, 0x0, 0x7fffffff) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x14be02, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) madvise$auto(0x0, 0x2000040080000004, 0xe) 1.799239975s ago: executing program 0 (id=2585): r0 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x20342, 0x0) ioctl$auto_SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x1a9402, 0x0) sendmsg$auto_ETHTOOL_MSG_CABLE_TEST_TDR_ACT(0xffffffffffffffff, 0x0, 0x800) timer_create$auto(0x9, 0x0, 0x0) read$auto(0x3, 0x0, 0x8080) socket(0x23, 0x5, 0xfd) write$auto(0x3, 0x0, 0xffd8) unshare$auto(0x40000080) shmctl$auto_IPC_SET(0x4, 0x1, &(0x7f0000000280)={{0x80, 0xee00, 0xee00, 0xca6d, 0x8, 0x4bd6, 0x5}, 0xd21, 0x5, 0x8000000000000000, 0x1, @inferred=0xffffffffffffffff, @inferred=0xffffffffffffffff, 0x9, 0x0, &(0x7f0000000140)="4f0d6995e943b6bc1919e836e1a6e889b4881e233d3b51e066bb0a054c9e474be535fd29", &(0x7f0000000200)="e3ac9b01ee8d985b677531eeeee5cb5bf774d2df4d9ae6dccbc98def20b72c7c2826a585ba3a8d67815abade214708a4ade77c6faa2f2889ca3e7989f32645dd597a3ae1b46e8d8c7e03ae6b8aaa49f6bf64cc5fa98e25"}) fsconfig$auto(r0, 0x800, &(0x7f0000000040)='/sys/devices/LNXSYSTM:00/LNXPWRBN:00/power/wakeup_abort_count\x00', &(0x7f00000000c0)="255a10a413f0b67eb46a5d3ab4c01713457bfd2f9893be1834f04bb39b83c826d483cd28aa0223fcd00a33f52ced396dce3ce3c5d962eac325dfae85e14f6d76f5e97d45b15420b323237dcd47c6261b1f978ef6c6766049bc1fa488100a9d99c4c602f517b76ce1a04867276011829e5b95d0cf974bcce319acdd", r1) write$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffffff, &(0x7f00000001c0)="624d1bfe595046ab5c98199adf260600de16baef6176e6021e1dce210500e8fdffff0000000000fffffffe00a7ed73de11691c13403c82be", 0x7b) process_mrelease$auto(0xffffffffffffffff, 0xa) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) write$auto(0x3, 0x0, 0x100082) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = socket(0x2, 0x1, 0x106) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXPWRBN:00/power/wakeup_abort_count\x00', 0x0, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r3, 0x0, 0x0) bind$auto(r2, &(0x7f0000000000)=@in={0x2, 0x3, @multicast1}, 0x6a) connect$auto(r2, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x23}}, 0x54) ioctl$auto(0x3, 0x80000541b, 0x38) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'veth0_to_bridge\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x68, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x40004) read$auto(0x3, 0x0, 0x7fffffff) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x14be02, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) madvise$auto(0x0, 0x2000040080000004, 0xe) 1.776424394s ago: executing program 2 (id=2586): openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/vtconsole/vtcon1/bind\x00', 0x182b02, 0x0) mmap$auto(0x0, 0x202000a, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, 0x0, 0x40802, 0x0) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bus/usb/009/001\x00', 0xa101, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptyb8\x00', 0x101800, 0x0) epoll_create1$auto(0x2) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) unshare$auto(0x40000080) write$auto(0xca, 0x0, 0x7) syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000040), 0xffffffffffffffff) r0 = openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/ptyq3\x00', 0x40001, 0x0) ioctl$auto_TIOCSETD2(r1, 0x5423, 0x0) mmap$auto(0x3, 0x2000009, 0x3, 0xffffffffffffffff, r0, 0x5) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x0, 0x0) setsockopt$auto_SO_PASSSEC(r0, 0x5, 0x22, &(0x7f0000000000)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x9) read$auto(r3, 0x0, 0x20) writev$auto(r2, &(0x7f0000000080)={0x0, 0x7}, 0x3) write$auto(0x3, 0x0, 0xbed) ioctl$auto_VHOST_SET_OWNER(r0, 0xaf01, 0x5) sendmsg$auto_HWSIM_CMD_GET_RADIO(0xffffffffffffffff, 0x0, 0x20000010) syz_genetlink_get_family_id$auto_batadv(0x0, 0xffffffffffffffff) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/pci0000:00/0000:00:03.0/resource1\x00', 0x400, 0x0) mmap$auto(0x6, 0xb, 0x24000000000e3, 0xffffffffffff9cfc, 0xffffffffffffffff, 0x5) 1.748603995s ago: executing program 3 (id=2587): openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/controlC1\x00', 0xa02, 0x0) r0 = syz_clone3(&(0x7f0000000500)={0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100), {0x1c}, &(0x7f0000000300)=""/231, 0xe7, 0x0, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0], 0x6}, 0x58) mmap$auto(0x0, 0x400, 0xdf, 0xeb1, 0x1272, 0x8000) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/fail-nth\x00', 0x140242, 0x0) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x0, 0x0) read$auto(r2, 0x0, 0x20) writev$auto(r1, &(0x7f0000000200)={0x0, 0x10}, 0x3) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) mmap$auto(0x0, 0x2, 0xdf, 0xeb1, 0x401, 0x8000) open(&(0x7f0000000800)='./file0\x00', 0x22240, 0x147) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x80, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) move_pages$auto(r0, 0x9, 0x0, 0x0, 0x0, 0x8000000000000000) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000180)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0x4}, 0x1000000000029, 0x0, 0x4000000000007, 0xa505}, 0x800}, 0x4, 0x4008) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) execve$auto(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x22240, 0x154) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x16240, 0x0) execve$auto(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) execve$auto(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000100)=&(0x7f0000000600)='#\xdc\xfe\xd8E\xc8\x8bu4\xd9n\xcb\xca\xc7zw \x96\x9ejh\xad\x9eEc\xae\x1e\x89\x92\x9a\xbbP[B\xae\x9cf)\x15\xac\x90)l\x06\xf0\t\x12\x05zz\xa6\xb3\xce=\x00\x00\x00\x00\x00/\xc4T\x1f\xe5P\xff\xb4\xb7s0\x02\xc5\x81\x93\xc6\xc8\xb6Sp\x1a{8\xfc\xe0,X\xc7BU\xd0\x97\x7f1\x16\x99\x04\xabu/a(\x02\x7f\xbb\xbd\x906\xa8\xce\xee\xcd\xd7\t\x00\xfb\x83\xc8\x8aO\xe9\xbe=\xf7\xf4\x84,\x06\xd3j\x99b\xe6\xf6Y3A\xbb\xa4\xb2\f\x1b\xc3\x8a,g\xc6\xe8[\xdf\x88\x01\x9f7\xb5\x19m\xd8L\x84j\x8c\xec\xdf\x1a\xbd\xc5\x94\xb9\xb7\xd5\xa4\xc0\f-6\xfe\xa8\xed/u\x81_G\xfeR\xbb\x12\x16\xb8*\xa9\xc9\xe81\x9d\x06\xbbC\x17\xbb\xe6|\x97\xabB4J\xed+-\xf8u0/n\xcf\x8b\x95\x9d\xab\xa8\xc47\xa6\x0e\xdeOq\\\xc3\'{\b\xd3m\x94\xc2\xdd{\xeaO\x0e\xe4\xe0\xb9N:\xd60\x17,\x06\xc7B#Y0\x99\xeb\x874\xab?\xc8\x82\xe5\x8f\xb7\x91\xc2\xbe\xb2\x02\xfe\xd3k\xd5\xdcZ\xdcP\x8e+\xd8\xc7C\xcb\x15\x13c\xbf\xe8\xbd\"\x8f3\"\x14\xf8(\xda\x19\xcd\xec\x03.\xd9^\xc3A\xda\r[\x1a\xda\\#/\xd4\xaf\xd0\xe8\xa2\xdd\xc5{\xfa\xe0\x90\x8f\x99lQ\xec\x84h^\x11+\x93\b\xe0c\xe6\xd22\xf9\xa5') mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mbind$auto(0x0, 0xfa9d, 0x8001, &(0x7f0000000280)=0xc9e, 0x400, 0x1) r4 = openat$auto_proc_pid_numa_maps_operations_internal(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/numa_maps\x00', 0x20000, 0x0) read$auto_proc_sessionid_operations_base(r4, &(0x7f00000000c0)=""/4073, 0xfe9) finit_module$auto(0x3, 0xfffffffffffffffe, 0x400000000004) pwrite64$auto(0xc8, 0x0, 0xfdef, 0x3) 992.0691ms ago: executing program 1 (id=2588): openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/controlC1\x00', 0xa02, 0x0) r0 = syz_clone3(&(0x7f0000000500)={0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100), {0x1c}, &(0x7f0000000300)=""/231, 0xe7, 0x0, &(0x7f0000000140)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0], 0x6}, 0x58) mmap$auto(0x0, 0x400, 0xdf, 0xeb1, 0x1272, 0x8000) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/fail-nth\x00', 0x140242, 0x0) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x0, 0x0) read$auto(r2, 0x0, 0x20) writev$auto(r1, &(0x7f0000000200)={0x0, 0x10}, 0x3) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) mmap$auto(0x0, 0x2, 0xdf, 0xeb1, 0x401, 0x8000) open(&(0x7f0000000800)='./file0\x00', 0x22240, 0x147) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x80, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) move_pages$auto(r0, 0x9, 0x0, 0x0, 0x0, 0x8000000000000000) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000180)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0x4}, 0x1000000000029, 0x0, 0x4000000000007, 0xa505}, 0x800}, 0x4, 0x4008) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) execve$auto(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x22240, 0x154) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x16240, 0x0) execve$auto(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) execve$auto(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000100)=&(0x7f0000000600)='#\xdc\xfe\xd8E\xc8\x8bu4\xd9n\xcb\xca\xc7zw \x96\x9ejh\xad\x9eEc\xae\x1e\x89\x92\x9a\xbbP[B\xae\x9cf)\x15\xac\x90)l\x06\xf0\t\x12\x05zz\xa6\xb3\xce=\x00\x00\x00\x00\x00/\xc4T\x1f\xe5P\xff\xb4\xb7s0\x02\xc5\x81\x93\xc6\xc8\xb6Sp\x1a{8\xfc\xe0,X\xc7BU\xd0\x97\x7f1\x16\x99\x04\xabu/a(\x02\x7f\xbb\xbd\x906\xa8\xce\xee\xcd\xd7\t\x00\xfb\x83\xc8\x8aO\xe9\xbe=\xf7\xf4\x84,\x06\xd3j\x99b\xe6\xf6Y3A\xbb\xa4\xb2\f\x1b\xc3\x8a,g\xc6\xe8[\xdf\x88\x01\x9f7\xb5\x19m\xd8L\x84j\x8c\xec\xdf\x1a\xbd\xc5\x94\xb9\xb7\xd5\xa4\xc0\f-6\xfe\xa8\xed/u\x81_G\xfeR\xbb\x12\x16\xb8*\xa9\xc9\xe81\x9d\x06\xbbC\x17\xbb\xe6|\x97\xabB4J\xed+-\xf8u0/n\xcf\x8b\x95\x9d\xab\xa8\xc47\xa6\x0e\xdeOq\\\xc3\'{\b\xd3m\x94\xc2\xdd{\xeaO\x0e\xe4\xe0\xb9N:\xd60\x17,\x06\xc7B#Y0\x99\xeb\x874\xab?\xc8\x82\xe5\x8f\xb7\x91\xc2\xbe\xb2\x02\xfe\xd3k\xd5\xdcZ\xdcP\x8e+\xd8\xc7C\xcb\x15\x13c\xbf\xe8\xbd\"\x8f3\"\x14\xf8(\xda\x19\xcd\xec\x03.\xd9^\xc3A\xda\r[\x1a\xda\\#/\xd4\xaf\xd0\xe8\xa2\xdd\xc5{\xfa\xe0\x90\x8f\x99lQ\xec\x84h^\x11+\x93\b\xe0c\xe6\xd22\xf9\xa5') mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mbind$auto(0x0, 0xfa9d, 0x8001, &(0x7f0000000280)=0xc9e, 0x400, 0x1) ioctl$auto_KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r4 = openat$auto_proc_pid_numa_maps_operations_internal(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/numa_maps\x00', 0x20000, 0x0) read$auto_proc_sessionid_operations_base(r4, &(0x7f00000000c0)=""/4073, 0xfe9) 749.132873ms ago: executing program 3 (id=2589): openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/controlC1\x00', 0xa02, 0x0) r0 = syz_clone3(&(0x7f0000000500)={0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100), {0x1c}, &(0x7f0000000300)=""/231, 0xe7, &(0x7f0000000400)=""/195, 0x0}, 0x58) mmap$auto(0x0, 0x400, 0xdf, 0xeb1, 0x1272, 0x8000) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/fail-nth\x00', 0x140242, 0x0) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x0, 0x0) read$auto(r2, 0x0, 0x20) writev$auto(r1, &(0x7f0000000200)={0x0, 0x10}, 0x3) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) mmap$auto(0x0, 0x2, 0xdf, 0xeb1, 0x401, 0x8000) open(&(0x7f0000000800)='./file0\x00', 0x22240, 0x147) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x80, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) move_pages$auto(r0, 0x9, 0x0, 0x0, 0x0, 0x8000000000000000) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000180)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0x4}, 0x1000000000029, 0x0, 0x4000000000007, 0xa505}, 0x800}, 0x4, 0x4008) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) execve$auto(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x22240, 0x154) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x16240, 0x0) execve$auto(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) execve$auto(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000100)=&(0x7f0000000600)='#\xdc\xfe\xd8E\xc8\x8bu4\xd9n\xcb\xca\xc7zw \x96\x9ejh\xad\x9eEc\xae\x1e\x89\x92\x9a\xbbP[B\xae\x9cf)\x15\xac\x90)l\x06\xf0\t\x12\x05zz\xa6\xb3\xce=\x00\x00\x00\x00\x00/\xc4T\x1f\xe5P\xff\xb4\xb7s0\x02\xc5\x81\x93\xc6\xc8\xb6Sp\x1a{8\xfc\xe0,X\xc7BU\xd0\x97\x7f1\x16\x99\x04\xabu/a(\x02\x7f\xbb\xbd\x906\xa8\xce\xee\xcd\xd7\t\x00\xfb\x83\xc8\x8aO\xe9\xbe=\xf7\xf4\x84,\x06\xd3j\x99b\xe6\xf6Y3A\xbb\xa4\xb2\f\x1b\xc3\x8a,g\xc6\xe8[\xdf\x88\x01\x9f7\xb5\x19m\xd8L\x84j\x8c\xec\xdf\x1a\xbd\xc5\x94\xb9\xb7\xd5\xa4\xc0\f-6\xfe\xa8\xed/u\x81_G\xfeR\xbb\x12\x16\xb8*\xa9\xc9\xe81\x9d\x06\xbbC\x17\xbb\xe6|\x97\xabB4J\xed+-\xf8u0/n\xcf\x8b\x95\x9d\xab\xa8\xc47\xa6\x0e\xdeOq\\\xc3\'{\b\xd3m\x94\xc2\xdd{\xeaO\x0e\xe4\xe0\xb9N:\xd60\x17,\x06\xc7B#Y0\x99\xeb\x874\xab?\xc8\x82\xe5\x8f\xb7\x91\xc2\xbe\xb2\x02\xfe\xd3k\xd5\xdcZ\xdcP\x8e+\xd8\xc7C\xcb\x15\x13c\xbf\xe8\xbd\"\x8f3\"\x14\xf8(\xda\x19\xcd\xec\x03.\xd9^\xc3A\xda\r[\x1a\xda\\#/\xd4\xaf\xd0\xe8\xa2\xdd\xc5{\xfa\xe0\x90\x8f\x99lQ\xec\x84h^\x11+\x93\b\xe0c\xe6\xd22\xf9\xa5') mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mbind$auto(0x0, 0xfa9d, 0x8001, &(0x7f0000000280)=0xc9e, 0x400, 0x1) r4 = openat$auto_proc_pid_numa_maps_operations_internal(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/numa_maps\x00', 0x20000, 0x0) read$auto_proc_sessionid_operations_base(r4, &(0x7f00000000c0)=""/4073, 0xfe9) finit_module$auto(0x3, 0xfffffffffffffffe, 0x400000000004) pwrite64$auto(0xc8, 0x0, 0xfdef, 0x3) 237.358005ms ago: executing program 0 (id=2590): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x20005, 0xa, 0x200eb1, 0x401, 0x8000) r0 = socket(0xa, 0x2, 0x0) getsockopt$auto(r0, 0x29, 0x41, 0x0, 0x0) sendmmsg$auto(0xffffffffffffffff, 0x0, 0xd, 0x311) sendto$auto(0x3, 0x0, 0x3, 0x101, &(0x7f0000000000)=@in={0x2, 0x4e26, @loopback}, 0x1c) close_range$auto(0x0, 0x5, 0x0) r1 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000800)='/dev/tty0\x00', 0x102, 0x0) write$auto_console_fops_tty_io(r1, &(0x7f0000000440)="671d2647dd69b6440843b6e6688a2b5ad9df2669e6f9cd2365", 0xfdef) r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/tty12\x00', 0x101840, 0x0) r3 = socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) ioctl$auto(0xffffffffffffffff, 0x8, 0xffffffffffffffff) r4 = socket(0x2, 0x2, 0x0) bind$auto(r4, &(0x7f0000000040)=@in={0x2, 0x4e21, @multicast2}, 0x6a) setsockopt$auto(0xffffffffffffffff, 0x7, 0x14b60000, 0x0, 0x80000002) open(&(0x7f0000000080)='./cgroup.cpu/cgroup.procs\x00', 0xa0400, 0x8) ioctl$auto(r2, 0x541c, r3) 0s ago: executing program 1 (id=2591): mmap$auto(0x0, 0x2020009, 0x3, 0xeb2, 0xfffffffffffffffb, 0x8000) set_mempolicy$auto(0x3, &(0x7f0000000000)=0x7, 0x9) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x40000008000) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x1, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r1, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x140082, 0x0) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) close_range$auto(0x2, 0x8, 0x0) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0xffffffffffffffff, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) sysfs$auto(0x2, 0x7, 0x0) lsm_list_modules$auto(0x0, 0x0, 0x0) r3 = openat$auto_dvb_demux_fops_dmxdev(0xffffffffffffff9c, &(0x7f0000000280), 0x141182, 0x0) ioctl$auto_dvb_demux_fops_dmxdev(r3, 0x40146f2c, 0x0) ioctl$auto_dvb_demux_fops_dmxdev(0xffffffffffffffff, 0x40146f2c, 0x0) r4 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security/tomoyo/audit\x00', 0x40802, 0x0) read$auto(r4, 0x0, 0xb4d3) unshare$auto(0x40000080) mmap$auto(0x0, 0x2020009, 0x40000003, 0xeb1, 0xfffffffffffffffa, 0x8000) socket(0xa, 0x3, 0x3a) mmap$auto(0xffffffff00000000, 0x2020007, 0x0, 0x100000eb1, r0, 0x529) fsopen$auto(0x0, 0x1) r5 = socket(0xa, 0x3, 0x88) setsockopt$auto(r5, 0x11, 0xa, 0x0, 0x8) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "ab06fdffff00fff500"}, 0x55) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/platform/serial8250/driver_override\x00', 0x22b42, 0x0) kernel console output (not intermixed with test programs): .800614][T17605] FAULT_INJECTION: forcing a failure. [ 792.800614][T17605] name failslab, interval 1, probability 0, space 0, times 0 [ 792.882876][T17605] CPU: 0 UID: 0 PID: 17605 Comm: syz.0.2393 Tainted: G L syzkaller #0 PREEMPT(full) [ 792.882904][T17605] Tainted: [L]=SOFTLOCKUP [ 792.882910][T17605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 792.882920][T17605] Call Trace: [ 792.882925][T17605] [ 792.882933][T17605] dump_stack_lvl+0x16c/0x1f0 [ 792.882962][T17605] should_fail_ex+0x512/0x640 [ 792.882979][T17605] ? __kmalloc_noprof+0xca/0x910 [ 792.882997][T17605] should_failslab+0xc2/0x120 [ 792.883021][T17605] __kmalloc_noprof+0xeb/0x910 [ 792.883038][T17605] ? lsm_blob_alloc+0x68/0x90 [ 792.883063][T17605] ? lsm_blob_alloc+0x68/0x90 [ 792.883083][T17605] lsm_blob_alloc+0x68/0x90 [ 792.883104][T17605] security_sk_alloc+0x2f/0x270 [ 792.883121][T17605] sk_prot_alloc+0xfb/0x2a0 [ 792.883146][T17605] sk_alloc+0x36/0xe30 [ 792.883164][T17605] unix_create1+0xa6/0x700 [ 792.883180][T17605] unix_create+0x110/0x270 [ 792.883195][T17605] __sock_create+0x339/0x8a0 [ 792.883212][T17605] __sys_socketpair+0x25c/0x5a0 [ 792.883228][T17605] ? __pfx___sys_socketpair+0x10/0x10 [ 792.883248][T17605] ? fput+0x70/0xf0 [ 792.883265][T17605] ? xfd_validate_state+0x61/0x180 [ 792.883279][T17605] ? __pfx_do_writev+0x10/0x10 [ 792.883302][T17605] __x64_sys_socketpair+0x96/0x100 [ 792.883317][T17605] ? lockdep_hardirqs_on+0x7c/0x110 [ 792.883340][T17605] do_syscall_64+0xcd/0xf80 [ 792.883363][T17605] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 792.883379][T17605] RIP: 0033:0x7fd55318f7c9 [ 792.883392][T17605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 792.883407][T17605] RSP: 002b:00007fd553f7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 792.883422][T17605] RAX: ffffffffffffffda RBX: 00007fd5533e5fa0 RCX: 00007fd55318f7c9 [ 792.883432][T17605] RDX: 8000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 792.883441][T17605] RBP: 00007fd553213f91 R08: 0000000000000000 R09: 0000000000000000 [ 792.883450][T17605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 792.883459][T17605] R13: 00007fd5533e6038 R14: 00007fd5533e5fa0 R15: 00007ffc3da61b58 [ 792.883479][T17605] [ 793.521347][T17619] futex_wake_op: syz.2.2395 tries to shift op by -2048; fix this program [ 793.546353][T17619] futex_wake_op: syz.2.2395 tries to shift op by -2048; fix this program [ 793.568585][T17619] 0x000000000001-0x000000020000 : "" [ 793.606634][T17619] ftl_cs: FTL header corrupt! [ 794.095346][T17637] input: jJǸ-9%vJ86 as /devices/virtual/input/input25 [ 794.690020][T17647] futex_wake_op: syz.1.2401 tries to shift op by -2048; fix this program [ 794.816808][T17647] futex_wake_op: syz.1.2401 tries to shift op by -2048; fix this program [ 795.755400][T17662] futex_wake_op: syz.2.2404 tries to shift op by -2048; fix this program [ 795.806196][T17664] NOTICE: Automounting of tracing to debugfs is deprecated and will be removed in 2030 [ 795.816482][T17662] futex_wake_op: syz.2.2404 tries to shift op by -2048; fix this program [ 795.939981][T17664] netlink: 342 bytes leftover after parsing attributes in process `syz.1.2403'. [ 796.045077][T17662] nvme_fabrics: missing parameter 'transport=%s' [ 796.095643][T17662] nvme_fabrics: missing parameter 'nqn=%s' [ 796.340363][T17670] vmstat_refresh: nr_hugetlb -3072 [ 796.749796][T17684] input: jJǸ-9%vJ86 as /devices/virtual/input/input26 [ 796.995373][T17691] ptrace attach of "./syz-executor exec"[16849] was attempted by ""[17691] [ 797.317964][T17702] FAULT_INJECTION: forcing a failure. [ 797.317964][T17702] name failslab, interval 1, probability 0, space 0, times 0 [ 797.389451][T17699] FAULT_INJECTION: forcing a failure. [ 797.389451][T17699] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 797.436304][T17702] CPU: 0 UID: 0 PID: 17702 Comm: syz.2.2412 Tainted: G L syzkaller #0 PREEMPT(full) [ 797.436331][T17702] Tainted: [L]=SOFTLOCKUP [ 797.436337][T17702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 797.436347][T17702] Call Trace: [ 797.436353][T17702] [ 797.436360][T17702] dump_stack_lvl+0x16c/0x1f0 [ 797.436389][T17702] should_fail_ex+0x512/0x640 [ 797.436407][T17702] ? kmem_cache_alloc_lru_noprof+0x66/0x770 [ 797.436429][T17702] should_failslab+0xc2/0x120 [ 797.436453][T17702] kmem_cache_alloc_lru_noprof+0x87/0x770 [ 797.436472][T17702] ? alloc_inode+0x64/0x240 [ 797.436492][T17702] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 797.436515][T17702] ? alloc_inode+0x64/0x240 [ 797.436529][T17702] alloc_inode+0x64/0x240 [ 797.436546][T17702] new_inode+0x22/0x1c0 [ 797.436564][T17702] __debugfs_create_file+0x105/0x530 [ 797.436581][T17702] debugfs_create_file_full+0x41/0x60 [ 797.436598][T17702] kvm_dev_ioctl+0x14ca/0x1a80 [ 797.436624][T17702] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 797.436650][T17702] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 797.436670][T17702] __x64_sys_ioctl+0x18e/0x210 [ 797.436691][T17702] do_syscall_64+0xcd/0xf80 [ 797.436714][T17702] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 797.436730][T17702] RIP: 0033:0x7f6219b8f7c9 [ 797.436743][T17702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 797.436759][T17702] RSP: 002b:00007f621a992038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 797.436777][T17702] RAX: ffffffffffffffda RBX: 00007f6219de5fa0 RCX: 00007f6219b8f7c9 [ 797.436787][T17702] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000002 [ 797.436796][T17702] RBP: 00007f6219c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 797.436805][T17702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 797.436814][T17702] R13: 00007f6219de6038 R14: 00007f6219de5fa0 R15: 00007ffff3091168 [ 797.436833][T17702] [ 797.436840][T17702] debugfs: out of free dentries, can not create file 'mmu_flooded' [ 797.672243][T17699] CPU: 0 UID: 0 PID: 17699 Comm: syz.3.2411 Tainted: G L syzkaller #0 PREEMPT(full) [ 797.672268][T17699] Tainted: [L]=SOFTLOCKUP [ 797.672274][T17699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 797.672284][T17699] Call Trace: [ 797.672290][T17699] [ 797.672296][T17699] dump_stack_lvl+0x16c/0x1f0 [ 797.672323][T17699] should_fail_ex+0x512/0x640 [ 797.672344][T17699] should_fail_alloc_page+0xe7/0x130 [ 797.672369][T17699] prepare_alloc_pages+0x401/0x670 [ 797.672396][T17699] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 797.672417][T17699] ? find_held_lock+0x2b/0x80 [ 797.672438][T17699] ? is_bpf_text_address+0x8a/0x1a0 [ 797.672458][T17699] ? bpf_ksym_find+0x124/0x1c0 [ 797.672473][T17699] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 797.672498][T17699] ? is_bpf_text_address+0x94/0x1a0 [ 797.672517][T17699] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 797.672536][T17699] ? __kernel_text_address+0xd/0x40 [ 797.672552][T17699] ? unwind_get_return_address+0x59/0xa0 [ 797.672572][T17699] ? arch_stack_walk+0xa6/0x100 [ 797.672597][T17699] ? stack_trace_save+0x8e/0xc0 [ 797.672618][T17699] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 797.672642][T17699] ? policy_nodemask+0xea/0x4e0 [ 797.672666][T17699] alloc_pages_mpol+0x1fb/0x550 [ 797.672689][T17699] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 797.672717][T17699] alloc_pages_noprof+0x131/0x390 [ 797.672740][T17699] __pud_alloc+0x3b/0x760 [ 797.672764][T17699] __handle_mm_fault+0x1405/0x2bb0 [ 797.672781][T17699] ? mt_find+0x3e2/0xa20 [ 797.672798][T17699] ? __pfx___handle_mm_fault+0x10/0x10 [ 797.672829][T17699] handle_mm_fault+0x3fe/0xad0 [ 797.672857][T17699] __get_user_pages+0x54e/0x3590 [ 797.672888][T17699] ? __pfx___get_user_pages+0x10/0x10 [ 797.672915][T17699] get_user_pages_remote+0x243/0xab0 [ 797.672942][T17699] ? __pfx_get_user_pages_remote+0x10/0x10 [ 797.672973][T17699] get_arg_page+0xf4/0x310 [ 797.672992][T17699] ? __pfx_get_arg_page+0x10/0x10 [ 797.673019][T17699] copy_string_kernel+0x182/0x520 [ 797.673043][T17699] do_execveat_common.isra.0+0x2ed/0x610 [ 797.673067][T17699] __x64_sys_execve+0x8e/0xb0 [ 797.673089][T17699] do_syscall_64+0xcd/0xf80 [ 797.673113][T17699] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 797.673129][T17699] RIP: 0033:0x7f61a898f7c9 [ 797.673142][T17699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 797.673156][T17699] RSP: 002b:00007f61a9754038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 797.673171][T17699] RAX: ffffffffffffffda RBX: 00007f61a8be6090 RCX: 00007f61a898f7c9 [ 797.673181][T17699] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000080 [ 797.673191][T17699] RBP: 00007f61a8a13f91 R08: 0000000000000000 R09: 0000000000000000 [ 797.673200][T17699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 797.673209][T17699] R13: 00007f61a8be6128 R14: 00007f61a8be6090 R15: 00007ffe557c2d48 [ 797.673230][T17699] [ 798.288928][T17705] input: jJǸ;9%vlQ J86 as /devices/virtual/input/input27 [ 799.063449][ T52] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 799.072912][ T52] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 799.082862][ T52] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 799.090704][ T52] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 799.099622][ T52] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 799.759816][T11818] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 799.971708][T11818] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 800.157310][T17748] FAULT_INJECTION: forcing a failure. [ 800.157310][T17748] name failslab, interval 1, probability 0, space 0, times 0 [ 800.201838][T11818] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 800.279656][T17748] CPU: 0 UID: 0 PID: 17748 Comm: syz.3.2421 Tainted: G L syzkaller #0 PREEMPT(full) [ 800.279683][T17748] Tainted: [L]=SOFTLOCKUP [ 800.279688][T17748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 800.279698][T17748] Call Trace: [ 800.279704][T17748] [ 800.279710][T17748] dump_stack_lvl+0x16c/0x1f0 [ 800.279738][T17748] should_fail_ex+0x512/0x640 [ 800.279756][T17748] ? __kmalloc_noprof+0xca/0x910 [ 800.279774][T17748] should_failslab+0xc2/0x120 [ 800.279797][T17748] __kmalloc_noprof+0xeb/0x910 [ 800.279813][T17748] ? lsm_blob_alloc+0x68/0x90 [ 800.279838][T17748] ? lsm_blob_alloc+0x68/0x90 [ 800.279857][T17748] lsm_blob_alloc+0x68/0x90 [ 800.279878][T17748] security_sk_alloc+0x2f/0x270 [ 800.279895][T17748] sk_prot_alloc+0x1c7/0x2a0 [ 800.279920][T17748] sk_alloc+0x36/0xe30 [ 800.279937][T17748] __netlink_create+0x5e/0x2c0 [ 800.279955][T17748] ? __wake_up+0x3f/0x60 [ 800.279977][T17748] netlink_create+0x39e/0x620 [ 800.279995][T17748] ? __pfx_genl_bind+0x10/0x10 [ 800.280016][T17748] ? __pfx_genl_unbind+0x10/0x10 [ 800.280036][T17748] ? __pfx_genl_release+0x10/0x10 [ 800.280051][T17748] __sock_create+0x339/0x8a0 [ 800.280069][T17748] __sys_socket+0x14d/0x260 [ 800.280083][T17748] ? __pfx___sys_socket+0x10/0x10 [ 800.280098][T17748] ? do_user_addr_fault+0x843/0x1370 [ 800.280120][T17748] __x64_sys_socket+0x72/0xb0 [ 800.280133][T17748] ? lockdep_hardirqs_on+0x7c/0x110 [ 800.280159][T17748] do_syscall_64+0xcd/0xf80 [ 800.280182][T17748] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 800.280198][T17748] RIP: 0033:0x7f61a89916e7 [ 800.280212][T17748] Code: f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 800.280227][T17748] RSP: 002b:00007f61a9752fa8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 800.280241][T17748] RAX: ffffffffffffffda RBX: 00007f61a8be6090 RCX: 00007f61a89916e7 [ 800.280251][T17748] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 800.280260][T17748] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 800.280269][T17748] R10: 0000200000000000 R11: 0000000000000286 R12: 0000000000000000 [ 800.280278][T17748] R13: 00007f61a8be6128 R14: 00007f61a8be6090 R15: 00007ffe557c2d48 [ 800.280297][T17748] [ 800.720727][T17759] NOTICE: Automounting of tracing to debugfs is deprecated and will be removed in 2030 [ 800.733805][T17759] netlink: 342 bytes leftover after parsing attributes in process `syz.0.2423'. [ 800.764552][T17725] chnl_net:caif_netlink_parms(): no params data found [ 800.893342][T17725] bridge0: port 1(bridge_slave_0) entered blocking state [ 800.926043][T17725] bridge0: port 1(bridge_slave_0) entered disabled state [ 800.933908][T17725] bridge_slave_0: entered allmulticast mode [ 800.951439][T17725] bridge_slave_0: entered promiscuous mode [ 800.967604][T17725] bridge0: port 2(bridge_slave_1) entered blocking state [ 800.993477][T17725] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.021276][T17725] bridge_slave_1: entered allmulticast mode [ 801.048196][T17725] bridge_slave_1: entered promiscuous mode [ 801.193340][T11818] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 801.210613][ T5840] Bluetooth: hci0: command tx timeout [ 801.286920][T17725] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 801.317733][T17725] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 801.395949][T17725] team0: Port device team_slave_0 added [ 801.453659][T17725] team0: Port device team_slave_1 added [ 801.564670][T17725] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 801.588476][T17725] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 801.664944][T17725] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 801.727716][T17725] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 801.752145][T17725] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 801.779295][T17725] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 801.855400][T11818] bridge_slave_1: left allmulticast mode [ 801.886752][T11818] bridge_slave_1: left promiscuous mode [ 801.920002][T11818] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.954090][T11818] bridge_slave_0: left allmulticast mode [ 801.982499][T11818] bridge_slave_0: left promiscuous mode [ 802.011572][T11818] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.597005][T11818] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 802.616558][T11818] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 802.639937][T11818] bond0 (unregistering): Released all slaves [ 802.891887][T17725] hsr_slave_0: entered promiscuous mode [ 802.910098][T17725] hsr_slave_1: entered promiscuous mode [ 802.928747][T17725] debugfs: 'hsr0' already exists in 'hsr' [ 802.936123][T17725] Cannot create hsr debugfs directory [ 803.092625][T17805] FAULT_INJECTION: forcing a failure. [ 803.092625][T17805] name failslab, interval 1, probability 0, space 0, times 0 [ 803.167873][T17805] CPU: 0 UID: 0 PID: 17805 Comm: syz.0.2430 Tainted: G L syzkaller #0 PREEMPT(full) [ 803.167903][T17805] Tainted: [L]=SOFTLOCKUP [ 803.167910][T17805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 803.167919][T17805] Call Trace: [ 803.167925][T17805] [ 803.167932][T17805] dump_stack_lvl+0x16c/0x1f0 [ 803.167961][T17805] should_fail_ex+0x512/0x640 [ 803.167978][T17805] ? __kmalloc_noprof+0xca/0x910 [ 803.167997][T17805] should_failslab+0xc2/0x120 [ 803.168019][T17805] __kmalloc_noprof+0xeb/0x910 [ 803.168036][T17805] ? lsm_blob_alloc+0x68/0x90 [ 803.168061][T17805] ? lsm_blob_alloc+0x68/0x90 [ 803.168081][T17805] lsm_blob_alloc+0x68/0x90 [ 803.168102][T17805] security_sk_alloc+0x2f/0x270 [ 803.168119][T17805] sk_prot_alloc+0xfb/0x2a0 [ 803.168144][T17805] sk_alloc+0x36/0xe30 [ 803.168161][T17805] unix_create1+0xa6/0x700 [ 803.168178][T17805] unix_create+0x110/0x270 [ 803.168194][T17805] __sock_create+0x339/0x8a0 [ 803.168211][T17805] __sys_socketpair+0x25c/0x5a0 [ 803.168227][T17805] ? __pfx___sys_socketpair+0x10/0x10 [ 803.168241][T17805] ? fput+0x70/0xf0 [ 803.168256][T17805] ? xfd_validate_state+0x61/0x180 [ 803.168270][T17805] ? __pfx_do_writev+0x10/0x10 [ 803.168293][T17805] __x64_sys_socketpair+0x96/0x100 [ 803.168308][T17805] ? lockdep_hardirqs_on+0x7c/0x110 [ 803.168338][T17805] do_syscall_64+0xcd/0xf80 [ 803.168365][T17805] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 803.168381][T17805] RIP: 0033:0x7fd55318f7c9 [ 803.168395][T17805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 803.168411][T17805] RSP: 002b:00007fd553f7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 803.168426][T17805] RAX: ffffffffffffffda RBX: 00007fd5533e5fa0 RCX: 00007fd55318f7c9 [ 803.168436][T17805] RDX: 8000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 803.168446][T17805] RBP: 00007fd553213f91 R08: 0000000000000000 R09: 0000000000000000 [ 803.168455][T17805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 803.168463][T17805] R13: 00007fd5533e6038 R14: 00007fd5533e5fa0 R15: 00007ffc3da61b58 [ 803.168483][T17805] [ 803.466858][ T5840] Bluetooth: hci0: command tx timeout [ 803.692038][T11818] hsr_slave_0: left promiscuous mode [ 803.711682][T11818] hsr_slave_1: left promiscuous mode [ 803.738374][T11818] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 803.764396][T11818] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 803.777865][T17817] FAULT_INJECTION: forcing a failure. [ 803.777865][T17817] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 803.792898][T11818] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 803.808896][T11818] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 803.816830][T17817] CPU: 0 UID: 0 PID: 17817 Comm: syz.1.2432 Tainted: G L syzkaller #0 PREEMPT(full) [ 803.816854][T17817] Tainted: [L]=SOFTLOCKUP [ 803.816860][T17817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 803.816869][T17817] Call Trace: [ 803.816875][T17817] [ 803.816882][T17817] dump_stack_lvl+0x16c/0x1f0 [ 803.816909][T17817] should_fail_ex+0x512/0x640 [ 803.816930][T17817] should_fail_alloc_page+0xe7/0x130 [ 803.816955][T17817] prepare_alloc_pages+0x401/0x670 [ 803.816982][T17817] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 803.817001][T17817] ? should_fail_alloc_page+0xee/0x130 [ 803.817026][T17817] ? rcu_is_watching+0x12/0xc0 [ 803.817047][T17817] ? trace_mm_page_alloc+0x11b/0x180 [ 803.817070][T17817] ? __alloc_frozen_pages_noprof+0x292/0x2430 [ 803.817087][T17817] ? kasan_save_track+0x14/0x30 [ 803.817106][T17817] ? kasan_save_free_info+0x3b/0x60 [ 803.817122][T17817] ? kfree+0x2f8/0x6e0 [ 803.817136][T17817] ? tomoyo_path_number_perm+0x470/0x580 [ 803.817153][T17817] ? security_file_ioctl+0x9b/0x240 [ 803.817170][T17817] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 803.817190][T17817] ? register_lock_class+0x41/0x4b0 [ 803.817209][T17817] ? __lock_acquire+0x436/0x2890 [ 803.817226][T17817] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 803.817259][T17817] ? policy_nodemask+0xea/0x4e0 [ 803.817284][T17817] alloc_pages_mpol+0x1fb/0x550 [ 803.817307][T17817] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 803.817335][T17817] ___kmalloc_large_node+0x10c/0x150 [ 803.817363][T17817] __kmalloc_large_node_noprof+0x1c/0x70 [ 803.817376][T17817] ? lruvec_stat_mod_folio+0x25b/0x3b0 [ 803.817396][T17817] __kmalloc_noprof.cold+0xc/0x62 [ 803.817419][T17817] ? vhost_dev_set_owner+0x191/0xa50 [ 803.817443][T17817] ? vhost_dev_set_owner+0x191/0xa50 [ 803.817463][T17817] vhost_dev_set_owner+0x191/0xa50 [ 803.817489][T17817] vhost_net_ioctl+0x87f/0x1850 [ 803.817508][T17817] ? do_vfs_ioctl+0x128/0x14f0 [ 803.817526][T17817] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 803.817544][T17817] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 803.817566][T17817] ? find_held_lock+0x2b/0x80 [ 803.817585][T17817] ? hook_file_ioctl_common+0x144/0x410 [ 803.817606][T17817] ? __fget_files+0x20e/0x3c0 [ 803.817630][T17817] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 803.817650][T17817] __x64_sys_ioctl+0x18e/0x210 [ 803.817673][T17817] do_syscall_64+0xcd/0xf80 [ 803.817698][T17817] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 803.817714][T17817] RIP: 0033:0x7fe7a7b8f7c9 [ 803.817728][T17817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 803.817743][T17817] RSP: 002b:00007fe7a8952038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 803.817758][T17817] RAX: ffffffffffffffda RBX: 00007fe7a7de6090 RCX: 00007fe7a7b8f7c9 [ 803.817768][T17817] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000007 [ 803.817778][T17817] RBP: 00007fe7a7c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 803.817788][T17817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 803.817798][T17817] R13: 00007fe7a7de6128 R14: 00007fe7a7de6090 R15: 00007ffc71652b18 [ 803.817818][T17817] [ 804.136924][T11818] veth1_macvtap: left promiscuous mode [ 804.142838][T11818] veth0_macvtap: left promiscuous mode [ 804.148499][T11818] veth1_vlan: left promiscuous mode [ 804.153786][T11818] veth0_vlan: left promiscuous mode [ 804.637043][T11818] team0 (unregistering): Port device team_slave_1 removed [ 804.686325][T11818] team0 (unregistering): Port device team_slave_0 removed syzkaller syzkaller login: [ 805.522103][ T5840] Bluetooth: hci0: command tx timeout [ 805.566916][ T30] audit: type=1800 audit(4294967571.170:71): pid=17811 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.2431" name="regulatory.db" dev="sda1" ino=448 res=0 errno=0 [ 805.588578][T17811] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -4 [ 805.638014][T17811] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -4 [ 805.683453][T17811] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 806.199046][T17725] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 806.222975][T17725] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 806.242254][T17725] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 806.269275][T17725] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 806.415775][T17854] FAULT_INJECTION: forcing a failure. [ 806.415775][T17854] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 806.458912][T17854] CPU: 0 UID: 0 PID: 17854 Comm: syz.0.2436 Tainted: G L syzkaller #0 PREEMPT(full) [ 806.458941][T17854] Tainted: [L]=SOFTLOCKUP [ 806.458946][T17854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 806.458956][T17854] Call Trace: [ 806.458962][T17854] [ 806.458969][T17854] dump_stack_lvl+0x16c/0x1f0 [ 806.458996][T17854] should_fail_ex+0x512/0x640 [ 806.459016][T17854] should_fail_alloc_page+0xe7/0x130 [ 806.459041][T17854] prepare_alloc_pages+0x401/0x670 [ 806.459068][T17854] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 806.459086][T17854] ? should_fail_alloc_page+0xee/0x130 [ 806.459111][T17854] ? rcu_is_watching+0x12/0xc0 [ 806.459131][T17854] ? trace_mm_page_alloc+0x11b/0x180 [ 806.459154][T17854] ? __alloc_frozen_pages_noprof+0x292/0x2430 [ 806.459171][T17854] ? kasan_save_track+0x14/0x30 [ 806.459190][T17854] ? kasan_save_free_info+0x3b/0x60 [ 806.459206][T17854] ? kfree+0x2f8/0x6e0 [ 806.459219][T17854] ? tomoyo_path_number_perm+0x470/0x580 [ 806.459236][T17854] ? security_file_ioctl+0x9b/0x240 [ 806.459254][T17854] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 806.459280][T17854] ? register_lock_class+0x41/0x4b0 [ 806.459302][T17854] ? __lock_acquire+0x436/0x2890 [ 806.459319][T17854] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 806.459344][T17854] ? policy_nodemask+0xea/0x4e0 [ 806.459368][T17854] alloc_pages_mpol+0x1fb/0x550 [ 806.459392][T17854] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 806.459420][T17854] ___kmalloc_large_node+0x10c/0x150 [ 806.459446][T17854] __kmalloc_large_node_noprof+0x1c/0x70 [ 806.459460][T17854] ? lruvec_stat_mod_folio+0x25b/0x3b0 [ 806.459480][T17854] __kmalloc_noprof.cold+0xc/0x62 [ 806.459502][T17854] ? vhost_dev_set_owner+0x191/0xa50 [ 806.459527][T17854] ? vhost_dev_set_owner+0x191/0xa50 [ 806.459547][T17854] vhost_dev_set_owner+0x191/0xa50 [ 806.459574][T17854] vhost_net_ioctl+0x87f/0x1850 [ 806.459593][T17854] ? do_vfs_ioctl+0x128/0x14f0 [ 806.459612][T17854] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 806.459629][T17854] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 806.459651][T17854] ? find_held_lock+0x2b/0x80 [ 806.459670][T17854] ? hook_file_ioctl_common+0x144/0x410 [ 806.459692][T17854] ? __fget_files+0x20e/0x3c0 [ 806.459716][T17854] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 806.459735][T17854] __x64_sys_ioctl+0x18e/0x210 [ 806.459754][T17854] do_syscall_64+0xcd/0xf80 [ 806.459778][T17854] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 806.459794][T17854] RIP: 0033:0x7fd55318f7c9 [ 806.459807][T17854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 806.459822][T17854] RSP: 002b:00007fd553f5e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 806.459837][T17854] RAX: ffffffffffffffda RBX: 00007fd5533e6090 RCX: 00007fd55318f7c9 [ 806.459847][T17854] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000006 [ 806.459856][T17854] RBP: 00007fd553213f91 R08: 0000000000000000 R09: 0000000000000000 [ 806.459865][T17854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 806.459874][T17854] R13: 00007fd5533e6128 R14: 00007fd5533e6090 R15: 00007ffc3da61b58 [ 806.459895][T17854] [ 807.600360][ T5840] Bluetooth: hci0: command tx timeout [ 807.620805][T17725] 8021q: adding VLAN 0 to HW filter on device bond0 [ 807.714934][T17725] 8021q: adding VLAN 0 to HW filter on device team0 [ 807.796632][ T4509] bridge0: port 1(bridge_slave_0) entered blocking state [ 807.803809][ T4509] bridge0: port 1(bridge_slave_0) entered forwarding state [ 807.968337][T17888] FAULT_INJECTION: forcing a failure. [ 807.968337][T17888] name failslab, interval 1, probability 0, space 0, times 0 [ 808.002666][ T4509] bridge0: port 2(bridge_slave_1) entered blocking state [ 808.009800][ T4509] bridge0: port 2(bridge_slave_1) entered forwarding state [ 808.038490][T17888] CPU: 0 UID: 0 PID: 17888 Comm: syz.1.2439 Tainted: G L syzkaller #0 PREEMPT(full) [ 808.038518][T17888] Tainted: [L]=SOFTLOCKUP [ 808.038524][T17888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 808.038534][T17888] Call Trace: [ 808.038539][T17888] [ 808.038546][T17888] dump_stack_lvl+0x16c/0x1f0 [ 808.038573][T17888] should_fail_ex+0x512/0x640 [ 808.038591][T17888] ? kmem_cache_alloc_noprof+0x62/0x770 [ 808.038612][T17888] should_failslab+0xc2/0x120 [ 808.038636][T17888] kmem_cache_alloc_noprof+0x83/0x770 [ 808.038654][T17888] ? vm_area_alloc+0x1f/0x160 [ 808.038677][T17888] ? vm_area_alloc+0x1f/0x160 [ 808.038691][T17888] vm_area_alloc+0x1f/0x160 [ 808.038706][T17888] create_init_stack_vma+0x7e/0x700 [ 808.038730][T17888] alloc_bprm+0x420/0x710 [ 808.038751][T17888] do_execveat_common.isra.0+0x1ce/0x610 [ 808.038776][T17888] __x64_sys_execve+0x8e/0xb0 [ 808.038796][T17888] do_syscall_64+0xcd/0xf80 [ 808.038820][T17888] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 808.038836][T17888] RIP: 0033:0x7fe7a7b8f7c9 [ 808.038849][T17888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 808.038863][T17888] RSP: 002b:00007fe7a8952038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 808.038878][T17888] RAX: ffffffffffffffda RBX: 00007fe7a7de6090 RCX: 00007fe7a7b8f7c9 [ 808.038888][T17888] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000080 [ 808.038898][T17888] RBP: 00007fe7a7c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 808.038907][T17888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 808.038916][T17888] R13: 00007fe7a7de6128 R14: 00007fe7a7de6090 R15: 00007ffc71652b18 [ 808.038942][T17888] [ 808.865521][T17906] netlink: 56 bytes leftover after parsing attributes in process `syz.0.2442'. [ 808.951911][T17725] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 809.084628][T17912] FAULT_INJECTION: forcing a failure. [ 809.084628][T17912] name failslab, interval 1, probability 0, space 0, times 0 [ 809.132646][T17725] veth0_vlan: entered promiscuous mode [ 809.188049][T17725] veth1_vlan: entered promiscuous mode [ 809.238334][T17912] CPU: 0 UID: 0 PID: 17912 Comm: syz.3.2441 Tainted: G L syzkaller #0 PREEMPT(full) [ 809.238362][T17912] Tainted: [L]=SOFTLOCKUP [ 809.238367][T17912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 809.238377][T17912] Call Trace: [ 809.238383][T17912] [ 809.238390][T17912] dump_stack_lvl+0x16c/0x1f0 [ 809.238417][T17912] should_fail_ex+0x512/0x640 [ 809.238435][T17912] ? fs_reclaim_acquire+0xae/0x150 [ 809.238461][T17912] should_failslab+0xc2/0x120 [ 809.238485][T17912] kmem_cache_alloc_noprof+0x83/0x770 [ 809.238503][T17912] ? __pfx_map_id_range_down+0x10/0x10 [ 809.238524][T17912] ? security_inode_alloc+0x3b/0x2b0 [ 809.238543][T17912] ? security_inode_alloc+0x3b/0x2b0 [ 809.238557][T17912] security_inode_alloc+0x3b/0x2b0 [ 809.238574][T17912] inode_init_always_gfp+0xced/0x1040 [ 809.238599][T17912] alloc_inode+0x86/0x240 [ 809.238616][T17912] sock_alloc+0x40/0x280 [ 809.238638][T17912] __sock_create+0xc2/0x8a0 [ 809.238654][T17912] __sys_socket+0x14d/0x260 [ 809.238668][T17912] ? __pfx___sys_socket+0x10/0x10 [ 809.238683][T17912] ? do_user_addr_fault+0x843/0x1370 [ 809.238705][T17912] __x64_sys_socket+0x72/0xb0 [ 809.238718][T17912] ? lockdep_hardirqs_on+0x7c/0x110 [ 809.238741][T17912] do_syscall_64+0xcd/0xf80 [ 809.238765][T17912] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 809.238780][T17912] RIP: 0033:0x7f61a89916e7 [ 809.238792][T17912] Code: f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 809.238815][T17912] RSP: 002b:00007f61a9752fa8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 809.238833][T17912] RAX: ffffffffffffffda RBX: 00007f61a8be6090 RCX: 00007f61a89916e7 [ 809.238843][T17912] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 809.238853][T17912] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 809.238862][T17912] R10: 0000200000000000 R11: 0000000000000286 R12: 0000000000000000 [ 809.238873][T17912] R13: 00007f61a8be6128 R14: 00007f61a8be6090 R15: 00007ffe557c2d48 [ 809.238892][T17912] [ 809.455654][T17725] veth0_macvtap: entered promiscuous mode [ 809.463984][T17725] veth1_macvtap: entered promiscuous mode [ 809.477922][T17725] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 809.487672][T17725] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 809.502937][T17912] socket: no more sockets [ 809.707841][ T1976] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 809.782890][ T1976] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 809.897989][ T1976] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 809.986141][ T1976] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 810.068273][ T6150] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 810.118433][ T6150] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 810.226071][ T6150] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 810.243761][T17923] bond0: Unable to set down delay as MII monitoring is disabled [ 810.261893][ T6150] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 810.723759][T17947] input: as /devices/virtual/input/input28 [ 811.142042][T17941] mkiss: ax0: crc mode is auto. [ 811.559905][T17962] FAULT_INJECTION: forcing a failure. [ 811.559905][T17962] name failslab, interval 1, probability 0, space 0, times 0 [ 811.707845][T17962] CPU: 0 UID: 0 PID: 17962 Comm: syz.0.2449 Tainted: G L syzkaller #0 PREEMPT(full) [ 811.707875][T17962] Tainted: [L]=SOFTLOCKUP [ 811.707881][T17962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 811.707891][T17962] Call Trace: [ 811.707897][T17962] [ 811.707903][T17962] dump_stack_lvl+0x16c/0x1f0 [ 811.707933][T17962] should_fail_ex+0x512/0x640 [ 811.707951][T17962] ? fs_reclaim_acquire+0xae/0x150 [ 811.707977][T17962] should_failslab+0xc2/0x120 [ 811.708001][T17962] kmem_cache_alloc_noprof+0x83/0x770 [ 811.708019][T17962] ? __pfx_map_id_range_down+0x10/0x10 [ 811.708040][T17962] ? security_inode_alloc+0x3b/0x2b0 [ 811.708059][T17962] ? security_inode_alloc+0x3b/0x2b0 [ 811.708074][T17962] security_inode_alloc+0x3b/0x2b0 [ 811.708091][T17962] inode_init_always_gfp+0xced/0x1040 [ 811.708116][T17962] alloc_inode+0x86/0x240 [ 811.708133][T17962] sock_alloc+0x40/0x280 [ 811.708155][T17962] __sock_create+0xc2/0x8a0 [ 811.708172][T17962] __sys_socket+0x14d/0x260 [ 811.708187][T17962] ? __pfx___sys_socket+0x10/0x10 [ 811.708203][T17962] ? do_user_addr_fault+0x843/0x1370 [ 811.708224][T17962] __x64_sys_socket+0x72/0xb0 [ 811.708238][T17962] ? lockdep_hardirqs_on+0x7c/0x110 [ 811.708260][T17962] do_syscall_64+0xcd/0xf80 [ 811.708284][T17962] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 811.708300][T17962] RIP: 0033:0x7fd5531916e7 [ 811.708313][T17962] Code: f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 811.708327][T17962] RSP: 002b:00007fd553f5cfa8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 811.708342][T17962] RAX: ffffffffffffffda RBX: 00007fd5533e6090 RCX: 00007fd5531916e7 [ 811.708353][T17962] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 811.708362][T17962] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 811.708371][T17962] R10: 0000200000000000 R11: 0000000000000286 R12: 0000000000000000 [ 811.708381][T17962] R13: 00007fd5533e6128 R14: 00007fd5533e6090 R15: 00007ffc3da61b58 [ 811.708400][T17962] [ 811.708443][T17962] socket: no more sockets [ 812.301060][T17975] FAULT_INJECTION: forcing a failure. [ 812.301060][T17975] name failslab, interval 1, probability 0, space 0, times 0 [ 812.357457][T17975] CPU: 0 UID: 0 PID: 17975 Comm: syz.3.2452 Tainted: G L syzkaller #0 PREEMPT(full) [ 812.357482][T17975] Tainted: [L]=SOFTLOCKUP [ 812.357488][T17975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 812.357497][T17975] Call Trace: [ 812.357503][T17975] [ 812.357509][T17975] dump_stack_lvl+0x16c/0x1f0 [ 812.357536][T17975] should_fail_ex+0x512/0x640 [ 812.357558][T17975] ? fs_reclaim_acquire+0xae/0x150 [ 812.357583][T17975] should_failslab+0xc2/0x120 [ 812.357605][T17975] __kmalloc_noprof+0xeb/0x910 [ 812.357621][T17975] ? tomoyo_encode2+0x100/0x3e0 [ 812.357645][T17975] ? tomoyo_encode2+0x100/0x3e0 [ 812.357663][T17975] tomoyo_encode2+0x100/0x3e0 [ 812.357685][T17975] tomoyo_encode+0x29/0x50 [ 812.357703][T17975] tomoyo_realpath_from_path+0x18f/0x6e0 [ 812.357729][T17975] tomoyo_path_number_perm+0x245/0x580 [ 812.357745][T17975] ? tomoyo_path_number_perm+0x237/0x580 [ 812.357763][T17975] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 812.357781][T17975] ? find_held_lock+0x2b/0x80 [ 812.357817][T17975] ? find_held_lock+0x2b/0x80 [ 812.357835][T17975] ? hook_file_ioctl_common+0x144/0x410 [ 812.357857][T17975] ? __fget_files+0x20e/0x3c0 [ 812.357881][T17975] security_file_ioctl+0x9b/0x240 [ 812.357901][T17975] __x64_sys_ioctl+0xb7/0x210 [ 812.357920][T17975] do_syscall_64+0xcd/0xf80 [ 812.357944][T17975] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 812.357959][T17975] RIP: 0033:0x7f61a898f7c9 [ 812.357972][T17975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 812.357987][T17975] RSP: 002b:00007f61a9775038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 812.358002][T17975] RAX: ffffffffffffffda RBX: 00007f61a8be5fa0 RCX: 00007f61a898f7c9 [ 812.358012][T17975] RDX: 0000200000000100 RSI: 0000000080084504 RDI: 0000000000000003 [ 812.358021][T17975] RBP: 00007f61a9775090 R08: 0000000000000000 R09: 0000000000000000 [ 812.358030][T17975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 812.358039][T17975] R13: 00007f61a8be6038 R14: 00007f61a8be5fa0 R15: 00007ffe557c2d48 [ 812.358058][T17975] [ 812.358076][T17975] ERROR: Out of memory at tomoyo_realpath_from_path. [ 812.864432][T17980] virtio-pci 0000:00:04.0: [Firmware Bug]: Overriding NUMA node to 0. Contact your vendor for updates. [ 813.885444][T17999] FAULT_INJECTION: forcing a failure. [ 813.885444][T17999] name failslab, interval 1, probability 0, space 0, times 0 [ 813.963801][T17999] CPU: 0 UID: 0 PID: 17999 Comm: syz.0.2458 Tainted: G I L syzkaller #0 PREEMPT(full) [ 813.963830][T17999] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 813.963836][T17999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 813.963845][T17999] Call Trace: [ 813.963851][T17999] [ 813.963857][T17999] dump_stack_lvl+0x16c/0x1f0 [ 813.963884][T17999] should_fail_ex+0x512/0x640 [ 813.963901][T17999] ? __kmalloc_noprof+0xca/0x910 [ 813.963919][T17999] should_failslab+0xc2/0x120 [ 813.963943][T17999] __kmalloc_noprof+0xeb/0x910 [ 813.963959][T17999] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xc8/0x290 [ 813.963989][T17999] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xc8/0x290 [ 813.964013][T17999] genl_family_rcv_msg_attrs_parse.constprop.0+0xc8/0x290 [ 813.964043][T17999] genl_family_rcv_msg_doit+0xbf/0x2f0 [ 813.964068][T17999] ? __pfx_genl_family_rcv_msg_doit+0x10/0x10 [ 813.964092][T17999] ? genl_get_cmd+0x194/0x580 [ 813.964118][T17999] ? bpf_lsm_capable+0x9/0x10 [ 813.964138][T17999] ? security_capable+0x7e/0x260 [ 813.964163][T17999] ? ns_capable+0xd7/0x110 [ 813.964184][T17999] genl_rcv_msg+0x55c/0x800 [ 813.964199][T17999] ? __pfx_genl_rcv_msg+0x10/0x10 [ 813.964214][T17999] ? __pfx_ovs_vport_cmd_del+0x10/0x10 [ 813.964241][T17999] netlink_rcv_skb+0x158/0x420 [ 813.964263][T17999] ? __pfx_genl_rcv_msg+0x10/0x10 [ 813.964277][T17999] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 813.964306][T17999] ? netlink_deliver_tap+0x1ae/0xd30 [ 813.964329][T17999] genl_rcv+0x28/0x40 [ 813.964350][T17999] netlink_unicast+0x5aa/0x870 [ 813.964380][T17999] ? __pfx_netlink_unicast+0x10/0x10 [ 813.964408][T17999] netlink_sendmsg+0x8c8/0xdd0 [ 813.964432][T17999] ? __pfx_netlink_sendmsg+0x10/0x10 [ 813.964455][T17999] ? aa_sock_msg_perm.constprop.0+0x100/0x1b0 [ 813.964483][T17999] ____sys_sendmsg+0xa5d/0xc30 [ 813.964508][T17999] ? copy_msghdr_from_user+0x10a/0x160 [ 813.964527][T17999] ? __pfx_____sys_sendmsg+0x10/0x10 [ 813.964558][T17999] ___sys_sendmsg+0x134/0x1d0 [ 813.964578][T17999] ? __pfx____sys_sendmsg+0x10/0x10 [ 813.964619][T17999] __sys_sendmsg+0x16d/0x220 [ 813.964639][T17999] ? __pfx___sys_sendmsg+0x10/0x10 [ 813.964669][T17999] do_syscall_64+0xcd/0xf80 [ 813.964693][T17999] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 813.964709][T17999] RIP: 0033:0x7fd55318f7c9 [ 813.964721][T17999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 813.964736][T17999] RSP: 002b:00007fd553f7f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 813.964750][T17999] RAX: ffffffffffffffda RBX: 00007fd5533e5fa0 RCX: 00007fd55318f7c9 [ 813.964760][T17999] RDX: 0000000000044000 RSI: 00002000000049c0 RDI: 0000000000000003 [ 813.964770][T17999] RBP: 00007fd553f7f090 R08: 0000000000000000 R09: 0000000000000000 [ 813.964779][T17999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 813.964788][T17999] R13: 00007fd5533e6038 R14: 00007fd5533e5fa0 R15: 00007ffc3da61b58 [ 813.964807][T17999] [ 814.383347][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 814.390612][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 814.445245][T18008] random: crng reseeded on system resumption [ 814.506718][T18009] netlink: 342 bytes leftover after parsing attributes in process `syz.1.2460'. [ 814.661609][T18003] ptrace attach of "./syz-executor exec"[5829] was attempted by ""[18003] [ 815.462730][T18025] FAULT_INJECTION: forcing a failure. [ 815.462730][T18025] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 815.547491][T18025] CPU: 0 UID: 0 PID: 18025 Comm: syz.1.2465 Tainted: G I L syzkaller #0 PREEMPT(full) [ 815.547520][T18025] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 815.547526][T18025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 815.547534][T18025] Call Trace: [ 815.547540][T18025] [ 815.547547][T18025] dump_stack_lvl+0x16c/0x1f0 [ 815.547574][T18025] should_fail_ex+0x512/0x640 [ 815.547594][T18025] should_fail_alloc_page+0xe7/0x130 [ 815.547618][T18025] prepare_alloc_pages+0x401/0x670 [ 815.547644][T18025] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 815.547663][T18025] ? find_held_lock+0x2b/0x80 [ 815.547683][T18025] ? process_measurement+0x4a6/0x22d0 [ 815.547706][T18025] ? down_write+0x14d/0x200 [ 815.547723][T18025] ? up_write+0x282/0x4e0 [ 815.547740][T18025] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 815.547757][T18025] ? __lock_acquire+0x436/0x2890 [ 815.547782][T18025] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 815.547805][T18025] ? policy_nodemask+0xea/0x4e0 [ 815.547829][T18025] alloc_pages_mpol+0x1fb/0x550 [ 815.547852][T18025] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 815.547879][T18025] alloc_pages_noprof+0x131/0x390 [ 815.547901][T18025] __pmd_alloc+0x3b/0x9c0 [ 815.547926][T18025] __handle_mm_fault+0xbeb/0x2bb0 [ 815.547947][T18025] ? __pfx___handle_mm_fault+0x10/0x10 [ 815.547973][T18025] ? find_vma+0xbf/0x140 [ 815.547992][T18025] ? __pfx_find_vma+0x10/0x10 [ 815.548014][T18025] handle_mm_fault+0x3fe/0xad0 [ 815.548033][T18025] do_user_addr_fault+0x7a6/0x1370 [ 815.548053][T18025] ? rcu_is_watching+0x12/0xc0 [ 815.548076][T18025] exc_page_fault+0x64/0xc0 [ 815.548098][T18025] asm_exc_page_fault+0x26/0x30 [ 815.548112][T18025] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 815.548131][T18025] Code: cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb c5 a4 c3 cc cc cc cc 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 [ 815.548145][T18025] RSP: 0018:ffffc90004c67ce8 EFLAGS: 00050206 [ 815.548166][T18025] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 000000000000009c [ 815.548178][T18025] RDX: ffffed100f398c53 RSI: 0000000000000000 RDI: ffff888079cc6200 [ 815.548189][T18025] RBP: 000000000000009c R08: 0000000000000001 R09: ffffed100f398c53 [ 815.548198][T18025] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000000 [ 815.548207][T18025] R13: ffff888079cc6200 R14: 0000000000000000 R15: 000000000000009c [ 815.548226][T18025] _copy_from_user+0x98/0xd0 [ 815.548243][T18025] sctp_setsockopt+0x206e/0xb8c0 [ 815.548261][T18025] ? ksys_write+0x190/0x250 [ 815.548285][T18025] ? __pfx_sctp_setsockopt+0x10/0x10 [ 815.548302][T18025] ? find_held_lock+0x2b/0x80 [ 815.548322][T18025] ? aa_sock_opt_perm+0xfd/0x1b0 [ 815.548344][T18025] ? sock_common_setsockopt+0x2e/0xf0 [ 815.548367][T18025] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 815.548391][T18025] do_sock_setsockopt+0xf3/0x1d0 [ 815.548415][T18025] __sys_setsockopt+0x120/0x1a0 [ 815.548437][T18025] __x64_sys_setsockopt+0xbd/0x160 [ 815.548453][T18025] ? do_syscall_64+0x91/0xf80 [ 815.548474][T18025] ? lockdep_hardirqs_on+0x7c/0x110 [ 815.548496][T18025] do_syscall_64+0xcd/0xf80 [ 815.548524][T18025] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 815.548542][T18025] RIP: 0033:0x7fe7a7b8f7c9 [ 815.548554][T18025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 815.548567][T18025] RSP: 002b:00007fe7a8973038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 815.548581][T18025] RAX: ffffffffffffffda RBX: 00007fe7a7de5fa0 RCX: 00007fe7a7b8f7c9 [ 815.548591][T18025] RDX: 000000000000000d RSI: 0000010000000084 RDI: 0000000000000003 [ 815.548600][T18025] RBP: 00007fe7a8973090 R08: 000000000000009c R09: 0000000000000000 [ 815.548609][T18025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 815.548617][T18025] R13: 00007fe7a7de6038 R14: 00007fe7a7de5fa0 R15: 00007ffc71652b18 [ 815.548637][T18025] [ 815.788074][T18033] FAULT_INJECTION: forcing a failure. [ 815.788074][T18033] name failslab, interval 1, probability 0, space 0, times 0 [ 815.788183][T18033] CPU: 0 UID: 0 PID: 18033 Comm: syz.1.2467 Tainted: G I L syzkaller #0 PREEMPT(full) [ 815.788209][T18033] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 815.788216][T18033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 815.788225][T18033] Call Trace: [ 815.788231][T18033] [ 815.788238][T18033] dump_stack_lvl+0x16c/0x1f0 [ 815.788264][T18033] should_fail_ex+0x512/0x640 [ 815.788282][T18033] ? kmem_cache_alloc_noprof+0x62/0x770 [ 815.788303][T18033] should_failslab+0xc2/0x120 [ 815.788328][T18033] kmem_cache_alloc_noprof+0x83/0x770 [ 815.788345][T18033] ? pidfs_register_pid+0x97/0x1f0 [ 815.788370][T18033] ? pidfs_register_pid+0x97/0x1f0 [ 815.788391][T18033] pidfs_register_pid+0x97/0x1f0 [ 815.788413][T18033] unix_socketpair+0x126/0x860 [ 815.788431][T18033] ? unix_connect_peers+0x345/0x500 [ 815.788457][T18033] ? __pfx_unix_socketpair+0x10/0x10 [ 815.788474][T18033] ? __sock_create+0xa3/0x8a0 [ 815.788492][T18033] __sys_socketpair+0x2f2/0x5a0 [ 815.788509][T18033] ? __pfx___sys_socketpair+0x10/0x10 [ 815.788523][T18033] ? fput+0x70/0xf0 [ 815.788539][T18033] ? xfd_validate_state+0x61/0x180 [ 815.788553][T18033] ? __pfx_do_writev+0x10/0x10 [ 815.788575][T18033] __x64_sys_socketpair+0x96/0x100 [ 815.788590][T18033] ? lockdep_hardirqs_on+0x7c/0x110 [ 815.788615][T18033] do_syscall_64+0xcd/0xf80 [ 815.788639][T18033] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 815.788655][T18033] RIP: 0033:0x7fe7a7b8f7c9 [ 815.788667][T18033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 815.788682][T18033] RSP: 002b:00007fe7a8952038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 815.788697][T18033] RAX: ffffffffffffffda RBX: 00007fe7a7de6090 RCX: 00007fe7a7b8f7c9 [ 815.788707][T18033] RDX: 8000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 815.788717][T18033] RBP: 00007fe7a7c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 815.788725][T18033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 815.788734][T18033] R13: 00007fe7a7de6128 R14: 00007fe7a7de6090 R15: 00007ffc71652b18 [ 815.788754][T18033] [ 816.841048][T18045] FAULT_INJECTION: forcing a failure. [ 816.841048][T18045] name failslab, interval 1, probability 0, space 0, times 0 [ 816.841077][T18045] CPU: 0 UID: 0 PID: 18045 Comm: syz.1.2470 Tainted: G I L syzkaller #0 PREEMPT(full) [ 816.841110][T18045] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 816.841116][T18045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 816.841126][T18045] Call Trace: [ 816.841132][T18045] [ 816.841138][T18045] dump_stack_lvl+0x16c/0x1f0 [ 816.841165][T18045] should_fail_ex+0x512/0x640 [ 816.841182][T18045] ? kmem_cache_alloc_noprof+0x62/0x770 [ 816.841203][T18045] should_failslab+0xc2/0x120 [ 816.841225][T18045] kmem_cache_alloc_noprof+0x83/0x770 [ 816.841244][T18045] ? pidfs_register_pid+0x97/0x1f0 [ 816.841268][T18045] ? pidfs_register_pid+0x97/0x1f0 [ 816.841289][T18045] pidfs_register_pid+0x97/0x1f0 [ 816.841310][T18045] unix_socketpair+0x126/0x860 [ 816.841327][T18045] ? unix_connect_peers+0x345/0x500 [ 816.841342][T18045] ? __pfx_unix_socketpair+0x10/0x10 [ 816.841358][T18045] ? __sock_create+0xa3/0x8a0 [ 816.841376][T18045] __sys_socketpair+0x2f2/0x5a0 [ 816.841392][T18045] ? __pfx___sys_socketpair+0x10/0x10 [ 816.841406][T18045] ? fput+0x70/0xf0 [ 816.841422][T18045] ? xfd_validate_state+0x61/0x180 [ 816.841435][T18045] ? __pfx_do_writev+0x10/0x10 [ 816.841457][T18045] __x64_sys_socketpair+0x96/0x100 [ 816.841472][T18045] ? lockdep_hardirqs_on+0x7c/0x110 [ 816.841494][T18045] do_syscall_64+0xcd/0xf80 [ 816.841517][T18045] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 816.841533][T18045] RIP: 0033:0x7fe7a7b8f7c9 [ 816.841546][T18045] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 816.841561][T18045] RSP: 002b:00007fe7a8952038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 816.841576][T18045] RAX: ffffffffffffffda RBX: 00007fe7a7de6090 RCX: 00007fe7a7b8f7c9 [ 816.841586][T18045] RDX: 8000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 816.841595][T18045] RBP: 00007fe7a7c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 816.841604][T18045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 816.841613][T18045] R13: 00007fe7a7de6128 R14: 00007fe7a7de6090 R15: 00007ffc71652b18 [ 816.841633][T18045] [ 816.868065][ T5840] Bluetooth: hci1: unexpected event 0x23 length: 127 > 13 [ 816.970852][T18050] netlink: 342 bytes leftover after parsing attributes in process `syz.3.2471'. [ 818.010788][T18058] FAULT_INJECTION: forcing a failure. [ 818.010788][T18058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 818.010869][T18058] CPU: 0 UID: 0 PID: 18058 Comm: syz.3.2473 Tainted: G I L syzkaller #0 PREEMPT(full) [ 818.010894][T18058] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 818.010901][T18058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 818.010911][T18058] Call Trace: [ 818.010917][T18058] [ 818.010924][T18058] dump_stack_lvl+0x16c/0x1f0 [ 818.010951][T18058] should_fail_ex+0x512/0x640 [ 818.010972][T18058] should_fail_alloc_page+0xe7/0x130 [ 818.011008][T18058] prepare_alloc_pages+0x401/0x670 [ 818.011036][T18058] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 818.011058][T18058] ? find_held_lock+0x2b/0x80 [ 818.011078][T18058] ? is_bpf_text_address+0x8a/0x1a0 [ 818.011098][T18058] ? bpf_ksym_find+0x124/0x1c0 [ 818.011114][T18058] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 818.011138][T18058] ? is_bpf_text_address+0x94/0x1a0 [ 818.011157][T18058] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 818.011176][T18058] ? __kernel_text_address+0xd/0x40 [ 818.011192][T18058] ? unwind_get_return_address+0x59/0xa0 [ 818.011213][T18058] ? arch_stack_walk+0xa6/0x100 [ 818.011238][T18058] ? stack_trace_save+0x8e/0xc0 [ 818.011259][T18058] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 818.011283][T18058] ? policy_nodemask+0xea/0x4e0 [ 818.011307][T18058] alloc_pages_mpol+0x1fb/0x550 [ 818.011330][T18058] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 818.011357][T18058] alloc_pages_noprof+0x131/0x390 [ 818.011379][T18058] __pud_alloc+0x3b/0x760 [ 818.011403][T18058] __handle_mm_fault+0x1405/0x2bb0 [ 818.011421][T18058] ? mt_find+0x3e2/0xa20 [ 818.011437][T18058] ? __pfx___handle_mm_fault+0x10/0x10 [ 818.011469][T18058] handle_mm_fault+0x3fe/0xad0 [ 818.011489][T18058] __get_user_pages+0x54e/0x3590 [ 818.011519][T18058] ? __pfx___get_user_pages+0x10/0x10 [ 818.011546][T18058] get_user_pages_remote+0x243/0xab0 [ 818.011572][T18058] ? __pfx_get_user_pages_remote+0x10/0x10 [ 818.011601][T18058] get_arg_page+0xf4/0x310 [ 818.011621][T18058] ? __pfx_get_arg_page+0x10/0x10 [ 818.011645][T18058] copy_string_kernel+0x182/0x520 [ 818.011669][T18058] do_execveat_common.isra.0+0x2ed/0x610 [ 818.011693][T18058] __x64_sys_execve+0x8e/0xb0 [ 818.011714][T18058] do_syscall_64+0xcd/0xf80 [ 818.011738][T18058] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 818.011754][T18058] RIP: 0033:0x7f61a898f7c9 [ 818.011767][T18058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 818.011783][T18058] RSP: 002b:00007f61a9754038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 818.011797][T18058] RAX: ffffffffffffffda RBX: 00007f61a8be6090 RCX: 00007f61a898f7c9 [ 818.011808][T18058] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000080 [ 818.011817][T18058] RBP: 00007f61a8a13f91 R08: 0000000000000000 R09: 0000000000000000 [ 818.011827][T18058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 818.011837][T18058] R13: 00007f61a8be6128 R14: 00007f61a8be6090 R15: 00007ffe557c2d48 [ 818.011857][T18058] [ 818.794362][T18072] futex_wake_op: syz.3.2476 tries to shift op by -2048; fix this program [ 818.794502][T18072] futex_wake_op: syz.3.2476 tries to shift op by -2048; fix this program [ 818.795416][T18072] 0x000000000001-0x000000020000 : "" [ 818.798484][T18071] FAULT_INJECTION: forcing a failure. [ 818.798484][T18071] name failslab, interval 1, probability 0, space 0, times 0 [ 818.798510][T18071] CPU: 0 UID: 0 PID: 18071 Comm: syz.2.2477 Tainted: G I L syzkaller #0 PREEMPT(full) [ 818.798534][T18071] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 818.798541][T18071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 818.798550][T18071] Call Trace: [ 818.798555][T18071] [ 818.798561][T18071] dump_stack_lvl+0x16c/0x1f0 [ 818.798588][T18071] should_fail_ex+0x512/0x640 [ 818.798607][T18071] ? __kmalloc_noprof+0xca/0x910 [ 818.798625][T18071] should_failslab+0xc2/0x120 [ 818.798648][T18071] __kmalloc_noprof+0xeb/0x910 [ 818.798664][T18071] ? lsm_blob_alloc+0x68/0x90 [ 818.798689][T18071] ? lsm_blob_alloc+0x68/0x90 [ 818.798709][T18071] lsm_blob_alloc+0x68/0x90 [ 818.798730][T18071] security_sk_alloc+0x2f/0x270 [ 818.798746][T18071] sk_prot_alloc+0xfb/0x2a0 [ 818.798770][T18071] sk_alloc+0x36/0xe30 [ 818.798788][T18071] unix_create1+0xa6/0x700 [ 818.798804][T18071] unix_create+0x110/0x270 [ 818.798818][T18071] __sock_create+0x339/0x8a0 [ 818.798835][T18071] __sys_socketpair+0x25c/0x5a0 [ 818.798851][T18071] ? __pfx___sys_socketpair+0x10/0x10 [ 818.798865][T18071] ? fput+0x70/0xf0 [ 818.798881][T18071] ? xfd_validate_state+0x61/0x180 [ 818.798895][T18071] ? __pfx_do_writev+0x10/0x10 [ 818.798917][T18071] __x64_sys_socketpair+0x96/0x100 [ 818.798932][T18071] ? lockdep_hardirqs_on+0x7c/0x110 [ 818.798954][T18071] do_syscall_64+0xcd/0xf80 [ 818.798988][T18071] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 818.799004][T18071] RIP: 0033:0x7f262678f7c9 [ 818.799017][T18071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 818.799031][T18071] RSP: 002b:00007f2627650038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 818.799046][T18071] RAX: ffffffffffffffda RBX: 00007f26269e6090 RCX: 00007f262678f7c9 [ 818.799056][T18071] RDX: 8000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 818.799064][T18071] RBP: 00007f2626813f91 R08: 0000000000000000 R09: 0000000000000000 [ 818.799073][T18071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 818.799082][T18071] R13: 00007f26269e6128 R14: 00007f26269e6090 R15: 00007fff24127cd8 [ 818.799101][T18071] [ 818.823222][T18072] ftl_cs: FTL header corrupt! [ 819.735176][T18087] NOTICE: Automounting of tracing to debugfs is deprecated and will be removed in 2030 [ 819.741403][T18087] netlink: 342 bytes leftover after parsing attributes in process `syz.2.2480'. [ 821.323654][T18104] ptrace attach of "./syz-executor exec"[17725] was attempted by ""[18104] [ 821.718485][T18117] FAULT_INJECTION: forcing a failure. [ 821.718485][T18117] name failslab, interval 1, probability 0, space 0, times 0 [ 821.801712][T18117] CPU: 0 UID: 0 PID: 18117 Comm: syz.3.2488 Tainted: G I L syzkaller #0 PREEMPT(full) [ 821.801741][T18117] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 821.801748][T18117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 821.801758][T18117] Call Trace: [ 821.801763][T18117] [ 821.801770][T18117] dump_stack_lvl+0x16c/0x1f0 [ 821.801797][T18117] should_fail_ex+0x512/0x640 [ 821.801815][T18117] ? __kmalloc_noprof+0xca/0x910 [ 821.801834][T18117] should_failslab+0xc2/0x120 [ 821.801857][T18117] __kmalloc_noprof+0xeb/0x910 [ 821.801873][T18117] ? lsm_blob_alloc+0x68/0x90 [ 821.801898][T18117] ? lsm_blob_alloc+0x68/0x90 [ 821.801918][T18117] lsm_blob_alloc+0x68/0x90 [ 821.801939][T18117] security_sk_alloc+0x2f/0x270 [ 821.801956][T18117] sk_prot_alloc+0xfb/0x2a0 [ 821.801980][T18117] sk_alloc+0x36/0xe30 [ 821.801998][T18117] unix_create1+0xa6/0x700 [ 821.802014][T18117] unix_create+0x110/0x270 [ 821.802030][T18117] __sock_create+0x339/0x8a0 [ 821.802046][T18117] __sys_socketpair+0x25c/0x5a0 [ 821.802063][T18117] ? __pfx___sys_socketpair+0x10/0x10 [ 821.802077][T18117] ? fput+0x70/0xf0 [ 821.802093][T18117] ? xfd_validate_state+0x61/0x180 [ 821.802106][T18117] ? __pfx_do_writev+0x10/0x10 [ 821.802128][T18117] __x64_sys_socketpair+0x96/0x100 [ 821.802143][T18117] ? lockdep_hardirqs_on+0x7c/0x110 [ 821.802165][T18117] do_syscall_64+0xcd/0xf80 [ 821.802188][T18117] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 821.802203][T18117] RIP: 0033:0x7f61a898f7c9 [ 821.802215][T18117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 821.802230][T18117] RSP: 002b:00007f61a9754038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 821.802244][T18117] RAX: ffffffffffffffda RBX: 00007f61a8be6090 RCX: 00007f61a898f7c9 [ 821.802254][T18117] RDX: 8000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 821.802263][T18117] RBP: 00007f61a8a13f91 R08: 0000000000000000 R09: 0000000000000000 [ 821.802272][T18117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 821.802281][T18117] R13: 00007f61a8be6128 R14: 00007f61a8be6090 R15: 00007ffe557c2d48 [ 821.802300][T18117] [ 823.620270][T18150] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 823.629654][T18150] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 823.642297][T18150] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 823.649890][T18150] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 823.659374][T18150] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 824.468782][ T753] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 824.670906][T18162] FAULT_INJECTION: forcing a failure. [ 824.670906][T18162] name failslab, interval 1, probability 0, space 0, times 0 [ 824.712663][ T753] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 824.759749][T18149] chnl_net:caif_netlink_parms(): no params data found [ 824.786189][T18162] CPU: 0 UID: 0 PID: 18162 Comm: syz.1.2499 Tainted: G I L syzkaller #0 PREEMPT(full) [ 824.786236][T18162] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 824.786243][T18162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 824.786253][T18162] Call Trace: [ 824.786259][T18162] [ 824.786266][T18162] dump_stack_lvl+0x16c/0x1f0 [ 824.786298][T18162] should_fail_ex+0x512/0x640 [ 824.786316][T18162] ? __kmalloc_noprof+0xca/0x910 [ 824.786334][T18162] should_failslab+0xc2/0x120 [ 824.786364][T18162] __kmalloc_noprof+0xeb/0x910 [ 824.786381][T18162] ? lsm_blob_alloc+0x68/0x90 [ 824.786406][T18162] ? lsm_blob_alloc+0x68/0x90 [ 824.786426][T18162] lsm_blob_alloc+0x68/0x90 [ 824.786447][T18162] security_sk_alloc+0x2f/0x270 [ 824.786464][T18162] sk_prot_alloc+0xfb/0x2a0 [ 824.786488][T18162] sk_alloc+0x36/0xe30 [ 824.786506][T18162] unix_create1+0xa6/0x700 [ 824.786523][T18162] unix_create+0x110/0x270 [ 824.786538][T18162] __sock_create+0x339/0x8a0 [ 824.786555][T18162] __sys_socketpair+0x25c/0x5a0 [ 824.786571][T18162] ? __pfx___sys_socketpair+0x10/0x10 [ 824.786585][T18162] ? fput+0x70/0xf0 [ 824.786600][T18162] ? xfd_validate_state+0x61/0x180 [ 824.786614][T18162] ? __pfx_do_writev+0x10/0x10 [ 824.786637][T18162] __x64_sys_socketpair+0x96/0x100 [ 824.786652][T18162] ? lockdep_hardirqs_on+0x7c/0x110 [ 824.786674][T18162] do_syscall_64+0xcd/0xf80 [ 824.786697][T18162] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 824.786712][T18162] RIP: 0033:0x7fe7a7b8f7c9 [ 824.786726][T18162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 824.786740][T18162] RSP: 002b:00007fe7a8952038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 824.786755][T18162] RAX: ffffffffffffffda RBX: 00007fe7a7de6090 RCX: 00007fe7a7b8f7c9 [ 824.786765][T18162] RDX: 8000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 824.786774][T18162] RBP: 00007fe7a7c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 824.786784][T18162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 824.786793][T18162] R13: 00007fe7a7de6128 R14: 00007fe7a7de6090 R15: 00007ffc71652b18 [ 824.786812][T18162] [ 825.241538][T18165] FAULT_INJECTION: forcing a failure. [ 825.241538][T18165] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 825.280137][T18165] CPU: 0 UID: 0 PID: 18165 Comm: syz.2.2500 Tainted: G I L syzkaller #0 PREEMPT(full) [ 825.280167][T18165] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 825.280174][T18165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 825.280183][T18165] Call Trace: [ 825.280189][T18165] [ 825.280196][T18165] dump_stack_lvl+0x16c/0x1f0 [ 825.280224][T18165] should_fail_ex+0x512/0x640 [ 825.280246][T18165] should_fail_alloc_page+0xe7/0x130 [ 825.280271][T18165] prepare_alloc_pages+0x401/0x670 [ 825.280298][T18165] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 825.280317][T18165] ? should_fail_alloc_page+0xee/0x130 [ 825.280342][T18165] ? rcu_is_watching+0x12/0xc0 [ 825.280363][T18165] ? trace_mm_page_alloc+0x11b/0x180 [ 825.280385][T18165] ? __alloc_frozen_pages_noprof+0x292/0x2430 [ 825.280404][T18165] ? kfree+0x2f8/0x6e0 [ 825.280418][T18165] ? tomoyo_path_number_perm+0x470/0x580 [ 825.280435][T18165] ? security_file_ioctl+0x9b/0x240 [ 825.280453][T18165] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 825.280472][T18165] ? kasan_save_stack+0x42/0x60 [ 825.280491][T18165] ? kasan_save_stack+0x33/0x60 [ 825.280509][T18165] ? kasan_save_track+0x14/0x30 [ 825.280527][T18165] ? __kasan_kmalloc+0xaa/0xb0 [ 825.280545][T18165] ? __kmalloc_noprof+0x33d/0x910 [ 825.280560][T18165] ? vhost_dev_set_owner+0x287/0xa50 [ 825.280581][T18165] ? vhost_net_ioctl+0x87f/0x1850 [ 825.280611][T18165] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 825.280637][T18165] ? policy_nodemask+0xea/0x4e0 [ 825.280661][T18165] alloc_pages_mpol+0x1fb/0x550 [ 825.280685][T18165] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 825.280713][T18165] ___kmalloc_large_node+0x10c/0x150 [ 825.280739][T18165] __kmalloc_large_node_noprof+0x1c/0x70 [ 825.280753][T18165] ? lruvec_stat_mod_folio+0x25b/0x3b0 [ 825.280774][T18165] __kmalloc_noprof.cold+0xc/0x62 [ 825.280796][T18165] ? vhost_dev_set_owner+0x191/0xa50 [ 825.280820][T18165] ? vhost_dev_set_owner+0x191/0xa50 [ 825.280839][T18165] vhost_dev_set_owner+0x191/0xa50 [ 825.280866][T18165] vhost_net_ioctl+0x87f/0x1850 [ 825.280883][T18165] ? do_vfs_ioctl+0x128/0x14f0 [ 825.280902][T18165] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 825.280920][T18165] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 825.280942][T18165] ? find_held_lock+0x2b/0x80 [ 825.280961][T18165] ? hook_file_ioctl_common+0x144/0x410 [ 825.280984][T18165] ? __fget_files+0x20e/0x3c0 [ 825.281007][T18165] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 825.281026][T18165] __x64_sys_ioctl+0x18e/0x210 [ 825.281046][T18165] do_syscall_64+0xcd/0xf80 [ 825.281070][T18165] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 825.281085][T18165] RIP: 0033:0x7f262678f7c9 [ 825.281099][T18165] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 825.281114][T18165] RSP: 002b:00007f2627650038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 825.281129][T18165] RAX: ffffffffffffffda RBX: 00007f26269e6090 RCX: 00007f262678f7c9 [ 825.281140][T18165] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000006 [ 825.281149][T18165] RBP: 00007f2626813f91 R08: 0000000000000000 R09: 0000000000000000 [ 825.281158][T18165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 825.281167][T18165] R13: 00007f26269e6128 R14: 00007f26269e6090 R15: 00007fff24127cd8 [ 825.281188][T18165] [ 825.760398][T18150] Bluetooth: hci3: command tx timeout [ 826.039880][T18167] zswap: compressor not available [ 826.223662][ T753] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 826.375352][ T753] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 826.712625][T18149] bridge0: port 1(bridge_slave_0) entered blocking state [ 826.734107][T18149] bridge0: port 1(bridge_slave_0) entered disabled state [ 826.749576][T18149] bridge_slave_0: entered allmulticast mode [ 826.767651][T18149] bridge_slave_0: entered promiscuous mode [ 826.837993][ T753] netdevsim netdevsim1336 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 826.904127][T18149] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.929947][T18149] bridge0: port 2(bridge_slave_1) entered disabled state [ 826.972880][T18149] bridge_slave_1: entered allmulticast mode [ 826.989537][T18149] bridge_slave_1: entered promiscuous mode [ 827.082155][T18193] input: jJǸ-9%vJ86 as /devices/virtual/input/input29 [ 827.238226][T18149] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 827.306439][T18149] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 827.377059][ T753] bridge_slave_1: left allmulticast mode [ 827.414083][ T753] bridge_slave_1: left promiscuous mode [ 827.447220][ T753] bridge0: port 2(bridge_slave_1) entered disabled state [ 827.524107][ T753] bridge_slave_0: left allmulticast mode [ 827.570253][ T753] bridge_slave_0: left promiscuous mode [ 827.586972][ T753] bridge0: port 1(bridge_slave_0) entered disabled state [ 827.840545][T18150] Bluetooth: hci3: command tx timeout [ 828.382647][ T753] erspan0 (unregistering): left allmulticast mode [ 828.662516][ T753] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 828.673352][T18225] FAULT_INJECTION: forcing a failure. [ 828.673352][T18225] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 828.689895][ T753] bond0 (unregistering): Released all slaves [ 828.821253][T18149] team0: Port device team_slave_0 added [ 828.842158][T18225] CPU: 0 UID: 0 PID: 18225 Comm: syz.0.2508 Tainted: G I L syzkaller #0 PREEMPT(full) [ 828.842187][T18225] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 828.842194][T18225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 828.842205][T18225] Call Trace: [ 828.842210][T18225] [ 828.842217][T18225] dump_stack_lvl+0x16c/0x1f0 [ 828.842245][T18225] should_fail_ex+0x512/0x640 [ 828.842267][T18225] should_fail_alloc_page+0xe7/0x130 [ 828.842291][T18225] prepare_alloc_pages+0x401/0x670 [ 828.842318][T18225] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 828.842340][T18225] ? find_held_lock+0x2b/0x80 [ 828.842360][T18225] ? is_bpf_text_address+0x8a/0x1a0 [ 828.842380][T18225] ? bpf_ksym_find+0x124/0x1c0 [ 828.842396][T18225] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 828.842420][T18225] ? is_bpf_text_address+0x94/0x1a0 [ 828.842439][T18225] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 828.842457][T18225] ? __kernel_text_address+0xd/0x40 [ 828.842474][T18225] ? unwind_get_return_address+0x59/0xa0 [ 828.842494][T18225] ? arch_stack_walk+0xa6/0x100 [ 828.842519][T18225] ? stack_trace_save+0x8e/0xc0 [ 828.842540][T18225] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 828.842564][T18225] ? policy_nodemask+0xea/0x4e0 [ 828.842588][T18225] alloc_pages_mpol+0x1fb/0x550 [ 828.842611][T18225] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 828.842638][T18225] alloc_pages_noprof+0x131/0x390 [ 828.842661][T18225] __pud_alloc+0x3b/0x760 [ 828.842685][T18225] __handle_mm_fault+0x1405/0x2bb0 [ 828.842702][T18225] ? mt_find+0x3e2/0xa20 [ 828.842719][T18225] ? __pfx___handle_mm_fault+0x10/0x10 [ 828.842750][T18225] handle_mm_fault+0x3fe/0xad0 [ 828.842769][T18225] __get_user_pages+0x54e/0x3590 [ 828.842799][T18225] ? __pfx___get_user_pages+0x10/0x10 [ 828.842826][T18225] get_user_pages_remote+0x243/0xab0 [ 828.842852][T18225] ? __pfx_get_user_pages_remote+0x10/0x10 [ 828.842882][T18225] get_arg_page+0xf4/0x310 [ 828.842901][T18225] ? __pfx_get_arg_page+0x10/0x10 [ 828.842925][T18225] copy_string_kernel+0x182/0x520 [ 828.842948][T18225] do_execveat_common.isra.0+0x2ed/0x610 [ 828.842973][T18225] __x64_sys_execve+0x8e/0xb0 [ 828.843001][T18225] do_syscall_64+0xcd/0xf80 [ 828.843026][T18225] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 828.843043][T18225] RIP: 0033:0x7fd55318f7c9 [ 828.843057][T18225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 828.843072][T18225] RSP: 002b:00007fd553f5e038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 828.843087][T18225] RAX: ffffffffffffffda RBX: 00007fd5533e6090 RCX: 00007fd55318f7c9 [ 828.843098][T18225] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000080 [ 828.843107][T18225] RBP: 00007fd553213f91 R08: 0000000000000000 R09: 0000000000000000 [ 828.843117][T18225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 828.843126][T18225] R13: 00007fd5533e6128 R14: 00007fd5533e6090 R15: 00007ffc3da61b58 [ 828.843147][T18225] [ 829.176675][T18149] team0: Port device team_slave_1 added [ 829.199408][T18149] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 829.206478][T18149] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 829.232624][T18149] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 829.244486][T18149] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 829.251502][T18149] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 829.277488][T18149] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 829.314248][T18149] hsr_slave_0: entered promiscuous mode [ 829.320523][T18149] hsr_slave_1: entered promiscuous mode [ 829.364118][T18149] debugfs: 'hsr0' already exists in 'hsr' [ 829.369858][T18149] Cannot create hsr debugfs directory [ 829.921159][T18150] Bluetooth: hci3: command tx timeout [ 831.086041][ T753] hsr_slave_0: left promiscuous mode [ 831.117004][ T753] hsr_slave_1: left promiscuous mode [ 831.205027][ T753] veth1_macvtap: left promiscuous mode [ 831.220896][ T753] veth0_macvtap: left promiscuous mode [ 831.243323][ T753] veth1_vlan: left promiscuous mode [ 831.268910][ T753] veth0_vlan: left promiscuous mode [ 831.695438][ T30] audit: type=1800 audit(4294967597.300:72): pid=18270 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.2.2513" name="lu_gp_id" dev="configfs" ino=79246 res=0 errno=0 [ 832.000362][T18150] Bluetooth: hci3: command tx timeout [ 832.221262][ T753] team0 (unregistering): Port device team_slave_1 removed [ 832.293346][ T753] team0 (unregistering): Port device team_slave_0 removed [ 833.144190][T18150] Bluetooth: hci4: unexpected event 0x23 length: 127 > 13 [ 833.163362][T18274] netlink: 342 bytes leftover after parsing attributes in process `syz.2.2515'. [ 833.212819][T18149] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 833.301527][T18149] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 833.335040][T18275] netlink: 342 bytes leftover after parsing attributes in process `syz.1.2514'. [ 833.351206][T18149] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 833.391938][T18149] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 833.517908][T18284] FAULT_INJECTION: forcing a failure. [ 833.517908][T18284] name failslab, interval 1, probability 0, space 0, times 0 [ 833.624339][T18284] CPU: 0 UID: 0 PID: 18284 Comm: syz.2.2516 Tainted: G I L syzkaller #0 PREEMPT(full) [ 833.624368][T18284] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 833.624375][T18284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 833.624385][T18284] Call Trace: [ 833.624391][T18284] [ 833.624397][T18284] dump_stack_lvl+0x16c/0x1f0 [ 833.624441][T18284] should_fail_ex+0x512/0x640 [ 833.624458][T18284] ? __kmalloc_noprof+0xca/0x910 [ 833.624477][T18284] should_failslab+0xc2/0x120 [ 833.624501][T18284] __kmalloc_noprof+0xeb/0x910 [ 833.624517][T18284] ? lsm_blob_alloc+0x68/0x90 [ 833.624542][T18284] ? lsm_blob_alloc+0x68/0x90 [ 833.624567][T18284] lsm_blob_alloc+0x68/0x90 [ 833.624589][T18284] security_sk_alloc+0x2f/0x270 [ 833.624606][T18284] sk_prot_alloc+0xfb/0x2a0 [ 833.624631][T18284] sk_alloc+0x36/0xe30 [ 833.624649][T18284] unix_create1+0xa6/0x700 [ 833.624666][T18284] unix_create+0x110/0x270 [ 833.624681][T18284] __sock_create+0x339/0x8a0 [ 833.624698][T18284] __sys_socketpair+0x25c/0x5a0 [ 833.624714][T18284] ? __pfx___sys_socketpair+0x10/0x10 [ 833.624728][T18284] ? fput+0x70/0xf0 [ 833.624743][T18284] ? xfd_validate_state+0x61/0x180 [ 833.624757][T18284] ? __pfx_do_writev+0x10/0x10 [ 833.624779][T18284] __x64_sys_socketpair+0x96/0x100 [ 833.624794][T18284] ? lockdep_hardirqs_on+0x7c/0x110 [ 833.624816][T18284] do_syscall_64+0xcd/0xf80 [ 833.624839][T18284] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 833.624854][T18284] RIP: 0033:0x7f262678f7c9 [ 833.624867][T18284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 833.624881][T18284] RSP: 002b:00007f2627650038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 833.624896][T18284] RAX: ffffffffffffffda RBX: 00007f26269e6090 RCX: 00007f262678f7c9 [ 833.624906][T18284] RDX: 8000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 833.624916][T18284] RBP: 00007f2626813f91 R08: 0000000000000000 R09: 0000000000000000 [ 833.624925][T18284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 833.624933][T18284] R13: 00007f26269e6128 R14: 00007f26269e6090 R15: 00007fff24127cd8 [ 833.624953][T18284] [ 834.396546][T18149] 8021q: adding VLAN 0 to HW filter on device bond0 [ 834.470908][T18149] 8021q: adding VLAN 0 to HW filter on device team0 [ 834.498300][T18308] netlink: 56 bytes leftover after parsing attributes in process `syz.1.2520'. [ 834.516131][ T4382] bridge0: port 1(bridge_slave_0) entered blocking state [ 834.523282][ T4382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 834.561674][ T4382] bridge0: port 2(bridge_slave_1) entered blocking state [ 834.568830][ T4382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 834.737661][T18149] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 834.783211][T18314] random: crng reseeded on system resumption [ 835.089982][T18321] ptrace attach of "./syz-executor exec"[16849] was attempted by ""[18321] [ 835.309138][T18149] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 835.491037][T18149] veth0_vlan: entered promiscuous mode [ 835.559620][T18149] veth1_vlan: entered promiscuous mode [ 835.653170][T18149] veth0_macvtap: entered promiscuous mode [ 835.678222][T18149] veth1_macvtap: entered promiscuous mode [ 835.731573][T18149] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 835.767095][T18149] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 835.801863][T18335] Invalid ELF header magic: != ELF [ 835.803609][ T6130] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 835.804332][ T6130] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 835.804359][ T6130] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 835.804390][ T6130] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 836.068425][T18332] zswap: compressor not available [ 836.175662][ T6130] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 836.175681][ T6130] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 836.298827][ T6130] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 836.298846][ T6130] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 836.345261][T18347] FAULT_INJECTION: forcing a failure. [ 836.345261][T18347] name failslab, interval 1, probability 0, space 0, times 0 [ 836.345293][T18347] CPU: 0 UID: 0 PID: 18347 Comm: syz.2.2523 Tainted: G I L syzkaller #0 PREEMPT(full) [ 836.345317][T18347] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 836.345324][T18347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 836.345333][T18347] Call Trace: [ 836.345339][T18347] [ 836.345346][T18347] dump_stack_lvl+0x16c/0x1f0 [ 836.345373][T18347] should_fail_ex+0x512/0x640 [ 836.345391][T18347] ? __kmalloc_noprof+0xca/0x910 [ 836.345410][T18347] should_failslab+0xc2/0x120 [ 836.345435][T18347] __kmalloc_noprof+0xeb/0x910 [ 836.345453][T18347] ? lsm_blob_alloc+0x68/0x90 [ 836.345478][T18347] ? lsm_blob_alloc+0x68/0x90 [ 836.345497][T18347] lsm_blob_alloc+0x68/0x90 [ 836.345519][T18347] security_sk_alloc+0x2f/0x270 [ 836.345535][T18347] sk_prot_alloc+0xfb/0x2a0 [ 836.345559][T18347] sk_alloc+0x36/0xe30 [ 836.345586][T18347] unix_create1+0xa6/0x700 [ 836.345604][T18347] unix_create+0x110/0x270 [ 836.345619][T18347] __sock_create+0x339/0x8a0 [ 836.345636][T18347] __sys_socketpair+0x25c/0x5a0 [ 836.345653][T18347] ? __pfx___sys_socketpair+0x10/0x10 [ 836.345668][T18347] ? fput+0x70/0xf0 [ 836.345683][T18347] ? xfd_validate_state+0x61/0x180 [ 836.345697][T18347] ? __pfx_do_writev+0x10/0x10 [ 836.345720][T18347] __x64_sys_socketpair+0x96/0x100 [ 836.345734][T18347] ? lockdep_hardirqs_on+0x7c/0x110 [ 836.345757][T18347] do_syscall_64+0xcd/0xf80 [ 836.345780][T18347] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 836.345795][T18347] RIP: 0033:0x7f262678f7c9 [ 836.345808][T18347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 836.345823][T18347] RSP: 002b:00007f2627650038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 836.345837][T18347] RAX: ffffffffffffffda RBX: 00007f26269e6090 RCX: 00007f262678f7c9 [ 836.345847][T18347] RDX: 8000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 836.345856][T18347] RBP: 00007f2626813f91 R08: 0000000000000000 R09: 0000000000000000 [ 836.345866][T18347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 836.345874][T18347] R13: 00007f26269e6128 R14: 00007f26269e6090 R15: 00007fff24127cd8 [ 836.345894][T18347] [ 836.758324][T18353] netlink: 16 bytes leftover after parsing attributes in process `syz.3.2496'. [ 836.758397][T18353] mac80211_hwsim hwsim27 wlan1: entered promiscuous mode [ 836.758439][T18353] mac80211_hwsim hwsim27 wlan1: entered allmulticast mode [ 837.790978][T18374] FAULT_INJECTION: forcing a failure. [ 837.790978][T18374] name failslab, interval 1, probability 0, space 0, times 0 [ 837.791009][T18374] CPU: 0 UID: 0 PID: 18374 Comm: syz.2.2526 Tainted: G I L syzkaller #0 PREEMPT(full) [ 837.791034][T18374] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 837.791040][T18374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 837.791050][T18374] Call Trace: [ 837.791056][T18374] [ 837.791062][T18374] dump_stack_lvl+0x16c/0x1f0 [ 837.791089][T18374] should_fail_ex+0x512/0x640 [ 837.791111][T18374] ? kmem_cache_alloc_noprof+0x62/0x770 [ 837.791132][T18374] should_failslab+0xc2/0x120 [ 837.791156][T18374] kmem_cache_alloc_noprof+0x83/0x770 [ 837.791174][T18374] ? vm_area_alloc+0x1f/0x160 [ 837.791199][T18374] ? vm_area_alloc+0x1f/0x160 [ 837.791215][T18374] vm_area_alloc+0x1f/0x160 [ 837.791230][T18374] create_init_stack_vma+0x7e/0x700 [ 837.791254][T18374] alloc_bprm+0x420/0x710 [ 837.791276][T18374] do_execveat_common.isra.0+0x1ce/0x610 [ 837.791300][T18374] __x64_sys_execve+0x8e/0xb0 [ 837.791320][T18374] do_syscall_64+0xcd/0xf80 [ 837.791344][T18374] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 837.791359][T18374] RIP: 0033:0x7f262678f7c9 [ 837.791372][T18374] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 837.791387][T18374] RSP: 002b:00007f2627650038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 837.791401][T18374] RAX: ffffffffffffffda RBX: 00007f26269e6090 RCX: 00007f262678f7c9 [ 837.791411][T18374] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000080 [ 837.791420][T18374] RBP: 00007f2626813f91 R08: 0000000000000000 R09: 0000000000000000 [ 837.791429][T18374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 837.791438][T18374] R13: 00007f26269e6128 R14: 00007f26269e6090 R15: 00007fff24127cd8 [ 837.791457][T18374] [ 839.712092][T18415] FAULT_INJECTION: forcing a failure. [ 839.712092][T18415] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 839.748817][T18416] FAULT_INJECTION: forcing a failure. [ 839.748817][T18416] name failslab, interval 1, probability 0, space 0, times 0 [ 839.788047][T18415] CPU: 0 UID: 0 PID: 18415 Comm: syz.0.2530 Tainted: G I L syzkaller #0 PREEMPT(full) [ 839.788076][T18415] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 839.788084][T18415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 839.788093][T18415] Call Trace: [ 839.788099][T18415] [ 839.788106][T18415] dump_stack_lvl+0x16c/0x1f0 [ 839.788132][T18415] should_fail_ex+0x512/0x640 [ 839.788153][T18415] should_fail_alloc_page+0xe7/0x130 [ 839.788177][T18415] prepare_alloc_pages+0x401/0x670 [ 839.788204][T18415] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 839.788224][T18415] ? stack_trace_save+0x8e/0xc0 [ 839.788250][T18415] ? __pfx_stack_trace_save+0x10/0x10 [ 839.788272][T18415] ? do_raw_spin_lock+0x12c/0x2b0 [ 839.788289][T18415] ? stack_depot_save_flags+0x29/0x9b0 [ 839.788306][T18415] ? find_held_lock+0x2b/0x80 [ 839.788327][T18415] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 839.788345][T18415] ? __kasan_kmalloc+0xaa/0xb0 [ 839.788364][T18415] ? copy_splice_read+0x1a8/0xc20 [ 839.788385][T18415] ? splice_direct_to_actor+0x2a1/0xa30 [ 839.788405][T18415] ? do_splice_direct+0x174/0x240 [ 839.788425][T18415] ? do_sendfile+0xb06/0xe50 [ 839.788443][T18415] ? __x64_sys_sendfile64+0x1d8/0x220 [ 839.788456][T18415] ? do_syscall_64+0xcd/0xf80 [ 839.788478][T18415] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 839.788507][T18415] alloc_pages_bulk_noprof+0x77a/0x1410 [ 839.788532][T18415] ? __pfx_alloc_pages_bulk_noprof+0x10/0x10 [ 839.788555][T18415] ? splice_from_pipe_next+0x1f7/0x5d0 [ 839.788577][T18415] ? copy_splice_read+0x1a8/0xc20 [ 839.788601][T18415] copy_splice_read+0x1e1/0xc20 [ 839.788622][T18415] ? __pfx_pipe_to_null+0x10/0x10 [ 839.788647][T18415] ? __pfx_copy_splice_read+0x10/0x10 [ 839.788667][T18415] ? pipe_unlock+0x4a/0x70 [ 839.788688][T18415] ? __pfx_splice_from_pipe+0x10/0x10 [ 839.788714][T18415] ? find_held_lock+0x2b/0x80 [ 839.788735][T18415] ? __pfx_copy_splice_read+0x10/0x10 [ 839.788756][T18415] do_splice_read+0x285/0x370 [ 839.788779][T18415] splice_direct_to_actor+0x2a1/0xa30 [ 839.788801][T18415] ? __pfx_direct_splice_actor+0x10/0x10 [ 839.788827][T18415] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 839.788854][T18415] do_splice_direct+0x174/0x240 [ 839.788876][T18415] ? __pfx_do_splice_direct+0x10/0x10 [ 839.788898][T18415] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 839.788920][T18415] ? bpf_lsm_file_permission+0x9/0x10 [ 839.788938][T18415] ? security_file_permission+0x71/0x210 [ 839.788957][T18415] ? rw_verify_area+0xcf/0x6c0 [ 839.788977][T18415] do_sendfile+0xb06/0xe50 [ 839.789010][T18415] ? __pfx_do_sendfile+0x10/0x10 [ 839.789033][T18415] ? __x64_sys_futex+0x1e0/0x4c0 [ 839.789053][T18415] ? __x64_sys_futex+0x1e9/0x4c0 [ 839.789072][T18415] __x64_sys_sendfile64+0x1d8/0x220 [ 839.789087][T18415] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 839.789101][T18415] ? syscall_user_dispatch+0x78/0x140 [ 839.789125][T18415] do_syscall_64+0xcd/0xf80 [ 839.789149][T18415] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 839.789163][T18415] RIP: 0033:0x7fd55318f7c9 [ 839.789177][T18415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 839.789192][T18415] RSP: 002b:00007fd553f7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 839.789207][T18415] RAX: ffffffffffffffda RBX: 00007fd5533e5fa0 RCX: 00007fd55318f7c9 [ 839.789218][T18415] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000007 [ 839.789228][T18415] RBP: 00007fd553213f91 R08: 0000000000000000 R09: 0000000000000000 [ 839.789239][T18415] R10: 0010000800000003 R11: 0000000000000246 R12: 0000000000000000 [ 839.789250][T18415] R13: 00007fd5533e6038 R14: 00007fd5533e5fa0 R15: 00007ffc3da61b58 [ 839.789270][T18415] [ 840.183689][T18416] CPU: 0 UID: 0 PID: 18416 Comm: syz.1.2531 Tainted: G I L syzkaller #0 PREEMPT(full) [ 840.183719][T18416] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 840.183726][T18416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 840.183736][T18416] Call Trace: [ 840.183742][T18416] [ 840.183749][T18416] dump_stack_lvl+0x16c/0x1f0 [ 840.183776][T18416] should_fail_ex+0x512/0x640 [ 840.183793][T18416] ? __kmalloc_noprof+0xca/0x910 [ 840.183829][T18416] should_failslab+0xc2/0x120 [ 840.183852][T18416] __kmalloc_noprof+0xeb/0x910 [ 840.183868][T18416] ? splice_from_pipe_next+0x1f7/0x5d0 [ 840.183895][T18416] ? copy_splice_read+0x1a8/0xc20 [ 840.183918][T18416] ? copy_splice_read+0x1a8/0xc20 [ 840.183938][T18416] copy_splice_read+0x1a8/0xc20 [ 840.183965][T18416] ? __pfx_pipe_to_null+0x10/0x10 [ 840.183992][T18416] ? __pfx_copy_splice_read+0x10/0x10 [ 840.184012][T18416] ? pipe_unlock+0x4a/0x70 [ 840.184034][T18416] ? __pfx_splice_from_pipe+0x10/0x10 [ 840.184061][T18416] ? find_held_lock+0x2b/0x80 [ 840.184082][T18416] ? __pfx_copy_splice_read+0x10/0x10 [ 840.184103][T18416] do_splice_read+0x285/0x370 [ 840.184126][T18416] splice_direct_to_actor+0x2a1/0xa30 [ 840.184149][T18416] ? __pfx_direct_splice_actor+0x10/0x10 [ 840.184174][T18416] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 840.184201][T18416] do_splice_direct+0x174/0x240 [ 840.184223][T18416] ? __pfx_do_splice_direct+0x10/0x10 [ 840.184245][T18416] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 840.184267][T18416] ? bpf_lsm_file_permission+0x9/0x10 [ 840.184285][T18416] ? security_file_permission+0x71/0x210 [ 840.184305][T18416] ? rw_verify_area+0xcf/0x6c0 [ 840.184325][T18416] do_sendfile+0xb06/0xe50 [ 840.184349][T18416] ? __pfx_do_sendfile+0x10/0x10 [ 840.184371][T18416] ? __x64_sys_futex+0x1e0/0x4c0 [ 840.184388][T18416] ? __x64_sys_futex+0x1e9/0x4c0 [ 840.184407][T18416] __x64_sys_sendfile64+0x1d8/0x220 [ 840.184422][T18416] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 840.184436][T18416] ? syscall_user_dispatch+0x78/0x140 [ 840.184460][T18416] do_syscall_64+0xcd/0xf80 [ 840.184484][T18416] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 840.184499][T18416] RIP: 0033:0x7fe7a7b8f7c9 [ 840.184512][T18416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 840.184526][T18416] RSP: 002b:00007fe7a8973038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 840.184541][T18416] RAX: ffffffffffffffda RBX: 00007fe7a7de5fa0 RCX: 00007fe7a7b8f7c9 [ 840.184552][T18416] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 840.184561][T18416] RBP: 00007fe7a7c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 840.184571][T18416] R10: 0010000800000003 R11: 0000000000000246 R12: 0000000000000000 [ 840.184580][T18416] R13: 00007fe7a7de6038 R14: 00007fe7a7de5fa0 R15: 00007ffc71652b18 [ 840.184600][T18416] [ 841.000777][T18442] FAULT_INJECTION: forcing a failure. [ 841.000777][T18442] name failslab, interval 1, probability 0, space 0, times 0 [ 841.029516][T18448] random: crng reseeded on system resumption [ 841.039652][T18442] CPU: 0 UID: 0 PID: 18442 Comm: syz.2.2538 Tainted: G I L syzkaller #0 PREEMPT(full) [ 841.039680][T18442] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 841.039687][T18442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 841.039697][T18442] Call Trace: [ 841.039703][T18442] [ 841.039709][T18442] dump_stack_lvl+0x16c/0x1f0 [ 841.039738][T18442] should_fail_ex+0x512/0x640 [ 841.039756][T18442] ? __kmalloc_noprof+0xca/0x910 [ 841.039775][T18442] should_failslab+0xc2/0x120 [ 841.039799][T18442] __kmalloc_noprof+0xeb/0x910 [ 841.039815][T18442] ? vhost_dev_set_owner+0x287/0xa50 [ 841.039840][T18442] ? vhost_dev_set_owner+0x287/0xa50 [ 841.039860][T18442] vhost_dev_set_owner+0x287/0xa50 [ 841.039887][T18442] vhost_net_ioctl+0x87f/0x1850 [ 841.039913][T18442] ? do_vfs_ioctl+0x128/0x14f0 [ 841.039932][T18442] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 841.039951][T18442] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 841.039975][T18442] ? find_held_lock+0x2b/0x80 [ 841.039995][T18442] ? hook_file_ioctl_common+0x144/0x410 [ 841.040017][T18442] ? __fget_files+0x20e/0x3c0 [ 841.040041][T18442] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 841.040060][T18442] __x64_sys_ioctl+0x18e/0x210 [ 841.040080][T18442] do_syscall_64+0xcd/0xf80 [ 841.040103][T18442] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 841.040119][T18442] RIP: 0033:0x7f262678f7c9 [ 841.040136][T18442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 841.040151][T18442] RSP: 002b:00007f2627671038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 841.040165][T18442] RAX: ffffffffffffffda RBX: 00007f26269e5fa0 RCX: 00007f262678f7c9 [ 841.040175][T18442] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000003 [ 841.040185][T18442] RBP: 00007f2626813f91 R08: 0000000000000000 R09: 0000000000000000 [ 841.040194][T18442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 841.040203][T18442] R13: 00007f26269e6038 R14: 00007f26269e5fa0 R15: 00007fff24127cd8 [ 841.040224][T18442] [ 841.309192][T18450] FAULT_INJECTION: forcing a failure. [ 841.309192][T18450] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 841.322523][T18450] CPU: 0 UID: 0 PID: 18450 Comm: syz.0.2541 Tainted: G I L syzkaller #0 PREEMPT(full) [ 841.322550][T18450] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 841.322556][T18450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 841.322565][T18450] Call Trace: [ 841.322571][T18450] [ 841.322578][T18450] dump_stack_lvl+0x16c/0x1f0 [ 841.322604][T18450] should_fail_ex+0x512/0x640 [ 841.322624][T18450] _copy_from_user+0x2e/0xd0 [ 841.322641][T18450] kvm_arch_vcpu_ioctl+0x2733/0x54b0 [ 841.322663][T18450] ? stack_trace_save+0x8e/0xc0 [ 841.322686][T18450] ? __pfx_stack_trace_save+0x10/0x10 [ 841.322709][T18450] ? __pfx_kvm_arch_vcpu_ioctl+0x10/0x10 [ 841.322728][T18450] ? __lock_acquire+0x436/0x2890 [ 841.322744][T18450] ? kasan_save_stack+0x42/0x60 [ 841.322764][T18450] ? kasan_save_stack+0x33/0x60 [ 841.322782][T18450] ? kasan_save_track+0x14/0x30 [ 841.322800][T18450] ? kasan_save_free_info+0x3b/0x60 [ 841.322819][T18450] ? __lock_acquire+0x436/0x2890 [ 841.322840][T18450] ? lock_acquire+0x179/0x330 [ 841.322859][T18450] ? trace_contention_end+0xdd/0x110 [ 841.322880][T18450] ? __mutex_lock+0x27b/0x1ca0 [ 841.322905][T18450] ? kvm_vcpu_ioctl+0x316/0x16d0 [ 841.322931][T18450] ? __pfx___mutex_lock+0x10/0x10 [ 841.322962][T18450] ? tomoyo_path_number_perm+0x18d/0x580 [ 841.322983][T18450] ? kvm_vcpu_ioctl+0x1293/0x16d0 [ 841.323003][T18450] kvm_vcpu_ioctl+0x1293/0x16d0 [ 841.323027][T18450] ? __pfx_kvm_vcpu_ioctl+0x10/0x10 [ 841.323050][T18450] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 841.323073][T18450] ? do_vfs_ioctl+0x128/0x14f0 [ 841.323092][T18450] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 841.323114][T18450] ? find_held_lock+0x2b/0x80 [ 841.323133][T18450] ? hook_file_ioctl_common+0x144/0x410 [ 841.323154][T18450] ? __fget_files+0x20e/0x3c0 [ 841.323177][T18450] ? __pfx_kvm_vcpu_ioctl+0x10/0x10 [ 841.323200][T18450] __x64_sys_ioctl+0x18e/0x210 [ 841.323219][T18450] do_syscall_64+0xcd/0xf80 [ 841.323242][T18450] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 841.323258][T18450] RIP: 0033:0x7fd55318f7c9 [ 841.323271][T18450] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 841.323285][T18450] RSP: 002b:00007fd553f7f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 841.323299][T18450] RAX: ffffffffffffffda RBX: 00007fd5533e5fa0 RCX: 00007fd55318f7c9 [ 841.323309][T18450] RDX: 0000000000000000 RSI: 00000000c048aeca RDI: 0000000000000004 [ 841.323318][T18450] RBP: 00007fd553f7f090 R08: 0000000000000000 R09: 0000000000000000 [ 841.323327][T18450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.323336][T18450] R13: 00007fd5533e6038 R14: 00007fd5533e5fa0 R15: 00007ffc3da61b58 [ 841.323356][T18450] [ 841.324573][T18450] input: jJǸ-9%vJ86 as /devices/virtual/input/input30 syzkaller syzkaller login: [ 842.034217][T18461] FAULT_INJECTION: forcing a failure. [ 842.034217][T18461] name failslab, interval 1, probability 0, space 0, times 0 [ 842.182981][T18461] CPU: 0 UID: 0 PID: 18461 Comm: syz.1.2542 Tainted: G I L syzkaller #0 PREEMPT(full) [ 842.183011][T18461] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 842.183018][T18461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 842.183029][T18461] Call Trace: [ 842.183035][T18461] [ 842.183041][T18461] dump_stack_lvl+0x16c/0x1f0 [ 842.183070][T18461] should_fail_ex+0x512/0x640 [ 842.183087][T18461] ? __kmalloc_noprof+0xca/0x910 [ 842.183106][T18461] should_failslab+0xc2/0x120 [ 842.183130][T18461] __kmalloc_noprof+0xeb/0x910 [ 842.183146][T18461] ? lsm_blob_alloc+0x68/0x90 [ 842.183171][T18461] ? lsm_blob_alloc+0x68/0x90 [ 842.183190][T18461] lsm_blob_alloc+0x68/0x90 [ 842.183211][T18461] security_sk_alloc+0x2f/0x270 [ 842.183228][T18461] sk_prot_alloc+0xfb/0x2a0 [ 842.183252][T18461] sk_alloc+0x36/0xe30 [ 842.183270][T18461] unix_create1+0xa6/0x700 [ 842.183287][T18461] unix_create+0x110/0x270 [ 842.183301][T18461] __sock_create+0x339/0x8a0 [ 842.183318][T18461] __sys_socketpair+0x25c/0x5a0 [ 842.183334][T18461] ? __pfx___sys_socketpair+0x10/0x10 [ 842.183348][T18461] ? fput+0x70/0xf0 [ 842.183364][T18461] ? xfd_validate_state+0x61/0x180 [ 842.183378][T18461] ? __pfx_do_writev+0x10/0x10 [ 842.183401][T18461] __x64_sys_socketpair+0x96/0x100 [ 842.183416][T18461] ? lockdep_hardirqs_on+0x7c/0x110 [ 842.183438][T18461] do_syscall_64+0xcd/0xf80 [ 842.183462][T18461] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 842.183477][T18461] RIP: 0033:0x7fe7a7b8f7c9 [ 842.183491][T18461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 842.183505][T18461] RSP: 002b:00007fe7a8952038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 842.183520][T18461] RAX: ffffffffffffffda RBX: 00007fe7a7de6090 RCX: 00007fe7a7b8f7c9 [ 842.183535][T18461] RDX: 8000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 842.183544][T18461] RBP: 00007fe7a7c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 842.183553][T18461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 842.183562][T18461] R13: 00007fe7a7de6128 R14: 00007fe7a7de6090 R15: 00007ffc71652b18 [ 842.183583][T18461] [ 842.666679][T18467] FAULT_INJECTION: forcing a failure. [ 842.666679][T18467] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 842.700282][T18467] CPU: 0 UID: 0 PID: 18467 Comm: syz.2.2544 Tainted: G I L syzkaller #0 PREEMPT(full) [ 842.700313][T18467] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 842.700320][T18467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 842.700330][T18467] Call Trace: [ 842.700337][T18467] [ 842.700344][T18467] dump_stack_lvl+0x16c/0x1f0 [ 842.700373][T18467] should_fail_ex+0x512/0x640 [ 842.700393][T18467] should_fail_alloc_page+0xe7/0x130 [ 842.700419][T18467] prepare_alloc_pages+0x401/0x670 [ 842.700446][T18467] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 842.700465][T18467] ? should_fail_alloc_page+0xee/0x130 [ 842.700489][T18467] ? rcu_is_watching+0x12/0xc0 [ 842.700510][T18467] ? trace_mm_page_alloc+0x11b/0x180 [ 842.700533][T18467] ? __alloc_frozen_pages_noprof+0x292/0x2430 [ 842.700551][T18467] ? kfree+0x2f8/0x6e0 [ 842.700565][T18467] ? tomoyo_path_number_perm+0x470/0x580 [ 842.700582][T18467] ? security_file_ioctl+0x9b/0x240 [ 842.700599][T18467] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 842.700619][T18467] ? kasan_save_stack+0x42/0x60 [ 842.700637][T18467] ? kasan_save_stack+0x33/0x60 [ 842.700656][T18467] ? kasan_save_track+0x14/0x30 [ 842.700674][T18467] ? __kasan_kmalloc+0xaa/0xb0 [ 842.700691][T18467] ? __kmalloc_noprof+0x33d/0x910 [ 842.700705][T18467] ? vhost_dev_set_owner+0x287/0xa50 [ 842.700733][T18467] ? vhost_net_ioctl+0x87f/0x1850 [ 842.700759][T18467] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 842.700784][T18467] ? policy_nodemask+0xea/0x4e0 [ 842.700809][T18467] alloc_pages_mpol+0x1fb/0x550 [ 842.700832][T18467] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 842.700859][T18467] ___kmalloc_large_node+0x10c/0x150 [ 842.700886][T18467] __kmalloc_large_node_noprof+0x1c/0x70 [ 842.700900][T18467] ? lruvec_stat_mod_folio+0x25b/0x3b0 [ 842.700920][T18467] __kmalloc_noprof.cold+0xc/0x62 [ 842.700942][T18467] ? vhost_dev_set_owner+0x191/0xa50 [ 842.700966][T18467] ? vhost_dev_set_owner+0x191/0xa50 [ 842.700986][T18467] vhost_dev_set_owner+0x191/0xa50 [ 842.701012][T18467] vhost_net_ioctl+0x87f/0x1850 [ 842.701029][T18467] ? do_vfs_ioctl+0x128/0x14f0 [ 842.701048][T18467] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 842.701065][T18467] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 842.701088][T18467] ? find_held_lock+0x2b/0x80 [ 842.701107][T18467] ? hook_file_ioctl_common+0x144/0x410 [ 842.701129][T18467] ? __fget_files+0x20e/0x3c0 [ 842.701152][T18467] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 842.701172][T18467] __x64_sys_ioctl+0x18e/0x210 [ 842.701191][T18467] do_syscall_64+0xcd/0xf80 [ 842.701216][T18467] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 842.701231][T18467] RIP: 0033:0x7f262678f7c9 [ 842.701246][T18467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 842.701261][T18467] RSP: 002b:00007f2627671038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 842.701277][T18467] RAX: ffffffffffffffda RBX: 00007f26269e5fa0 RCX: 00007f262678f7c9 [ 842.701288][T18467] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000003 [ 842.701298][T18467] RBP: 00007f2626813f91 R08: 0000000000000000 R09: 0000000000000000 [ 842.701307][T18467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 842.701316][T18467] R13: 00007f26269e6038 R14: 00007f26269e5fa0 R15: 00007fff24127cd8 [ 842.701338][T18467] [ 843.361542][T18474] netlink: 'syz.3.2545': attribute type 10 has an invalid length. [ 843.369380][T18474] netlink: 230 bytes leftover after parsing attributes in process `syz.3.2545'. [ 843.689490][T18470] zswap: compressor not available [ 843.873012][T18489] NOTICE: Automounting of tracing to debugfs is deprecated and will be removed in 2030 [ 843.943569][T18490] netlink: 342 bytes leftover after parsing attributes in process `syz.3.2547'. [ 844.416416][T18495] futex_wake_op: syz.1.2548 tries to shift op by -2048; fix this program [ 844.552097][T18495] futex_wake_op: syz.1.2548 tries to shift op by -2048; fix this program [ 845.909543][T18520] futex_wake_op: syz.2.2553 tries to shift op by -2048; fix this program [ 845.986087][T18520] futex_wake_op: syz.2.2553 tries to shift op by -2048; fix this program [ 846.319422][T18518] 0x000000000001-0x000000020000 : "" [ 846.384328][T18518] ftl_cs: FTL header corrupt! [ 847.963400][T18565] FAULT_INJECTION: forcing a failure. [ 847.963400][T18565] name failslab, interval 1, probability 0, space 0, times 0 [ 848.063382][T18565] CPU: 0 UID: 0 PID: 18565 Comm: syz.0.2561 Tainted: G I L syzkaller #0 PREEMPT(full) [ 848.063413][T18565] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 848.063420][T18565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 848.063429][T18565] Call Trace: [ 848.063435][T18565] [ 848.063441][T18565] dump_stack_lvl+0x16c/0x1f0 [ 848.063469][T18565] should_fail_ex+0x512/0x640 [ 848.063486][T18565] ? __kmalloc_noprof+0xca/0x910 [ 848.063505][T18565] should_failslab+0xc2/0x120 [ 848.063528][T18565] __kmalloc_noprof+0xeb/0x910 [ 848.063544][T18565] ? lsm_blob_alloc+0x68/0x90 [ 848.063573][T18565] ? lsm_blob_alloc+0x68/0x90 [ 848.063596][T18565] lsm_blob_alloc+0x68/0x90 [ 848.063617][T18565] security_sk_alloc+0x2f/0x270 [ 848.063634][T18565] sk_prot_alloc+0xfb/0x2a0 [ 848.063658][T18565] sk_alloc+0x36/0xe30 [ 848.063676][T18565] unix_create1+0xa6/0x700 [ 848.063693][T18565] unix_create+0x110/0x270 [ 848.063707][T18565] __sock_create+0x339/0x8a0 [ 848.063724][T18565] __sys_socketpair+0x25c/0x5a0 [ 848.063740][T18565] ? __pfx___sys_socketpair+0x10/0x10 [ 848.063754][T18565] ? fput+0x70/0xf0 [ 848.063770][T18565] ? xfd_validate_state+0x61/0x180 [ 848.063784][T18565] ? __pfx_do_writev+0x10/0x10 [ 848.063806][T18565] __x64_sys_socketpair+0x96/0x100 [ 848.063821][T18565] ? lockdep_hardirqs_on+0x7c/0x110 [ 848.063843][T18565] do_syscall_64+0xcd/0xf80 [ 848.063867][T18565] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 848.063882][T18565] RIP: 0033:0x7fd55318f7c9 [ 848.063895][T18565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 848.063910][T18565] RSP: 002b:00007fd553f5e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 848.063925][T18565] RAX: ffffffffffffffda RBX: 00007fd5533e6090 RCX: 00007fd55318f7c9 [ 848.063935][T18565] RDX: 8000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 848.063945][T18565] RBP: 00007fd553213f91 R08: 0000000000000000 R09: 0000000000000000 [ 848.063954][T18565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 848.063964][T18565] R13: 00007fd5533e6128 R14: 00007fd5533e6090 R15: 00007ffc3da61b58 [ 848.063984][T18565] [ 849.131636][T18572] syz.2.2563 (18572) used greatest stack depth: 19784 bytes left syzkaller syzkaller login: [ 850.217025][T18588] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2566'. [ 850.508822][T18594] Invalid ELF header magic: != ELF [ 850.608230][T18591] zswap: compressor not available [ 850.815844][T18603] input: jJǸ-9%vJ86 as /devices/virtual/input/input31 [ 851.830349][T18623] netlink: 56 bytes leftover after parsing attributes in process `syz.3.2572'. [ 852.759924][ T30] audit: type=1800 audit(4294967618.360:73): pid=18644 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.2575" name="members" dev="configfs" ino=81388 res=0 errno=0 [ 853.237362][T18651] FAULT_INJECTION: forcing a failure. [ 853.237362][T18651] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 853.354651][T18651] CPU: 0 UID: 0 PID: 18651 Comm: syz.2.2577 Tainted: G I L syzkaller #0 PREEMPT(full) [ 853.354681][T18651] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 853.354688][T18651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 853.354698][T18651] Call Trace: [ 853.354704][T18651] [ 853.354710][T18651] dump_stack_lvl+0x16c/0x1f0 [ 853.354738][T18651] should_fail_ex+0x512/0x640 [ 853.354758][T18651] should_fail_alloc_page+0xe7/0x130 [ 853.354783][T18651] prepare_alloc_pages+0x401/0x670 [ 853.354810][T18651] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 853.354831][T18651] ? find_held_lock+0x2b/0x80 [ 853.354858][T18651] ? is_bpf_text_address+0x8a/0x1a0 [ 853.354880][T18651] ? bpf_ksym_find+0x124/0x1c0 [ 853.354896][T18651] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 853.354921][T18651] ? is_bpf_text_address+0x94/0x1a0 [ 853.354941][T18651] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 853.354960][T18651] ? __kernel_text_address+0xd/0x40 [ 853.354977][T18651] ? unwind_get_return_address+0x59/0xa0 [ 853.354997][T18651] ? arch_stack_walk+0xa6/0x100 [ 853.355022][T18651] ? stack_trace_save+0x8e/0xc0 [ 853.355043][T18651] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 853.355067][T18651] ? policy_nodemask+0xea/0x4e0 [ 853.355092][T18651] alloc_pages_mpol+0x1fb/0x550 [ 853.355115][T18651] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 853.355142][T18651] alloc_pages_noprof+0x131/0x390 [ 853.355165][T18651] __pud_alloc+0x3b/0x760 [ 853.355189][T18651] __handle_mm_fault+0x1405/0x2bb0 [ 853.355206][T18651] ? mt_find+0x3e2/0xa20 [ 853.355222][T18651] ? __pfx___handle_mm_fault+0x10/0x10 [ 853.355253][T18651] handle_mm_fault+0x3fe/0xad0 [ 853.355272][T18651] __get_user_pages+0x54e/0x3590 [ 853.355302][T18651] ? __pfx___get_user_pages+0x10/0x10 [ 853.355329][T18651] get_user_pages_remote+0x243/0xab0 [ 853.355359][T18651] ? __pfx_get_user_pages_remote+0x10/0x10 [ 853.355388][T18651] get_arg_page+0xf4/0x310 [ 853.355408][T18651] ? __pfx_get_arg_page+0x10/0x10 [ 853.355436][T18651] copy_string_kernel+0x182/0x520 [ 853.355459][T18651] do_execveat_common.isra.0+0x2ed/0x610 [ 853.355484][T18651] __x64_sys_execve+0x8e/0xb0 [ 853.355504][T18651] do_syscall_64+0xcd/0xf80 [ 853.355528][T18651] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 853.355544][T18651] RIP: 0033:0x7f262678f7c9 [ 853.355558][T18651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 853.355572][T18651] RSP: 002b:00007f2627650038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 853.355587][T18651] RAX: ffffffffffffffda RBX: 00007f26269e6090 RCX: 00007f262678f7c9 [ 853.355597][T18651] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000080 [ 853.355607][T18651] RBP: 00007f2626813f91 R08: 0000000000000000 R09: 0000000000000000 [ 853.355616][T18651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 853.355626][T18651] R13: 00007f26269e6128 R14: 00007f26269e6090 R15: 00007fff24127cd8 [ 853.355646][T18651] [ 853.843257][T18666] FAULT_INJECTION: forcing a failure. [ 853.843257][T18666] name failslab, interval 1, probability 0, space 0, times 0 [ 853.856138][T18666] CPU: 0 UID: 0 PID: 18666 Comm: syz.0.2579 Tainted: G I L syzkaller #0 PREEMPT(full) [ 853.856167][T18666] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 853.856174][T18666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 853.856185][T18666] Call Trace: [ 853.856192][T18666] [ 853.856198][T18666] dump_stack_lvl+0x16c/0x1f0 [ 853.856226][T18666] should_fail_ex+0x512/0x640 [ 853.856243][T18666] ? fs_reclaim_acquire+0xae/0x150 [ 853.856269][T18666] should_failslab+0xc2/0x120 [ 853.856292][T18666] kmem_cache_alloc_noprof+0x83/0x770 [ 853.856311][T18666] ? __pfx_map_id_range_down+0x10/0x10 [ 853.856331][T18666] ? security_inode_alloc+0x3b/0x2b0 [ 853.856351][T18666] ? security_inode_alloc+0x3b/0x2b0 [ 853.856366][T18666] security_inode_alloc+0x3b/0x2b0 [ 853.856383][T18666] inode_init_always_gfp+0xced/0x1040 [ 853.856408][T18666] alloc_inode+0x86/0x240 [ 853.856425][T18666] sock_alloc+0x40/0x280 [ 853.856446][T18666] __sock_create+0xc2/0x8a0 [ 853.856463][T18666] __sys_socket+0x14d/0x260 [ 853.856477][T18666] ? __pfx___sys_socket+0x10/0x10 [ 853.856491][T18666] ? xfd_validate_state+0x61/0x180 [ 853.856510][T18666] __x64_sys_socket+0x72/0xb0 [ 853.856524][T18666] ? lockdep_hardirqs_on+0x7c/0x110 [ 853.856546][T18666] do_syscall_64+0xcd/0xf80 [ 853.856569][T18666] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 853.856585][T18666] RIP: 0033:0x7fd5531916e7 [ 853.856598][T18666] Code: f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 853.856613][T18666] RSP: 002b:00007fd553f5cfa8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 853.856627][T18666] RAX: ffffffffffffffda RBX: 00007fd5533e6090 RCX: 00007fd5531916e7 [ 853.856637][T18666] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 853.856646][T18666] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 853.856655][T18666] R10: 0000000000000000 R11: 0000000000000286 R12: 0000000000000000 [ 853.856664][T18666] R13: 00007fd5533e6128 R14: 00007fd5533e6090 R15: 00007ffc3da61b58 [ 853.856683][T18666] [ 854.069185][T18666] socket: no more sockets [ 855.388654][T18708] FAULT_INJECTION: forcing a failure. [ 855.388654][T18708] name failslab, interval 1, probability 0, space 0, times 0 [ 855.415103][T18710] FAULT_INJECTION: forcing a failure. [ 855.415103][T18710] name failslab, interval 1, probability 0, space 0, times 0 [ 855.519841][T18708] CPU: 0 UID: 0 PID: 18708 Comm: syz.2.2586 Tainted: G I L syzkaller #0 PREEMPT(full) [ 855.519871][T18708] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 855.519878][T18708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 855.519888][T18708] Call Trace: [ 855.519894][T18708] [ 855.519901][T18708] dump_stack_lvl+0x16c/0x1f0 [ 855.519930][T18708] should_fail_ex+0x512/0x640 [ 855.519948][T18708] ? __kmalloc_noprof+0xca/0x910 [ 855.519966][T18708] should_failslab+0xc2/0x120 [ 855.519989][T18708] __kmalloc_noprof+0xeb/0x910 [ 855.520006][T18708] ? vhost_dev_set_owner+0x287/0xa50 [ 855.520031][T18708] ? vhost_dev_set_owner+0x287/0xa50 [ 855.520050][T18708] vhost_dev_set_owner+0x287/0xa50 [ 855.520077][T18708] vhost_net_ioctl+0x87f/0x1850 [ 855.520096][T18708] ? do_vfs_ioctl+0x128/0x14f0 [ 855.520117][T18708] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 855.520135][T18708] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 855.520158][T18708] ? find_held_lock+0x2b/0x80 [ 855.520177][T18708] ? hook_file_ioctl_common+0x144/0x410 [ 855.520199][T18708] ? __fget_files+0x20e/0x3c0 [ 855.520224][T18708] ? __pfx_vhost_net_ioctl+0x10/0x10 [ 855.520243][T18708] __x64_sys_ioctl+0x18e/0x210 [ 855.520263][T18708] do_syscall_64+0xcd/0xf80 [ 855.520287][T18708] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 855.520302][T18708] RIP: 0033:0x7f262678f7c9 [ 855.520316][T18708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 855.520330][T18708] RSP: 002b:00007f2627650038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 855.520344][T18708] RAX: ffffffffffffffda RBX: 00007f26269e6090 RCX: 00007f262678f7c9 [ 855.520355][T18708] RDX: 0000000000000005 RSI: 000000000000af01 RDI: 0000000000000007 [ 855.520364][T18708] RBP: 00007f2626813f91 R08: 0000000000000000 R09: 0000000000000000 [ 855.520373][T18708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 855.520382][T18708] R13: 00007f26269e6128 R14: 00007f26269e6090 R15: 00007fff24127cd8 [ 855.520401][T18708] [ 855.815430][T18710] CPU: 0 UID: 0 PID: 18710 Comm: syz.3.2587 Tainted: G I L syzkaller #0 PREEMPT(full) [ 855.815461][T18710] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 855.815467][T18710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 855.815477][T18710] Call Trace: [ 855.815483][T18710] [ 855.815490][T18710] dump_stack_lvl+0x16c/0x1f0 [ 855.815517][T18710] should_fail_ex+0x512/0x640 [ 855.815544][T18710] ? __kmalloc_noprof+0xca/0x910 [ 855.815564][T18710] should_failslab+0xc2/0x120 [ 855.815587][T18710] __kmalloc_noprof+0xeb/0x910 [ 855.815603][T18710] ? lsm_blob_alloc+0x68/0x90 [ 855.815629][T18710] ? lsm_blob_alloc+0x68/0x90 [ 855.815649][T18710] lsm_blob_alloc+0x68/0x90 [ 855.815670][T18710] security_sk_alloc+0x2f/0x270 [ 855.815687][T18710] sk_prot_alloc+0xfb/0x2a0 [ 855.815712][T18710] sk_alloc+0x36/0xe30 [ 855.815730][T18710] unix_create1+0xa6/0x700 [ 855.815747][T18710] unix_create+0x110/0x270 [ 855.815762][T18710] __sock_create+0x339/0x8a0 [ 855.815779][T18710] __sys_socketpair+0x25c/0x5a0 [ 855.815795][T18710] ? __pfx___sys_socketpair+0x10/0x10 [ 855.815809][T18710] ? fput+0x70/0xf0 [ 855.815825][T18710] ? xfd_validate_state+0x61/0x180 [ 855.815839][T18710] ? __pfx_do_writev+0x10/0x10 [ 855.815861][T18710] __x64_sys_socketpair+0x96/0x100 [ 855.815876][T18710] ? lockdep_hardirqs_on+0x7c/0x110 [ 855.815898][T18710] do_syscall_64+0xcd/0xf80 [ 855.815922][T18710] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 855.815937][T18710] RIP: 0033:0x7fef8458f7c9 syzkaller syzkaller login: [ 855.815950][T18710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 855.815965][T18710] RSP: 002b:00007fef854d2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 855.815979][T18710] RAX: ffffffffffffffda RBX: 00007fef847e6090 RCX: 00007fef8458f7c9 [ 855.815989][T18710] RDX: 8000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 855.815998][T18710] RBP: 00007fef84613f91 R08: 0000000000000000 R09: 0000000000000000 [ 855.816008][T18710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 855.816017][T18710] R13: 00007fef847e6128 R14: 00007fef847e6090 R15: 00007fffebec13a8 [ 855.816036][T18710] [ 856.297152][T18725] FAULT_INJECTION: forcing a failure. [ 856.297152][T18725] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 856.297183][T18725] CPU: 0 UID: 0 PID: 18725 Comm: syz.1.2588 Tainted: G I L syzkaller #0 PREEMPT(full) [ 856.297208][T18725] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 856.297215][T18725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 856.297225][T18725] Call Trace: [ 856.297231][T18725] [ 856.297237][T18725] dump_stack_lvl+0x16c/0x1f0 [ 856.297264][T18725] should_fail_ex+0x512/0x640 [ 856.297284][T18725] should_fail_alloc_page+0xe7/0x130 [ 856.297310][T18725] prepare_alloc_pages+0x401/0x670 [ 856.297336][T18725] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 856.297359][T18725] ? find_held_lock+0x2b/0x80 [ 856.297380][T18725] ? is_bpf_text_address+0x8a/0x1a0 [ 856.297400][T18725] ? bpf_ksym_find+0x124/0x1c0 [ 856.297415][T18725] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 856.297439][T18725] ? is_bpf_text_address+0x94/0x1a0 [ 856.297459][T18725] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 856.297477][T18725] ? __kernel_text_address+0xd/0x40 [ 856.297503][T18725] ? unwind_get_return_address+0x59/0xa0 [ 856.297524][T18725] ? arch_stack_walk+0xa6/0x100 [ 856.297550][T18725] ? stack_trace_save+0x8e/0xc0 [ 856.297572][T18725] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 856.297596][T18725] ? policy_nodemask+0xea/0x4e0 [ 856.297620][T18725] alloc_pages_mpol+0x1fb/0x550 [ 856.297643][T18725] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 856.297671][T18725] alloc_pages_noprof+0x131/0x390 [ 856.297694][T18725] __pud_alloc+0x3b/0x760 [ 856.297718][T18725] __handle_mm_fault+0x1405/0x2bb0 [ 856.297735][T18725] ? mt_find+0x3e2/0xa20 [ 856.297752][T18725] ? __pfx___handle_mm_fault+0x10/0x10 [ 856.297783][T18725] handle_mm_fault+0x3fe/0xad0 [ 856.297802][T18725] __get_user_pages+0x54e/0x3590 [ 856.297833][T18725] ? __pfx___get_user_pages+0x10/0x10 [ 856.297860][T18725] get_user_pages_remote+0x243/0xab0 [ 856.297886][T18725] ? __pfx_get_user_pages_remote+0x10/0x10 [ 856.297916][T18725] get_arg_page+0xf4/0x310 [ 856.297935][T18725] ? __pfx_get_arg_page+0x10/0x10 [ 856.297959][T18725] copy_string_kernel+0x182/0x520 [ 856.297983][T18725] do_execveat_common.isra.0+0x2ed/0x610 [ 856.298006][T18725] __x64_sys_execve+0x8e/0xb0 [ 856.298027][T18725] do_syscall_64+0xcd/0xf80 [ 856.298051][T18725] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 856.298066][T18725] RIP: 0033:0x7fe7a7b8f7c9 [ 856.298079][T18725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 856.298094][T18725] RSP: 002b:00007fe7a8952038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 856.298108][T18725] RAX: ffffffffffffffda RBX: 00007fe7a7de6090 RCX: 00007fe7a7b8f7c9 [ 856.298118][T18725] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000080 [ 856.298128][T18725] RBP: 00007fe7a7c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 856.298137][T18725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 856.298146][T18725] R13: 00007fe7a7de6128 R14: 00007fe7a7de6090 R15: 00007ffc71652b18 [ 856.298167][T18725] [ 856.468315][T18729] FAULT_INJECTION: forcing a failure. [ 856.468315][T18729] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 856.468347][T18729] CPU: 0 UID: 0 PID: 18729 Comm: syz.3.2589 Tainted: G I L syzkaller #0 PREEMPT(full) [ 856.468372][T18729] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 856.468378][T18729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 856.468388][T18729] Call Trace: [ 856.468394][T18729] [ 856.468400][T18729] dump_stack_lvl+0x16c/0x1f0 [ 856.468427][T18729] should_fail_ex+0x512/0x640 [ 856.468448][T18729] should_fail_alloc_page+0xe7/0x130 [ 856.468483][T18729] prepare_alloc_pages+0x401/0x670 [ 856.468510][T18729] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 856.468533][T18729] ? find_held_lock+0x2b/0x80 [ 856.468553][T18729] ? is_bpf_text_address+0x8a/0x1a0 [ 856.468573][T18729] ? bpf_ksym_find+0x124/0x1c0 [ 856.468589][T18729] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 856.468613][T18729] ? is_bpf_text_address+0x94/0x1a0 [ 856.468632][T18729] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 856.468651][T18729] ? __kernel_text_address+0xd/0x40 [ 856.468667][T18729] ? unwind_get_return_address+0x59/0xa0 [ 856.468687][T18729] ? arch_stack_walk+0xa6/0x100 [ 856.468712][T18729] ? stack_trace_save+0x8e/0xc0 [ 856.468734][T18729] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 856.468757][T18729] ? policy_nodemask+0xea/0x4e0 [ 856.468781][T18729] alloc_pages_mpol+0x1fb/0x550 [ 856.468804][T18729] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 856.468832][T18729] alloc_pages_noprof+0x131/0x390 [ 856.468854][T18729] __pud_alloc+0x3b/0x760 [ 856.468878][T18729] __handle_mm_fault+0x1405/0x2bb0 [ 856.468895][T18729] ? mt_find+0x3e2/0xa20 [ 856.468912][T18729] ? __pfx___handle_mm_fault+0x10/0x10 [ 856.468943][T18729] handle_mm_fault+0x3fe/0xad0 [ 856.468962][T18729] __get_user_pages+0x54e/0x3590 [ 856.468992][T18729] ? __pfx___get_user_pages+0x10/0x10 [ 856.469020][T18729] get_user_pages_remote+0x243/0xab0 [ 856.469046][T18729] ? __pfx_get_user_pages_remote+0x10/0x10 [ 856.469075][T18729] get_arg_page+0xf4/0x310 [ 856.469095][T18729] ? __pfx_get_arg_page+0x10/0x10 [ 856.469119][T18729] copy_string_kernel+0x182/0x520 [ 856.469143][T18729] do_execveat_common.isra.0+0x2ed/0x610 [ 856.469167][T18729] __x64_sys_execve+0x8e/0xb0 [ 856.469188][T18729] do_syscall_64+0xcd/0xf80 [ 856.469212][T18729] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 856.469227][T18729] RIP: 0033:0x7fef8458f7c9 [ 856.469240][T18729] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 856.469255][T18729] RSP: 002b:00007fef854d2038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 856.469269][T18729] RAX: ffffffffffffffda RBX: 00007fef847e6090 RCX: 00007fef8458f7c9 [ 856.469279][T18729] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000080 [ 856.469288][T18729] RBP: 00007fef84613f91 R08: 0000000000000000 R09: 0000000000000000 [ 856.469298][T18729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 856.469307][T18729] R13: 00007fef847e6128 R14: 00007fef847e6090 R15: 00007fffebec13a8 [ 856.469327][T18729] [ 857.107094][T18742] FAULT_INJECTION: forcing a failure. [ 857.107094][T18742] name failslab, interval 1, probability 0, space 0, times 0 [ 857.107150][T18742] CPU: 0 UID: 0 PID: 18742 Comm: syz.1.2591 Tainted: G I L syzkaller #0 PREEMPT(full) [ 857.107174][T18742] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 857.107181][T18742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 857.107190][T18742] Call Trace: [ 857.107196][T18742] [ 857.107203][T18742] dump_stack_lvl+0x16c/0x1f0 [ 857.107229][T18742] should_fail_ex+0x512/0x640 [ 857.107247][T18742] ? __kmalloc_cache_noprof+0x5f/0x800 [ 857.107267][T18742] should_failslab+0xc2/0x120 [ 857.107290][T18742] __kmalloc_cache_noprof+0x80/0x800 [ 857.107308][T18742] ? vidtv_psi_pmt_stream_init+0x4e/0x3e0 [ 857.107332][T18742] ? vidtv_psi_pmt_table_init+0x363/0x430 [ 857.107357][T18742] ? vidtv_psi_pmt_stream_init+0x4e/0x3e0 [ 857.107382][T18742] vidtv_psi_pmt_stream_init+0x4e/0x3e0 [ 857.107407][T18742] vidtv_channel_si_init+0x13d2/0x1a50 [ 857.107436][T18742] vidtv_mux_init+0x526/0xbe0 [ 857.107455][T18742] vidtv_start_feed+0x33e/0x4d0 [ 857.107476][T18742] ? __pfx_vidtv_start_feed+0x10/0x10 [ 857.107497][T18742] ? __pfx_vidtv_bridge_on_new_pkts_avail+0x10/0x10 [ 857.107522][T18742] ? mark_held_locks+0x49/0x80 [ 857.107541][T18742] ? __pfx_vidtv_start_feed+0x10/0x10 [ 857.107560][T18742] dmx_ts_feed_start_filtering+0xf6/0x220 [ 857.107581][T18742] dvb_dmxdev_start_feed+0x273/0x3f0 [ 857.107609][T18742] dvb_dmxdev_filter_start+0x1b6/0xe10 [ 857.107627][T18742] ? dvb_dmxdev_add_pid+0x2a1/0x380 [ 857.107644][T18742] dvb_demux_do_ioctl+0x9de/0x12f0 [ 857.107666][T18742] dvb_usercopy+0x167/0x340 [ 857.107689][T18742] ? __pfx_dvb_demux_do_ioctl+0x10/0x10 [ 857.107706][T18742] ? __pfx_dvb_usercopy+0x10/0x10 [ 857.107736][T18742] ? __fget_files+0x20e/0x3c0 [ 857.107761][T18742] dvb_demux_ioctl+0x29/0x40 [ 857.107773][T18742] ? __pfx_dvb_demux_ioctl+0x10/0x10 [ 857.107787][T18742] __x64_sys_ioctl+0x18e/0x210 [ 857.107807][T18742] do_syscall_64+0xcd/0xf80 [ 857.107831][T18742] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 857.107846][T18742] RIP: 0033:0x7fe7a7b8f7c9 [ 857.107859][T18742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 857.107874][T18742] RSP: 002b:00007fe7a8973038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 857.107888][T18742] RAX: ffffffffffffffda RBX: 00007fe7a7de5fa0 RCX: 00007fe7a7b8f7c9 [ 857.107898][T18742] RDX: 0000000000000000 RSI: 0000000040146f2c RDI: 0000000000000003 [ 857.107907][T18742] RBP: 00007fe7a7c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 857.107916][T18742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 857.107925][T18742] R13: 00007fe7a7de6038 R14: 00007fe7a7de5fa0 R15: 00007ffc71652b18 [ 857.107945][T18742] [ 857.119388][T18742] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN PTI [ 857.119411][T18742] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 857.119434][T18742] CPU: 0 UID: 0 PID: 18742 Comm: syz.1.2591 Tainted: G I L syzkaller #0 PREEMPT(full) [ 857.119462][T18742] Tainted: [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 857.119470][T18742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 857.119480][T18742] RIP: 0010:vidtv_psi_desc_assign+0x24/0x90 [ 857.119508][T18742] Code: 90 90 90 90 90 90 0f 1f 40 d6 41 54 55 48 89 f5 53 48 89 fb e8 fd 68 b9 f9 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 75 47 4c 8b 23 49 39 ec 74 36 e8 d9 68 b9 f9 4d 85 e4 [ 857.119524][T18742] RSP: 0018:ffffc90005457a20 EFLAGS: 00010247 [ 857.119537][T18742] RAX: dffffc0000000000 RBX: 0000000000000005 RCX: ffffc90018c5e000 [ 857.119549][T18742] RDX: 0000000000000000 RSI: ffffffff880501e3 RDI: 0000000000000005 [ 857.119558][T18742] RBP: ffff888031527da0 R08: 0000000000000000 R09: 4453534204050000 [ 857.119569][T18742] R10: 0000000000000005 R11: ffff88802f8d29b0 R12: 0000000000000000 [ 857.119579][T18742] R13: ffff88803178c9c0 R14: ffff88807a1b9100 R15: ffff88803178c440 [ 857.119590][T18742] FS: 00007fe7a89736c0(0000) GS:ffff8881248fc000(0000) knlGS:0000000000000000 [ 857.119606][T18742] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 857.119616][T18742] CR2: 00007f5cdd6477b8 CR3: 0000000028b52000 CR4: 00000000003526f0 [ 857.119626][T18742] Call Trace: [ 857.119631][T18742] [ 857.119638][T18742] vidtv_channel_si_init+0x1445/0x1a50 [ 857.119657][T18742] vidtv_mux_init+0x526/0xbe0 [ 857.119674][T18742] vidtv_start_feed+0x33e/0x4d0 [ 857.119693][T18742] ? __pfx_vidtv_start_feed+0x10/0x10 [ 857.119713][T18742] ? __pfx_vidtv_bridge_on_new_pkts_avail+0x10/0x10 [ 857.119735][T18742] ? mark_held_locks+0x49/0x80 [ 857.119751][T18742] ? __pfx_vidtv_start_feed+0x10/0x10 [ 857.119770][T18742] dmx_ts_feed_start_filtering+0xf6/0x220 [ 857.119790][T18742] dvb_dmxdev_start_feed+0x273/0x3f0 [ 857.119815][T18742] dvb_dmxdev_filter_start+0x1b6/0xe10 [ 857.119832][T18742] ? dvb_dmxdev_add_pid+0x2a1/0x380 [ 857.119847][T18742] dvb_demux_do_ioctl+0x9de/0x12f0 [ 857.119865][T18742] dvb_usercopy+0x167/0x340 [ 857.119887][T18742] ? __pfx_dvb_demux_do_ioctl+0x10/0x10 [ 857.119903][T18742] ? __pfx_dvb_usercopy+0x10/0x10 [ 857.119929][T18742] ? __fget_files+0x20e/0x3c0 [ 857.119951][T18742] dvb_demux_ioctl+0x29/0x40 [ 857.119964][T18742] ? __pfx_dvb_demux_ioctl+0x10/0x10 [ 857.119978][T18742] __x64_sys_ioctl+0x18e/0x210 [ 857.119996][T18742] do_syscall_64+0xcd/0xf80 [ 857.120020][T18742] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 857.120036][T18742] RIP: 0033:0x7fe7a7b8f7c9 [ 857.120048][T18742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 857.120062][T18742] RSP: 002b:00007fe7a8973038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 857.120077][T18742] RAX: ffffffffffffffda RBX: 00007fe7a7de5fa0 RCX: 00007fe7a7b8f7c9 [ 857.120087][T18742] RDX: 0000000000000000 RSI: 0000000040146f2c RDI: 0000000000000003 [ 857.120097][T18742] RBP: 00007fe7a7c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 857.120106][T18742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 857.120116][T18742] R13: 00007fe7a7de6038 R14: 00007fe7a7de5fa0 R15: 00007ffc71652b18 [ 857.120130][T18742] [ 857.120135][T18742] Modules linked in: [ 857.120390][T18742] ---[ end trace 0000000000000000 ]--- [ 857.125581][T18742] RIP: 0010:vidtv_psi_desc_assign+0x24/0x90 [ 857.125616][T18742] Code: 90 90 90 90 90 90 0f 1f 40 d6 41 54 55 48 89 f5 53 48 89 fb e8 fd 68 b9 f9 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 75 47 4c 8b 23 49 39 ec 74 36 e8 d9 68 b9 f9 4d 85 e4 [ 857.125632][T18742] RSP: 0018:ffffc90005457a20 EFLAGS: 00010247 [ 857.125645][T18742] RAX: dffffc0000000000 RBX: 0000000000000005 RCX: ffffc90018c5e000 [ 857.125656][T18742] RDX: 0000000000000000 RSI: ffffffff880501e3 RDI: 0000000000000005 [ 857.126091][T18742] RBP: ffff888031527da0 R08: 0000000000000000 R09: 4453534204050000 [ 857.126104][T18742] R10: 0000000000000005 R11: ffff88802f8d29b0 R12: 0000000000000000 [ 857.126115][T18742] R13: ffff88803178c9c0 R14: ffff88807a1b9100 R15: ffff88803178c440 [ 857.126126][T18742] FS: 00007fe7a89736c0(0000) GS:ffff8881248fc000(0000) knlGS:0000000000000000 [ 857.126144][T18742] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 857.126155][T18742] CR2: 0000556d1c69e950 CR3: 0000000028b52000 CR4: 00000000003526f0 [ 857.126167][T18742] Kernel panic - not syncing: Fatal exception [ 857.126229][T18742] Kernel Offset: disabled