last executing test programs: 8m51.836227657s ago: executing program 3 (id=3595): r0 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) write$auto(r0, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) close_range$auto(0x0, 0xffffffffffffffff, 0x2) socket(0x15, 0x5, 0x0) epoll_create$auto(0x12b8) socket$nl_generic(0x10, 0x3, 0x10) socket(0xf, 0x1807, 0x3fc) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000040), 0x2400, 0x0) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000080), 0x80040, 0x0) ioctl$auto(0x3, 0xae41, r2) ioctl$auto_KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f0000000080)={0x1, 0x0, 0x3, 0xd4}) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x4, 0x8000) r3 = prctl$auto_PR_TIMER_CREATE_RESTORE_IDS_ON(0xe9, 0x1, 0xffffffffffffffff, 0x7fff, 0x5) setsockopt$auto(r3, 0x6, 0x3, &(0x7f0000000080)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x4) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) r4 = socket(0x11, 0x3, 0x9) capset$auto(0x0, &(0x7f0000000000)={0x1, 0x6, 0x48}) sendmmsg$auto(r4, &(0x7f00000001c0)={{&(0x7f0000000000), 0x1aa, &(0x7f0000000100)={&(0x7f0000000040)="4a67d23edb3100000000000000000075210d2de48306c2fb", 0x49}, 0x5, &(0x7f0000000180), 0x5}, 0x1}, 0x2, 0x3) mmap$auto(0x0, 0x8, 0x72, 0x8b72, 0x8f1, 0x8000) mmap$auto(0x0, 0x202000a, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) sysfs$auto(0x2, 0x10000000000002b, 0x0) r5 = fsopen$auto(0x0, 0x1) fsconfig$auto(r5, 0x8, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) openat$auto_tracing_saved_cmdlines_size_fops_trace(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/tracing/saved_cmdlines_size\x00', 0x90001, 0x0) sendmsg$auto_NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16, @ANYBLOB="010026bd7000fddbdf2507"], 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x4000800) r6 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1c00"], 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) 8m51.431071932s ago: executing program 3 (id=3599): shmctl$auto_IPC_RMID(0x6, 0x0, 0x0) socket(0x2, 0x3, 0x4) setsockopt$auto(0x3, 0x0, 0x20, 0x0, 0x28) r0 = socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x2, 0x1) setresuid$auto(0x8, 0x8, 0x0) r1 = setfsuid$auto(0xee00) setreuid$auto(r1, 0x0) mq_open$auto(0x0, 0x7e, 0x9, 0x0) socket(0xa, 0x801, 0x84) fsopen$auto(0x0, 0x1) epoll_create$auto(0x4) r2 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000001340), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_nlctrl(&(0x7f0000003fc0), 0xffffffffffffffff) sendmsg$auto_CTRL_CMD_GETFAMILY2(r3, &(0x7f00000040c0)={0x0, 0x0, &(0x7f0000004080)={&(0x7f0000004000)={0x24, r4, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@CTRL_ATTR_FAMILY_NAME={0xf, 0x2, 'veth0_vlan\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000050) sendmsg$auto_HWSIM_CMD_NEW_RADIO(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002bbd7000fcdbdf2504"], 0x20}, 0x1, 0x0, 0x0, 0x24040000}, 0x18800) close_range$auto(0x2, 0x8, 0x0) 8m51.165850536s ago: executing program 3 (id=3602): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r0 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000080)='/proc/driver/rtc\x00', 0x88000, 0x0) pread64$auto(r0, 0x0, 0x1f, 0x0) 8m51.084378166s ago: executing program 3 (id=3603): mmap$auto(0x0, 0x20009, 0xffffffffffffffff, 0xeb1, 0x401, 0x8000) r0 = socket(0x1d, 0x2, 0x6) r1 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$auto(r0, &(0x7f0000000040)=@can={0x1d, r2, 0xfd}, 0x6a) close_range$auto(0x2, 0x8, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/pids.peak\x00', 0x8000, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) socket(0x29, 0x2, 0x0) r3 = openat$auto_state_fops_(0xffffffffffffff9c, 0x0, 0x1e9482, 0x0) read$auto_state_fops_(r3, &(0x7f0000000180)=""/61, 0xfffffeeb) socket(0xa, 0x2, 0x88) r4 = socket(0xa, 0x2, 0x8) rt_sigqueueinfo$auto(0x0, 0x4, &(0x7f0000000000)={@siginfo_0_0={0x1ff, 0x15, 0x7e73, @_timer={0x0, 0x80000001, @sival_int=0x2, 0x2}}}) r5 = socket(0x11, 0x3, 0x9) sendmmsg$auto(r5, &(0x7f00000001c0)={{&(0x7f0000000000), 0x5ac, &(0x7f0000000100)={&(0x7f0000000440), 0x12}, 0x5, &(0x7f0000000180), 0x5, 0xe}, 0x5}, 0x2, 0x100) setsockopt$auto(r4, 0x29, 0x37, &(0x7f0000000080)='\x15!\xa8^J/\xddCx4!\x00\xd3\x8f\x1e\x1b\xc3 \xe2\xa8\xd6\xd9\xc0\xa2\x0f\x88\xb1e\x8a\xd8?\xfe\xda\xc4\xef\xff(i\xc6@\x91[\vBj\x0eQ\xce\x16\'C\x8cYA\x92u\xd5\xb8\\\x82,\xe2=y\x9bR\xbcn\xa0c\x16~\x86\"t\xde\x14\xe4\xa5\xfe\xb5', 0x110) r6 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/virtual/net/nr15/queues/tx-0/tx_maxrate\x00', 0x10b942, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x161342, 0x100) r7 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/devices/virtual/mac80211_hwsim/hwsim1/ieee80211/phy1/rfkill3/state\x00', 0x102, 0x0) sendfile$auto(r7, r6, 0x0, 0x7) 8m50.275623863s ago: executing program 3 (id=3607): socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) fanotify_init$auto(0x200, 0x1) r0 = open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x84) fanotify_init$auto(0x2, 0x2000000000002) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'pimreg\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'wg0\x00', 0x0}) r3 = syz_genetlink_get_family_id$auto_wireguard(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$auto_WG_CMD_SET_DEVICE(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x24, r3, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r2}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e20}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000011}, 0x810) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) syz_genetlink_get_family_id$auto_ipvs(&(0x7f00000000c0), 0xffffffffffffffff) clock_getres$auto(0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'gretap0\x00'}) fanotify_mark$auto(0x0, 0x31, 0x9, r0, 0x0) 8m49.979770186s ago: executing program 3 (id=3610): mmap$auto(0x0, 0x2020005, 0x4, 0xeb1, 0xffffffffffffffff, 0x8000) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x80000, 0x0) bpf$auto_BPF_MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)=@token_create={0x2, r0}, 0x2) (async) bpf$auto_BPF_MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)=@token_create={0x2, r0}, 0x2) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/fail-nth\x00', 0xb0342, 0x0) writev$auto(r1, &(0x7f0000000400)={0x0, 0x400020000000002}, 0x3000000000) r2 = openat$auto_random_fops_random(0xffffffffffffff9c, 0x0, 0x2002, 0x0) sendfile$auto(r2, r2, 0x0, 0x1) (async) sendfile$auto(r2, r2, 0x0, 0x1) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/zswap/parameters/compressor\x00', 0xc0002, 0x0) (async) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/zswap/parameters/compressor\x00', 0xc0002, 0x0) write$auto_ocfs2_control_fops_stack_user(r1, &(0x7f0000000140)="034f5609a5d4747b2eaffdb5549a695b445a44e6d0acc4e3cc0949da2b1ea7f3856dd93f49d593202bed737e7f5528d44b5e90d20904dadfd855", 0x3e) (async) write$auto_ocfs2_control_fops_stack_user(r1, &(0x7f0000000140)="034f5609a5d4747b2eaffdb5549a695b445a44e6d0acc4e3cc0949da2b1ea7f3856dd93f49d593202bed737e7f5528d44b5e90d20904dadfd855", 0x3e) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r3 = socket(0x1e, 0x80003, 0x300) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$auto(0x1, 0xe983, 0xdf, 0xeb1, r3, 0x7ffd) r4 = openat$auto_dynamic_events_ops_trace_dynevent(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/tracing/dynamic_events\x00', 0x10d000, 0x0) write$auto_dynamic_events_ops_trace_dynevent(r4, &(0x7f0000000440)="d18073072a736762247c8cc09581e690a564fcd2101ec24bd675709511178d1d3ce826902ed3b3168a8e47e66fd8c1dcbf04c3a386307017443b4997c79f79a7fcd437a5899b6a82661c716b0574dc6fe125ca6b3b0959ec6395f7a25a8a33ffffffff000000000fe1d0b1d45d7085510400001066e1b34b9d10597503000400c30c926bc0d9c3123b9c56b2f5e0fc760ef2aa4d50470960bdf2cc075689d101669a1db1a2d077114b2bb33682e3566543bb30522e3450c16ebe9000153c181c810e5eb9f30700000000000000ef77", 0xdfde) (async) write$auto_dynamic_events_ops_trace_dynevent(r4, &(0x7f0000000440)="d18073072a736762247c8cc09581e690a564fcd2101ec24bd675709511178d1d3ce826902ed3b3168a8e47e66fd8c1dcbf04c3a386307017443b4997c79f79a7fcd437a5899b6a82661c716b0574dc6fe125ca6b3b0959ec6395f7a25a8a33ffffffff000000000fe1d0b1d45d7085510400001066e1b34b9d10597503000400c30c926bc0d9c3123b9c56b2f5e0fc760ef2aa4d50470960bdf2cc075689d101669a1db1a2d077114b2bb33682e3566543bb30522e3450c16ebe9000153c181c810e5eb9f30700000000000000ef77", 0xdfde) mmap$auto(0x0, 0x8, 0x2000df, 0x17, 0xffffffffffffffff, 0x8002) close_range$auto(0x2, 0x8, 0x0) openat$auto_bm_entry_operations_binfmt_misc(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/fs/binfmt_misc/syz1\x00', 0x80e02, 0x0) (async) r5 = openat$auto_bm_entry_operations_binfmt_misc(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/fs/binfmt_misc/syz1\x00', 0x80e02, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) getsockopt$auto_SO_PRIORITY(r2, 0x0, 0xc, &(0x7f0000000100)=')[\x00', &(0x7f00000001c0)=0xb) (async) getsockopt$auto_SO_PRIORITY(r2, 0x0, 0xc, &(0x7f0000000100)=')[\x00', &(0x7f00000001c0)=0xb) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x0, 0xfffff004, 0x2) mmap$auto(0x0, 0x20009, 0x10000000000df, 0x19, 0xffffffffffffffff, 0x400008000) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000180), 0x2201, 0x0) (async) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000180), 0x2201, 0x0) move_pages$auto(0x1, 0x2000000000003, 0x0, 0x0, 0x0, 0x8000400000000000) (async) move_pages$auto(0x1, 0x2000000000003, 0x0, 0x0, 0x0, 0x8000400000000000) ioctl$auto(0x3, 0x400454ca, 0x38) (async) ioctl$auto(0x3, 0x400454ca, 0x38) writev$auto(r5, &(0x7f0000000080)={0x0, 0x1}, 0x3) socketpair$auto(0x21, 0xae1, 0x8000000000000000, 0x0) socket(0x2, 0x1, 0x106) listen$auto(0x3, 0x880) 8m34.422878398s ago: executing program 32 (id=3610): mmap$auto(0x0, 0x2020005, 0x4, 0xeb1, 0xffffffffffffffff, 0x8000) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x80000, 0x0) bpf$auto_BPF_MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)=@token_create={0x2, r0}, 0x2) (async) bpf$auto_BPF_MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)=@token_create={0x2, r0}, 0x2) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/fail-nth\x00', 0xb0342, 0x0) writev$auto(r1, &(0x7f0000000400)={0x0, 0x400020000000002}, 0x3000000000) r2 = openat$auto_random_fops_random(0xffffffffffffff9c, 0x0, 0x2002, 0x0) sendfile$auto(r2, r2, 0x0, 0x1) (async) sendfile$auto(r2, r2, 0x0, 0x1) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/zswap/parameters/compressor\x00', 0xc0002, 0x0) (async) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/zswap/parameters/compressor\x00', 0xc0002, 0x0) write$auto_ocfs2_control_fops_stack_user(r1, &(0x7f0000000140)="034f5609a5d4747b2eaffdb5549a695b445a44e6d0acc4e3cc0949da2b1ea7f3856dd93f49d593202bed737e7f5528d44b5e90d20904dadfd855", 0x3e) (async) write$auto_ocfs2_control_fops_stack_user(r1, &(0x7f0000000140)="034f5609a5d4747b2eaffdb5549a695b445a44e6d0acc4e3cc0949da2b1ea7f3856dd93f49d593202bed737e7f5528d44b5e90d20904dadfd855", 0x3e) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r3 = socket(0x1e, 0x80003, 0x300) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$auto(0x1, 0xe983, 0xdf, 0xeb1, r3, 0x7ffd) r4 = openat$auto_dynamic_events_ops_trace_dynevent(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/tracing/dynamic_events\x00', 0x10d000, 0x0) write$auto_dynamic_events_ops_trace_dynevent(r4, &(0x7f0000000440)="d18073072a736762247c8cc09581e690a564fcd2101ec24bd675709511178d1d3ce826902ed3b3168a8e47e66fd8c1dcbf04c3a386307017443b4997c79f79a7fcd437a5899b6a82661c716b0574dc6fe125ca6b3b0959ec6395f7a25a8a33ffffffff000000000fe1d0b1d45d7085510400001066e1b34b9d10597503000400c30c926bc0d9c3123b9c56b2f5e0fc760ef2aa4d50470960bdf2cc075689d101669a1db1a2d077114b2bb33682e3566543bb30522e3450c16ebe9000153c181c810e5eb9f30700000000000000ef77", 0xdfde) (async) write$auto_dynamic_events_ops_trace_dynevent(r4, &(0x7f0000000440)="d18073072a736762247c8cc09581e690a564fcd2101ec24bd675709511178d1d3ce826902ed3b3168a8e47e66fd8c1dcbf04c3a386307017443b4997c79f79a7fcd437a5899b6a82661c716b0574dc6fe125ca6b3b0959ec6395f7a25a8a33ffffffff000000000fe1d0b1d45d7085510400001066e1b34b9d10597503000400c30c926bc0d9c3123b9c56b2f5e0fc760ef2aa4d50470960bdf2cc075689d101669a1db1a2d077114b2bb33682e3566543bb30522e3450c16ebe9000153c181c810e5eb9f30700000000000000ef77", 0xdfde) mmap$auto(0x0, 0x8, 0x2000df, 0x17, 0xffffffffffffffff, 0x8002) close_range$auto(0x2, 0x8, 0x0) openat$auto_bm_entry_operations_binfmt_misc(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/fs/binfmt_misc/syz1\x00', 0x80e02, 0x0) (async) r5 = openat$auto_bm_entry_operations_binfmt_misc(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/fs/binfmt_misc/syz1\x00', 0x80e02, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) getsockopt$auto_SO_PRIORITY(r2, 0x0, 0xc, &(0x7f0000000100)=')[\x00', &(0x7f00000001c0)=0xb) (async) getsockopt$auto_SO_PRIORITY(r2, 0x0, 0xc, &(0x7f0000000100)=')[\x00', &(0x7f00000001c0)=0xb) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x0, 0xfffff004, 0x2) mmap$auto(0x0, 0x20009, 0x10000000000df, 0x19, 0xffffffffffffffff, 0x400008000) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000180), 0x2201, 0x0) (async) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000180), 0x2201, 0x0) move_pages$auto(0x1, 0x2000000000003, 0x0, 0x0, 0x0, 0x8000400000000000) (async) move_pages$auto(0x1, 0x2000000000003, 0x0, 0x0, 0x0, 0x8000400000000000) ioctl$auto(0x3, 0x400454ca, 0x38) (async) ioctl$auto(0x3, 0x400454ca, 0x38) writev$auto(r5, &(0x7f0000000080)={0x0, 0x1}, 0x3) socketpair$auto(0x21, 0xae1, 0x8000000000000000, 0x0) socket(0x2, 0x1, 0x106) listen$auto(0x3, 0x880) 8m19.994755077s ago: executing program 1 (id=3676): r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) getrandom$auto(0x0, 0x6000000, 0x3) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) io_uring_setup$auto(0x6, 0x0) madvise$auto_MADV_GUARD_INSTALL(0x0, 0x2021000, 0x66) mmap$auto(0x0, 0x20009, 0xfffffffffffffff3, 0x12, 0x401, 0x7ffc) fsconfig$auto(r0, 0x4, &(0x7f0000000040)='+\x00@4\x95\x96XD\x11T\x11\xac@\xb9\'\xa8\x99\xf6\x99\xad\xa2v\xd55iU\xea|-\x87\x9f-\x86vF,\xd1{\xe8\xbe\xa5\b,\xa8\x00\x00\x00\x00\x00\x00\x00\x00TyM%\xcb\x84\x14\xce\x12\x99\xd3\x1f\xde\xd6t\x06M!\xdb-\x06\b\xc58.\x94\xb7\x0e2\xd7\xad\xfaR\x99\xdd\xacbu\xf3|\\;\x9f~\x05\xdf \x03\xfb\xd6ru\x93\xeb\xd3A\x10\x84Y\xf2N=\x14%\xa9\xe7\x9a\xd6\xa6\xa2\x99\x00', 0x0, 0x0) r1 = openat$auto_posix_clock_file_operations_posix_clock(0xffffffffffffff9c, &(0x7f00000000c0), 0x7b0b42, 0x0) ioctl$auto_posix_clock_file_operations_posix_clock(r1, 0x6, 0x0) 8m19.573616329s ago: executing program 1 (id=3681): openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x40280, 0x0) close_range$auto(0x2, 0x8, 0x0) openat$auto_evdev_fops_evdev(0xffffffffffffff9c, 0x0, 0x34d802, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x101, 0x0) execve$auto(&(0x7f0000000000)=':,\x00', 0x0, 0x0) r0 = openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/pcmC0D0c\x00', 0x2800, 0x0) ioctl$auto_SNDRV_PCM_IOCTL_WRITEN_FRAMES2(r0, 0x40184152, 0x0) r1 = bpf$auto(0x0, 0x0, 0x6f4) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/irq/7/effective_affinity\x00', 0x8081, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/net/lapb5/addr_assign_type\x00', 0x101f43, 0x0) read$auto_blk_mq_debugfs_fops_blk_mq_debugfs(r1, &(0x7f0000000100)=""/2, 0x2) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/zswap/parameters/compressor\x00', 0x840042, 0x0) mmap$auto(0x0, 0x5, 0xdf, 0x9b72, 0x7, 0x28000) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r2, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) r3 = openat$auto_deferred_devs_fops_(0xffffffffffffff9c, &(0x7f0000000000), 0xe00, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$auto_nfsd(&(0x7f0000000340), 0xffffffffffffffff) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$auto_NFSD_CMD_THREADS_SET(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000100)={0x1c, r5, 0x1, 0x70bd2c, 0x25dfdc01, {}, [@NFSD_A_SERVER_THREADS={0x8, 0x1, 0x4a}]}, 0x1c}}, 0xc000) read$auto(r3, 0x0, 0x4) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) openat$auto_proc_pid_cmdline_ops_base(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/cmdline\x00', 0x481, 0x0) mmap$auto(0x0, 0x8, 0xdc, 0xeb1, 0x0, 0x8002) close_range$auto(0x2, 0x8, 0x0) 8m18.347917147s ago: executing program 1 (id=3688): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptyc9\x00', 0x90002, 0x0) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r0, 0x0, 0x20) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r1, &(0x7f0000000200)={0x0, 0x7}, 0x3) ioctl$auto_UI_SET_ABSBIT(r1, 0x40045567, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x2, 0xa, 0x106) sendmsg$auto_NETDEV_CMD_QUEUE_GET(r3, &(0x7f0000003040)={0x0, 0x0, &(0x7f0000003000)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x20040004}, 0x20008810) r4 = syz_genetlink_get_family_id$auto_thermal(&(0x7f0000000200), r3) sendmsg$auto_THERMAL_GENL_CMD_TZ_GET_TRIP(r3, &(0x7f0000001c40)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001c00)={&(0x7f0000005dc0)={0x34, r4, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@THERMAL_GENL_ATTR_TZ={0x4}, @THERMAL_GENL_ATTR_THRESHOLD_DIRECTION={0x8, 0x1a, 0x6}, @THERMAL_GENL_ATTR_CDEV_MAX_STATE={0x8, 0x11, 0x4}, @THERMAL_GENL_ATTR_TZ_CDEV_WEIGHT={0x8, 0xb, 0x6}, @THERMAL_GENL_ATTR_TZ_GOV={0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) sendmsg$auto_THERMAL_GENL_CMD_THRESHOLD_FLUSH(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000440)={0x174, r4, 0x8, 0x70bd28, 0x25dfdbff, {}, [@THERMAL_GENL_ATTR_CPU_CAPABILITY_ID={0x8, 0x15, 0x8}, @THERMAL_GENL_ATTR_CPU_CAPABILITY={0x155, 0x14, 0x0, 0x1, [@nested={0x80, 0x6e, 0x0, 0x1, [@generic="651d0f32e0ce72f6daf0484bc447077ef1ccca678534c101f86f3f595c90291d4b1b18a050b609154fab23eace8d20f8e5214712394cbef486383f986db72a4f721cbb3a6d2cd25fb2537aac02ab72365a75bdb91cd08d1d8bf20e52ce1f47e085a363967a2d99bc00b8f9a32b85d99fb280e20d29a6b2f1", @nested={0x4, 0x24}]}, @generic="f548f9d1a582b3aca1df1e2ea5a670", @generic="3b00740ef051adfc49a950aa037b0dc7718abd1c434de473f86032a96548b9db3a8b7d6c349931b1d1fcb923f5c89fd85c270b49c7b5d587a8042d467cd76145499d78c206fcf04103c606c28b132206022b2102101eb5036a98ea76868df5cf14ed50cd07f48e92e8bff40d7293cb4a9f7be707ae2ed148f60abfdb0b859000a4eb422c81453aea55cb404241eeda7b379a59b97d8a9d326591bdab923f69558cc47f85891233c4042036bf6203dcaf77c79f0dd67c920f1fe04de25277cc7699b2"]}]}, 0x174}}, 0x40040) ioctl$auto_SNDCTL_DSP_GETODELAY(0xffffffffffffffff, 0x80045035, 0x0) open(0x0, 0x149443, 0x0) mount$auto(&(0x7f0000000000)='veth1_vlan\x00', 0x0, &(0x7f0000000240)='hfs\x00\x81\xe2\xde\xa8\xb7\xc4G[*}\xaa{\xf1\x86\xf7d@\xe8Y\xea\xb1H\x01\xff\"^\'6\xba\xa9s\x1d\xf4\xe1i\xc5\xb6_B\xa7KFS\xc1\xa7\x8e*h\xe3\x8b\x7f\xca\xfcNEi\x84?\x82\xff\xf2\xac\xd1\xee\xf4\x9a?\xac\x11\x88\aO\x84\xe6k\a\x9bY\xddx\xb8\xdf\vHv\xb5\f\xbc\b\xc0\xfa\xc0\xfe\xa6\xce\xbd\x03\x00\x93\xdc4\x97\xce\xd5&\x93\xae\x05q\xe9\xa8?\x00\xbdi\x88q\xd0w\xfd@\r\xce\xe4\xadrt`\xf8`b\xbf\xeci\x93a\xc6o\x9ej\xe4\xa3\x9d\xaa\xe1\xe1N\n\xbcq\n[\"5\xd4\xa6\x96#).\xbd\x8aD\x88>8J\v\xb5\x99H\xc5\a\xc9\xcf\xbc\x85\xbf\x85\x81\x0f\x7f8\x11\xdbK\xf3\xc2#\x18 \xdf\x05\xcd\xbb\xc03_\xb7Q@\xf2G', 0x7, 0x0) r5 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x8000, 0x0) socket(0x15, 0x5, 0x0) r6 = open(&(0x7f0000000000)='./file0\x00', 0x261c2, 0x84) bpf$auto(0x1, &(0x7f0000000380)=@raw_tracepoint={0x5, r6, 0x0, 0x6}, 0xc) ioctl$auto_SNDCTL_DSP_SETFRAGMENT(r6, 0xc004500a, 0x0) openat$auto_blk_mq_debugfs_fops_blk_mq_debugfs(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$auto_SNDCTL_DSP_SPEED(r5, 0xc0045002, 0x0) 8m17.670042054s ago: executing program 1 (id=3689): sendfile$auto(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) 8m17.438914755s ago: executing program 1 (id=3691): close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) set_mempolicy$auto(0x6, 0x0, 0x21) unshare$auto(0x40000080) r0 = socket$nl_generic(0x11, 0x3, 0x10) bind$auto(r0, &(0x7f0000000200)=@generic={0x11, "0000100000000000929e006300"}, 0x80) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x88b, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) sendmsg$auto_THERMAL_GENL_CMD_TZ_GET_TEMP(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="770e0000", @ANYRES16=0x0, @ANYBLOB="080028bd7000fddbdf250300000008000600020000000c0014"], 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x405b) sendmsg$auto_BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="110b27bd7000ffdbdf250900000800"], 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x1000) sendmsg$auto_BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000336bd7000fedbdf2502"], 0x24}, 0x1, 0x0, 0x0, 0xc045}, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) bpf$auto(0x5, &(0x7f0000000000)=@bpf_attr_0={0x8000, 0x1, 0x8, 0x7, 0x5, 0xffffffffffffffff, 0x80000001, "787d66da4a620eab7f736e854ef61529", 0x0, 0xffffffffffffffff, 0x7, 0xffff4e8b, 0x2, 0x1}, 0x7) r2 = socket(0x10, 0x2, 0x0) sendmmsg$auto(r2, &(0x7f0000000080)={{0x0, 0x8002, &(0x7f00000002c0)={0x0, 0xc4}, 0x2, 0x0, 0x0, 0x1}, 0x5}, 0x3, 0x0) r3 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) ioctl$auto_BTRFS_IOC_BALANCE_V2(r3, 0xc4009420, &(0x7f0000000300)={0x5, 0x0, {0x6, @btrfs_balance_args_1_1={0x101, 0x4}, 0xffffffffffff0c3d, 0x8, 0x80, 0x8, 0x5, 0x3, 0x1, @limit=0x8, 0x5f6b, 0xd}, {0x37, @usage=0xfffffffffffffffb, 0xc, 0x30000, 0x5, 0x4, 0x0, 0x8, 0x9, @limit=0x3, 0x0, 0x4}, {0x3, @btrfs_balance_args_1_1={0x3, 0x6}, 0x9, 0x8000000000000000, 0x9, 0x7, 0xd9e, 0xfffffffffffffffb, 0x8, @limit=0x7c, 0x81, 0x80000001}, {0x6, 0x4, 0x31}}) writev$auto(r1, &(0x7f0000000100)={0x0, 0x40}, 0xa) unshare$auto(0x40000080) syz_genetlink_get_family_id$auto_tipcv2(0x0, 0xffffffffffffffff) mmap$auto(0x3, 0x5, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) io_setup$auto(0xffff, &(0x7f0000000580)) ioctl$auto_UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000100)={0x8, 0x400, 0x695c811f}) sendmmsg$auto(0x3, &(0x7f0000000000)={{0x0, 0x2506, &(0x7f00000002c0)={0x0, 0xac}, 0x5, 0x0, 0x1, 0x3a32182}, 0xed7138b}, 0x2, 0x9) recvmmsg$auto(0x4, 0x0, 0x7, 0xe, 0x0) io_uring_setup$auto(0x6, 0x0) 8m5.687624071s ago: executing program 1 (id=3715): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000740), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'netdevsim0\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000200)={0x40, r1, 0x1, 0x74bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_COALESCE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x15, 0x1, r2}]}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x8}, @ETHTOOL_A_COALESCE_RX_USECS={0x8, 0x2, 0x87}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES={0x8, 0x7, 0x5}, @ETHTOOL_A_COALESCE_RX_USECS_IRQ={0x8, 0x4, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x48c1}, 0x20000000) 8m5.158252951s ago: executing program 33 (id=3715): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000740), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'netdevsim0\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000200)={0x40, r1, 0x1, 0x74bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_COALESCE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x15, 0x1, r2}]}, @ETHTOOL_A_COALESCE_RX_USECS_LOW={0x8, 0xe, 0x8}, @ETHTOOL_A_COALESCE_RX_USECS={0x8, 0x2, 0x87}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES={0x8, 0x7, 0x5}, @ETHTOOL_A_COALESCE_RX_USECS_IRQ={0x8, 0x4, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x48c1}, 0x20000000) 2m11.110486104s ago: executing program 0 (id=5015): r0 = openat$auto_ipsec_dbg_fops_ipsec(0xffffffffffffff9c, &(0x7f0000001240)='/sys/kernel/debug/netdevsim/netdevsim0/ports/3/ipsec\x00', 0x400, 0x0) mmap$auto(0x0, 0x2000c, 0xdf, 0x20eb1, 0x40000000000a5, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/fail-nth\x00', 0x802, 0x0) r2 = io_uring_setup$auto(0x55, &(0x7f0000000100)={0x7fffffff, 0x1d, 0x3000, 0x6, 0x7, 0x400b, 0xffffffffffffffff, [], {0x6, 0x80006, 0x8c48, 0x7, 0x3, 0x7f, 0x0, 0x2}, {0x100, 0x9, 0x53, 0x81, 0x2, 0x1a7b870a, 0x76c5, 0x8, 0xffffffff}}) ioctl$auto_TUNSETVNETHDRSZ(r2, 0x400454d8, 0x0) ioctl$auto_SNDCTL_SEQ_CTRLRATE(r2, 0xc0045103, &(0x7f00000000c0)="71557d440588a0135b026565f75b02e61626969b96181fadbaa6eee40a2dbd07d6fb6af216cf1dbbd05f8e2873bd914c42bbdef31c3bcc5d4e1b257651c16424584b584d92e79f29e0e49346ed202f97983594b0333626bad170f7ded240b9db94ae9ac381f4e8d7926bdbee9a8557e4338d77e5ccb158d34758e5407ae5fa522a972d0a01") close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x80002, 0x73) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/platform/vidtv.0/i2c-0/new_device\x00', 0x2001, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket(0x2, 0x2, 0x88) readv$auto(0x3, &(0x7f0000000600)={0x0, 0xfdf3}, 0x1da) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) write$auto(0x3, 0x0, 0xfdf3) r3 = socket(0x2, 0x1, 0x0) mknod$auto(&(0x7f0000000180)=':,\x00', 0xcb, 0xfffffffa) execve$auto(&(0x7f0000000000)=':,\x00', 0x0, 0x0) r4 = socket(0xa, 0x2, 0x73) sendto$auto(r4, 0x0, 0x402, 0x0, &(0x7f0000000000)=@generic={0xa, "e2e18340cba8fe8000"}, 0x1c) openat$auto_tun_fops_tun(0xffffffffffffff9c, 0x0, 0x400, 0x0) listen$auto(r3, 0xa1) r5 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card1/pcm0p/sub7/info\x00', 0x40, 0x0) read$auto(r5, 0x0, 0x100000000) r6 = openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/fb0\x00', 0x20401, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x4610, 0x0) writev$auto(r1, &(0x7f0000000200)={0x0, 0x7ffffffff000}, 0x3) read$auto_ipsec_dbg_fops_ipsec(r0, 0x0, 0x0) 2m10.878930225s ago: executing program 0 (id=5017): openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x2041, 0x0) close_range$auto(0x0, 0xfffffffffffff001, 0x2) socket(0x2, 0x1, 0x0) socket(0x18, 0xa, 0x0) socket$nl_generic(0x10, 0x3, 0x10) memfd_create$auto(&(0x7f00000001c0)='\xc4-\x02\xcbtk\xa8\xc8*\x7f\xeb\x1eY\x14\xa6!\x1b\xd4\x88\xa6\x96)J\x00\xa2V$4j', 0x4) mmap$auto(0x0, 0x8, 0x1000000016, 0x13, 0x3, 0x400180000000) fallocate$auto(0x8000000000000003, 0x1000000, 0xf, 0x200000002) bpf$auto(0x5, 0x0, 0x7) msync$auto(0x1ffff000, 0x1800000000000fe, 0x400000004) openat$auto_xfs_dir_file_operations_xfs_file(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/bluetooth/hci1/rfkill6/power\x00', 0x30f002, 0x0) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, 0x0, 0x40800) mbind$auto(0xfffffffffffffff9, 0x0, 0x6, 0x0, 0x6, 0x2) 2m10.32401415s ago: executing program 0 (id=5020): mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS0\x00', 0x8000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x89fc, &(0x7f0000000000)={'tunl0\x00'}) r2 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snd/controlC2\x00', 0x80, 0x0) ioctl$auto(r2, 0xc0045520, r0) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000440)='/sys/devices/virtual/bdi/43:416/max_ratio_fine\x00', 0x63102, 0x0) r4 = socket(0x10, 0x3, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x40342, 0x22) utimensat$auto(r5, &(0x7f0000001c80)='\x00', 0x0, 0x1000) bpf$auto_BPF_LINK_DETACH(0x22, &(0x7f0000000000)=@link_detach, 0x8) r6 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/dev_snmp6/bridge_slave_0\x00', 0x64040, 0x0) close_range$auto(r6, r4, 0x0) r7 = ioctl$auto_KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$auto_USBDEVFS_IOCTL32(r7, 0xc00c5512, &(0x7f00000001c0)={0x7fffffff, 0x15a, 0xb7}) r8 = openat$auto_fops_ulong_ro_(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/ieee80211/phy18/netdev:wlan1/stations/08:02:11:00:00:00/tx_filtered\x00', 0x14000, 0x0) bpf$auto(0x0, &(0x7f0000000300)=@link_update={r5, @new_prog_fd=r8, 0x9, @old_map_fd=r5}, 0x14) fstat$auto(0xffffffffffffffff, &(0x7f0000000000)={0x5, 0x80000001, 0x0, 0x100, 0xee01, 0x0, 0x0, 0xffffffffffffff91, 0xfd3, 0x2, 0xec, 0x4, 0x80000000081, 0x8, 0x2, 0xfffffffffffffff8}) openat$auto_vmuser_fops_vmci_host(0xffffffffffffff9c, &(0x7f0000000040), 0x20200, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1a00"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x10007}, 0x3, 0x0) socketpair$auto(0x113, 0xfffffff9, 0xf, &(0x7f0000000000)=0xa86b) setgroups$auto(0xe32, 0x0) sendfile$auto(r3, r3, 0x0, 0x2) 2m10.034081704s ago: executing program 0 (id=5021): write$auto(0xffffffffffffffff, 0x0, 0x100000a3d9) execve$auto(0x0, 0x0, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) r0 = open(&(0x7f0000000100)='.\x00', 0x595002, 0x408) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) sendmsg$auto_NL80211_CMD_SET_STATION(0xffffffffffffffff, 0x0, 0x2000c040) syz_genetlink_get_family_id$auto_nl802154(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$auto_NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x864) sendmsg$auto_NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81}, 0x44044093) r1 = socket(0x11, 0x80003, 0x300) sendto$auto(r1, 0x0, 0x13, 0x2, &(0x7f0000000000)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x41, 0x3, 0x2}}, 0x1e) write$auto(r0, 0x0, 0xfffffdf1) msgctl$auto_IPC_RMID(0x0, 0x0, &(0x7f00000001c0)={{0xb, 0xee00, 0xee00, 0x1ff, 0x8, 0x1, 0x7ff}, &(0x7f0000000140)=0x5, &(0x7f0000000180)=0x77, 0x34d5, 0xb75a, 0x9, 0x4, 0x3, 0xd, 0x9, 0x8, @inferred=0xffffffffffffffff, @raw=0xfffffff8}) unshare$auto(0x40000080) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/midiC2D0\x00', 0x0, 0x0) r3 = openat$auto_mousedev_fops_mousedev(0xffffffffffffff9c, &(0x7f0000001140)='/dev/psaux\x00', 0x42000, 0x0) io_uring_setup$auto(0x59, &(0x7f0000000080)={0x7ffffffc, 0x8, 0x3000, 0x6, 0x7, 0x400b, r3, [], {0x6, 0x2000006, 0x8c48, 0x29a, 0x9, 0x80, 0x104, 0x6, 0x4}, {0x100, 0x1, 0x0, 0x85, 0x2, 0x24, 0xfe000000, 0x8, 0x9}}) r4 = openat$auto_vhci_fops_hci_vhci(0xffffffffffffff9c, &(0x7f0000000d00), 0x0, 0x0) read$auto_vhci_fops_hci_vhci(r4, &(0x7f0000000d40)=""/16, 0x10) select$auto(0xe, 0x0, 0x0, &(0x7f0000000580)={[0x1ff, 0x8000, 0xd, 0x1, 0x948d, 0x3, 0x10015f4da0a, 0xd, 0x7, 0x64c1, 0xffffffffffffffff, 0x8, 0x7fff, 0xc, 0x2, 0x2]}, 0x0) write$auto(r2, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) r5 = openat$auto_dma_heap_fops_dma_heap(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$auto_dma_heap_fops_dma_heap(r5, 0xffffffffffdffe00, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) socket(0x10, 0x2, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0xc3002, 0x0) 2m8.13292889s ago: executing program 0 (id=5032): unshare$auto(0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000180), r0) sendmsg$auto_OVS_DP_CMD_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x70bd26, 0x25dfdbf8, {}, [@OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x4}, @OVS_DP_ATTR_NAME={0x8, 0x1, 'HfR\x00'}, @OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x801}, 0x80) r2 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000080), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_OVS_DP_CMD_DEL(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0109080000000000002502"], 0x38}, 0x1, 0x0, 0x0, 0x20040011}, 0x20000000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mlockall$auto(0x7) mremap$auto(0x0, 0x4, 0x4, 0x7, 0x100000000) mmap$auto(0x0, 0x4020009, 0x1e, 0xebf, 0x401, 0x8000) openat$auto_ftrace_set_event_notrace_pid_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing/set_event_notrace_pid\x00', 0x40000, 0x0) mmap$auto(0x0, 0x2020009, 0x100003, 0x9000000eb1, 0xfffffffffffffffa, 0x0) read$auto(0xffffffffffffffff, 0x0, 0x1) r4 = openat$auto_trace_options_fops_trace(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/tracing/options/blk_cgname\x00', 0x5, 0x0) write$auto(r4, 0x0, 0x6) socket(0x1d, 0x2, 0x2) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) socketpair$auto(0x4, 0x2, 0x3, 0x0) socket(0x10, 0x1, 0x0) read$auto(0x3, 0x0, 0x10) write$auto(0x3, 0x0, 0xffd8) r5 = socket(0x10, 0x2, 0x0) mmap$auto(0x0, 0x400008, 0xde, 0x11, r5, 0x8000) socket(0x80000000000000a, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'tunl0\x00'}) 2m6.921615607s ago: executing program 0 (id=5039): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_mISDN_fops_timerdev(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000140), 0x406a1, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) move_pages$auto(0x1, 0x2000000000003, 0x0, 0x0, 0x0, 0x8000400000000000) ioctl$auto(0x3, 0x400454ca, 0x38) select$auto(0xe, 0x0, 0x0, &(0x7f0000000040)={[0xfffffffffffffffd, 0xb, 0xa, 0x40007fff, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x5e, 0x80000001, 0x7, 0x2, 0x93, 0x400000001, 0x2]}, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) lsm_list_modules$auto(0x0, 0x0, 0x0) writev$auto(0x3, &(0x7f0000000080)={0x0, 0x646}, 0x3) ioctl$auto_IMADDTIMER(r0, 0x80044940, 0x0) madvise$auto_MADV_GUARD_REMOVE(0x180000, 0xfff, 0x67) 1m51.231604967s ago: executing program 34 (id=5039): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_mISDN_fops_timerdev(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000140), 0x406a1, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) move_pages$auto(0x1, 0x2000000000003, 0x0, 0x0, 0x0, 0x8000400000000000) ioctl$auto(0x3, 0x400454ca, 0x38) select$auto(0xe, 0x0, 0x0, &(0x7f0000000040)={[0xfffffffffffffffd, 0xb, 0xa, 0x40007fff, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x5e, 0x80000001, 0x7, 0x2, 0x93, 0x400000001, 0x2]}, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) lsm_list_modules$auto(0x0, 0x0, 0x0) writev$auto(0x3, &(0x7f0000000080)={0x0, 0x646}, 0x3) ioctl$auto_IMADDTIMER(r0, 0x80044940, 0x0) madvise$auto_MADV_GUARD_REMOVE(0x180000, 0xfff, 0x67) 13.834419057s ago: executing program 2 (id=5475): write$auto(0xffffffffffffffff, 0x0, 0x100000a3d9) execve$auto(0x0, 0x0, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0xdb72, 0x7, 0x28000) open(&(0x7f0000000100)='.\x00', 0x595002, 0x408) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) sendmsg$auto_NL80211_CMD_SET_STATION(0xffffffffffffffff, 0x0, 0x2000c040) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) ioctl$auto_KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$auto(0x3, 0x20ae41, r0) ioctl$auto(0x3, 0xae41, 0xffffffffffffffff) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptywf\x00', 0x1, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x60742, 0x0) socket(0x2, 0x1, 0x106) shutdown$auto(0x200000003, 0x2) poll$auto(0x0, 0x5, 0x400) socket$nl_generic(0x10, 0x3, 0x10) socket(0x11, 0x3, 0x9) ioctl$auto_AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) openat$auto_stat_fops_per_vm_kvm_main(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/kvm/preemption_reported\x00', 0x105641, 0x0) unshare$auto(0x40000080) mmap$auto(0xfffffffffffffffe, 0x580f, 0x112f4a03, 0x8000000008011, 0x3, 0x0) fadvise64$auto(0xffffffffffffffff, 0x0, 0xffffffff80000001, 0x8) futex_waitv$auto(&(0x7f0000000000)={0xb, 0x7ffffffff000, 0x6}, 0x1, 0x0, 0x0, 0x623d) msgget$auto(0x0, 0x5) msgsnd$auto(0x0, &(0x7f0000000040)={0x5}, 0x1000, 0x4) msgctl$auto(0x0, 0x0, 0x0) syz_genetlink_get_family_id$auto_nl802154(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$auto_NL80211_CMD_NEW_KEY(0xffffffffffffffff, 0x0, 0x864) sendmsg$auto_NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81}, 0x44044093) socket(0x18, 0x80003, 0x300) 12.842838444s ago: executing program 2 (id=5479): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) bpf$auto(0x0, &(0x7f0000000040)=@bpf_attr_5={@target_ifindex, 0x7f, 0x0, 0x8, 0x1}, 0x92) openat$auto_udmabuf_fops_udmabuf(0xffffffffffffff9c, &(0x7f0000000040), 0x88400, 0x0) r0 = openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sg0\x00', 0x82802, 0x0) write$auto(r0, &(0x7f0000000040)='S\x00\x00\x00\xfc\xff\xff\xff', 0x8587) io_uring_setup$auto(0xd, 0x0) close_range$auto(0x2, 0x8, 0x0) socketpair$auto(0xf3, 0x4, 0x8000000000000000, 0x0) r1 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS2\x00', 0xa2102, 0x0) ioctl$auto_TIOCSETD2(r1, 0x5423, 0x0) prctl$auto_PR_SET_MM_END_CODE(0x7, 0x2, 0x0, 0x480, 0x7) read$auto(r1, 0x0, 0x2) 12.510346347s ago: executing program 2 (id=5482): sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, 0x0, 0x8000) socket(0x2, 0x1, 0x106) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_console_fops_tty_io(0xffffffffffffff9c, 0x0, 0x102, 0x0) mmap$auto(0x0, 0x4000, 0xdf, 0xeb1, 0x401, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xfffffffffffffffe, 0x8000) ustat$auto(0x801, 0x0) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) madvise$auto(0x0, 0x2003f0, 0x15) lsm_list_modules$auto(0x0, 0x0, 0x0) r1 = openat$auto_dvb_demux_fops_dmxdev(0xffffffffffffff9c, &(0x7f00000000c0), 0x8040, 0x0) bpf$auto_BPF_PROG_LOAD(0x5, &(0x7f0000000440)=@bpf_attr_0={0x9a, 0x4, 0x2, 0x3, 0x7eb, 0xffffffffffffffff, 0x5, "e03f43000b26d5ea743998fb57339a75", 0x0, 0xffffffffffffffff, 0x9, 0x3, 0x6, 0xfffffffffffffff3}, 0x7ff) ioctl$auto_dvb_demux_fops_dmxdev(r1, 0x40000403c6f2b, 0x0) ioctl$auto_dvb_demux_fops_dmxdev(r1, 0x6f29, 0x0) 11.393621912s ago: executing program 2 (id=5483): open(0x0, 0x42a40, 0x12) r0 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x101c82, 0x0) write$auto(r0, &(0x7f0000000340)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k\x0e\xfa{\x15\x1d\x11\x85o\xf1g\xb7\xb3\xdd\\\xfdG\xa4\xe9\xd1\xf4S\x94\xe1\x9c\x88\x1b\xe6.\x11^\xd8]\x82\x13\x93\xf2Q\xc7iB\xc84\x17\r\x90\xa2\x11\x03\xb4e\x05\x96\x0ec\x12\xea\xd5K\xea\xda\xa3\xfa\xc3\xedr\x17\xa5\x1c\x88{v\xb8\bj\x84\xd8g\x05r\xefn\x7f^\x9d\xc7V\x92\xb9Z.Uc*K\x00\x00\x00', 0x81) bpf$auto_BPF_LINK_CREATE(0x1c, 0x0, 0x19) r1 = fanotify_init$auto(0x5, 0x2000000000002) r2 = open(&(0x7f0000000000)='.\x00', 0xc00, 0x409) fanotify_mark$auto(r1, 0x9, 0x9, r2, 0x0) preadv$auto(r2, &(0x7f0000000080)={0x0}, 0x4, 0x8001, 0x6) pipe$auto(0x0) close_range$auto(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 10.805410413s ago: executing program 2 (id=5485): openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x14fa02, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0x400000000e31, 0xffffffffffffffff, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) getrandom$auto(0x0, 0x6000000, 0x3) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) preadv2$auto(0x3, &(0x7f0000001000)={0x0, 0x9}, 0x5, 0x4, 0x6, 0x31) setresuid$auto(0x0, 0x0, 0x0) sendmsg$auto_NL80211_CMD_GET_STATION(0xffffffffffffffff, 0x0, 0x8000) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) pipe$auto(0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) vmsplice$auto(0x4, &(0x7f0000000040)={0x0, 0xd76}, 0x2, 0x5) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0x2062, 0x0) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) sched_setattr$auto(0x0, 0x0, 0x27b) msync$auto(0x1ffff000, 0x17ffffffffffffc, 0x400000004) getrandom$auto(&(0x7f0000000180)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0xfffffffffffffffa, 0x2) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) r1 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security/tomoyo/domain_policy\x00', 0x2, 0x0) write$auto_tomoyo_operations_securityfs_if(r1, 0x0, 0x0) fanotify_mark$auto(0xffffffffffffffff, 0x9, 0x9, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x408) getdents$auto(r2, 0x0, 0x400018) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) 10.354935898s ago: executing program 6 (id=5487): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x250008c8b792675e, 0x0) close_range$auto(0x0, 0xffffffffffffffff, 0x2) r1 = socket(0xa, 0x2, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) r2 = socket(0xa, 0x3, 0x3a) io_uring_setup$auto(0x6, 0x0) io_uring_register$auto(r2, 0x8, 0x0, 0x0) getsockopt$auto_SO_ERROR(r1, 0x7, 0x4, &(0x7f0000000080)='/dev/usbmon0\x00', &(0x7f00000000c0)=0xc) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) msync$auto(0x1ffff000, 0x180000001000000, 0x400000004) r3 = open(0x0, 0x0, 0x408) r4 = openat$auto_ftrace_event_id_fops_trace_events(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/tracing/events/vmalloc/purge_vmap_area_lazy/id\x00', 0xa2000, 0x0) read$auto_ftrace_event_id_fops_trace_events(r4, 0x0, 0x0) socket(0x28, 0x1, 0x0) mmap$auto(0x0, 0x61, 0x100001000000003, 0x9b72, 0x2, 0x8000) getsockopt$auto(0x3, 0x200000000001, 0x45, 0x0, 0x0) getdents$auto(r3, 0x0, 0x400018) mmap$auto(0x0, 0x4020009, 0xdf, 0x40000eb1, 0x401, 0x8000) clone$auto(0x100000008, 0x9, 0xfffffffffffffffe, 0xfffffffffffffffd, 0x4000006) clone$auto(0x1, 0x81, 0x0, 0x0, 0x2) madvise$auto(0xb1, 0x200007, 0xffff) mmap$auto(0x0, 0x5, 0xfff, 0x44eb2, 0x10006, 0x300000000000) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) preadv2$auto(r0, 0x0, 0x6, 0xffffffffffffffff, 0x4, 0x400) r5 = openat$auto_mon_fops_binary_mon_bin(0xffffffffffffff9c, &(0x7f0000000000)='/dev/usbmon0\x00', 0x82640, 0x0) r6 = openat$auto_buffer_percent_fops_trace(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/tracing/buffer_percent\x00', 0x50000, 0x0) landlock_add_rule$auto_LANDLOCK_RULE_NET_PORT(r6, 0x2, &(0x7f0000000180)="7154bb93b883f0406296d0748693ed44c4febc5a38ca7acbe2dba9f04dd643a5584995e02e36075743d41eb4c20170b1ec4cd7ed1f79ec3ef2a54a70ea1273d45921e77c4e87bbe0118b3756f09014f9209cef7718950363745f3558b8d2c66c7e3538857f08f6beddd423b5b92c53823cbe9b291b825fe25e9056ff897d0f1af1213ad12332173545996b209e84ad13b0237bd6dc68f04aa64e2bd82e291f6dab1bba563f666f31ccb472e7346cc5dd0481831bcac22c3f082f3c0edd31651799674046a9e7918cfd52680937", 0x5) readv$auto(r5, &(0x7f0000000380)={0x0, 0x8}, 0x8) 9.270290998s ago: executing program 6 (id=5490): close_range$auto(0x0, 0xfffffffffffff000, 0x2) r0 = socket(0x2, 0xa, 0x1) r1 = bpf$auto(0x0, &(0x7f00000000c0)=@bpf_attr_4={0x1f, r0, 0x10000}, 0x10) mmap$auto(0xff2f000000000000, 0x2009, 0xfffffffffffffff9, 0x8000200008011, r1, 0x8000) 8.708008869s ago: executing program 6 (id=5493): openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x14fa02, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0x400000000e31, 0xffffffffffffffff, 0x0) futex$auto(&(0x7f0000000080)=0x1, 0xb, 0x1, 0x0, 0x0, 0xfffffffa) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) getrandom$auto(0x0, 0x6000000, 0x3) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) setresuid$auto(0x0, 0x0, 0x0) sendmsg$auto_NL80211_CMD_GET_STATION(0xffffffffffffffff, 0x0, 0x8000) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) pipe$auto(0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) vmsplice$auto(0x4, &(0x7f0000000040)={0x0, 0xd76}, 0x2, 0x5) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0x2062, 0x0) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) sched_setattr$auto(0x0, 0x0, 0x27b) msync$auto(0x1ffff000, 0x17ffffffffffffc, 0x400000004) getrandom$auto(&(0x7f0000000180)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0xfffffffffffffffa, 0x2) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) write$auto_tomoyo_operations_securityfs_if(0xffffffffffffffff, 0x0, 0x0) fanotify_mark$auto(0xffffffffffffffff, 0x9, 0x9, 0xffffffffffffffff, 0x0) getdents$auto(0xffffffffffffffff, 0x0, 0x400018) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) 8.639177738s ago: executing program 2 (id=5494): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop6\x00', 0x169780, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r0, 0x1265, 0x0) 6.614459485s ago: executing program 4 (id=5498): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram11\x00', 0x14be02, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) preadv2$auto(r0, &(0x7f0000000080)={0x0, 0x80000003}, 0x6, 0xffffffffffffffff, 0x0, 0x2f) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/neigh/veth1_macvtap/locktime\x00', 0x103142, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) capset$auto(&(0x7f0000000100)={0x20080522}, 0x0) openat$auto_iommufd_fops_main(0xffffffffffffff9c, &(0x7f00000001c0), 0x48000, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008012, 0x3, 0x8000) r4 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/sctp/udp_port\x00', 0x202, 0x0) sendfile$auto(r4, r3, 0x0, 0x6) sendmsg$auto_OVS_DP_CMD_NEW(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r2, 0x1, 0x2070bd26, 0x25dfdbf8, {}, [@OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x4}, @OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x801}, 0x80) r5 = openat$auto_vhost_net_fops_net(0xffffffffffffff9c, 0x0, 0x105000, 0x0) ioctl$auto_VHOST_SET_BACKEND_FEATURES(r5, 0x4008af25, 0x0) r6 = openat$auto_fops_u32_ro_(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/debug/netdevsim/netdevsim0/ports/3/bpf_offloaded_id\x00', 0x20082, 0x0) writev$auto(r6, 0x0, 0x7) r7 = openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000002340)='/dev/binderfs/binder1\x00', 0x0, 0x0) r8 = dup$auto(r7) ioctl$auto_SCSI_IOCTL_DOORLOCK(r8, 0x5380, &(0x7f00000000c0)="33ca7089746618741c87ea79940a4243b98519a4b10cb3dc6438e684d3f8d726b013887e3581765d0d9919985a43f562f5f6b865333efb08fb4f5ed16c768f07ba9fd68be404ff55d20b69ab47271f62ea469ba032d3daadc6d540ddd0eb0e2a2dc661e8ce7bf6a11c064af53cc5f1a0b85a976f9e64c735be31fa5f37a5fc631694a7d84ee34e89cf5265a69cfe8d94bf8a5feaf619db22d8ab56298b685046b9a622d9") sendmsg$auto_KSMBD_EVENT_LOGOUT_REQUEST(0xffffffffffffffff, 0x0, 0x0) read$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffffff, &(0x7f0000000280)=""/222, 0xde) capset$auto(&(0x7f0000000180)={0x19980330}, 0x0) r9 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sda\x00', 0x8001, 0x0) ioctl$auto(r9, 0x401070cd, 0x5) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x9, 0xd3e, 0x1, 0xed, 0x3, 0x95f4da0a, 0xffffffffffffffff, 0x3, 0x62, 0x80000001, 0x7, 0x6d3f, 0x9, 0x2, 0xfffffffffffffffe]}, 0x0) ioctl$auto_BINDER_THREAD_EXIT(r8, 0x40046208, 0x0) 5.124800108s ago: executing program 4 (id=5500): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) r0 = socket(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond0\x00', 0x0}) bpf$auto(0x0, &(0x7f00000000c0)=@bpf_attr_5={@target_ifindex=r2, r1, 0x4, 0x1ff, r0, @relative_fd, 0xe600}, 0xf) r3 = socket$nl_generic(0x10, 0x3, 0x10) bpf$auto(0x3, &(0x7f00000001c0)=@raw_tracepoint={0x5, r3, 0x0, 0xfffffffe}, 0xc) 4.847066609s ago: executing program 4 (id=5503): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual/net/bond0/queues/tx-0/xps_cpus\x00', 0x10b062, 0x0) socket(0xa, 0x5, 0x84) modify_ldt$auto(0x1, 0x0, 0x10) mmap$auto(0x0, 0x400009, 0xffb, 0x8000000008011, 0x3, 0x0) modify_ldt$auto(0x807ff0000000000, 0x0, 0x40100000000aa) close_range$auto(0x2, 0x8, 0x0) r0 = socket(0xa, 0x2, 0x88) prctl$auto(0x42, 0x0, 0x0, 0x1, 0x0) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000180)='/proc/fs/cifs/LinuxExtensionsEnabled\x00', 0x62002, 0x0) lseek$auto(0x3, 0x7fffffffffffffff, 0x1) r1 = openat$auto_rtc_dev_fops_dev(0xffffffffffffff9c, &(0x7f0000000400), 0x200, 0x0) setreuid$auto(0x15, 0x5) r2 = openat$auto_event_inject_fops_trace(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/tracing/events/vmalloc/purge_vmap_area_lazy/inject\x00', 0x40482, 0x0) writev$auto(r2, &(0x7f0000000000)={&(0x7f0000000080)="d826aa6877493d7fc2defde23344c96a914aff0100050000000011c352d5ad", 0x4}, 0x2) ioprio_set$auto(0x81b, 0xff, 0xffffffff) ioctl$auto_RTC_IRQP_SET(r1, 0x4008700c, &(0x7f0000000440)=0x77b) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond0\x00', 0x0}) bpf$auto(0x0, &(0x7f00000000c0)=@bpf_attr_5={@target_ifindex=r4, r3, 0x4, 0x1ff, r0, @relative_fd, 0xe600}, 0xf) r5 = socket$nl_generic(0x10, 0x3, 0x10) bpf$auto(0x3, &(0x7f00000001c0)=@raw_tracepoint={0x5, r5, 0x0, 0x3}, 0xc) 4.648297412s ago: executing program 4 (id=5504): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/system/cpu/cpu1/hotplug/fail\x00', 0x82942, 0x0) sendfile$auto(r0, r0, 0x0, 0x200) mmap$auto(0x0, 0x2020009, 0x3, 0x9000000eb1, 0xfffffffffffffffa, 0x8000) migrate_pages$auto(0xffffffffffffffff, 0x5, 0x0, 0x0) r1 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x161782, 0x0) write$auto(r1, &(0x7f0000000040)='//\xf2\x00', 0x80000000) write$auto(r1, 0x0, 0x2) getrlimit$auto(0x3, 0x0) r2 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0) ioctl$auto_BLKZEROOUT(r2, 0x127f, 0x0) preadv2$auto(0x3, 0x0, 0x5, 0xffffffffffffffff, 0x7, 0x2e) bpf$auto(0x0, &(0x7f0000000000)=@link_update={0x2, @new_prog_fd=0x4, 0x7, @old_prog_fd=0x8000}, 0xa3) r3 = openat$auto_fops_atomic_t_(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/failslab/space\x00', 0x80, 0x0) read$auto_fops_atomic_t_(r3, &(0x7f0000001380)=""/4109, 0x100d) mmap$auto(0x0, 0x9, 0xffb, 0x8000000008011, 0x3, 0x0) memfd_create$auto(0x0, 0x4) mmap$auto(0x0, 0x9, 0xffb, 0x8000000008011, 0x3, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x10007) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mincore$auto(0x1000, 0x8001, 0x0) r4 = socket(0x23, 0x5, 0x0) syz_genetlink_get_family_id$auto_nl80211(&(0x7f00000000c0), r4) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0F:03/uid\x00', 0x103080, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r5, &(0x7f0000000280)=""/193, 0xc1) 4.510145547s ago: executing program 6 (id=5506): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_nl802154(&(0x7f0000000080), r0) sendmsg$auto_NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000000140)={0x0, 0x9e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x2474a7d9180cffa3, 0x70bd2d, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40040}, 0x40c0) (fail_nth: 9) 3.918736262s ago: executing program 6 (id=5507): openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x14fa02, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0x400000000e31, 0xffffffffffffffff, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) getrandom$auto(0x0, 0x6000000, 0x3) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) preadv2$auto(0x3, &(0x7f0000001000)={0x0, 0x9}, 0x5, 0x4, 0x6, 0x31) setresuid$auto(0x0, 0x0, 0x0) sendmsg$auto_NL80211_CMD_GET_STATION(0xffffffffffffffff, 0x0, 0x8000) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) pipe$auto(0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) vmsplice$auto(0x4, &(0x7f0000000040)={0x0, 0xd76}, 0x2, 0x5) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0x2062, 0x0) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) sched_setattr$auto(0x0, 0x0, 0x27b) msync$auto(0x1ffff000, 0x17ffffffffffffc, 0x400000004) getrandom$auto(&(0x7f0000000180)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0xfffffffffffffffa, 0x2) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) r1 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security/tomoyo/domain_policy\x00', 0x2, 0x0) write$auto_tomoyo_operations_securityfs_if(r1, 0x0, 0x0) fanotify_mark$auto(0xffffffffffffffff, 0x9, 0x9, 0xffffffffffffffff, 0x0) r2 = open(0x0, 0x0, 0x408) getdents$auto(r2, 0x0, 0x400018) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) 2.989948466s ago: executing program 4 (id=5509): r0 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security/tomoyo/domain_policy\x00', 0x40802, 0x0) read$auto(r0, &(0x7f00000001c0)='N\xd5\f\xb9GC*(,\x80\xc4bAL\xa3`\xb1\xf2\xe7\xc0/\xff', 0x100000001) shmctl$auto_SHM_UNLOCK(0x9, 0xc, 0x0) waitid$auto_P_ALL(0x0, 0xfc, 0x0, 0x5, &(0x7f0000000b40)={{0x6, 0x2}, {0xfffffffffffff4c8, 0x6}, 0x3, 0xc, 0x3, 0x83, 0x2, 0x0, 0x3, 0x9, 0x5, 0x8c0000, 0x4, 0x40, 0xffffffffffffff11, 0xbf0}) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_PHY_GET(0xffffffffffffffff, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010326bd7000ffdbdf252d"], 0x20}, 0x1, 0x0, 0x0, 0x2404c012}, 0x80) r2 = socket(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$auto(0x3, &(0x7f0000000040)=@can={0x1d, r3}, 0x6a) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) sendto$auto(0x3, 0x0, 0x13, 0xfffffff8, &(0x7f0000000440)=@xdp={0x2c, 0xdd86, r5, 0x2f}, 0x22) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bond_slave_1\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vlan0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wg2\x00'}) write$auto(r0, &(0x7f0000000040)='S\x00\x00\x00\xfe\xff\xff\xff', 0x8587) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) write$auto(0x1, 0x0, 0x80000000) r6 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) write$auto_seq_oss_f_ops_seq_oss(r6, &(0x7f0000000c80)="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", 0x12f) unshare$auto(0x40000080) openat$auto_tun_fops_tun(0xffffffffffffff9c, 0x0, 0x2002, 0x0) mmap$auto(0x1002, 0x9, 0x4, 0x200000eb0, 0x401, 0x701cf82a) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/mm/transparent_hugepage/hugepages-2048kB/enabled\x00', 0x22b42, 0x0) write$auto(0xffffffffffffffff, 0x0, 0x8) read$auto_ptdump_fops_(0xffffffffffffffff, &(0x7f00000000c0)=""/32, 0x20) r7 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r7, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) 1.344600098s ago: executing program 5 (id=5510): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) socketpair$auto(0x1, 0x4, 0x5, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) socket(0xa, 0x5, 0x0) open(0x0, 0x261c2, 0x89) socket(0xa, 0x2, 0x88) socket(0x2, 0x3, 0x2) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x101102, 0x0) openat$auto_ocfs2_control_fops_stack_user(0xffffffffffffff9c, 0x0, 0x669400, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x8a180, 0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x382, 0x0) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, 0x0, 0x802, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual/misc/hw_random/rng_available\x00', 0x22000, 0x0) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/firmware/acpi/interrupts/ff_slp_btn\x00', 0x8522, 0x0) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS2\x00', 0xa0102, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/pci0000:00/0000:00:04.0/remove\x00', 0x2801, 0x0) write$auto(r0, &(0x7f00000002c0)='0\x00\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94\xf8F\xbb\xa2\xbb>\xade\x18\xbd\xe2\x1c\x89OO]e[\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\xef`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\b};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xacA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xde\f/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(\x95\xdfH\xf4\v\xf3CRnz\xc2\x13<\xf0\v\x1f\x14\xf3\xd0\xf2\xd1L!\x81\xea\x83\xa0\r|%\xbf\x02trg\x9a\xe7\x00\x85Z\x06?\x12\x98\x0f)\a\xf4\xaa\x05\xc0\xa0r\xd2\x85\x8dH\xd0>\xca\xfc5\x01\x95O4\xca\x95\x1d\x83\xec\nD\x8e\xfb\xce\xd1w\x15:\xe9\x81/B#\xc6\xa1\xfa-\x1b\x8cr\x92nM\xa1;\xe4pd$\xd7\x1b\v\x82\r\f\xd0Hq\xd9\r\x88#\x89\x8d\xcd\x1e\xc7N\xeeO\x8dO\xe9\xfc\x91\xa1\xa8HR+\a\xb7R\t\n+\x7f\xd5H\x90G=\x9a\r\xb10\x17n\x1b\xf8\v\x11\v\xbb\xc8^\xa4\xe2\x05\x91|\x123\xc3:\xfd\xee\x04a\xc8\x12\xce\xa2\x12\xcb\x8c\x87f\xebGQ\xe9\x96\xd5E\x13a\xb7\x057<&\xe0\x94\xa7\xfb\x9d;\xfa\xb1\x1b4a,\'\xb2Ym\xe1:\xbf\x8cs\x06\xa3u\x8d!\n\x80-\x9a\xbb;\xf4\xf3\xe1\x97\xfc8\xff\xa7\\\x8b\xf9\x95\x10$\xef\x1a #b\xfb\xfe\xe9\x06fK0\xdd\x84T,\xfa\xb5\x00\x83d\xbba\xd7\n\x92\x90|l\xdfAN\x9d\xcb\x96\xc7\xe8\xe6\x8bC\xeb\xc7EZ\xc8\x1a\x81nf\tZ-sZ\x13n\xec\xa9\xbf\xd0$\xb9\xd8\x00'/507, 0x1098c7) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) close_range$auto(0x2, 0xffffffffffffffff, 0x0) open(0x0, 0x22240, 0x55) openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket(0xa, 0x801, 0x84) getsockopt$auto(r2, 0x84, 0x82, 0x0, 0x0) ioctl$auto(0x3, 0x80106f53, r1) 1.192218597s ago: executing program 5 (id=5511): r0 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000080)='/proc/driver/rtc\x00', 0x88000, 0x0) pread64$auto(r0, 0x0, 0x1f, 0xe703000000000000) 990.757003ms ago: executing program 5 (id=5512): openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000040), 0x109000, 0x0) openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/fb0\x00', 0x0, 0x0) (async) r0 = openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/fb0\x00', 0x0, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x1ac}}, 0x40000) (async) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[], 0x1ac}}, 0x40000) io_uring_setup$auto(0x6, 0x0) socket(0x11, 0x80003, 0x300) (async) r1 = socket(0x11, 0x80003, 0x300) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) ustat$auto(0x801, 0x0) ioctl$auto_VHOST_SET_OWNER(0xffffffffffffffff, 0xaf01, 0x5) get_robust_list$auto(0x0, 0x0, 0x0) setxattrat$auto(0xffffffffffffffff, 0x0, 0x100, 0x0, 0x0, 0x5d8) setsockopt$auto(r1, 0x107, 0xf, 0x0, 0x6) (async) setsockopt$auto(r1, 0x107, 0xf, 0x0, 0x6) capset$auto(0x0, &(0x7f0000000000)={0x1, 0x6, 0x5c}) sendmmsg$auto(r1, &(0x7f0000000140)={{&(0x7f0000000000), 0x5ac, &(0x7f0000000100)={&(0x7f0000000200), 0x7}, 0x5, 0x0, 0x5, 0x1}, 0x5}, 0x4, 0x100) ioctl$auto_FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000001200)="55cbf8d049cbae1ce902c4a49a31b59b8edd53e4825ea16aaa176ba980172d552af55e4e3ab551b1a618d6d897f697c9f7e490660271716e39ff788feace8599be339de401a6c8f143f90a458705dc383b66c82633c9b0e54a1683271c8a5169e8a6c00125a14180cc81fccc7b2f6bbb2426d35b60d00d73ac00d83f515b4fcca07959d973e5") 824.894233ms ago: executing program 6 (id=5513): openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x14fa02, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0x400000000e31, 0xffffffffffffffff, 0x0) futex$auto(&(0x7f0000000080)=0x1, 0xb, 0x1, 0x0, 0x0, 0xfffffffa) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) getrandom$auto(0x0, 0x6000000, 0x3) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) setresuid$auto(0x0, 0x0, 0x0) sendmsg$auto_NL80211_CMD_GET_STATION(0xffffffffffffffff, 0x0, 0x8000) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) pipe$auto(0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) vmsplice$auto(0x4, &(0x7f0000000040)={0x0, 0xd76}, 0x2, 0x5) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0x2062, 0x0) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) sched_setattr$auto(0x0, 0x0, 0x27b) msync$auto(0x1ffff000, 0x17ffffffffffffc, 0x400000004) getrandom$auto(&(0x7f0000000180)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0xfffffffffffffffa, 0x2) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) write$auto_tomoyo_operations_securityfs_if(0xffffffffffffffff, 0x0, 0x0) fanotify_mark$auto(0xffffffffffffffff, 0x9, 0x9, 0xffffffffffffffff, 0x0) getdents$auto(0xffffffffffffffff, 0x0, 0x400018) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) 735.328038ms ago: executing program 5 (id=5514): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_macsec(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$auto_MACSEC_CMD_DEL_RXSA(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@MACSEC_ATTR_IFINDEX={0x8}, @MACSEC_ATTR_SA_CONFIG={0x4}]}, 0x20}, 0x1, 0x9effffff, 0x0, 0x844}, 0x20004010) 682.120726ms ago: executing program 5 (id=5515): r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$auto_nfsd(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$auto_NFSD_CMD_THREADS_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000080)={0x104, r1, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NFSD_A_SERVER_SCOPE={0xe5, 0x4, 'nfs\x81\x9b\xb6$\x10\x16\xfb:\xb3\x15Y\x90\xf9\xc0\xc0\x88.!s\x1f\xe9\x1d\'&Hvn\xb1\x88\xbf\x15<\xa6e\xbc\xa1\xfa\xbeG\t*_kW_m\x1b:,\xc6\xa6\xfd\xba\xcd\xbe\xbe=\xc3\xbf\xd3f2!\xc4\x05EA\xac\x04\x83\xf1\x99\xa05\xfb\xf3\xf4?(\x9c\x8b\x9d\xdcV\xc5\x00\tm\xdez\xc9\xdbn\xb1\t\n\xe7\x8cd\xca\xd89\r\x1a@\xe1_\xb1_\xf8\xf3\xb1]\xad\xaf\xd9\xd0\xa8:\xd4<\x8d\xbc\rg[\x1d\x98\xb2r\xac\x83\xf8s\xafh@\x8c\xa7\xcd\xb3+Qy\"\xe8\x8ah,\xca|\xd9\xb3?Ha\xdb\xa3F\nGU&7\x15\x19\xeb\x9b\x9eU\xab\x86\x10\x9d\xaf>\xda(R\xcb\xe6\xf7\x8c\xf8\xb1\xdf\xe4t\xe6\x9f\x81\xb3\xbb\xc3\xbf\x8e\xd9VC\xa7\x03rJ.\xf6L\x94b\xc5\x03\xea\x84u\x92\xc0\xcd\x16\xfb<\x03\x00\x00'}, @NFSD_A_SERVER_THREADS={0x8, 0x1, 0x2}]}, 0x104}}, 0x4000) r2 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), r0) sendmsg$auto_NL80211_CMD_PROBE_CLIENT(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xa}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x90d}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x48044) 191.307737ms ago: executing program 5 (id=5516): openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mtdblock0\x00', 0x14f602, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x0) madvise$auto(0x0, 0xffffffffffff0001, 0x15) madvise$auto(0x0, 0x2000040080000004, 0xe) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x9, 0xffb, 0x8000000008011, 0x3, 0x0) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8000, 0x3f000000) 0s ago: executing program 4 (id=5517): r0 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2, 0x0) ioctl$auto_SNDCTL_SEQ_NRSYNTHS(r0, 0x8004510a, &(0x7f0000000040)) mmap$auto(0x0, 0x7d, 0x4000000000df, 0xeb1, 0x401, 0x8000) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x2000, 0x0) read$auto(r1, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) r3 = open(&(0x7f0000000800)='./file0\x00', 0x22240, 0x154) r4 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000100), r3) sendmsg$auto_NL80211_CMD_CRIT_PROTOCOL_STOP(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="ff030000", @ANYRES16=r4, @ANYBLOB="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"], 0x348}, 0x1, 0x0, 0x0, 0x800}, 0x20001) r5 = fcntl$auto(r3, 0x400, 0x1) ioctl$auto_TIOCNXCL(r3, 0x540d, &(0x7f0000000240)="5d4551490752ce320157a76d779b3f8416626ceaf7e881ee217712422d62b34748a687d8576003861ba7d408a27ab07cb2d4e81ee9c17ed73acb86241dd445f4c54738b6a49976eac9fec5f1abafcb354d9ec762d265465488e05400ebe46d4f694ea1e9d669185f36db0c223fef266bef8d5b814c56d23baab03e16c76970b88a888613aaad4e45e2095ce0612ee2b0db063bc80db06a1b564c525dd4861d71af5cfd7a514795967bf3ad3caa027226623ffe296768") writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) r6 = socket(0xa, 0x2, 0x0) r7 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000140)='/proc/fb\x00', 0x100, 0x0) pread64$auto(r7, &(0x7f0000000040)='/dev/kvm\x00', 0x40000000006, 0x3) mmap$auto(0xffffff7ffffffffc, 0x22008, 0x1, 0x12, r5, 0x7ffe) close_range$auto(0x0, 0xffffffffffffffff, 0x4000000000002) socket(0x2, 0x801, 0x106) socketpair$auto(0x1a, 0x9, 0x8000000000000000, 0x0) r8 = openat$auto_mtd_fops_mtdchar(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mtd0ro\x00', 0x0, 0x0) ioctl$auto_BLKPG2(r8, 0x1269, 0x0) setsockopt$auto(r6, 0x29, 0x37, 0x0, 0xb00) ioctl$auto_XFS_IOC_ALLOCSP(0xffffffffffffffff, 0x4030580a, 0x0) sendmsg$auto_THERMAL_GENL_CMD_THRESHOLD_FLUSH(r6, 0x0, 0x4000080) unshare$auto(0x40000080) kernel console output (not intermixed with test programs): (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1551.063680][T27261] block nbd0: NBD_DISCONNECT [ 1551.074563][T27258] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1551.105212][T27258] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1551.352255][T27265] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1551.373577][T27265] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1551.388277][T27265] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1551.407174][T27265] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1551.596696][T27271] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1551.652907][T27271] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1551.718739][T27271] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1551.816679][T27271] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1552.175310][T27279] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1552.204748][T27279] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1552.222599][T27279] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1552.239109][T27279] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1552.540678][T27285] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1552.648263][T27285] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1552.668779][T27285] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1552.705224][T27285] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1553.766851][T27310] FAULT_INJECTION: forcing a failure. [ 1553.766851][T27310] name failslab, interval 1, probability 0, space 0, times 0 [ 1553.783041][T27310] CPU: 1 UID: 0 PID: 27310 Comm: syz.5.5155 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1553.783100][T27310] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1553.783113][T27310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1553.783134][T27310] Call Trace: [ 1553.783146][T27310] [ 1553.783160][T27310] dump_stack_lvl+0x100/0x190 [ 1553.783209][T27310] should_fail_ex.cold+0x5/0xa [ 1553.783266][T27310] should_failslab+0xc2/0x120 [ 1553.783325][T27310] __kmalloc_cache_noprof+0x80/0x810 [ 1553.783360][T27310] ? _raw_spin_unlock_irq+0x23/0x50 [ 1553.783394][T27310] ? snd_seq_fifo_new+0x42/0x270 [ 1553.783438][T27310] ? lockdep_hardirqs_on+0x78/0x100 [ 1553.783477][T27310] ? _raw_spin_unlock_irq+0x2e/0x50 [ 1553.783517][T27310] ? snd_seq_fifo_new+0x42/0x270 [ 1553.783563][T27310] ? __pfx_snd_seq_open+0x10/0x10 [ 1553.783596][T27310] snd_seq_fifo_new+0x42/0x270 [ 1553.783644][T27310] snd_seq_open+0x3fe/0x590 [ 1553.783680][T27310] ? __pfx_snd_seq_open+0x10/0x10 [ 1553.783712][T27310] snd_open+0x22d/0x4c0 [ 1553.783752][T27310] ? __pfx_snd_open+0x10/0x10 [ 1553.783791][T27310] chrdev_open+0x234/0x6a0 [ 1553.783846][T27310] ? __pfx_apparmor_file_open+0x10/0x10 [ 1553.783894][T27310] ? __pfx_chrdev_open+0x10/0x10 [ 1553.783939][T27310] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1553.783991][T27310] do_dentry_open+0x73e/0x1570 [ 1553.784031][T27310] ? __pfx_chrdev_open+0x10/0x10 [ 1553.784079][T27310] ? security_inode_permission+0xbf/0x250 [ 1553.784145][T27310] vfs_open+0x82/0x3f0 [ 1553.784199][T27310] path_openat+0x21dc/0x3120 [ 1553.784260][T27310] ? __pfx_path_openat+0x10/0x10 [ 1553.784323][T27310] do_filp_open+0x1f7/0x420 [ 1553.784366][T27310] ? __pfx_do_filp_open+0x10/0x10 [ 1553.784438][T27310] ? _raw_spin_unlock+0x28/0x50 [ 1553.784470][T27310] ? alloc_fd+0x476/0x790 [ 1553.784521][T27310] do_sys_openat2+0x12e/0x220 [ 1553.784572][T27310] ? __pfx_do_sys_openat2+0x10/0x10 [ 1553.784638][T27310] __x64_sys_openat+0x12d/0x210 [ 1553.784691][T27310] ? __pfx___x64_sys_openat+0x10/0x10 [ 1553.784738][T27310] ? xfd_validate_state+0x129/0x190 [ 1553.784795][T27310] do_syscall_64+0xc9/0xf80 [ 1553.784831][T27310] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1553.784861][T27310] RIP: 0033:0x7f654799aeb9 [ 1553.784885][T27310] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1553.784915][T27310] RSP: 002b:00007f6548804028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1553.784945][T27310] RAX: ffffffffffffffda RBX: 00007f6547c15fa0 RCX: 00007f654799aeb9 [ 1553.784964][T27310] RDX: 0000000000000402 RSI: 00002000000002c0 RDI: ffffffffffffff9c [ 1553.784983][T27310] RBP: 00007f6547a08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1553.785001][T27310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1553.785018][T27310] R13: 00007f6547c16038 R14: 00007f6547c15fa0 R15: 00007ffc618ca5d8 [ 1553.785057][T27310] [ 1556.644354][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1556.651270][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1557.108061][T27348] NFSD: Failed to start, no listeners configured. [ 1557.837778][T27361] NFSD: Failed to start, no listeners configured. [ 1558.632158][T27387] HfR: entered promiscuous mode [ 1558.676138][T27387] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5167'. [ 1558.687960][T27387] HfR: left promiscuous mode [ 1559.236314][T27377] Page cache invalidation failure on direct I/O. Possible data corruption due to collision with buffered I/O! [ 1559.275254][T27377] File: /dev/ram5 PID: 27377 Comm: syz.5.5165 [ 1559.632307][T27402] EXT4-fs warning: 2 callbacks suppressed [ 1559.632331][T27402] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1559.718069][T27402] EXT4-fs error: 2 callbacks suppressed [ 1559.718095][T27402] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1559.801656][T27402] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1559.890217][T27402] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1560.048457][T27416] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1560.088221][T27419] FAULT_INJECTION: forcing a failure. [ 1560.088221][T27419] name failslab, interval 1, probability 0, space 0, times 0 [ 1560.101382][T27416] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1560.148575][T27419] CPU: 0 UID: 0 PID: 27419 Comm: syz.4.5173 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1560.148630][T27419] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1560.148644][T27419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1560.148664][T27419] Call Trace: [ 1560.148675][T27419] [ 1560.148689][T27419] dump_stack_lvl+0x100/0x190 [ 1560.148743][T27419] should_fail_ex.cold+0x5/0xa [ 1560.148796][T27419] should_failslab+0xc2/0x120 [ 1560.148840][T27419] ? tomoyo_realpath_from_path+0xb6/0x690 [ 1560.148872][T27419] __kmalloc_noprof+0xf6/0x9c0 [ 1560.148917][T27419] ? tomoyo_realpath_from_path+0xb6/0x690 [ 1560.148948][T27419] tomoyo_realpath_from_path+0xb6/0x690 [ 1560.148989][T27419] tomoyo_path_number_perm+0x23c/0x580 [ 1560.149035][T27419] ? tomoyo_path_number_perm+0x22e/0x580 [ 1560.149084][T27419] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1560.149163][T27419] ? find_held_lock+0x2b/0x80 [ 1560.149190][T27419] ? hook_file_ioctl_common+0x146/0x410 [ 1560.149232][T27419] ? __fget_files+0x215/0x3d0 [ 1560.149270][T27419] ? __fget_files+0x21f/0x3d0 [ 1560.149306][T27419] security_file_ioctl+0xd3/0x230 [ 1560.149351][T27419] __x64_sys_ioctl+0xb7/0x210 [ 1560.149399][T27419] do_syscall_64+0xc9/0xf80 [ 1560.149437][T27419] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1560.149467][T27419] RIP: 0033:0x7f0bfcb9aeb9 [ 1560.149490][T27419] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1560.149520][T27419] RSP: 002b:00007f0bfdb37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1560.149548][T27419] RAX: ffffffffffffffda RBX: 00007f0bfce15fa0 RCX: 00007f0bfcb9aeb9 [ 1560.149568][T27419] RDX: 00002000000001c0 RSI: fffffffffffffd02 RDI: 0000000000000006 [ 1560.149587][T27419] RBP: 00007f0bfdb37090 R08: 0000000000000000 R09: 0000000000000000 [ 1560.149605][T27419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1560.149622][T27419] R13: 00007f0bfce16038 R14: 00007f0bfce15fa0 R15: 00007ffeb8565fe8 [ 1560.149661][T27419] [ 1560.149810][T27419] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1560.420377][T27416] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1560.498707][T27416] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1560.921446][T27425] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1560.937962][T27425] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1560.952769][T27425] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1561.008288][T27425] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1561.300826][T27428] netlink: 28 bytes leftover after parsing attributes in process `syz.2.5175'. [ 1561.489749][T27435] HfR: entered promiscuous mode [ 1561.502463][T27435] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5176'. [ 1561.518573][T27435] HfR: left promiscuous mode [ 1562.550640][T27458] FAULT_INJECTION: forcing a failure. [ 1562.550640][T27458] name failslab, interval 1, probability 0, space 0, times 0 [ 1562.621473][T27458] CPU: 0 UID: 0 PID: 27458 Comm: syz.4.5181 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1562.621516][T27458] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1562.621525][T27458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1562.621538][T27458] Call Trace: [ 1562.621546][T27458] [ 1562.621557][T27458] dump_stack_lvl+0x100/0x190 [ 1562.621588][T27458] should_fail_ex.cold+0x5/0xa [ 1562.621626][T27458] ? __pfx_filemap_map_pages+0x10/0x10 [ 1562.621656][T27458] should_failslab+0xc2/0x120 [ 1562.621688][T27458] kmem_cache_alloc_noprof+0x83/0x780 [ 1562.621720][T27458] ? ptlock_alloc+0x1f/0x70 [ 1562.621747][T27458] ? __pfx_filemap_map_pages+0x10/0x10 [ 1562.621776][T27458] ? ptlock_alloc+0x1f/0x70 [ 1562.621798][T27458] ptlock_alloc+0x1f/0x70 [ 1562.621821][T27458] pte_alloc_one+0x84/0x3e0 [ 1562.621852][T27458] __do_fault+0x359/0x550 [ 1562.621885][T27458] ? __pfx_filemap_map_pages+0x10/0x10 [ 1562.621914][T27458] do_fault+0x2db/0x1990 [ 1562.621974][T27458] ? __pmd_alloc+0x6aa/0x9c0 [ 1562.622027][T27458] __handle_mm_fault+0x1807/0x2b50 [ 1562.622068][T27458] ? mt_find+0x45e/0x8e0 [ 1562.622108][T27458] ? __pfx___handle_mm_fault+0x10/0x10 [ 1562.622132][T27458] ? __pfx_mt_find+0x10/0x10 [ 1562.622177][T27458] ? find_vma+0xbf/0x140 [ 1562.622208][T27458] ? __pfx_find_vma+0x10/0x10 [ 1562.622242][T27458] handle_mm_fault+0x36d/0xa20 [ 1562.622278][T27458] do_user_addr_fault+0x74c/0x12f0 [ 1562.622313][T27458] exc_page_fault+0x6f/0xd0 [ 1562.622341][T27458] asm_exc_page_fault+0x26/0x30 [ 1562.622363][T27458] RIP: 0010:rep_movs_alternative+0x33/0x90 [ 1562.622399][T27458] Code: 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 7d 7d 04 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8b 06 <48> 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb [ 1562.622422][T27458] RSP: 0018:ffffc9000449fb10 EFLAGS: 00050206 [ 1562.622441][T27458] RAX: 656d69745f637472 RBX: 0000000000000000 RCX: 000000000000001f [ 1562.622456][T27458] RDX: 0000000000000001 RSI: ffff888057b56000 RDI: 0000000000000000 [ 1562.622470][T27458] RBP: ffffc9000449fd80 R08: 0000000000000000 R09: ffffed100af6ac03 [ 1562.622485][T27458] R10: ffff888057b5601e R11: 0000000000000000 R12: 000000000000001f [ 1562.622500][T27458] R13: 00007ffffffff000 R14: ffff888057b56000 R15: 000000000000001f [ 1562.622530][T27458] _copy_to_iter+0x391/0x1720 [ 1562.622573][T27458] ? __pfx__copy_to_iter+0x10/0x10 [ 1562.622608][T27458] ? trace_kmalloc+0x83/0xb0 [ 1562.622642][T27458] ? seq_read_iter+0x819/0x1270 [ 1562.622673][T27458] seq_read_iter+0xdab/0x1270 [ 1562.622707][T27458] proc_reg_read_iter+0x220/0x310 [ 1562.622741][T27458] ? __pfx_proc_reg_read_iter+0x10/0x10 [ 1562.622776][T27458] vfs_read+0x825/0xb30 [ 1562.622806][T27458] ? __pfx_vfs_read+0x10/0x10 [ 1562.622829][T27458] ? find_held_lock+0x2b/0x80 [ 1562.622871][T27458] __x64_sys_pread64+0x1eb/0x250 [ 1562.622900][T27458] ? __pfx___x64_sys_pread64+0x10/0x10 [ 1562.622936][T27458] do_syscall_64+0xc9/0xf80 [ 1562.622966][T27458] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1562.622990][T27458] RIP: 0033:0x7f0bfcb9aeb9 [ 1562.623009][T27458] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1562.623031][T27458] RSP: 002b:00007f0bfdb37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1562.623051][T27458] RAX: ffffffffffffffda RBX: 00007f0bfce15fa0 RCX: 00007f0bfcb9aeb9 [ 1562.623066][T27458] RDX: 000000000000001f RSI: 0000000000000000 RDI: 0000000000000003 [ 1562.623080][T27458] RBP: 00007f0bfdb37090 R08: 0000000000000000 R09: 0000000000000000 [ 1562.623094][T27458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1562.623108][T27458] R13: 00007f0bfce16038 R14: 00007f0bfce15fa0 R15: 00007ffeb8565fe8 [ 1562.623138][T27458] [ 1563.058044][T27459] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1563.074572][T27459] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1563.089711][T27459] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1563.106069][T27459] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1564.086776][T27479] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1564.104914][T27479] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1564.123777][T27479] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1564.158334][T27479] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1564.228909][T27478] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5188'. [ 1564.985789][T26248] Bluetooth: hci4: Malformed LE Event: 0x0b [ 1565.225450][T27492] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1565.306946][T27492] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1565.342444][T27492] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1565.426357][T27492] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1565.726067][T27501] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5191'. [ 1566.410562][T27507] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1566.438250][T27507] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1566.529395][T27507] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1566.601659][T27507] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1568.051826][T27530] FAULT_INJECTION: forcing a failure. [ 1568.051826][T27530] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1568.198642][T27530] CPU: 1 UID: 0 PID: 27530 Comm: syz.2.5198 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1568.198697][T27530] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1568.198710][T27530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1568.198729][T27530] Call Trace: [ 1568.198740][T27530] [ 1568.198782][T27530] dump_stack_lvl+0x100/0x190 [ 1568.198828][T27530] should_fail_ex.cold+0x5/0xa [ 1568.198882][T27530] _copy_to_user+0x32/0xd0 [ 1568.198934][T27530] simple_read_from_buffer+0xcb/0x170 [ 1568.198971][T27530] proc_fail_nth_read+0x1af/0x230 [ 1568.199010][T27530] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1568.199051][T27530] ? rw_verify_area+0xce/0x6d0 [ 1568.199082][T27530] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1568.199120][T27530] vfs_read+0x1e4/0xb30 [ 1568.199161][T27530] ? __pfx_vfs_read+0x10/0x10 [ 1568.199192][T27530] ? find_held_lock+0x2b/0x80 [ 1568.199225][T27530] ? __fget_files+0x215/0x3d0 [ 1568.199268][T27530] ? __fget_files+0x21f/0x3d0 [ 1568.199314][T27530] ksys_read+0x12a/0x250 [ 1568.199349][T27530] ? __pfx_ksys_read+0x10/0x10 [ 1568.199396][T27530] do_syscall_64+0xc9/0xf80 [ 1568.199438][T27530] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1568.199470][T27530] RIP: 0033:0x7f346f15b78e [ 1568.199496][T27530] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1568.199529][T27530] RSP: 002b:00007f346ff7bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1568.199564][T27530] RAX: ffffffffffffffda RBX: 00007f346ff7c6c0 RCX: 00007f346f15b78e [ 1568.199586][T27530] RDX: 000000000000000f RSI: 00007f346ff7c0a0 RDI: 0000000000000004 [ 1568.199605][T27530] RBP: 00007f346ff7c090 R08: 0000000000000000 R09: 0000000000000000 [ 1568.199626][T27530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1568.199645][T27530] R13: 00007f346f416038 R14: 00007f346f415fa0 R15: 00007ffe3a29e608 [ 1568.199688][T27530] [ 1568.697138][T27538] FAULT_INJECTION: forcing a failure. [ 1568.697138][T27538] name failslab, interval 1, probability 0, space 0, times 0 [ 1568.741424][T27536] HfR: entered promiscuous mode [ 1568.753504][T27538] CPU: 0 UID: 0 PID: 27538 Comm: syz.4.5201 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1568.753564][T27538] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1568.753577][T27538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1568.753598][T27538] Call Trace: [ 1568.753610][T27538] [ 1568.753623][T27538] dump_stack_lvl+0x100/0x190 [ 1568.753669][T27538] should_fail_ex.cold+0x5/0xa [ 1568.753725][T27538] should_failslab+0xc2/0x120 [ 1568.753774][T27538] kmem_cache_alloc_noprof+0x83/0x780 [ 1568.753821][T27538] ? __pfx_map_id_range_down+0x10/0x10 [ 1568.753855][T27538] ? security_inode_alloc+0x3b/0x2c0 [ 1568.753909][T27538] ? security_inode_alloc+0x3b/0x2c0 [ 1568.753972][T27538] security_inode_alloc+0x3b/0x2c0 [ 1568.754022][T27538] inode_init_always_gfp+0xced/0x1040 [ 1568.754070][T27538] alloc_inode+0x8e/0x250 [ 1568.754122][T27538] create_pipe_files+0x4c/0x970 [ 1568.754179][T27538] do_pipe2+0xbd/0x1e0 [ 1568.754222][T27538] ? __pfx_do_pipe2+0x10/0x10 [ 1568.754263][T27538] ? xfd_validate_state+0x129/0x190 [ 1568.754328][T27538] __x64_sys_pipe+0x33/0x50 [ 1568.754369][T27538] do_syscall_64+0xc9/0xf80 [ 1568.754413][T27538] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1568.754446][T27538] RIP: 0033:0x7f0bfcb9aeb9 [ 1568.754474][T27538] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1568.754509][T27538] RSP: 002b:00007f0bfdb37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000016 [ 1568.754547][T27538] RAX: ffffffffffffffda RBX: 00007f0bfce15fa0 RCX: 00007f0bfcb9aeb9 [ 1568.754569][T27538] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1568.754588][T27538] RBP: 00007f0bfcc08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1568.754610][T27538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1568.754631][T27538] R13: 00007f0bfce16038 R14: 00007f0bfce15fa0 R15: 00007ffeb8565fe8 [ 1568.754676][T27538] [ 1568.780213][T27536] netlink: 12 bytes leftover after parsing attributes in process `syz.5.5200'. [ 1569.051821][T27536] HfR: left promiscuous mode [ 1569.398268][T27552] HfR: entered promiscuous mode [ 1569.458843][T27552] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5204'. [ 1569.501004][T27552] HfR: left promiscuous mode [ 1569.812264][T27562] FAULT_INJECTION: forcing a failure. [ 1569.812264][T27562] name failslab, interval 1, probability 0, space 0, times 0 [ 1569.869989][T27562] CPU: 0 UID: 0 PID: 27562 Comm: syz.5.5205 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1569.870031][T27562] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1569.870042][T27562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1569.870057][T27562] Call Trace: [ 1569.870066][T27562] [ 1569.870076][T27562] dump_stack_lvl+0x100/0x190 [ 1569.870109][T27562] should_fail_ex.cold+0x5/0xa [ 1569.870150][T27562] should_failslab+0xc2/0x120 [ 1569.870185][T27562] kmem_cache_alloc_lru_noprof+0x8e/0x7d0 [ 1569.870218][T27562] ? lockdep_init_map_type+0x5c/0x250 [ 1569.870254][T27562] ? __d_alloc+0x34/0xa80 [ 1569.870289][T27562] ? __d_alloc+0x34/0xa80 [ 1569.870317][T27562] __d_alloc+0x34/0xa80 [ 1569.870350][T27562] d_alloc_pseudo+0x1c/0xc0 [ 1569.870389][T27562] alloc_file_pseudo+0xcf/0x230 [ 1569.870427][T27562] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1569.870464][T27562] ? alloc_fd+0x476/0x790 [ 1569.870496][T27562] sock_alloc_file+0x50/0x210 [ 1569.870537][T27562] __sys_socket+0x1c0/0x260 [ 1569.870567][T27562] ? __pfx___sys_socket+0x10/0x10 [ 1569.870599][T27562] ? do_user_addr_fault+0x8d6/0x12f0 [ 1569.870636][T27562] __x64_sys_socket+0x72/0xb0 [ 1569.870665][T27562] ? lockdep_hardirqs_on+0x78/0x100 [ 1569.870695][T27562] do_syscall_64+0xc9/0xf80 [ 1569.870726][T27562] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1569.870751][T27562] RIP: 0033:0x7f654799c747 [ 1569.870771][T27562] Code: f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1569.870796][T27562] RSP: 002b:00007f6548802f98 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 1569.870820][T27562] RAX: ffffffffffffffda RBX: 00007f6547c15fa0 RCX: 00007f654799c747 [ 1569.870843][T27562] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 1569.870859][T27562] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 1569.870875][T27562] R10: 0000200000000080 R11: 0000000000000286 R12: 0000000000000000 [ 1569.870891][T27562] R13: 00007f6547c16038 R14: 00007f6547c15fa0 R15: 00007ffc618ca5d8 [ 1569.870922][T27562] [ 1569.880243][T27553] NFSD: Failed to start, no listeners configured. [ 1571.558025][T27596] FAULT_INJECTION: forcing a failure. [ 1571.558025][T27596] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1571.628439][T27596] CPU: 0 UID: 0 PID: 27596 Comm: syz.6.5212 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1571.628480][T27596] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1571.628490][T27596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1571.628510][T27596] Call Trace: [ 1571.628518][T27596] [ 1571.628528][T27596] dump_stack_lvl+0x100/0x190 [ 1571.628560][T27596] should_fail_ex.cold+0x5/0xa [ 1571.628599][T27596] _copy_from_user+0x2e/0xd0 [ 1571.628636][T27596] copy_msghdr_from_user+0x9f/0x4f0 [ 1571.628665][T27596] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1571.628707][T27596] ___sys_sendmsg+0x106/0x1e0 [ 1571.628736][T27596] ? __pfx____sys_sendmsg+0x10/0x10 [ 1571.628779][T27596] ? find_held_lock+0x2b/0x80 [ 1571.628820][T27596] __sys_sendmsg+0x170/0x220 [ 1571.628855][T27596] ? __pfx___sys_sendmsg+0x10/0x10 [ 1571.628916][T27596] do_syscall_64+0xc9/0xf80 [ 1571.628947][T27596] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1571.628971][T27596] RIP: 0033:0x7fc94219aeb9 [ 1571.628990][T27596] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1571.629013][T27596] RSP: 002b:00007fc943093028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1571.629036][T27596] RAX: ffffffffffffffda RBX: 00007fc942415fa0 RCX: 00007fc94219aeb9 [ 1571.629052][T27596] RDX: 0000000000000000 RSI: 0000200000006200 RDI: 0000000000000003 [ 1571.629067][T27596] RBP: 00007fc943093090 R08: 0000000000000000 R09: 0000000000000000 [ 1571.629081][T27596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1571.629096][T27596] R13: 00007fc942416038 R14: 00007fc942415fa0 R15: 00007ffdf1967538 [ 1571.629125][T27596] [ 1572.351476][T27602] HfR: entered promiscuous mode [ 1572.431359][T27602] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5214'. [ 1572.513381][T27602] HfR: left promiscuous mode [ 1572.729843][T27602] NOTICE: Automounting of tracing to debugfs is deprecated and will be removed in 2030 [ 1573.754849][T27624] FAULT_INJECTION: forcing a failure. [ 1573.754849][T27624] name failslab, interval 1, probability 0, space 0, times 0 [ 1573.770536][T27624] CPU: 0 UID: 0 PID: 27624 Comm: syz.6.5218 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1573.770590][T27624] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1573.770603][T27624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1573.770624][T27624] Call Trace: [ 1573.770635][T27624] [ 1573.770648][T27624] dump_stack_lvl+0x100/0x190 [ 1573.770694][T27624] should_fail_ex.cold+0x5/0xa [ 1573.770749][T27624] should_failslab+0xc2/0x120 [ 1573.770796][T27624] ? iter_file_splice_write+0x1d3/0x10a0 [ 1573.770835][T27624] __kmalloc_noprof+0xf6/0x9c0 [ 1573.770882][T27624] ? iter_file_splice_write+0x1d3/0x10a0 [ 1573.770921][T27624] iter_file_splice_write+0x1d3/0x10a0 [ 1573.770965][T27624] ? kfree+0x1c7/0x690 [ 1573.770993][T27624] ? copy_splice_read+0x734/0xb90 [ 1573.771037][T27624] ? __pfx_iter_file_splice_write+0x10/0x10 [ 1573.771077][T27624] ? __lock_acquire+0x4a5/0x2630 [ 1573.771125][T27624] ? __pfx_copy_splice_read+0x10/0x10 [ 1573.771186][T27624] ? __pfx_iter_file_splice_write+0x10/0x10 [ 1573.771229][T27624] direct_splice_actor+0x192/0x6c0 [ 1573.771287][T27624] splice_direct_to_actor+0x345/0xa30 [ 1573.771329][T27624] ? __pfx_direct_splice_actor+0x10/0x10 [ 1573.771377][T27624] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 1573.771428][T27624] do_splice_direct+0x174/0x240 [ 1573.771468][T27624] ? __pfx_do_splice_direct+0x10/0x10 [ 1573.771501][T27624] ? common_file_perm+0x1ab/0x4f0 [ 1573.771548][T27624] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 1573.771590][T27624] ? rw_verify_area+0xce/0x6d0 [ 1573.771623][T27624] do_sendfile+0xadc/0xe20 [ 1573.771666][T27624] ? __pfx_do_sendfile+0x10/0x10 [ 1573.771703][T27624] ? __fget_files+0x21f/0x3d0 [ 1573.771764][T27624] __x64_sys_sendfile64+0x1d8/0x220 [ 1573.771807][T27624] ? ksys_write+0x1ac/0x250 [ 1573.771842][T27624] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 1573.771898][T27624] do_syscall_64+0xc9/0xf80 [ 1573.771940][T27624] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1573.771974][T27624] RIP: 0033:0x7fc94219aeb9 [ 1573.772000][T27624] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1573.772033][T27624] RSP: 002b:00007fc943093028 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1573.772065][T27624] RAX: ffffffffffffffda RBX: 00007fc942415fa0 RCX: 00007fc94219aeb9 [ 1573.772088][T27624] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 1573.772107][T27624] RBP: 00007fc943093090 R08: 0000000000000000 R09: 0000000000000000 [ 1573.772127][T27624] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 1573.772147][T27624] R13: 00007fc942416038 R14: 00007fc942415fa0 R15: 00007ffdf1967538 [ 1573.772191][T27624] [ 1576.422393][T27653] ovs_?: entered promiscuous mode [ 1577.135772][T27674] netlink: 12 bytes leftover after parsing attributes in process `syz.5.5226'. [ 1577.187211][T27671] HfR: entered promiscuous mode [ 1577.219049][T27674] HfR: left promiscuous mode [ 1577.950798][T27689] HfR: entered promiscuous mode [ 1577.974624][T27689] netlink: 12 bytes leftover after parsing attributes in process `syz.5.5230'. [ 1577.994274][T27689] HfR: left promiscuous mode [ 1580.113423][T27711] FAULT_INJECTION: forcing a failure. [ 1580.113423][T27711] name failslab, interval 1, probability 0, space 0, times 0 [ 1580.168436][T27711] CPU: 1 UID: 0 PID: 27711 Comm: syz.5.5236 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1580.168492][T27711] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1580.168505][T27711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1580.168526][T27711] Call Trace: [ 1580.168538][T27711] [ 1580.168551][T27711] dump_stack_lvl+0x100/0x190 [ 1580.168596][T27711] should_fail_ex.cold+0x5/0xa [ 1580.168649][T27711] should_failslab+0xc2/0x120 [ 1580.168694][T27711] __kmalloc_cache_noprof+0x80/0x810 [ 1580.168730][T27711] ? kvm_hv_vcpu_init+0xa4/0x7a0 [ 1580.168777][T27711] ? kasan_save_stack+0x3f/0x50 [ 1580.168822][T27711] ? kvm_hv_vcpu_init+0xa4/0x7a0 [ 1580.168864][T27711] ? kvm_vcpu_ioctl+0x8a0/0x16d0 [ 1580.168893][T27711] kvm_hv_vcpu_init+0xa4/0x7a0 [ 1580.168947][T27711] kvm_hv_get_msr_common+0xfd/0x1820 [ 1580.169010][T27711] ? __pfx_kvm_hv_get_msr_common+0x10/0x10 [ 1580.169076][T27711] kvm_get_msr_common+0x1af2/0x2a20 [ 1580.169132][T27711] vmx_get_msr+0x29f/0x15b0 [ 1580.169184][T27711] __kvm_get_msr+0xeb/0x470 [ 1580.169234][T27711] ? __pfx___kvm_get_msr+0x10/0x10 [ 1580.169295][T27711] kvm_get_msr_ignored_check+0x30/0x390 [ 1580.169349][T27711] msr_io+0x1c0/0x480 [ 1580.169389][T27711] ? __pfx_do_get_msr+0x10/0x10 [ 1580.169445][T27711] ? __pfx_msr_io+0x10/0x10 [ 1580.169499][T27711] kvm_arch_vcpu_ioctl+0x1ae0/0x53e0 [ 1580.169542][T27711] ? kvm_arch_vcpu_ioctl+0x1ab8/0x53e0 [ 1580.169591][T27711] ? stack_trace_save+0x8e/0xc0 [ 1580.169630][T27711] ? __pfx_kvm_arch_vcpu_ioctl+0x10/0x10 [ 1580.169674][T27711] ? __lock_acquire+0x4a5/0x2630 [ 1580.169722][T27711] ? kasan_save_stack+0x3f/0x50 [ 1580.169758][T27711] ? kasan_save_stack+0x30/0x50 [ 1580.169794][T27711] ? kasan_save_track+0x14/0x30 [ 1580.169832][T27711] ? kasan_save_free_info+0x3b/0x70 [ 1580.169868][T27711] ? __lock_acquire+0x4a5/0x2630 [ 1580.169924][T27711] ? lock_acquire+0x17c/0x330 [ 1580.169974][T27711] ? __pfx___might_resched+0x10/0x10 [ 1580.170028][T27711] ? rcu_is_watching+0x12/0xc0 [ 1580.170061][T27711] ? trace_contention_end+0xd6/0x110 [ 1580.170107][T27711] ? __mutex_lock+0x26a/0x1b90 [ 1580.170150][T27711] ? kvm_vcpu_ioctl+0x322/0x16d0 [ 1580.170182][T27711] ? kasan_quarantine_put+0x104/0x240 [ 1580.170221][T27711] ? __pfx___mutex_lock+0x10/0x10 [ 1580.170268][T27711] ? tomoyo_path_number_perm+0x28f/0x580 [ 1580.170327][T27711] ? tomoyo_path_number_perm+0x188/0x580 [ 1580.170381][T27711] ? kvm_vcpu_ioctl+0x8a0/0x16d0 [ 1580.170408][T27711] kvm_vcpu_ioctl+0x8a0/0x16d0 [ 1580.170443][T27711] ? __pfx_kvm_vcpu_ioctl+0x10/0x10 [ 1580.170474][T27711] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1580.170512][T27711] ? do_vfs_ioctl+0x226/0x13e0 [ 1580.170562][T27711] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1580.170621][T27711] ? find_held_lock+0x2b/0x80 [ 1580.170649][T27711] ? hook_file_ioctl_common+0x146/0x410 [ 1580.170702][T27711] ? __fget_files+0x21f/0x3d0 [ 1580.170744][T27711] ? __pfx_kvm_vcpu_ioctl+0x10/0x10 [ 1580.170776][T27711] __x64_sys_ioctl+0x18e/0x210 [ 1580.170828][T27711] do_syscall_64+0xc9/0xf80 [ 1580.170872][T27711] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1580.170904][T27711] RIP: 0033:0x7f654799aeb9 [ 1580.170929][T27711] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1580.170960][T27711] RSP: 002b:00007f6548804028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1580.170999][T27711] RAX: ffffffffffffffda RBX: 00007f6547c15fa0 RCX: 00007f654799aeb9 [ 1580.171021][T27711] RDX: 0000200000000080 RSI: 00000000c008ae88 RDI: 0000000000000004 [ 1580.171042][T27711] RBP: 00007f6548804090 R08: 0000000000000000 R09: 0000000000000000 [ 1580.171063][T27711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1580.171082][T27711] R13: 00007f6547c16038 R14: 00007f6547c15fa0 R15: 00007ffc618ca5d8 [ 1580.171126][T27711] [ 1581.561673][T27719] netlink: 12 bytes leftover after parsing attributes in process `syz.5.5238'. [ 1581.597886][T27718] HfR: entered promiscuous mode [ 1581.691187][T27719] HfR: left promiscuous mode [ 1582.390732][T27744] FAULT_INJECTION: forcing a failure. [ 1582.390732][T27744] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.458259][T27744] CPU: 1 UID: 0 PID: 27744 Comm: syz.4.5246 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1582.458311][T27744] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1582.458323][T27744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1582.458343][T27744] Call Trace: [ 1582.458354][T27744] [ 1582.458367][T27744] dump_stack_lvl+0x100/0x190 [ 1582.458411][T27744] should_fail_ex.cold+0x5/0xa [ 1582.458463][T27744] should_failslab+0xc2/0x120 [ 1582.458624][T27744] ? tomoyo_realpath_from_path+0xb6/0x690 [ 1582.458661][T27744] __kmalloc_noprof+0xf6/0x9c0 [ 1582.458818][T27744] ? tomoyo_realpath_from_path+0xb6/0x690 [ 1582.458859][T27744] tomoyo_realpath_from_path+0xb6/0x690 [ 1582.458902][T27744] tomoyo_path_number_perm+0x23c/0x580 [ 1582.458945][T27744] ? tomoyo_path_number_perm+0x22e/0x580 [ 1582.458995][T27744] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1582.459078][T27744] ? find_held_lock+0x2b/0x80 [ 1582.459110][T27744] ? hook_file_ioctl_common+0x146/0x410 [ 1582.459157][T27744] ? __fget_files+0x215/0x3d0 [ 1582.459200][T27744] ? __fget_files+0x21f/0x3d0 [ 1582.459242][T27744] security_file_ioctl+0xd3/0x230 [ 1582.459291][T27744] __x64_sys_ioctl+0xb7/0x210 [ 1582.459346][T27744] do_syscall_64+0xc9/0xf80 [ 1582.459389][T27744] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1582.459421][T27744] RIP: 0033:0x7f0bfcb9aeb9 [ 1582.459448][T27744] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1582.459480][T27744] RSP: 002b:00007f0bfdb37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1582.459512][T27744] RAX: ffffffffffffffda RBX: 00007f0bfce15fa0 RCX: 00007f0bfcb9aeb9 [ 1582.459534][T27744] RDX: 0000000000000038 RSI: 00000000c1007c01 RDI: 0000000000000003 [ 1582.459555][T27744] RBP: 00007f0bfdb37090 R08: 0000000000000000 R09: 0000000000000000 [ 1582.459575][T27744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1582.459595][T27744] R13: 00007f0bfce16038 R14: 00007f0bfce15fa0 R15: 00007ffeb8565fe8 [ 1582.459640][T27744] [ 1582.459653][T27744] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1583.481331][T27767] vivid-009: ================= START STATUS ================= [ 1583.505736][T27767] vivid-009: Radio HW Seek Mode: Bounded [ 1583.536030][T27767] vivid-009: Radio Programmable HW Seek: false [ 1583.559276][T27767] vivid-009: RDS Rx I/O Mode: Block I/O [ 1583.564998][T27767] vivid-009: Generate RBDS Instead of RDS: false [ 1583.653657][T27773] FAULT_INJECTION: forcing a failure. [ 1583.653657][T27773] name failslab, interval 1, probability 0, space 0, times 0 [ 1583.669648][T27767] vivid-009: RDS Reception: true [ 1583.685554][T27767] vivid-009: RDS Program Type: 0 inactive [ 1583.740818][T27775] FAULT_INJECTION: forcing a failure. [ 1583.740818][T27775] name failslab, interval 1, probability 0, space 0, times 0 [ 1583.753962][T27773] CPU: 1 UID: 0 PID: 27773 Comm: syz.5.5257 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1583.754003][T27773] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1583.754012][T27773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1583.754027][T27773] Call Trace: [ 1583.754037][T27773] [ 1583.754047][T27773] dump_stack_lvl+0x100/0x190 [ 1583.754080][T27773] should_fail_ex.cold+0x5/0xa [ 1583.754120][T27773] should_failslab+0xc2/0x120 [ 1583.754153][T27773] ? genl_family_rcv_msg_attrs_parse.isra.0+0xc8/0x290 [ 1583.754181][T27773] __kmalloc_noprof+0xf6/0x9c0 [ 1583.754205][T27773] ? __pfx___mutex_lock+0x10/0x10 [ 1583.754242][T27773] ? genl_family_rcv_msg_attrs_parse.isra.0+0xc8/0x290 [ 1583.754270][T27773] genl_family_rcv_msg_attrs_parse.isra.0+0xc8/0x290 [ 1583.754408][T27773] genl_start+0x18f/0x970 [ 1583.754440][T27773] __netlink_dump_start+0x60e/0x990 [ 1583.754481][T27773] genl_family_rcv_msg_dumpit+0x1e2/0x2e0 [ 1583.754509][T27773] ? __pfx_genl_family_rcv_msg_dumpit+0x10/0x10 [ 1583.754543][T27773] ? __pfx_genl_start+0x10/0x10 [ 1583.754565][T27773] ? __pfx_genl_dumpit+0x10/0x10 [ 1583.754587][T27773] ? __pfx_genl_done+0x10/0x10 [ 1583.754612][T27773] ? bpf_lsm_capable+0x9/0x10 [ 1583.754641][T27773] ? security_capable+0x80/0x260 [ 1583.754675][T27773] genl_rcv_msg+0x471/0x800 [ 1583.754705][T27773] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1583.754731][T27773] ? __pfx_nl802154_dump_llsec_key+0x10/0x10 [ 1583.754771][T27773] netlink_rcv_skb+0x159/0x420 [ 1583.754809][T27773] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1583.754835][T27773] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1583.754886][T27773] ? netlink_deliver_tap+0x1ae/0xcc0 [ 1583.754926][T27773] genl_rcv+0x28/0x40 [ 1583.754947][T27773] netlink_unicast+0x5aa/0x870 [ 1583.754989][T27773] ? __pfx_netlink_unicast+0x10/0x10 [ 1583.755026][T27773] ? __pfx___might_resched+0x10/0x10 [ 1583.755063][T27773] ? __lock_acquire+0x4a5/0x2630 [ 1583.755103][T27773] netlink_sendmsg+0x8b0/0xda0 [ 1583.755146][T27773] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1583.755182][T27773] ? __import_iovec+0x1d2/0x640 [ 1583.755222][T27773] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1583.755258][T27773] ____sys_sendmsg+0xa54/0xc30 [ 1583.755288][T27773] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1583.755329][T27773] ___sys_sendmsg+0x190/0x1e0 [ 1583.755359][T27773] ? __pfx____sys_sendmsg+0x10/0x10 [ 1583.755404][T27773] ? find_held_lock+0x2b/0x80 [ 1583.755447][T27773] __sys_sendmsg+0x170/0x220 [ 1583.755484][T27773] ? __pfx___sys_sendmsg+0x10/0x10 [ 1583.755539][T27773] do_syscall_64+0xc9/0xf80 [ 1583.755571][T27773] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1583.755597][T27773] RIP: 0033:0x7f654799aeb9 [ 1583.755618][T27773] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1583.755649][T27773] RSP: 002b:00007f6548804028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1583.755673][T27773] RAX: ffffffffffffffda RBX: 00007f6547c15fa0 RCX: 00007f654799aeb9 [ 1583.755689][T27773] RDX: 00000000000040c0 RSI: 0000200000000140 RDI: 0000000000000003 [ 1583.755705][T27773] RBP: 00007f6548804090 R08: 0000000000000000 R09: 0000000000000000 [ 1583.755720][T27773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1583.755735][T27773] R13: 00007f6547c16038 R14: 00007f6547c15fa0 R15: 00007ffc618ca5d8 [ 1583.755766][T27773] [ 1584.089107][T27775] CPU: 1 UID: 0 PID: 27775 Comm: syz.4.5258 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1584.089160][T27775] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1584.089170][T27775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1584.089186][T27775] Call Trace: [ 1584.089194][T27775] [ 1584.089204][T27775] dump_stack_lvl+0x100/0x190 [ 1584.089245][T27775] should_fail_ex.cold+0x5/0xa [ 1584.089286][T27775] should_failslab+0xc2/0x120 [ 1584.089322][T27775] __kmalloc_cache_noprof+0x80/0x810 [ 1584.089348][T27775] ? kvm_uevent_notify_change.part.0+0x2a6/0x450 [ 1584.089400][T27775] ? kvm_uevent_notify_change.part.0+0x2a6/0x450 [ 1584.089439][T27775] kvm_uevent_notify_change.part.0+0x2a6/0x450 [ 1584.089478][T27775] ? __pfx_kvm_vm_release+0x10/0x10 [ 1584.089512][T27775] kvm_put_kvm+0xe4/0xb10 [ 1584.089545][T27775] ? lockdep_hardirqs_on+0x78/0x100 [ 1584.089574][T27775] ? _raw_spin_unlock_irq+0x2e/0x50 [ 1584.089599][T27775] ? kvm_irqfd_release+0xd3/0x110 [ 1584.089627][T27775] ? __pfx_kvm_vm_release+0x10/0x10 [ 1584.089662][T27775] kvm_vm_release+0x3c/0x50 [ 1584.089695][T27775] __fput+0x3ff/0xb40 [ 1584.089730][T27775] ? _raw_spin_unlock_irq+0x23/0x50 [ 1584.089757][T27775] task_work_run+0x150/0x240 [ 1584.089797][T27775] ? __pfx_task_work_run+0x10/0x10 [ 1584.089843][T27775] exit_to_user_mode_loop+0x100/0x4b0 [ 1584.089878][T27775] ? rcu_is_watching+0x12/0xc0 [ 1584.089903][T27775] do_syscall_64+0x4ea/0xf80 [ 1584.089935][T27775] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1584.089960][T27775] RIP: 0033:0x7f0bfcb9aeb9 [ 1584.089980][T27775] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1584.090004][T27775] RSP: 002b:00007f0bfdb37028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 1584.090027][T27775] RAX: 0000000000000000 RBX: 00007f0bfce15fa0 RCX: 00007f0bfcb9aeb9 [ 1584.090043][T27775] RDX: 0000000000000000 RSI: 000000000000000a RDI: 0000000000000002 [ 1584.090057][T27775] RBP: 00007f0bfcc08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1584.090072][T27775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1584.090087][T27775] R13: 00007f0bfce16038 R14: 00007f0bfce15fa0 R15: 00007ffeb8565fe8 [ 1584.090118][T27775] [ 1584.321566][T27767] vivid-009: RDS PS Name: inactive [ 1584.327186][T27767] vivid-009: RDS Radio Text: inactive [ 1584.332753][T27767] vivid-009: RDS Traffic Announcement: false inactive [ 1584.339757][T27767] vivid-009: RDS Traffic Program: false inactive [ 1584.346168][T27767] vivid-009: RDS Music: false inactive [ 1584.351789][T27767] vivid-009: ================== END STATUS ================== [ 1586.724487][T27814] zswap: compressor not available [ 1587.485475][T27836] input: jJǸ-9%v as /devices/virtual/input/input59 [ 1587.763508][T27841] FAULT_INJECTION: forcing a failure. [ 1587.763508][T27841] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1587.837238][T27841] CPU: 1 UID: 0 PID: 27841 Comm: syz.6.5271 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1587.837296][T27841] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1587.837311][T27841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1587.837332][T27841] Call Trace: [ 1587.837343][T27841] [ 1587.837357][T27841] dump_stack_lvl+0x100/0x190 [ 1587.837404][T27841] should_fail_ex.cold+0x5/0xa [ 1587.837452][T27841] ? prepare_alloc_pages+0x16d/0x5f0 [ 1587.837507][T27841] should_fail_alloc_page+0xeb/0x140 [ 1587.837559][T27841] prepare_alloc_pages+0x1f0/0x5f0 [ 1587.837610][T27841] ? rcu_is_watching+0x12/0xc0 [ 1587.837649][T27841] __alloc_frozen_pages_noprof+0x193/0x2410 [ 1587.837700][T27841] ? __lock_acquire+0x4a5/0x2630 [ 1587.837745][T27841] ? css_rstat_updated+0x1ce/0x5a0 [ 1587.837788][T27841] ? __pfx_css_rstat_updated+0x10/0x10 [ 1587.837835][T27841] ? xas_create+0x1f4/0x14e0 [ 1587.837877][T27841] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1587.837926][T27841] ? rcu_is_watching+0x12/0xc0 [ 1587.837975][T27841] ? __lock_acquire+0x4a5/0x2630 [ 1587.838026][T27841] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1587.838067][T27841] ? policy_nodemask+0xed/0x4f0 [ 1587.838123][T27841] alloc_pages_mpol+0x1fb/0x550 [ 1587.838172][T27841] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1587.838221][T27841] ? find_held_lock+0x2b/0x80 [ 1587.838250][T27841] ? filemap_get_entry+0x1a7/0x3b0 [ 1587.838295][T27841] ? filemap_get_entry+0x1a7/0x3b0 [ 1587.838344][T27841] folio_alloc_noprof+0x22/0x330 [ 1587.838398][T27841] filemap_alloc_folio_noprof.part.0+0x377/0x450 [ 1587.838434][T27841] ? __pfx_filemap_get_entry+0x10/0x10 [ 1587.838477][T27841] ? filemap_add_folio+0x114/0x690 [ 1587.838524][T27841] ? __pfx_filemap_alloc_folio_noprof.part.0+0x10/0x10 [ 1587.838562][T27841] ? ioctx_alloc+0x1717/0x21e0 [ 1587.838603][T27841] ? rcu_is_watching+0x12/0xc0 [ 1587.838641][T27841] __filemap_get_folio_mpol+0x6a4/0xe70 [ 1587.838700][T27841] ioctx_alloc+0x7a0/0x21e0 [ 1587.838758][T27841] ? __pfx_ioctx_alloc+0x10/0x10 [ 1587.838811][T27841] __x64_sys_io_setup+0xc9/0x220 [ 1587.838857][T27841] do_syscall_64+0xc9/0xf80 [ 1587.838901][T27841] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1587.838937][T27841] RIP: 0033:0x7fc94219aeb9 [ 1587.838966][T27841] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1587.839000][T27841] RSP: 002b:00007fc943093028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 1587.839041][T27841] RAX: ffffffffffffffda RBX: 00007fc942415fa0 RCX: 00007fc94219aeb9 [ 1587.839065][T27841] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 000000000000ff1f [ 1587.839087][T27841] RBP: 00007fc942208c1f R08: 0000000000000000 R09: 0000000000000000 [ 1587.839109][T27841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1587.839131][T27841] R13: 00007fc942416038 R14: 00007fc942415fa0 R15: 00007ffdf1967538 [ 1587.839178][T27841] [ 1588.149648][T27849] FAULT_INJECTION: forcing a failure. [ 1588.149648][T27849] name failslab, interval 1, probability 0, space 0, times 0 [ 1588.162534][T27849] CPU: 1 UID: 0 PID: 27849 Comm: syz.2.5273 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1588.162589][T27849] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1588.162602][T27849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1588.162621][T27849] Call Trace: [ 1588.162633][T27849] [ 1588.162647][T27849] dump_stack_lvl+0x100/0x190 [ 1588.162691][T27849] should_fail_ex.cold+0x5/0xa [ 1588.162745][T27849] should_failslab+0xc2/0x120 [ 1588.162793][T27849] ? genl_family_rcv_msg_attrs_parse.isra.0+0xc8/0x290 [ 1588.162830][T27849] __kmalloc_noprof+0xf6/0x9c0 [ 1588.162863][T27849] ? kasan_quarantine_put+0x104/0x240 [ 1588.162903][T27849] ? lockdep_hardirqs_on+0x78/0x100 [ 1588.162948][T27849] ? genl_family_rcv_msg_attrs_parse.isra.0+0xc8/0x290 [ 1588.162986][T27849] genl_family_rcv_msg_attrs_parse.isra.0+0xc8/0x290 [ 1588.163031][T27849] genl_family_rcv_msg_doit+0xc7/0x300 [ 1588.163073][T27849] ? __pfx_genl_family_rcv_msg_doit+0x10/0x10 [ 1588.163108][T27849] ? genl_get_cmd+0x3ef/0x720 [ 1588.163152][T27849] ? __dev_queue_xmit+0x7fd/0x46f0 [ 1588.163191][T27849] ? __radix_tree_lookup+0x217/0x2b0 [ 1588.163229][T27849] genl_rcv_msg+0x560/0x800 [ 1588.163274][T27849] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1588.163309][T27849] ? __pfx_psp_device_get_locked+0x10/0x10 [ 1588.163350][T27849] ? __pfx_psp_nl_dev_get_doit+0x10/0x10 [ 1588.163390][T27849] ? __pfx_psp_device_unlock+0x10/0x10 [ 1588.163445][T27849] netlink_rcv_skb+0x159/0x420 [ 1588.163498][T27849] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1588.163535][T27849] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1588.163601][T27849] ? netlink_deliver_tap+0x1ae/0xcc0 [ 1588.163654][T27849] genl_rcv+0x28/0x40 [ 1588.163684][T27849] netlink_unicast+0x5aa/0x870 [ 1588.163739][T27849] ? __pfx_netlink_unicast+0x10/0x10 [ 1588.163801][T27849] netlink_sendmsg+0x8b0/0xda0 [ 1588.163851][T27849] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1588.163893][T27849] ? __import_iovec+0x1d2/0x640 [ 1588.163941][T27849] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1588.163983][T27849] ____sys_sendmsg+0xa54/0xc30 [ 1588.164018][T27849] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1588.164065][T27849] ___sys_sendmsg+0x190/0x1e0 [ 1588.164100][T27849] ? __pfx____sys_sendmsg+0x10/0x10 [ 1588.164149][T27849] ? find_held_lock+0x2b/0x80 [ 1588.164198][T27849] __sys_sendmsg+0x170/0x220 [ 1588.164241][T27849] ? __pfx___sys_sendmsg+0x10/0x10 [ 1588.164310][T27849] do_syscall_64+0xc9/0xf80 [ 1588.164348][T27849] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1588.164376][T27849] RIP: 0033:0x7f346f19aeb9 [ 1588.164399][T27849] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1588.164428][T27849] RSP: 002b:00007f346d3f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1588.164455][T27849] RAX: ffffffffffffffda RBX: 00007f346f416090 RCX: 00007f346f19aeb9 [ 1588.164474][T27849] RDX: 0000000004000900 RSI: 0000200000004100 RDI: 0000000000000003 [ 1588.164492][T27849] RBP: 00007f346d3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1588.164509][T27849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1588.164526][T27849] R13: 00007f346f416128 R14: 00007f346f416090 R15: 00007ffe3a29e608 [ 1588.164561][T27849] [ 1588.878478][T27852] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5274'. [ 1589.523343][T27866] HfR: entered promiscuous mode [ 1589.803216][T27872] usb usb36: usbfs: process 27872 (syz.4.5278) did not claim interface 0 before use [ 1590.381070][T27887] FAULT_INJECTION: forcing a failure. [ 1590.381070][T27887] name failslab, interval 1, probability 0, space 0, times 0 [ 1590.415890][T27887] CPU: 1 UID: 0 PID: 27887 Comm: syz.5.5283 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1590.415950][T27887] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1590.415966][T27887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1590.415989][T27887] Call Trace: [ 1590.416001][T27887] [ 1590.416013][T27887] dump_stack_lvl+0x100/0x190 [ 1590.416061][T27887] should_fail_ex.cold+0x5/0xa [ 1590.416118][T27887] should_failslab+0xc2/0x120 [ 1590.416167][T27887] kmem_cache_alloc_lru_noprof+0x8e/0x7d0 [ 1590.416214][T27887] ? dquot_alloc_inode+0x51b/0xb10 [ 1590.416266][T27887] ? __d_alloc+0x34/0xa80 [ 1590.416316][T27887] ? __d_alloc+0x34/0xa80 [ 1590.416354][T27887] __d_alloc+0x34/0xa80 [ 1590.416401][T27887] d_alloc_pseudo+0x1c/0xc0 [ 1590.416455][T27887] alloc_file_pseudo+0xcf/0x230 [ 1590.416509][T27887] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1590.416572][T27887] __shmem_file_setup+0x1a3/0x330 [ 1590.416613][T27887] shmem_zero_setup+0x93/0x1b0 [ 1590.416662][T27887] __mmap_region+0x2101/0x2820 [ 1590.416709][T27887] ? __pfx___mmap_region+0x10/0x10 [ 1590.416790][T27887] ? finish_task_switch.isra.0+0x204/0xb70 [ 1590.416833][T27887] ? lockdep_hardirqs_on+0x78/0x100 [ 1590.416875][T27887] ? finish_task_switch.isra.0+0x204/0xb70 [ 1590.416991][T27887] ? mm_get_unmapped_area_vmflags+0xd7/0x130 [ 1590.417049][T27887] ? rcu_is_watching+0x12/0xc0 [ 1590.417093][T27887] mmap_region+0x180/0x3e0 [ 1590.417143][T27887] do_mmap+0xc63/0x12f0 [ 1590.417203][T27887] ? __pfx_do_mmap+0x10/0x10 [ 1590.417256][T27887] ? __pfx_down_write_killable+0x10/0x10 [ 1590.417312][T27887] vm_mmap_pgoff+0x29e/0x470 [ 1590.417371][T27887] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 1590.417433][T27887] ? __x64_sys_futex+0x34f/0x4d0 [ 1590.417478][T27887] ? __x64_sys_futex+0x358/0x4d0 [ 1590.417530][T27887] ksys_mmap_pgoff+0x7d/0x5b0 [ 1590.417586][T27887] __x64_sys_mmap+0x125/0x190 [ 1590.417623][T27887] do_syscall_64+0xc9/0xf80 [ 1590.417668][T27887] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1590.417703][T27887] RIP: 0033:0x7f654799aeb9 [ 1590.417732][T27887] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1590.417819][T27887] RSP: 002b:00007f65487e3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1590.417856][T27887] RAX: ffffffffffffffda RBX: 00007f6547c16090 RCX: 00007f654799aeb9 [ 1590.417880][T27887] RDX: 0000000000000006 RSI: 000000000000e983 RDI: 0000000000000000 [ 1590.417902][T27887] RBP: 00007f6547a08c1f R08: ffffffffffffffff R09: 0000000000008000 [ 1590.417927][T27887] R10: 0000000000000eb1 R11: 0000000000000246 R12: 0000000000000000 [ 1590.417949][T27887] R13: 00007f6547c16128 R14: 00007f6547c16090 R15: 00007ffc618ca5d8 [ 1590.417995][T27887] [ 1590.912718][T27891] can: request_module (can-proto-0) failed. [ 1591.820223][T27912] HfR: entered promiscuous mode [ 1591.992232][T27915] FAULT_INJECTION: forcing a failure. [ 1591.992232][T27915] name failslab, interval 1, probability 0, space 0, times 0 [ 1592.049083][T27915] CPU: 0 UID: 0 PID: 27915 Comm: syz.5.5288 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1592.049124][T27915] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1592.049134][T27915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1592.049148][T27915] Call Trace: [ 1592.049157][T27915] [ 1592.049167][T27915] dump_stack_lvl+0x100/0x190 [ 1592.049199][T27915] should_fail_ex.cold+0x5/0xa [ 1592.049239][T27915] should_failslab+0xc2/0x120 [ 1592.049271][T27915] ? tomoyo_encode2+0xfb/0x3c0 [ 1592.049293][T27915] __kmalloc_noprof+0xf6/0x9c0 [ 1592.049325][T27915] ? tomoyo_encode2+0xfb/0x3c0 [ 1592.049346][T27915] tomoyo_encode2+0xfb/0x3c0 [ 1592.049373][T27915] tomoyo_encode+0x29/0x50 [ 1592.049395][T27915] tomoyo_realpath_from_path+0x18c/0x690 [ 1592.049426][T27915] tomoyo_path_number_perm+0x23c/0x580 [ 1592.049459][T27915] ? tomoyo_path_number_perm+0x22e/0x580 [ 1592.049496][T27915] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1592.049559][T27915] ? find_held_lock+0x2b/0x80 [ 1592.049582][T27915] ? hook_file_ioctl_common+0x146/0x410 [ 1592.049617][T27915] ? __fget_files+0x215/0x3d0 [ 1592.049648][T27915] ? __fget_files+0x21f/0x3d0 [ 1592.049678][T27915] security_file_ioctl+0xd3/0x230 [ 1592.049714][T27915] __x64_sys_ioctl+0xb7/0x210 [ 1592.049754][T27915] do_syscall_64+0xc9/0xf80 [ 1592.049785][T27915] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1592.049809][T27915] RIP: 0033:0x7f654799aeb9 [ 1592.049827][T27915] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1592.049851][T27915] RSP: 002b:00007f6548804028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1592.049873][T27915] RAX: ffffffffffffffda RBX: 00007f6547c15fa0 RCX: 00007f654799aeb9 [ 1592.049890][T27915] RDX: 00002000000001c0 RSI: fffffffffffffd02 RDI: 0000000000000006 [ 1592.049911][T27915] RBP: 00007f6548804090 R08: 0000000000000000 R09: 0000000000000000 [ 1592.049926][T27915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1592.049940][T27915] R13: 00007f6547c16038 R14: 00007f6547c15fa0 R15: 00007ffc618ca5d8 [ 1592.049971][T27915] [ 1592.049990][T27915] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1592.329887][T27917] netlink: 350 bytes leftover after parsing attributes in process `syz.6.5289'. [ 1593.700018][T27935] FAULT_INJECTION: forcing a failure. [ 1593.700018][T27935] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1593.757502][T27935] CPU: 1 UID: 0 PID: 27935 Comm: syz.6.5293 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1593.757555][T27935] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1593.757569][T27935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1593.757587][T27935] Call Trace: [ 1593.757599][T27935] [ 1593.757611][T27935] dump_stack_lvl+0x100/0x190 [ 1593.757657][T27935] should_fail_ex.cold+0x5/0xa [ 1593.757704][T27935] ? prepare_alloc_pages+0x16d/0x5f0 [ 1593.757757][T27935] should_fail_alloc_page+0xeb/0x140 [ 1593.757810][T27935] prepare_alloc_pages+0x1f0/0x5f0 [ 1593.757866][T27935] __alloc_frozen_pages_noprof+0x193/0x2410 [ 1593.757922][T27935] ? __lock_acquire+0x4a5/0x2630 [ 1593.757974][T27935] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1593.758030][T27935] ? is_bpf_text_address+0x8a/0x1a0 [ 1593.758081][T27935] ? bpf_ksym_find+0x124/0x1c0 [ 1593.758127][T27935] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1593.758164][T27935] ? is_bpf_text_address+0x94/0x1a0 [ 1593.758213][T27935] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1593.758250][T27935] ? policy_nodemask+0xed/0x4f0 [ 1593.758298][T27935] alloc_pages_mpol+0x1fb/0x550 [ 1593.758346][T27935] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1593.758402][T27935] folio_alloc_mpol_noprof+0x36/0x340 [ 1593.758454][T27935] shmem_alloc_folio+0x135/0x160 [ 1593.758489][T27935] shmem_alloc_and_add_folio+0x371/0xd40 [ 1593.758547][T27935] ? __pfx_shmem_alloc_and_add_folio+0x10/0x10 [ 1593.758590][T27935] ? shmem_allowable_huge_orders+0x2bd/0x400 [ 1593.758639][T27935] shmem_get_folio_gfp+0x6ab/0x1900 [ 1593.758694][T27935] ? __pfx_shmem_get_folio_gfp+0x10/0x10 [ 1593.758745][T27935] shmem_fault+0x1f9/0xa20 [ 1593.758788][T27935] ? __pfx_shmem_fault+0x10/0x10 [ 1593.758825][T27935] ? trace_kmem_cache_alloc+0x80/0xb0 [ 1593.758874][T27935] ? ptlock_alloc+0x1f/0x70 [ 1593.758908][T27935] ? lockdep_init_map_type+0x5c/0x250 [ 1593.758954][T27935] ? __raw_spin_lock_init+0x3a/0x110 [ 1593.759010][T27935] ? __pfx_filemap_map_pages+0x10/0x10 [ 1593.759052][T27935] __do_fault+0x10d/0x550 [ 1593.759100][T27935] ? __pfx_filemap_map_pages+0x10/0x10 [ 1593.759140][T27935] do_fault+0x2db/0x1990 [ 1593.759190][T27935] ? __pmd_alloc+0x6aa/0x9c0 [ 1593.759243][T27935] __handle_mm_fault+0x1807/0x2b50 [ 1593.759286][T27935] ? mt_find+0x45e/0x8e0 [ 1593.759331][T27935] ? __pfx___handle_mm_fault+0x10/0x10 [ 1593.759362][T27935] ? __pfx_mt_find+0x10/0x10 [ 1593.759426][T27935] ? find_vma+0xbf/0x140 [ 1593.759469][T27935] ? __pfx_find_vma+0x10/0x10 [ 1593.759526][T27935] handle_mm_fault+0x36d/0xa20 [ 1593.759571][T27935] do_user_addr_fault+0x74c/0x12f0 [ 1593.759620][T27935] exc_page_fault+0x6f/0xd0 [ 1593.759659][T27935] asm_exc_page_fault+0x26/0x30 [ 1593.759691][T27935] RIP: 0010:rep_movs_alternative+0x33/0x90 [ 1593.759741][T27935] Code: 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 7d 7d 04 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8b 06 <48> 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb [ 1593.759773][T27935] RSP: 0018:ffffc9000c157b10 EFLAGS: 00050206 [ 1593.759801][T27935] RAX: 656d69745f637472 RBX: 0000000000000000 RCX: 000000000000001f [ 1593.759822][T27935] RDX: 0000000000000001 RSI: ffff8880a7746000 RDI: 0000000000000000 [ 1593.759842][T27935] RBP: ffffc9000c157d80 R08: 0000000000000000 R09: ffffed1014ee8c03 [ 1593.759863][T27935] R10: ffff8880a774601e R11: 0000000000000000 R12: 000000000000001f [ 1593.759885][T27935] R13: 00007ffffffff000 R14: ffff8880a7746000 R15: 000000000000001f [ 1593.759927][T27935] _copy_to_iter+0x391/0x1720 [ 1593.759987][T27935] ? __pfx__copy_to_iter+0x10/0x10 [ 1593.760034][T27935] ? trace_kmalloc+0x83/0xb0 [ 1593.760082][T27935] ? seq_read_iter+0x819/0x1270 [ 1593.760127][T27935] seq_read_iter+0xdab/0x1270 [ 1593.760178][T27935] proc_reg_read_iter+0x220/0x310 [ 1593.760225][T27935] ? __pfx_proc_reg_read_iter+0x10/0x10 [ 1593.760274][T27935] vfs_read+0x825/0xb30 [ 1593.760316][T27935] ? __pfx_vfs_read+0x10/0x10 [ 1593.760350][T27935] ? find_held_lock+0x2b/0x80 [ 1593.760409][T27935] __x64_sys_pread64+0x1eb/0x250 [ 1593.760448][T27935] ? __pfx___x64_sys_pread64+0x10/0x10 [ 1593.760504][T27935] do_syscall_64+0xc9/0xf80 [ 1593.760545][T27935] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1593.760579][T27935] RIP: 0033:0x7fc94219aeb9 [ 1593.760604][T27935] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1593.760637][T27935] RSP: 002b:00007fc943093028 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1593.760668][T27935] RAX: ffffffffffffffda RBX: 00007fc942415fa0 RCX: 00007fc94219aeb9 [ 1593.760690][T27935] RDX: 000000000000001f RSI: 0000000000000000 RDI: 0000000000000003 [ 1593.760710][T27935] RBP: 00007fc943093090 R08: 0000000000000000 R09: 0000000000000000 [ 1593.760731][T27935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1593.760752][T27935] R13: 00007fc942416038 R14: 00007fc942415fa0 R15: 00007ffdf1967538 [ 1593.760797][T27935] [ 1596.448341][T27983] FAULT_INJECTION: forcing a failure. [ 1596.448341][T27983] name failslab, interval 1, probability 0, space 0, times 0 [ 1596.527426][T27983] CPU: 0 UID: 0 PID: 27983 Comm: syz.5.5301 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1596.527472][T27983] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1596.527481][T27983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1596.527496][T27983] Call Trace: [ 1596.527504][T27983] [ 1596.527514][T27983] dump_stack_lvl+0x100/0x190 [ 1596.527549][T27983] should_fail_ex.cold+0x5/0xa [ 1596.527589][T27983] should_failslab+0xc2/0x120 [ 1596.527624][T27983] kmem_cache_alloc_lru_noprof+0x8e/0x7d0 [ 1596.527659][T27983] ? do_raw_spin_lock+0x128/0x260 [ 1596.527697][T27983] ? find_held_lock+0x2b/0x80 [ 1596.527720][T27983] ? __d_alloc+0x34/0xa80 [ 1596.527754][T27983] ? __d_alloc+0x34/0xa80 [ 1596.527782][T27983] __d_alloc+0x34/0xa80 [ 1596.527815][T27983] d_alloc_pseudo+0x1c/0xc0 [ 1596.527854][T27983] alloc_file_pseudo+0xcf/0x230 [ 1596.527895][T27983] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1596.527931][T27983] ? alloc_fd+0x476/0x790 [ 1596.527963][T27983] sock_alloc_file+0x50/0x210 [ 1596.528004][T27983] __sys_socket+0x1c0/0x260 [ 1596.528031][T27983] ? fput+0x79/0x100 [ 1596.528063][T27983] ? __pfx___sys_socket+0x10/0x10 [ 1596.528092][T27983] ? xfd_validate_state+0x129/0x190 [ 1596.528191][T27983] __x64_sys_socket+0x72/0xb0 [ 1596.528242][T27983] ? lockdep_hardirqs_on+0x78/0x100 [ 1596.528281][T27983] do_syscall_64+0xc9/0xf80 [ 1596.528324][T27983] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1596.528357][T27983] RIP: 0033:0x7f654799aeb9 [ 1596.528384][T27983] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1596.528418][T27983] RSP: 002b:00007f65487e3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 1596.528450][T27983] RAX: ffffffffffffffda RBX: 00007f6547c16090 RCX: 00007f654799aeb9 [ 1596.528473][T27983] RDX: 0000000000000002 RSI: 0000000000000003 RDI: 0000000000000002 [ 1596.528494][T27983] RBP: 00007f6547a08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1596.528520][T27983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1596.528541][T27983] R13: 00007f6547c16128 R14: 00007f6547c16090 R15: 00007ffc618ca5d8 [ 1596.528587][T27983] [ 1597.284322][T27988] Console: switching to colour VGA+ 80x25 [ 1597.549181][T27998] FAULT_INJECTION: forcing a failure. [ 1597.549181][T27998] name failslab, interval 1, probability 0, space 0, times 0 [ 1597.573336][T27998] CPU: 0 UID: 0 PID: 27998 Comm: syz.2.5306 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1597.573391][T27998] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1597.573405][T27998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1597.573425][T27998] Call Trace: [ 1597.573435][T27998] [ 1597.573448][T27998] dump_stack_lvl+0x100/0x190 [ 1597.573492][T27998] should_fail_ex.cold+0x5/0xa [ 1597.573551][T27998] should_failslab+0xc2/0x120 [ 1597.573595][T27998] ? kernfs_fop_write_iter+0x26a/0x5f0 [ 1597.573626][T27998] __kmalloc_noprof+0xf6/0x9c0 [ 1597.573656][T27998] ? iter_file_splice_write+0x1d3/0x10a0 [ 1597.573696][T27998] ? rcu_is_watching+0x12/0xc0 [ 1597.573726][T27998] ? iter_file_splice_write+0x1d3/0x10a0 [ 1597.573771][T27998] ? kernfs_fop_write_iter+0x26a/0x5f0 [ 1597.573801][T27998] kernfs_fop_write_iter+0x26a/0x5f0 [ 1597.573840][T27998] iter_file_splice_write+0x82b/0x10a0 [ 1597.573900][T27998] ? __pfx_iter_file_splice_write+0x10/0x10 [ 1597.573946][T27998] ? __pfx_copy_splice_read+0x10/0x10 [ 1597.574004][T27998] ? __pfx_iter_file_splice_write+0x10/0x10 [ 1597.574046][T27998] direct_splice_actor+0x192/0x6c0 [ 1597.574087][T27998] splice_direct_to_actor+0x345/0xa30 [ 1597.574126][T27998] ? __pfx_direct_splice_actor+0x10/0x10 [ 1597.574180][T27998] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 1597.574230][T27998] do_splice_direct+0x174/0x240 [ 1597.574268][T27998] ? __pfx_do_splice_direct+0x10/0x10 [ 1597.574300][T27998] ? common_file_perm+0x1ab/0x4f0 [ 1597.574349][T27998] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 1597.574392][T27998] ? rw_verify_area+0xce/0x6d0 [ 1597.574429][T27998] do_sendfile+0xadc/0xe20 [ 1597.574472][T27998] ? __pfx_do_sendfile+0x10/0x10 [ 1597.574508][T27998] ? __fget_files+0x21f/0x3d0 [ 1597.574555][T27998] __x64_sys_sendfile64+0x1d8/0x220 [ 1597.574596][T27998] ? ksys_write+0x1ac/0x250 [ 1597.574627][T27998] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 1597.574681][T27998] do_syscall_64+0xc9/0xf80 [ 1597.574723][T27998] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1597.574756][T27998] RIP: 0033:0x7f346f19aeb9 [ 1597.574782][T27998] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1597.574813][T27998] RSP: 002b:00007f346ff7c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1597.574845][T27998] RAX: ffffffffffffffda RBX: 00007f346f415fa0 RCX: 00007f346f19aeb9 [ 1597.574868][T27998] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 1597.574888][T27998] RBP: 00007f346ff7c090 R08: 0000000000000000 R09: 0000000000000000 [ 1597.574907][T27998] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 1597.574927][T27998] R13: 00007f346f416038 R14: 00007f346f415fa0 R15: 00007ffe3a29e608 [ 1597.574970][T27998] [ 1599.195965][T28028] FAULT_INJECTION: forcing a failure. [ 1599.195965][T28028] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1599.219739][T28028] CPU: 1 UID: 0 PID: 28028 Comm: syz.4.5312 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1599.219800][T28028] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1599.219814][T28028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1599.219836][T28028] Call Trace: [ 1599.219847][T28028] [ 1599.219861][T28028] dump_stack_lvl+0x100/0x190 [ 1599.219909][T28028] should_fail_ex.cold+0x5/0xa [ 1599.219969][T28028] _copy_to_user+0x32/0xd0 [ 1599.220025][T28028] poll_select_finish+0x32f/0x670 [ 1599.220065][T28028] ? __pfx_poll_select_finish+0x10/0x10 [ 1599.220108][T28028] ? ktime_get_ts64+0x2d2/0x3f0 [ 1599.220155][T28028] ? read_tsc+0x9/0x20 [ 1599.220196][T28028] ? ktime_get_ts64+0x256/0x3f0 [ 1599.220241][T28028] kern_select+0x21b/0x270 [ 1599.220290][T28028] ? __pfx_kern_select+0x10/0x10 [ 1599.220342][T28028] __x64_sys_select+0xbd/0x160 [ 1599.220377][T28028] ? do_syscall_64+0x94/0xf80 [ 1599.220417][T28028] ? lockdep_hardirqs_on+0x78/0x100 [ 1599.220457][T28028] do_syscall_64+0xc9/0xf80 [ 1599.220502][T28028] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1599.220537][T28028] RIP: 0033:0x7f0bfcb9aeb9 [ 1599.220563][T28028] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1599.220598][T28028] RSP: 002b:00007f0bfdb37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000017 [ 1599.220632][T28028] RAX: ffffffffffffffda RBX: 00007f0bfce15fa0 RCX: 00007f0bfcb9aeb9 [ 1599.220658][T28028] RDX: 0000200000000180 RSI: 0000200000000040 RDI: 0000000000000003 [ 1599.220681][T28028] RBP: 00007f0bfcc08c1f R08: 00002000000000c0 R09: 0000000000000000 [ 1599.220703][T28028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1599.220725][T28028] R13: 00007f0bfce16038 R14: 00007f0bfce15fa0 R15: 00007ffeb8565fe8 [ 1599.220769][T28028] [ 1599.859488][T28043] FAULT_INJECTION: forcing a failure. [ 1599.859488][T28043] name failslab, interval 1, probability 0, space 0, times 0 [ 1599.904090][T28043] CPU: 1 UID: 0 PID: 28043 Comm: syz.6.5316 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1599.904144][T28043] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1599.904157][T28043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1599.904177][T28043] Call Trace: [ 1599.904187][T28043] [ 1599.904198][T28043] dump_stack_lvl+0x100/0x190 [ 1599.904241][T28043] should_fail_ex.cold+0x5/0xa [ 1599.904292][T28043] should_failslab+0xc2/0x120 [ 1599.904335][T28043] ? tomoyo_realpath_from_path+0xb6/0x690 [ 1599.904367][T28043] __kmalloc_noprof+0xf6/0x9c0 [ 1599.904412][T28043] ? tomoyo_realpath_from_path+0xb6/0x690 [ 1599.904444][T28043] tomoyo_realpath_from_path+0xb6/0x690 [ 1599.904485][T28043] tomoyo_path_number_perm+0x23c/0x580 [ 1599.904533][T28043] ? tomoyo_path_number_perm+0x22e/0x580 [ 1599.904583][T28043] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1599.904672][T28043] ? find_held_lock+0x2b/0x80 [ 1599.904704][T28043] ? hook_file_ioctl_common+0x146/0x410 [ 1599.904750][T28043] ? __fget_files+0x215/0x3d0 [ 1599.904792][T28043] ? __fget_files+0x21f/0x3d0 [ 1599.904835][T28043] security_file_ioctl+0xd3/0x230 [ 1599.904884][T28043] __x64_sys_ioctl+0xb7/0x210 [ 1599.904940][T28043] do_syscall_64+0xc9/0xf80 [ 1599.904992][T28043] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1599.905025][T28043] RIP: 0033:0x7fc94219aeb9 [ 1599.905050][T28043] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1599.905080][T28043] RSP: 002b:00007fc943093028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1599.905108][T28043] RAX: ffffffffffffffda RBX: 00007fc942415fa0 RCX: 00007fc94219aeb9 [ 1599.905127][T28043] RDX: 0000200000000100 RSI: 00000000c0606610 RDI: 0000000000000003 [ 1599.905144][T28043] RBP: 00007fc943093090 R08: 0000000000000000 R09: 0000000000000000 [ 1599.905161][T28043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1599.905178][T28043] R13: 00007fc942416038 R14: 00007fc942415fa0 R15: 00007ffdf1967538 [ 1599.905215][T28043] [ 1599.905294][T28043] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1600.137612][T28046] netlink: 25 bytes leftover after parsing attributes in process `syz.5.5317'. [ 1600.997870][T28063] FAULT_INJECTION: forcing a failure. [ 1600.997870][T28063] name failslab, interval 1, probability 0, space 0, times 0 [ 1601.038409][T28063] CPU: 1 UID: 0 PID: 28063 Comm: syz.4.5322 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1601.038464][T28063] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1601.038478][T28063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1601.038497][T28063] Call Trace: [ 1601.038509][T28063] [ 1601.038522][T28063] dump_stack_lvl+0x100/0x190 [ 1601.038567][T28063] should_fail_ex.cold+0x5/0xa [ 1601.038620][T28063] should_failslab+0xc2/0x120 [ 1601.038664][T28063] ? tomoyo_encode2+0xfb/0x3c0 [ 1601.038694][T28063] __kmalloc_noprof+0xf6/0x9c0 [ 1601.038737][T28063] ? tomoyo_encode2+0xfb/0x3c0 [ 1601.038765][T28063] tomoyo_encode2+0xfb/0x3c0 [ 1601.038803][T28063] tomoyo_encode+0x29/0x50 [ 1601.038833][T28063] tomoyo_realpath_from_path+0x18c/0x690 [ 1601.038875][T28063] tomoyo_path_number_perm+0x23c/0x580 [ 1601.038921][T28063] ? tomoyo_path_number_perm+0x22e/0x580 [ 1601.038981][T28063] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1601.039071][T28063] ? find_held_lock+0x2b/0x80 [ 1601.039103][T28063] ? hook_file_ioctl_common+0x146/0x410 [ 1601.039151][T28063] ? __fget_files+0x215/0x3d0 [ 1601.039195][T28063] ? __fget_files+0x21f/0x3d0 [ 1601.039236][T28063] security_file_ioctl+0xd3/0x230 [ 1601.039285][T28063] __x64_sys_ioctl+0xb7/0x210 [ 1601.039339][T28063] do_syscall_64+0xc9/0xf80 [ 1601.039380][T28063] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1601.039413][T28063] RIP: 0033:0x7f0bfcb9aeb9 [ 1601.039439][T28063] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1601.039471][T28063] RSP: 002b:00007f0bfdb37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1601.039504][T28063] RAX: ffffffffffffffda RBX: 00007f0bfce15fa0 RCX: 00007f0bfcb9aeb9 [ 1601.039526][T28063] RDX: 0000000000000038 RSI: 00000000c1007c01 RDI: 0000000000000003 [ 1601.039546][T28063] RBP: 00007f0bfdb37090 R08: 0000000000000000 R09: 0000000000000000 [ 1601.039567][T28063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1601.039587][T28063] R13: 00007f0bfce16038 R14: 00007f0bfce15fa0 R15: 00007ffeb8565fe8 [ 1601.039631][T28063] [ 1601.039660][T28063] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1601.885520][T28076] can: request_module (can-proto-5) failed. [ 1601.949195][T28084] netlink: 334 bytes leftover after parsing attributes in process `syz.4.5327'. [ 1602.127809][T28085] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1602.167118][T28085] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1602.181383][T28085] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1602.200628][T28085] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1602.331541][T28090] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1602.411826][T28090] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1602.496172][T28090] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1602.525347][T28090] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1602.796730][T28102] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1602.995814][T28102] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1603.068581][T28102] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1603.145535][T28102] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1604.971275][T28133] input: jJǸ-9%vJ86 as /devices/virtual/input/input60 [ 1605.291218][T28152] netlink: 'syz.4.5343': attribute type 1 has an invalid length. [ 1605.306362][T28152] netlink: 306 bytes leftover after parsing attributes in process `syz.4.5343'. [ 1607.036476][T28200] netlink: 12 bytes leftover after parsing attributes in process `syz.5.5356'. [ 1607.457889][T28196] zswap: compressor - not available [ 1607.584212][T28205] FAULT_INJECTION: forcing a failure. [ 1607.584212][T28205] name failslab, interval 1, probability 0, space 0, times 0 [ 1607.607972][T28205] CPU: 0 UID: 0 PID: 28205 Comm: syz.6.5358 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1607.608034][T28205] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1607.608050][T28205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1607.608071][T28205] Call Trace: [ 1607.608084][T28205] [ 1607.608102][T28205] dump_stack_lvl+0x100/0x190 [ 1607.608149][T28205] should_fail_ex.cold+0x5/0xa [ 1607.608207][T28205] should_failslab+0xc2/0x120 [ 1607.608254][T28205] __kmalloc_cache_noprof+0x80/0x810 [ 1607.608289][T28205] ? allocate_file_region_entries+0x15d/0x620 [ 1607.608338][T28205] ? allocate_file_region_entries+0x1a0/0x620 [ 1607.608379][T28205] ? allocate_file_region_entries+0x15d/0x620 [ 1607.608429][T28205] ? allocate_file_region_entries+0x1a0/0x620 [ 1607.608470][T28205] ? _raw_spin_unlock+0x28/0x50 [ 1607.608503][T28205] allocate_file_region_entries+0x1a0/0x620 [ 1607.608555][T28205] ? __pfx_allocate_file_region_entries+0x10/0x10 [ 1607.608612][T28205] region_chg+0x85/0x140 [ 1607.608653][T28205] __vma_reservation_common+0x376/0x720 [ 1607.608699][T28205] ? __pfx___vma_reservation_common+0x10/0x10 [ 1607.608741][T28205] ? filemap_get_entry+0x1a7/0x3b0 [ 1607.608799][T28205] alloc_hugetlb_folio+0x8db/0x1410 [ 1607.608858][T28205] ? __pfx_alloc_hugetlb_folio+0x10/0x10 [ 1607.608914][T28205] ? __filemap_get_folio_mpol+0x3ba/0xe70 [ 1607.608959][T28205] ? __pmd_alloc+0x6a5/0x9c0 [ 1607.609021][T28205] hugetlb_no_page+0xfa8/0x1ae0 [ 1607.609058][T28205] ? huge_pte_alloc+0x4ce/0x730 [ 1607.609116][T28205] hugetlb_fault+0x5df/0x14f0 [ 1607.609155][T28205] ? __pfx_hugetlb_fault+0x10/0x10 [ 1607.609205][T28205] ? find_vma+0xbf/0x140 [ 1607.609250][T28205] ? __pfx_find_vma+0x10/0x10 [ 1607.609300][T28205] handle_mm_fault+0x5f1/0xa20 [ 1607.609354][T28205] do_user_addr_fault+0x74c/0x12f0 [ 1607.609406][T28205] exc_page_fault+0x6f/0xd0 [ 1607.609448][T28205] asm_exc_page_fault+0x26/0x30 [ 1607.609482][T28205] RIP: 0010:rep_movs_alternative+0x30/0x90 [ 1607.609537][T28205] Code: 83 f9 08 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 7d 7d 04 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 <48> 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 [ 1607.609573][T28205] RSP: 0018:ffffc9000b527a20 EFLAGS: 00050246 [ 1607.609602][T28205] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000008 [ 1607.609623][T28205] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffffc9000b527c68 [ 1607.609644][T28205] RBP: 0000000000000008 R08: 0000000000000001 R09: fffff520016a4f8d [ 1607.609664][T28205] R10: ffffc9000b527c6f R11: 0000000000000000 R12: 0000000000000000 [ 1607.609686][T28205] R13: ffffc9000b527c68 R14: 0000000000000000 R15: 1ffff920016a4f59 [ 1607.609730][T28205] _copy_from_user+0x98/0xd0 [ 1607.609784][T28205] sctp_getsockopt+0x96b/0x7080 [ 1607.609824][T28205] ? __pfx_aa_label_sk_perm+0x10/0x10 [ 1607.609884][T28205] ? __pfx_sctp_getsockopt+0x10/0x10 [ 1607.609919][T28205] ? __futex_wait+0x256/0x300 [ 1607.609956][T28205] ? __pfx___futex_wait+0x10/0x10 [ 1607.609985][T28205] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1607.610023][T28205] ? lockdep_hardirqs_on+0x78/0x100 [ 1607.610074][T28205] ? __lock_acquire+0x4a5/0x2630 [ 1607.610126][T28205] ? aa_sk_perm+0x2de/0xb40 [ 1607.610188][T28205] ? __might_fault+0xc5/0x140 [ 1607.610244][T28205] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 1607.610280][T28205] do_sock_getsockopt+0x259/0x3d0 [ 1607.610318][T28205] ? __pfx_do_sock_getsockopt+0x10/0x10 [ 1607.610386][T28205] __sys_getsockopt+0x133/0x1d0 [ 1607.610450][T28205] ? __x64_sys_getsockopt+0xbd/0x160 [ 1607.610498][T28205] ? rcu_is_watching+0x12/0xc0 [ 1607.610529][T28205] __x64_sys_getsockopt+0xbd/0x160 [ 1607.610577][T28205] ? do_syscall_64+0x94/0xf80 [ 1607.610616][T28205] ? lockdep_hardirqs_on+0x78/0x100 [ 1607.610656][T28205] do_syscall_64+0xc9/0xf80 [ 1607.610699][T28205] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1607.610735][T28205] RIP: 0033:0x7fc94219aeb9 [ 1607.610764][T28205] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1607.610799][T28205] RSP: 002b:00007fc943093028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 1607.610832][T28205] RAX: ffffffffffffffda RBX: 00007fc942415fa0 RCX: 00007fc94219aeb9 [ 1607.610855][T28205] RDX: 000000000000006d RSI: 0000000000000084 RDI: 0000000000000003 [ 1607.610876][T28205] RBP: 00007fc942208c1f R08: 0000200000000280 R09: 0000000000000000 [ 1607.610899][T28205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1607.610920][T28205] R13: 00007fc942416038 R14: 00007fc942415fa0 R15: 00007ffdf1967538 [ 1607.610967][T28205] [ 1608.258364][T28214] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5358'. [ 1610.280589][T28261] FAULT_INJECTION: forcing a failure. [ 1610.280589][T28261] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1610.349190][T28261] CPU: 0 UID: 0 PID: 28261 Comm: syz.2.5370 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1610.349233][T28261] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1610.349242][T28261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1610.349256][T28261] Call Trace: [ 1610.349264][T28261] [ 1610.349274][T28261] dump_stack_lvl+0x100/0x190 [ 1610.349308][T28261] should_fail_ex.cold+0x5/0xa [ 1610.349347][T28261] _copy_from_user+0x2e/0xd0 [ 1610.349384][T28261] ctl_ioctl+0xf3/0xcd0 [ 1610.349413][T28261] ? __pfx_ctl_ioctl+0x10/0x10 [ 1610.349465][T28261] ? __fget_files+0x21f/0x3d0 [ 1610.349496][T28261] dm_ctl_ioctl+0x22/0x30 [ 1610.349519][T28261] ? __pfx_dm_ctl_ioctl+0x10/0x10 [ 1610.349543][T28261] __x64_sys_ioctl+0x18e/0x210 [ 1610.349583][T28261] do_syscall_64+0xc9/0xf80 [ 1610.349614][T28261] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1610.349638][T28261] RIP: 0033:0x7f346f19aeb9 [ 1610.349656][T28261] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1610.349679][T28261] RSP: 002b:00007f346ff7c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1610.349702][T28261] RAX: ffffffffffffffda RBX: 00007f346f415fa0 RCX: 00007f346f19aeb9 [ 1610.349717][T28261] RDX: 00002000000001c0 RSI: fffffffffffffd02 RDI: 0000000000000006 [ 1610.349732][T28261] RBP: 00007f346ff7c090 R08: 0000000000000000 R09: 0000000000000000 [ 1610.349747][T28261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1610.349761][T28261] R13: 00007f346f416038 R14: 00007f346f415fa0 R15: 00007ffe3a29e608 [ 1610.349791][T28261] [ 1611.886932][T28288] FAULT_INJECTION: forcing a failure. [ 1611.886932][T28288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1611.927637][T28288] CPU: 1 UID: 0 PID: 28288 Comm: syz.2.5376 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1611.927694][T28288] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1611.927708][T28288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1611.927729][T28288] Call Trace: [ 1611.927741][T28288] [ 1611.927755][T28288] dump_stack_lvl+0x100/0x190 [ 1611.927804][T28288] should_fail_ex.cold+0x5/0xa [ 1611.927866][T28288] strncpy_from_user+0x3b/0x2d0 [ 1611.927920][T28288] getname_flags.part.0+0x8f/0x540 [ 1611.927984][T28288] getname_flags+0x93/0xf0 [ 1611.928018][T28288] do_sys_openat2+0xc5/0x220 [ 1611.928071][T28288] ? __pfx_do_sys_openat2+0x10/0x10 [ 1611.928141][T28288] __x64_sys_openat+0x12d/0x210 [ 1611.928195][T28288] ? __pfx___x64_sys_openat+0x10/0x10 [ 1611.928248][T28288] ? xfd_validate_state+0x129/0x190 [ 1611.928314][T28288] do_syscall_64+0xc9/0xf80 [ 1611.928360][T28288] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1611.928396][T28288] RIP: 0033:0x7f346f19aeb9 [ 1611.928424][T28288] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1611.928458][T28288] RSP: 002b:00007f346ff7c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1611.928492][T28288] RAX: ffffffffffffffda RBX: 00007f346f415fa0 RCX: 00007f346f19aeb9 [ 1611.928515][T28288] RDX: 0000000000000102 RSI: 0000200000000800 RDI: ffffffffffffff9c [ 1611.928539][T28288] RBP: 00007f346f208c1f R08: 0000000000000000 R09: 0000000000000000 [ 1611.928560][T28288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1611.928581][T28288] R13: 00007f346f416038 R14: 00007f346f415fa0 R15: 00007ffe3a29e608 [ 1611.928625][T28288] [ 1612.269054][ T30] audit: type=1800 audit(1769485166.949:40): pid=28293 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.4.5378" name="discovery_nqn" dev="configfs" ino=114460 res=0 errno=0 [ 1612.387356][T28297] FAULT_INJECTION: forcing a failure. [ 1612.387356][T28297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1612.400901][T28297] CPU: 0 UID: 0 PID: 28297 Comm: syz.2.5380 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1612.400954][T28297] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1612.400966][T28297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1612.400985][T28297] Call Trace: [ 1612.400997][T28297] [ 1612.401010][T28297] dump_stack_lvl+0x100/0x190 [ 1612.401053][T28297] should_fail_ex.cold+0x5/0xa [ 1612.401130][T28297] _copy_to_user+0x32/0xd0 [ 1612.401185][T28297] simple_read_from_buffer+0xcb/0x170 [ 1612.401223][T28297] proc_fail_nth_read+0x1af/0x230 [ 1612.401262][T28297] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1612.401303][T28297] ? rw_verify_area+0xce/0x6d0 [ 1612.401334][T28297] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1612.401372][T28297] vfs_read+0x1e4/0xb30 [ 1612.401413][T28297] ? __pfx_vfs_read+0x10/0x10 [ 1612.401444][T28297] ? find_held_lock+0x2b/0x80 [ 1612.401477][T28297] ? __fget_files+0x215/0x3d0 [ 1612.401519][T28297] ? __fget_files+0x21f/0x3d0 [ 1612.401565][T28297] ksys_read+0x12a/0x250 [ 1612.401600][T28297] ? __pfx_ksys_read+0x10/0x10 [ 1612.401649][T28297] do_syscall_64+0xc9/0xf80 [ 1612.401693][T28297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1612.401727][T28297] RIP: 0033:0x7f346f15b78e [ 1612.401752][T28297] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1612.401786][T28297] RSP: 002b:00007f346ff7bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1612.401817][T28297] RAX: ffffffffffffffda RBX: 00007f346ff7c6c0 RCX: 00007f346f15b78e [ 1612.401839][T28297] RDX: 000000000000000f RSI: 00007f346ff7c0a0 RDI: 0000000000000004 [ 1612.401861][T28297] RBP: 00007f346ff7c090 R08: 0000000000000000 R09: 0000000000000000 [ 1612.401882][T28297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1612.401903][T28297] R13: 00007f346f416038 R14: 00007f346f415fa0 R15: 00007ffe3a29e608 [ 1612.401946][T28297] [ 1612.740986][T28298] netlink: 2468 bytes leftover after parsing attributes in process `syz.4.5379'. [ 1612.799641][T28305] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5381'. [ 1613.621572][T28323] netlink: 'syz.4.5389': attribute type 1 has an invalid length. [ 1613.774135][T28326] FAULT_INJECTION: forcing a failure. [ 1613.774135][T28326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1613.848301][T28326] CPU: 0 UID: 0 PID: 28326 Comm: syz.2.5390 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1613.848360][T28326] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1613.848374][T28326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1613.848394][T28326] Call Trace: [ 1613.848406][T28326] [ 1613.848419][T28326] dump_stack_lvl+0x100/0x190 [ 1613.848467][T28326] should_fail_ex.cold+0x5/0xa [ 1613.848525][T28326] strncpy_from_user+0x3b/0x2d0 [ 1613.848579][T28326] getname_flags.part.0+0x8f/0x540 [ 1613.848637][T28326] getname_flags+0x93/0xf0 [ 1613.848672][T28326] do_sys_openat2+0xc5/0x220 [ 1613.848724][T28326] ? __pfx_do_sys_openat2+0x10/0x10 [ 1613.848799][T28326] __x64_sys_openat+0x12d/0x210 [ 1613.848853][T28326] ? __pfx___x64_sys_openat+0x10/0x10 [ 1613.848903][T28326] ? xfd_validate_state+0x129/0x190 [ 1613.848972][T28326] do_syscall_64+0xc9/0xf80 [ 1613.849016][T28326] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1613.849051][T28326] RIP: 0033:0x7f346f19aeb9 [ 1613.849079][T28326] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1613.849112][T28326] RSP: 002b:00007f346ff7c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1613.849144][T28326] RAX: ffffffffffffffda RBX: 00007f346f415fa0 RCX: 00007f346f19aeb9 [ 1613.849166][T28326] RDX: 000000000014be02 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1613.849188][T28326] RBP: 00007f346f208c1f R08: 0000000000000000 R09: 0000000000000000 [ 1613.849209][T28326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1613.849230][T28326] R13: 00007f346f416038 R14: 00007f346f415fa0 R15: 00007ffe3a29e608 [ 1613.849275][T28326] [ 1614.095572][T28338] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5395'. [ 1614.569457][T28350] FAULT_INJECTION: forcing a failure. [ 1614.569457][T28350] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1614.678024][T28350] CPU: 0 UID: 0 PID: 28350 Comm: syz.2.5397 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1614.678078][T28350] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1614.678096][T28350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1614.678114][T28350] Call Trace: [ 1614.678125][T28350] [ 1614.678137][T28350] dump_stack_lvl+0x100/0x190 [ 1614.678182][T28350] should_fail_ex.cold+0x5/0xa [ 1614.678235][T28350] _copy_to_user+0x32/0xd0 [ 1614.678288][T28350] simple_read_from_buffer+0xcb/0x170 [ 1614.678324][T28350] proc_fail_nth_read+0x1af/0x230 [ 1614.678365][T28350] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1614.678406][T28350] ? rw_verify_area+0xce/0x6d0 [ 1614.678437][T28350] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1614.678475][T28350] vfs_read+0x1e4/0xb30 [ 1614.678515][T28350] ? __pfx_vfs_read+0x10/0x10 [ 1614.678548][T28350] ? find_held_lock+0x2b/0x80 [ 1614.678581][T28350] ? __fget_files+0x215/0x3d0 [ 1614.678624][T28350] ? __fget_files+0x21f/0x3d0 [ 1614.678671][T28350] ksys_read+0x12a/0x250 [ 1614.678706][T28350] ? __pfx_ksys_read+0x10/0x10 [ 1614.678754][T28350] do_syscall_64+0xc9/0xf80 [ 1614.678797][T28350] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1614.678830][T28350] RIP: 0033:0x7f346f15b78e [ 1614.678857][T28350] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1614.678889][T28350] RSP: 002b:00007f346ff7bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1614.678920][T28350] RAX: ffffffffffffffda RBX: 00007f346ff7c6c0 RCX: 00007f346f15b78e [ 1614.678943][T28350] RDX: 000000000000000f RSI: 00007f346ff7c0a0 RDI: 0000000000000004 [ 1614.678971][T28350] RBP: 00007f346ff7c090 R08: 0000000000000000 R09: 0000000000000000 [ 1614.678992][T28350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1614.679012][T28350] R13: 00007f346f416038 R14: 00007f346f415fa0 R15: 00007ffe3a29e608 [ 1614.679056][T28350] [ 1616.671440][T28382] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5405'. [ 1616.777919][T28382] HfR: left promiscuous mode [ 1617.778231][T28400] FAULT_INJECTION: forcing a failure. [ 1617.778231][T28400] name failslab, interval 1, probability 0, space 0, times 0 [ 1617.798650][T28400] CPU: 1 UID: 0 PID: 28400 Comm: syz.4.5412 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1617.798704][T28400] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1617.798717][T28400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1617.798736][T28400] Call Trace: [ 1617.798750][T28400] [ 1617.798765][T28400] dump_stack_lvl+0x100/0x190 [ 1617.798807][T28400] should_fail_ex.cold+0x5/0xa [ 1617.798859][T28400] should_failslab+0xc2/0x120 [ 1617.798902][T28400] ? tomoyo_encode2+0xfb/0x3c0 [ 1617.798930][T28400] __kmalloc_noprof+0xf6/0x9c0 [ 1617.798960][T28400] ? __pfx_tomoyo_get_local_path+0x10/0x10 [ 1617.798993][T28400] ? tomoyo_realpath_from_path+0xb6/0x690 [ 1617.799033][T28400] ? tomoyo_encode2+0xfb/0x3c0 [ 1617.799061][T28400] tomoyo_encode2+0xfb/0x3c0 [ 1617.799098][T28400] tomoyo_encode+0x29/0x50 [ 1617.799126][T28400] tomoyo_realpath_from_path+0x18c/0x690 [ 1617.799167][T28400] tomoyo_path_number_perm+0x23c/0x580 [ 1617.799212][T28400] ? tomoyo_path_number_perm+0x22e/0x580 [ 1617.799260][T28400] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1617.799345][T28400] ? find_held_lock+0x2b/0x80 [ 1617.799400][T28400] ? hook_file_ioctl_common+0x146/0x410 [ 1617.799444][T28400] ? __fget_files+0x215/0x3d0 [ 1617.799485][T28400] ? __fget_files+0x21f/0x3d0 [ 1617.799533][T28400] security_file_ioctl+0xd3/0x230 [ 1617.799581][T28400] __x64_sys_ioctl+0xb7/0x210 [ 1617.799634][T28400] do_syscall_64+0xc9/0xf80 [ 1617.799675][T28400] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1617.799707][T28400] RIP: 0033:0x7f0bfcb9aeb9 [ 1617.799733][T28400] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1617.799763][T28400] RSP: 002b:00007f0bfdb37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1617.799794][T28400] RAX: ffffffffffffffda RBX: 00007f0bfce15fa0 RCX: 00007f0bfcb9aeb9 [ 1617.799816][T28400] RDX: 0000200000000100 RSI: 00000000c0606610 RDI: 0000000000000003 [ 1617.799836][T28400] RBP: 00007f0bfdb37090 R08: 0000000000000000 R09: 0000000000000000 [ 1617.799856][T28400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1617.799876][T28400] R13: 00007f0bfce16038 R14: 00007f0bfce15fa0 R15: 00007ffeb8565fe8 [ 1617.799918][T28400] [ 1617.799950][T28400] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1618.095436][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1618.102950][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1618.286225][T28402] HfR: entered promiscuous mode [ 1619.263972][T28423] HfR: entered promiscuous mode [ 1619.286862][T28425] FAULT_INJECTION: forcing a failure. [ 1619.286862][T28425] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1619.326259][T28423] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5418'. [ 1619.329892][T28425] CPU: 0 UID: 0 PID: 28425 Comm: syz.5.5419 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1619.330035][T28425] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1619.330068][T28425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1619.330125][T28425] Call Trace: [ 1619.330157][T28425] [ 1619.330188][T28425] dump_stack_lvl+0x100/0x190 [ 1619.330303][T28425] should_fail_ex.cold+0x5/0xa [ 1619.330438][T28425] _copy_from_user+0x2e/0xd0 [ 1619.330569][T28425] copy_arg_from_user+0x53/0xa0 [ 1619.330725][T28425] ? __pfx_copy_arg_from_user+0x10/0x10 [ 1619.330850][T28425] media_device_ioctl+0x1cf/0x490 [ 1619.330974][T28425] ? __pfx_media_device_ioctl+0x10/0x10 [ 1619.331213][T28425] ? __fget_files+0x21f/0x3d0 [ 1619.331324][T28425] ? __pfx_media_device_ioctl+0x10/0x10 [ 1619.331447][T28425] media_ioctl+0xf4/0x150 [ 1619.331557][T28425] ? __pfx_media_ioctl+0x10/0x10 [ 1619.331689][T28425] __x64_sys_ioctl+0x18e/0x210 [ 1619.331831][T28425] do_syscall_64+0xc9/0xf80 [ 1619.331942][T28425] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1619.332053][T28425] RIP: 0033:0x7f654799aeb9 [ 1619.332138][T28425] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1619.332222][T28425] RSP: 002b:00007f6548804028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1619.332305][T28425] RAX: ffffffffffffffda RBX: 00007f6547c15fa0 RCX: 00007f654799aeb9 [ 1619.332365][T28425] RDX: 0000000000000038 RSI: 00000000c1007c01 RDI: 0000000000000003 [ 1619.332418][T28425] RBP: 00007f6548804090 R08: 0000000000000000 R09: 0000000000000000 [ 1619.332470][T28425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1619.332525][T28425] R13: 00007f6547c16038 R14: 00007f6547c15fa0 R15: 00007ffc618ca5d8 [ 1619.332630][T28425] [ 1619.736727][T28423] HfR: left promiscuous mode [ 1622.340925][T28495] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5437'. [ 1622.624457][T28504] FAULT_INJECTION: forcing a failure. [ 1622.624457][T28504] name failslab, interval 1, probability 0, space 0, times 0 [ 1622.658367][T28504] CPU: 1 UID: 0 PID: 28504 Comm: syz.6.5441 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1622.658422][T28504] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1622.658435][T28504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1622.658455][T28504] Call Trace: [ 1622.658466][T28504] [ 1622.658479][T28504] dump_stack_lvl+0x100/0x190 [ 1622.658525][T28504] should_fail_ex.cold+0x5/0xa [ 1622.658578][T28504] should_failslab+0xc2/0x120 [ 1622.658622][T28504] kmem_cache_alloc_node_noprof+0x8c/0x880 [ 1622.658668][T28504] ? __alloc_skb+0x156/0x410 [ 1622.658718][T28504] ? __alloc_skb+0x156/0x410 [ 1622.658756][T28504] __alloc_skb+0x156/0x410 [ 1622.658797][T28504] ? __alloc_skb+0x35d/0x410 [ 1622.658838][T28504] ? __pfx___alloc_skb+0x10/0x10 [ 1622.658882][T28504] ? genl_rcv_msg+0x550/0x800 [ 1622.658913][T28504] ? genl_rcv_msg+0x4be/0x800 [ 1622.658954][T28504] netlink_ack+0x117/0xb80 [ 1622.659016][T28504] netlink_rcv_skb+0x333/0x420 [ 1622.659065][T28504] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1622.659102][T28504] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1622.659165][T28504] ? netlink_deliver_tap+0x1ae/0xcc0 [ 1622.659226][T28504] genl_rcv+0x28/0x40 [ 1622.659255][T28504] netlink_unicast+0x5aa/0x870 [ 1622.659312][T28504] ? __pfx_netlink_unicast+0x10/0x10 [ 1622.659378][T28504] netlink_sendmsg+0x8b0/0xda0 [ 1622.659434][T28504] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1622.659481][T28504] ? __import_iovec+0x1d2/0x640 [ 1622.659533][T28504] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1622.659580][T28504] ____sys_sendmsg+0xa54/0xc30 [ 1622.659621][T28504] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1622.659677][T28504] ___sys_sendmsg+0x190/0x1e0 [ 1622.659719][T28504] ? __pfx____sys_sendmsg+0x10/0x10 [ 1622.659778][T28504] ? find_held_lock+0x2b/0x80 [ 1622.659835][T28504] __sys_sendmsg+0x170/0x220 [ 1622.659884][T28504] ? __pfx___sys_sendmsg+0x10/0x10 [ 1622.659958][T28504] do_syscall_64+0xc9/0xf80 [ 1622.660001][T28504] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1622.660034][T28504] RIP: 0033:0x7fc94219aeb9 [ 1622.660061][T28504] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1622.660094][T28504] RSP: 002b:00007fc943093028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1622.660126][T28504] RAX: ffffffffffffffda RBX: 00007fc942415fa0 RCX: 00007fc94219aeb9 [ 1622.660149][T28504] RDX: 0000000004000900 RSI: 0000200000004100 RDI: 0000000000000003 [ 1622.660170][T28504] RBP: 00007fc943093090 R08: 0000000000000000 R09: 0000000000000000 [ 1622.660197][T28504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1622.660217][T28504] R13: 00007fc942416038 R14: 00007fc942415fa0 R15: 00007ffdf1967538 [ 1622.660259][T28504] [ 1623.510246][T28514] netlink: 'syz.6.5442': attribute type 21 has an invalid length. [ 1623.518932][T28514] netlink: 334 bytes leftover after parsing attributes in process `syz.6.5442'. [ 1624.018723][ T30] audit: type=1800 audit(1769485178.739:41): pid=28527 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.2.5447" name="dbroot" dev="configfs" ino=116119 res=0 errno=0 [ 1624.133609][T26248] Bluetooth: hci3: Malformed LE Event: 0x1d [ 1624.439334][T28534] openvswitch: HfR: Dropping previously announced user features [ 1624.495551][T28534] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5450'. [ 1624.527103][T28534] HfR: left promiscuous mode [ 1624.597644][T28536] openvswitch: HfR: Dropping previously announced user features [ 1624.635121][T28536] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5451'. [ 1624.667275][T28536] HfR: left promiscuous mode [ 1625.407219][T28553] netlink: 350 bytes leftover after parsing attributes in process `syz.4.5454'. [ 1627.065011][T28579] FAULT_INJECTION: forcing a failure. [ 1627.065011][T28579] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1627.105694][T28579] CPU: 1 UID: 0 PID: 28579 Comm: syz.6.5460 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1627.105748][T28579] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1627.105758][T28579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1627.105772][T28579] Call Trace: [ 1627.105781][T28579] [ 1627.105790][T28579] dump_stack_lvl+0x100/0x190 [ 1627.105822][T28579] should_fail_ex.cold+0x5/0xa [ 1627.105863][T28579] _copy_to_user+0x32/0xd0 [ 1627.105902][T28579] ctl_ioctl+0x17b/0xcd0 [ 1627.105930][T28579] ? __pfx_ctl_ioctl+0x10/0x10 [ 1627.105982][T28579] ? __fget_files+0x21f/0x3d0 [ 1627.106013][T28579] dm_ctl_ioctl+0x22/0x30 [ 1627.106036][T28579] ? __pfx_dm_ctl_ioctl+0x10/0x10 [ 1627.106060][T28579] __x64_sys_ioctl+0x18e/0x210 [ 1627.106100][T28579] do_syscall_64+0xc9/0xf80 [ 1627.106130][T28579] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1627.106153][T28579] RIP: 0033:0x7fc94219aeb9 [ 1627.106172][T28579] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1627.106195][T28579] RSP: 002b:00007fc943093028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1627.106218][T28579] RAX: ffffffffffffffda RBX: 00007fc942415fa0 RCX: 00007fc94219aeb9 [ 1627.106233][T28579] RDX: 00002000000001c0 RSI: fffffffffffffd02 RDI: 0000000000000006 [ 1627.106248][T28579] RBP: 00007fc943093090 R08: 0000000000000000 R09: 0000000000000000 [ 1627.106263][T28579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1627.106277][T28579] R13: 00007fc942416038 R14: 00007fc942415fa0 R15: 00007ffdf1967538 [ 1627.106306][T28579] [ 1627.378617][T28581] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5461'. [ 1628.006111][T28596] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5464'. [ 1628.254132][T28590] zswap: compressor not available [ 1628.329701][T28601] blktrace: Concurrent blktraces are not allowed on nbd8 [ 1629.633660][T28623] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5471'. [ 1629.746124][T28625] FAULT_INJECTION: forcing a failure. [ 1629.746124][T28625] name failslab, interval 1, probability 0, space 0, times 0 [ 1629.768721][T28625] CPU: 1 UID: 0 PID: 28625 Comm: syz.5.5473 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1629.768778][T28625] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1629.768791][T28625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1629.768812][T28625] Call Trace: [ 1629.768824][T28625] [ 1629.768836][T28625] dump_stack_lvl+0x100/0x190 [ 1629.768882][T28625] should_fail_ex.cold+0x5/0xa [ 1629.768929][T28625] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 1629.768965][T28625] should_failslab+0xc2/0x120 [ 1629.769011][T28625] kmem_cache_alloc_noprof+0x83/0x780 [ 1629.769056][T28625] ? skb_clone+0x190/0x400 [ 1629.769109][T28625] ? skb_clone+0x190/0x400 [ 1629.769153][T28625] skb_clone+0x190/0x400 [ 1629.769200][T28625] netlink_deliver_tap+0xaed/0xcc0 [ 1629.769257][T28625] netlink_unicast+0x650/0x870 [ 1629.769314][T28625] ? __pfx_netlink_unicast+0x10/0x10 [ 1629.769380][T28625] netlink_sendmsg+0x8b0/0xda0 [ 1629.769438][T28625] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1629.769488][T28625] ? __import_iovec+0x1d2/0x640 [ 1629.769554][T28625] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1629.769608][T28625] ____sys_sendmsg+0xa54/0xc30 [ 1629.769650][T28625] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1629.769706][T28625] ___sys_sendmsg+0x190/0x1e0 [ 1629.769747][T28625] ? __pfx____sys_sendmsg+0x10/0x10 [ 1629.769815][T28625] ? find_held_lock+0x2b/0x80 [ 1629.769880][T28625] __sys_sendmsg+0x170/0x220 [ 1629.769934][T28625] ? __pfx___sys_sendmsg+0x10/0x10 [ 1629.770007][T28625] do_syscall_64+0xc9/0xf80 [ 1629.770050][T28625] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1629.770083][T28625] RIP: 0033:0x7f654799aeb9 [ 1629.770116][T28625] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1629.770148][T28625] RSP: 002b:00007f6548804028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1629.770180][T28625] RAX: ffffffffffffffda RBX: 00007f6547c15fa0 RCX: 00007f654799aeb9 [ 1629.770202][T28625] RDX: 0000000000000000 RSI: 0000200000006200 RDI: 0000000000000003 [ 1629.770223][T28625] RBP: 00007f6548804090 R08: 0000000000000000 R09: 0000000000000000 [ 1629.770243][T28625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1629.770278][T28625] R13: 00007f6547c16038 R14: 00007f6547c15fa0 R15: 00007ffc618ca5d8 [ 1629.770323][T28625] [ 1630.733453][T28639] GUP no longer grows the stack in syz.6.5476 (28639): 5000-401000 (4000) [ 1630.753860][T28639] CPU: 0 UID: 0 PID: 28639 Comm: syz.6.5476 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1630.753902][T28639] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1630.753911][T28639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1630.753927][T28639] Call Trace: [ 1630.753935][T28639] [ 1630.753945][T28639] dump_stack_lvl+0x100/0x190 [ 1630.753979][T28639] gup_vma_lookup.cold+0x83/0x96 [ 1630.754014][T28639] __get_user_pages+0x241/0x34d0 [ 1630.754061][T28639] ? find_held_lock+0x2b/0x80 [ 1630.754085][T28639] ? mtree_load+0x311/0xa40 [ 1630.754114][T28639] ? __pfx___get_user_pages+0x10/0x10 [ 1630.754159][T28639] get_user_pages_remote+0x3d2/0xb10 [ 1630.754203][T28639] ? __pfx_get_user_pages_remote+0x10/0x10 [ 1630.754252][T28639] ? noop_dirty_folio+0x98/0x160 [ 1630.754297][T28639] __access_remote_vm+0x3ba/0xa70 [ 1630.754338][T28639] ? __pfx___access_remote_vm+0x10/0x10 [ 1630.754381][T28639] mem_rw+0x20a/0x640 [ 1630.754410][T28639] ? __pfx_mem_write+0x10/0x10 [ 1630.754433][T28639] vfs_writev+0x5ea/0xe10 [ 1630.754467][T28639] ? __pfx_vfs_writev+0x10/0x10 [ 1630.754492][T28639] ? fdget_pos+0x2aa/0x380 [ 1630.754542][T28639] ? __fget_files+0x21f/0x3d0 [ 1630.754576][T28639] ? do_writev+0x13e/0x340 [ 1630.754598][T28639] do_writev+0x13e/0x340 [ 1630.754624][T28639] ? __pfx_do_writev+0x10/0x10 [ 1630.754658][T28639] do_syscall_64+0xc9/0xf80 [ 1630.754691][T28639] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1630.754716][T28639] RIP: 0033:0x7fc94219aeb9 [ 1630.754736][T28639] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1630.754761][T28639] RSP: 002b:00007fc943093028 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1630.754811][T28639] RAX: ffffffffffffffda RBX: 00007fc942415fa0 RCX: 00007fc94219aeb9 [ 1630.754835][T28639] RDX: 0000000000000008 RSI: 0000200000000180 RDI: 0000000000000003 [ 1630.754857][T28639] RBP: 00007fc942208c1f R08: 0000000000000000 R09: 0000000000000000 [ 1630.754880][T28639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1630.754903][T28639] R13: 00007fc942416038 R14: 00007fc942415fa0 R15: 00007ffdf1967538 [ 1630.754948][T28639] [ 1631.556925][T28655] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5481'. [ 1631.572790][T28651] serio: Serial port ttyS2 [ 1631.748303][T28659] FAULT_INJECTION: forcing a failure. [ 1631.748303][T28659] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1631.863760][T28659] CPU: 0 UID: 0 PID: 28659 Comm: syz.4.5481 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1631.863803][T28659] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1631.863814][T28659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1631.863829][T28659] Call Trace: [ 1631.863837][T28659] [ 1631.863846][T28659] dump_stack_lvl+0x100/0x190 [ 1631.863880][T28659] should_fail_ex.cold+0x5/0xa [ 1631.863922][T28659] get_futex_key+0x1d2/0x1620 [ 1631.863958][T28659] ? __pfx_get_futex_key+0x10/0x10 [ 1631.863991][T28659] ? mmap_region+0x1b5/0x3e0 [ 1631.864027][T28659] futex_wake+0xea/0x530 [ 1631.864068][T28659] ? __pfx_futex_wake+0x10/0x10 [ 1631.864113][T28659] ? up_write+0x290/0x4f0 [ 1631.864161][T28659] do_futex+0x32b/0x350 [ 1631.864195][T28659] ? __pfx_do_futex+0x10/0x10 [ 1631.864238][T28659] __x64_sys_futex+0x34f/0x4d0 [ 1631.864276][T28659] ? __pfx___x64_sys_futex+0x10/0x10 [ 1631.864310][T28659] ? ksys_mmap_pgoff+0x85/0x5b0 [ 1631.864356][T28659] do_syscall_64+0xc9/0xf80 [ 1631.864389][T28659] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1631.864414][T28659] RIP: 0033:0x7f0bfcb9aeb9 [ 1631.864433][T28659] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1631.864458][T28659] RSP: 002b:00007f0bfdb160e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1631.864482][T28659] RAX: ffffffffffffffda RBX: 00007f0bfce16098 RCX: 00007f0bfcb9aeb9 [ 1631.864499][T28659] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f0bfce1609c [ 1631.864515][T28659] RBP: 00007f0bfce16090 R08: 0000000000000000 R09: 0000000000000000 [ 1631.864530][T28659] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 1631.864546][T28659] R13: 00007f0bfce16128 R14: 00007ffeb8565f00 R15: 00007ffeb8565fe8 [ 1631.864577][T28659] [ 1632.940942][T28671] FAULT_INJECTION: forcing a failure. [ 1632.940942][T28671] name failslab, interval 1, probability 0, space 0, times 0 [ 1632.970337][T28671] CPU: 1 UID: 0 PID: 28671 Comm: syz.2.5483 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1632.970397][T28671] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1632.970411][T28671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1632.970432][T28671] Call Trace: [ 1632.970444][T28671] [ 1632.970458][T28671] dump_stack_lvl+0x100/0x190 [ 1632.970506][T28671] should_fail_ex.cold+0x5/0xa [ 1632.970562][T28671] should_failslab+0xc2/0x120 [ 1632.970610][T28671] __kmalloc_cache_noprof+0x80/0x810 [ 1632.970648][T28671] ? __do_sys_fanotify_init+0x5cf/0xe50 [ 1632.970683][T28671] ? get_mem_cgroup_from_mm+0x132/0x600 [ 1632.970726][T28671] ? __do_sys_fanotify_init+0x5cf/0xe50 [ 1632.970759][T28671] __do_sys_fanotify_init+0x5cf/0xe50 [ 1632.970799][T28671] do_syscall_64+0xc9/0xf80 [ 1632.970843][T28671] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1632.970877][T28671] RIP: 0033:0x7f346f19aeb9 [ 1632.970908][T28671] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1632.970932][T28671] RSP: 002b:00007f346ff7c028 EFLAGS: 00000246 ORIG_RAX: 000000000000012c [ 1632.970956][T28671] RAX: ffffffffffffffda RBX: 00007f346f415fa0 RCX: 00007f346f19aeb9 [ 1632.970973][T28671] RDX: 0000000000000000 RSI: 0002000000000002 RDI: 0000000000000005 [ 1632.970988][T28671] RBP: 00007f346f208c1f R08: 0000000000000000 R09: 0000000000000000 [ 1632.971004][T28671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1632.971019][T28671] R13: 00007f346f416038 R14: 00007f346f415fa0 R15: 00007ffe3a29e608 [ 1632.971056][T28671] [ 1633.515467][T28673] netlink: 12 bytes leftover after parsing attributes in process `syz.5.5484'. [ 1636.379382][T28725] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 1636.393941][T28725] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 1636.404122][T28725] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 1636.433174][T28725] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 1636.441309][T28725] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 1637.195298][T28734] FAULT_INJECTION: forcing a failure. [ 1637.195298][T28734] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1637.243519][T28734] CPU: 0 UID: 0 PID: 28734 Comm: syz.4.5497 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1637.243560][T28734] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1637.243570][T28734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1637.243584][T28734] Call Trace: [ 1637.243592][T28734] [ 1637.243601][T28734] dump_stack_lvl+0x100/0x190 [ 1637.243635][T28734] should_fail_ex.cold+0x5/0xa [ 1637.243680][T28734] _copy_from_user+0x2e/0xd0 [ 1637.243717][T28734] do_pagemap_scan+0xc4/0xcc0 [ 1637.243751][T28734] ? __pfx_do_pagemap_scan+0x10/0x10 [ 1637.243779][T28734] ? do_vfs_ioctl+0x226/0x13e0 [ 1637.243817][T28734] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1637.243871][T28734] ? __fget_files+0x21f/0x3d0 [ 1637.243903][T28734] do_pagemap_cmd+0x58/0x80 [ 1637.243931][T28734] ? __pfx_do_pagemap_cmd+0x10/0x10 [ 1637.243959][T28734] __x64_sys_ioctl+0x18e/0x210 [ 1637.243999][T28734] do_syscall_64+0xc9/0xf80 [ 1637.244030][T28734] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1637.244053][T28734] RIP: 0033:0x7f0bfcb9aeb9 [ 1637.244071][T28734] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1637.244094][T28734] RSP: 002b:00007f0bfdb37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1637.244116][T28734] RAX: ffffffffffffffda RBX: 00007f0bfce15fa0 RCX: 00007f0bfcb9aeb9 [ 1637.244132][T28734] RDX: 0000200000000100 RSI: 00000000c0606610 RDI: 0000000000000003 [ 1637.244147][T28734] RBP: 00007f0bfdb37090 R08: 0000000000000000 R09: 0000000000000000 [ 1637.244162][T28734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1637.244175][T28734] R13: 00007f0bfce16038 R14: 00007f0bfce15fa0 R15: 00007ffeb8565fe8 [ 1637.244205][T28734] [ 1637.703026][T28723] chnl_net:caif_netlink_parms(): no params data found [ 1637.961461][T26795] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1638.010150][T28736] binder: 28735:28736 ioctl 5380 2000000000c0 returned -22 [ 1638.019962][T28736] sd 0:0:1:0: PR command failed: 1026 [ 1638.025402][T28736] sd 0:0:1:0: Sense Key : Illegal Request [current] [ 1638.052640][T28736] sd 0:0:1:0: Add. Sense: Invalid command operation code [ 1638.128624][T26795] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1638.212354][T26795] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1638.281638][T28723] bridge0: port 1(bridge_slave_0) entered blocking state [ 1638.309250][T28723] bridge0: port 1(bridge_slave_0) entered disabled state [ 1638.318748][T26248] Bluetooth: hci1: Opcode 0x0c03 failed: -110 [ 1638.329759][T20510] Bluetooth: hci5: Opcode 0x0c03 failed: -110 [ 1638.376364][T28723] bridge_slave_0: entered allmulticast mode [ 1638.414794][T28723] bridge_slave_0: entered promiscuous mode [ 1638.493420][T20510] Bluetooth: hci6: command tx timeout [ 1638.529562][T28743] netlink: 342 bytes leftover after parsing attributes in process `syz.5.5499'. [ 1638.825679][T26795] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1638.896941][T28723] bridge0: port 2(bridge_slave_1) entered blocking state [ 1638.912268][T28723] bridge0: port 2(bridge_slave_1) entered disabled state [ 1638.928345][T28723] bridge_slave_1: entered allmulticast mode [ 1638.949522][T28723] bridge_slave_1: entered promiscuous mode [ 1639.148990][T28723] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1639.182031][T28723] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1639.498685][T28723] team0: Port device team_slave_0 added [ 1639.535945][T28723] team0: Port device team_slave_1 added [ 1639.852821][T28723] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1639.870605][T28723] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1639.938276][T28723] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1640.091865][T28723] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1640.130523][T28723] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1640.273916][T28723] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1640.523493][T28764] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1640.558229][T20510] Bluetooth: hci6: command tx timeout [ 1640.568299][T28764] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1640.605628][T28764] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1640.683940][T26795] bridge_slave_1: left allmulticast mode [ 1640.690086][T28764] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1640.704194][T26795] bridge_slave_1: left promiscuous mode [ 1640.727107][T26795] bridge0: port 2(bridge_slave_1) entered disabled state [ 1640.832860][T26795] bridge_slave_0: left allmulticast mode [ 1640.878305][T26795] bridge_slave_0: left promiscuous mode [ 1640.908615][T26795] bridge0: port 1(bridge_slave_0) entered disabled state [ 1640.974357][T28771] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1641.028355][T28771] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1641.043167][T28771] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1641.061585][T28771] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1642.648264][T20510] Bluetooth: hci6: command tx timeout [ 1643.043297][T26795] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1643.081840][T26795] bond0 (unregistering): Released all slaves [ 1643.180894][T26795] ovs_?: left promiscuous mode [ 1643.294015][T28723] hsr_slave_0: entered promiscuous mode [ 1643.311818][T28723] hsr_slave_1: entered promiscuous mode [ 1643.337566][T28723] debugfs: 'hsr0' already exists in 'hsr' [ 1643.344169][T28723] Cannot create hsr debugfs directory [ 1643.385015][T26795] tipc: Left network mode [ 1643.740664][T28797] NFSD: Failed to start, no listeners configured. [ 1643.804849][T28800] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1643.850764][T28800] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1643.880489][T28800] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1643.901383][T28800] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1644.102794][T28803] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1644.187618][T28803] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1644.233358][T28803] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1644.369122][T28803] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1644.538456][T28808] 0x000200000001-0x0002000a3031 : "" [ 1644.573838][T28808] mtd: partition "" is out of reach -- disabled [ 1644.597624][T28808] FAULT_INJECTION: forcing a failure. [ 1644.597624][T28808] name failslab, interval 1, probability 0, space 0, times 0 [ 1644.680653][T28808] CPU: 1 UID: 0 PID: 28808 Comm: syz.4.5517 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1644.680711][T28808] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1644.680725][T28808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1644.680746][T28808] Call Trace: [ 1644.680758][T28808] [ 1644.680771][T28808] dump_stack_lvl+0x100/0x190 [ 1644.680820][T28808] should_fail_ex.cold+0x5/0xa [ 1644.680877][T28808] should_failslab+0xc2/0x120 [ 1644.680927][T28808] kmem_cache_alloc_noprof+0x83/0x780 [ 1644.680973][T28808] ? __kernfs_new_node+0xd2/0x960 [ 1644.681027][T28808] ? __kernfs_new_node+0xd2/0x960 [ 1644.681070][T28808] __kernfs_new_node+0xd2/0x960 [ 1644.681120][T28808] ? __pfx___kernfs_new_node+0x10/0x10 [ 1644.681178][T28808] ? find_held_lock+0x2b/0x80 [ 1644.681210][T28808] ? kernfs_root+0xee/0x2a0 [ 1644.681263][T28808] ? kernfs_root+0xee/0x2a0 [ 1644.681318][T28808] kernfs_new_node+0x11b/0x1a0 [ 1644.681377][T28808] __kernfs_create_file+0x53/0x350 [ 1644.681421][T28808] sysfs_add_file_mode_ns+0x207/0x3c0 [ 1644.681475][T28808] sysfs_create_file_ns+0x145/0x1e0 [ 1644.681520][T28808] ? __pfx_sysfs_create_file_ns+0x10/0x10 [ 1644.681569][T28808] ? mark_held_locks+0x40/0x70 [ 1644.681620][T28808] device_create_file+0xf2/0x1d0 [ 1644.681677][T28808] device_add+0xa74/0x1950 [ 1644.681728][T28808] ? __pfx_device_add+0x10/0x10 [ 1644.681773][T28808] ? lockdep_init_map_type+0x5c/0x250 [ 1644.681821][T28808] ? __init_waitqueue_head+0xca/0x150 [ 1644.681886][T28808] add_mtd_device+0x9f5/0x1750 [ 1644.681945][T28808] ? __pfx_add_mtd_device+0x10/0x10 [ 1644.682005][T28808] mtd_add_partition+0x30a/0x660 [ 1644.682062][T28808] ? __pfx_mtd_add_partition+0x10/0x10 [ 1644.682114][T28808] ? __might_fault+0xc5/0x140 [ 1644.682151][T28808] ? __might_fault+0xc5/0x140 [ 1644.682207][T28808] mtdchar_blkpg_ioctl+0x207/0x250 [ 1644.682247][T28808] ? __pfx_mtdchar_blkpg_ioctl+0x10/0x10 [ 1644.682319][T28808] mtdchar_ioctl+0x1670/0x1fd0 [ 1644.682360][T28808] ? __pfx_mtdchar_ioctl+0x10/0x10 [ 1644.682397][T28808] ? lock_acquire+0x17c/0x330 [ 1644.682445][T28808] ? __pfx___might_resched+0x10/0x10 [ 1644.682506][T28808] ? trace_contention_end+0xd6/0x110 [ 1644.682559][T28808] ? do_vfs_ioctl+0x226/0x13e0 [ 1644.682610][T28808] ? mtdchar_unlocked_ioctl+0xa2/0xf0 [ 1644.682645][T28808] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1644.682701][T28808] ? __pfx___mutex_lock+0x10/0x10 [ 1644.682750][T28808] ? do_raw_spin_unlock+0x145/0x1e0 [ 1644.682798][T28808] ? hook_file_ioctl_common+0x146/0x410 [ 1644.682870][T28808] mtdchar_unlocked_ioctl+0xb0/0xf0 [ 1644.682906][T28808] ? __pfx_mtdchar_unlocked_ioctl+0x10/0x10 [ 1644.682943][T28808] __x64_sys_ioctl+0x18e/0x210 [ 1644.683000][T28808] do_syscall_64+0xc9/0xf80 [ 1644.683044][T28808] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1644.683079][T28808] RIP: 0033:0x7f0bfcb9aeb9 [ 1644.683108][T28808] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1644.683142][T28808] RSP: 002b:00007f0bfdb37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1644.683176][T28808] RAX: ffffffffffffffda RBX: 00007f0bfce15fa0 RCX: 00007f0bfcb9aeb9 [ 1644.683200][T28808] RDX: 0000000000000000 RSI: 0000000000001269 RDI: 0000000000000001 [ 1644.683221][T28808] RBP: 00007f0bfcc08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1644.683249][T28808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1644.683270][T28808] R13: 00007f0bfce16038 R14: 00007f0bfce15fa0 R15: 00007ffeb8565fe8 [ 1644.683316][T28808] [ 1645.034103][T20510] Bluetooth: hci6: command tx timeout [ 1645.065146][T28811] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1645.081100][T28811] EXT4-fs error (device sda1): htree_dirblock_to_tree:1051: inode #268: comm dhcpcd-run-hook: Directory block failed checksum [ 1645.094511][T28811] EXT4-fs warning (device sda1): ext4_dirblock_csum_verify:375: inode #268: comm dhcpcd-run-hook: No space for directory leaf checksum. Please run e2fsck -D. [ 1645.110913][T28811] EXT4-fs error (device sda1): __ext4_find_entry:1624: inode #268: comm dhcpcd-run-hook: checksumming directory block 0 [ 1645.161556][T28808] ------------[ cut here ]------------ [ 1645.167130][T28808] !list_empty(&mtd->part.node) [ 1645.167153][T28808] WARNING: drivers/mtd/mtdpart.c:37 at release_mtd_partition+0x71/0x90, CPU#0: syz.4.5517/28808 [ 1645.183556][T28808] Modules linked in: [ 1645.187885][T28808] CPU: 0 UID: 0 PID: 28808 Comm: syz.4.5517 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1645.199109][T28808] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1645.204362][T28808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1645.214869][T28808] RIP: 0010:release_mtd_partition+0x71/0x90 [ 1645.220928][T28808] Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 1e 48 8b 7b 38 e8 5f 10 eb fb 48 89 df 5b 5d e9 55 10 eb fb e8 40 91 8d fb 90 <0f> 0b 90 eb c2 e8 f5 e7 f6 fb eb db 48 89 ef e8 eb e7 f6 fb eb a5 [ 1645.240706][T28808] RSP: 0018:ffffc90004f57820 EFLAGS: 00010283 [ 1645.246919][T28808] RAX: 000000000002d104 RBX: ffff88807da35000 RCX: ffffc9000cd0c000 [ 1645.255795][T28808] RDX: 0000000000080000 RSI: ffffffff8678b940 RDI: ffff88807da35000 [ 1645.264140][T28808] RBP: ffff88807da35650 R08: 0000000000000001 R09: 0000000000000001 [ 1645.272207][T28808] R10: 0000000000000004 R11: ffffffff826f7124 R12: 0000000000000000 [ 1645.280347][T28808] R13: dffffc0000000000 R14: ffff88801fac5360 R15: 0000000000000000 [ 1645.288461][T28808] FS: 00007f0bfdb376c0(0000) GS:ffff8881245e3000(0000) knlGS:0000000000000000 [ 1645.297730][T28808] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1645.304496][T28808] CR2: 00007f0bfcbe8600 CR3: 000000002653e000 CR4: 00000000003526f0 [ 1645.312618][T28808] Call Trace: [ 1645.315958][T28808] [ 1645.319016][T28808] mtd_release+0xa0/0xd0 [ 1645.323333][T28808] ? __pfx_mtd_release+0x10/0x10 [ 1645.328553][T28808] device_release+0xa4/0x240 [ 1645.333238][T28808] kobject_put+0x1f7/0x640 [ 1645.337736][T28808] put_device+0x1f/0x30 [ 1645.342150][T28808] add_mtd_device+0x694/0x1750 [ 1645.347017][T28808] ? __pfx_add_mtd_device+0x10/0x10 [ 1645.353532][T28808] mtd_add_partition+0x30a/0x660 [ 1645.359144][T28808] ? __pfx_mtd_add_partition+0x10/0x10 [ 1645.364713][T28808] ? __might_fault+0xc5/0x140 [ 1645.369552][T28808] ? __might_fault+0xc5/0x140 [ 1645.374314][T28808] mtdchar_blkpg_ioctl+0x207/0x250 [ 1645.380026][T28808] ? __pfx_mtdchar_blkpg_ioctl+0x10/0x10 [ 1645.385755][T28808] mtdchar_ioctl+0x1670/0x1fd0 [ 1645.390728][T28808] ? __pfx_mtdchar_ioctl+0x10/0x10 [ 1645.395907][T28808] ? lock_acquire+0x17c/0x330 [ 1645.400884][T28808] ? __pfx___might_resched+0x10/0x10 [ 1645.406236][T28808] ? trace_contention_end+0xd6/0x110 [ 1645.411676][T28808] ? do_vfs_ioctl+0x226/0x13e0 [ 1645.416970][T28808] ? mtdchar_unlocked_ioctl+0xa2/0xf0 [ 1645.423220][T28808] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1645.428488][T28808] ? __pfx___mutex_lock+0x10/0x10 [ 1645.433594][T28808] ? do_raw_spin_unlock+0x145/0x1e0 [ 1645.438926][T28808] ? hook_file_ioctl_common+0x146/0x410 [ 1645.444579][T28808] mtdchar_unlocked_ioctl+0xb0/0xf0 [ 1645.449938][T28808] ? __pfx_mtdchar_unlocked_ioctl+0x10/0x10 [ 1645.456868][T28808] __x64_sys_ioctl+0x18e/0x210 [ 1645.462054][T28808] do_syscall_64+0xc9/0xf80 [ 1645.466598][T28808] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1645.473020][T28808] RIP: 0033:0x7f0bfcb9aeb9 [ 1645.477526][T28808] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1645.497576][T28808] RSP: 002b:00007f0bfdb37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1645.506244][T28808] RAX: ffffffffffffffda RBX: 00007f0bfce15fa0 RCX: 00007f0bfcb9aeb9 [ 1645.514354][T28808] RDX: 0000000000000000 RSI: 0000000000001269 RDI: 0000000000000001 [ 1645.522507][T28808] RBP: 00007f0bfcc08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1645.530563][T28808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1645.538631][T28808] R13: 00007f0bfce16038 R14: 00007f0bfce15fa0 R15: 00007ffeb8565fe8 [ 1645.546650][T28808] [ 1645.549779][T28808] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1645.557087][T28808] CPU: 0 UID: 0 PID: 28808 Comm: syz.4.5517 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1645.568075][T28808] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1645.573360][T28808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1645.583441][T28808] Call Trace: [ 1645.586737][T28808] [ 1645.589766][T28808] dump_stack_lvl+0x100/0x190 [ 1645.594466][T28808] vpanic+0x20d/0x630 [ 1645.598550][T28808] panic+0xd1/0xd1 [ 1645.602333][T28808] ? __pfx_panic+0x10/0x10 [ 1645.606792][T28808] check_panic_on_warn.cold+0x19/0x34 [ 1645.612293][T28808] ? release_mtd_partition+0x71/0x90 [ 1645.617724][T28808] __warn.cold+0x191/0x2f8 [ 1645.622179][T28808] __report_bug+0x296/0x3d0 [ 1645.626703][T28808] ? release_mtd_partition+0x71/0x90 [ 1645.632118][T28808] ? __pfx___report_bug+0x10/0x10 [ 1645.637180][T28808] ? delete_node+0x20a/0x8f0 [ 1645.641788][T28808] ? release_mtd_partition+0x71/0x90 [ 1645.647091][T28808] report_bug+0xb2/0x220 [ 1645.651348][T28808] ? release_mtd_partition+0x71/0x90 [ 1645.656732][T28808] handle_bug+0x166/0x2a0 [ 1645.661098][T28808] exc_invalid_op+0x17/0x50 [ 1645.665683][T28808] asm_exc_invalid_op+0x1a/0x20 [ 1645.670588][T28808] RIP: 0010:release_mtd_partition+0x71/0x90 [ 1645.676533][T28808] Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 1e 48 8b 7b 38 e8 5f 10 eb fb 48 89 df 5b 5d e9 55 10 eb fb e8 40 91 8d fb 90 <0f> 0b 90 eb c2 e8 f5 e7 f6 fb eb db 48 89 ef e8 eb e7 f6 fb eb a5 [ 1645.696228][T28808] RSP: 0018:ffffc90004f57820 EFLAGS: 00010283 [ 1645.702613][T28808] RAX: 000000000002d104 RBX: ffff88807da35000 RCX: ffffc9000cd0c000 [ 1645.710645][T28808] RDX: 0000000000080000 RSI: ffffffff8678b940 RDI: ffff88807da35000 [ 1645.718923][T28808] RBP: ffff88807da35650 R08: 0000000000000001 R09: 0000000000000001 [ 1645.727033][T28808] R10: 0000000000000004 R11: ffffffff826f7124 R12: 0000000000000000 [ 1645.735566][T28808] R13: dffffc0000000000 R14: ffff88801fac5360 R15: 0000000000000000 [ 1645.743583][T28808] ? kasan_save_track+0x14/0x30 [ 1645.748503][T28808] ? release_mtd_partition+0x70/0x90 [ 1645.753838][T28808] mtd_release+0xa0/0xd0 [ 1645.758125][T28808] ? __pfx_mtd_release+0x10/0x10 [ 1645.763106][T28808] device_release+0xa4/0x240 [ 1645.767774][T28808] kobject_put+0x1f7/0x640 [ 1645.772263][T28808] put_device+0x1f/0x30 [ 1645.776463][T28808] add_mtd_device+0x694/0x1750 [ 1645.781305][T28808] ? __pfx_add_mtd_device+0x10/0x10 [ 1645.786596][T28808] mtd_add_partition+0x30a/0x660 [ 1645.791632][T28808] ? __pfx_mtd_add_partition+0x10/0x10 [ 1645.797198][T28808] ? __might_fault+0xc5/0x140 [ 1645.802078][T28808] ? __might_fault+0xc5/0x140 [ 1645.807292][T28808] mtdchar_blkpg_ioctl+0x207/0x250 [ 1645.812467][T28808] ? __pfx_mtdchar_blkpg_ioctl+0x10/0x10 [ 1645.818195][T28808] mtdchar_ioctl+0x1670/0x1fd0 [ 1645.823030][T28808] ? __pfx_mtdchar_ioctl+0x10/0x10 [ 1645.828414][T28808] ? lock_acquire+0x17c/0x330 [ 1645.833624][T28808] ? __pfx___might_resched+0x10/0x10 [ 1645.839233][T28808] ? trace_contention_end+0xd6/0x110 [ 1645.844581][T28808] ? do_vfs_ioctl+0x226/0x13e0 [ 1645.849406][T28808] ? mtdchar_unlocked_ioctl+0xa2/0xf0 [ 1645.854824][T28808] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 1645.859915][T28808] ? __pfx___mutex_lock+0x10/0x10 [ 1645.864996][T28808] ? do_raw_spin_unlock+0x145/0x1e0 [ 1645.870464][T28808] ? hook_file_ioctl_common+0x146/0x410 [ 1645.876085][T28808] mtdchar_unlocked_ioctl+0xb0/0xf0 [ 1645.881330][T28808] ? __pfx_mtdchar_unlocked_ioctl+0x10/0x10 [ 1645.887270][T28808] __x64_sys_ioctl+0x18e/0x210 [ 1645.892138][T28808] do_syscall_64+0xc9/0xf80 [ 1645.896697][T28808] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1645.902629][T28808] RIP: 0033:0x7f0bfcb9aeb9 [ 1645.907088][T28808] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1645.927489][T28808] RSP: 002b:00007f0bfdb37028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1645.936271][T28808] RAX: ffffffffffffffda RBX: 00007f0bfce15fa0 RCX: 00007f0bfcb9aeb9 [ 1645.944392][T28808] RDX: 0000000000000000 RSI: 0000000000001269 RDI: 0000000000000001 [ 1645.952425][T28808] RBP: 00007f0bfcc08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1645.960447][T28808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1645.968453][T28808] R13: 00007f0bfce16038 R14: 00007f0bfce15fa0 R15: 00007ffeb8565fe8 [ 1645.976568][T28808] [ 1645.980208][T28808] Kernel Offset: disabled [ 1645.984555][T28808] Rebooting in 86400 seconds..