last executing test programs: 3m38.420071475s ago: executing program 0 (id=2327): openat$auto_ptdump_curusr_fops_(0xffffffffffffff9c, &(0x7f00000000c0), 0x80, 0x0) read$auto_seq_oss_f_ops_seq_oss(0xffffffffffffffff, 0x0, 0x0) openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x18b800, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) read$auto(0x3, 0x0, 0x80) rename$auto(0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) write$auto_seq_oss_f_ops_seq_oss(0xffffffffffffffff, &(0x7f0000000040)="5f74ab2fc43781e047140a5cbc3ac5229b90633d9cddda9efb1f2c3d5d1e63f3fb5acf079b9336319d009cb514679a42eaca52b81c166d19625d173c26ece6542f2fb29712f4fb9072fc432b4cf3e6f5a7f3c9f91ee88ba5fa11d48fd3658e8f44f8423b4cd02bbec912ed34f9f4b19b03d4c62b24ede44c0c76c34edf7bde061903c2ee4c64110ac668239fa53ba42933ae74c3d173663248ff0945dd2e405e0d378b5a8e4643a7bc3b35a7248431450ca8901467ea6dc5d86de1e90f869f6a04ac10043676f3b2c7f1339b2d7468133fb8447d17846b6b78079ecc31d7d0f74caa4a3db1ac4d312bfdb34bd331f1f771a2396108561a52153d63a7b2a3a077a7e4c1a22bcb23e1f3e511fee310baa67904d2aad4d6671e8b77c7720e37e84e0efecb60a35f188cbe8b8b2fb3967b78aa482aabb103f23083baa9b2ae653731d5993db4054233dea4af25795e12eb4d6b046bdeea6adce8626e0def15dd32b0ec16a8", 0x163) socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003b40)={'xfrm0\x00', 0x0}) sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16, @ANYBLOB="000226bd7000fedbdf25030000000800030000020000060007000080000008000200", @ANYRES32=0x0, @ANYBLOB="0a00050000000000000000000a00010000000000000000000a000500000000000000000008000200", @ANYRES16=r1], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x4000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYRES16=r1], 0x1ac}}, 0x40001) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/uevent_helper\x00', 0x20681, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) r2 = openat$auto_fops_x64_ro_(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/ieee80211/phy14/netdev:wlan1/stations/08:02:11:00:00:00/driver_buffered_tids\x00', 0x100, 0x0) socket(0x2b, 0x1, 0x0) pidfd_send_signal$auto_SIGCONT(r2, 0x12, 0x0, 0x0) 3m35.732597537s ago: executing program 0 (id=2332): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) ioctl$auto_KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000040)={0x2, 0x0, [{0x480, 0x400, 0x9}]}) r0 = socket(0x2, 0x5, 0x0) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x14, 0x0, 0x1b, 0x74bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4004040}, 0xc800) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r1, 0x0, 0x20) clone$auto(0x22, 0x7, &(0x7f0000000180)=0x4, &(0x7f00000001c0)=0x11, 0x4) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) socket(0xa, 0x3, 0x3a) sysfs$auto(0x0, 0x6, 0xfffffffffffffff8) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x14f602, 0x0) sendmmsg$auto(r0, &(0x7f0000000140)={{&(0x7f0000000040), 0xfff, &(0x7f00000000c0)={0x0, 0x1feff}, 0x7, 0x0, 0x5, 0xb}, 0xfff}, 0x8, 0x311) 3m35.22610222s ago: executing program 0 (id=2333): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/zswap/parameters/compressor\x00', 0xc0002, 0x0) write$auto_ocfs2_control_fops_stack_user(r0, &(0x7f0000000200), 0x0) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/module/kvm_intel/parameters/vmentry_l1d_flush\x00', 0x82942, 0x0) sendfile$auto(r1, r1, 0x0, 0x300) 3m34.933699431s ago: executing program 0 (id=2334): mmap$auto(0x0, 0x9fa5, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/scsi_mod/parameters/scan\x00', 0x102, 0x0) openat$auto_nvmf_dev_fops_fabrics(0xffffffffffffff9c, &(0x7f00000004c0), 0x101202, 0x0) ioctl$auto(0xffffffffffffffff, 0xab07, 0xffffffffffffffff) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r1 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) sendmsg$auto_NL80211_CMD_SET_COALESCE(0xffffffffffffffff, 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/devices/platform/dummy_hcd.0/usb1/bDeviceProtocol\x00', 0x12bc00, 0x0) write$auto(r0, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) semctl$auto(0x4, 0x9, 0x13, 0x40000007) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sda1\x00', 0xc6c43, 0x0) r2 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), 0xffffffffffffffff) openat$auto_stat_fops_per_vm_kvm_main(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/kvm/halt_poll_fail_hist\x00', 0xa2500, 0x0) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r2, @ANYBLOB="01002dbd0900fedbdf257e"], 0x14}, 0x1, 0x68, 0x0, 0x24000000}, 0xd0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_IPVS_CMD_GET_SERVICE(r3, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f0000000680)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x2004000d}, 0x24048804) mmap$auto(0x0, 0x400008, 0x6, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000080), r1) socket(0xa, 0x2, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/tty12\x00', 0x101840, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$auto_ioam6(&(0x7f0000001180), 0xffffffffffffffff) sendmsg$auto_IOAM6_CMD_ADD_NAMESPACE(r5, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f00000011c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="010025bd7000ffdbdf25010020000600010004000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008000) 3m32.694130414s ago: executing program 0 (id=2339): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) ioctl$auto_KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000040)={0x2, 0x0, [{0x480, 0x400, 0x9}]}) r0 = socket(0x2, 0x5, 0x0) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x14, 0x0, 0x1b, 0x74bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4004040}, 0xc800) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r1, 0x0, 0x20) clone$auto(0x22, 0x7, &(0x7f0000000180)=0x4, &(0x7f00000001c0)=0x11, 0x4) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) socket(0xa, 0x3, 0x3a) sysfs$auto(0x0, 0x6, 0xfffffffffffffff8) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x2, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) sendmmsg$auto(r0, &(0x7f0000000140)={{&(0x7f0000000040), 0xfff, &(0x7f00000000c0)={0x0, 0x1feff}, 0x7, 0x0, 0x5, 0xb}, 0xfff}, 0x8, 0x311) 3m31.600478685s ago: executing program 0 (id=2342): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_gtp(&(0x7f00000001c0), r0) sendmsg$auto_GTP_CMD_GETPDP(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x2c, r1, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@GTPA_TID={0xc, 0x3, 0xffffffffffffffff}, @GTPA_TID={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004151}, 0x1) r2 = syz_genetlink_get_family_id$auto_nfsd(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$auto_NFSD_CMD_THREADS_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000080)={0x104, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NFSD_A_SERVER_SCOPE={0xe5, 0x4, 'nfs\x81\x9b\xb6$\x10\x16\xfb:\xb3\x15Y\x90\xf9\xc0\xc0\x88.!s\x1f\xe9\x1d\'&Hvn\xb1\x88\xbf\x15<\xa6e\xbc\xa1\xfa\xbeG\t*_kW_m\x1b:,\xc6\xa6\xfd\xba\xcd\xbe\xbe=\xc3\xbf\xd3f2!\xc4\x05EA\xac\x04\x83\xf1\x99\xa05\xfb\xf3\xf4?(\x9c\x8b\x9d\xdcV\xc5\x00\tm\xdez\xc9\xdbn\xb1\t\n\xe7\x8cd\xca\xd89\r\x1a@\xe1_\xb1_\xf8\xf3\xb1]\xad\xaf\xd9\xd0\xa8:\xd4<\x8d\xbc\rg[\x1d\x98\xb2r\xac\x83\xf8s\xafh@\x8c\xa7\xcd\xb3+Qy\"\xe8\x8ah,\xca|\xd9\xb3?Ha\xdb\xa3F\nGU&7\x15\x19\xeb\x9b\x9eU\xab\x86\x10\x9d\xaf>\xda(R\xcb\xe6\xf7\x8c\xf8\xb1\xdf\xe4t\xe6\x9f\x81\xb3\xbb\xc3\xbf\x8e\xd9VC\xa7\x03rJ.\xf6L\x94b\xc5\x03\xea\x84u\x92\xc0\xcd\x16\xfb<\x03\x00\x00'}, @NFSD_A_SERVER_THREADS={0x8, 0x1, 0x2}]}, 0x104}}, 0x4000) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x20009, 0x5, 0xeb2, 0x8, 0x1008000) r3 = socket(0x10, 0x2, 0x0) read$auto(0x3, 0x0, 0x80) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid_for_children\x00') sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1a00"], 0x1ac}}, 0x40000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) sendmsg$auto_NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x51) mmap$auto(0x7c, 0x20009, 0xffffffffffffffc0, 0xeb1, 0x401, 0x10001) statmount$auto(0x0, &(0x7f0000000180)={0xa, 0x1, 0x9, 0x3, 0x16, 0x93f, 0x1ffe0, 0x3, 0x6, 0x2, 0x0, 0xf3, 0xfff, 0x11, 0xb0, 0x1, 0x5, 0x4, 0x9, 0x6, 0x0, 0x0, 0x0, 0x200, 0xfffffffa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000003, 0x6, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3043, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x10000000000, 0x0, 0x3, 0x0, 0x0, 0xffffffffffff0000, 0x11, 0x8000000000000001, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x1]}, 0x1fe, 0x10081) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="11002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r4 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r4, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0xfc2}, 0x2, 0x0, 0x0, 0xa503}, 0x800}, 0x7, 0x4008) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[], 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) recvmmsg$auto(r3, &(0x7f0000000100)={{0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000040), 0xcb}, 0x3, 0x0, 0x80000000, 0x6}, 0x9}, 0x7, 0x6, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) prctl$auto(0x10000000018, 0xffffffff, 0x4, 0x20000000009, 0x0) sendmsg$auto_SMC_NETLINK_GET_DEV_SMCD(r5, &(0x7f0000004380)={0x0, 0x0, &(0x7f0000004340)={&(0x7f0000004300)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB='\v'], 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x810) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), r5) read$auto(r5, &(0x7f0000000100)='nl80211\x00', 0xbe62) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1800"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc8}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x1f00) 3m16.411563537s ago: executing program 32 (id=2342): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_gtp(&(0x7f00000001c0), r0) sendmsg$auto_GTP_CMD_GETPDP(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x2c, r1, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@GTPA_TID={0xc, 0x3, 0xffffffffffffffff}, @GTPA_TID={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004151}, 0x1) r2 = syz_genetlink_get_family_id$auto_nfsd(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$auto_NFSD_CMD_THREADS_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000080)={0x104, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@NFSD_A_SERVER_SCOPE={0xe5, 0x4, 'nfs\x81\x9b\xb6$\x10\x16\xfb:\xb3\x15Y\x90\xf9\xc0\xc0\x88.!s\x1f\xe9\x1d\'&Hvn\xb1\x88\xbf\x15<\xa6e\xbc\xa1\xfa\xbeG\t*_kW_m\x1b:,\xc6\xa6\xfd\xba\xcd\xbe\xbe=\xc3\xbf\xd3f2!\xc4\x05EA\xac\x04\x83\xf1\x99\xa05\xfb\xf3\xf4?(\x9c\x8b\x9d\xdcV\xc5\x00\tm\xdez\xc9\xdbn\xb1\t\n\xe7\x8cd\xca\xd89\r\x1a@\xe1_\xb1_\xf8\xf3\xb1]\xad\xaf\xd9\xd0\xa8:\xd4<\x8d\xbc\rg[\x1d\x98\xb2r\xac\x83\xf8s\xafh@\x8c\xa7\xcd\xb3+Qy\"\xe8\x8ah,\xca|\xd9\xb3?Ha\xdb\xa3F\nGU&7\x15\x19\xeb\x9b\x9eU\xab\x86\x10\x9d\xaf>\xda(R\xcb\xe6\xf7\x8c\xf8\xb1\xdf\xe4t\xe6\x9f\x81\xb3\xbb\xc3\xbf\x8e\xd9VC\xa7\x03rJ.\xf6L\x94b\xc5\x03\xea\x84u\x92\xc0\xcd\x16\xfb<\x03\x00\x00'}, @NFSD_A_SERVER_THREADS={0x8, 0x1, 0x2}]}, 0x104}}, 0x4000) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x20009, 0x5, 0xeb2, 0x8, 0x1008000) r3 = socket(0x10, 0x2, 0x0) read$auto(0x3, 0x0, 0x80) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid_for_children\x00') sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1a00"], 0x1ac}}, 0x40000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) sendmsg$auto_NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, 0x0, 0x51) mmap$auto(0x7c, 0x20009, 0xffffffffffffffc0, 0xeb1, 0x401, 0x10001) statmount$auto(0x0, &(0x7f0000000180)={0xa, 0x1, 0x9, 0x3, 0x16, 0x93f, 0x1ffe0, 0x3, 0x6, 0x2, 0x0, 0xf3, 0xfff, 0x11, 0xb0, 0x1, 0x5, 0x4, 0x9, 0x6, 0x0, 0x0, 0x0, 0x200, 0xfffffffa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, [0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000003, 0x6, 0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x3043, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x10000000000, 0x0, 0x3, 0x0, 0x0, 0xffffffffffff0000, 0x11, 0x8000000000000001, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x1]}, 0x1fe, 0x10081) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="11002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r4 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r4, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0xfc2}, 0x2, 0x0, 0x0, 0xa503}, 0x800}, 0x7, 0x4008) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[], 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) recvmmsg$auto(r3, &(0x7f0000000100)={{0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000040), 0xcb}, 0x3, 0x0, 0x80000000, 0x6}, 0x9}, 0x7, 0x6, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) prctl$auto(0x10000000018, 0xffffffff, 0x4, 0x20000000009, 0x0) sendmsg$auto_SMC_NETLINK_GET_DEV_SMCD(r5, &(0x7f0000004380)={0x0, 0x0, &(0x7f0000004340)={&(0x7f0000004300)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB='\v'], 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x810) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), r5) read$auto(r5, &(0x7f0000000100)='nl80211\x00', 0xbe62) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1800"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc8}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x1f00) 2m42.874814353s ago: executing program 2 (id=2478): openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/platform/i8042/serio0/scroll\x00', 0x2062, 0x0) write$auto(r0, &(0x7f00000001c0)='1\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) write$auto(r0, &(0x7f0000000440)='0\x00\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94\xf8F\xbb\xa2\xbb>\xade\x18\xbd\xe2\x1c\x89OO]e[\xbb\xf9\xcd\xc0\xc9\x00\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\xef\xc0\x04z\xd0I>\x8f\x00\xe5\x1c*\xed`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\f};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xacA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xdeL/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(\x95\xdfH\xf4\v\xf3CRnz\xc2\x13<\xf0\v\x1f\x14\xf3\xd0\xf2\xd1L!\x81\xea\x83\xa0\r|%\xbf\x02trg\x9a\xe7)\a\xf4\xaa\x05\xc0\xa0r\xd2\x85\x8dH\xd0>\xca\xfc5\x01\x95O4\xca\x95\x1d\x83\xec\nD\x8e\xfb\xce\xd1w\x15:\xe9\x81/B#\xc6\xa1\xfa-\x1b\x8cr\x92nM\xa1\xbb\xe4pd$\xd7\x1b\v\x82\rd\xd2\xaa\v!\xb1}\x92\x89\x8d\xcd\x1e\xc7N\xeeO\x8dO\xe9\xfc\x91\xa1\xa8=R+\a\xb7R\t\f+\x7f\xd5H\x90G=\x9a\r\xb10\x17n\x1b\xf8\v\x11\v\xbb', 0x98c7) r1 = open(&(0x7f0000000800)='./file1\x00', 0x163ac1, 0x82) syz_genetlink_get_family_id$auto_nl80211(&(0x7f00000002c0), 0xffffffffffffffff) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) close_range$auto(0x2, 0x8, 0x0) r2 = socket(0x2, 0x80002, 0x73) socket(0xa, 0x1, 0x84) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) select$auto(0xe, 0x0, 0x0, 0x0, 0x0) sysfs$auto(0x2, 0x23, 0x0) r3 = openat$auto_ftrace_set_event_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/tracing/set_event\x00', 0x20201, 0x0) write$auto(r3, 0x0, 0x4) bind$auto(0x3, &(0x7f0000000100)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) shutdown$auto(0x200000003, 0x2) sendmsg$auto_NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="a001ee00", @ANYBLOB="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"], 0x1a0}, 0x1, 0x0, 0x0, 0x4040004}, 0x24048000) syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000000300), r2) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) r4 = syz_clone(0x20080100, 0x0, 0x0, 0x0, 0x0, 0x0) wait4$auto(r4, 0x0, 0x81ff, 0x0) 2m41.518824117s ago: executing program 2 (id=2483): r0 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio1\x00', 0x2000, 0x0) ioctl$auto_SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x1a9402, 0x0) sendmsg$auto_ETHTOOL_MSG_CABLE_TEST_TDR_ACT(0xffffffffffffffff, 0x0, 0x800) timer_create$auto(0x9, 0x0, 0x0) read$auto(0x3, 0x0, 0x8080) socket(0xa, 0x1, 0x100) write$auto(0x3, 0x0, 0xffd8) unshare$auto(0x40000080) shmctl$auto_IPC_SET(0x4, 0x1, &(0x7f0000000280)={{0x7c, 0xee00, 0xee00, 0xca6d, 0x8, 0x4bd6, 0x5}, 0xd21, 0x5, 0x8, 0x1, @inferred=0xffffffffffffffff, @inferred=0xffffffffffffffff, 0x9, 0x0, &(0x7f0000000140)="4f0d6995e943b6bc1919e836e1a6e889b4881e233d3b51e0054c9e474be535fd29da000000", &(0x7f0000000200)="e3ac9b01ee8d985b677531eeeee5cb5bf774d2df4d9ae6dccbc98def20b72c7c2826a585ba3a8d67815abade214708a4ade77c6faa2f2889ca3e7989f32645dd597a3ae1b46e8d8c7e03ae6b8aaa49f6bf64cc5fa98e25"}) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) r2 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/scsi/device_info\x00', 0x48041, 0x0) write$auto_proc_reg_file_ops_compat_inode(r2, &(0x7f0000000140)="22edd92f26639ec0023a8686bd579dcf16f50e9bfa20abfa3ae55be8b5f870918621c10d9e916f6fe4fca6d7515871f05cc91f4246f6515662789a97d863c26cfd02b1cf15933b053fbdab9b22b1", 0x4e) r3 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x20342, 0x0) ioctl$auto(0x3, 0x40086203, 0xffffffffffffffff) setresuid$auto(0x2, 0x7, 0x8080) r4 = clone$auto(0x6fc, 0x4dbb2, 0x0, 0x0, 0x4000c1a) tkill$auto(r4, 0x9) fsconfig$auto(r0, 0x800, &(0x7f0000000040)='/sys/devices/LNXSYSTM:00/LNXPWRBN:00/power/wakeup_abort_count\x00', 0x0, r1) write$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffffff, &(0x7f00000001c0), 0x0) process_mrelease$auto(0xffffffffffffffff, 0xa) mmap$auto(0xfffffffffffffffe, 0x400008, 0xdf, 0x18, r3, 0x8000) write$auto(0x3, 0x0, 0x100082) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r5 = socket(0x2, 0x1, 0x106) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXPWRBN:00/power/wakeup_abort_count\x00', 0x0, 0x0) bind$auto(r5, &(0x7f0000000000)=@in={0x2, 0x3, @multicast1}, 0x6a) openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/tracing/per_cpu/cpu0/trace_pipe_raw\x00', 0x24100, 0x0) 2m40.213672911s ago: executing program 2 (id=2487): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/pcrypt/pencrypt/parallel_cpumask\x00', 0x80302, 0x0) write$auto(r1, &(0x7f0000000340)=',02.15.4 ]\x98\x0f7V\xd4l\xf2AC\x04\xecQ=\xa2\xce\nO}\x1d\xd7\xb5\x92\xf7\xb2\xc2\xddm\xfbR\xfb\x92x\xd8\xb2\x8a&\xda\\\xa1}&^\x03\x02\xf28\xfd|\xed~\a\xaf\x14\xb5.\x92\"-6.\xb2$\x88\xeb\xdc\x0f\xba$?c\x8b\xcb\xf4q\r\xf5>}4\x99(\xb8D\x15\xb8\xc9U\x14\xd6r\xc9\x81\xbbI\xc9+^\x00\xf6\xb5\xd9\x1e\x89G?/\xc5\x86\xd0\xab\xb3\xfd\xc9?\xa7B\x1b\xdc\xff\xab\xb6~\x96\xd6\x9f\x1d\xfb\xa1dg\x9d\x8d]\xdek\x9c0\xea\xb3\nV\x1d\x10g\xaa\xf9\xf0\xc9\n\x8c\xf25G\x9c\x19\xe5\xd8\xa3\xee\x11\x12f\xd5o\x00\xeaY\n\xe0\x9f\r\xd4\x8e9G\x01\x04\xb2j\xbfYX\x9a)OQ\xedk\xb9\x85\x03c\xf3\x80\x10eG(\x94m81PL\x8d\xa47\x1a\x16\x11\xcd\xcdf\x15\r\x19\xc3\x90\xbe\x12\x85V\xeb\x8d\x97\xf0\x9c!\x86:\xe8\x8b\xa7@l', 0x3) ptrace$auto(0x10, r0, 0x4, 0x7ff) openat$auto_hpet_fops_hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x80800, 0x0) unshare$auto(0x40000080) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r2, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) socket(0x2b, 0x1, 0x0) listen$auto(0x3, 0x81) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) keyctl$auto(0x1f, 0x1, 0x6, 0x3, 0x3ff) prctl$auto(0xc, 0xff, r0, 0xf78, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x5, 0x15) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000980)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100313d7000fddbdf250c000000ac4003800800038004000580"], 0x20}}, 0x24048084) madvise$auto(0x0, 0x200007, 0x19) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/kfence/parameters/sample_interval\x00', 0x102, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x101001, 0x0) r5 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) ioctl$auto_KVM_CREATE_VM(r5, 0xae01, 0x0) ptrace$auto_PTRACE_OLDSETOPTIONS(0x15, r0, 0x7ffffffe, 0xf) r6 = openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/tracing/per_cpu/cpu0/trace_pipe_raw\x00', 0x82000, 0x0) read$auto_proc_iter_file_ops_compat_inode(r6, &(0x7f0000000000)=""/162, 0xa2) 2m38.450978833s ago: executing program 2 (id=2494): mmap$auto(0x0, 0x9fa5, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/scsi_mod/parameters/scan\x00', 0x102, 0x0) openat$auto_nvmf_dev_fops_fabrics(0xffffffffffffff9c, &(0x7f00000004c0), 0x101202, 0x0) ioctl$auto(0xffffffffffffffff, 0xab07, 0xffffffffffffffff) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) sendmsg$auto_NL80211_CMD_SET_COALESCE(0xffffffffffffffff, 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/devices/platform/dummy_hcd.0/usb1/bDeviceProtocol\x00', 0x12bc00, 0x0) write$auto(r0, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) semctl$auto(0x4, 0x9, 0x13, 0x40000007) set_mempolicy$auto(0x6, &(0x7f0000000080)=0x3, 0x21) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sda1\x00', 0xc6c43, 0x0) r1 = openat$auto_stat_fops_per_vm_kvm_main(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/kvm/halt_poll_fail_hist\x00', 0xa2500, 0x0) read$auto_stat_fops_per_vm_kvm_main(r1, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01002dbd0900fedbdf257e"], 0x14}, 0x1, 0x68, 0x0, 0x24000000}, 0xd0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_IPVS_CMD_GET_SERVICE(r3, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f0000000680)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x2004000d}, 0x24048804) mmap$auto(0x0, 0x400008, 0x6, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/tty12\x00', 0x101840, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$auto_ioam6(&(0x7f0000001180), 0xffffffffffffffff) sendmsg$auto_IOAM6_CMD_ADD_NAMESPACE(r5, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f00000011c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="010025bd7000ffdbdf25010020000600010004000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008000) 2m36.835529078s ago: executing program 2 (id=2498): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/pcrypt/pencrypt/parallel_cpumask\x00', 0x80302, 0x0) write$auto(r1, &(0x7f0000000340)=',02.15.4 ]\x98\x0f7V\xd4l\xf2AC\x04\xecQ=\xa2\xce\nO}\x1d\xd7\xb5\x92\xf7\xb2\xc2\xddm\xfbR\xfb\x92x\xd8\xb2\x8a&\xda\\\xa1}&^\x03\x02\xf28\xfd|\xed~\a\xaf\x14\xb5.\x92\"-6.\xb2$\x88\xeb\xdc\x0f\xba$?c\x8b\xcb\xf4q\r\xf5>}4\x99(\xb8D\x15\xb8\xc9U\x14\xd6r\xc9\x81\xbbI\xc9+^\x00\xf6\xb5\xd9\x1e\x89G?/\xc5\x86\xd0\xab\xb3\xfd\xc9?\xa7B\x1b\xdc\xff\xab\xb6~\x96\xd6\x9f\x1d\xfb\xa1dg\x9d\x8d]\xdek\x9c0\xea\xb3\nV\x1d\x10g\xaa\xf9\xf0\xc9\n\x8c\xf25G\x9c\x19\xe5\xd8\xa3\xee\x11\x12f\xd5o\x00\xeaY\n\xe0\x9f\r\xd4\x8e9G\x01\x04\xb2j\xbfYX\x9a)OQ\xedk\xb9\x85\x03c\xf3\x80\x10eG(\x94m81PL\x8d\xa47\x1a\x16\x11\xcd\xcdf\x15\r\x19\xc3\x90\xbe\x12\x85V\xeb\x8d\x97\xf0\x9c!\x86:\xe8\x8b\xa7@l', 0x3) ptrace$auto(0x10, r0, 0x4, 0x7ff) openat$auto_hpet_fops_hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x80800, 0x0) unshare$auto(0x40000080) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r2, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) socket(0x2b, 0x1, 0x0) ioctl$auto(0x3, 0x8905, 0x38) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) keyctl$auto(0x1f, 0x1, 0x6, 0x3, 0x3ff) prctl$auto(0xc, 0xff, r0, 0xf78, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x5, 0x15) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000980)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100313d7000fddbdf250c000000ac4003800800038004000580"], 0x20}}, 0x24048084) madvise$auto(0x0, 0x200007, 0x19) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/kfence/parameters/sample_interval\x00', 0x102, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x101001, 0x0) r5 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) ioctl$auto_KVM_CREATE_VM(r5, 0xae01, 0x0) ptrace$auto_PTRACE_OLDSETOPTIONS(0x15, r0, 0x7ffffffe, 0xf) r6 = openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/tracing/per_cpu/cpu0/trace_pipe_raw\x00', 0x82000, 0x0) read$auto_proc_iter_file_ops_compat_inode(r6, &(0x7f0000000000)=""/162, 0xa2) 2m35.149950109s ago: executing program 2 (id=2505): mmap$auto(0x0, 0x2020009, 0x3, 0xf8, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x8000) r0 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/rpc/nfsd.fh/flush\x00', 0x4a141, 0x0) r1 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/oom_adj\x00', 0x48402, 0x0) read$auto(r1, 0x0, 0x7) writev$auto(r0, &(0x7f0000000240)={0x0, 0x5}, 0xa) socket(0xa, 0x3, 0x3b) connect$auto(0x3, &(0x7f0000000000)=@generic={0xa, "0000e100"}, 0x58) r2 = mq_open$auto(&(0x7f0000000400)='\x12\xe6D\b\x9e\x00\x80\x8d\f\xb9w-\xbd!\x9eb\xed\xfb\x0f{\x14S\xc4\xd1\x01gBV\x91\x8f_\xc0.\x84\xfe\x84\xd1s\x05\x01\x06\x00\xb3\x13_Y&\xa9\x88\xe4\xa2\xb0V\x85\x92<\xb6\xdcT \\\xf2\v\xb1\xe2\xd8\xfa\xd8V\xe5\x00\xfa\xe9\xdc\x91<\xce\x18=\x06\xdagq\xb5\r\t\xb2\xde\x99\xd50\xbb\x192\x1c4\x86\xc0\xc1-\xd5\x10\xc3\xfc*[8\x89h\xc5\xba\xff\xc8u5srQ', 0xa7c, 0xc, 0x0) mq_timedreceive$auto(r2, 0x0, 0x3, 0x0, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) mmap$auto(0x0, 0x400, 0xdf, 0xeb1, 0x401, 0x8000) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) io_uring_setup$auto(0x6, 0x0) close_range$auto(0x2, 0xa, 0x0) r3 = socket(0xa, 0x2, 0x0) connect$auto(0xffffffffffffffff, 0x0, 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7fffffe) mmap$auto(0x200, 0x400008, 0x200, 0x9b72, r3, 0x6) r4 = openat$auto_proc_mem_operations_base(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/mem\x00', 0x20401, 0x0) write$auto_proc_mem_operations_base(r4, &(0x7f0000001680)="a7", 0x80000) mmap$auto(0x5, 0x200, 0x4001000000db, 0x3fb, r1, 0x8000) getsockopt$auto_SO_OOBINLINE(r4, 0xff, 0xa, &(0x7f0000000040)='/proc/self/mem\x00', &(0x7f0000000080)=0x6) syz_clone3(0x0, 0x0) madvise$auto(0x1ffff000, 0x7, 0x100000000) sysfs$auto(0x2, 0x20, 0x0) fsopen$auto(0x0, 0x1) ioperm$auto(0x3, 0x9, 0x6378) 2m20.049854678s ago: executing program 33 (id=2505): mmap$auto(0x0, 0x2020009, 0x3, 0xf8, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x8000) r0 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/rpc/nfsd.fh/flush\x00', 0x4a141, 0x0) r1 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/oom_adj\x00', 0x48402, 0x0) read$auto(r1, 0x0, 0x7) writev$auto(r0, &(0x7f0000000240)={0x0, 0x5}, 0xa) socket(0xa, 0x3, 0x3b) connect$auto(0x3, &(0x7f0000000000)=@generic={0xa, "0000e100"}, 0x58) r2 = mq_open$auto(&(0x7f0000000400)='\x12\xe6D\b\x9e\x00\x80\x8d\f\xb9w-\xbd!\x9eb\xed\xfb\x0f{\x14S\xc4\xd1\x01gBV\x91\x8f_\xc0.\x84\xfe\x84\xd1s\x05\x01\x06\x00\xb3\x13_Y&\xa9\x88\xe4\xa2\xb0V\x85\x92<\xb6\xdcT \\\xf2\v\xb1\xe2\xd8\xfa\xd8V\xe5\x00\xfa\xe9\xdc\x91<\xce\x18=\x06\xdagq\xb5\r\t\xb2\xde\x99\xd50\xbb\x192\x1c4\x86\xc0\xc1-\xd5\x10\xc3\xfc*[8\x89h\xc5\xba\xff\xc8u5srQ', 0xa7c, 0xc, 0x0) mq_timedreceive$auto(r2, 0x0, 0x3, 0x0, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) mmap$auto(0x0, 0x400, 0xdf, 0xeb1, 0x401, 0x8000) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) io_uring_setup$auto(0x6, 0x0) close_range$auto(0x2, 0xa, 0x0) r3 = socket(0xa, 0x2, 0x0) connect$auto(0xffffffffffffffff, 0x0, 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7fffffe) mmap$auto(0x200, 0x400008, 0x200, 0x9b72, r3, 0x6) r4 = openat$auto_proc_mem_operations_base(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/mem\x00', 0x20401, 0x0) write$auto_proc_mem_operations_base(r4, &(0x7f0000001680)="a7", 0x80000) mmap$auto(0x5, 0x200, 0x4001000000db, 0x3fb, r1, 0x8000) getsockopt$auto_SO_OOBINLINE(r4, 0xff, 0xa, &(0x7f0000000040)='/proc/self/mem\x00', &(0x7f0000000080)=0x6) syz_clone3(0x0, 0x0) madvise$auto(0x1ffff000, 0x7, 0x100000000) sysfs$auto(0x2, 0x20, 0x0) fsopen$auto(0x0, 0x1) ioperm$auto(0x3, 0x9, 0x6378) 1m29.567310174s ago: executing program 4 (id=2715): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/scsi/drivers/st/try_direct_io\x00', 0x121000, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r0, &(0x7f0000001c00)=""/4111, 0x100f) r1 = socket(0x2, 0x5, 0x0) mmap$auto(0x0, 0x420009, 0xdf, 0xeb1, 0x401, 0x8000) r2 = openat$auto_debugfs_full_proxy_file_operations_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/ieee80211/phy0/reset\x00', 0x82, 0x0) pwritev$auto(r2, &(0x7f0000000180)={0x0, 0x5}, 0x3, 0x700, 0x5) close_range$auto(0x0, 0xfffffffffffff000, 0x2) io_uring_setup$auto(0x2, 0x0) r3 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS2\x00', 0x101c81, 0x0) socket(0x15, 0x5, 0x8) close_range$auto(0x2, 0x8, 0x0) r4 = openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing/per_cpu/cpu0/trace_pipe_raw\x00', 0x1000, 0x0) mmap$auto_tracing_buffers_fops_trace(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x8e051, r4, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0x8000000000000000, 0x15) r5 = openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/tracing/per_cpu/cpu0/trace_pipe_raw\x00', 0x364f9cefc8a0a83, 0x0) ioctl$auto_tracing_buffers_fops_trace(r5, 0x5220, 0x0) ioctl$auto_TIOCSETD2(r3, 0x5423, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$auto(0xc01, 0x1, 0x6d, 0x0) r6 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS2\x00', 0x101f81, 0x0) ioctl$auto_TIOCSETD2(r6, 0x5423, 0x0) ioctl$auto_TIOCVHANGUP2(r3, 0x5437, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) sendmmsg$auto(r1, &(0x7f0000000140)={{&(0x7f0000000040), 0x10, &(0x7f00000000c0)={0x0, 0x10000}, 0x7, 0x0, 0x5, 0xb}, 0xfffffff9}, 0xd, 0x311) 1m28.893368226s ago: executing program 4 (id=2716): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ovs_flow(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_OVS_FLOW_CMD_SET(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="f8000000", @ANYRES16=r1, @ANYBLOB="000125bd7000fedbdf250400000004000800040008000400060004000600040008000400060005000900ff00000004000800c0000780080026000d0000009b00fd8004000080140024000000000000000000000000000000000144826ee16ea1ef232f1dcf8f173ed854fa11914a324fb43980b5d39cbe3ae37a8f02476cd8b00b2a2f75b230e4b7e2b402aff4e5a33957854435c05a8628ba1cde02f64411a573208ae9a8dfb73f78af3a9850522f1feafe4e43e0a335e64a3d0954024ce53cc4625de29bc325b549f575fe6136dffc51faa01f6a109d249b00160033002f6465762f696e7075742f6576656e7430000000"], 0xf8}, 0x1, 0x0, 0x0, 0x4}, 0x1) r3 = socket(0x23, 0x80805, 0x0) poll$auto(&(0x7f0000000000)={r3, 0x3963, 0x81}, 0x0, 0x10001) openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/net/dev_snmp6/veth0_to_bridge\x00', 0x51dcd58e954101b2, 0x0) close_range$auto(0x2, 0x8, 0x0) r4 = prctl$auto(0x1000000003b, 0xffffffff00000001, 0x4, 0x5, 0x7) r5 = getpgid(0x0) syz_genetlink_get_family_id$auto_ethtool(0x0, r4) sendmsg$auto_ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, 0x0, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r6 = openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/event0\x00', 0x2, 0x0) ioctl$auto_EVIOCGMASK(r6, 0x80104592, &(0x7f0000000000)={0x2000, 0x800004, 0x9}) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000000280)='/dev/input/event0\x00', 0x4000, 0x0) mmap$auto(0x0, 0x5, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) close_range$auto(0x2, r2, 0x800000) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/v4l-subdev0\x00', 0x0, 0x0) r7 = getpid() select$auto(0x1, 0x0, 0x0, &(0x7f0000000040)={[0x1ff, 0x5, 0xd, 0x8fd6, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x9, 0x7ffffffd, 0x7, 0x1, 0x9, 0x1, 0x3]}, 0x0) process_vm_readv$auto(r7, &(0x7f0000000000)={0x0, 0xfff}, 0x800000001, &(0x7f0000000280)={&(0x7f00000001c0)="34e7c26e81b7ed4c4e4a6247b51ac49bb04efffd", 0x1ffffffff}, 0x6, 0x0) ioctl$auto(0x3, 0xc0585605, 0x38) ioctl$auto(0x3, 0x80000541b, 0x38) prctl$auto_PR_TIMER_CREATE_RESTORE_IDS_GET(0x5, 0x2, 0x0, 0x2f7, 0x6) madvise$auto(0x0, 0xfffffffffffeffff, 0x15) prctl$auto(0x0, 0x200, r5, 0x5, 0x7) mmap$auto(0x0, 0x2020009, 0x203, 0xeb1, 0xfffffffffffffffa, 0x8000) 1m27.334713919s ago: executing program 4 (id=2723): r0 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/adsp1\x00', 0x80e42, 0x0) (async) mmap$auto(0x0, 0x4, 0xdf, 0x9b72, 0xffffffffffffffff, 0x100000000008000) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/neigh/lo/mcast_solicit\x00', 0x2, 0x0) (async) sysfs$auto(0x3, 0x3f, 0x7) fsopen$auto(0x0, 0x1) socket(0x2, 0x80002, 0x73) socket(0x2, 0x800, 0x1000106) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/block/zram0/disksize\x00', 0x2202, 0x0) (async) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40000, 0x0) (async) r1 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snd/controlC2\x00', 0x80, 0x0) r2 = openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000000)='/dev/v4l-subdev5\x00', 0x280, 0x0) ioctl$auto(r2, 0xc040563d, r1) (async) mmap$auto(0x0, 0x8, 0x3, 0xebe, 0xfffffffffffffffa, 0x8000) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r3 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptya1\x00', 0x20080, 0x0) io_uring_setup$auto(0x7e1b, 0x0) (async) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x101e81, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0xa0102, 0x0) (async) ioctl$auto_SNDCTL_TMR_CONTINUE(r3, 0x40045431, 0x0) (async) socket(0x2, 0x1, 0x0) shmctl$auto_IPC_SET(0x10000, 0x1, 0x0) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x63102, 0x0) sendfile$auto(r4, r0, 0x0, 0x5) (async) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000440)='/sys/devices/platform/dummy_hcd.0/usb1/bConfigurationValue\x00', 0x63102, 0x0) (async) r6 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/seq/oss\x00', 0x60c80, 0x0) pread64$auto(r6, 0x0, 0x20000000003f, 0x8) sendfile$auto(r5, r5, 0x0, 0x2) (async) r7 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0xb41e3d7eeff6254b, 0x0) pwrite64$auto(r7, 0x0, 0x4080000000, 0x0) 1m26.447108732s ago: executing program 4 (id=2725): r0 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cec7\x00', 0x10b101, 0x0) ioctl$auto_CEC_S_MODE(r0, 0x40046109, &(0x7f0000000080)=0xd0) openat$auto_ecryptfs_miscdev_fops_miscdev(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f0000000200)={[0x8, 0xffffffffffffff49, 0x5, 0x1823, 0x800000000004, 0x1, 0x5, 0x19, 0x10, 0x5, 0x2dde, 0x8, 0xfffffffffffffffa, 0xab, 0x0, 0x1]}, &(0x7f0000000040)={0x0, 0x7}) openat$auto_event_inject_fops_trace(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing/events/vmalloc/free_vmap_area_noflush/inject\x00', 0x200, 0x0) madvise$auto(0x81, 0xec, 0x5) close_range$auto(r0, r0, 0x71e) 1m26.162634013s ago: executing program 4 (id=2727): r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket(0x11, 0x3, 0x9) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x40000008000) mount$auto(0x0, &(0x7f00000000c0)='.\x00', &(0x7f0000000100)='nfsd\x00\xee\x1a\x8fg\x1b\x04\xad>\x96\xe9IG\xbe\xc8\x12\xae\xc3\xc0@[\x99\xec\xbf(\xec\xc3\xb2\xf2\x15Zi\xc4S6\'\x14\x05\t\x8c\xd5?\xa0\x00\xd8\xe4\xafW\xcc\xa3\xce\t\xf8p\xc6\x00\x00\x00\x00\xb9\xac\xde\x0e\x90\x18\xf1\x13I\x95\xe12\xaclJ\xba\xeb\xe4\x83Z\xaev\xd7\xd9\xdd\x14\x81\xbe\xab\xed\xd5MI\x830_\xc2\x14O\x84\xaa\x13W\xb7\x06\'fvQ\x95\xc5\xd1\x98\xe3T\xees\xf0\xc2\xad\xae\x99\xeb\xc5\xf0\"\x92\xcdfk\xc7\xe9\x96\r\x91\xb0\xc46\xf2\xfc\xef\xfe\xa0\xc9d\xb3h$\xeb\xad\xa4P\x8f\xc3bM{4RQ\x00\x9d)_\xd81(\x03\xca1\x88|\xe5\x1e\x10\x89X\x01\xe9\xf6g\x95xx\xaf\xa9~m\x05\xa2\xe4\x81\xb9\x92\xda\x13\xfe5\xfb\xc6\xd8>\x01\xd4\x14\x94o\x1b[\xa8]\x9b\x03\x95\xc3\xad\xad\x1d#oi|\x04\x93N\xfa\x17\xf3b\xf6\x00\x00\x00', 0x0, 0x0) getcwd$auto(0x0, 0xffffffffffffffff) fspick$auto(0xffffffffffffffff, 0x0, 0x9) r1 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d7) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/platform/i8042/serio0/scroll\x00', 0x2062, 0x0) sendmsg$auto_ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000840)=ANY=[@ANYRESDEC=0x0, @ANYRESOCT=0x0, @ANYRESOCT, @ANYRES32=0x0, @ANYRESDEC, @ANYRES32=0x0, @ANYBLOB, @ANYRESOCT=r0, @ANYRESOCT, @ANYRES16, @ANYRES64=r2, @ANYRES16], 0xb4}}, 0x20000054) write$auto(r2, &(0x7f00000001c0)='1\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0xfff) write$auto(r2, 0x0, 0x98c7) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) unshare$auto(0x40000080) openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/net/rt_cache\x00', 0x2000, 0x0) openat$auto_userio_fops_userio(0xffffffffffffff9c, &(0x7f0000000400), 0x181040, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'gretap0\x00', 0x0}) sendto$auto(0x3, 0x0, 0x34, 0xfffffff9, &(0x7f0000000440)=@xdp={0x2c, 0xdd86, r3, 0x10}, 0x22) sendmsg$auto_ETHTOOL_MSG_MODULE_GET(r1, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000280)={0x120, 0x0, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_MODULE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xffffff4b}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}]}, @ETHTOOL_A_MODULE_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}]}, @ETHTOOL_A_MODULE_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_1\x00'}]}, @ETHTOOL_A_MODULE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x9}]}, @ETHTOOL_A_MODULE_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7fff}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xdbd}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x800}, 0x4) mmap$auto(0x0, 0x2000d, 0x7, 0xeb1, 0x404, 0x10008000) r4 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000800)='/dev/tty0\x00', 0x102, 0x0) write$auto_console_fops_tty_io(r4, &(0x7f0000001bc0)="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", 0x930) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) close_range$auto(0x2, 0x8, 0x0) io_uring_register$auto(0x2, 0xe, 0x0, 0x20) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) io_uring_setup$auto(0x8, 0x0) close_range$auto(0x2, 0x8, 0x0) clock_nanosleep$auto(0x2, 0x6, 0x0, 0x0) 1m23.721067821s ago: executing program 4 (id=2733): mmap$auto(0x0, 0x9, 0x4000000000cf, 0xeb1, 0xffffffffffffffff, 0x8000) r0 = socket(0x2b, 0x1, 0x0) io_uring_setup$auto(0x6, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x7ffe) keyctl$auto(0x3, 0xfffffffffffffffd, 0x0, 0x0, 0xff7) msgsnd$auto(0xfffffffc, 0x0, 0x1, 0x963) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x1, 0x8000) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x59, 0x0) r1 = open(&(0x7f0000000100)='.\x00', 0x200000, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x62240, 0x154) execveat$auto(r1, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) listmount$auto(0x0, 0x0, 0xf4240, 0x0) r2 = openat$auto_btrfs_ctl_fops_super(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) r3 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000001040)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) write$auto(r3, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) mmap$auto(0x0, 0x9, 0x3, 0x8012, 0x3, 0x8000) ioctl$auto_BTRFS_IOC_SCAN_DEV(r2, 0x50009404, 0x0) unshare$auto(0x40000080) read$auto_proc_iter_file_ops_compat_inode(0xffffffffffffffff, 0x0, 0x0) ioctl$auto(0xffffffffffffffff, 0x2, 0xffffffffffffffff) openat$auto_tracing_fops_trace(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/tracing/per_cpu/cpu1/trace\x00', 0x1a6b75d63882a712, 0x0) openat$auto_tracing_free_buffer_fops_trace(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/tracing/free_buffer\x00', 0x4c000, 0xebff) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) connect$auto(0x3, &(0x7f00000018c0)=@in={0x2, 0x300, @loopback=0xac14140a}, 0x55) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) setsockopt$auto(0x400000000000003, 0x29, 0xca, 0x0, 0x567) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) socket(0x2, 0x7, 0x1010a) 1m8.439716116s ago: executing program 34 (id=2733): mmap$auto(0x0, 0x9, 0x4000000000cf, 0xeb1, 0xffffffffffffffff, 0x8000) r0 = socket(0x2b, 0x1, 0x0) io_uring_setup$auto(0x6, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x7ffe) keyctl$auto(0x3, 0xfffffffffffffffd, 0x0, 0x0, 0xff7) msgsnd$auto(0xfffffffc, 0x0, 0x1, 0x963) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x1, 0x8000) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x59, 0x0) r1 = open(&(0x7f0000000100)='.\x00', 0x200000, 0x0) open(&(0x7f0000000800)='./file0\x00', 0x62240, 0x154) execveat$auto(r1, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) listmount$auto(0x0, 0x0, 0xf4240, 0x0) r2 = openat$auto_btrfs_ctl_fops_super(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) r3 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000001040)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) write$auto(r3, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) mmap$auto(0x0, 0x9, 0x3, 0x8012, 0x3, 0x8000) ioctl$auto_BTRFS_IOC_SCAN_DEV(r2, 0x50009404, 0x0) unshare$auto(0x40000080) read$auto_proc_iter_file_ops_compat_inode(0xffffffffffffffff, 0x0, 0x0) ioctl$auto(0xffffffffffffffff, 0x2, 0xffffffffffffffff) openat$auto_tracing_fops_trace(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/tracing/per_cpu/cpu1/trace\x00', 0x1a6b75d63882a712, 0x0) openat$auto_tracing_free_buffer_fops_trace(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/tracing/free_buffer\x00', 0x4c000, 0xebff) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) connect$auto(0x3, &(0x7f00000018c0)=@in={0x2, 0x300, @loopback=0xac14140a}, 0x55) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) setsockopt$auto(0x400000000000003, 0x29, 0xca, 0x0, 0x567) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) socket(0x2, 0x7, 0x1010a) 9.424885778s ago: executing program 1 (id=2974): mknod$auto(&(0x7f0000000180)=':,\x00', 0xc3, 0xfffffffa) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) r0 = memfd_create$auto(0x0, 0x4) r1 = socket(0xa, 0x3, 0x3a) statx$auto(r0, 0x0, 0x1000, 0xbdfc, 0x0) setsockopt$auto(r1, 0x29, 0x14, 0x0, 0x56b) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x102, 0x0) mount$auto(&(0x7f0000000200)='veth0_virt_wifi\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='/sys/module/kfence/parameters/sample_interval\x00', 0x3, &(0x7f00000003c0)="686a652b39d1132017891e2b7861cd7d9fe7ebf8f1080cc3e5b081b67a4e18cf77792ee727a9ca970835b760dda4186bd11adf56a219cc2c03045db88bdbf71b37f9264fd23bedef0b01de3359b72714d8e8cedff4a2042e947355667d2e2c7c71d9085731296488c1f11810f0188e5a8dd73751318b6bc66e2b7dd7e367eb6dbab147ea4d162104b6861a64e0ca1e0b6ea6371e4f3153c54a70536f4ef728cb8f66370c3c9f020e1d8f58d2b09ae572730c5384a5f7d20a81629d11898f112e8fd9ffd4d561e28afbb3d75fdd44c64eb765dfa456d89f57db57e647268c87ee420eee1415388644d2ae701c8ae91a") execve$auto(&(0x7f0000000000)=':,\x00', 0x0, 0x0) mkdir$auto(&(0x7f0000000040)='./file0\x00', 0x2) openat$auto_memtype_fops_memtype(0xffffffffffffff9c, &(0x7f0000000100), 0x105000, 0x0) mmap$auto(0x0, 0x20009, 0xe3, 0x100000eb1, 0x40000000000a1, 0x8000) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x14f602, 0x0) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, 0x0, 0xc800) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) clock_settime$auto(0xfffffffe, 0x0) read$auto(r2, 0x0, 0x20) r3 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r3, &(0x7f0000000200)={0x0, 0x7}, 0x3) openat$auto_vga_arb_device_fops_vgaarb(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) poll$auto(0x0, 0x5, 0x108) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_genetlink_get_family_id$auto_smbd_genl(&(0x7f00000000c0), 0xffffffffffffffff) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mkdir$auto(&(0x7f0000000000)='./file0/file1\x00', 0x2) r4 = openat$dir(0xffffffffffffff9c, 0x0, 0x8000, 0x70) mknodat$auto(r4, &(0x7f0000000080)='./file0\x00', 0xfff, 0x48c) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0/file1\x00', 0x8000, 0x38) 8.296329841s ago: executing program 3 (id=2976): openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000080)='/proc/fs/ext4/sda1/options\x00', 0x80000, 0x0) unshare$auto(0x40000080) r0 = inotify_init1$auto(0x2) socket$nl_generic(0x10, 0x3, 0x10) r1 = prctl$auto(0x20003b, 0x2, 0x0, 0x4, 0x0) splice$auto(r1, &(0x7f0000000000)=0x9, r1, 0x0, 0xb, 0x5) unshare$auto(0x40000080) write$auto(0xca, &(0x7f0000000580)='\x04>\x01\x01\x00\x00\x00\x00\x01T\x9eQ\xcc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc7\xa1\x90s\x1d\xfe\x04\b\xacO\x99\x96\xbdf\x05z4~I<@B\x1d]\xbabB\xdc\xff\x03\x00\x00\x00\x00\x00\x00\xa5\xd86\x14\xe5\xfa\x88XCu\x17\xd0\xc58\xa9\xcc\x03I\xff\x13]\xe0\x10\x83hN\x04\xaf\xa8\xfe;$\x81\xb5\'?\xbc\x82\xf6-\xe0\x97\xbe\xba(\xf3\xf4h\x85\xfb\x97\xcd\xb9JS\xf3a\x01\xca\xdb\xb6\xf5\x96\x04\x00\x00\x00\x00\x00\x00\x92\xfc\xe4\xd7\xf4\xaeU\xae\x1aB\xee\xfeTL\xfa\x17Y\xacz\xda\xd4\x9d\xecX@\x1e\x1e\xd2\xc1^\x1d\x80\x10\xca=F\xeb(\x16\xa0B\x1e\xfb\xaa\x87RVdVc:\xb0\x9e\x05\x10\xe1YLP\xe0\xa0\x1d\x8b\x13U\x16\xd9\xde\x8d\xd61\xaef\x9aZ\xecyb\xa4<\x11K\x8dG*\xbb\x06\xb7\x80\xe4\xf8eS\xf4\xd0\x96\x7f\xeaK\xff}O:\x15x\x11\xc1\v\xffW\xeb\xf6\x7f\xd6\xcc\xc8\x99\x92\x8b\x9cg\xf7#\xc8\x0e\x98\xe4\x83\xd0;?\x00\x00\x00\x00\x00\xca_\x05\")7\xdb\xff];oI,\\Y\xd6eL\x90\rb\xe5\xf4\x116O\xd1\x92C\n\x14\xac\x95\xf4m\x92\xb2\xe0\x89O\fdO\x86\x96r\xaa\xcf,\x90\xb0\xcds\x85\xbc\xbc)(\xaa_\x0f\xa6\x8e\x17\x88\xb0\x1c\x15\xbc)\xcc\xcb\xf6\x91\x11\xa9\xe7\xc9 H\xcel\xe9\xcdm/H\x83gJ%I\xd1 q\x92f\xd8f\xa8\x1b\xd7\x1c\x8aMeP\xc1\xfb\xfd\x85\x86\xc4r\xe4!\x06?\x12\xb0:\x88\\)d+\xfa`.\x8e\x8e\x1b\xba1\x13\x10\xd9n\xea0\x11\xc1l\xb10K\r\x13C#tj', 0x7) r2 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000040), 0xffffffffffffffff) r3 = openat$auto_vhost_net_fops_net(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x2000009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r4 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x0, 0x0) read$auto(r5, 0x0, 0x20) writev$auto(r4, &(0x7f0000000200)={0x0, 0x7}, 0x3) write$auto(0x3, 0x0, 0x5c8) ioctl$auto_VHOST_SET_OWNER(r3, 0xaf01, 0x5) sendmsg$auto_HWSIM_CMD_GET_RADIO(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xffffffffffffff5b, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r2, 0x300, 0x70bd2b, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4008001}, 0x20000010) syz_genetlink_get_family_id$auto_batadv(&(0x7f0000000140), 0xffffffffffffffff) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0x4) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/pci0000:00/0000:00:03.0/resource1\x00', 0x0, 0x0) mmap$auto(0x0, 0x3, 0x1000000000001, 0x8000000008011, 0x3, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$auto_ovs_ct_limit(&(0x7f0000000840), r6) sendmsg$auto_OVS_CT_LIMIT_CMD_SET(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000006400)={0x2e20, r7, 0x1, 0x51bd2e, 0x25dfcbfb, {}, [@OVS_CT_LIMIT_ATTR_ZONE_LIMIT={0x4}, @OVS_CT_LIMIT_ATTR_ZONE_LIMIT={0x2e07}]}, 0x2e20}, 0x1, 0x0, 0x0, 0x2000c040}, 0x4) socket$nl_generic(0x10, 0x3, 0x10) 7.918549927s ago: executing program 1 (id=2977): bpf$auto(0x0, &(0x7f0000000100)=@task_fd_query={0x5, 0x1ff, 0x7fa, 0x22104, 0x9, 0x7, 0x7ff, 0x20010180, 0x4000000f}, 0x198) (fail_nth: 11) 6.910604159s ago: executing program 6 (id=2978): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0) write$auto(0x3, 0x0, 0x7fffffff) write$auto(0x1, 0x0, 0x80000000) openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing/per_cpu/cpu0/trace_pipe_raw\x00', 0x1000, 0x0) mmap$auto(0x100000004, 0x9, 0xfffffffffffffffe, 0x11, 0xfffffffffffffffa, 0x100041) sysfs$auto(0x2, 0xe, 0x0) syz_genetlink_get_family_id$auto_nl80211(&(0x7f00000000c0), 0xffffffffffffffff) lsm_list_modules$auto(0x0, 0x0, 0x0) getcwd$auto(0x0, 0x8000000000000000) r0 = openat$auto_dvb_demux_fops_dmxdev(0xffffffffffffff9c, &(0x7f00000001c0), 0x80100, 0x0) ioctl$auto_dvb_demux_fops_dmxdev(r0, 0x40146f2c, 0x0) 6.790403088s ago: executing program 1 (id=2979): openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/vtconsole/vtcon1/bind\x00', 0x182b02, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, 0x0, 0x40802, 0x0) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bus/usb/009/001\x00', 0xa101, 0x0) r0 = epoll_create1$auto(0x1) writev$auto(0x3, &(0x7f0000000100)={0x0, 0x9}, 0x8) unshare$auto(0x40000080) openat$auto_cpuid_fops_cpuid(0xffffffffffffff9c, 0x0, 0x101500, 0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv6/neigh/bond_slave_1/ucast_solicit\x00', 0x101202, 0x0) r1 = openat$auto_proc_mountinfo_operations_mnt_namespace(0xffffffffffffff9c, &(0x7f0000001080)='/proc/self/mountinfo\x00', 0x20202, 0x0) read$auto_proc_mountinfo_operations_mnt_namespace(r1, &(0x7f0000000040)=""/4080, 0x1036) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) getdents64$auto(r2, &(0x7f0000000000)={0x1e, 0x459b, 0x0, 0xf8}, 0x18) write$auto_ocfs2_control_fops_stack_user(r0, &(0x7f00000010c0)="97b95e2acfcc6093d1622a4ac76279531953b523e30d77497a90291173638f457366ba736280e5828107d75b838de45575af7c6691e6297ec9ed8625a8c111a86cba36be7c08299cbc41a2ddbe9079aca823513a5fc4d96033481611d76bb860c65ca6c8e2754adb343ab9e1e316777e1d4fa2da0e84c2a0623a1cc4de99a59cb475237265691516bad225176d773a421969ae773885c234ef086f43810503d851f4e37e8b07b8731e22cc61e7ac3137d95b1939b87cc7483d81e27584bcea9ea01b8f3013da593a9fb0c3a2e9cbea806d755e31c111f669c53f10ecf40b55854d029947e504cfa780dfe0f968d47a13f91295653634", 0xf6) 6.276148478s ago: executing program 3 (id=2981): openat$auto_sg_fops_sg(0xffffffffffffff9c, 0x0, 0x8402, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) unshare$auto(0x40000080) unshare$auto(0x21) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_batadv(&(0x7f0000000c00), 0xffffffffffffffff) (async, rerun: 32) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) (rerun: 32) sendmsg$auto_BATADV_CMD_GET_VLAN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40801}, 0x4008090) (async) r3 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) (async) openat$auto_kmsg_fops_printk(0xffffffffffffff9c, 0x0, 0x40001, 0x0) (async, rerun: 64) r4 = socket(0xa, 0x5, 0x84) (rerun: 64) sendto$auto(r4, 0x0, 0x401, 0x7f, 0x0, 0x17) listmount$auto(0x0, 0x0, 0x4, 0x101) (async) init_module$auto(0x0, 0xffff9, 0x0) r5 = syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) close_range$auto(0x2, 0xa, 0x0) (async) sendmsg$auto_NL80211_CMD_JOIN_OCB(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0x4c, r5, 0x4, 0x70bd26, 0x25dfdbfb, {}, [@NL80211_ATTR_CSA_C_OFFSETS_TX={0x12, 0xcd, "5939121a711c1501b8732dcba8ec"}, @NL80211_ATTR_MU_MIMO_GROUP_DATA={0x1c, 0xe7, "23228a46389e6ca0346b22272029b60ed74c989985c48dd0"}, @NL80211_ATTR_OFFCHANNEL_TX_OK={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8c0}, 0x4000010) (async, rerun: 64) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000840)='/dev/tty6\x00', 0x0, 0x0) (async, rerun: 64) r6 = openat$auto_rng_chrdev_ops_core(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) read$auto_rng_chrdev_ops_core(r6, 0x0, 0x0) (async) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) (async) setgroups$auto(0xe32, 0x0) (async) mmap$auto(0x0, 0x5, 0x2, 0x40eb2, 0x401, 0x300000000000) (async) capget$auto(0x0, 0xfffffffffffffffe) (async) clone3$auto(&(0x7f0000000400)={0x100008000, 0x2000981, 0x4, 0x6, 0x0, 0x2, 0x3, 0x8, 0x1, 0x0, 0x3}, 0x40) (async, rerun: 64) r7 = socket(0xa, 0x5, 0x0) (rerun: 64) getsockopt$auto(r7, 0x84, 0x21, 0x0, 0x0) (async, rerun: 64) get_mempolicy$auto(0x0, 0x0, 0x400, 0x0, 0x1) (async, rerun: 64) getsockopt$auto(0xffffffffffffffff, 0x40000000029, 0x43, 0xfffffffffffffffe, 0x0) 5.807580769s ago: executing program 6 (id=2983): mmap$auto(0x0, 0x20009, 0xe2, 0xeb1, 0x40000000000a5, 0x8000) close_range$auto(0x2, 0x8, 0x0) r0 = socket(0x2, 0x3, 0x6) setsockopt$auto_SO_TIMESTAMPNS_NEW(r0, 0x1, 0x40, &(0x7f00000000c0)='-&*.+(+\x00', 0xb) r1 = socket(0x2, 0x1, 0x0) sendmsg$auto_GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x4000804) lstat$auto(0x0, &(0x7f0000000180)={0x4, 0x14, 0x7, 0x63, 0x0, 0x0, 0x0, 0x0, 0x40000000000f, 0x1000, 0xfffffffffffffffd, 0x7ffffffd, 0x4000000000009, 0xffffffff7ffffffc, 0x9, 0x7, 0x200000100103}) writev$auto(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000240)="0025d75b3c1c3e252688f438fd8259c7d00db0a9f5b9e0dc41f767dad45fc66cabd54f99487f5682a9006e3e795710ad2437ce1737fa3b60d8cce5c63d58731c95ae1ce1fcbb5f96f1263ef3b051a1a8d31ad667c423287cf97094eb55ad08fae4f80f87ee019c863f279a86e4d2e5d09d81d15ce8486c31e0de04f2d261bcd78bc86a3602c52beb5ed2a601b8529653a6cd76a70f83aecf8999aefd2a4b4ea950c34584b0175fd955d77e4409bf4c546d13a6d28c8443d6f061b0e979e814624d325b2aa610658f61658db2d4", 0x27}, 0x7) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x89fc, &(0x7f0000000040)={'bridge0\x00'}) bind$auto(r1, &(0x7f0000000040)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x6a) sendmmsg$auto(r1, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800008}, 0x5, 0x20000000) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x1c00, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x5}, 0x3, 0x0) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) write$auto(0x3, 0x0, 0x100085) sendfile$auto(0x1, 0x3, 0x0, 0x40000000c07) 5.564541981s ago: executing program 1 (id=2984): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x3, 0x7) io_submit$auto(0x20, 0x7, 0x0) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x59, &(0x7f0000000080)={0x7fffffff, 0xffffff00, 0x2, 0x6, 0x7, 0x8, 0xffffffffffffffff, [], {0x6, 0x6, 0xb, 0x29f, 0x2, 0x83, 0x8, 0x17f, 0x2}, {0x5, 0x1, 0x51, 0x5, 0x1, 0x40, 0x4, 0x8, 0x100000004}}) unshare$auto(0x40000080) socket(0x22, 0x3, 0x0) ioctl$auto(0x3, 0x80000541b, 0x38) 5.360200278s ago: executing program 6 (id=2985): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xc, 0x800008000) r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/oom_adj\x00', 0x300, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bpf$auto(0x0, &(0x7f0000000780)=@link_update={0xa, @new_map_fd=0x5, 0x4007, @old_prog_fd=0x13b}, 0xa3) mmap$auto(0x0, 0x2020009, 0x2, 0xf8, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x20008, 0xfffffffffffffffe, 0x12, 0x401, 0x8000) read$auto(0xffffffffffffffff, 0x0, 0x20) writev$auto(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x7}, 0x3) close_range$auto(0x2, 0x8, 0x0) socket(0xa, 0x80002, 0x73) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0) preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xfffffffd}, 0x3, 0x8, 0xe) lseek$auto(0x3, 0x0, 0x1) close_range$auto(0x0, 0xfffffffffffff000, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) munmap$auto(0x8000, 0xffffffff) r2 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000980), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'dummy0\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_CABLE_TEST_ACT(r1, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x20, r2, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@ETHTOOL_A_CABLE_TEST_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x40000) read$auto(r0, 0x0, 0x1f40) acct$auto(&(0x7f0000000080)='/dev/ptyaf\x00') r4 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x8002, 0x0) writev$auto(r4, &(0x7f00000000c0)={0x0, 0x7}, 0x3) mmap$auto(0x0, 0x400009, 0xdf, 0x9b72, 0x2, 0x8000) 4.176006853s ago: executing program 5 (id=2987): openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/platform/i8042/serio0/scroll\x00', 0x2062, 0x0) write$auto(r0, &(0x7f00000001c0)='1\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) write$auto(r0, &(0x7f0000000440)='0\x00\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94\xf8F\xbb\xa2\xbb>\xade\x18\xbd\xe2\x1c\x89OO]e[\xbb\xf9\xcd\xc0\xc9\x00\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\xef\xc0\x04z\xd0I>\x8f\x00\xe5\x1c*\xed`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\f};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xacA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xdeL/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(\x95\xdfH\xf4\v\xf3CRnz\xc2\x13<\xf0\v\x1f\x14\xf3\xd0\xf2\xd1L!\x81\xea\x83\xa0\r|%\xbf\x02trg\x9a\xe7)\a\xf4\xaa\x05\xc0\xa0r\xd2\x85\x8dH\xd0>\xca\xfc5\x01\x95O4\xca\x95\x1d\x83\xec\nD\x8e\xfb\xce\xd1w\x15:\xe9\x81/B#\xc6\xa1\xfa-\x1b\x8cr\x92nM\xa1\xbb\xe4pd$\xd7\x1b\v\x82\rd\xd2\xaa\v!\xb1}\x92\x89\x8d\xcd\x1e\xc7N\xeeO\x8dO\xe9\xfc\x91\xa1\xa8=R+\a\xb7R\t\f+\x7f\xd5H\x90G=\x9a\r\xb10\x17n\x1b\xf8\v\x11\v\xbb', 0x98c7) r1 = open(&(0x7f0000000800)='./file1\x00', 0x163ac1, 0x82) r2 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f00000002c0), 0xffffffffffffffff) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) close_range$auto(0x2, 0x8, 0x0) r3 = socket(0x2, 0x80002, 0x73) socket(0xa, 0x1, 0x84) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) select$auto(0xe, 0x0, 0x0, 0x0, 0x0) sysfs$auto(0x2, 0x23, 0x0) r4 = openat$auto_ftrace_set_event_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/tracing/set_event\x00', 0x20201, 0x0) write$auto(r4, 0x0, 0x4) bind$auto(0x3, &(0x7f0000000100)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) shutdown$auto(0x200000003, 0x2) sendmsg$auto_NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="a001ee00", @ANYRES16=r2, @ANYBLOB="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"], 0x1a0}, 0x1, 0x0, 0x0, 0x4040004}, 0x24048000) syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000000300), r3) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) r5 = syz_clone(0x20080100, 0x0, 0x0, 0x0, 0x0, 0x0) wait4$auto(r5, 0x0, 0x81ff, 0x0) 3.20643056s ago: executing program 5 (id=2988): sendmsg$auto_NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="01002bbd7000fcdbdf255a00000008000300", @ANYRES32=0x0, @ANYBLOB='/\v'], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4040004) mmap$auto(0x0, 0x2000a, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) r0 = getpid() sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x20040804}, 0x805) r1 = ioctl$auto_NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$auto_VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000040)={0x1, 0x4}) write$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffffff, 0x0, 0x0) process_vm_readv$auto(r0, &(0x7f00000001c0)={0x0, 0xfff}, 0x3, &(0x7f0000000280)={&(0x7f0000000000)="db391cab23bd75e193270cf88b1cc269c4376d442ebf2a79fe2e0da0a96e1f300c419080317993a17a6b5711cefeea8101a5870508", 0x1}, 0x6, 0x0) process_vm_readv$auto(0x0, 0x0, 0x5, &(0x7f0000000100)={&(0x7f0000000480), 0x64f800000}, 0x83, 0x5) r2 = openat$auto_i2cdev_fops_i2c_dev(0xffffffffffffff9c, &(0x7f0000000200), 0x103001, 0x0) ioctl$auto_I2C_RDWR(r2, 0x707, 0x0) 3.010875527s ago: executing program 6 (id=2989): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000040), r0) sendmsg$auto_OVS_DP_CMD_NEW(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001300)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010026bd7000fcdbdf250100000008000200", @ANYBLOB="080001002e535200090002"], 0x34}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) 2.976202985s ago: executing program 5 (id=2990): r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptyq5\x00', 0x200701, 0x0) r1 = openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bus/usb/037/001\x00', 0x802, 0x0) ioctl$auto_USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000240)={0x23, 0x3, 0x2, 0x2, 0x8, 0x7fb, &(0x7f0000000100)}) ioctl$auto_TIOCGDEV2(r0, 0x5429, 0x0) getsockopt$auto_SO_BPF_EXTENSIONS(0xffffffffffffffff, 0x6, 0x30, &(0x7f0000000080)='],\\-\x00', &(0x7f00000000c0)=0xf3c) 2.897722151s ago: executing program 6 (id=2991): openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x800, 0x0) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/platform/i8042/serio0/scroll\x00', 0x2062, 0x0) openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000340)='/sys/kernel/debug/lru_gen_full\x00', 0x400002, 0x0) write$auto(r0, &(0x7f00000001c0)='1\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) write$auto(r0, &(0x7f0000000440)='0\x00\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94\xf8F\xbb\xa2\xbb>\xade\x18\xbd\xe2\x1c\x89OO]e[\xbb\xf9\xcd\xc0\xc9\x00\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\xef\xc0\x04z\xd0I>\x8f\x00\xe5\x1c*\xed`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\f};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xacA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xdeL/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(\x95\xdfH\xf4\v\xf3CRnz\xc2\x13<\xf0\v\x1f\x14\xf3\xd0\xf2\xd1L!\x81\xea\x83\xa0\r|%\xbf\x02trg\x9a\xe7)\a\xf4\xaa\x05\xc0\xa0r\xd2\x85\x8dH\xd0>\xca\xfc5\x01\x95O4\xca\x95\x1d\x83\xec\nD\x8e\xfb\xce\xd1w\x15:\xe9\x81/B#\xc6\xa1\xfa-\x1b\x8cr\x92nM\xa1\xbb\xe4pd$\xd7\x1b\v\x82\rd\xd2\xaa\v!\xb1}\x92\x89\x8d\xcd\x1e\xc7N\xeeO\x8dO\xe9\xfc\x91\xa1\xa8=R+\a\xb7R\t\f+\x7f\xd5H\x90G=\x9a\r\xb10\x17n\x1b\xf8\v\x11\v\xbb', 0x98c7) r1 = open(&(0x7f0000000800)='./file1\x00', 0x163ac1, 0x82) r2 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f00000002c0), 0xffffffffffffffff) r3 = openat$auto_raw_fops_raw_gadget(0xffffffffffffff9c, &(0x7f0000000140), 0x102, 0x0) ioctl$auto_USB_RAW_IOCTL_INIT(r3, 0x41015500, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) close_range$auto(0x2, 0x8, 0x0) r4 = socket(0x2, 0x80002, 0x73) socket(0xa, 0x1, 0x84) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) select$auto(0xe, 0x0, 0x0, 0x0, 0x0) sysfs$auto(0x10000002, 0x23, 0x0) r5 = openat$auto_ftrace_set_event_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/tracing/set_event\x00', 0x20201, 0x0) write$auto(r5, 0x0, 0x4) bind$auto(0x3, &(0x7f0000000100)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) shutdown$auto(0x200000003, 0x2) sendmsg$auto_NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="a001ee00", @ANYRES16=r2, @ANYBLOB="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"], 0x1a0}, 0x1, 0x0, 0x0, 0x4040004}, 0x24048000) syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000000300), r4) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) r6 = syz_clone(0x20080100, 0x0, 0x0, 0x0, 0x0, 0x0) wait4$auto(r6, 0x0, 0x81ff, 0x0) 2.797036393s ago: executing program 5 (id=2992): adjtimex$auto(0x0) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/platform/vivid.0/video4linux/v4l-touch5/dev_debug\x00', 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual/graphics/fbcon/rotate_all\x00', 0xa001, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r0 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f00000012c0)='/proc/sys/net/smc/smcr_max_links_per_lgr\x00', 0x0, 0x0) read$auto(r0, 0x0, 0x1ff) write$auto(0x3, 0x0, 0xfdef) 2.454575887s ago: executing program 5 (id=2993): r0 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio1\x00', 0x2000, 0x0) ioctl$auto_SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x1a9402, 0x0) sendmsg$auto_ETHTOOL_MSG_CABLE_TEST_TDR_ACT(0xffffffffffffffff, 0x0, 0x800) timer_create$auto(0x9, 0x0, 0x0) read$auto(0x3, 0x0, 0x8080) socket(0xa, 0x1, 0x100) unshare$auto(0x40000080) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000000)='/dev/adsp1\x00', 0x20342, 0x0) 2.341128825s ago: executing program 1 (id=2994): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) close_range$auto(r1, r0, 0x0) select$auto(0x0, &(0x7f0000000140)={[0x3, 0x200, 0x2, 0xdc, 0x0, 0x6, 0x3, 0xffff, 0x3, 0x291, 0x401, 0x7, 0x4be, 0x3, 0x5]}, &(0x7f00000003c0)={[0x0, 0x10000, 0x2, 0x7f, 0xe, 0x5519, 0x1, 0x80000001, 0x8, 0x883, 0x5, 0x0, 0xffffffffffff8000, 0x1, 0xb011272, 0xa75]}, &(0x7f0000000440)={[0x7ff, 0x2fc1, 0x8, 0x0, 0x7fffffff, 0x100000000, 0x6, 0x1000, 0x1, 0x7, 0xf22, 0x1, 0x7fffffffffffffff, 0x5, 0xc, 0x6]}, &(0x7f00000001c0)={0x2, 0x8}) read$auto_fuse_dir_operations_dir(r1, &(0x7f0000000100)=""/11, 0xb) r2 = socket(0x10, 0x0, 0x5) mmap$auto(0x0, 0x20009, 0xdf, 0x12, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/v4l-subdev6\x00', 0x8000, 0x0) ioctl$auto(0x3, 0xc0585605, 0x38) r4 = getsockopt$auto(r2, 0x11c, 0x3, 0x0, 0x0) ioctl$auto(r4, 0x541c, r4) ioctl$auto_KVM_GET_MSRS(r4, 0xc008ae88, &(0x7f0000000040)={0x2, 0x0, [{0x480, 0x400, 0x7}]}) socket(0x2, 0x5, 0x0) pwrite64$auto(0xc8, &(0x7f00000004c0)='\vX\xb5n\x91p\xe6\x1eRN8\x99\x00\rs\x1cJ\x99\x00:c\x14\r>\x94\x1a\xd3\xd3\x1d\xf8\xbebZ\xddL\'\x03\xf1`\x9f\x1e\xf9\xa4\xf8\x15\x02l@\x18*\xc0\xc1\xf2\x14^\x0fo\x84\xfc\x89\v\xea\x1b\x95\xafQ;CL\"\xe4\x97\xa4\xa7\x1d\xa4\x00\x00\x00\x00\x00\x00\xcdr\xfa\xa2@X\xb9_\xdd*\xd1\x14^\xbe\xa2\x96\xcb\xbam\xb8a\xe4T\xb0S\xd1\xc8zA0\xec\x80\x02\xa7\xe9\x11!\x98S\xe0\xa7\xd6z(\xa0\xe8\x13J\x8d\x9e\x1f\x9a\x8e\xa2\x84\xfe\xfa$\xbe\x97+\x04}\xba[\xfa\x12\xf5\xcf\xd0^\xb9\xd4p\x17\xca>D\xbe\x7f\xbe\x8b/y\xe0\x1d.+\x13\x8c\x7f\xcd\x06?}u\x8a\x89x\v\xf9~E\xdb\x0ehk\xd6\x9c\xbb\xc5\x1b>p\xd1g\xc4*\xca\x1e*\xb2\xf4\x15\"7Pj\xbe\x94\xf6\xbe2\x1d\xec\x18+\xc7\x92\xb1\xf3i\x19\xcc8\xb4{Z\x98d6\xae\x9e\x19\xfdy\xa3\x97-\x94\xbb\x02\xa4v\xeevu/9\x9d65x\xec\xe4\xff\xb1\xadL\x10&\x14\xefPZ\xa7\x8e\xecG\xb0P\xee`\x16\x8b\x86\xd9\xea*9\xa7#\xd2]\xa2%u', 0x4e, 0x1) close_range$auto(0x0, 0xfffffffffffff000, 0x2) bpf$auto(0x18, &(0x7f00000002c0)=@raw_tracepoint={0x8, 0xffffffffffffffff, 0xffffffff, 0x800}, 0x8e) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="13ffffee", @ANYRES16=0x0, @ANYBLOB="0300226b"], 0x14}, 0x1, 0x0, 0x0, 0x4004040}, 0x2004c000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r3, 0x0, 0x1f) r5 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r5, &(0x7f0000000200)={0x0, 0x7}, 0x3) mremap$auto(0x110c230000, 0x0, 0xfe, 0x3, 0x8) remap_file_pages$auto(0x8, 0x9, 0x3fff, 0x1000000003, 0x554) socket(0xa, 0x3, 0x3a) sysfs$auto(0x0, 0x6, 0xfffffffffffffff8) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x2, 0x0) bind$auto(0xffffffffffffffff, &(0x7f0000000380)=@ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x8}, 0x0) 2.205190181s ago: executing program 3 (id=2995): r0 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000080)='/proc/iomem\x00', 0x1c9a02, 0x0) pread64$auto(r0, 0x0, 0x100000001, 0x500) mmap$auto(0x0, 0x400006, 0xdf, 0x9b72, 0x2, 0x8000) r1 = socket(0x2b, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x4e22, @remote}, 0x6a) madvise$auto(0x4, 0x7, 0x2) sendmmsg$auto(r1, &(0x7f0000000000)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xfffffffd}, 0x10001}, 0x5, 0x20000000) madvise$auto(0x0, 0xffffffffffff0001, 0x15) ioctl$auto_RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) recvfrom$auto(0x3, 0x0, 0x800000000e, 0x100, 0x0, 0xfffffffffffffffd) fadvise64$auto_POSIX_FADV_NORMAL(0xffffffffffffffff, 0x7, 0xd, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x1, 0x0) setsockopt$auto(0x3, 0x1, 0x21, 0x0, 0x9) write$auto(0x3, 0x0, 0xfffffdef) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, 0x0, 0x44a980, 0x0) epoll_create$auto(0x4) statmount$auto(0x0, &(0x7f0000000180)={0x80000000, 0xfffffffe, 0xa42, 0x2d17, 0x4005, 0x7, 0x3ffde, 0x3ff, 0x3, 0x9, 0x4, 0x206, 0x4, 0x11ffffffffff8, 0xb2, 0x7, 0x6, 0xbcb9, 0x80, 0x8000000000, 0x8000, 0x1, 0x9, 0x202, 0x9, 0xbca7, 0x2, 0x1, 0x0, 0x0, 0x0, [0x2, 0x6, 0x0, 0x4, 0x3, 0x0, 0x7, 0x2, 0x100, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffc01, 0x7fffffff, 0x4, 0x0, 0xb, 0x2000000, 0xffffffffffffffff, 0x2, 0x8, 0xfffffffffffffffd, 0x1, 0x5, 0x3, 0x0, 0x0, 0x0, 0x7fffffff, 0x5, 0x0, 0x20000000000000, 0x0, 0x10000000000001fe, 0x0, 0x2000000000000400, 0x96, 0x1, 0x4000000000000004, 0xe17, 0x0, 0xffffffffffffffff]}, 0x1fc, 0x1) r2 = openat$auto__ctl_fops_dm_ioctl(0xffffffffffffff9c, &(0x7f0000000180), 0x1541, 0x0) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x8000000, 0x40009, 0x3, 0x18, 0xffffffffffffffff, 0x28000) ioctl$auto__ctl_fops_dm_ioctl(r2, 0xfffffffffffffd03, &(0x7f00000001c0)) socket(0x25, 0x1, 0xb86) r3 = openat$auto_snapshot_fops_user(0xffffffffffffff9c, 0x0, 0x94fd6037e77e475, 0x0) ioctl$auto_SNAPSHOT_ALLOC_SWAP_PAGE(r3, 0x80083314, 0x0) openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, 0x0, 0xc0000, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) prctl$auto(0x43, 0x17, 0x0, 0x0, 0x0) prctl$auto(0x43, 0x0, 0x0, 0x0, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) 2.015364471s ago: executing program 1 (id=2996): openat$auto_tun_fops_tun(0xffffffffffffff9c, 0x0, 0x2002, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) move_pages$auto(0x1, 0x2000000000003, 0x0, 0x0, 0x0, 0x8000400000000000) ioctl$auto(0x3, 0x400454ca, 0x38) r0 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security/tomoyo/domain_policy\x00', 0x40802, 0x0) pread64$auto(r0, 0x0, 0x10000000d, 0x5) socketpair$auto(0x1, 0x5, 0x8000000000000000, 0x0) write$auto(0x3, 0x0, 0xfdf3) close_range$auto(0xffffffffffffffff, r0, 0x9) r1 = socket(0xa, 0x3, 0x3c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000080), r1) sendmsg$auto_NL80211_CMD_CRIT_PROTOCOL_STOP(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="dcc2c1e3", @ANYRES16=r3, @ANYBLOB="000f25bd7000fcdbdf25630000000800a00005000000"], 0x1c}}, 0x8880) semctl$auto_IPC_RMID(0x1, 0x7, 0x0, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x14fa02, 0x0) setreuid$auto(0xffffffffffffffff, 0x8) prctl$auto_PR_SET_VMA_ANON_NAME(0x401, 0x0, 0x0, 0x30000001, 0x3) keyctl$auto(0x5, 0xffffffffffffffff, 0x0, 0x0, 0x80000000) mmap$auto(0x0, 0x810004, 0x400000000ffb, 0x8000000008011, 0x3, 0x8000) openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, 0x0, 0x0, 0x0) setresuid$auto(0x0, 0x0, 0x0) r4 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r4, &(0x7f0000000180)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0xc59) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/cgroup.stat\x00', 0x280, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r5, &(0x7f00000003c0)=""/20, 0xfffffcc4) msync$auto(0x1ffff000, 0x18000000000f4ff, 0x400000004) fanotify_mark$auto(0xffffffffffffffff, 0x9, 0x9, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 1.884103978s ago: executing program 6 (id=2997): mmap$auto(0x0, 0x9fa5, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/scsi_mod/parameters/scan\x00', 0x102, 0x0) openat$auto_nvmf_dev_fops_fabrics(0xffffffffffffff9c, 0x0, 0x101202, 0x0) ioctl$auto(0xffffffffffffffff, 0xab07, 0xffffffffffffffff) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) sendmsg$auto_NL80211_CMD_SET_COALESCE(0xffffffffffffffff, 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/devices/platform/dummy_hcd.0/usb1/bDeviceProtocol\x00', 0x12bc00, 0x0) write$auto(r0, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) semctl$auto(0x4, 0x9, 0x13, 0x40000007) set_mempolicy$auto(0x6, &(0x7f0000000080)=0x3, 0x21) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sda1\x00', 0xc6c43, 0x0) r1 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = openat$auto_stat_fops_per_vm_kvm_main(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/kvm/halt_poll_fail_hist\x00', 0xa2500, 0x0) read$auto_stat_fops_per_vm_kvm_main(r2, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="01002dbd0900fedbdf257e"], 0x14}, 0x1, 0x68, 0x0, 0x24000000}, 0xd0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_IPVS_CMD_GET_SERVICE(r4, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f0000000680)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x2004000d}, 0x24048804) mmap$auto(0x0, 0x400008, 0x6, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/tty12\x00', 0x101840, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$auto_ioam6(&(0x7f0000001180), 0xffffffffffffffff) sendmsg$auto_IOAM6_CMD_ADD_NAMESPACE(r6, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f00000011c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r7, @ANYBLOB="010025bd7000ffdbdf25010020000600010004000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4008000) 1.357309452s ago: executing program 5 (id=2998): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xc, 0x800008000) r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/oom_adj\x00', 0x300, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bpf$auto(0x0, &(0x7f0000000780)=@link_update={0xa, @new_map_fd=0x5, 0x4007, @old_prog_fd=0x13b}, 0xa3) mmap$auto(0x0, 0x2020009, 0x2, 0xf8, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x20008, 0xfffffffffffffffe, 0x12, 0x401, 0x8000) read$auto(0xffffffffffffffff, 0x0, 0x20) writev$auto(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x7}, 0x3) close_range$auto(0x2, 0x8, 0x0) socket(0xa, 0x80002, 0x73) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0) preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xfffffffd}, 0x3, 0x8, 0xe) lseek$auto(0x3, 0x0, 0x1) close_range$auto(0x0, 0xfffffffffffff000, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) munmap$auto(0x8000, 0xffffffff) r2 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000980), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'dummy0\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_CABLE_TEST_ACT(r1, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f0000000a40)={0x20, r2, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@ETHTOOL_A_CABLE_TEST_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}}, 0x40000) read$auto(r0, 0x0, 0x1f40) acct$auto(&(0x7f0000000080)='/dev/ptyaf\x00') 1.244594297s ago: executing program 3 (id=2999): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) ioctl$auto_KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) r0 = socket(0x2, 0x5, 0x0) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r1, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) socket(0xa, 0x3, 0x3a) sysfs$auto(0x0, 0x6, 0xfffffffffffffff8) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x2, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x14f602, 0x0) sendmmsg$auto(r0, &(0x7f0000000140)={{&(0x7f0000000040), 0xfff, &(0x7f00000000c0)={0x0, 0x1fed0}, 0x7, 0x0, 0x5, 0xb}, 0xfff}, 0x8, 0x311) 190.153012ms ago: executing program 3 (id=3000): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000480)='/sys/devices/virtual/net/erspan0/gro_flush_timeout\x00', 0x100b42, 0x0) r1 = setfsuid$auto(0xee00) r2 = setfsuid$auto(0xee01) setresuid$auto(r1, r2, 0x0) sendfile$auto(r0, r0, 0x0, 0x3) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) close_range$auto(0x2, 0x8, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x5e668603025aaaf3}, 0x40800) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r4, &(0x7f0000000000)={0x0, 0x2b, &(0x7f0000000240)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\b', @ANYRES64=0x0, @ANYBLOB="1b0026bd7000fddbdf2503000000040008000ffe03800c010a"], 0x28}, 0x1, 0x0, 0x0, 0x4004040}, 0xc800) sendmsg$auto_BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x300, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4c894}, 0x4) r5 = syz_genetlink_get_family_id$auto_nlbl_mgmt(&(0x7f0000000140), r3) r6 = gettid() getpriority$auto_PRIO_PGRP(0x1, r6) sendmsg$auto_NLBL_MGMT_C_LISTALL(r3, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0800040000feffff06000b0006000000080002000700000008000400d5a00000080000000400000008000300018000"/62], 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x4000800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB=' \x00\''], 0x1ac}, 0x1, 0x0, 0x0, 0x4008001}, 0x40000) r7 = socket(0x2, 0x1, 0x0) openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$auto_ncsi(&(0x7f0000000440), r8) sendmsg$auto_NCSI_CMD_SEND_CMD(r7, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, r9, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@NCSI_ATTR_CHANNEL_ID={0x8, 0x4, 0x7}, @NCSI_ATTR_MULTI_FLAG={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x45268f4ea19292c3}, 0x4000) r10 = syz_genetlink_get_family_id$auto_smc_gen_netlink(&(0x7f0000001f40), 0xffffffffffffffff) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$auto_nfsd(&(0x7f0000002f00), 0xffffffffffffffff) sendmsg$auto_NFSD_CMD_LISTENER_SET(r11, &(0x7f0000005380)={0x0, 0x0, &(0x7f0000005340)={&(0x7f0000000000)={0x38, r12, 0x1, 0x870bd2b, 0x25dfdbfc, {}, [@NFSD_A_SERVER_SOCK_ADDR={0x24, 0x1, 0x0, 0x1, [@NFSD_A_SOCK_TRANSPORT_NAME={0x19, 0x2, '/dev/cpu_dma_latency\x00'}, @NFSD_A_SOCK_ADDR={0x4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xc000}, 0x20000000) sendmsg$auto_SMC_NETLINK_DISABLE_HS_LIMITATION(r8, &(0x7f0000002380)={0x0, 0x0, &(0x7f0000002340)={&(0x7f0000002300)={0x14, r10, 0x1, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x2000000}, 0x80) listen$auto(0x3, 0x81) ioctl$auto(0x3, 0x894b, 0x38) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x8002, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x9}, 0x3, 0x0) 0s ago: executing program 3 (id=3001): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) ioctl$auto_KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, 0x0) r0 = socket(0x2, 0x5, 0x0) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r1, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) socket(0xa, 0x3, 0x3a) sysfs$auto(0x0, 0x6, 0xfffffffffffffff8) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x2, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x14f602, 0x0) sendmmsg$auto(r0, &(0x7f0000000140)={{&(0x7f0000000040), 0xfff, &(0x7f00000000c0)={0x0, 0x1feff}, 0x7, 0x0, 0x5, 0xb}, 0xfff}, 0x8, 0x311) (fail_nth: 7) kernel console output (not intermixed with test programs): 23065][T18457] ? __pfx_ksys_write+0x10/0x10 [ 793.223089][T18457] __x64_sys_socket+0x72/0xb0 [ 793.223102][T18457] ? lockdep_hardirqs_on+0x7c/0x110 [ 793.223123][T18457] do_syscall_64+0xcd/0xf80 [ 793.223145][T18457] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 793.223160][T18457] RIP: 0033:0x7f929ed8f7c9 [ 793.223174][T18457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 793.223188][T18457] RSP: 002b:00007f929fb73038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 793.223203][T18457] RAX: ffffffffffffffda RBX: 00007f929efe6090 RCX: 00007f929ed8f7c9 [ 793.223213][T18457] RDX: 0000000000000100 RSI: 0000000000000801 RDI: 0000000000000002 [ 793.223222][T18457] RBP: 00007f929ee13f91 R08: 0000000000000000 R09: 0000000000000000 [ 793.223232][T18457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 793.223241][T18457] R13: 00007f929efe6128 R14: 00007f929efe6090 R15: 00007ffdcb2ea728 [ 793.223262][T18457] [ 793.223284][T18457] socket: no more sockets [ 793.530263][T18462] FAULT_INJECTION: forcing a failure. [ 793.530263][T18462] name failslab, interval 1, probability 0, space 0, times 0 [ 793.624972][T18462] CPU: 1 UID: 0 PID: 18462 Comm: syz.5.2730 Tainted: G U L syzkaller #0 PREEMPT(full) [ 793.625021][T18462] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 793.625032][T18462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 793.625048][T18462] Call Trace: [ 793.625058][T18462] [ 793.625070][T18462] dump_stack_lvl+0x16c/0x1f0 [ 793.625111][T18462] should_fail_ex+0x512/0x640 [ 793.625143][T18462] should_failslab+0xc2/0x120 [ 793.625188][T18462] kmem_cache_alloc_node_noprof+0x86/0x800 [ 793.625224][T18462] ? __alloc_skb+0x156/0x410 [ 793.625264][T18462] ? __alloc_skb+0x156/0x410 [ 793.625293][T18462] __alloc_skb+0x156/0x410 [ 793.625322][T18462] ? __alloc_skb+0x35d/0x410 [ 793.625352][T18462] ? __pfx___alloc_skb+0x10/0x10 [ 793.625381][T18462] ? sctp_bind_addrs_to_raw+0x2c9/0x3e0 [ 793.625435][T18462] ? __lock_acquire+0x436/0x2890 [ 793.625470][T18462] _sctp_make_chunk+0x51/0x270 [ 793.625510][T18462] sctp_make_control+0x2f/0x2d0 [ 793.625549][T18462] sctp_make_init+0x6f0/0xdc0 [ 793.625598][T18462] ? __pfx_sctp_make_init+0x10/0x10 [ 793.625637][T18462] ? kernel_text_address+0x8d/0x100 [ 793.625671][T18462] ? unwind_get_return_address+0x59/0xa0 [ 793.625709][T18462] ? arch_stack_walk+0xa6/0x100 [ 793.625745][T18462] ? sctp_sm_lookup_event+0x15b/0x570 [ 793.625783][T18462] ? __pfx_sctp_sm_lookup_event+0x10/0x10 [ 793.625825][T18462] sctp_sf_do_prm_asoc+0xbf/0x360 [ 793.625856][T18462] ? __pfx_sctp_pname+0x10/0x10 [ 793.625892][T18462] sctp_do_sm+0x181/0x5e00 [ 793.625935][T18462] ? kasan_save_stack+0x42/0x60 [ 793.625967][T18462] ? kasan_save_stack+0x33/0x60 [ 793.625998][T18462] ? kasan_save_track+0x14/0x30 [ 793.626031][T18462] ? __pfx_sctp_do_sm+0x10/0x10 [ 793.626060][T18462] ? sctp_sendmsg+0xe99/0x1e20 [ 793.626087][T18462] ? ____sys_sendmsg+0x973/0xc30 [ 793.626125][T18462] ? ___sys_sendmsg+0x134/0x1d0 [ 793.626156][T18462] ? __sys_sendmmsg+0x200/0x420 [ 793.626187][T18462] ? __x64_sys_sendmmsg+0x9c/0x100 [ 793.626217][T18462] ? do_syscall_64+0xcd/0xf80 [ 793.626285][T18462] ? sk_leave_memory_pressure+0xdd/0x130 [ 793.626324][T18462] ? __sk_mem_raise_allocated+0x77d/0x14f0 [ 793.626361][T18462] sctp_primitive_ASSOCIATE+0x9c/0xd0 [ 793.626395][T18462] sctp_sendmsg_to_asoc+0xa4a/0x1c50 [ 793.626446][T18462] ? sctp_assoc_set_primary+0x177/0x300 [ 793.626489][T18462] ? sctp_assoc_add_peer+0x252/0x1540 [ 793.626522][T18462] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 793.626563][T18462] ? sctp_connect_new_asoc+0x41e/0x770 [ 793.626594][T18462] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 793.626631][T18462] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 793.626672][T18462] sctp_sendmsg+0xe99/0x1e20 [ 793.626709][T18462] ? __pfx_sctp_sendmsg+0x10/0x10 [ 793.626735][T18462] ? __pfx___might_resched+0x10/0x10 [ 793.626769][T18462] ? __lock_acquire+0x436/0x2890 [ 793.626798][T18462] ? aa_sk_perm+0x2f2/0xae0 [ 793.626831][T18462] ? __pfx_aa_sk_perm+0x10/0x10 [ 793.626870][T18462] ? __pfx_sctp_sendmsg+0x10/0x10 [ 793.626899][T18462] inet_sendmsg+0x11c/0x140 [ 793.626931][T18462] ____sys_sendmsg+0x973/0xc30 [ 793.626972][T18462] ? __pfx_____sys_sendmsg+0x10/0x10 [ 793.627016][T18462] ? __pfx___schedule+0x10/0x10 [ 793.627056][T18462] ___sys_sendmsg+0x134/0x1d0 [ 793.627089][T18462] ? __pfx____sys_sendmsg+0x10/0x10 [ 793.627137][T18462] ? find_held_lock+0x2b/0x80 [ 793.627189][T18462] __sys_sendmmsg+0x200/0x420 [ 793.627225][T18462] ? __pfx___sys_sendmmsg+0x10/0x10 [ 793.627267][T18462] ? __pfx_do_futex+0x10/0x10 [ 793.627310][T18462] ? __x64_sys_openat+0x174/0x210 [ 793.627342][T18462] ? xfd_validate_state+0x61/0x180 [ 793.627373][T18462] __x64_sys_sendmmsg+0x9c/0x100 [ 793.627405][T18462] ? lockdep_hardirqs_on+0x7c/0x110 [ 793.627449][T18462] do_syscall_64+0xcd/0xf80 [ 793.627489][T18462] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 793.627517][T18462] RIP: 0033:0x7f2ac938f7c9 [ 793.627539][T18462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 793.627564][T18462] RSP: 002b:00007f2aca29b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 793.627590][T18462] RAX: ffffffffffffffda RBX: 00007f2ac95e5fa0 RCX: 00007f2ac938f7c9 [ 793.627608][T18462] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000003 [ 793.627625][T18462] RBP: 00007f2ac9413f91 R08: 0000000000000000 R09: 0000000000000000 [ 793.627641][T18462] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 793.627658][T18462] R13: 00007f2ac95e6038 R14: 00007f2ac95e5fa0 R15: 00007ffd59b11ce8 [ 793.627693][T18462] [ 794.146055][ T5839] Bluetooth: hci2: command 0x0c1a tx timeout [ 794.153319][ T5839] Bluetooth: hci4: command 0x0c1a tx timeout [ 794.159558][ T5839] Bluetooth: hci5: command 0x0c1a tx timeout [ 794.165744][ T5839] Bluetooth: hci1: command 0x040f tx timeout [ 794.192625][T17770] Bluetooth: hci3: command 0x0c1a tx timeout [ 794.662169][T18467] FAULT_INJECTION: forcing a failure. [ 794.662169][T18467] name failslab, interval 1, probability 0, space 0, times 0 [ 794.685417][T18467] CPU: 0 UID: 0 PID: 18467 Comm: syz.3.2731 Tainted: G U L syzkaller #0 PREEMPT(full) [ 794.685470][T18467] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 794.685483][T18467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 794.685501][T18467] Call Trace: [ 794.685511][T18467] [ 794.685523][T18467] dump_stack_lvl+0x16c/0x1f0 [ 794.685573][T18467] should_fail_ex+0x512/0x640 [ 794.685612][T18467] should_failslab+0xc2/0x120 [ 794.685658][T18467] kmem_cache_alloc_node_noprof+0x86/0x800 [ 794.685694][T18467] ? __alloc_skb+0x156/0x410 [ 794.685733][T18467] ? __alloc_skb+0x156/0x410 [ 794.685762][T18467] __alloc_skb+0x156/0x410 [ 794.685791][T18467] ? __alloc_skb+0x35d/0x410 [ 794.685822][T18467] ? __pfx___alloc_skb+0x10/0x10 [ 794.685860][T18467] ? __lock_acquire+0x436/0x2890 [ 794.685893][T18467] sctp_packet_transmit+0x1ca/0x30b0 [ 794.685941][T18467] ? find_held_lock+0x2b/0x80 [ 794.685976][T18467] ? sctp_outq_flush+0xb4e/0x33a0 [ 794.686011][T18467] sctp_outq_flush+0xb68/0x33a0 [ 794.686052][T18467] ? do_ulpq_tail_event+0x10c/0x170 [ 794.686089][T18467] ? __pfx_do_ulpq_tail_event+0x10/0x10 [ 794.686126][T18467] ? __pfx_sctp_outq_flush+0x10/0x10 [ 794.686163][T18467] ? __pfx_sctp_transport_reset_hb_timer+0x10/0x10 [ 794.686200][T18467] ? sctp_outq_tail+0x671/0xa80 [ 794.686230][T18467] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 794.686274][T18467] sctp_do_sm+0xe7c/0x5e00 [ 794.686317][T18467] ? __pfx_sctp_do_sm+0x10/0x10 [ 794.686404][T18467] ? ktime_get+0x200/0x310 [ 794.686431][T18467] ? lockdep_hardirqs_on+0x7c/0x110 [ 794.686477][T18467] sctp_assoc_bh_rcv+0x392/0x6f0 [ 794.686516][T18467] sctp_inq_push+0x1db/0x270 [ 794.686548][T18467] sctp_backlog_rcv+0x169/0x590 [ 794.686585][T18467] ? __pfx_sctp_backlog_rcv+0x10/0x10 [ 794.686619][T18467] __release_sock+0x3a9/0x450 [ 794.686655][T18467] ? lockdep_hardirqs_on+0x7c/0x110 [ 794.686703][T18467] release_sock+0x5a/0x220 [ 794.686738][T18467] sctp_wait_for_connect+0x1c3/0x5e0 [ 794.686788][T18467] ? __pfx_sctp_wait_for_connect+0x10/0x10 [ 794.686830][T18467] ? skb_set_owner_w+0x37d/0x770 [ 794.686861][T18467] ? __pfx_autoremove_wake_function+0x10/0x10 [ 794.686904][T18467] ? sctp_datamsg_put+0x58/0x5f0 [ 794.686940][T18467] ? sctp_primitive_SEND+0x9f/0xd0 [ 794.686977][T18467] sctp_sendmsg_to_asoc+0x1885/0x1c50 [ 794.687022][T18467] ? sctp_assoc_set_primary+0x101/0x300 [ 794.687068][T18467] ? sctp_assoc_add_peer+0x252/0x1540 [ 794.687104][T18467] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 794.687146][T18467] ? sctp_connect_new_asoc+0x41e/0x770 [ 794.687179][T18467] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 794.687212][T18467] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 794.687260][T18467] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 794.687307][T18467] sctp_sendmsg+0xe99/0x1e20 [ 794.687361][T18467] ? __pfx_sctp_sendmsg+0x10/0x10 [ 794.687390][T18467] ? __pfx___might_resched+0x10/0x10 [ 794.687430][T18467] ? __lock_acquire+0x436/0x2890 [ 794.687463][T18467] ? aa_sk_perm+0x2f2/0xae0 [ 794.687502][T18467] ? __pfx_aa_sk_perm+0x10/0x10 [ 794.687545][T18467] ? __pfx_sctp_sendmsg+0x10/0x10 [ 794.687578][T18467] inet_sendmsg+0x11c/0x140 [ 794.687612][T18467] ____sys_sendmsg+0x973/0xc30 [ 794.687658][T18467] ? __pfx_____sys_sendmsg+0x10/0x10 [ 794.687705][T18467] ? find_held_lock+0x2b/0x80 [ 794.687741][T18467] ? futex_unqueue+0x133/0x2c0 [ 794.687778][T18467] ___sys_sendmsg+0x134/0x1d0 [ 794.687816][T18467] ? __pfx____sys_sendmsg+0x10/0x10 [ 794.687851][T18467] ? __pfx___futex_wait+0x10/0x10 [ 794.687905][T18467] ? find_held_lock+0x2b/0x80 [ 794.687964][T18467] __sys_sendmmsg+0x200/0x420 [ 794.688010][T18467] ? __pfx___sys_sendmmsg+0x10/0x10 [ 794.688056][T18467] ? __pfx_do_futex+0x10/0x10 [ 794.688106][T18467] ? __x64_sys_openat+0x174/0x210 [ 794.688140][T18467] ? xfd_validate_state+0x61/0x180 [ 794.688175][T18467] __x64_sys_sendmmsg+0x9c/0x100 [ 794.688211][T18467] ? lockdep_hardirqs_on+0x7c/0x110 [ 794.688252][T18467] do_syscall_64+0xcd/0xf80 [ 794.688295][T18467] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 794.688330][T18467] RIP: 0033:0x7f929ed8f7c9 [ 794.688356][T18467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 794.688384][T18467] RSP: 002b:00007f929fb94038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 794.688414][T18467] RAX: ffffffffffffffda RBX: 00007f929efe5fa0 RCX: 00007f929ed8f7c9 [ 794.688435][T18467] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000003 [ 794.688454][T18467] RBP: 00007f929ee13f91 R08: 0000000000000000 R09: 0000000000000000 [ 794.688473][T18467] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 794.688492][T18467] R13: 00007f929efe6038 R14: 00007f929efe5fa0 R15: 00007ffdcb2ea728 [ 794.688533][T18467] [ 796.408748][T18473] Setting dangerous option i915.mitigations - tainting kernel [ 796.425685][T18473] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 797.249750][T18492] Setting dangerous option i915.mitigations - tainting kernel [ 797.257443][T18492] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 801.670588][T18570] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2753'. [ 801.887886][T18573] netlink: 12 bytes leftover after parsing attributes in process `syz.5.2754'. [ 802.012606][T18556] Setting dangerous option i915.mitigations - tainting kernel [ 802.041732][T18556] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 802.373410][T18579] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2756'. [ 803.802349][T18586] netlink: 16 bytes leftover after parsing attributes in process `syz.5.2755'. [ 803.868501][T18594] openvswitch: netlink: IPv4 tunnel dst address is zero [ 803.977421][T18592] zswap: compressor not available [ 804.224351][ T30] audit: type=1800 audit(73433.045:115): pid=18599 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.2761" name="lu_gp_id" dev="configfs" ino=67172 res=0 errno=0 [ 805.427083][T18609] FAULT_INJECTION: forcing a failure. [ 805.427083][T18609] name failslab, interval 1, probability 0, space 0, times 0 [ 805.457276][T18609] CPU: 1 UID: 0 PID: 18609 Comm: syz.5.2764 Tainted: G U L syzkaller #0 PREEMPT(full) [ 805.457327][T18609] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 805.457339][T18609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 805.457357][T18609] Call Trace: [ 805.457366][T18609] [ 805.457377][T18609] dump_stack_lvl+0x16c/0x1f0 [ 805.457424][T18609] should_fail_ex+0x512/0x640 [ 805.457462][T18609] should_failslab+0xc2/0x120 [ 805.457505][T18609] kmem_cache_alloc_node_noprof+0x86/0x800 [ 805.457540][T18609] ? __alloc_skb+0x156/0x410 [ 805.457579][T18609] ? __alloc_skb+0x156/0x410 [ 805.457607][T18609] __alloc_skb+0x156/0x410 [ 805.457635][T18609] ? __alloc_skb+0x35d/0x410 [ 805.457665][T18609] ? __pfx___alloc_skb+0x10/0x10 [ 805.457701][T18609] ? __asan_memset+0x23/0x50 [ 805.457739][T18609] sctp_ulpevent_make_authkey+0x35/0x830 [ 805.457776][T18609] sctp_sf_do_5_2_4_dupcook+0x21c6/0x2ed0 [ 805.457818][T18609] ? __pfx_sctp_sf_do_5_2_4_dupcook+0x10/0x10 [ 805.457850][T18609] ? sctp_sm_lookup_event+0x15b/0x570 [ 805.457887][T18609] ? __pfx_sctp_sm_lookup_event+0x10/0x10 [ 805.457924][T18609] ? sctp_inq_pop+0x5fd/0xfa0 [ 805.457950][T18609] ? sctp_assoc_bh_rcv+0x117/0x6f0 [ 805.457974][T18609] ? sctp_inq_push+0x1db/0x270 [ 805.458000][T18609] ? sctp_backlog_rcv+0x169/0x590 [ 805.458041][T18609] ? __release_sock+0x3a9/0x450 [ 805.458074][T18609] ? __pfx_sctp_cname+0x10/0x10 [ 805.458104][T18609] sctp_do_sm+0x181/0x5e00 [ 805.458140][T18609] ? __pfx_sctp_do_sm+0x10/0x10 [ 805.458200][T18609] ? ktime_get+0x200/0x310 [ 805.458220][T18609] ? lockdep_hardirqs_on+0x7c/0x110 [ 805.458259][T18609] sctp_assoc_bh_rcv+0x392/0x6f0 [ 805.458291][T18609] sctp_inq_push+0x1db/0x270 [ 805.458317][T18609] sctp_backlog_rcv+0x169/0x590 [ 805.458348][T18609] ? __pfx_sctp_backlog_rcv+0x10/0x10 [ 805.458376][T18609] __release_sock+0x3a9/0x450 [ 805.458403][T18609] ? lockdep_hardirqs_on+0x7c/0x110 [ 805.458439][T18609] release_sock+0x5a/0x220 [ 805.458465][T18609] sctp_wait_for_connect+0x1c3/0x5e0 [ 805.458503][T18609] ? __pfx_sctp_wait_for_connect+0x10/0x10 [ 805.458536][T18609] ? skb_set_owner_w+0x37d/0x770 [ 805.458559][T18609] ? __pfx_autoremove_wake_function+0x10/0x10 [ 805.458596][T18609] ? sctp_datamsg_put+0x58/0x5f0 [ 805.458624][T18609] ? sctp_primitive_SEND+0x9f/0xd0 [ 805.458652][T18609] sctp_sendmsg_to_asoc+0x1885/0x1c50 [ 805.458686][T18609] ? sctp_assoc_set_primary+0x101/0x300 [ 805.458721][T18609] ? sctp_assoc_add_peer+0x252/0x1540 [ 805.458749][T18609] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 805.458782][T18609] ? sctp_connect_new_asoc+0x41e/0x770 [ 805.458808][T18609] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 805.458834][T18609] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 805.458871][T18609] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 805.458918][T18609] sctp_sendmsg+0xe99/0x1e20 [ 805.458960][T18609] ? __pfx_sctp_sendmsg+0x10/0x10 [ 805.458989][T18609] ? __pfx___might_resched+0x10/0x10 [ 805.459038][T18609] ? __lock_acquire+0x436/0x2890 [ 805.459066][T18609] ? aa_sk_perm+0x2f2/0xae0 [ 805.459103][T18609] ? __pfx_aa_sk_perm+0x10/0x10 [ 805.459141][T18609] ? __pfx_sctp_sendmsg+0x10/0x10 [ 805.459166][T18609] inet_sendmsg+0x11c/0x140 [ 805.459200][T18609] ____sys_sendmsg+0x973/0xc30 [ 805.459251][T18609] ? __pfx_____sys_sendmsg+0x10/0x10 [ 805.459305][T18609] ? find_held_lock+0x2b/0x80 [ 805.459343][T18609] ? futex_unqueue+0x133/0x2c0 [ 805.459383][T18609] ___sys_sendmsg+0x134/0x1d0 [ 805.459426][T18609] ? __pfx____sys_sendmsg+0x10/0x10 [ 805.459468][T18609] ? __pfx___futex_wait+0x10/0x10 [ 805.459527][T18609] ? find_held_lock+0x2b/0x80 [ 805.459585][T18609] __sys_sendmmsg+0x200/0x420 [ 805.459631][T18609] ? __pfx___sys_sendmmsg+0x10/0x10 [ 805.459683][T18609] ? __pfx_do_futex+0x10/0x10 [ 805.459736][T18609] ? __x64_sys_openat+0x174/0x210 [ 805.459776][T18609] ? xfd_validate_state+0x61/0x180 [ 805.459814][T18609] __x64_sys_sendmmsg+0x9c/0x100 [ 805.459856][T18609] ? lockdep_hardirqs_on+0x7c/0x110 [ 805.459897][T18609] do_syscall_64+0xcd/0xf80 [ 805.459941][T18609] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 805.459973][T18609] RIP: 0033:0x7f2ac938f7c9 [ 805.460001][T18609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 805.460047][T18609] RSP: 002b:00007f2aca29b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 805.460079][T18609] RAX: ffffffffffffffda RBX: 00007f2ac95e5fa0 RCX: 00007f2ac938f7c9 [ 805.460102][T18609] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000003 [ 805.460124][T18609] RBP: 00007f2ac9413f91 R08: 0000000000000000 R09: 0000000000000000 [ 805.460145][T18609] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 805.460164][T18609] R13: 00007f2ac95e6038 R14: 00007f2ac95e5fa0 R15: 00007ffd59b11ce8 [ 805.460205][T18609] [ 808.655878][T18639] Setting dangerous option i915.mitigations - tainting kernel [ 808.711263][T18639] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 809.253531][T18650] FAULT_INJECTION: forcing a failure. [ 809.253531][T18650] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 809.276275][T18650] CPU: 1 UID: 0 PID: 18650 Comm: syz.5.2772 Tainted: G U L syzkaller #0 PREEMPT(full) [ 809.276325][T18650] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 809.276337][T18650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 809.276354][T18650] Call Trace: [ 809.276363][T18650] [ 809.276375][T18650] dump_stack_lvl+0x16c/0x1f0 [ 809.276417][T18650] should_fail_ex+0x512/0x640 [ 809.276451][T18650] _copy_to_user+0x32/0xd0 [ 809.276482][T18650] simple_read_from_buffer+0xcb/0x170 [ 809.276531][T18650] proc_fail_nth_read+0x197/0x240 [ 809.276573][T18650] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 809.276617][T18650] ? rw_verify_area+0xcf/0x6c0 [ 809.276651][T18650] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 809.276694][T18650] vfs_read+0x1e4/0xcf0 [ 809.276731][T18650] ? __pfx___mutex_lock+0x10/0x10 [ 809.276775][T18650] ? __pfx_vfs_read+0x10/0x10 [ 809.276829][T18650] ? __fget_files+0x20e/0x3c0 [ 809.276877][T18650] ksys_read+0x12a/0x250 [ 809.276913][T18650] ? __pfx_ksys_read+0x10/0x10 [ 809.276960][T18650] do_syscall_64+0xcd/0xf80 [ 809.277002][T18650] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 809.277032][T18650] RIP: 0033:0x7f2ac938e1dc [ 809.277054][T18650] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 809.277081][T18650] RSP: 002b:00007f2aca29b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 809.277107][T18650] RAX: ffffffffffffffda RBX: 00007f2ac95e5fa0 RCX: 00007f2ac938e1dc [ 809.277127][T18650] RDX: 000000000000000f RSI: 00007f2aca29b0a0 RDI: 0000000000000004 [ 809.277143][T18650] RBP: 00007f2aca29b090 R08: 0000000000000000 R09: 0000000000000000 [ 809.277159][T18650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 809.277176][T18650] R13: 00007f2ac95e6038 R14: 00007f2ac95e5fa0 R15: 00007ffd59b11ce8 [ 809.277215][T18650] [ 810.107116][T18660] netlink: 16 bytes leftover after parsing attributes in process `syz.5.2775'. [ 810.169249][ T5151] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 810.181751][ T5151] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 810.191591][ T5151] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 810.204927][ T5151] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 810.214675][ T5151] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 811.060680][T18665] chnl_net:caif_netlink_parms(): no params data found [ 811.375589][T18665] bridge0: port 1(bridge_slave_0) entered blocking state [ 811.393029][T18665] bridge0: port 1(bridge_slave_0) entered disabled state [ 811.412578][T18665] bridge_slave_0: entered allmulticast mode [ 811.440837][T18665] bridge_slave_0: entered promiscuous mode [ 811.471530][T18665] bridge0: port 2(bridge_slave_1) entered blocking state [ 811.515566][T18665] bridge0: port 2(bridge_slave_1) entered disabled state [ 811.547181][T18665] bridge_slave_1: entered allmulticast mode [ 811.575610][T18665] bridge_slave_1: entered promiscuous mode [ 811.835113][T18665] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 811.880793][T18665] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 811.915347][T18688] Setting dangerous option i915.mitigations - tainting kernel [ 811.943983][T18688] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 812.055396][T18665] team0: Port device team_slave_0 added [ 812.084480][T18665] team0: Port device team_slave_1 added [ 812.182277][T18665] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 812.191776][T18665] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 812.233300][T18665] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 812.257205][T18665] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 812.264201][T18665] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 812.290706][ T5151] Bluetooth: hci6: command tx timeout [ 812.292512][T18665] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 812.403342][T18665] hsr_slave_0: entered promiscuous mode [ 812.410200][T18665] hsr_slave_1: entered promiscuous mode [ 812.426850][T18665] debugfs: 'hsr0' already exists in 'hsr' [ 812.432626][T18665] Cannot create hsr debugfs directory [ 813.033871][T18665] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 813.227139][T18665] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 813.284832][T18665] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 813.364372][T18665] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 813.374471][T18706] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2785'. [ 813.527097][T18714] netlink: 16 bytes leftover after parsing attributes in process `syz.3.2786'. [ 813.800153][T18665] 8021q: adding VLAN 0 to HW filter on device bond0 [ 813.885242][T18665] 8021q: adding VLAN 0 to HW filter on device team0 [ 813.898963][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 813.899034][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 813.941913][T18549] bridge0: port 1(bridge_slave_0) entered blocking state [ 813.949119][T18549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 813.995156][T18549] bridge0: port 2(bridge_slave_1) entered blocking state [ 814.002687][T18549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 814.232052][T18725] FAULT_INJECTION: forcing a failure. [ 814.232052][T18725] name failslab, interval 1, probability 0, space 0, times 0 [ 814.294356][T18725] CPU: 1 UID: 0 PID: 18725 Comm: syz.1.2788 Tainted: G U L syzkaller #0 PREEMPT(full) [ 814.294407][T18725] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 814.294419][T18725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 814.294436][T18725] Call Trace: [ 814.294446][T18725] [ 814.294457][T18725] dump_stack_lvl+0x16c/0x1f0 [ 814.294501][T18725] should_fail_ex+0x512/0x640 [ 814.294537][T18725] should_failslab+0xc2/0x120 [ 814.294579][T18725] kmem_cache_alloc_noprof+0x83/0x770 [ 814.294610][T18725] ? __sk_mem_raise_allocated+0x77d/0x14f0 [ 814.294646][T18725] ? skb_clone+0x190/0x3f0 [ 814.294683][T18725] ? skb_clone+0x190/0x3f0 [ 814.294711][T18725] ? __sk_mem_schedule+0xd0/0x100 [ 814.294740][T18725] skb_clone+0x190/0x3f0 [ 814.294773][T18725] sctp_ulpevent_make_rcvmsg+0x2fa/0xab0 [ 814.294805][T18725] ? __pfx_sctp_ulpq_tail_data+0x10/0x10 [ 814.294834][T18725] sctp_ulpq_tail_data+0xc2/0xf70 [ 814.294862][T18725] ? sctp_validate_data+0xc7/0x280 [ 814.294889][T18725] ? sctp_tsnmap_check+0x145/0x180 [ 814.294920][T18725] ? __pfx_sctp_ulpq_tail_data+0x10/0x10 [ 814.294976][T18725] ? sctp_sf_eat_data_6_2+0x574/0xba0 [ 814.295031][T18725] ? __pfx_sctp_ulpq_tail_data+0x10/0x10 [ 814.295066][T18725] sctp_do_sm+0x3b2f/0x5e00 [ 814.295113][T18725] ? __pfx_sctp_do_sm+0x10/0x10 [ 814.295199][T18725] ? ktime_get+0x200/0x310 [ 814.295228][T18725] ? lockdep_hardirqs_on+0x7c/0x110 [ 814.295277][T18725] sctp_assoc_bh_rcv+0x392/0x6f0 [ 814.295318][T18725] sctp_inq_push+0x1db/0x270 [ 814.295351][T18725] sctp_backlog_rcv+0x169/0x590 [ 814.295394][T18725] ? __pfx_sctp_backlog_rcv+0x10/0x10 [ 814.295429][T18725] __release_sock+0x3a9/0x450 [ 814.295466][T18725] ? lockdep_hardirqs_on+0x7c/0x110 [ 814.295513][T18725] release_sock+0x5a/0x220 [ 814.295550][T18725] sctp_wait_for_connect+0x1c3/0x5e0 [ 814.295599][T18725] ? __pfx_sctp_wait_for_connect+0x10/0x10 [ 814.295643][T18725] ? skb_set_owner_w+0x37d/0x770 [ 814.295673][T18725] ? __pfx_autoremove_wake_function+0x10/0x10 [ 814.295717][T18725] ? sctp_datamsg_put+0x58/0x5f0 [ 814.295752][T18725] ? sctp_primitive_SEND+0x9f/0xd0 [ 814.295789][T18725] sctp_sendmsg_to_asoc+0x1885/0x1c50 [ 814.295835][T18725] ? sctp_assoc_set_primary+0x101/0x300 [ 814.295881][T18725] ? sctp_assoc_add_peer+0x252/0x1540 [ 814.295917][T18725] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 814.295952][T18725] ? sctp_connect_new_asoc+0x41e/0x770 [ 814.295982][T18725] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 814.296014][T18725] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 814.296063][T18725] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 814.296108][T18725] sctp_sendmsg+0xe99/0x1e20 [ 814.296158][T18725] ? __pfx_sctp_sendmsg+0x10/0x10 [ 814.296196][T18725] ? __pfx___might_resched+0x10/0x10 [ 814.296236][T18725] ? __lock_acquire+0x436/0x2890 [ 814.296270][T18725] ? aa_sk_perm+0x2f2/0xae0 [ 814.296309][T18725] ? __pfx_aa_sk_perm+0x10/0x10 [ 814.296349][T18725] ? __pfx_sctp_sendmsg+0x10/0x10 [ 814.296379][T18725] inet_sendmsg+0x11c/0x140 [ 814.296412][T18725] ____sys_sendmsg+0x973/0xc30 [ 814.296458][T18725] ? __pfx_____sys_sendmsg+0x10/0x10 [ 814.296503][T18725] ? find_held_lock+0x2b/0x80 [ 814.296537][T18725] ? futex_unqueue+0x133/0x2c0 [ 814.296567][T18725] ___sys_sendmsg+0x134/0x1d0 [ 814.296602][T18725] ? __pfx____sys_sendmsg+0x10/0x10 [ 814.296636][T18725] ? __pfx___futex_wait+0x10/0x10 [ 814.296687][T18725] ? find_held_lock+0x2b/0x80 [ 814.296747][T18725] __sys_sendmmsg+0x200/0x420 [ 814.296788][T18725] ? __pfx___sys_sendmmsg+0x10/0x10 [ 814.296835][T18725] ? __pfx_do_futex+0x10/0x10 [ 814.296883][T18725] ? __x64_sys_openat+0x174/0x210 [ 814.296919][T18725] ? xfd_validate_state+0x61/0x180 [ 814.296954][T18725] __x64_sys_sendmmsg+0x9c/0x100 [ 814.296997][T18725] ? lockdep_hardirqs_on+0x7c/0x110 [ 814.297040][T18725] do_syscall_64+0xcd/0xf80 [ 814.297086][T18725] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 814.297117][T18725] RIP: 0033:0x7f9ad238f7c9 [ 814.297141][T18725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 814.297179][T18725] RSP: 002b:00007f9ad32ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 814.297208][T18725] RAX: ffffffffffffffda RBX: 00007f9ad25e5fa0 RCX: 00007f9ad238f7c9 [ 814.297228][T18725] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000003 [ 814.297247][T18725] RBP: 00007f9ad2413f91 R08: 0000000000000000 R09: 0000000000000000 [ 814.297265][T18725] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 814.297283][T18725] R13: 00007f9ad25e6038 R14: 00007f9ad25e5fa0 R15: 00007fff312b47f8 [ 814.297337][T18725] [ 814.784947][ T5151] Bluetooth: hci6: command tx timeout [ 815.094351][T18665] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 815.129195][T18735] FAULT_INJECTION: forcing a failure. [ 815.129195][T18735] name failslab, interval 1, probability 0, space 0, times 0 [ 815.142821][T18735] CPU: 1 UID: 0 PID: 18735 Comm: syz.1.2790 Tainted: G U L syzkaller #0 PREEMPT(full) [ 815.142867][T18735] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 815.142877][T18735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 815.142893][T18735] Call Trace: [ 815.142902][T18735] [ 815.142912][T18735] dump_stack_lvl+0x16c/0x1f0 [ 815.142956][T18735] should_fail_ex+0x512/0x640 [ 815.142999][T18735] ? fs_reclaim_acquire+0xae/0x150 [ 815.143047][T18735] should_failslab+0xc2/0x120 [ 815.143091][T18735] __kmalloc_noprof+0xeb/0x910 [ 815.143124][T18735] ? tomoyo_encode2+0x100/0x3e0 [ 815.143168][T18735] ? tomoyo_encode2+0x100/0x3e0 [ 815.143203][T18735] tomoyo_encode2+0x100/0x3e0 [ 815.143246][T18735] tomoyo_encode+0x29/0x50 [ 815.143283][T18735] tomoyo_realpath_from_path+0x18f/0x6e0 [ 815.143333][T18735] tomoyo_path_number_perm+0x245/0x580 [ 815.143363][T18735] ? tomoyo_path_number_perm+0x237/0x580 [ 815.143400][T18735] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 815.143447][T18735] ? find_held_lock+0x2b/0x80 [ 815.143504][T18735] ? __pfx___d_add+0x10/0x10 [ 815.143533][T18735] ? d_alloc+0x176/0x1e0 [ 815.143557][T18735] ? current_check_access_path+0x33b/0x460 [ 815.143597][T18735] ? __pfx_current_check_access_path+0x10/0x10 [ 815.143637][T18735] ? simple_lookup+0x105/0x1d0 [ 815.143677][T18735] ? lookup_one_qstr_excl+0xb3/0x250 [ 815.143713][T18735] tomoyo_path_mkdir+0x9b/0xe0 [ 815.143756][T18735] ? __pfx_tomoyo_path_mkdir+0x10/0x10 [ 815.143809][T18735] security_path_mkdir+0x154/0x2f0 [ 815.143844][T18735] do_mkdirat+0x16c/0x5e0 [ 815.143890][T18735] ? __pfx_do_mkdirat+0x10/0x10 [ 815.143932][T18735] ? strncpy_from_user+0x203/0x2e0 [ 815.143975][T18735] ? getname_flags.part.0+0x1c5/0x550 [ 815.144013][T18735] __x64_sys_mkdir+0xef/0x140 [ 815.144059][T18735] do_syscall_64+0xcd/0xf80 [ 815.144105][T18735] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 815.144134][T18735] RIP: 0033:0x7f9ad238f7c9 [ 815.144157][T18735] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 815.144186][T18735] RSP: 002b:00007f9ad32ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 815.144214][T18735] RAX: ffffffffffffffda RBX: 00007f9ad25e5fa0 RCX: 00007f9ad238f7c9 [ 815.144234][T18735] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000200000000040 [ 815.144252][T18735] RBP: 00007f9ad2413f91 R08: 0000000000000000 R09: 0000000000000000 [ 815.144268][T18735] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 815.144285][T18735] R13: 00007f9ad25e6038 R14: 00007f9ad25e5fa0 R15: 00007fff312b47f8 [ 815.144326][T18735] [ 815.144826][T18735] ERROR: Out of memory at tomoyo_realpath_from_path. [ 816.124593][T18756] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2793'. [ 816.214275][T18756] vlan1: entered promiscuous mode [ 816.234159][T18756] vlan1: entered allmulticast mode [ 816.244124][T18756] veth0_vlan: entered allmulticast mode [ 816.603002][T18665] veth0_vlan: entered promiscuous mode [ 816.693562][T18665] veth1_vlan: entered promiscuous mode [ 816.848330][ T5151] Bluetooth: hci6: command tx timeout [ 816.917169][T18665] veth0_macvtap: entered promiscuous mode [ 816.933138][T18665] veth1_macvtap: entered promiscuous mode [ 816.988721][T18665] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 817.066171][T18665] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 817.110826][ T1303] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 817.162716][ T1303] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 817.196974][ T1303] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 817.227681][ T1303] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 817.906391][T18772] netlink: 16 bytes leftover after parsing attributes in process `syz.5.2795'. [ 817.997145][T17175] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 818.011017][T17175] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 818.087851][ T4280] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 818.106064][ T4280] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 818.133864][ T30] audit: type=1800 audit(73446.955:116): pid=18775 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.2796" name="dbroot" dev="configfs" ino=69827 res=0 errno=0 [ 818.903023][T18782] netlink: 16 bytes leftover after parsing attributes in process `syz.6.2774'. [ 818.960296][ T5151] Bluetooth: hci6: command tx timeout [ 819.154777][T18792] openvswitch: netlink: IPv4 tunnel dst address is zero [ 819.240714][T18790] zswap: compressor not available [ 819.471750][T18797] ERROR: Out of memory at tomoyo_memory_ok. [ 820.819410][T18806] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 820.830468][T18806] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 820.849490][T18806] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 820.873402][T18806] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 820.911555][T18806] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 820.950821][T18806] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 820.959686][T18806] Bluetooth: hci6: Opcode 0x0c1a failed: -4 [ 820.975194][T18806] Bluetooth: hci6: Opcode 0x0406 failed: -4 [ 821.002751][T18806] Bluetooth: hci6: Opcode 0x0406 failed: -4 [ 821.507084][T18827] capability: warning: `syz.5.2804' uses 32-bit capabilities (legacy support in use) [ 821.963012][T18832] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2807'. [ 822.206821][ T5151] Bluetooth: hci0: command 0x0c1a tx timeout [ 822.353263][T18843] netlink: 8 bytes leftover after parsing attributes in process `syz.6.2809'. [ 822.403242][T18840] FAULT_INJECTION: forcing a failure. [ 822.403242][T18840] name failslab, interval 1, probability 0, space 0, times 0 [ 822.488503][T18840] CPU: 1 UID: 0 PID: 18840 Comm: syz.5.2808 Tainted: G U L syzkaller #0 PREEMPT(full) [ 822.488533][T18840] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 822.488539][T18840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 822.488548][T18840] Call Trace: [ 822.488554][T18840] [ 822.488561][T18840] dump_stack_lvl+0x16c/0x1f0 [ 822.488588][T18840] should_fail_ex+0x512/0x640 [ 822.488609][T18840] should_failslab+0xc2/0x120 [ 822.488632][T18840] kmem_cache_alloc_node_noprof+0x86/0x800 [ 822.488651][T18840] ? __alloc_skb+0x156/0x410 [ 822.488671][T18840] ? __alloc_skb+0x156/0x410 [ 822.488685][T18840] __alloc_skb+0x156/0x410 [ 822.488699][T18840] ? __alloc_skb+0x35d/0x410 [ 822.488714][T18840] ? __pfx___alloc_skb+0x10/0x10 [ 822.488733][T18840] ? __lock_acquire+0x436/0x2890 [ 822.488750][T18840] sctp_packet_transmit+0x1ca/0x30b0 [ 822.488775][T18840] ? find_held_lock+0x2b/0x80 [ 822.488794][T18840] ? sctp_outq_flush+0xb4e/0x33a0 [ 822.488813][T18840] sctp_outq_flush+0xb68/0x33a0 [ 822.488835][T18840] ? __pfx_sctp_outq_flush+0x10/0x10 [ 822.488854][T18840] ? rcu_is_watching+0x12/0xc0 [ 822.488874][T18840] ? sctp_sf_eat_sack_6_2+0x623/0xa40 [ 822.488900][T18840] sctp_do_sm+0x17d1/0x5e00 [ 822.488923][T18840] ? __pfx_sctp_do_sm+0x10/0x10 [ 822.488964][T18840] ? ktime_get+0x200/0x310 [ 822.488977][T18840] ? lockdep_hardirqs_on+0x7c/0x110 [ 822.489003][T18840] sctp_assoc_bh_rcv+0x392/0x6f0 [ 822.489024][T18840] sctp_inq_push+0x1db/0x270 [ 822.489047][T18840] sctp_backlog_rcv+0x169/0x590 [ 822.489068][T18840] ? __pfx_sctp_backlog_rcv+0x10/0x10 [ 822.489086][T18840] __release_sock+0x3a9/0x450 [ 822.489106][T18840] ? lockdep_hardirqs_on+0x7c/0x110 [ 822.489131][T18840] release_sock+0x5a/0x220 [ 822.489150][T18840] sctp_wait_for_connect+0x1c3/0x5e0 [ 822.489175][T18840] ? __pfx_sctp_wait_for_connect+0x10/0x10 [ 822.489197][T18840] ? skb_set_owner_w+0x37d/0x770 [ 822.489213][T18840] ? __pfx_autoremove_wake_function+0x10/0x10 [ 822.489234][T18840] ? sctp_datamsg_put+0x58/0x5f0 [ 822.489253][T18840] ? sctp_primitive_SEND+0x9f/0xd0 [ 822.489272][T18840] sctp_sendmsg_to_asoc+0x1885/0x1c50 [ 822.489295][T18840] ? sctp_assoc_set_primary+0x101/0x300 [ 822.489319][T18840] ? sctp_assoc_add_peer+0x252/0x1540 [ 822.489338][T18840] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 822.489360][T18840] ? sctp_connect_new_asoc+0x41e/0x770 [ 822.489377][T18840] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 822.489394][T18840] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 822.489420][T18840] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 822.489444][T18840] sctp_sendmsg+0xe99/0x1e20 [ 822.489466][T18840] ? __pfx_sctp_sendmsg+0x10/0x10 [ 822.489480][T18840] ? __pfx___might_resched+0x10/0x10 [ 822.489501][T18840] ? __lock_acquire+0x436/0x2890 [ 822.489517][T18840] ? aa_sk_perm+0x2f2/0xae0 [ 822.489537][T18840] ? __pfx_aa_sk_perm+0x10/0x10 [ 822.489559][T18840] ? __pfx_sctp_sendmsg+0x10/0x10 [ 822.489576][T18840] inet_sendmsg+0x11c/0x140 [ 822.489595][T18840] ____sys_sendmsg+0x973/0xc30 [ 822.489619][T18840] ? __pfx_____sys_sendmsg+0x10/0x10 [ 822.489647][T18840] ? find_held_lock+0x2b/0x80 [ 822.489666][T18840] ? futex_unqueue+0x133/0x2c0 [ 822.489685][T18840] ___sys_sendmsg+0x134/0x1d0 [ 822.489704][T18840] ? __pfx____sys_sendmsg+0x10/0x10 [ 822.489722][T18840] ? __pfx___futex_wait+0x10/0x10 [ 822.489750][T18840] ? find_held_lock+0x2b/0x80 [ 822.489780][T18840] __sys_sendmmsg+0x200/0x420 [ 822.489801][T18840] ? __pfx___sys_sendmmsg+0x10/0x10 [ 822.489832][T18840] ? __pfx_do_futex+0x10/0x10 [ 822.489873][T18840] ? __x64_sys_openat+0x174/0x210 [ 822.489906][T18840] ? xfd_validate_state+0x61/0x180 [ 822.489928][T18840] __x64_sys_sendmmsg+0x9c/0x100 [ 822.489946][T18840] ? lockdep_hardirqs_on+0x7c/0x110 [ 822.489967][T18840] do_syscall_64+0xcd/0xf80 [ 822.489991][T18840] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 822.490007][T18840] RIP: 0033:0x7f2ac938f7c9 [ 822.490020][T18840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 822.490042][T18840] RSP: 002b:00007f2aca29b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 822.490058][T18840] RAX: ffffffffffffffda RBX: 00007f2ac95e5fa0 RCX: 00007f2ac938f7c9 [ 822.490069][T18840] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000003 [ 822.490079][T18840] RBP: 00007f2ac9413f91 R08: 0000000000000000 R09: 0000000000000000 [ 822.490089][T18840] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 822.490098][T18840] R13: 00007f2ac95e6038 R14: 00007f2ac95e5fa0 R15: 00007ffd59b11ce8 [ 822.490119][T18840] [ 822.999616][ T5839] Bluetooth: hci2: command 0x0c1a tx timeout [ 823.005690][ T5839] Bluetooth: hci3: command 0x0c1a tx timeout [ 823.011783][ T5839] Bluetooth: hci6: command 0x0c1a tx timeout [ 823.016525][T17770] Bluetooth: hci5: command 0x0c1a tx timeout [ 823.020916][ T5839] Bluetooth: hci1: command 0x040f tx timeout [ 823.029938][ T5151] Bluetooth: hci4: command 0x0c1a tx timeout [ 823.159106][T18853] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2812'. [ 823.235460][T18854] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 823.331071][T18853] team0: Port device team_slave_1 removed [ 823.426348][ T5840] Bluetooth: hci5: unexpected subevent 0x01 length: 3 < 18 [ 823.440815][T18851] netlink: 16 bytes leftover after parsing attributes in process `syz.6.2811'. [ 823.849648][T18856] FAULT_INJECTION: forcing a failure. [ 823.849648][T18856] name fail_futex, interval 1, probability 0, space 0, times 0 [ 823.868647][T18856] CPU: 0 UID: 0 PID: 18856 Comm: syz.1.2812 Tainted: G U L syzkaller #0 PREEMPT(full) [ 823.868694][T18856] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 823.868706][T18856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 823.868720][T18856] Call Trace: [ 823.868729][T18856] [ 823.868740][T18856] dump_stack_lvl+0x16c/0x1f0 [ 823.868785][T18856] should_fail_ex+0x512/0x640 [ 823.868820][T18856] get_futex_key+0x1085/0x15f0 [ 823.868855][T18856] ? __pfx_get_futex_key+0x10/0x10 [ 823.868894][T18856] futex_wake+0xea/0x530 [ 823.868929][T18856] ? __pfx_futex_wake+0x10/0x10 [ 823.868966][T18856] do_futex+0x1e3/0x350 [ 823.868982][T18856] ? __pfx_do_futex+0x10/0x10 [ 823.868997][T18856] ? __might_fault+0xe3/0x190 [ 823.869019][T18856] mm_release+0x24e/0x300 [ 823.869039][T18856] do_exit+0x69e/0x2bd0 [ 823.869057][T18856] ? __pfx_do_exit+0x10/0x10 [ 823.869070][T18856] ? do_raw_spin_lock+0x12c/0x2b0 [ 823.869087][T18856] ? find_held_lock+0x2b/0x80 [ 823.869109][T18856] do_group_exit+0xd3/0x2a0 [ 823.869124][T18856] get_signal+0x2671/0x26d0 [ 823.869148][T18856] ? __lock_acquire+0x436/0x2890 [ 823.869162][T18856] ? __pfx_get_signal+0x10/0x10 [ 823.869183][T18856] ? do_futex+0x122/0x350 [ 823.869200][T18856] arch_do_signal_or_restart+0x8f/0x7a0 [ 823.869222][T18856] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 823.869247][T18856] ? __fget_files+0x20e/0x3c0 [ 823.869268][T18856] ? __pfx___x64_sys_futex+0x10/0x10 [ 823.869288][T18856] exit_to_user_mode_loop+0x8c/0x540 [ 823.869308][T18856] do_syscall_64+0x4ee/0xf80 [ 823.869331][T18856] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 823.869346][T18856] RIP: 0033:0x7f9ad238f7c9 [ 823.869359][T18856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 823.869374][T18856] RSP: 002b:00007f9ad328c0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 823.869389][T18856] RAX: fffffffffffffe00 RBX: 00007f9ad25e6278 RCX: 00007f9ad238f7c9 [ 823.869399][T18856] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f9ad25e6278 [ 823.869408][T18856] RBP: 00007f9ad25e6270 R08: 0000000000000000 R09: 0000000000000000 [ 823.869417][T18856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 823.869426][T18856] R13: 00007f9ad25e6308 R14: 00007fff312b4710 R15: 00007fff312b47f8 [ 823.869445][T18856] [ 825.094166][ T5840] Bluetooth: hci6: command 0x0c1a tx timeout [ 825.170645][T18886] netlink: 16 bytes leftover after parsing attributes in process `syz.6.2817'. [ 826.118670][T18903] FAULT_INJECTION: forcing a failure. [ 826.118670][T18903] name failslab, interval 1, probability 0, space 0, times 0 [ 826.131715][T18903] CPU: 0 UID: 0 PID: 18903 Comm: syz.6.2820 Tainted: G U L syzkaller #0 PREEMPT(full) [ 826.131743][T18903] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 826.131749][T18903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 826.131758][T18903] Call Trace: [ 826.131764][T18903] [ 826.131770][T18903] dump_stack_lvl+0x16c/0x1f0 [ 826.131795][T18903] should_fail_ex+0x512/0x640 [ 826.131812][T18903] ? __kmalloc_cache_noprof+0x5f/0x800 [ 826.131831][T18903] should_failslab+0xc2/0x120 [ 826.131853][T18903] __kmalloc_cache_noprof+0x80/0x800 [ 826.131868][T18903] ? find_held_lock+0x2b/0x80 [ 826.131886][T18903] ? sctp_association_new+0xbb/0x29d0 [ 826.131905][T18903] ? sctp_association_new+0xbb/0x29d0 [ 826.131920][T18903] sctp_association_new+0xbb/0x29d0 [ 826.131936][T18903] ? sctp_v4_scope+0x183/0x1a0 [ 826.131956][T18903] sctp_connect_new_asoc+0x1a8/0x770 [ 826.131974][T18903] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 826.131991][T18903] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 826.132015][T18903] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 826.132039][T18903] sctp_sendmsg+0x157c/0x1e20 [ 826.132061][T18903] ? __pfx_sctp_sendmsg+0x10/0x10 [ 826.132075][T18903] ? __pfx___might_resched+0x10/0x10 [ 826.132095][T18903] ? __lock_acquire+0x436/0x2890 [ 826.132111][T18903] ? aa_sk_perm+0x2f2/0xae0 [ 826.132130][T18903] ? __pfx_aa_sk_perm+0x10/0x10 [ 826.132153][T18903] ? __pfx_sctp_sendmsg+0x10/0x10 [ 826.132169][T18903] inet_sendmsg+0x11c/0x140 [ 826.132187][T18903] ____sys_sendmsg+0x973/0xc30 [ 826.132212][T18903] ? __pfx_____sys_sendmsg+0x10/0x10 [ 826.132237][T18903] ? __pfx__kstrtoull+0x10/0x10 [ 826.132261][T18903] ___sys_sendmsg+0x134/0x1d0 [ 826.132281][T18903] ? __pfx____sys_sendmsg+0x10/0x10 [ 826.132314][T18903] ? find_held_lock+0x2b/0x80 [ 826.132344][T18903] __sys_sendmmsg+0x200/0x420 [ 826.132373][T18903] ? __pfx___sys_sendmmsg+0x10/0x10 [ 826.132398][T18903] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 826.132429][T18903] ? fput+0x70/0xf0 [ 826.132443][T18903] ? ksys_write+0x1ac/0x250 [ 826.132463][T18903] ? __pfx_ksys_write+0x10/0x10 [ 826.132487][T18903] __x64_sys_sendmmsg+0x9c/0x100 [ 826.132504][T18903] ? lockdep_hardirqs_on+0x7c/0x110 [ 826.132526][T18903] do_syscall_64+0xcd/0xf80 [ 826.132548][T18903] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 826.132564][T18903] RIP: 0033:0x7fb01378f7c9 [ 826.132577][T18903] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 826.132591][T18903] RSP: 002b:00007fb0145fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 826.132627][T18903] RAX: ffffffffffffffda RBX: 00007fb0139e5fa0 RCX: 00007fb01378f7c9 [ 826.132641][T18903] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000003 [ 826.132650][T18903] RBP: 00007fb0145fa090 R08: 0000000000000000 R09: 0000000000000000 [ 826.132659][T18903] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000001 [ 826.132668][T18903] R13: 00007fb0139e6038 R14: 00007fb0139e5fa0 R15: 00007ffcf1bc08e8 [ 826.132688][T18903] [ 827.166177][ T5840] Bluetooth: hci6: command 0x0c1a tx timeout [ 827.271644][T18917] CIFS mount error: No usable UNC path provided in device string! [ 827.271644][T18917] [ 827.285074][T18917] CIFS: VFS: CIFS mount error: No usable UNC path provided in device string! [ 827.873007][T18911] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 827.929531][T18911] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 827.935656][T18911] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 827.973629][T18911] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 828.014132][T18911] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 828.028453][T18911] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 828.058203][T18911] Bluetooth: hci6: Opcode 0x0c1a failed: -4 [ 828.195355][T18913] NOTICE: Automounting of tracing to debugfs is deprecated and will be removed in 2030 [ 828.434867][T18934] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2828'. [ 828.466637][T18938] blktrace: Concurrent blktraces are not allowed on loop2 [ 829.486084][ T5840] Bluetooth: hci0: command 0x0c1a tx timeout [ 829.801347][T18958] netlink: 330 bytes leftover after parsing attributes in process `syz.6.2832'. [ 829.862184][T18958] mac80211_hwsim hwsim23 ›in: renamed from wlan0 (while UP) [ 829.966192][T18847] Bluetooth: hci4: command 0x0c1a tx timeout [ 829.966186][ T5840] Bluetooth: hci3: command 0x0c1a tx timeout [ 830.046076][T18847] Bluetooth: hci1: command 0x040f tx timeout [ 830.046414][ T5151] Bluetooth: hci2: command 0x0c1a tx timeout [ 830.057074][ T5840] Bluetooth: hci5: command 0x0c1a tx timeout [ 830.136062][ T5840] Bluetooth: hci6: command 0x0c1a tx timeout [ 830.146997][T18963] FAULT_INJECTION: forcing a failure. [ 830.146997][T18963] name failslab, interval 1, probability 0, space 0, times 0 [ 830.160405][T18963] CPU: 0 UID: 0 PID: 18963 Comm: syz.6.2835 Tainted: G U L syzkaller #0 PREEMPT(full) [ 830.160454][T18963] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 830.160465][T18963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 830.160482][T18963] Call Trace: [ 830.160492][T18963] [ 830.160504][T18963] dump_stack_lvl+0x16c/0x1f0 [ 830.160551][T18963] should_fail_ex+0x512/0x640 [ 830.160582][T18963] ? fs_reclaim_acquire+0xae/0x150 [ 830.160630][T18963] should_failslab+0xc2/0x120 [ 830.160672][T18963] __kmalloc_noprof+0xeb/0x910 [ 830.160704][T18963] ? tomoyo_encode2+0x100/0x3e0 [ 830.160748][T18963] ? tomoyo_encode2+0x100/0x3e0 [ 830.160783][T18963] tomoyo_encode2+0x100/0x3e0 [ 830.160825][T18963] tomoyo_encode+0x29/0x50 [ 830.160871][T18963] tomoyo_realpath_from_path+0x18f/0x6e0 [ 830.160922][T18963] tomoyo_path_number_perm+0x245/0x580 [ 830.160955][T18963] ? tomoyo_path_number_perm+0x237/0x580 [ 830.160991][T18963] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 830.161038][T18963] ? find_held_lock+0x2b/0x80 [ 830.161094][T18963] ? __pfx___d_add+0x10/0x10 [ 830.161123][T18963] ? d_alloc+0x176/0x1e0 [ 830.161146][T18963] ? current_check_access_path+0x33b/0x460 [ 830.161186][T18963] ? __pfx_current_check_access_path+0x10/0x10 [ 830.161225][T18963] ? simple_lookup+0x105/0x1d0 [ 830.161265][T18963] ? lookup_one_qstr_excl+0xb3/0x250 [ 830.161302][T18963] tomoyo_path_mkdir+0x9b/0xe0 [ 830.161345][T18963] ? __pfx_tomoyo_path_mkdir+0x10/0x10 [ 830.161394][T18963] security_path_mkdir+0x154/0x2f0 [ 830.161427][T18963] do_mkdirat+0x16c/0x5e0 [ 830.161471][T18963] ? __pfx_do_mkdirat+0x10/0x10 [ 830.161511][T18963] ? strncpy_from_user+0x203/0x2e0 [ 830.161544][T18963] ? getname_flags.part.0+0x1c5/0x550 [ 830.161579][T18963] __x64_sys_mkdir+0xef/0x140 [ 830.161632][T18963] do_syscall_64+0xcd/0xf80 [ 830.161678][T18963] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 830.161708][T18963] RIP: 0033:0x7fb01378f7c9 [ 830.161733][T18963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 830.161763][T18963] RSP: 002b:00007fb0145fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 830.161791][T18963] RAX: ffffffffffffffda RBX: 00007fb0139e5fa0 RCX: 00007fb01378f7c9 [ 830.161812][T18963] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000200000000040 [ 830.161830][T18963] RBP: 00007fb013813f91 R08: 0000000000000000 R09: 0000000000000000 [ 830.161855][T18963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 830.161873][T18963] R13: 00007fb0139e6038 R14: 00007fb0139e5fa0 R15: 00007ffcf1bc08e8 [ 830.161914][T18963] [ 830.162167][T18963] ERROR: Out of memory at tomoyo_realpath_from_path. [ 830.736717][ T30] audit: type=1800 audit(73459.535:117): pid=18974 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.6.2840" name="dbroot" dev="configfs" ino=69476 res=0 errno=0 [ 830.746874][T18974] FAULT_INJECTION: forcing a failure. [ 830.746874][T18974] name failslab, interval 1, probability 0, space 0, times 0 [ 830.844889][T18974] CPU: 0 UID: 0 PID: 18974 Comm: syz.6.2840 Tainted: G U L syzkaller #0 PREEMPT(full) [ 830.844942][T18974] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 830.844955][T18974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 830.844973][T18974] Call Trace: [ 830.844984][T18974] [ 830.844996][T18974] dump_stack_lvl+0x16c/0x1f0 [ 830.845047][T18974] should_fail_ex+0x512/0x640 [ 830.845093][T18974] should_failslab+0xc2/0x120 [ 830.845138][T18974] __kmalloc_cache_noprof+0x80/0x800 [ 830.845172][T18974] ? sctp_add_bind_addr+0xae/0x3f0 [ 830.845215][T18974] ? sctp_add_bind_addr+0xae/0x3f0 [ 830.845251][T18974] sctp_add_bind_addr+0xae/0x3f0 [ 830.845294][T18974] sctp_copy_local_addr_list+0x349/0x550 [ 830.845343][T18974] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 830.845390][T18974] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360 [ 830.845436][T18974] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 830.845483][T18974] sctp_bind_addr_copy+0xe0/0x530 [ 830.845529][T18974] sctp_connect_new_asoc+0x1c9/0x770 [ 830.845563][T18974] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 830.845603][T18974] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 830.845649][T18974] sctp_sendmsg+0x157c/0x1e20 [ 830.845692][T18974] ? __pfx_sctp_sendmsg+0x10/0x10 [ 830.845721][T18974] ? __pfx___might_resched+0x10/0x10 [ 830.845760][T18974] ? __lock_acquire+0x436/0x2890 [ 830.845793][T18974] ? aa_sk_perm+0x2f2/0xae0 [ 830.845827][T18974] ? __pfx_aa_sk_perm+0x10/0x10 [ 830.845865][T18974] ? __pfx_sctp_sendmsg+0x10/0x10 [ 830.845895][T18974] inet_sendmsg+0x11c/0x140 [ 830.845932][T18974] ____sys_sendmsg+0x973/0xc30 [ 830.845980][T18974] ? __pfx_____sys_sendmsg+0x10/0x10 [ 830.846027][T18974] ? find_held_lock+0x2b/0x80 [ 830.846065][T18974] ? futex_unqueue+0x133/0x2c0 [ 830.846109][T18974] ___sys_sendmsg+0x134/0x1d0 [ 830.846150][T18974] ? __pfx____sys_sendmsg+0x10/0x10 [ 830.846187][T18974] ? __pfx___futex_wait+0x10/0x10 [ 830.846241][T18974] ? find_held_lock+0x2b/0x80 [ 830.846302][T18974] __sys_sendmmsg+0x200/0x420 [ 830.846360][T18974] ? __pfx___sys_sendmmsg+0x10/0x10 [ 830.846408][T18974] ? __pfx_do_futex+0x10/0x10 [ 830.846457][T18974] ? __x64_sys_openat+0x174/0x210 [ 830.846493][T18974] ? xfd_validate_state+0x61/0x180 [ 830.846528][T18974] __x64_sys_sendmmsg+0x9c/0x100 [ 830.846564][T18974] ? lockdep_hardirqs_on+0x7c/0x110 [ 830.846606][T18974] do_syscall_64+0xcd/0xf80 [ 830.846651][T18974] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 830.846681][T18974] RIP: 0033:0x7fb01378f7c9 [ 830.846706][T18974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 830.846771][T18974] RSP: 002b:00007fb0145fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 830.846800][T18974] RAX: ffffffffffffffda RBX: 00007fb0139e5fa0 RCX: 00007fb01378f7c9 [ 830.846821][T18974] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000002 [ 830.846838][T18974] RBP: 00007fb013813f91 R08: 0000000000000000 R09: 0000000000000000 [ 830.846857][T18974] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 830.846874][T18974] R13: 00007fb0139e6038 R14: 00007fb0139e5fa0 R15: 00007ffcf1bc08e8 [ 830.846914][T18974] [ 831.747661][T18981] FAULT_INJECTION: forcing a failure. [ 831.747661][T18981] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 831.795066][T18981] CPU: 1 UID: 0 PID: 18981 Comm: syz.1.2841 Tainted: G U L syzkaller #0 PREEMPT(full) [ 831.795113][T18981] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 831.795124][T18981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 831.795141][T18981] Call Trace: [ 831.795150][T18981] [ 831.795161][T18981] dump_stack_lvl+0x16c/0x1f0 [ 831.795205][T18981] should_fail_ex+0x512/0x640 [ 831.795240][T18981] _copy_from_user+0x2e/0xd0 [ 831.795271][T18981] vt_ioctl+0x42e/0x30a0 [ 831.795304][T18981] ? __pfx_vt_ioctl+0x10/0x10 [ 831.795334][T18981] ? tomoyo_path_number_perm+0x295/0x580 [ 831.795372][T18981] ? tomoyo_path_number_perm+0x18d/0x580 [ 831.795406][T18981] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 831.795440][T18981] ? find_held_lock+0x2b/0x80 [ 831.795476][T18981] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 831.795518][T18981] ? tty_jobctrl_ioctl+0x152/0xe00 [ 831.795549][T18981] ? __pfx_vt_ioctl+0x10/0x10 [ 831.795576][T18981] tty_ioctl+0x661/0x1650 [ 831.795610][T18981] ? __pfx_tty_ioctl+0x10/0x10 [ 831.795645][T18981] ? fd_install+0x242/0x570 [ 831.795678][T18981] ? hook_file_ioctl_common+0x144/0x410 [ 831.795724][T18981] ? __pfx_tty_ioctl+0x10/0x10 [ 831.795762][T18981] __x64_sys_ioctl+0x18e/0x210 [ 831.795798][T18981] do_syscall_64+0xcd/0xf80 [ 831.795840][T18981] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 831.795878][T18981] RIP: 0033:0x7f9ad238f7c9 [ 831.795901][T18981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 831.795928][T18981] RSP: 002b:00007f9ad32ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 831.795950][T18981] RAX: ffffffffffffffda RBX: 00007f9ad25e5fa0 RCX: 00007f9ad238f7c9 [ 831.795967][T18981] RDX: 0000000000000000 RSI: 0000000000004b72 RDI: 0000000000000000 [ 831.795982][T18981] RBP: 00007f9ad32ef090 R08: 0000000000000000 R09: 0000000000000000 [ 831.795997][T18981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 831.796014][T18981] R13: 00007f9ad25e6038 R14: 00007f9ad25e5fa0 R15: 00007fff312b47f8 [ 831.796051][T18981] [ 831.800099][T18985] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input480 [ 832.457480][T18992] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input481 [ 832.959074][T18998] netlink: 16 bytes leftover after parsing attributes in process `syz.3.2839'. [ 833.453318][T18994] FAULT_INJECTION: forcing a failure. [ 833.453318][T18994] name failslab, interval 1, probability 0, space 0, times 0 [ 833.590362][T19017] FAULT_INJECTION: forcing a failure. [ 833.590362][T19017] name failslab, interval 1, probability 0, space 0, times 0 [ 833.603399][T19017] CPU: 1 UID: 0 PID: 19017 Comm: syz.6.2848 Tainted: G U L syzkaller #0 PREEMPT(full) [ 833.603427][T19017] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 833.603434][T19017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 833.603444][T19017] Call Trace: [ 833.603450][T19017] [ 833.603456][T19017] dump_stack_lvl+0x16c/0x1f0 [ 833.603483][T19017] should_fail_ex+0x512/0x640 [ 833.603500][T19017] ? fs_reclaim_acquire+0xae/0x150 [ 833.603526][T19017] should_failslab+0xc2/0x120 [ 833.603559][T19017] __kmalloc_noprof+0xeb/0x910 [ 833.603577][T19017] ? tomoyo_encode2+0x100/0x3e0 [ 833.603601][T19017] ? tomoyo_encode2+0x100/0x3e0 [ 833.603619][T19017] tomoyo_encode2+0x100/0x3e0 [ 833.603648][T19017] tomoyo_encode+0x29/0x50 [ 833.603667][T19017] tomoyo_realpath_from_path+0x18f/0x6e0 [ 833.603693][T19017] tomoyo_path_number_perm+0x245/0x580 [ 833.603710][T19017] ? tomoyo_path_number_perm+0x237/0x580 [ 833.603729][T19017] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 833.603753][T19017] ? find_held_lock+0x2b/0x80 [ 833.603783][T19017] ? __pfx___d_add+0x10/0x10 [ 833.603798][T19017] ? d_alloc+0x176/0x1e0 [ 833.603810][T19017] ? current_check_access_path+0x33b/0x460 [ 833.603831][T19017] ? __pfx_current_check_access_path+0x10/0x10 [ 833.603851][T19017] ? simple_lookup+0x105/0x1d0 [ 833.603872][T19017] ? lookup_one_qstr_excl+0xb3/0x250 [ 833.603891][T19017] tomoyo_path_mkdir+0x9b/0xe0 [ 833.603913][T19017] ? __pfx_tomoyo_path_mkdir+0x10/0x10 [ 833.603940][T19017] security_path_mkdir+0x154/0x2f0 [ 833.603958][T19017] do_mkdirat+0x16c/0x5e0 [ 833.603982][T19017] ? __pfx_do_mkdirat+0x10/0x10 [ 833.604003][T19017] ? strncpy_from_user+0x203/0x2e0 [ 833.604021][T19017] ? getname_flags.part.0+0x1c5/0x550 [ 833.604040][T19017] __x64_sys_mkdir+0xef/0x140 [ 833.604062][T19017] do_syscall_64+0xcd/0xf80 [ 833.604085][T19017] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 833.604101][T19017] RIP: 0033:0x7fb01378f7c9 [ 833.604114][T19017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 833.604129][T19017] RSP: 002b:00007fb0145fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 833.604144][T19017] RAX: ffffffffffffffda RBX: 00007fb0139e5fa0 RCX: 00007fb01378f7c9 [ 833.604158][T19017] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000200000000040 [ 833.604168][T19017] RBP: 00007fb013813f91 R08: 0000000000000000 R09: 0000000000000000 [ 833.604177][T19017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 833.604186][T19017] R13: 00007fb0139e6038 R14: 00007fb0139e5fa0 R15: 00007ffcf1bc08e8 [ 833.604207][T19017] [ 833.604226][T19017] ERROR: Out of memory at tomoyo_realpath_from_path. [ 833.881739][T18994] CPU: 1 UID: 0 PID: 18994 Comm: syz.5.2844 Tainted: G U L syzkaller #0 PREEMPT(full) [ 833.881768][T18994] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 833.881773][T18994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 833.881782][T18994] Call Trace: [ 833.881788][T18994] [ 833.881795][T18994] dump_stack_lvl+0x16c/0x1f0 [ 833.881821][T18994] should_fail_ex+0x512/0x640 [ 833.881838][T18994] ? __kmalloc_noprof+0xca/0x910 [ 833.881856][T18994] should_failslab+0xc2/0x120 [ 833.881878][T18994] __kmalloc_noprof+0xeb/0x910 [ 833.881894][T18994] ? kernfs_fop_write_iter+0x237/0x570 [ 833.881919][T18994] ? kernfs_fop_write_iter+0x237/0x570 [ 833.881939][T18994] kernfs_fop_write_iter+0x237/0x570 [ 833.881962][T18994] vfs_write+0x7d3/0x11d0 [ 833.881984][T18994] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 833.882008][T18994] ? __pfx_vfs_write+0x10/0x10 [ 833.882040][T18994] ksys_write+0x12a/0x250 [ 833.882060][T18994] ? __pfx_ksys_write+0x10/0x10 [ 833.882085][T18994] do_syscall_64+0xcd/0xf80 [ 833.882108][T18994] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 833.882125][T18994] RIP: 0033:0x7f2ac938f7c9 [ 833.882138][T18994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 833.882152][T18994] RSP: 002b:00007f2aca27a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 833.882166][T18994] RAX: ffffffffffffffda RBX: 00007f2ac95e6090 RCX: 00007f2ac938f7c9 [ 833.882177][T18994] RDX: 00000000000098c7 RSI: 0000200000000440 RDI: 0000000000000003 [ 833.882186][T18994] RBP: 00007f2aca27a090 R08: 0000000000000000 R09: 0000000000000000 [ 833.882195][T18994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 833.882204][T18994] R13: 00007f2ac95e6128 R14: 00007f2ac95e6090 R15: 00007ffd59b11ce8 [ 833.882224][T18994] [ 835.636391][T19023] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 835.766643][T19023] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 835.846526][T19023] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 835.852621][T19023] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 836.109752][T19023] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 836.174025][T19023] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 836.215040][T19032] lo: entered allmulticast mode [ 836.220123][T19032] lo: left allmulticast mode [ 836.229401][T19034] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2851'. [ 836.235779][T19023] Bluetooth: hci6: Opcode 0x0c1a failed: -4 [ 836.373924][T19034] zswap: compressor û not available [ 836.398145][T19032] Setting dangerous option i915.mitigations - tainting kernel [ 836.537857][T19040] lo: entered allmulticast mode [ 836.566900][T19040] lo: left allmulticast mode [ 836.618282][T19040] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2854'. [ 836.767953][T19040] zswap: compressor û not available [ 836.939088][T19049] zswap: compressor not available [ 836.954197][T19047] Setting dangerous option i915.mitigations - tainting kernel [ 837.016044][ T5840] Bluetooth: hci0: command 0x0c1a tx timeout [ 837.201118][T19059] FAULT_INJECTION: forcing a failure. [ 837.201118][T19059] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 837.230226][T19059] CPU: 0 UID: 0 PID: 19059 Comm: syz.3.2859 Tainted: G U L syzkaller #0 PREEMPT(full) [ 837.230274][T19059] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 837.230284][T19059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 837.230300][T19059] Call Trace: [ 837.230309][T19059] [ 837.230320][T19059] dump_stack_lvl+0x16c/0x1f0 [ 837.230363][T19059] should_fail_ex+0x512/0x640 [ 837.230397][T19059] should_fail_alloc_page+0xe7/0x130 [ 837.230437][T19059] prepare_alloc_pages+0x401/0x670 [ 837.230475][T19059] ? rcu_is_watching+0x12/0xc0 [ 837.230513][T19059] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 837.230547][T19059] ? __lock_acquire+0x436/0x2890 [ 837.230585][T19059] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 837.230619][T19059] ? do_raw_spin_lock+0x12c/0x2b0 [ 837.230650][T19059] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 837.230680][T19059] ? find_held_lock+0x2b/0x80 [ 837.230723][T19059] ? __lock_acquire+0x436/0x2890 [ 837.230748][T19059] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 837.230788][T19059] ? policy_nodemask+0xea/0x4e0 [ 837.230829][T19059] alloc_pages_mpol+0x1fb/0x550 [ 837.230867][T19059] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 837.230915][T19059] folio_alloc_mpol_noprof+0x36/0x2f0 [ 837.230944][T19059] shmem_alloc_folio+0x135/0x160 [ 837.230986][T19059] shmem_alloc_and_add_folio+0x494/0xc20 [ 837.231025][T19059] ? __pfx_shmem_alloc_and_add_folio+0x10/0x10 [ 837.231065][T19059] ? shmem_allowable_huge_orders+0xd4/0x3f0 [ 837.231104][T19059] shmem_get_folio_gfp+0x67f/0x1610 [ 837.231141][T19059] ? __pfx_shmem_get_folio_gfp+0x10/0x10 [ 837.231172][T19059] ? filemap_map_pages+0x12dd/0x1e00 [ 837.231209][T19059] shmem_fault+0x1fe/0xa00 [ 837.231239][T19059] ? __pfx_shmem_fault+0x10/0x10 [ 837.231273][T19059] ? __pfx_filemap_map_pages+0x10/0x10 [ 837.231313][T19059] ? __pfx_filemap_map_pages+0x10/0x10 [ 837.231341][T19059] __do_fault+0x10d/0x490 [ 837.231375][T19059] ? __pfx_filemap_map_pages+0x10/0x10 [ 837.231404][T19059] do_fault+0xae4/0x1ad0 [ 837.231440][T19059] ? __pfx_filemap_map_pages+0x10/0x10 [ 837.231476][T19059] __handle_mm_fault+0x1919/0x2bb0 [ 837.231513][T19059] ? __pfx___handle_mm_fault+0x10/0x10 [ 837.231561][T19059] ? find_vma+0xbf/0x140 [ 837.231593][T19059] ? __pfx_find_vma+0x10/0x10 [ 837.231631][T19059] handle_mm_fault+0x3fe/0xad0 [ 837.231666][T19059] do_user_addr_fault+0x7a6/0x1370 [ 837.231699][T19059] ? find_held_lock+0x2b/0x80 [ 837.231732][T19059] ? rcu_is_watching+0x12/0xc0 [ 837.231771][T19059] exc_page_fault+0x64/0xc0 [ 837.231808][T19059] asm_exc_page_fault+0x26/0x30 [ 837.231832][T19059] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 837.231862][T19059] Code: cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb c5 a4 c3 cc cc cc cc 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 [ 837.231886][T19059] RSP: 0018:ffffc90003737ac0 EFLAGS: 00050202 [ 837.231908][T19059] RAX: 0000000000000001 RBX: 000000000000220f RCX: 000000000000121f [ 837.231926][T19059] RDX: ffffed10095f5402 RSI: 0000000000003000 RDI: ffff88804afa8df1 [ 837.231944][T19059] RBP: 0000000000002010 R08: 0000000000000001 R09: ffffed10095f5401 [ 837.231962][T19059] R10: ffff88804afaa00f R11: 0000000000000000 R12: 0000000000000000 [ 837.231978][T19059] R13: ffff88804afa8000 R14: 0000000000000008 R15: 0000000000002010 [ 837.232014][T19059] _copy_from_user+0x98/0xd0 [ 837.232050][T19059] generic_map_update_batch+0x3f6/0x620 [ 837.232099][T19059] ? __pfx_generic_map_update_batch+0x10/0x10 [ 837.232145][T19059] ? __pfx_generic_map_update_batch+0x10/0x10 [ 837.232184][T19059] bpf_map_do_batch+0x5be/0x680 [ 837.232221][T19059] __sys_bpf+0x482c/0x4980 [ 837.232251][T19059] ? __pfx___sys_bpf+0x10/0x10 [ 837.232274][T19059] ? find_held_lock+0x2b/0x80 [ 837.232315][T19059] ? find_held_lock+0x2b/0x80 [ 837.232356][T19059] ? __mutex_unlock_slowpath+0x161/0x790 [ 837.232415][T19059] ? fput+0x70/0xf0 [ 837.232440][T19059] ? ksys_write+0x1ac/0x250 [ 837.232474][T19059] ? __pfx_ksys_write+0x10/0x10 [ 837.232516][T19059] __x64_sys_bpf+0x78/0xc0 [ 837.232541][T19059] ? lockdep_hardirqs_on+0x7c/0x110 [ 837.232578][T19059] do_syscall_64+0xcd/0xf80 [ 837.232617][T19059] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 837.232644][T19059] RIP: 0033:0x7f929ed8f7c9 [ 837.232666][T19059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 837.232689][T19059] RSP: 002b:00007f929fb94038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 837.232715][T19059] RAX: ffffffffffffffda RBX: 00007f929efe5fa0 RCX: 00007f929ed8f7c9 [ 837.232732][T19059] RDX: 0000000000000081 RSI: 0000200000000380 RDI: 000000000000001a [ 837.232747][T19059] RBP: 00007f929fb94090 R08: 0000000000000000 R09: 0000000000000000 [ 837.232761][T19059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 837.232777][T19059] R13: 00007f929efe6038 R14: 00007f929efe5fa0 R15: 00007ffdcb2ea728 [ 837.232814][T19059] [ 837.942246][ T5151] Bluetooth: hci3: command 0x0c1a tx timeout [ 837.942288][T18847] Bluetooth: hci4: command 0x0c1a tx timeout [ 837.948523][ T5839] Bluetooth: hci2: command 0x0c1a tx timeout [ 838.126090][ T5151] Bluetooth: hci5: command 0x0c1a tx timeout [ 838.145358][ T5839] Bluetooth: hci1: command 0x040f tx timeout [ 838.169123][T19067] netlink: 16 bytes leftover after parsing attributes in process `syz.6.2860'. [ 838.290753][ T5839] Bluetooth: hci6: command 0x0c1a tx timeout [ 839.145311][T19087] CIFS mount error: No usable UNC path provided in device string! [ 839.145311][T19087] [ 839.175049][T19087] CIFS: VFS: CIFS mount error: No usable UNC path provided in device string! [ 839.250046][T19085] netlink: 16 bytes leftover after parsing attributes in process `syz.3.2865'. [ 839.791133][T19093] netlink: 16 bytes leftover after parsing attributes in process `syz.5.2868'. [ 839.855110][ T30] audit: type=1800 audit(73468.675:118): pid=19100 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.2870" name="discovery_nqn" dev="configfs" ino=70732 res=0 errno=0 [ 840.779398][T19119] vivid-007: ================= START STATUS ================= [ 840.783596][T19123] CIFS mount error: No usable UNC path provided in device string! [ 840.783596][T19123] [ 840.811621][T19123] CIFS: VFS: CIFS mount error: No usable UNC path provided in device string! [ 840.857554][T19119] vivid-007: Generate PTS: true [ 840.862498][T19119] vivid-007: Generate SCR: true [ 840.906095][T19119] tpg source WxH: 320x240 (Y'CbCr) [ 840.927397][T19119] tpg field: 1 [ 840.936054][T19119] tpg crop: (0,0)/320x240 [ 840.940435][T19119] tpg compose: (0,0)/320x240 [ 840.945040][T19119] tpg colorspace: 8 [ 840.961141][T19119] tpg transfer function: 0/0 [ 840.974045][T19119] tpg Y'CbCr encoding: 0/0 [ 841.104031][T19119] tpg quantization: 0/0 [ 841.138595][T19119] tpg RGB range: 0/2 [ 841.142616][T19119] vivid-007: ================== END STATUS ================== [ 841.360449][T19124] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2874'. [ 841.453035][T19132] Setting dangerous option i915.mitigations - tainting kernel [ 841.468626][T19132] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 841.860165][T19143] FAULT_INJECTION: forcing a failure. [ 841.860165][T19143] name failslab, interval 1, probability 0, space 0, times 0 [ 841.891666][T19143] CPU: 0 UID: 0 PID: 19143 Comm: syz.6.2881 Tainted: G U L syzkaller #0 PREEMPT(full) [ 841.891723][T19143] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 841.891734][T19143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 841.891752][T19143] Call Trace: [ 841.891762][T19143] [ 841.891775][T19143] dump_stack_lvl+0x16c/0x1f0 [ 841.891825][T19143] should_fail_ex+0x512/0x640 [ 841.891858][T19143] ? fs_reclaim_acquire+0xae/0x150 [ 841.891906][T19143] should_failslab+0xc2/0x120 [ 841.891950][T19143] __kmalloc_noprof+0xeb/0x910 [ 841.891982][T19143] ? __pfx_from_kuid+0x10/0x10 [ 841.892022][T19143] ? tomoyo_init_log+0x1385/0x2140 [ 841.892067][T19143] ? tomoyo_init_log+0x1385/0x2140 [ 841.892103][T19143] tomoyo_init_log+0x1385/0x2140 [ 841.892164][T19143] ? __pfx_tomoyo_init_log+0x10/0x10 [ 841.892202][T19143] ? tomoyo_profile+0x47/0x60 [ 841.892240][T19143] ? tomoyo_domain_quota_is_ok+0x2f6/0x5a0 [ 841.892275][T19143] tomoyo_supervisor+0x302/0x13b0 [ 841.892322][T19143] ? __pfx_tomoyo_supervisor+0x10/0x10 [ 841.892367][T19143] ? kasan_quarantine_put+0x10a/0x240 [ 841.892422][T19143] ? tomoyo_realpath_from_path+0x19f/0x6e0 [ 841.892474][T19143] tomoyo_path_number_perm+0x448/0x580 [ 841.892512][T19143] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 841.892560][T19143] ? find_held_lock+0x2b/0x80 [ 841.892617][T19143] ? __pfx___d_add+0x10/0x10 [ 841.892647][T19143] ? d_alloc+0x176/0x1e0 [ 841.892670][T19143] ? current_check_access_path+0x33b/0x460 [ 841.892725][T19143] ? simple_lookup+0x105/0x1d0 [ 841.892768][T19143] ? lookup_one_qstr_excl+0xb3/0x250 [ 841.892806][T19143] tomoyo_path_mkdir+0x9b/0xe0 [ 841.892850][T19143] ? __pfx_tomoyo_path_mkdir+0x10/0x10 [ 841.892902][T19143] security_path_mkdir+0x154/0x2f0 [ 841.892932][T19143] do_mkdirat+0x16c/0x5e0 [ 841.892974][T19143] ? __pfx_do_mkdirat+0x10/0x10 [ 841.893015][T19143] ? strncpy_from_user+0x203/0x2e0 [ 841.893048][T19143] ? getname_flags.part.0+0x1c5/0x550 [ 841.893084][T19143] __x64_sys_mkdir+0xef/0x140 [ 841.893128][T19143] do_syscall_64+0xcd/0xf80 [ 841.893173][T19143] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 841.893203][T19143] RIP: 0033:0x7fb01378f7c9 [ 841.893228][T19143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 841.893256][T19143] RSP: 002b:00007fb0145fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 841.893284][T19143] RAX: ffffffffffffffda RBX: 00007fb0139e5fa0 RCX: 00007fb01378f7c9 [ 841.893305][T19143] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000 [ 841.893323][T19143] RBP: 00007fb013813f91 R08: 0000000000000000 R09: 0000000000000000 [ 841.893342][T19143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 841.893359][T19143] R13: 00007fb0139e6038 R14: 00007fb0139e5fa0 R15: 00007ffcf1bc08e8 [ 841.893400][T19143] [ 842.381615][T19150] lo: entered allmulticast mode [ 842.407234][T19151] lo: entered allmulticast mode [ 842.444224][T19150] lo: left allmulticast mode [ 842.453871][T19151] lo: left allmulticast mode [ 842.470420][T19150] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2883'. [ 842.500446][T19151] netlink: 20 bytes leftover after parsing attributes in process `syz.6.2884'. [ 842.614298][T19150] zswap: compressor û not available [ 842.623662][T19161] cifs: Unknown parameter 'T' [ 842.633334][T19161] CIFS mount error: No usable UNC path provided in device string! [ 842.633334][T19161] [ 842.643513][T19161] CIFS: VFS: CIFS mount error: No usable UNC path provided in device string! [ 842.997074][T19151] zswap: compressor û not available [ 843.007477][T19159] Setting dangerous option i915.mitigations - tainting kernel [ 843.489772][T19177] netlink: 'syz.1.2890': attribute type 2 has an invalid length. [ 843.986703][T19180] Setting dangerous option i915.mitigations - tainting kernel [ 844.026128][T19180] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 844.821216][T19201] netlink: 16 bytes leftover after parsing attributes in process `syz.6.2893'. [ 844.949741][T19206] cifs: Unknown parameter 'T' [ 844.978003][T19206] CIFS mount error: No usable UNC path provided in device string! [ 844.978003][T19206] [ 845.038463][T19206] CIFS: VFS: CIFS mount error: No usable UNC path provided in device string! [ 845.464312][T19214] FAULT_INJECTION: forcing a failure. [ 845.464312][T19214] name failslab, interval 1, probability 0, space 0, times 0 [ 845.486140][T19214] CPU: 1 UID: 0 PID: 19214 Comm: syz.1.2898 Tainted: G U L syzkaller #0 PREEMPT(full) [ 845.486199][T19214] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 845.486211][T19214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 845.486227][T19214] Call Trace: [ 845.486235][T19214] [ 845.486245][T19214] dump_stack_lvl+0x16c/0x1f0 [ 845.486290][T19214] should_fail_ex+0x512/0x640 [ 845.486326][T19214] should_failslab+0xc2/0x120 [ 845.486367][T19214] kmem_cache_alloc_node_noprof+0x86/0x800 [ 845.486401][T19214] ? __alloc_skb+0x156/0x410 [ 845.486435][T19214] ? __alloc_skb+0x156/0x410 [ 845.486460][T19214] __alloc_skb+0x156/0x410 [ 845.486487][T19214] ? __alloc_skb+0x35d/0x410 [ 845.486512][T19214] ? __pfx___alloc_skb+0x10/0x10 [ 845.486538][T19214] ? find_held_lock+0x2b/0x80 [ 845.486580][T19214] ? __lock_acquire+0x436/0x2890 [ 845.486610][T19214] sctp_packet_transmit+0x1ca/0x30b0 [ 845.486653][T19214] ? find_held_lock+0x2b/0x80 [ 845.486690][T19214] ? sctp_outq_flush+0xb4e/0x33a0 [ 845.486727][T19214] sctp_outq_flush+0xb68/0x33a0 [ 845.486762][T19214] ? __pfx_sctp_make_sack+0x10/0x10 [ 845.486801][T19214] ? __pfx_sctp_outq_flush+0x10/0x10 [ 845.486841][T19214] ? sctp_outq_tail+0x671/0xa80 [ 845.486878][T19214] sctp_do_sm+0x17d1/0x5e00 [ 845.486923][T19214] ? __pfx_sctp_do_sm+0x10/0x10 [ 845.487000][T19214] ? ktime_get+0x200/0x310 [ 845.487026][T19214] ? lockdep_hardirqs_on+0x7c/0x110 [ 845.487071][T19214] sctp_assoc_bh_rcv+0x392/0x6f0 [ 845.487109][T19214] sctp_inq_push+0x1db/0x270 [ 845.487140][T19214] sctp_backlog_rcv+0x169/0x590 [ 845.487188][T19214] ? __pfx_sctp_backlog_rcv+0x10/0x10 [ 845.487222][T19214] __release_sock+0x3a9/0x450 [ 845.487257][T19214] ? lockdep_hardirqs_on+0x7c/0x110 [ 845.487304][T19214] release_sock+0x5a/0x220 [ 845.487340][T19214] sctp_wait_for_connect+0x1c3/0x5e0 [ 845.487388][T19214] ? __pfx_sctp_wait_for_connect+0x10/0x10 [ 845.487431][T19214] ? skb_set_owner_w+0x37d/0x770 [ 845.487466][T19214] ? __pfx_autoremove_wake_function+0x10/0x10 [ 845.487509][T19214] ? sctp_datamsg_put+0x58/0x5f0 [ 845.487545][T19214] ? sctp_primitive_SEND+0x9f/0xd0 [ 845.487582][T19214] sctp_sendmsg_to_asoc+0x1885/0x1c50 [ 845.487626][T19214] ? sctp_assoc_set_primary+0x101/0x300 [ 845.487670][T19214] ? sctp_assoc_add_peer+0x252/0x1540 [ 845.487706][T19214] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 845.487749][T19214] ? sctp_connect_new_asoc+0x41e/0x770 [ 845.487783][T19214] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 845.487815][T19214] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 845.487864][T19214] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 845.487908][T19214] sctp_sendmsg+0xe99/0x1e20 [ 845.487950][T19214] ? __pfx_sctp_sendmsg+0x10/0x10 [ 845.487979][T19214] ? __pfx___might_resched+0x10/0x10 [ 845.488018][T19214] ? __lock_acquire+0x436/0x2890 [ 845.488050][T19214] ? aa_sk_perm+0x2f2/0xae0 [ 845.488089][T19214] ? __pfx_aa_sk_perm+0x10/0x10 [ 845.488132][T19214] ? __pfx_sctp_sendmsg+0x10/0x10 [ 845.488173][T19214] inet_sendmsg+0x11c/0x140 [ 845.488209][T19214] ____sys_sendmsg+0x973/0xc30 [ 845.488257][T19214] ? __pfx_____sys_sendmsg+0x10/0x10 [ 845.488305][T19214] ? find_held_lock+0x2b/0x80 [ 845.488341][T19214] ? futex_unqueue+0x133/0x2c0 [ 845.488378][T19214] ___sys_sendmsg+0x134/0x1d0 [ 845.488417][T19214] ? __pfx____sys_sendmsg+0x10/0x10 [ 845.488453][T19214] ? __pfx___futex_wait+0x10/0x10 [ 845.488508][T19214] ? find_held_lock+0x2b/0x80 [ 845.488567][T19214] __sys_sendmmsg+0x200/0x420 [ 845.488608][T19214] ? __pfx___sys_sendmmsg+0x10/0x10 [ 845.488657][T19214] ? __pfx_do_futex+0x10/0x10 [ 845.488705][T19214] ? __x64_sys_openat+0x174/0x210 [ 845.488740][T19214] ? xfd_validate_state+0x61/0x180 [ 845.488773][T19214] __x64_sys_sendmmsg+0x9c/0x100 [ 845.488808][T19214] ? lockdep_hardirqs_on+0x7c/0x110 [ 845.488849][T19214] do_syscall_64+0xcd/0xf80 [ 845.488892][T19214] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 845.488920][T19214] RIP: 0033:0x7f9ad238f7c9 [ 845.488944][T19214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 845.488971][T19214] RSP: 002b:00007f9ad32ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 845.488998][T19214] RAX: ffffffffffffffda RBX: 00007f9ad25e5fa0 RCX: 00007f9ad238f7c9 [ 845.489017][T19214] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000003 [ 845.489035][T19214] RBP: 00007f9ad2413f91 R08: 0000000000000000 R09: 0000000000000000 [ 845.489052][T19214] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 845.489068][T19214] R13: 00007f9ad25e6038 R14: 00007f9ad25e5fa0 R15: 00007fff312b47f8 [ 845.489108][T19214] [ 846.783092][T19225] netlink: 16 bytes leftover after parsing attributes in process `syz.6.2899'. [ 846.909100][T19221] FAULT_INJECTION: forcing a failure. [ 846.909100][T19221] name failslab, interval 1, probability 0, space 0, times 0 [ 846.986539][T19221] CPU: 0 UID: 0 PID: 19221 Comm: syz.1.2901 Tainted: G U L syzkaller #0 PREEMPT(full) [ 846.986593][T19221] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 846.986604][T19221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 846.986621][T19221] Call Trace: [ 846.986631][T19221] [ 846.986643][T19221] dump_stack_lvl+0x16c/0x1f0 [ 846.986691][T19221] should_fail_ex+0x512/0x640 [ 846.986723][T19221] ? __kmalloc_cache_noprof+0x5f/0x800 [ 846.986756][T19221] should_failslab+0xc2/0x120 [ 846.986794][T19221] __kmalloc_cache_noprof+0x80/0x800 [ 846.986836][T19221] ? sctp_datamsg_from_user+0x8d/0x1330 [ 846.986878][T19221] ? sctp_datamsg_from_user+0x8d/0x1330 [ 846.986908][T19221] sctp_datamsg_from_user+0x8d/0x1330 [ 846.986937][T19221] ? __sk_mem_raise_allocated+0x77d/0x14f0 [ 846.986983][T19221] ? sctp_primitive_ASSOCIATE+0x9c/0xd0 [ 846.987019][T19221] sctp_sendmsg_to_asoc+0xafa/0x1c50 [ 846.987058][T19221] ? sctp_assoc_set_primary+0x177/0x300 [ 846.987212][T19221] ? sctp_assoc_add_peer+0x252/0x1540 [ 846.987248][T19221] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 846.987292][T19221] ? sctp_connect_new_asoc+0x41e/0x770 [ 846.987324][T19221] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 846.987363][T19221] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 846.987412][T19221] sctp_sendmsg+0xe99/0x1e20 [ 846.987455][T19221] ? __pfx_sctp_sendmsg+0x10/0x10 [ 846.987483][T19221] ? __pfx___might_resched+0x10/0x10 [ 846.987521][T19221] ? __lock_acquire+0x436/0x2890 [ 846.987553][T19221] ? aa_sk_perm+0x2f2/0xae0 [ 846.987589][T19221] ? __pfx_aa_sk_perm+0x10/0x10 [ 846.987633][T19221] ? __pfx_sctp_sendmsg+0x10/0x10 [ 846.987666][T19221] inet_sendmsg+0x11c/0x140 [ 846.987701][T19221] ____sys_sendmsg+0x973/0xc30 [ 846.987751][T19221] ? __pfx_____sys_sendmsg+0x10/0x10 [ 846.987874][T19221] ? __pfx___schedule+0x10/0x10 [ 846.987922][T19221] ___sys_sendmsg+0x134/0x1d0 [ 846.987963][T19221] ? __pfx____sys_sendmsg+0x10/0x10 [ 846.988018][T19221] ? find_held_lock+0x2b/0x80 [ 846.988082][T19221] __sys_sendmmsg+0x200/0x420 [ 846.988124][T19221] ? __pfx___sys_sendmmsg+0x10/0x10 [ 846.988172][T19221] ? __pfx_do_futex+0x10/0x10 [ 846.988223][T19221] ? __x64_sys_openat+0x174/0x210 [ 846.988259][T19221] ? xfd_validate_state+0x61/0x180 [ 846.988295][T19221] __x64_sys_sendmmsg+0x9c/0x100 [ 846.988329][T19221] ? lockdep_hardirqs_on+0x7c/0x110 [ 846.988379][T19221] do_syscall_64+0xcd/0xf80 [ 846.988426][T19221] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 846.988456][T19221] RIP: 0033:0x7f9ad238f7c9 [ 846.988481][T19221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 846.988513][T19221] RSP: 002b:00007f9ad32ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 846.988539][T19221] RAX: ffffffffffffffda RBX: 00007f9ad25e5fa0 RCX: 00007f9ad238f7c9 [ 846.988558][T19221] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000003 [ 846.988582][T19221] RBP: 00007f9ad2413f91 R08: 0000000000000000 R09: 0000000000000000 [ 846.988600][T19221] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 846.988618][T19221] R13: 00007f9ad25e6038 R14: 00007f9ad25e5fa0 R15: 00007fff312b47f8 [ 846.988666][T19221] [ 848.272360][T19250] FAULT_INJECTION: forcing a failure. [ 848.272360][T19250] name failslab, interval 1, probability 0, space 0, times 0 [ 848.286008][T19250] CPU: 0 UID: 0 PID: 19250 Comm: syz.6.2909 Tainted: G U L syzkaller #0 PREEMPT(full) [ 848.286060][T19250] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 848.286076][T19250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 848.286095][T19250] Call Trace: [ 848.286105][T19250] [ 848.286121][T19250] dump_stack_lvl+0x16c/0x1f0 [ 848.286169][T19250] should_fail_ex+0x512/0x640 [ 848.286201][T19250] ? kmem_cache_alloc_noprof+0x62/0x770 [ 848.286241][T19250] should_failslab+0xc2/0x120 [ 848.286284][T19250] kmem_cache_alloc_noprof+0x83/0x770 [ 848.286318][T19250] ? sk_prot_alloc+0x60/0x2a0 [ 848.286366][T19250] ? sk_prot_alloc+0x60/0x2a0 [ 848.286407][T19250] sk_prot_alloc+0x60/0x2a0 [ 848.286453][T19250] sk_alloc+0x36/0xe30 [ 848.286488][T19250] pn_socket_create+0x22d/0x560 [ 848.286530][T19250] __sock_create+0x339/0x8a0 [ 848.286584][T19250] __sys_socket+0x14d/0x260 [ 848.286613][T19250] ? __pfx___sys_socket+0x10/0x10 [ 848.286655][T19250] ? __pfx___do_sys_rseq+0x10/0x10 [ 848.286698][T19250] __x64_sys_socket+0x72/0xb0 [ 848.286725][T19250] ? lockdep_hardirqs_on+0x7c/0x110 [ 848.286769][T19250] do_syscall_64+0xcd/0xf80 [ 848.286813][T19250] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 848.286844][T19250] RIP: 0033:0x7fb01378f7c9 [ 848.286870][T19250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 848.286899][T19250] RSP: 002b:00007fb0145fa038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 848.286927][T19250] RAX: ffffffffffffffda RBX: 00007fb0139e5fa0 RCX: 00007fb01378f7c9 [ 848.286948][T19250] RDX: 0000000000000000 RSI: 0000000000080805 RDI: 0000000000000023 [ 848.286967][T19250] RBP: 00007fb013813f91 R08: 0000000000000000 R09: 0000000000000000 [ 848.286983][T19250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 848.287002][T19250] R13: 00007fb0139e6038 R14: 00007fb0139e5fa0 R15: 00007ffcf1bc08e8 [ 848.287041][T19250] [ 849.619541][T19269] Setting dangerous option i915.mitigations - tainting kernel [ 849.642872][T19269] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 849.982893][T19268] netlink: 16 bytes leftover after parsing attributes in process `syz.3.2911'. [ 851.761573][T19298] lo: entered allmulticast mode [ 851.770296][T19298] lo: left allmulticast mode [ 851.880916][T19298] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2920'. [ 852.204898][T19299] zswap: compressor û not available [ 852.683846][T19308] Setting dangerous option i915.mitigations - tainting kernel [ 852.706152][T19308] Bad "i915.mitigations=Ìšá‚ß", 'Ìšá‚ß' is unknown [ 853.459450][T19322] FAULT_INJECTION: forcing a failure. [ 853.459450][T19322] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 853.510450][T19322] CPU: 0 UID: 0 PID: 19322 Comm: syz.5.2926 Tainted: G U L syzkaller #0 PREEMPT(full) [ 853.510502][T19322] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 853.510514][T19322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 853.510532][T19322] Call Trace: [ 853.510543][T19322] [ 853.510554][T19322] dump_stack_lvl+0x16c/0x1f0 [ 853.510604][T19322] should_fail_ex+0x512/0x640 [ 853.510642][T19322] _copy_from_iter+0x43b/0x16c0 [ 853.510684][T19322] ? __pfx__copy_from_iter+0x10/0x10 [ 853.510714][T19322] ? sctp_addto_chunk+0xfa/0x2a0 [ 853.510753][T19322] ? __asan_memcpy+0x3c/0x60 [ 853.510788][T19322] ? sctp_make_datafrag_empty+0x1c3/0x240 [ 853.510828][T19322] ? __pfx_sctp_make_datafrag_empty+0x10/0x10 [ 853.510875][T19322] sctp_user_addto_chunk+0x84/0x240 [ 853.510986][T19322] sctp_datamsg_from_user+0x5b6/0x1330 [ 853.511043][T19322] sctp_sendmsg_to_asoc+0xafa/0x1c50 [ 853.511089][T19322] ? sctp_assoc_set_primary+0x177/0x300 [ 853.511136][T19322] ? sctp_assoc_add_peer+0x252/0x1540 [ 853.511170][T19322] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 853.511214][T19322] ? sctp_connect_new_asoc+0x41e/0x770 [ 853.511258][T19322] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 853.511298][T19322] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 853.511343][T19322] sctp_sendmsg+0xe99/0x1e20 [ 853.511389][T19322] ? __pfx_sctp_sendmsg+0x10/0x10 [ 853.511417][T19322] ? __pfx___might_resched+0x10/0x10 [ 853.511451][T19322] ? __lock_acquire+0x436/0x2890 [ 853.511483][T19322] ? aa_sk_perm+0x2f2/0xae0 [ 853.511517][T19322] ? __pfx_aa_sk_perm+0x10/0x10 [ 853.511558][T19322] ? __pfx_sctp_sendmsg+0x10/0x10 [ 853.511589][T19322] inet_sendmsg+0x11c/0x140 [ 853.511623][T19322] ____sys_sendmsg+0x973/0xc30 [ 853.511669][T19322] ? __pfx_____sys_sendmsg+0x10/0x10 [ 853.511718][T19322] ? __pfx___schedule+0x10/0x10 [ 853.511761][T19322] ___sys_sendmsg+0x134/0x1d0 [ 853.511796][T19322] ? __pfx____sys_sendmsg+0x10/0x10 [ 853.511849][T19322] ? find_held_lock+0x2b/0x80 [ 853.511907][T19322] __sys_sendmmsg+0x200/0x420 [ 853.511958][T19322] ? __pfx___sys_sendmmsg+0x10/0x10 [ 853.512012][T19322] ? __pfx_do_futex+0x10/0x10 [ 853.512061][T19322] ? __x64_sys_openat+0x174/0x210 [ 853.512095][T19322] ? xfd_validate_state+0x61/0x180 [ 853.512129][T19322] __x64_sys_sendmmsg+0x9c/0x100 [ 853.512163][T19322] ? lockdep_hardirqs_on+0x7c/0x110 [ 853.512202][T19322] do_syscall_64+0xcd/0xf80 [ 853.512247][T19322] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 853.512275][T19322] RIP: 0033:0x7f2ac938f7c9 [ 853.512300][T19322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 853.512328][T19322] RSP: 002b:00007f2aca29b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 853.512357][T19322] RAX: ffffffffffffffda RBX: 00007f2ac95e5fa0 RCX: 00007f2ac938f7c9 [ 853.512378][T19322] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000004 [ 853.512396][T19322] RBP: 00007f2ac9413f91 R08: 0000000000000000 R09: 0000000000000000 [ 853.512412][T19322] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 853.512429][T19322] R13: 00007f2ac95e6038 R14: 00007f2ac95e5fa0 R15: 00007ffd59b11ce8 [ 853.512467][T19322] [ 853.518904][T19325] FAULT_INJECTION: forcing a failure. [ 853.518904][T19325] name failslab, interval 1, probability 0, space 0, times 0 [ 853.895767][T19325] CPU: 1 UID: 0 PID: 19325 Comm: syz.6.2925 Tainted: G U L syzkaller #0 PREEMPT(full) [ 853.895815][T19325] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 853.895825][T19325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 853.895842][T19325] Call Trace: [ 853.895851][T19325] [ 853.895862][T19325] dump_stack_lvl+0x16c/0x1f0 [ 853.895915][T19325] should_fail_ex+0x512/0x640 [ 853.895941][T19325] ? kmem_cache_alloc_noprof+0x62/0x770 [ 853.895974][T19325] should_failslab+0xc2/0x120 [ 853.896020][T19325] kmem_cache_alloc_noprof+0x83/0x770 [ 853.896053][T19325] ? alloc_empty_file+0x55/0x1e0 [ 853.896089][T19325] ? alloc_empty_file+0x55/0x1e0 [ 853.896115][T19325] alloc_empty_file+0x55/0x1e0 [ 853.896144][T19325] alloc_file_pseudo+0x13a/0x230 [ 853.896176][T19325] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 853.896210][T19325] ? do_raw_spin_unlock+0x172/0x230 [ 853.896244][T19325] __anon_inode_getfile+0xe8/0x280 [ 853.896275][T19325] anon_inode_getfile_fmode+0x37/0xa0 [ 853.896303][T19325] do_eventfd+0x156/0x390 [ 853.896330][T19325] ? rcu_is_watching+0x12/0xc0 [ 853.896364][T19325] __x64_sys_eventfd+0x32/0x50 [ 853.896395][T19325] do_syscall_64+0xcd/0xf80 [ 853.896435][T19325] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 853.896461][T19325] RIP: 0033:0x7fb01378f7c9 [ 853.896483][T19325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 853.896508][T19325] RSP: 002b:00007fb0145d9038 EFLAGS: 00000246 ORIG_RAX: 000000000000011c [ 853.896533][T19325] RAX: ffffffffffffffda RBX: 00007fb0139e6090 RCX: 00007fb01378f7c9 [ 853.896551][T19325] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000080 [ 853.896567][T19325] RBP: 00007fb013813f91 R08: 0000000000000000 R09: 0000000000000000 [ 853.896582][T19325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 853.896597][T19325] R13: 00007fb0139e6128 R14: 00007fb0139e6090 R15: 00007ffcf1bc08e8 [ 853.896629][T19325] [ 853.957238][T19329] netlink: 330 bytes leftover after parsing attributes in process `syz.6.2925'. [ 854.299043][T19317] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2924'. [ 854.357050][T19325] FAULT_INJECTION: forcing a failure. [ 854.357050][T19325] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 854.357098][T19325] CPU: 1 UID: 0 PID: 19325 Comm: syz.6.2925 Tainted: G U L syzkaller #0 PREEMPT(full) [ 854.357120][T19325] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 854.357126][T19325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 854.357135][T19325] Call Trace: [ 854.357140][T19325] [ 854.357146][T19325] dump_stack_lvl+0x16c/0x1f0 [ 854.357171][T19325] should_fail_ex+0x512/0x640 [ 854.357191][T19325] _copy_to_user+0x32/0xd0 [ 854.357209][T19325] simple_read_from_buffer+0xcb/0x170 [ 854.357231][T19325] proc_fail_nth_read+0x197/0x240 [ 854.357256][T19325] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 854.357288][T19325] ? rw_verify_area+0xcf/0x6c0 [ 854.357307][T19325] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 854.357330][T19325] vfs_read+0x1e4/0xcf0 [ 854.357350][T19325] ? __pfx___mutex_lock+0x10/0x10 [ 854.357374][T19325] ? __pfx_vfs_read+0x10/0x10 [ 854.357399][T19325] ? __fget_files+0x20e/0x3c0 [ 854.357424][T19325] ksys_read+0x12a/0x250 [ 854.357443][T19325] ? __pfx_ksys_read+0x10/0x10 [ 854.357469][T19325] do_syscall_64+0xcd/0xf80 [ 854.357491][T19325] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 854.357506][T19325] RIP: 0033:0x7fb01378e1dc [ 854.357519][T19325] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 854.357533][T19325] RSP: 002b:00007fb0145d9030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 854.357547][T19325] RAX: ffffffffffffffda RBX: 00007fb0139e6090 RCX: 00007fb01378e1dc [ 854.357557][T19325] RDX: 000000000000000f RSI: 00007fb0145d90a0 RDI: 0000000000000009 [ 854.357566][T19325] RBP: 00007fb0145d9090 R08: 0000000000000000 R09: 0000000000000000 [ 854.357574][T19325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 854.357583][T19325] R13: 00007fb0139e6128 R14: 00007fb0139e6090 R15: 00007ffcf1bc08e8 [ 854.357603][T19325] [ 854.855489][T16610] NFSD: Failed to start, no listeners configured. [ 857.512771][T19365] netlink: 40 bytes leftover after parsing attributes in process `syz.5.2935'. [ 858.229212][T19383] netlink: 16 bytes leftover after parsing attributes in process `syz.5.2937'. [ 858.472104][T19380] FAULT_INJECTION: forcing a failure. [ 858.472104][T19380] name failslab, interval 1, probability 0, space 0, times 0 [ 858.541005][T19380] CPU: 1 UID: 0 PID: 19380 Comm: syz.3.2938 Tainted: G U L syzkaller #0 PREEMPT(full) [ 858.541054][T19380] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 858.541066][T19380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 858.541084][T19380] Call Trace: [ 858.541095][T19380] [ 858.541107][T19380] dump_stack_lvl+0x16c/0x1f0 [ 858.541152][T19380] should_fail_ex+0x512/0x640 [ 858.541190][T19380] should_failslab+0xc2/0x120 [ 858.541233][T19380] __kmalloc_cache_noprof+0x80/0x800 [ 858.541267][T19380] ? sctp_add_bind_addr+0xae/0x3f0 [ 858.541307][T19380] ? sctp_add_bind_addr+0xae/0x3f0 [ 858.541341][T19380] sctp_add_bind_addr+0xae/0x3f0 [ 858.541395][T19380] sctp_copy_local_addr_list+0x349/0x550 [ 858.541442][T19380] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 858.541486][T19380] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360 [ 858.541530][T19380] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 858.541579][T19380] sctp_bind_addr_copy+0xe0/0x530 [ 858.541624][T19380] sctp_connect_new_asoc+0x1c9/0x770 [ 858.541658][T19380] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 858.541697][T19380] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 858.541741][T19380] sctp_sendmsg+0x157c/0x1e20 [ 858.541782][T19380] ? __pfx_sctp_sendmsg+0x10/0x10 [ 858.541809][T19380] ? __pfx___might_resched+0x10/0x10 [ 858.541845][T19380] ? __lock_acquire+0x436/0x2890 [ 858.541876][T19380] ? aa_sk_perm+0x2f2/0xae0 [ 858.541914][T19380] ? __pfx_aa_sk_perm+0x10/0x10 [ 858.541956][T19380] ? __pfx_sctp_sendmsg+0x10/0x10 [ 858.541988][T19380] inet_sendmsg+0x11c/0x140 [ 858.542023][T19380] ____sys_sendmsg+0x973/0xc30 [ 858.542073][T19380] ? __pfx_____sys_sendmsg+0x10/0x10 [ 858.542120][T19380] ? find_held_lock+0x2b/0x80 [ 858.542154][T19380] ? futex_unqueue+0x133/0x2c0 [ 858.542173][T19380] ___sys_sendmsg+0x134/0x1d0 [ 858.542193][T19380] ? __pfx____sys_sendmsg+0x10/0x10 [ 858.542212][T19380] ? __pfx___futex_wait+0x10/0x10 [ 858.542239][T19380] ? find_held_lock+0x2b/0x80 [ 858.542270][T19380] __sys_sendmmsg+0x200/0x420 [ 858.542290][T19380] ? __pfx___sys_sendmmsg+0x10/0x10 [ 858.542317][T19380] ? __pfx_do_futex+0x10/0x10 [ 858.542342][T19380] ? __x64_sys_openat+0x174/0x210 [ 858.542361][T19380] ? xfd_validate_state+0x61/0x180 [ 858.542379][T19380] __x64_sys_sendmmsg+0x9c/0x100 [ 858.542398][T19380] ? lockdep_hardirqs_on+0x7c/0x110 [ 858.542419][T19380] do_syscall_64+0xcd/0xf80 [ 858.542442][T19380] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 858.542458][T19380] RIP: 0033:0x7f929ed8f7c9 [ 858.542471][T19380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 858.542487][T19380] RSP: 002b:00007f929fb94038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 858.542502][T19380] RAX: ffffffffffffffda RBX: 00007f929efe5fa0 RCX: 00007f929ed8f7c9 [ 858.542512][T19380] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000003 [ 858.542521][T19380] RBP: 00007f929ee13f91 R08: 0000000000000000 R09: 0000000000000000 [ 858.542530][T19380] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 858.542540][T19380] R13: 00007f929efe6038 R14: 00007f929efe5fa0 R15: 00007ffdcb2ea728 [ 858.542568][T19380] [ 859.123447][T19394] FAULT_INJECTION: forcing a failure. [ 859.123447][T19394] name failslab, interval 1, probability 0, space 0, times 0 [ 859.196836][T19394] CPU: 0 UID: 0 PID: 19394 Comm: syz.5.2940 Tainted: G U L syzkaller #0 PREEMPT(full) [ 859.196871][T19394] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 859.196881][T19394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 859.196897][T19394] Call Trace: [ 859.196906][T19394] [ 859.196918][T19394] dump_stack_lvl+0x16c/0x1f0 [ 859.196964][T19394] should_fail_ex+0x512/0x640 [ 859.196992][T19394] should_failslab+0xc2/0x120 [ 859.197017][T19394] __kmalloc_noprof+0xeb/0x910 [ 859.197034][T19394] ? __lock_acquire+0x436/0x2890 [ 859.197047][T19394] ? sctp_bind_addrs_to_raw+0x12c/0x3e0 [ 859.197070][T19394] ? sctp_bind_addrs_to_raw+0x12c/0x3e0 [ 859.197089][T19394] sctp_bind_addrs_to_raw+0x12c/0x3e0 [ 859.197111][T19394] ? __lock_acquire+0x436/0x2890 [ 859.197125][T19394] ? __pfx_sctp_bind_addrs_to_raw+0x10/0x10 [ 859.197152][T19394] sctp_make_init+0x148/0xdc0 [ 859.197174][T19394] ? is_bpf_text_address+0x8a/0x1a0 [ 859.197203][T19394] ? bpf_ksym_find+0x124/0x1c0 [ 859.197220][T19394] ? __pfx_sctp_make_init+0x10/0x10 [ 859.197241][T19394] ? kernel_text_address+0x8d/0x100 [ 859.197261][T19394] ? unwind_get_return_address+0x59/0xa0 [ 859.197280][T19394] ? arch_stack_walk+0xa6/0x100 [ 859.197299][T19394] ? sctp_sm_lookup_event+0x15b/0x570 [ 859.197320][T19394] ? __pfx_sctp_sm_lookup_event+0x10/0x10 [ 859.197342][T19394] sctp_sf_do_prm_asoc+0xbf/0x360 [ 859.197357][T19394] ? __pfx_sctp_pname+0x10/0x10 [ 859.197376][T19394] sctp_do_sm+0x181/0x5e00 [ 859.197397][T19394] ? kasan_save_stack+0x42/0x60 [ 859.197415][T19394] ? kasan_save_stack+0x33/0x60 [ 859.197433][T19394] ? kasan_save_track+0x14/0x30 [ 859.197452][T19394] ? __pfx_sctp_do_sm+0x10/0x10 [ 859.197468][T19394] ? sctp_sendmsg+0xe99/0x1e20 [ 859.197483][T19394] ? ____sys_sendmsg+0x973/0xc30 [ 859.197504][T19394] ? ___sys_sendmsg+0x134/0x1d0 [ 859.197520][T19394] ? __sys_sendmmsg+0x200/0x420 [ 859.197537][T19394] ? __x64_sys_sendmmsg+0x9c/0x100 [ 859.197554][T19394] ? do_syscall_64+0xcd/0xf80 [ 859.197593][T19394] ? sk_leave_memory_pressure+0xdd/0x130 [ 859.197616][T19394] ? __sk_mem_raise_allocated+0x77d/0x14f0 [ 859.197640][T19394] sctp_primitive_ASSOCIATE+0x9c/0xd0 [ 859.197659][T19394] sctp_sendmsg_to_asoc+0xa4a/0x1c50 [ 859.197683][T19394] ? sctp_assoc_set_primary+0x177/0x300 [ 859.197706][T19394] ? sctp_assoc_add_peer+0x252/0x1540 [ 859.197725][T19394] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 859.197747][T19394] ? sctp_connect_new_asoc+0x41e/0x770 [ 859.197764][T19394] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 859.197784][T19394] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 859.197808][T19394] sctp_sendmsg+0xe99/0x1e20 [ 859.197830][T19394] ? __pfx_sctp_sendmsg+0x10/0x10 [ 859.197845][T19394] ? __pfx___might_resched+0x10/0x10 [ 859.197868][T19394] ? __lock_acquire+0x436/0x2890 [ 859.197885][T19394] ? aa_sk_perm+0x2f2/0xae0 [ 859.197905][T19394] ? __pfx_aa_sk_perm+0x10/0x10 [ 859.197929][T19394] ? __pfx_sctp_sendmsg+0x10/0x10 [ 859.197946][T19394] inet_sendmsg+0x11c/0x140 [ 859.197964][T19394] ____sys_sendmsg+0x973/0xc30 [ 859.197989][T19394] ? __pfx_____sys_sendmsg+0x10/0x10 [ 859.198014][T19394] ? __pfx___schedule+0x10/0x10 [ 859.198037][T19394] ___sys_sendmsg+0x134/0x1d0 [ 859.198056][T19394] ? __pfx____sys_sendmsg+0x10/0x10 [ 859.198084][T19394] ? find_held_lock+0x2b/0x80 [ 859.198114][T19394] __sys_sendmmsg+0x200/0x420 [ 859.198135][T19394] ? __pfx___sys_sendmmsg+0x10/0x10 [ 859.198159][T19394] ? __pfx_do_futex+0x10/0x10 [ 859.198190][T19394] ? __x64_sys_openat+0x174/0x210 [ 859.198209][T19394] ? xfd_validate_state+0x61/0x180 [ 859.198228][T19394] __x64_sys_sendmmsg+0x9c/0x100 [ 859.198247][T19394] ? lockdep_hardirqs_on+0x7c/0x110 [ 859.198269][T19394] do_syscall_64+0xcd/0xf80 [ 859.198292][T19394] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 859.198308][T19394] RIP: 0033:0x7f2ac938f7c9 [ 859.198322][T19394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 859.198337][T19394] RSP: 002b:00007f2aca27a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 859.198352][T19394] RAX: ffffffffffffffda RBX: 00007f2ac95e6090 RCX: 00007f2ac938f7c9 [ 859.198363][T19394] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000004 [ 859.198372][T19394] RBP: 00007f2ac9413f91 R08: 0000000000000000 R09: 0000000000000000 [ 859.198382][T19394] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 859.198390][T19394] R13: 00007f2ac95e6128 R14: 00007f2ac95e6090 R15: 00007ffd59b11ce8 [ 859.198412][T19394] [ 859.814073][T19397] FAULT_INJECTION: forcing a failure. [ 859.814073][T19397] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 859.855799][T19397] CPU: 1 UID: 0 PID: 19397 Comm: syz.5.2944 Tainted: G U L syzkaller #0 PREEMPT(full) [ 859.855851][T19397] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 859.855862][T19397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 859.855879][T19397] Call Trace: [ 859.855888][T19397] [ 859.855900][T19397] dump_stack_lvl+0x16c/0x1f0 [ 859.855946][T19397] should_fail_ex+0x512/0x640 [ 859.855980][T19397] _copy_from_iter+0x43b/0x16c0 [ 859.856018][T19397] ? __pfx__copy_from_iter+0x10/0x10 [ 859.856045][T19397] ? sctp_addto_chunk+0xfa/0x2a0 [ 859.856095][T19397] ? __asan_memcpy+0x3c/0x60 [ 859.856129][T19397] ? sctp_make_datafrag_empty+0x1c3/0x240 [ 859.856166][T19397] ? __pfx_sctp_make_datafrag_empty+0x10/0x10 [ 859.856205][T19397] sctp_user_addto_chunk+0x84/0x240 [ 859.856244][T19397] sctp_datamsg_from_user+0x5b6/0x1330 [ 859.856293][T19397] sctp_sendmsg_to_asoc+0xafa/0x1c50 [ 859.856337][T19397] ? sctp_assoc_set_primary+0x177/0x300 [ 859.856389][T19397] ? sctp_assoc_add_peer+0x252/0x1540 [ 859.856423][T19397] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 859.856461][T19397] ? sctp_connect_new_asoc+0x41e/0x770 [ 859.856492][T19397] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 859.856520][T19397] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 859.856564][T19397] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 859.856611][T19397] sctp_sendmsg+0xe99/0x1e20 [ 859.856650][T19397] ? __pfx_sctp_sendmsg+0x10/0x10 [ 859.856678][T19397] ? __pfx___might_resched+0x10/0x10 [ 859.856712][T19397] ? __lock_acquire+0x436/0x2890 [ 859.856742][T19397] ? aa_sk_perm+0x2f2/0xae0 [ 859.856775][T19397] ? __pfx_aa_sk_perm+0x10/0x10 [ 859.856813][T19397] ? __pfx_sctp_sendmsg+0x10/0x10 [ 859.856843][T19397] inet_sendmsg+0x11c/0x140 [ 859.856875][T19397] ____sys_sendmsg+0x973/0xc30 [ 859.856920][T19397] ? __pfx_____sys_sendmsg+0x10/0x10 [ 859.856971][T19397] ? __pfx___schedule+0x10/0x10 [ 859.857016][T19397] ___sys_sendmsg+0x134/0x1d0 [ 859.857051][T19397] ? __pfx____sys_sendmsg+0x10/0x10 [ 859.857096][T19397] ? find_held_lock+0x2b/0x80 [ 859.857145][T19397] __sys_sendmmsg+0x200/0x420 [ 859.857181][T19397] ? __pfx___sys_sendmmsg+0x10/0x10 [ 859.857226][T19397] ? __pfx_do_futex+0x10/0x10 [ 859.857278][T19397] ? xfd_validate_state+0x61/0x180 [ 859.857306][T19397] __x64_sys_sendmmsg+0x9c/0x100 [ 859.857338][T19397] ? lockdep_hardirqs_on+0x7c/0x110 [ 859.857387][T19397] do_syscall_64+0xcd/0xf80 [ 859.857433][T19397] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 859.857462][T19397] RIP: 0033:0x7f2ac938f7c9 [ 859.857485][T19397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 859.857512][T19397] RSP: 002b:00007f2aca29b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 859.857540][T19397] RAX: ffffffffffffffda RBX: 00007f2ac95e5fa0 RCX: 00007f2ac938f7c9 [ 859.857560][T19397] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000003 [ 859.857577][T19397] RBP: 00007f2ac9413f91 R08: 0000000000000000 R09: 0000000000000000 [ 859.857594][T19397] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 859.857612][T19397] R13: 00007f2ac95e6038 R14: 00007f2ac95e5fa0 R15: 00007ffd59b11ce8 [ 859.857648][T19397] [ 860.411922][T19410] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 860.575372][T19408] usb usb26: usbfs: interface 0 claimed by hub while 'syz.1.2943' resets device [ 862.410503][T19435] netlink: 16 bytes leftover after parsing attributes in process `syz.3.2949'. [ 863.110658][T19447] FAULT_INJECTION: forcing a failure. [ 863.110658][T19447] name fail_futex, interval 1, probability 0, space 0, times 0 [ 863.136131][T19447] CPU: 1 UID: 0 PID: 19447 Comm: syz.5.2952 Tainted: G U L syzkaller #0 PREEMPT(full) [ 863.136179][T19447] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 863.136189][T19447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 863.136206][T19447] Call Trace: [ 863.136215][T19447] [ 863.136227][T19447] dump_stack_lvl+0x16c/0x1f0 [ 863.136271][T19447] should_fail_ex+0x512/0x640 [ 863.136302][T19447] get_futex_key+0x1085/0x15f0 [ 863.136332][T19447] ? __pfx_get_futex_key+0x10/0x10 [ 863.136369][T19447] futex_wake+0xea/0x530 [ 863.136396][T19447] ? __pfx_futex_wake+0x10/0x10 [ 863.136423][T19447] do_futex+0x1e3/0x350 [ 863.136440][T19447] ? __pfx_do_futex+0x10/0x10 [ 863.136455][T19447] ? __might_fault+0xe3/0x190 [ 863.136477][T19447] mm_release+0x24e/0x300 [ 863.136497][T19447] do_exit+0x69e/0x2bd0 [ 863.136515][T19447] ? __pfx_do_exit+0x10/0x10 [ 863.136528][T19447] ? do_raw_spin_lock+0x12c/0x2b0 [ 863.136545][T19447] ? find_held_lock+0x2b/0x80 [ 863.136566][T19447] do_group_exit+0xd3/0x2a0 [ 863.136581][T19447] get_signal+0x2671/0x26d0 [ 863.136605][T19447] ? kmem_cache_free+0x2d8/0x770 [ 863.136625][T19447] ? __pfx_get_signal+0x10/0x10 [ 863.136646][T19447] ? do_futex+0x122/0x350 [ 863.136663][T19447] arch_do_signal_or_restart+0x8f/0x7a0 [ 863.136685][T19447] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 863.136710][T19447] ? __pfx___x64_sys_futex+0x10/0x10 [ 863.136730][T19447] exit_to_user_mode_loop+0x8c/0x540 [ 863.136753][T19447] do_syscall_64+0x4ee/0xf80 [ 863.136776][T19447] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 863.136792][T19447] RIP: 0033:0x7f2ac938f7c9 [ 863.136804][T19447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 863.136819][T19447] RSP: 002b:00007f2aca27a0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 863.136834][T19447] RAX: fffffffffffffe00 RBX: 00007f2ac95e6098 RCX: 00007f2ac938f7c9 [ 863.136844][T19447] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f2ac95e6098 [ 863.136853][T19447] RBP: 00007f2ac95e6090 R08: 0000000000000000 R09: 0000000000000000 [ 863.136863][T19447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 863.136871][T19447] R13: 00007f2ac95e6128 R14: 00007ffd59b11c00 R15: 00007ffd59b11ce8 [ 863.136891][T19447] [ 863.408382][T19438] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2950'. [ 865.304895][T19465] netlink: 'syz.1.2956': attribute type 10 has an invalid length. [ 865.320140][T19465] netlink: 330 bytes leftover after parsing attributes in process `syz.1.2956'. [ 866.805995][T19489] snd_aloop snd_aloop.0: control 7:268:7:ª¸è:2 is already present [ 866.896277][T19490] netlink: 16 bytes leftover after parsing attributes in process `syz.5.2962'. [ 869.354050][T19528] FAULT_INJECTION: forcing a failure. [ 869.354050][T19528] name failslab, interval 1, probability 0, space 0, times 0 [ 869.386047][T19528] CPU: 1 UID: 0 PID: 19528 Comm: syz.1.2974 Tainted: G U L syzkaller #0 PREEMPT(full) [ 869.386094][T19528] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 869.386106][T19528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 869.386126][T19528] Call Trace: [ 869.386137][T19528] [ 869.386148][T19528] dump_stack_lvl+0x16c/0x1f0 [ 869.386204][T19528] should_fail_ex+0x512/0x640 [ 869.386234][T19528] ? __kmalloc_cache_noprof+0x5f/0x800 [ 869.386275][T19528] should_failslab+0xc2/0x120 [ 869.386316][T19528] __kmalloc_cache_noprof+0x80/0x800 [ 869.386347][T19528] ? __kthread_create_on_node+0xce/0x3f0 [ 869.386391][T19528] ? __pfx_rescuer_thread+0x10/0x10 [ 869.386420][T19528] ? __kthread_create_on_node+0xce/0x3f0 [ 869.386457][T19528] __kthread_create_on_node+0xce/0x3f0 [ 869.386497][T19528] ? __pfx___kthread_create_on_node+0x10/0x10 [ 869.386545][T19528] ? __pfx_vsnprintf+0x10/0x10 [ 869.386584][T19528] ? __pfx_rescuer_thread+0x10/0x10 [ 869.386613][T19528] kthread_create_on_node+0xc7/0x100 [ 869.386651][T19528] ? __pfx_kthread_create_on_node+0x10/0x10 [ 869.386689][T19528] ? __pfx_scnprintf+0x10/0x10 [ 869.386740][T19528] init_rescuer+0x319/0x590 [ 869.386765][T19528] ? __pfx_init_rescuer+0x10/0x10 [ 869.386800][T19528] ? wq_adjust_max_active+0x39d/0x4a0 [ 869.386830][T19528] __alloc_workqueue+0xda4/0x1810 [ 869.386880][T19528] alloc_workqueue_noprof+0xd2/0x200 [ 869.386919][T19528] ? __pfx_alloc_workqueue_noprof+0x10/0x10 [ 869.386977][T19528] nci_register_device+0x394/0xb80 [ 869.387010][T19528] ? __pfx_nci_register_device+0x10/0x10 [ 869.387045][T19528] ? lockdep_init_map_type+0x5c/0x270 [ 869.387077][T19528] virtual_ncidev_open+0x141/0x220 [ 869.387118][T19528] ? __pfx_virtual_ncidev_open+0x10/0x10 [ 869.387158][T19528] misc_open+0x26d/0x450 [ 869.387192][T19528] ? __pfx_misc_open+0x10/0x10 [ 869.387221][T19528] chrdev_open+0x234/0x6a0 [ 869.387258][T19528] ? __pfx_apparmor_file_open+0x10/0x10 [ 869.387286][T19528] ? __pfx_chrdev_open+0x10/0x10 [ 869.387326][T19528] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 869.387373][T19528] do_dentry_open+0x748/0x1590 [ 869.387410][T19528] ? __pfx_chrdev_open+0x10/0x10 [ 869.387458][T19528] vfs_open+0x82/0x3f0 [ 869.387490][T19528] path_openat+0x2078/0x3140 [ 869.387538][T19528] ? __pfx_path_openat+0x10/0x10 [ 869.387589][T19528] do_filp_open+0x20b/0x470 [ 869.387627][T19528] ? __pfx_do_filp_open+0x10/0x10 [ 869.387689][T19528] ? alloc_fd+0x471/0x7d0 [ 869.387735][T19528] do_sys_openat2+0x121/0x290 [ 869.387764][T19528] ? __pfx_do_sys_openat2+0x10/0x10 [ 869.387794][T19528] ? __fput+0x68d/0xb70 [ 869.387827][T19528] __x64_sys_openat+0x174/0x210 [ 869.387857][T19528] ? __pfx___x64_sys_openat+0x10/0x10 [ 869.387900][T19528] do_syscall_64+0xcd/0xf80 [ 869.387939][T19528] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 869.387967][T19528] RIP: 0033:0x7f9ad238f7c9 [ 869.387995][T19528] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 869.388021][T19528] RSP: 002b:00007f9ad32ef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 869.388047][T19528] RAX: ffffffffffffffda RBX: 00007f9ad25e5fa0 RCX: 00007f9ad238f7c9 [ 869.388065][T19528] RDX: 0000000000000002 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 869.388083][T19528] RBP: 00007f9ad2413f91 R08: 0000000000000000 R09: 0000000000000000 [ 869.388100][T19528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 869.388116][T19528] R13: 00007f9ad25e6038 R14: 00007f9ad25e5fa0 R15: 00007fff312b47f8 [ 869.388152][T19528] [ 869.388171][T19528] workqueue: Failed to create a rescuer kthread for wq "nfc2_nci_rx_wq": -ENOMEM [ 870.246455][ T5839] Bluetooth: hci4: unexpected subevent 0x01 length: 3 < 18 [ 870.347499][T19539] FAULT_INJECTION: forcing a failure. [ 870.347499][T19539] name failslab, interval 1, probability 0, space 0, times 0 [ 870.451629][T19539] CPU: 0 UID: 0 PID: 19539 Comm: syz.3.2976 Tainted: G U L syzkaller #0 PREEMPT(full) [ 870.451688][T19539] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 870.451700][T19539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 870.451718][T19539] Call Trace: [ 870.451728][T19539] [ 870.451739][T19539] dump_stack_lvl+0x16c/0x1f0 [ 870.451801][T19539] should_fail_ex+0x512/0x640 [ 870.451834][T19539] ? __kmalloc_noprof+0xca/0x910 [ 870.451878][T19539] should_failslab+0xc2/0x120 [ 870.451928][T19539] __kmalloc_noprof+0xeb/0x910 [ 870.451974][T19539] ? lsm_blob_alloc+0x68/0x90 [ 870.452024][T19539] ? lsm_blob_alloc+0x68/0x90 [ 870.452063][T19539] lsm_blob_alloc+0x68/0x90 [ 870.452106][T19539] security_sk_alloc+0x2f/0x270 [ 870.452139][T19539] sk_prot_alloc+0x1c7/0x2a0 [ 870.452186][T19539] sk_alloc+0x36/0xe30 [ 870.452220][T19539] __netlink_create+0x5e/0x2c0 [ 870.452254][T19539] ? __wake_up+0x3f/0x60 [ 870.452297][T19539] netlink_create+0x39e/0x620 [ 870.452333][T19539] ? __pfx_genl_bind+0x10/0x10 [ 870.452375][T19539] ? __pfx_genl_unbind+0x10/0x10 [ 870.452416][T19539] ? __pfx_genl_release+0x10/0x10 [ 870.452465][T19539] __sock_create+0x339/0x8a0 [ 870.452518][T19539] __sys_socket+0x14d/0x260 [ 870.452548][T19539] ? __pfx___sys_socket+0x10/0x10 [ 870.452577][T19539] ? xfd_validate_state+0x61/0x180 [ 870.452614][T19539] __x64_sys_socket+0x72/0xb0 [ 870.452642][T19539] ? lockdep_hardirqs_on+0x7c/0x110 [ 870.452696][T19539] do_syscall_64+0xcd/0xf80 [ 870.452745][T19539] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 870.452785][T19539] RIP: 0033:0x7f929ed916e7 [ 870.452812][T19539] Code: f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 870.452841][T19539] RSP: 002b:00007f929fb50fa8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 870.452872][T19539] RAX: ffffffffffffffda RBX: 00007f929efe6180 RCX: 00007f929ed916e7 [ 870.452894][T19539] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 870.452914][T19539] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 870.452934][T19539] R10: 0000200000000140 R11: 0000000000000286 R12: 0000000000000000 [ 870.452953][T19539] R13: 00007f929efe6218 R14: 00007f929efe6180 R15: 00007ffdcb2ea728 [ 870.452993][T19539] [ 871.388504][T19539] netlink: set zone limit has 8 unknown bytes [ 871.642812][T19547] dvb_demux: dvb_demux_feed_del: feed not in list (type=0 state=0 pid=ffff) [ 871.686738][T19549] bonding: no command found in bonding_masters - use +ifname or -ifname [ 872.485049][T19562] Invalid ELF header magic: != ELF [ 872.575129][T19567] bridge0: port 3(batadv0) entered blocking state [ 872.582520][T19567] bridge0: port 3(batadv0) entered disabled state [ 872.589229][T19567] batadv0: entered allmulticast mode [ 872.604567][T19567] batadv0: entered promiscuous mode [ 872.666910][T17221] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 872.676517][T17221] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 872.716597][T19567] bridge0: port 3(batadv0) entered blocking state [ 872.723187][T19567] bridge0: port 3(batadv0) entered forwarding state [ 874.157440][T19592] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input484 [ 875.235506][T19601] netlink: 'syz.6.2989': attribute type 2 has an invalid length. [ 875.243784][T19601] netlink: 8 bytes leftover after parsing attributes in process `syz.6.2989'. [ 875.331738][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 875.338336][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 875.501508][T19606] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input485 [ 875.708661][T19605] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input486 [ 876.693181][T19624] device-mapper: ioctl: name not supplied when creating device [ 877.008212][T19631] netlink: 16 bytes leftover after parsing attributes in process `syz.6.2997'. [ 877.041719][T19639] FAULT_INJECTION: forcing a failure. [ 877.041719][T19639] name failslab, interval 1, probability 0, space 0, times 0 [ 877.133725][T19639] CPU: 0 UID: 0 PID: 19639 Comm: syz.3.2999 Tainted: G U L syzkaller #0 PREEMPT(full) [ 877.133755][T19639] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 877.133761][T19639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 877.133771][T19639] Call Trace: [ 877.133777][T19639] [ 877.133785][T19639] dump_stack_lvl+0x16c/0x1f0 [ 877.133812][T19639] should_fail_ex+0x512/0x640 [ 877.133832][T19639] should_failslab+0xc2/0x120 [ 877.133856][T19639] __kmalloc_node_track_caller_noprof+0xec/0x930 [ 877.133879][T19639] ? rcu_is_watching+0x12/0xc0 [ 877.133899][T19639] ? sctp_process_init+0x11c7/0x2db0 [ 877.133939][T19639] ? kfree+0x27d/0x6e0 [ 877.133958][T19639] ? kmemdup_noprof+0x29/0x60 [ 877.133977][T19639] kmemdup_noprof+0x29/0x60 [ 877.133995][T19639] sctp_process_init+0x11c7/0x2db0 [ 877.134023][T19639] ? __pfx_sctp_process_init+0x10/0x10 [ 877.134051][T19639] ? sctp_inq_pop+0x5fd/0xfa0 [ 877.134064][T19639] ? sctp_assoc_bh_rcv+0x117/0x6f0 [ 877.134077][T19639] ? sctp_inq_push+0x1db/0x270 [ 877.134091][T19639] ? sctp_backlog_rcv+0x169/0x590 [ 877.134107][T19639] ? __release_sock+0x3a9/0x450 [ 877.134127][T19639] sctp_do_sm+0x1614/0x5e00 [ 877.134151][T19639] ? __pfx_sctp_do_sm+0x10/0x10 [ 877.134191][T19639] ? ktime_get+0x200/0x310 [ 877.134209][T19639] ? lockdep_hardirqs_on+0x7c/0x110 [ 877.134239][T19639] sctp_assoc_bh_rcv+0x392/0x6f0 [ 877.134260][T19639] sctp_inq_push+0x1db/0x270 [ 877.134277][T19639] sctp_backlog_rcv+0x169/0x590 [ 877.134298][T19639] ? __pfx_sctp_backlog_rcv+0x10/0x10 [ 877.134316][T19639] __release_sock+0x3a9/0x450 [ 877.134335][T19639] ? lockdep_hardirqs_on+0x7c/0x110 [ 877.134359][T19639] release_sock+0x5a/0x220 [ 877.134378][T19639] sctp_wait_for_connect+0x1c3/0x5e0 [ 877.134403][T19639] ? __pfx_sctp_wait_for_connect+0x10/0x10 [ 877.134425][T19639] ? skb_set_owner_w+0x37d/0x770 [ 877.134440][T19639] ? __pfx_autoremove_wake_function+0x10/0x10 [ 877.134463][T19639] ? sctp_datamsg_put+0x58/0x5f0 [ 877.134481][T19639] ? sctp_primitive_SEND+0x9f/0xd0 [ 877.134500][T19639] sctp_sendmsg_to_asoc+0x1885/0x1c50 [ 877.134523][T19639] ? sctp_assoc_set_primary+0x101/0x300 [ 877.134547][T19639] ? sctp_assoc_add_peer+0x252/0x1540 [ 877.134565][T19639] ? __pfx_sctp_sendmsg_to_asoc+0x10/0x10 [ 877.134587][T19639] ? sctp_connect_new_asoc+0x41e/0x770 [ 877.134604][T19639] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 877.134621][T19639] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 877.134646][T19639] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 877.134670][T19639] sctp_sendmsg+0xe99/0x1e20 [ 877.134691][T19639] ? __pfx_sctp_sendmsg+0x10/0x10 [ 877.134706][T19639] ? __pfx___might_resched+0x10/0x10 [ 877.134726][T19639] ? __lock_acquire+0x436/0x2890 [ 877.134742][T19639] ? aa_sk_perm+0x2f2/0xae0 [ 877.134766][T19639] ? __pfx_aa_sk_perm+0x10/0x10 [ 877.134788][T19639] ? __pfx_sctp_sendmsg+0x10/0x10 [ 877.134805][T19639] inet_sendmsg+0x11c/0x140 [ 877.134824][T19639] ____sys_sendmsg+0x973/0xc30 [ 877.134849][T19639] ? __pfx_____sys_sendmsg+0x10/0x10 [ 877.134875][T19639] ? __pfx___schedule+0x10/0x10 [ 877.134897][T19639] ___sys_sendmsg+0x134/0x1d0 [ 877.134918][T19639] ? __pfx____sys_sendmsg+0x10/0x10 [ 877.134945][T19639] ? find_held_lock+0x2b/0x80 [ 877.134975][T19639] __sys_sendmmsg+0x200/0x420 [ 877.134997][T19639] ? __pfx___sys_sendmmsg+0x10/0x10 [ 877.135021][T19639] ? __pfx_do_futex+0x10/0x10 [ 877.135046][T19639] ? __x64_sys_openat+0x174/0x210 [ 877.135065][T19639] ? xfd_validate_state+0x61/0x180 [ 877.135083][T19639] __x64_sys_sendmmsg+0x9c/0x100 [ 877.135101][T19639] ? lockdep_hardirqs_on+0x7c/0x110 [ 877.135122][T19639] do_syscall_64+0xcd/0xf80 [ 877.135145][T19639] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 877.135160][T19639] RIP: 0033:0x7f929ed8f7c9 [ 877.135175][T19639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 877.135189][T19639] RSP: 002b:00007f929fb94038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 877.135204][T19639] RAX: ffffffffffffffda RBX: 00007f929efe5fa0 RCX: 00007f929ed8f7c9 [ 877.135215][T19639] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000003 [ 877.135224][T19639] RBP: 00007f929ee13f91 R08: 0000000000000000 R09: 0000000000000000 [ 877.135239][T19639] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000000 [ 877.135248][T19639] R13: 00007f929efe6038 R14: 00007f929efe5fa0 R15: 00007ffdcb2ea728 [ 877.135269][T19639] [ 878.276180][T19652] FAULT_INJECTION: forcing a failure. [ 878.276180][T19652] name failslab, interval 1, probability 0, space 0, times 0 [ 878.312569][T19652] CPU: 1 UID: 0 PID: 19652 Comm: syz.3.3001 Tainted: G U L syzkaller #0 PREEMPT(full) [ 878.312606][T19652] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 878.312611][T19652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 878.312620][T19652] Call Trace: [ 878.312626][T19652] [ 878.312632][T19652] dump_stack_lvl+0x16c/0x1f0 [ 878.312659][T19652] should_fail_ex+0x512/0x640 [ 878.312676][T19652] ? __kmalloc_cache_noprof+0x5f/0x800 [ 878.312695][T19652] should_failslab+0xc2/0x120 [ 878.312718][T19652] __kmalloc_cache_noprof+0x80/0x800 [ 878.312736][T19652] ? sctp_add_bind_addr+0xae/0x3f0 [ 878.312760][T19652] ? kasan_save_track+0x14/0x30 [ 878.312783][T19652] ? sctp_add_bind_addr+0xae/0x3f0 [ 878.312800][T19652] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 878.312822][T19652] sctp_add_bind_addr+0xae/0x3f0 [ 878.312843][T19652] sctp_copy_one_addr.part.0+0xd6/0x120 [ 878.312866][T19652] sctp_bind_addr_copy+0x1b4/0x530 [ 878.312895][T19652] sctp_connect_new_asoc+0x1c9/0x770 [ 878.312913][T19652] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 878.312929][T19652] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 878.312955][T19652] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 878.312978][T19652] sctp_sendmsg+0x157c/0x1e20 [ 878.313000][T19652] ? __pfx_sctp_sendmsg+0x10/0x10 [ 878.313014][T19652] ? __pfx___might_resched+0x10/0x10 [ 878.313035][T19652] ? __lock_acquire+0x436/0x2890 [ 878.313052][T19652] ? aa_sk_perm+0x2f2/0xae0 [ 878.313072][T19652] ? __pfx_aa_sk_perm+0x10/0x10 [ 878.313094][T19652] ? __pfx_sctp_sendmsg+0x10/0x10 [ 878.313110][T19652] inet_sendmsg+0x11c/0x140 [ 878.313131][T19652] ____sys_sendmsg+0x973/0xc30 [ 878.313156][T19652] ? __pfx_____sys_sendmsg+0x10/0x10 [ 878.313181][T19652] ? __pfx__kstrtoull+0x10/0x10 [ 878.313205][T19652] ___sys_sendmsg+0x134/0x1d0 [ 878.313225][T19652] ? __pfx____sys_sendmsg+0x10/0x10 [ 878.313252][T19652] ? find_held_lock+0x2b/0x80 [ 878.313283][T19652] __sys_sendmmsg+0x200/0x420 [ 878.313304][T19652] ? __pfx___sys_sendmmsg+0x10/0x10 [ 878.313328][T19652] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 878.313359][T19652] ? fput+0x70/0xf0 [ 878.313374][T19652] ? ksys_write+0x1ac/0x250 [ 878.313393][T19652] ? __pfx_ksys_write+0x10/0x10 [ 878.313416][T19652] __x64_sys_sendmmsg+0x9c/0x100 [ 878.313434][T19652] ? lockdep_hardirqs_on+0x7c/0x110 [ 878.313455][T19652] do_syscall_64+0xcd/0xf80 [ 878.313477][T19652] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 878.313493][T19652] RIP: 0033:0x7f929ed8f7c9 [ 878.313506][T19652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 878.313520][T19652] RSP: 002b:00007f929fb94038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 878.313534][T19652] RAX: ffffffffffffffda RBX: 00007f929efe5fa0 RCX: 00007f929ed8f7c9 [ 878.313544][T19652] RDX: 0000000000000008 RSI: 0000200000000140 RDI: 0000000000000003 [ 878.313553][T19652] RBP: 00007f929fb94090 R08: 0000000000000000 R09: 0000000000000000 [ 878.313562][T19652] R10: 0000000000000311 R11: 0000000000000246 R12: 0000000000000001 [ 878.313571][T19652] R13: 00007f929efe6038 R14: 00007f929efe5fa0 R15: 00007ffdcb2ea728 [ 878.313591][T19652] [ 878.676388][ T31] INFO: task syz.2.2505:17483 blocked for more than 143 seconds. [ 878.684258][ T31] Tainted: G U L syzkaller #0 [ 878.998629][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 879.043260][ T31] task:syz.2.2505 state:D stack:25800 pid:17483 tgid:17482 ppid:16782 task_flags:0x400140 flags:0x00080002 [ 879.099977][ T31] Call Trace: [ 879.118628][ T31] [ 879.131947][ T31] ? __schedule+0x10b9/0x6150 [ 879.145681][ T31] __schedule+0x1139/0x6150 [ 879.163366][ T31] ? __pfx___schedule+0x10/0x10 [ 879.197262][ T31] ? find_held_lock+0x2b/0x80 [ 879.218724][ T31] ? schedule+0x2d7/0x3a0 [ 879.231502][ T31] schedule+0xe7/0x3a0 [ 879.246685][ T31] schedule_preempt_disabled+0x13/0x30 [ 879.268476][ T31] __mutex_lock+0xc69/0x1ca0 [ 879.287031][ T31] ? expkey_flush+0x20/0x90 [ 879.305520][ T31] ? do_raw_spin_lock+0x12c/0x2b0 [ 879.332244][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 879.378422][ T31] ? do_raw_spin_unlock+0x172/0x230 [ 879.383816][ T31] ? _raw_spin_unlock+0x28/0x50 [ 879.406132][ T31] ? __pfx_cache_clean+0x10/0x10 [ 879.411167][ T31] ? __pfx___might_resched+0x10/0x10 [ 879.426138][ T31] ? __pfx_expkey_flush+0x10/0x10 [ 879.431272][ T31] ? expkey_flush+0x20/0x90 [ 879.435811][ T31] expkey_flush+0x20/0x90 [ 879.465380][ T31] write_flush.constprop.0+0x2af/0x3d0 [ 879.482550][ T31] ? __pfx_write_flush.constprop.0+0x10/0x10 [ 879.491164][ T31] ? iovec_from_user+0xbb/0x140 [ 879.498857][ T31] ? __pfx_write_flush_procfs+0x10/0x10 [ 879.507435][ T31] proc_reg_write+0x240/0x330 [ 879.512285][ T31] ? __pfx_proc_reg_write+0x10/0x10 [ 879.519901][ T31] vfs_writev+0x5df/0xde0 [ 879.524425][ T31] ? __pfx_vfs_writev+0x10/0x10 [ 879.529953][ T31] ? fdget_pos+0x2a2/0x370 [ 879.534884][ T31] ? __fget_files+0x20e/0x3c0 [ 879.540459][ T31] ? do_writev+0x132/0x340 [ 879.545230][ T31] do_writev+0x132/0x340 [ 879.551995][ T31] ? __pfx_do_writev+0x10/0x10 [ 879.557784][ T31] do_syscall_64+0xcd/0xf80 [ 879.562897][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 879.570677][ T31] RIP: 0033:0x7fbfeff8f7c9 [ 879.576424][ T31] RSP: 002b:00007fbff0eb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 879.585666][ T31] RAX: ffffffffffffffda RBX: 00007fbff01e5fa0 RCX: 00007fbfeff8f7c9 [ 879.594450][ T31] RDX: 000000000000000a RSI: 0000200000000240 RDI: 0000000000000003 [ 879.603002][ T31] RBP: 00007fbff0013f91 R08: 0000000000000000 R09: 0000000000000000 [ 879.611574][ T31] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 879.620865][ T31] R13: 00007fbff01e6038 R14: 00007fbff01e5fa0 R15: 00007ffcabd26638 [ 879.629416][ T31] [ 879.632744][ T31] [ 879.632744][ T31] Showing all locks held in the system: [ 879.642811][ T31] 3 locks held by kworker/0:0/9: [ 879.649241][ T31] #0: ffff88813ff55948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x128d/0x1b20 [ 879.661504][ T31] #1: ffffc900000e7c90 ((fqdir_free_work).work){+.+.}-{0:0}, at: process_one_work+0x914/0x1b20 [ 879.687520][ T31] #2: ffffffff8e3c9520 (rcu_read_lock){....}-{1:3}, at: unwind_next_frame+0xbd/0x20b0 [ 879.698211][ T31] 1 lock held by khungtaskd/31: [ 879.703346][ T31] #0: ffffffff8e3c9520 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x36/0x1c0 [ 879.713964][ T31] 2 locks held by getty/5590: [ 879.719180][ T31] #0: ffff88814cdd10a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 879.730292][ T31] #1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x41b/0x1510 [ 879.741150][ T31] 2 locks held by syz.0.2342/16610: [ 879.746873][ T31] #0: ffffffff901eb810 (cb_lock){++++}-{4:4}, at: genl_rcv+0x19/0x40 [ 879.755408][ T31] #1: ffffffff8e801368 (nfsd_mutex){+.+.}-{4:4}, at: nfsd_nl_threads_set_doit+0x687/0xbc0 [ 879.767644][ T31] 2 locks held by syz-executor/16844: [ 879.773314][ T31] #0: ffff888055d520e0 (&type->s_umount_key#51){+.+.}-{4:4}, at: deactivate_super+0xd6/0x100 [ 879.784596][ T31] #1: ffffffff8e801368 (nfsd_mutex){+.+.}-{4:4}, at: nfsd_shutdown_threads+0x5b/0xf0 [ 879.794834][ T31] 3 locks held by syz.2.2505/17483: [ 879.800573][ T31] #0: ffff88803577c478 (&f->f_pos_lock){+.+.}-{4:4}, at: fdget_pos+0x2a2/0x370 [ 879.812163][ T31] #1: ffff888053d02420 (sb_writers#3){.+.+}-{0:0}, at: do_writev+0x132/0x340 [ 879.821617][ T31] #2: ffffffff8e801368 (nfsd_mutex){+.+.}-{4:4}, at: expkey_flush+0x20/0x90 [ 879.832560][ T31] 5 locks held by kworker/u8:20/18546: [ 879.838537][ T31] #0: ffff8880b843add8 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x7e/0x130 [ 879.849534][ T31] #1: ffff88807a990008 (&____s->seqcount#13){.-.-}-{0:0}, at: trace_ignore_this_task+0xbc/0x100 [ 879.861169][ T31] #2: ffff8880b85262d8 (&base->lock){-.-.}-{2:2}, at: lock_timer_base+0x127/0x1d0 [ 879.871114][ T31] #3: ffffffff9adb22f8 (&obj_hash[i].lock){-.-.}-{2:2}, at: debug_object_activate+0x14c/0x4c0 [ 879.882262][ T31] #4: ffffffff8e3c9520 (rcu_read_lock){....}-{1:3}, at: unwind_next_frame+0xbd/0x20b0 [ 879.892659][ T31] [ 879.895199][ T31] ============================================= [ 879.895199][ T31] [ 879.904434][ T31] NMI backtrace for cpu 0 [ 879.904456][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Tainted: G U L syzkaller #0 PREEMPT(full) [ 879.904498][ T31] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 879.904509][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 879.904526][ T31] Call Trace: [ 879.904535][ T31] [ 879.904546][ T31] dump_stack_lvl+0x116/0x1f0 [ 879.904591][ T31] nmi_cpu_backtrace+0x27b/0x390 [ 879.904623][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 879.904654][ T31] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 879.904688][ T31] sys_info+0x133/0x180 [ 879.904713][ T31] watchdog+0xe66/0x1180 [ 879.904760][ T31] ? rcu_is_watching+0x12/0xc0 [ 879.904797][ T31] ? __pfx_watchdog+0x10/0x10 [ 879.904834][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 879.904875][ T31] ? __kthread_parkme+0x19e/0x250 [ 879.904915][ T31] ? __pfx_watchdog+0x10/0x10 [ 879.904965][ T31] kthread+0x3c5/0x780 [ 879.904999][ T31] ? __pfx_kthread+0x10/0x10 [ 879.905028][ T31] ? rcu_is_watching+0x12/0xc0 [ 879.905063][ T31] ? __pfx_kthread+0x10/0x10 [ 879.905092][ T31] ret_from_fork+0x983/0xb10 [ 879.905120][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 879.905151][ T31] ? __switch_to+0x7af/0x10d0 [ 879.905185][ T31] ? __pfx_kthread+0x10/0x10 [ 879.905213][ T31] ret_from_fork_asm+0x1a/0x30 [ 879.905268][ T31] [ 879.905305][ T31] Sending NMI from CPU 0 to CPUs 1: [ 880.050925][ C1] NMI backtrace for cpu 1 [ 880.050948][ C1] CPU: 1 UID: 0 PID: 19523 Comm: syz.1.2973 Tainted: G U L syzkaller #0 PREEMPT(full) [ 880.050989][ C1] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 880.050998][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 880.051014][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x17/0x70 [ 880.051056][ C1] Code: 02 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 34 24 65 48 8b 15 18 d5 f3 11 65 8b 05 29 d5 f3 11 00 01 ff 00 74 1d f6 c4 01 74 43 a9 00 00 0f 00 75 3c a9 00 00 [ 880.051080][ C1] RSP: 0018:ffffc9000f447200 EFLAGS: 00000097 [ 880.051100][ C1] RAX: 0000000080000002 RBX: 0000000000000000 RCX: ffffffff8b73cbaf [ 880.051117][ C1] RDX: ffff888026920000 RSI: ffffffff8b73cbc2 RDI: 0000000000000004 [ 880.051134][ C1] RBP: 0000000000000008 R08: 0000000000000004 R09: 0000000000000008 [ 880.051149][ C1] R10: 0000000000000007 R11: ffff888026920b30 R12: ffffea0002777200 [ 880.051166][ C1] R13: dffffc0000000000 R14: ffffc9000f4472d0 R15: ffff88809ec51080 [ 880.051184][ C1] FS: 0000000000000000(0000) GS:ffff8881249fc000(0000) knlGS:0000000000000000 [ 880.051208][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 880.051225][ C1] CR2: 00007fb0139b6ad8 CR3: 00000000762a8000 CR4: 00000000003526f0 [ 880.051242][ C1] Call Trace: [ 880.051250][ C1] [ 880.051259][ C1] xas_store+0x8f2/0x1910 [ 880.051288][ C1] page_cache_delete+0x32f/0x530 [ 880.051312][ C1] ? mod_memcg_lruvec_state+0x381/0x5f0 [ 880.051343][ C1] ? __pfx_page_cache_delete+0x10/0x10 [ 880.051365][ C1] ? find_held_lock+0x2b/0x80 [ 880.051404][ C1] filemap_remove_folio+0xfe/0x250 [ 880.051433][ C1] truncate_inode_folio+0x49/0x70 [ 880.051467][ C1] shmem_undo_range+0x376/0x1140 [ 880.051500][ C1] ? __pfx_shmem_undo_range+0x10/0x10 [ 880.051545][ C1] ? find_held_lock+0x2b/0x80 [ 880.051593][ C1] shmem_evict_inode+0x39e/0xbe0 [ 880.051623][ C1] ? inode_wait_for_writeback+0x170/0x390 [ 880.051656][ C1] ? __pfx_shmem_evict_inode+0x10/0x10 [ 880.051685][ C1] ? __pfx_inode_wait_for_writeback+0x10/0x10 [ 880.051718][ C1] ? find_held_lock+0x2b/0x80 [ 880.051749][ C1] ? evict+0x37e/0xad0 [ 880.051773][ C1] ? __pfx_shmem_evict_inode+0x10/0x10 [ 880.051802][ C1] evict+0x3c2/0xad0 [ 880.051830][ C1] ? find_held_lock+0x2b/0x80 [ 880.051864][ C1] ? __pfx_evict+0x10/0x10 [ 880.051891][ C1] ? iput.part.0+0x619/0x1190 [ 880.051920][ C1] iput.part.0+0x621/0x1190 [ 880.051947][ C1] iput+0x35/0x40 [ 880.051970][ C1] dentry_unlink_inode+0x29c/0x480 [ 880.052009][ C1] __dentry_kill+0x1d0/0x600 [ 880.052035][ C1] finish_dput+0x76/0x480 [ 880.052061][ C1] dput.part.0+0x451/0x570 [ 880.052088][ C1] dput+0x1f/0x30 [ 880.052111][ C1] __fput+0x51c/0xb70 [ 880.052135][ C1] ? _raw_spin_unlock_irq+0x23/0x50 [ 880.052170][ C1] task_work_run+0x150/0x240 [ 880.052197][ C1] ? __pfx_task_work_run+0x10/0x10 [ 880.052228][ C1] do_exit+0x87f/0x2bd0 [ 880.052253][ C1] ? proc_coredump_connector+0x2d1/0x4f0 [ 880.052291][ C1] ? __pfx_do_exit+0x10/0x10 [ 880.052319][ C1] do_group_exit+0xd3/0x2a0 [ 880.052344][ C1] get_signal+0x2671/0x26d0 [ 880.052383][ C1] ? __pfx_get_signal+0x10/0x10 [ 880.052414][ C1] ? find_held_lock+0x2b/0x80 [ 880.052461][ C1] ? fixup_vdso_exception+0x34b/0x400 [ 880.052502][ C1] arch_do_signal_or_restart+0x8f/0x7a0 [ 880.052545][ C1] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 880.052585][ C1] ? do_user_addr_fault+0xa62/0x1370 [ 880.052618][ C1] irqentry_exit+0x38a/0x8c0 [ 880.052656][ C1] asm_exc_page_fault+0x26/0x30 [ 880.052680][ C1] RIP: 0033:0x0 [ 880.052696][ C1] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 880.052708][ C1] RSP: 002b:000000000000000a EFLAGS: 00010217 [ 880.052726][ C1] RAX: 0000000000000000 RBX: 00007f9ad25e5fa0 RCX: 00007f9ad238f7c9 [ 880.052742][ C1] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000020003b46 [ 880.052758][ C1] RBP: 00007f9ad2413f91 R08: 0000000000000002 R09: 0000000000000000 [ 880.052773][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 880.052789][ C1] R13: 00007f9ad25e6038 R14: 00007f9ad25e5fa0 R15: 00007fff312b47f8 [ 880.052820][ C1] [ 880.474548][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 880.481425][ T31] CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Tainted: G U L syzkaller #0 PREEMPT(full) [ 880.492365][ T31] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 880.497548][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 880.507766][ T31] Call Trace: [ 880.511043][ T31] [ 880.513963][ T31] dump_stack_lvl+0x3d/0x1f0 [ 880.518821][ T31] vpanic+0x640/0x6f0 [ 880.522890][ T31] panic+0xca/0xd0 [ 880.526605][ T31] ? __pfx_panic+0x10/0x10 [ 880.531101][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 880.537085][ T31] ? nmi_trigger_cpumask_backtrace+0x1b1/0x300 [ 880.543345][ T31] ? nmi_trigger_cpumask_backtrace+0x2be/0x300 [ 880.549657][ T31] ? watchdog+0xe83/0x1180 [ 880.554101][ T31] ? watchdog+0xe76/0x1180 [ 880.558518][ T31] watchdog+0xe94/0x1180 [ 880.562788][ T31] ? rcu_is_watching+0x12/0xc0 [ 880.567568][ T31] ? __pfx_watchdog+0x10/0x10 [ 880.572310][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 880.577520][ T31] ? __kthread_parkme+0x19e/0x250 [ 880.582649][ T31] ? __pfx_watchdog+0x10/0x10 [ 880.587403][ T31] kthread+0x3c5/0x780 [ 880.591474][ T31] ? __pfx_kthread+0x10/0x10 [ 880.596077][ T31] ? rcu_is_watching+0x12/0xc0 [ 880.600836][ T31] ? __pfx_kthread+0x10/0x10 [ 880.605428][ T31] ret_from_fork+0x983/0xb10 [ 880.610043][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 880.615168][ T31] ? __switch_to+0x7af/0x10d0 [ 880.619986][ T31] ? __pfx_kthread+0x10/0x10 [ 880.624774][ T31] ret_from_fork_asm+0x1a/0x30 [ 880.629569][ T31] [ 880.633109][ T31] Kernel Offset: disabled [ 880.637601][ T31] Rebooting in 86400 seconds..