last executing test programs: 6m27.186738344s ago: executing program 3 (id=200): waitid$auto(0x8, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000180)={{0xfffffffffffffff9, 0x80}, {0x2, 0x6}, 0x4, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x80000000, 0x7, 0xb7, 0x5d9, 0x5, 0x7ff, 0x2055}) mmap$auto(0x2, 0x400008, 0xdf, 0x9b72, 0x2, 0x10000000008000) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) r0 = socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x3, 0x0, 0x787b, 0x7000000) sendmmsg$auto(0x4, 0x0, 0x9a6, 0x6) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x601, 0x0) write$auto(r1, &(0x7f0000000000)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x9) msgctl$auto_IPC_STAT(0x0, 0x2, 0x0) pread64$auto(0xffffffffffffffff, 0x0, 0x200000000003, 0x2f4a3a23) ioctl$auto_KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x2, 0x0) writev$auto(r2, &(0x7f0000000300)={&(0x7f0000000200), 0x200}, 0x3) mmap$auto(0xfffffffffffffffe, 0xe983, 0xc, 0xebe, r0, 0x54f5cfc0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) r3 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x60742, 0x0) fstat$auto(r3, 0x0) r4 = openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fb0\x00', 0x40100, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x4610, 0x0) write$auto(0xffffffffffffffff, 0x0, 0x100000a3d7) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sda1\x00', 0x0, 0x0) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000001d00), 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, 0x0, 0x80014) syz_genetlink_get_family_id$auto_batadv(0x0, 0xffffffffffffffff) socket(0x2a, 0xa, 0x83) 6m25.893083423s ago: executing program 3 (id=204): waitid$auto(0x8, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000180)={{0xfffffffffffffff9, 0x80}, {0x2, 0x6}, 0x4, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x80000000, 0x7, 0xb7, 0x5d9, 0x5, 0x7ff, 0x2055}) mmap$auto(0x2, 0x400008, 0xdf, 0x9b72, 0x2, 0x10000000008000) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) r0 = socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x3, 0x0, 0x787b, 0x7000000) sendmmsg$auto(0x4, 0x0, 0x9a6, 0x6) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x601, 0x0) write$auto(r1, &(0x7f0000000000)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x9) msgctl$auto_IPC_STAT(0x0, 0x2, 0x0) pread64$auto(0xffffffffffffffff, 0x0, 0x200000000003, 0x2f4a3a23) ioctl$auto_KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x2, 0x0) writev$auto(r2, &(0x7f0000000300)={&(0x7f0000000200), 0x200}, 0x3) mmap$auto(0xfffffffffffffffe, 0xe983, 0xc, 0xebe, r0, 0x54f5cfc0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) r3 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x60742, 0x0) fstat$auto(r3, 0x0) r4 = openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fb0\x00', 0x40100, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x4610, 0x0) write$auto(0xffffffffffffffff, 0x0, 0x100000a3d7) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000001d00), r5) sendmsg$auto_ETHTOOL_MSG_RINGS_SET(r5, 0x0, 0x80014) syz_genetlink_get_family_id$auto_batadv(0x0, 0xffffffffffffffff) socket(0x2a, 0xa, 0x83) 6m24.684321253s ago: executing program 3 (id=206): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$getown(r0, 0x9) mmap$auto(0x0, 0x7, 0xdf, 0x9b72, 0x7, 0x28000) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) r2 = socket(0xa, 0x1, 0x84) getsockopt$auto(r2, 0x84, 0x11, 0x0, &(0x7f0000000000)=0x28000000) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000200)={{@inferred=r1, 0x1, 0x7f, 0x3, "d50883dbede3d0bf828bbfbac4480000000000000000eaffffffffffffff00", @raw=0xed}, 0x503, 0x9, 0x4, @inferred=r1, @enumerated={0xc, 0x0, "cb0c80699beb33ab05dc27d4bf2a660e893ca63be6c004786ceac50991aa4975421eebb8e24b11006a359336cf5c603240dff7022f6bd2af1300", 0x1e0, 0x10001}, "7a9fc199a16a2311eacf2fc7ae1d8778dc618090334fdd73340238d21000debe0eda71bdd709254592b67f9cb5adb17884a16f7ce8cbce0bb32791702b8d7c2d"}) r3 = socket(0x11, 0x3, 0x9) r4 = openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, &(0x7f000000c340)='/proc/thread-self/pagemap\x00', 0x8000, 0x0) pread64$auto(r4, 0x0, 0x4000010001, 0x2000008000830) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) mlockall$auto(0x7) mremap$auto(0x0, 0x4, 0x4, 0x7, 0x100000000) madvise$auto(0x200000, 0x2003f2, 0x15) r5 = open_by_handle_at$auto(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x42}, 0x4) sendmmsg$auto(r3, &(0x7f00000001c0)={{&(0x7f0000000000), 0x5ac, &(0x7f0000000100)={&(0x7f0000000200), 0x11}, 0x5, &(0x7f0000000180), 0x5, 0xe}, 0x5}, 0x2, 0x100) r6 = syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000000400), r0) fcntl$auto_F_GETLEASE(r5, 0x401, 0x3) sendmsg$auto_IPVS_CMD_ZERO(r0, &(0x7f0000002900)={0x0, 0x0, &(0x7f00000028c0)={&(0x7f0000002600)=ANY=[@ANYBLOB="14040000", @ANYRES16=r6, @ANYBLOB="01002bbd7400fddbdf2510000000"], 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x0) 6m23.722371753s ago: executing program 3 (id=210): write$auto(0xca, &(0x7f0000000000)='\x04>2\x1e!\xf2\xa2\x00\x00\x8d\xa9p\xcc\xccV\xf9ozi\xb2:\x19\x92r\xcc9\x99f\xc5\xed\x84fe\x8a\x8c\xd3*\xfe\x1dE\xa1S\x18pW8\x03\xcb\tSK\xb4\x893\xf3Q\x7f\xd1HUk\x18\xab\x03^|\xefp\xb1\xb3\xcer8\b=\xa4y\xd4\x88\xbc\xe0\xd1\x03\x108S\x90KG,\xf8\v\x88\xe2+\xcb\xf2v\x8bL\xa6\xaa}\x1b\xa5\xd8\x98\xc9\\f\x00\x80\x00\x00\x14\x84\xbb\aF,\xc8\xc7u\x93\xe8?\x92\t\xa9`\xff\x93h\x93\xac\n\xdd\x8ex[\x9d\x930jl!\xf9i\xa6\n\x8e\x8f\xf3g6\xb8\x1a\x18\xf2\x93\t\xe8ips\xa7\x9a\x1cFPi\x13\x89DRSO\x97\xac\xc3\xb8Q\xa2\xb2\xac\xc3\xd3\xf9\xd4\x92\n\x00\x00\x8f[\xbe\xe5\xf1\x9f\x01s\x8eg\x05\xe8\xf9\x8f\xa6g\v', 0x226e) r0 = socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) r1 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000240)='/proc/fs/netfs/requests\x00', 0x0, 0x0) pread64$auto(r1, 0x0, 0x100000001, 0x100) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f0000000140)=0x0) r3 = openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sg0\x00', 0x141040, 0x0) r4 = ioctl$auto_TUNSETSNDBUF2(r0, 0x400454d4, &(0x7f00000001c0)=0x9) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$auto_nfsd(&(0x7f0000000400), r5) sendmsg$auto_NFSD_CMD_VERSION_SET(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000200)={0x28, r6, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@NFSD_A_SERVER_PROTO_VERSION={0x14, 0x1, 0x0, 0x1, [@NFSD_A_VERSION_MINOR={0x8}, @NFSD_A_VERSION_MAJOR={0x8, 0x1, 0x2}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x24000001}, 0x4004840) sendmsg$auto_NFSD_CMD_THREADS_SET(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r6, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NFSD_A_SERVER_THREADS={0x8, 0x1, 0xe74}, @NFSD_A_SERVER_THREADS={0x8, 0x1, 0x5}, @NFSD_A_SERVER_THREADS={0x8, 0x1, 0x10001}, @NFSD_A_SERVER_SCOPE={0xd, 0x4, '/dev/sg0\x00'}, @NFSD_A_SERVER_SCOPE={0xd, 0x4, '/dev/sg0\x00'}, @NFSD_A_SERVER_GRACETIME={0x8, 0x2, 0x7}, @NFSD_A_SERVER_THREADS={0x8, 0x1, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4c004}, 0x4040000) ioctl$auto_SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000000280)) connect$auto(r1, &(0x7f0000000180)=@nfc={0x27, r2, 0x0, 0x2}, 0x5) r7 = openat$auto_mtd_fops_mtdchar(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mtd0ro\x00', 0x2c00, 0x0) ioctl$auto_MEMREADOOB(r7, 0xc0104d04, &(0x7f0000000080)={0xfffffff8, 0x80, 0x0}) close_range$auto(r0, r0, 0x0) ioctl$auto_HPET_IRQFREQ(r0, 0x40086806, &(0x7f0000000100)=0x8000000000000001) 6m23.148520998s ago: executing program 3 (id=214): mknod$auto(&(0x7f0000000040)='./file0\x00', 0x1001, 0x4) (async) open(&(0x7f00000002c0)='./file0\x00', 0xc2243, 0x1c7) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000000), r0) 6m21.947144866s ago: executing program 3 (id=216): openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r0 = socket(0xa, 0x1, 0x84) mmap$auto(0x0, 0x20004, 0x1ff, 0xeb1, 0x8000000000000024, 0x8000) bind$auto(r0, &(0x7f0000000040)=@in={0x2, 0x3, @multicast2}, 0x6c) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x12}}, 0x54) r1 = getsockopt$auto(r0, 0x84, 0x9, 0x0, &(0x7f0000000000)=0x4bb) move_pages$auto(0x1, 0x2000000000003, 0x0, 0x0, 0x0, 0x8000400000000000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x0, 0x0) read$auto(r2, 0x0, 0x20) r3 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/fs/cifs/smbd_max_send_size\x00', 0x48041, 0x0) write$auto(r3, 0x0, 0x7) write$auto_kernel_debug_fops_orangefs_debugfs(r1, &(0x7f00000000c0)="2a3a386dcb0d96d6dc4e9b3ed17f8b8c9285d2d1fd9d795540f35a02d7f2b5", 0x1f) sendmsg$auto_SMC_PNETID_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x508, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_ETHNAME={0x11, 0x2, '/dev/net/tun\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x10}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000011}, 0x40800) setuid$auto(0xe) ioctl$auto(0x3, 0x400454ca, 0x38) 6m6.728005704s ago: executing program 32 (id=216): openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r0 = socket(0xa, 0x1, 0x84) mmap$auto(0x0, 0x20004, 0x1ff, 0xeb1, 0x8000000000000024, 0x8000) bind$auto(r0, &(0x7f0000000040)=@in={0x2, 0x3, @multicast2}, 0x6c) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x12}}, 0x54) r1 = getsockopt$auto(r0, 0x84, 0x9, 0x0, &(0x7f0000000000)=0x4bb) move_pages$auto(0x1, 0x2000000000003, 0x0, 0x0, 0x0, 0x8000400000000000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x0, 0x0) read$auto(r2, 0x0, 0x20) r3 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/fs/cifs/smbd_max_send_size\x00', 0x48041, 0x0) write$auto(r3, 0x0, 0x7) write$auto_kernel_debug_fops_orangefs_debugfs(r1, &(0x7f00000000c0)="2a3a386dcb0d96d6dc4e9b3ed17f8b8c9285d2d1fd9d795540f35a02d7f2b5", 0x1f) sendmsg$auto_SMC_PNETID_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x508, 0x70bd2c, 0x25dfdbfc, {}, [@SMC_PNETID_ETHNAME={0x11, 0x2, '/dev/net/tun\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x10}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000011}, 0x40800) setuid$auto(0xe) ioctl$auto(0x3, 0x400454ca, 0x38) 6.037507765s ago: executing program 0 (id=1321): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xcd0, 0xffffffffffffffff, 0x80000000008000) close_range$auto(0x2, 0xa, 0x0) mmap$auto(0x200000007b, 0x7fffffffffffffff, 0x4, 0x3ff, 0x401, 0xffffffffffffc69b) socket(0x80000000000000a, 0x2, 0x0) r0 = socket(0x2, 0x5, 0x84) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@l2tp={0x2, 0x0, @local, 0x4}, 0x7ff) getsockopt$auto(r0, 0x84, 0x6d, 0x0, &(0x7f0000000280)=0x1000c0) setsockopt$auto(0x3, 0x10000000084, 0x85, 0x0, 0x90) 5.797453191s ago: executing program 1 (id=1323): r0 = openat$auto_proc_uid_map_operations_base(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/uid_map\x00', 0x20002, 0x0) r1 = signalfd4$auto(r0, &(0x7f0000000100), 0x9, 0x559) waitid$auto(0x8, r1, 0x0, 0x3, &(0x7f0000000180)={{0xfffffffffffffff9, 0x80}, {0x2, 0x6}, 0x4, 0x5, 0x1, 0x4252, 0x0, 0x8000, 0x8, 0x200000009, 0xb7, 0x5d9, 0x5, 0x7ff, 0x2052, 0xfffffffffffffffd}) mmap$auto(0x2, 0x400008, 0xdf, 0x9b72, 0x2, 0x10000000008000) r2 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x3, 0x0, 0x787b, 0x7000000) sendmmsg$auto(0x4, 0x0, 0x3e0, 0x6) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x601, 0x0) write$auto(r3, &(0x7f0000000000)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x9) msgctl$auto_IPC_STAT(0x0, 0x2, 0x0) pread64$auto(0xffffffffffffffff, 0x0, 0x200000000003, 0x2f4a3a23) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x2, 0x0) writev$auto(r4, &(0x7f0000000300)={&(0x7f0000000200), 0x200}, 0x3) mmap$auto(0xfffffffffffffffe, 0xe983, 0xc, 0xebe, 0xffffffffffffffff, 0x54f5cfc0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x161342, 0x130) open(&(0x7f00000000c0)='./file0\x00', 0x10b000, 0x39) mmap$auto(0x9, 0x200, 0x4, 0x18, 0x3, 0x0) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) r6 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r6, 0x0, 0x20) r7 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r7, &(0x7f0000000200)={0x0, 0x7}, 0x3) bpf$auto(0x0, &(0x7f0000000580)=@task_fd_query={0x7, 0x4, 0x20200, 0x8000, 0x0, 0xf, 0xffffffffffffffff, 0x3ff, 0x2}, 0x6f4) write$auto(r5, &(0x7f0000000040)='7\x00\\\xa0\x01\x00\x01\x00\x00\x00\x00\x00\xc7k', 0x81) sendmmsg$auto(0xffffffffffffffff, 0x0, 0x5, 0x10000000) 5.775427885s ago: executing program 0 (id=1324): r0 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, 0x0, 0x2, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0x6e93018, 0x401, 0x8000) pipe$auto(&(0x7f0000000040)=r0) mremap$auto(0x8000104000, 0xb8, 0x1, 0x3, 0xfffff000) io_uring_setup$auto(0x9, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x8000) socket(0x2, 0x2, 0x7) connect$auto(0x3, 0x0, 0x50) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x0, 0x0) read$auto(r2, 0x0, 0x20) writev$auto(r1, &(0x7f0000000200)={0x0, 0x7}, 0x3) read$auto_fops_x64_ro_(0xffffffffffffffff, 0x0, 0x0) signalfd$auto(r1, 0x0, 0xb071) unshare$auto(0x0) madvise$auto(0x0, 0x200007, 0x19) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(0xffffffffffffffff, 0x0, 0xd0) sendmmsg$auto(0xffffffffffffffff, 0x0, 0x9a5, 0x5) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) sysfs$auto(0x2, 0xd, 0x0) r3 = fsopen$auto(0x0, 0x1) fsconfig$auto(r3, 0x8, 0x0, 0x0, 0x0) fsconfig$auto_FSCONFIG_SET_BINARY(r3, 0x2, &(0x7f0000000300)='\v\'\bn\x91p\xe6\x1eRN8\x99\x86\xdde\x1cJ\x99\x00\x00\x00\x00\x00\x00\xfd\xfd\xd3\xd3\x1d\xf8\xbe\x1e7\xbb\xedO#\x14mC\x97\x06\xd9bZ\xddL\'\x03\x00\xff\x9f\x1e\xf9\xa4*\x01\x00\x00\x00^\x0fo\x84\xfc\x89\v\xea\x1b\xc6\xc0\x8b\xc0CL\"\x01\x0e#\xae\xa9i8W\xe5Iq\xf0\xcdr\xfa\xed<\x86[c4%\xa3\x14^\xbe\xa2E\xd8?\'\x8dg\x81K*&\xab\xd7\xa6+,\xc3\xc2g\x01JZ\xbb*\xb5\xa1;0\x81\x11\x9a?g`sFh\x00\x00,,\x93\xba\x88\x93\xc6\b\xe5\xaaJ+\x02\x9b#\xa9\x9b\x17\x82\xd7\xee\xd1\xbf2\x03\x00\x00\x00\x00\x00\x00\x00B\xa0\x99\xb0R\xb4J}\xa8\xa1\x84]F\xe0\x83/\xc0\xd8\x05f_\xfa\x19\a\x00\xf1\x12lwU&[\xde?\x00\x00\xf7\xc1\xa6\xf2\xc1\"\xact\xee\xc9\xb2\x1d\xb3\xef#\xcb}b\x90\xafR\xf5\x8cg\x95A\x89\x8d\x9a\xfcV\x9bm\xd4\x82\x7f9\x12\x98\x1c\x8e\x1f\xdc\xe5Y\x7f\xe8\xe1g%\xb8\xf9b!\xc8\xa0\xf7\x06\xbb\xdf\x1d\xfb\x00\x979\x8e\xd0AP\xbf\x1fM\x1fd~\xeeS^8v\x80\x1b\xb1I\xb1\xa4\x89\xc7\x9d\xf2P\x04\x99N{\x9a\xfa\xf3\xcb\xc3Bx\xb5\xb8*\xa0-\xda\x84\xc5S\xe2\xc6\x92/\xed\xc2\xceK\xad\x00\x00*)Hh\x8d\x06cQ\xf1\x9d\xad\r}\x15e\x18\x06\xe3\xd2\xe4Q', &(0x7f0000000280), 0x5) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000200)={{@inferred, 0x1, 0x1, 0x81, "3112d585005a614d19e22af9ffb683dbede3d0bf828bbfba40f035f4be6b7fe5e2f94bd90484b0755015e48d"}, 0x401, 0x5, 0x4, @raw=0x7, @integer={0xdbe, 0x255, 0x208}, "7a9fc199a16a2311eacf2fc7ae1d8778dc618090334fdd73340238d21000debe0eda71bdd709254592b67f9cb5adb17884a16f7ce8cbce0bb32791702b8d7c2d"}) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x59, &(0x7f0000000640)={0x0, 0x1d, 0x3800, 0x2, 0x7, 0x400a, 0xffffffffffffffff, [], {0x6, 0x6, 0x8c48, 0x29b, 0x3, 0x7b, 0x0, 0x5, 0xfffffffffffffffd}, {0x100, 0x20001, 0x52, 0x85, 0x2, 0x1a7b870a, 0x9, 0xc, 0x100000000}}) io_uring_register$auto(0x2, 0x20, &(0x7f0000000240), 0x1) read$auto_udf_dir_operations_udfdecl(r3, 0x0, 0x0) 5.633947959s ago: executing program 2 (id=1325): openat$auto_console_fops_tty_io(0xffffffffffffff9c, 0x0, 0x4380, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x149543, 0x0) mount$auto(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='efs\x00', 0x5, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xfd19, 0xfffffffffffffffa, 0xeffffffffffffffc) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x3c}, 0x1, 0x0, 0x0, 0x4004810}, 0x4008815) close_range$auto(0x2, 0x8, 0x0) openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fb0\x00', 0x587100, 0x0) socket(0x21, 0x3, 0x9) r0 = socket(0x1f, 0x5, 0x9) bind$auto(r0, &(0x7f0000000040)=@in={0x2, 0x4e24, @remote}, 0x6a) sendmmsg$auto(r0, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0x8, 0x0, 0x1f, 0xb}, 0x800008}, 0x5, 0x20000000) r1 = prctl$auto(0x4e, 0x1, 0x0, 0x0, 0x0) prctl$auto(0x4e, 0x1, 0x0, 0x0, 0xffffffffffffffff) close_range$auto(0x0, 0xffffffffffffffff, 0x2) fanotify_init$auto(0x400, 0x2000000000002) open(&(0x7f0000000000)='./file0\x00', 0x165b42, 0xe1d2b27bdc14aa98) openat$dir(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x240342, 0xa2) syz_genetlink_get_family_id$auto_nfsd(0x0, r0) socket(0x23, 0x2, 0x1000000e) bpf$auto(0x0, &(0x7f0000000240)=@test={r1, 0x3, 0x80, 0x8ee, 0x752, 0x1000008, 0x1cc, 0x5, 0x6, 0x3, 0x4, 0x9de, 0x9, 0x4, 0x2}, 0x2d) sendmsg$auto_NFSD_CMD_LISTENER_SET(0xffffffffffffffff, 0x0, 0x2000c0c1) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x1c00, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x5}, 0x3, 0x0) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x3}, 0x7}, 0x3, 0xcad7) mmap$auto(0x9c, 0x2020006, 0x3, 0x17, 0xfffffffffffffffa, 0x3) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) write$auto(0x3, 0x0, 0x101085) 5.404321785s ago: executing program 1 (id=1326): mkdir$auto(&(0x7f0000000100)='./file0\x00', 0x8cd) rmdir$auto(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00') write$auto(0xffffffffffffffff, 0x0, 0xfffffdf1) ioctl$auto_FS_IOC_SETFLAGS2(0xffffffffffffffff, 0x40086602, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x400, 0xdf, 0xeb1, 0x1272, 0x108000) r0 = socket(0xa, 0x801, 0x106) setsockopt$auto(r0, 0x6, 0x24, 0x0, 0x9) select$auto(0x2, &(0x7f0000000300)={[0x3, 0xff, 0x8, 0x7, 0x8, 0x2, 0x26, 0x2, 0xfe2, 0x6, 0xe, 0x7, 0x100000001, 0xffffffff80000001, 0x2, 0x8c]}, 0x0, 0x0, &(0x7f0000000480)={0x9, 0x9}) r1 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000800)='/dev/tty0\x00', 0x102, 0x0) write$auto_console_fops_tty_io(r1, &(0x7f0000000000)="c80d1b5d399b39", 0xfdef) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x8000000000000000, 0x15) mmap$auto(0x0, 0x2020005, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) remap_file_pages$auto(0x6a27, 0x1000, 0x300000000000000, 0x200, 0x4) r2 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000200), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_NL80211_CMD_GET_PROTOCOL_FEATURES(r3, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)={&(0x7f0000002200)={0x14, r2, 0x1, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x48800}, 0x4) ioctl$auto_SNDRV_PCM_IOCTL_HW_PARAMS_OLD2(0xffffffffffffffff, 0xc1004111, &(0x7f0000000380)={0x6, [0x1ff, 0xfff, 0x4], [{0x1, 0xff, 0x1, 0x1}, {0x7, 0x7, 0x1, 0x1}, {0x1, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x80, 0x0, 0x0, 0x1, 0x1}, {0x1ff, 0x7, 0x1, 0x1}, {0x7fff, 0x6, 0x1, 0x0, 0x0, 0x1}, {0x3590, 0x3, 0x1, 0x0, 0x1}, {0x0, 0x20, 0x0, 0x0, 0x1, 0x1}, {0x5d6, 0x7, 0x1, 0x1}, {0x80000000, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x5, 0xdf, 0x1}, {0x2, 0xe, 0x1, 0x1, 0x0, 0x1}], 0x7, 0x4, 0xc, 0x6, 0x200, 0x401, 0xfffffffffffffeff, "88a3e32921c700e8d189a7534ad6f347345887ce689fe346dc02809645f1f9764dec9ad2d83992be6dca670abe2c982f2ab6b63bb60a4bbeaac81d42794f97b1"}) 5.071693679s ago: executing program 0 (id=1327): mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) socket(0xa, 0x3, 0x3b) close_range$auto(0x2, 0x8, 0x0) socket(0xa, 0x2, 0x73) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/event0\x00', 0x2, 0x0) ioctl$auto_EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x2000, 0x800004, 0x9}) r1 = socket(0x10, 0x2, 0x0) sendmsg$auto_ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x2000000}, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200", @ANYBLOB="5de1"], 0x1ac}}, 0x40000) recvmmsg$auto(r1, &(0x7f0000000140)={{0x0, 0xfffffffe, 0x0, 0x5, 0x0, 0x200002, 0xafb}, 0x800}, 0xfffffffb, 0x10, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0x18}, 0x1) 5.028451436s ago: executing program 2 (id=1328): mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) socket(0xa, 0x3, 0x3b) close_range$auto(0x2, 0x8, 0x0) socket(0xa, 0x2, 0x73) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/event0\x00', 0x2, 0x0) ioctl$auto_EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x2000, 0x800004, 0x9}) r1 = socket(0x10, 0x2, 0x0) sendmsg$auto_ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x2000000}, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200", @ANYBLOB="5de1"], 0x1ac}}, 0x40000) recvmmsg$auto(r1, &(0x7f0000000140)={{0x0, 0xfffffffe, 0x0, 0x5, 0x0, 0x200002, 0xafb}, 0x800}, 0xfffffffb, 0x10, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0x18}, 0x1) 4.743427324s ago: executing program 4 (id=1329): mmap$auto(0x0, 0x101, 0x4000000000df, 0xeb1, 0x200000401, 0x8000) r0 = socket(0x2b, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x4e22, @remote}, 0x6a) sendmmsg$auto(r0, &(0x7f0000000080)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xfffffffd}, 0xffff}, 0x5, 0x20000043) poll$auto(0x0, 0x7f, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$auto_TIOCSETD2(0xffffffffffffffff, 0x5423, 0x0) fcntl$auto(0x3, 0x4, 0xa553) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000600), 0xffffffffffffffff) openat$auto_fuse_dev_operations_fuse_i(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x501, 0x0) fcntl$auto(0x3, 0x4, 0xa553) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) socket(0xa, 0x801, 0x84) setsockopt$auto(0x3, 0x10000000084, 0xd, 0x0, 0x8) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) r3 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) read$auto(r3, &(0x7f0000000040)='/dev/snd/seq\x00', 0x7) write$auto(r2, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x2242, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D3\x00', 0x1, 0x0) select$auto(0x9, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x1, 0x948b, 0x0, 0x15f4da07, 0x6, 0x10, 0x64, 0x80000020, 0x1000, 0xb, 0x9, 0x2, 0x8]}, 0x0) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000140)={{0x0, 0x200084c, 0x0, 0x9, 0x0, 0x3, 0x10b}, 0x4}, 0xdfffffff, 0xc5c) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) mbind$auto(0x8000002000, 0x100000004, 0x1, 0x0, 0xffffffffffffff39, 0x800001) writev$auto(0x3, &(0x7f0000000100)={0x0, 0x7112}, 0x8) 3.724412276s ago: executing program 2 (id=1330): waitid$auto(0x8, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000180)={{0xfffffffffffffff9, 0x80}, {0x2, 0x6}, 0x4, 0x5, 0x1, 0x3, 0x0, 0x8000, 0x80000000, 0x7, 0xb7, 0x5d9, 0x5, 0x7ff, 0x2055}) mmap$auto(0x2, 0x400008, 0xdf, 0x9b72, 0x2, 0x10000000008000) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) r0 = socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x3, 0x0, 0x787b, 0x7000000) sendmmsg$auto(0x4, 0x0, 0x9a6, 0x6) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x601, 0x0) write$auto(r1, &(0x7f0000000000)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x9) msgctl$auto_IPC_STAT(0x0, 0x2, 0x0) pread64$auto(0xffffffffffffffff, 0x0, 0x200000000003, 0x2f4a3a23) ioctl$auto_KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x2, 0x0) writev$auto(r2, &(0x7f0000000300)={&(0x7f0000000200), 0x200}, 0x3) mmap$auto(0xfffffffffffffffe, 0xe983, 0xc, 0xebe, r0, 0x54f5cfc0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) r3 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x60742, 0x0) fstat$auto(r3, 0x0) r4 = openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fb0\x00', 0x40100, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x4610, 0x0) write$auto(0xffffffffffffffff, 0x0, 0x100000a3d7) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sda1\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000001d00), r5) sendmsg$auto_ETHTOOL_MSG_RINGS_SET(r5, 0x0, 0x80014) syz_genetlink_get_family_id$auto_batadv(0x0, 0xffffffffffffffff) socket(0x2a, 0xa, 0x83) 3.542229359s ago: executing program 0 (id=1331): openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/devices/virtual/block/nbd3/queue/nr_requests\x00', 0x343262, 0x0) (async) close_range$auto(0x0, 0x5, 0x0) r0 = openat$auto_dvb_dvr_fops_dmxdev(0xffffffffffffff9c, &(0x7f0000000080), 0x2003, 0x0) ioctl$auto(r0, 0x6f2d, r0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x800008000) pwritev2$auto(0xffffffffffffffff, 0x0, 0xfd, 0x2, 0x6, 0x43) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000100), 0xffffffffffffffff) setitimer$auto(0x2, &(0x7f0000000080)={{0x2, 0x5}, {0x0, 0x8}}, 0x0) (async) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual/block/loop14/queue/dma_alignment\x00', 0x80000, 0x0) (async, rerun: 64) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/platform/i8042/serio0/drvctl\x00', 0x28001, 0x0) (rerun: 64) write$auto_kernfs_file_fops_kernfs_internal(r2, &(0x7f0000000080)='\r', 0x1) (async, rerun: 32) read$auto(r1, 0x0, 0x20) (async, rerun: 32) writev$auto(0x3, &(0x7f0000000080)={0x0, 0x1}, 0x3) 3.440833116s ago: executing program 1 (id=1332): close_range$auto(0x0, 0xfffffffffffff000, 0x2) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) io_uring_setup$auto(0x9e6, 0x0) close_range$auto(0x2, 0x8, 0x0) getrandom$auto(0x0, 0x8, 0x80003) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000000)='/dev/swradio12\x00', 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system/cpu/crash_hotplug\x00', 0x8a080, 0x0) r0 = socket(0x10, 0x2, 0x4) close_range$auto(0x2, 0x8, 0x0) r1 = socket(0x10, 0x2, 0xc) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="18000000", @ANYRES8=r1, @ANYBLOB="01"], 0x18}, 0x1, 0x0, 0x0, 0x60008004}, 0x80) write$auto(r0, &(0x7f0000000000)='-\x00', 0xfdef) 3.421001243s ago: executing program 4 (id=1333): memfd_create$auto(&(0x7f0000000000)='!\x00', 0x16) socket(0xa, 0x2, 0x3a) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$auto_l2tp(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$auto_L2TP_CMD_TUNNEL_CREATE(r1, &(0x7f0000001040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x5c, r2, 0x1, 0x70bd25, 0x25dfdbf7, {0x1, 0x0, 0x3f00}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x58}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @local}]}, 0x5c}, 0x1, 0x0, 0x0, 0x44000}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip_vti0\x00', 0x0}) bpf$auto(0x0, &(0x7f00000000c0)=@bpf_attr_5={@target_ifindex=r3, r0, 0x8000, 0x2, 0xffffffffffffffff, @relative_id=0x13, 0x6}, 0xf) bpf$auto(0x1, &(0x7f00000001c0)=@raw_tracepoint={0x5, 0xffff, 0x0, 0x3}, 0xf) timer_create$auto(0x2, 0x0, &(0x7f0000000140)=0x6) timer_delete$auto(0x0) 3.166096839s ago: executing program 4 (id=1334): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/oom_adj\x00', 0x48402, 0x0) read$auto(r0, 0x0, 0x7) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r1, &(0x7f0000000200)={0x0, 0x2}, 0x3) socket(0x25, 0x6, 0x80000000) openat$auto_tracing_mark_fops_trace(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/tracing/trace_marker\x00', 0x43, 0x0) r2 = landlock_create_ruleset$auto(&(0x7f0000000040)={0xa, 0x81, 0x2}, 0xfffffffffffffffd, 0x40) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_nl802154(&(0x7f0000000100), r3) sendmsg$auto_NL802154_CMD_GET_SEC_LEVEL(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1c, r4, 0xf01, 0x70bd2c, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40084}, 0x40) sendmsg$auto_NL802154_CMD_SET_SEC_PARAMS(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r4, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x7}, @NL802154_ATTR_BEACON_INTERVAL={0x5, 0x26, 0xea}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x200000c0) 3.11208195s ago: executing program 1 (id=1335): mmap$auto(0x0, 0x101, 0x4000000000df, 0xeb1, 0x200000401, 0x8000) socket(0x2b, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x4e22, @remote}, 0x6a) poll$auto(0x0, 0x7f, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$auto_TIOCSETD2(0xffffffffffffffff, 0x5423, 0x0) fcntl$auto(0x3, 0x4, 0xa553) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000600), 0xffffffffffffffff) openat$auto_fuse_dev_operations_fuse_i(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x501, 0x0) fcntl$auto(0x3, 0x4, 0xa553) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'dummy0\x00'}) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) socket(0xa, 0x801, 0x84) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) r2 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) read$auto(r2, &(0x7f0000000040)='/dev/snd/seq\x00', 0x7) write$auto(r1, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x2242, 0x0) select$auto(0x9, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x1, 0x948b, 0x0, 0x15f4da07, 0x6, 0x10, 0x64, 0x80000020, 0x1000, 0xb, 0x9, 0x2, 0x8]}, 0x0) 2.981823538s ago: executing program 0 (id=1336): r0 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, 0x0, 0x2, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0x6e93018, 0x401, 0x8000) pipe$auto(&(0x7f0000000040)=r0) ioctl$auto_SNDCTL_SEQ_RESETSAMPLES(r1, 0x40045109, &(0x7f0000000140)="fde43d38a3a77612d4aa48e07e873105c7bcd0bc") mremap$auto(0x8000104000, 0xb8, 0x1, 0x3, 0xfffff000) r2 = io_uring_setup$auto(0x9, 0x0) mmap$auto(0x4, 0x5, 0x4000000000df, 0x40000000000eb1, 0x401, 0x8000) r3 = socket(0x2, 0x2, 0x0) r4 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$auto(0x3, &(0x7f0000000040)=@can={0x1d, r5}, 0x6a) r7 = syz_clone3(&(0x7f0000001480)={0x20000, &(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200), {0x2c}, &(0x7f0000000240)=""/61, 0x3d, &(0x7f0000000480)=""/4096, &(0x7f0000000280)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0], 0x8, {r1}}, 0x58) sendmsg$auto_MACSEC_CMD_UPD_OFFLOAD(r2, &(0x7f0000005640)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000005680)=ANY=[@ANYBLOB='4@\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002cbd7000fbdbdf250a00000008000100", @ANYRESOCT=r7, @ANYRES8=r7, @ANYRES32=r6, @ANYBLOB="d4100980cd10408008006f00", @ANYRES32=r7, @ANYRES16, @ANYRES32=r5, @ANYRES16=r8, @ANYRES64=r3, @ANYRES32=r7, @ANYBLOB="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", @ANYBLOB="00000000eab345d64f7588dc56", @ANYRES32=r3, @ANYBLOB="0fbc52addb12fcb5927e2fb3a84a48f4fe5fd7c50b883b3727f46e009476b496faf686efb96800000000b100038018005e8014006d000000000000000000000000000000000006e6ea8c453ad864a2dd486e030ad00eab478641d5a4c61151db5053292bbf2982b2b730f23bc3d2698fded5cacecd66d27d471c1f5fc6453f01ef341f8a010ed5edb7b8881707d5dfb1fc16fa0cdf0f46021285973fbf095850fa338728c0a2f080e64db3adc1766ef7287cd6b064b60407679eb951a77d8217ff7d5ebf78671d9a86b2c31ecf0728fe53ec6ae6f4f0dd677e3cc8000000"], 0x4034}, 0x1, 0x0, 0x0, 0x800}, 0x20008000) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(0xffffffffffffffff, 0x0, 0xd0) sendmmsg$auto(0xffffffffffffffff, 0x0, 0x9a5, 0x5) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) sysfs$auto(0x2, 0xd, 0x0) r9 = fsopen$auto(0x0, 0x1) fsconfig$auto(r9, 0x8, 0x0, 0x0, 0x0) fsconfig$auto_FSCONFIG_SET_BINARY(r1, 0x2, &(0x7f0000000300)='\v\'\bn\x91p\xe6\x1eRN8\x99\x86\xdde\x1cJ\x99\x00\x00\x00\x00\x00\x00\xfd\xfd\xd3\xd3\x1d\xf8\xbe\x1e7\xbb\xedO#\x14mC\x97\x06\xd9bZ\xddL\'\x03\x00\xff\x9f\x1e\xf9\xa4*\x01\x00\x00\x00^\x0fo\x84\xfc\x89\v\xea\x1b\xc6\xc0\x8b\xc0CL\"\x01\x0e#\xae\xa9i8W\xe5Iq\xf0\xcdr\xfa\xed<\x86[c4%\xa3\x14^\xbe\xa2E\xd8?\'\x8dg\x81K*&\xab\xd7\xa6+,\xc3\xc2g\x01JZ\xbb*\xb5\xa1;0\x81\x11\x9a?g`sFh\x00\x00,,\x93\xba\x88\x93\xc6\b\xe5\xaaJ+\x02\x9b#\xa9\x9b\x17\x82\xd7\xee\xd1\xbf2\x03\x00\x00\x00\x00\x00\x00\x00B\xa0\x99\xb0R\xb4J}\xa8\xa1\x84]F\xe0\x83/\xc0\xd8\x05f_\xfa\x19\a\x00\xf1\x12lwU&[\xde?\x00\x00\xf7\xc1\xa6\xf2\xc1\"\xact\xee\xc9\xb2\x1d\xb3\xef#\xcb}b\x90\xafR\xf5\x8cg\x95A\x89\x8d\x9a\xfcV\x9bm\xd4\x82\x7f9\x12\x98\x1c\x8e\x1f\xdc\xe5Y\x7f\xe8\xe1g%\xb8\xf9b!\xc8\xa0\xf7\x06\xbb\xdf\x1d\xfb\x00\x979\x8e\xd0AP\xbf\x1fM\x1fd~\xeeS^8v\x80\x1b\xb1I\xb1\xa4\x89\xc7\x9d\xf2P\x04\x99N{\x9a\xfa\xf3\xcb\xc3Bx\xb5\xb8*\xa0-\xda\x84\xc5S\xe2\xc6\x92/\xed\xc2\xceK\xad\x00\x00*)Hh\x8d\x06cQ\xf1\x9d\xad\r}\x15e\x18\x06\xe3\xd2\xe4Q', &(0x7f0000000280), 0x5) read$auto_udf_dir_operations_udfdecl(r9, 0x0, 0x0) read$auto_blk_mq_debugfs_fops_blk_mq_debugfs(r9, 0x0, 0x0) mmap$auto(0x8000, 0x20009, 0x7, 0x80000011, r0, 0x100000000) r10 = io_uring_setup$auto(0x1d48, 0x0) io_uring_register$auto(r10, 0x15, 0x0, 0x9) r11 = openat$auto_rtc_dev_fops_dev(0xffffffffffffff9c, &(0x7f00000000c0), 0x28c0, 0x0) ioctl$auto_RTC_WKALM_RD(r11, 0x80287010, &(0x7f0000000100)={0x0, 0xc7, {0xfffffffb, 0x7, 0x5, 0x0, 0x0, 0x1, 0x101, 0x7, 0x2}}) unshare$auto(0x40000080) unshare$auto(0x40000080) 2.586084922s ago: executing program 2 (id=1337): r0 = openat$auto_uinput_fops_uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x169001, 0x0) ioctl$auto_UI_DEV_CREATE(r0, 0x5501, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) close_range$auto(0x0, 0xfffffffffffff000, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) mincore$auto(0x1000, 0x8001, 0x0) fcntl$auto(0x8000000000000001, 0x26, 0x8) mmap$auto(0x0, 0x2020009, 0x10000000000000a, 0xeb1, 0xfffffffffffffffa, 0x8000) socket(0xa, 0x3, 0x3b) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000005c0)={'veth0_to_bridge\x00', 0x0}) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) unshare$auto(0x40000080) mbind$auto(0x0, 0x100000004, 0x100000000, 0x0, 0x6, 0x2) madvise$auto(0x0, 0x20499d, 0x9) r3 = openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, 0x0, 0x101041, 0x0) write$auto(r3, 0x0, 0x5) close_range$auto(0x0, 0xfffffffffffff000, 0x2) io_uring_setup$auto(0x59, &(0x7f0000000000)={0x3, 0x3ff, 0x2, 0x1, 0x2, 0xa, 0xffffffffffffffff, [], {0x8, 0x1, 0x1, 0x22b, 0x8000100, 0x581, 0x104, 0x1000006, 0xffffffffffffffff}, {0xbfc7, 0x1, 0x52, 0x8, 0x3, 0x3d, 0x8, 0x7, 0x100000000}}) r4 = open(&(0x7f0000000080)='./bus\x00', 0x64040, 0xc0) fcntl$auto(r4, 0x0, 0xa8) bpf$auto(0x0, &(0x7f0000000100)=@bpf_attr_5={@target_ifindex=r2, r1, 0x9c, 0x0, 0x1, @relative_fd=r1, 0x80}, 0x96) io_uring_setup$auto(0x6, 0x0) fcntl$auto(0x8000000000000001, 0x26, 0x8) fcntl$auto(0x8000000000000001, 0x7, 0x8) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) memfd_create$auto(0x0, 0xe) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0) 2.462629157s ago: executing program 4 (id=1338): mmap$auto(0x0, 0x101, 0x4000000000df, 0xeb1, 0x200000401, 0x8000) r0 = socket(0x2b, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x4e22, @remote}, 0x6a) sendmmsg$auto(r0, &(0x7f0000000080)={{0x0, 0x12, 0x0, 0x9, 0x0, 0x1f, 0xfffffffd}, 0xffff}, 0x5, 0x20000043) poll$auto(0x0, 0x7f, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$auto(0x3, 0x4, 0xa553) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$auto_fuse_dev_operations_fuse_i(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x501, 0x0) fcntl$auto(0x3, 0x4, 0xa553) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'dummy0\x00'}) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) socket(0xa, 0x801, 0x84) setsockopt$auto(0x3, 0x10000000084, 0xd, 0x0, 0x8) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$auto(r2, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) openat$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffff9c, 0x0, 0x40000, 0x0) select$auto(0x9, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x1, 0x948b, 0x0, 0x15f4da07, 0x6, 0x10, 0x64, 0x80000020, 0x1000, 0xb, 0x9, 0x2, 0x8]}, 0x0) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000140)={{0x0, 0x200084c, 0x0, 0x9, 0x0, 0x3, 0x10b}, 0x4}, 0xdfffffff, 0xc5c) mbind$auto(0x8000002000, 0x100000004, 0x1, 0x0, 0xffffffffffffff39, 0x800001) writev$auto(0x3, &(0x7f0000000100)={0x0, 0x7112}, 0x8) 1.520028146s ago: executing program 1 (id=1339): mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) socket(0xa, 0x3, 0x3b) close_range$auto(0x2, 0x8, 0x0) socket(0xa, 0x2, 0x73) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/event0\x00', 0x2, 0x0) ioctl$auto_EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x2000, 0x800004, 0x9}) r1 = socket(0x10, 0x2, 0x0) sendmsg$auto_ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x2000000}, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200", @ANYBLOB="5de1"], 0x1ac}}, 0x40000) recvmmsg$auto(r1, &(0x7f0000000140)={{0x0, 0xfffffffe, 0x0, 0x5, 0x0, 0x200002, 0xafb}, 0x800}, 0xfffffffb, 0x10, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0x18}, 0x1) 1.41547905s ago: executing program 2 (id=1340): mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) socket(0xa, 0x3, 0x3b) close_range$auto(0x2, 0x8, 0x0) socket(0xa, 0x2, 0x73) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/event0\x00', 0x2, 0x0) ioctl$auto_EVIOCGMASK(r0, 0x80104592, &(0x7f0000000000)={0x2000, 0x800004, 0x9}) r1 = socket(0x10, 0x2, 0x0) sendmsg$auto_ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x2000000}, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200", @ANYBLOB="5de1"], 0x1ac}}, 0x40000) recvmmsg$auto(r1, &(0x7f0000000140)={{0x0, 0xfffffffe, 0x0, 0x5, 0x0, 0x200002, 0xafb}, 0x800}, 0xfffffffb, 0x10, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0x18}, 0x1) 1.403568754s ago: executing program 4 (id=1341): mkdir$auto(&(0x7f0000000100)='./file0\x00', 0x8cd) rmdir$auto(&(0x7f0000000040)='./cgroup.cpu/cpuset.cpus\x00') write$auto(0xffffffffffffffff, 0x0, 0xfffffdf1) ioctl$auto_FS_IOC_SETFLAGS2(0xffffffffffffffff, 0x40086602, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x400, 0xdf, 0xeb1, 0x1272, 0x108000) r0 = socket(0xa, 0x801, 0x106) setsockopt$auto(r0, 0x6, 0x24, 0x0, 0x9) select$auto(0x2, &(0x7f0000000300)={[0x3, 0xff, 0x8, 0x7, 0x8, 0x2, 0x26, 0x2, 0xfe2, 0x6, 0xe, 0x7, 0x100000001, 0xffffffff80000001, 0x2, 0x8c]}, 0x0, 0x0, &(0x7f0000000480)={0x9, 0x9}) r1 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000800)='/dev/tty0\x00', 0x102, 0x0) write$auto_console_fops_tty_io(r1, &(0x7f0000000000)="c80d1b5d399b39", 0xfdef) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x8000000000000000, 0x15) mmap$auto(0x0, 0x2020005, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) remap_file_pages$auto(0x6a27, 0x1000, 0x400000000000000, 0x200, 0x4) r2 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000200), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_NL80211_CMD_GET_PROTOCOL_FEATURES(r3, &(0x7f0000002280)={0x0, 0x0, &(0x7f0000002240)={&(0x7f0000002200)={0x14, r2, 0x1, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x48800}, 0x4) ioctl$auto_SNDRV_PCM_IOCTL_HW_PARAMS_OLD2(0xffffffffffffffff, 0xc1004111, &(0x7f0000000380)={0x6, [0x1ff, 0xfff, 0x4], [{0x1, 0xff, 0x1, 0x1}, {0x7, 0x7, 0x1, 0x1}, {0x1, 0x0, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x80, 0x0, 0x0, 0x1, 0x1}, {0x1ff, 0x7, 0x1, 0x1}, {0x7fff, 0x6, 0x1, 0x0, 0x0, 0x1}, {0x3590, 0x3, 0x1, 0x0, 0x1}, {0x0, 0x20, 0x0, 0x0, 0x1, 0x1}, {0x5d6, 0x7, 0x1, 0x1}, {0x80000000, 0x0, 0x1, 0x1, 0x1, 0x1}, {0x5, 0xdf, 0x1}, {0x2, 0xe, 0x1, 0x1, 0x0, 0x1}], 0x7, 0x4, 0xc, 0x6, 0x200, 0x401, 0xfffffffffffffeff, "88a3e32921c700e8d189a7534ad6f347345887ce689fe346dc02809645f1f9764dec9ad2d83992be6dca670abe2c982f2ab6b63bb60a4bbeaac81d42794f97b1"}) 575.569014ms ago: executing program 0 (id=1342): mmap$auto(0x0, 0x101, 0x4000000000df, 0xeb1, 0x200000401, 0x8000) r0 = socket(0x2b, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x4e22, @remote}, 0x6a) sendmmsg$auto(r0, &(0x7f0000000080)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xfffffffd}, 0xffff}, 0x5, 0x20000043) poll$auto(0x0, 0x7f, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$auto_TIOCSETD2(0xffffffffffffffff, 0x5423, 0x0) fcntl$auto(0x3, 0x4, 0xa553) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000600), 0xffffffffffffffff) openat$auto_fuse_dev_operations_fuse_i(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x501, 0x0) fcntl$auto(0x3, 0x4, 0xa553) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) socket(0xa, 0x801, 0x84) setsockopt$auto(0x3, 0x10000000084, 0xd, 0x0, 0x8) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) r3 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) read$auto(r3, &(0x7f0000000040)='/dev/snd/seq\x00', 0x7) write$auto(r2, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x2242, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D3\x00', 0x1, 0x0) select$auto(0x9, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x1, 0x948b, 0x0, 0x15f4da07, 0x6, 0x10, 0x64, 0x80000020, 0x1000, 0xb, 0x9, 0x2, 0x8]}, 0x0) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000140)={{0x0, 0x200084c, 0x0, 0x9, 0x0, 0x3, 0x10b}, 0x4}, 0xdfffffff, 0xc5c) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) mbind$auto(0x8000002000, 0x100000004, 0x1, 0x0, 0xffffffffffffff39, 0x800001) writev$auto(0x3, &(0x7f0000000100)={0x0, 0x7112}, 0x8) 186.635417ms ago: executing program 2 (id=1343): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x14fa02, 0x0) mmap$auto(0x0, 0x810004, 0x400000000ffb, 0x8000000008011, 0x3, 0x8000) openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$auto(0x0, 0xe983, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) close_range$auto(0x2, 0x8, 0x0) r1 = socket(0xa, 0x2, 0x0) r2 = socket(0xa, 0x801, 0x84) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x11}}, 0x54) getsockopt$auto(r2, 0x84, 0x6c, 0x0, &(0x7f0000000100)=0x1000c0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) close_range$auto(0x2, 0xffffffffffffffff, 0x0) socket(0x18, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) r4 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000280), 0x101000, 0x0) ioctl$auto_KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r1) ioctl$auto_KVM_CREATE_VM(r3, 0x4048aecb, 0x0) sendmsg$auto_NL80211_CMD_GET_STATION(0xffffffffffffffff, 0x0, 0x24045840) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/midiC2D0\x00', 0x83, 0x0) setsockopt$auto_SO_PEEK_OFF(r0, 0xff, 0x2a, &(0x7f0000000080)='/dev/nullb0\x00', 0x4) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x181500, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) iopl$auto(0x0) 8.475493ms ago: executing program 1 (id=1344): mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) r0 = socket(0x1e, 0x4, 0x0) get_robust_list$auto(0x0, 0x0, 0x0) setsockopt$auto(r0, 0x10f, 0x7f, 0x0, 0x100) close_range$auto(0x0, 0xffffffffffffffff, 0x2) r1 = open(&(0x7f0000000800)='./file0\x00', 0x1a9a40, 0x10) execveat$auto(r1, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) 0s ago: executing program 4 (id=1345): r0 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) r1 = socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) sendmmsg$auto(0x3, 0x0, 0x787b, 0x7000000) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/scsi/scsi\x00', 0x80002, 0x0) write$auto_proc_reg_file_ops_compat_inode(r1, &(0x7f00000024c0)="a458f4e5e5f4bcc7fad26fd67f02b7cd05e6589800c28ef8f8202c09b2638f3653c6ed3b849812627a484d93e7ca38bb6c75b1d0f95ba576d7f2aba7a6e17d8a748fa2c2b65445121fdb006e371bc9da60cdd2378cf6a100a75f14aee91714b49cf0714f88fa5e59aae9bcf9c237ad19523f31da1c288cdf62813dd7d4d35f4f653b02ee9be0d662a5b8c4b2abd40ce043cd48819ea9eaa38e675e316b30542f9931634b3a830a7b54d420ab67826dddb406fed3bed2b77ecb0a7d4e2af6b59bab4910255fc1c235940b6f7f253131c3cd2ac263c02923997e0d75105d0d2cf679ea39a73b46233a7ae8e3bbfb0d80046e233f9d8c5560fe1c960668ebcbe0f83692592c77c17cd13221d12f7101576ebed9672885ab88780d1e19fac43722706ec0ba321cbad1a4655b89cf162edf24d1fefcae46d1249c3454cec842f32115775e6874e5cd7ded5dd35826f4cd5305cb3ef22976a7038ab5b6c2f47ab885ca72fac9790238d313859fab15b48ac55d1f572eedc5696e7699164709ec83e685df236a03296471157171e45fc876d86da156922a730e921b1db59737aa99d3c340400112561338a371d1046b32398ad4d770d08435561793bb629ea9c546540c8f54fed75b9e2e96a93bbbe986a8f4979193d7542319a3420287a1ac0a39444fc1abbf0a42bcff5cfa283d15f6c6e299a21abb3a375b3e1ddbb02e6159c9457952209b24c1bf943c54670ae8c2e47f56c96fddee1f2e1632fabde9bcd0bf1ae29eaa6cd2eba33477d8c8731f44173d7c9f6671a951d3e53e696f8f9879f9a974f7e2966e75142cda07e655b6d2eabea316f895785acf3bc931bf224e07110af85ec024d81e326efd5d258d42f731858bb0cb93c93b9030cb34b2a95e7844c018230d92b285d8cbe8bee6a92fd4243e53fa90f4635ecfdb49081d198b4146014cfc4419497fb921b2f61e23ce527374349012778e08f814df03867fee8247ee26c549c0597f94afc17d785b61e1725fa64bc12f1affe87e9117e71290bce5f75ad394817234f97c49fbc63a4d811719871c0a2d5db42d5f8ec45959a8464af57cca0566f6bd41d693f1fb5c96e4c6a6f97f50f459f7793e6046d1b535de78802b9fd9953dafe263ab3d693c0fee0283e70c610e2cfc0e3cb3854dd9d02d700eb666d80dadef740e5f274c2a8ba5fafe1898378022c3d51249710e4f4081b3e2f53670250d3ad7a06eeb02ee94505f7fc8d2c5e9a984a6ab7c1b761f517919a2f44c6bfeaf840c359627be82c08c5769921720bbd883aa74003d8dafec23f539b6b26205d931dcbd381c61430e58954ccd8bef6e8ff18243d769b9139e86d83ee72e5a8c7ac6dc0c997faf9b347947a40e7ef33686c2ee0b49d7c58148e4c8f73fcab6c5597f71feef03fc47db06955299b166bff481c71499fe92fde4e754db5ac71e1c8471ecd1d15fc9c48ce2d01fcdec9b8a9c4cd5d591f590a521dd39d3354e7e2750f7260fe89c02bb3bddd30f11be772eb95752246632df16474832514493cb6c50e8fc6b37dbc263cf970f0ab0d1221245082e91e90f55ad8354eb735038335b42e2571267b07cf71225010aab65145e443b50099b2bd4bfbf546a411e733e97d54db91e84448f966469b796425bbd144f83694b9e05b756fbba36cc6075ad8f30edb0847be6934482d6e19950af47db60a96ca5eef83faf4a1f628daa8dafc78cc2607fa0fcf6fc0ad00c64efb2c223c70bf7a8414c290d13793a5fc81b10a5bb5e8dd7ca2f81f5556d231bf2cfbf1923285aba060c1c88882107e14fddcaaf3eaea37a0bb7216050585c886b6c3fad247d85ccd458dfb746d3d0f6e517adf50a31fc96530950f186943de01ff77d98273875b727cfaf927820d52ee3a63fea63b2d39b1f2c6c2d985e62b96e4ec129207e488a2f91356ba91a8d8bd5b63718d087dfc183e56ceb924afae5f3a12d8c53bb21b8593965b1d68aa52ca985fa510d279ffc470468e3aec2d7524d80826a94e48a6ca4d11e5fc3d5776efc1a696b04c391c872eb2f42fcf6b84e6498f5d0520600f9f68a36d3c535b9d7cfc1d45415374adb90f1e6d300a99f2b5f6f77594c336ddc9b171c4875247201b05ab171a7d4418dcfffcee9996be2cd77e9d7e92965d28e1458df6d184ba7d9cd55d5994a00e692d7674f2ae01d6dd56c3e4b5aa1c0f27ae4c4cbbfe7289743b7c5f9ba7300891f4c83f414318e77de74d84d33b7f83c456e198b99d64e8b7caad5bcd618993764bb24178a990d736edf4965346c2ac76c99b22a5114ec39bc818d6a469b0d4f1aeaf955c14d7a3a5b787141d465a55d71b6138a8dc8cb1d303371c97d8479cb09545bf4a08fa99ab7ea21b3b3a95f4b052e261baf2be0131ce619ecd352904fc2486735edf6d2df283f1e2dae7432557bd8c899b397e769088797f337b3aa1867a9728148f9c63f643ce41f19906640e50764b1a6286beabe9f9e074ca60552f1212aad80b22cbbb45c6e6f00f51020df928756caa3cf374342257807d6daea4e74a79c6144fae4f78915303542b7a5d48a17179a4a43ab18631b06d81c01409277dac0d58ff48c86f679e9c0c56aa8ca6c7591078d6bee3ff9857e099145cf0775ef0ee006f9697e4c69efe0ff72543d70d8ac9faba1eec24ba9f9a3e30fa5d324ba137aaa7175a529c13a8fc321d92472c9b19c941e701f7225664b05613cb07b0705112105ab3c28b00af1b6f930f3d903ee6cc164d77d5d2a0b16667cfb6b329b53b30d8d9a826ba7430d519b1b7f537ed2df08845eb5df7737fe3554f3d96144b42bfd92cc5daab42446f3d46272a00f2457d39ef3e9ea37362d402f6287ea6f485f68ffbe383e21089c313171f6c33f8a7055299ab7cfc5d974c487d992cac1ca53c05c1e9bdb38f6ca0ed6d4e0d8ab7b6197fdd1b4b95e6a466c8d9336c571ea1743e96e0b88da75520b8adddcaa932336fa02f63ce1a7eb909507f778ca3b5f2a736f396528d06ea86f63d3e45f545d262cadd337d321023ae0e5052ba4c0028dbd19765b0097039a64d58a8998ef7afba341b42d6b227cad8f4c4025a766dee22a0cfde5f8c0581d4442a7aac906a0db5fad825611e487228aed5eec17f08d887a34d2b7c6c25f77412ee9941d5dec68a0464a1b0fd6eede1aa1b50579a93f205943dfd626204b9ca493c5aaececd17df71ac200cf7331a8bfbeddb6cd95b0b3016e56de0a9eeadf8d8c3591ae061e743f7c1ca4522bf55b2d80f3ba5df92d81433552dad6fd744ea71903b15a6374613b2a64a533cf6fa974273e7e5359f47428d7620d98d877faadad739a9a761713832ea70da990271b575e7cff075714d563b5b752ab50a7e1a1b5e689ff210503faabb37b8aa1d845825ab2488cfcb6a22010a55c4c045745f186ba8f42bc5a4dd06831da770670209ba568016459c50aef30c8aba754e341183817ad9b386e6b4e194cf66b76c9ea6313491d99d7e7a6d5c92bcec000c58794de2acfc4c490392a68f61e60bf664287e7020e4f30d897d916eb73dd4965b100f3c528cf2a46d43fca6351fc8c6c50fee04340b1f2fdf382a257eab0d964e7a2f0b1b7b9bc017117d8ebb40816b5515c88f7682c02b92b01d9fe884c963846f64800463830d83605a2ea32510dfbaaa29af264f60e8f72f307880f595715637dd799de8d77b0c7131bc04d44ce06b82a0f355e09e3d580124167e62fb12c584dc9553f3f91c86afffe6d871784c56c687b48b14bc974c65f18468eb3806be71c563a8af3075e4d9ff2c55ebab74ac4d384bc7f012dd39e373f74bab4ec597caa798112958890c00de56da95293e578490fb0e1e8fa63e1db877e75c7da1e394e37f8a971f7fe1354a800fff0c23aa66d990acf8fc7524d52a0c4f7b66459cb1811719afec92b7bd88e43569559f7f5fd41196c8ead0c70e13cb05b1155aab093a58b0d4652ce5ca005f868cf38fbefd401ddc9a747447ca6ea90b277688ef780461d14c5186b5a724cf50e5e3a7453e7ac4e79f07851317ae57911529daaa03d6745df50c78b868cb60757828b00d5215b8d67733e2ab1366afacbec2fae934460a1e364275715fc2fe5b911240d59d94084b3386d130c9f52d844858bd36c866b2ca215c02aaff1c4be7a5d2329e00e5ad58de3e87c862402ff5d3632b1f871461f57f6194057ccde4d1d4adc08b0da2778896aa95ef376c53818fafa74872e2f99af03edfe5e8d8e030816a01fa193007f84a627991f24f9054d0347082c2c27294d8bea1422b5847a3bfd2684f5708013d6f3c4d41baca139ebab799b0f2d15eeb4a5fd195b892d331bd1db3f0ec4ddc225e52ef8a326ccd4b86995bf90ceffd0a18d37806ee49d09f072ddab15df82556c459daf45705ebfd358c4eb7547add41da3364d90fcdd36759ebfeda88080a7f6d24ebb0e29e3a1b830e773a2c6d312472375b0428a221e03e2a1810a1c3cc8cde61e5359eefbb7324f4a6b04a2da87bce311a319ae8a842a518135750779d022b1a5321eb779d318d17387a7b7a739620594b090a2e550442c3debdc07a7a5283acc99539834c47ccf7635557a3066b81b32135df2e34c509dbf66dc0276e1e57977b45d77d41db78981883cf8ce8a738c04753911e957bf044e0bdbb1e9a72a7b5f884b61293e2f2756a32f6ef292a95e8484e101194a8c7e90f1e41fddf7d6af09dff5e308a2fbf5f0158d45bc87341ce3414c4b26cbc47ba43b2c2ad9ce6068df85d30fa994bf55cca9c327501c5335711988d3b4b5552c4fb9e9b6601a63cbb0a72ecdac3848ca4870814e0b8dee48a0ab5b14224c71f12cd648a3a39cba8e68f1562c1ad4966b7099015039518de65178c6a5e409166cc49d53b0f053773535421dfe289bd7c7fc2172dd4c5820ea3d2bbfd5bfd056a4d249a803440eada02f46e6fb9db13c74dad1303ca88b0a5091e196837eedd6a1dcd00e95fee39f252e3fb3afcb28d1db702bec482f19f7a5a327a522354e7bdbb3619697cd5c6e5b098b9a3c11478ef2b6467d22d0409e43bcb6552aaf47890c30077e56e77bfc53bc77fba63a324586f3172014b98dfac4ad686c83e611b89b1591a88dc4402d5cb60366455174cf0b84d0685454265a4a7d023b588ae491e6dac119433b2610170a8dc52a0c9f60cec85fe7fea415bf61e50c315b00c70a240a56345e1030731c4144d128e8dab606b1bda54874452af20ed7d6f3350b477417857884a6a6972b9696e92464b762da5739e400850df7ad82c63efb359d3a96b5a4a2f385432b6fa54c54a37678013d1774107b168b32225172d1081aa093def6e5ed6c05767128a4ebd0913ab03d200de072e81dbbc7b0c947ee3e34f6795211e632651852cb9cd7c2de1ef54d20ef625a193ed13061030c9a2e7f8c5674cbde924e25c8f97b6add0f4f89ef2b16ff418581aebd9f962f671a6adff28acf04edd01a96f69e0671780bdf40a19e9a3a235289771738cd32d1ef14509d11781d17608251fb7fa1b9d3c8646497ba0ce8890a2f0bd6e485959ceb8edf74981ef1c0ad7fc4f67bc4c941daef39fefbbdfa39979cf0e6454d565e8e90f8f4ac565a42dde87e16d4ad0977e1e67f88f560131ddaacc8a1f9db08441e6a9ddabae4b19441ef451ae9d9a854b193eb337d68830637f3ae81738bcc1a016077efe7692e146018b417d1199a14a79eecdcb00b0477f83627be935cc3a16a90b59b501d02be6091623c94f0fcf3e74616da0bbd767384c47fbe393c08c896979eef4cf1", 0xfff) sendmmsg$auto(0x4, 0x0, 0x9a6, 0x6) statmount$auto(0x0, &(0x7f0000000680)={0xa, 0x929, 0x4001, 0x7, 0x5, 0x100717e, 0x6, 0x7, 0x5, 0x7ff, 0x10000000, 0x46, 0x4, 0x200000000001, 0x81, 0xfffffffffffffffb, 0x8, 0x0, 0x2, 0x2, 0x864, 0xe, 0x22000, 0x200, 0x4, 0x1, 0x0, 0x40, 0x0, 0x8, 0x0, [0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf78600000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x8000, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x3, 0xfffffffffffff4f3, 0x0, 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x81, 0x100000001], "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"}, 0xa, 0xd) r2 = openat$auto__ctl_fops_dm_ioctl(0xffffffffffffff9c, &(0x7f0000000180), 0x1541, 0x0) write$auto_proc_clear_refs_operations_internal(r0, &(0x7f0000000000)="73d6cc4fdf406742386dd72ff1428a506f5cd946a3", 0x15) ioctl$auto__ctl_fops_dm_ioctl(r2, 0xfffffff7effffd01, &(0x7f00000001c0)) close_range$auto(0x2, 0xffffffffffffffff, 0x0) r3 = openat$auto_dma_heap_fops_dma_heap(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$auto_dma_heap_fops_dma_heap(r3, 0xffffffffffdffe00, &(0x7f0000000140)=';') ioctl$auto(0x3, 0x40086200, 0x38) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000580)='/dev/video37\x00', 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000001080)='/sys/kernel/mm/transparent_hugepage/hugepages-32kB/stats/nr_anon_partially_mapped\x00', 0x80040, 0x0) mmap$auto(0x0, 0x400009, 0xdf, 0x11, 0xffffffffffffffff, 0x2) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, 0x0, 0x60580, 0x0) r4 = openat$auto_force_devcoredump_fops_hci_vhci(0xffffffffffffff9c, 0x0, 0x640903, 0x0) write$auto(r4, 0x0, 0xe) r5 = openat$auto_ima_measure_policy_ops_ima_fs(0xffffffffffffff9c, &(0x7f0000000000), 0x48001, 0x0) write$auto(r5, &(0x7f0000000800)='0\"\xfb]$|\xcb1j\xeb0B|d\x1e\x99\xb9\xfd\xd3\x89O\x9f\xac+\xf6\xd7/\xc9\xe9x\xd4\xf3\xc8\xf5\x7fW\xd3\xa6\x96\xd3^\xb8\xb4gq%H\xcc\x88r\xeaO\x8e\x10\t\xc7 P\xcf\xa7H\b\x04\x87\x98\x16`\xa3S\xd46\x10Wf\xc9<7\xcf\xc9\xf1\b\x9b\x8c\x9fu;\xc48(u\xf9Bx\n\xafW%/bBT\xa9\a\xed\xd2H4\x96\xa3U\xca\xf1\xef\x14dU\x15\x16\xa7\xdd\x01\x0e\xda\xc8\xd3\x00\xc5\b\x1a\xb0mN\x01\xb1\xc8B.U\xd1\x02\'\x9a\'\xf1;\xedJ\xf6@\xac\a\xf5\xf5 |\x1ex\xb7@=\xad\xe7\xff\xd6\xc1\xcf\x11\x0f\x99+v\x873\xc4\x17]\x17!]ct\xff\t\xb2A\x0f\x91\x02\xca&\x91n\xc1\x9e\xcb\x1b\xec\x972\xa9\x00', 0x4000002) r6 = io_uring_setup$auto(0x21, 0x0) futex$auto(&(0x7f0000000080)=0x1, 0xb, 0x1, 0x0, 0x0, 0x2) futex$auto(&(0x7f0000000080)=0xfffffffa, 0xc, 0x1, 0x0, 0x0, 0xfffffffa) close_range$auto(r6, 0x8, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/net/dummy0/mtu\x00', 0xe3102, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/pci0000:00/0000:00:03.0/resource1\x00', 0x209080, 0x0) mmap$auto(0x0, 0x3, 0x1000000000001, 0x8000000008011, 0x3, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) kernel console output (not intermixed with test programs): .226492][ T9250] ? hook_file_ioctl_common+0x146/0x410 [ 345.226540][ T9250] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 345.226578][ T9250] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 345.226608][ T9250] __x64_sys_ioctl+0x18e/0x210 [ 345.226650][ T9250] do_syscall_64+0x106/0xf80 [ 345.226754][ T9250] ? clear_bhb_loop+0x40/0x90 [ 345.226793][ T9250] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 345.226824][ T9250] RIP: 0033:0x7f69c779c799 [ 345.226845][ T9250] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 345.226870][ T9250] RSP: 002b:00007f69c86fc028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 345.226919][ T9250] RAX: ffffffffffffffda RBX: 00007f69c7a16180 RCX: 00007f69c779c799 [ 345.226936][ T9250] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 345.226950][ T9250] RBP: 00007f69c7832c99 R08: 0000000000000000 R09: 0000000000000000 [ 345.226964][ T9250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 345.226979][ T9250] R13: 00007f69c7a16218 R14: 00007f69c7a16180 R15: 00007fffb0491b88 [ 345.227011][ T9250] [ 345.460096][ T9250] debugfs: out of free dentries, can not create directory '9250-10' [ 347.262849][ T9283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7fe00 [ 347.328883][ T9283] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 347.379722][ T9283] flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 347.407259][ T9283] page_type: f5(slab) [ 347.421242][ T9283] raw: 00fff00000000040 ffff88813fe3d140 dead000000000100 dead000000000122 [ 347.457580][ T9283] raw: 0000000000000000 0000000800040004 00000000f5000000 0000000000000000 [ 347.485620][ T9283] head: 00fff00000000040 ffff88813fe3d140 dead000000000100 dead000000000122 [ 347.527458][ T9283] head: 0000000000000000 0000000800040004 00000000f5000000 0000000000000000 [ 347.564688][ T9283] head: 00fff00000000003 ffffea0001ff8001 00000000ffffffff 00000000ffffffff [ 347.576319][ T9283] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 347.594393][ T9283] page dumped because: unmovable page [ 347.602753][ T9283] page_owner tracks the page as allocated [ 347.610676][ T9283] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 58, tgid 58 (kworker/u8:4), ts 311258840054, free_ts 311129773228 [ 347.636190][ T9283] post_alloc_hook+0x153/0x170 [ 347.643991][ T9283] get_page_from_freelist+0x111d/0x3140 [ 347.650984][ T9283] __alloc_frozen_pages_noprof+0x27c/0x2ba0 [ 347.667303][ T9283] new_slab+0xa6/0x6c0 [ 347.671993][ T9283] refill_objects+0x26b/0x400 [ 347.678663][ T9283] __pcs_replace_empty_main+0x1ab/0x600 [ 347.694935][ T9283] __kmalloc_node_track_caller_noprof+0x694/0x850 [ 347.706479][ T9283] kmalloc_reserve+0xe8/0x350 [ 347.716644][ T9283] __alloc_skb+0x185/0x710 [ 347.722981][ T9283] nsim_dev_trap_report_work+0x2af/0xd10 [ 347.731777][ T9283] process_one_work+0x9d7/0x1920 [ 347.743763][ T9283] worker_thread+0x5da/0xe40 [ 347.750432][ T9283] kthread+0x370/0x450 [ 347.757440][ T9283] ret_from_fork+0x754/0xd80 [ 347.762583][ T9283] ret_from_fork_asm+0x1a/0x30 [ 347.775874][ T9283] page last free pid 8791 tgid 8791 stack trace: [ 347.790660][ T9283] __free_frozen_pages+0x7e1/0x10d0 [ 347.815534][ T9283] qlist_free_all+0x47/0xe0 [ 347.825709][ T9283] kasan_quarantine_reduce+0x1a0/0x1f0 [ 347.835933][ T9283] __kasan_slab_alloc+0x69/0x90 [ 347.866451][ T9283] kmem_cache_alloc_noprof+0x241/0x6e0 [ 347.906069][ T9283] vm_area_dup+0x27/0x8e0 [ 347.914891][ T9283] __split_vma+0x18c/0xd90 [ 347.941379][ T9283] vma_modify+0x197d/0x2250 [ 347.946190][ T9283] vma_modify_flags+0x257/0x3d0 [ 348.011577][ T9283] mprotect_fixup+0x209/0xb70 [ 348.016390][ T9283] do_mprotect_pkey+0x9e1/0xe70 [ 348.054822][ T9283] __x64_sys_mprotect+0x78/0xc0 [ 348.077384][ T9283] do_syscall_64+0x106/0xf80 [ 348.117344][ T9283] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 349.579865][ T9320] FAULT_INJECTION: forcing a failure. [ 349.579865][ T9320] name failslab, interval 1, probability 0, space 0, times 0 [ 349.594708][ T9320] CPU: 0 UID: 0 PID: 9320 Comm: syz.2.658 Tainted: G L syzkaller #0 PREEMPT(full) [ 349.594767][ T9320] Tainted: [L]=SOFTLOCKUP [ 349.594778][ T9320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 349.594799][ T9320] Call Trace: [ 349.594809][ T9320] [ 349.594822][ T9320] dump_stack_lvl+0x100/0x190 [ 349.594879][ T9320] should_fail_ex.cold+0x5/0xa [ 349.594919][ T9320] should_failslab+0xc2/0x120 [ 349.594953][ T9320] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 349.595006][ T9320] ? __d_alloc+0x34/0xa80 [ 349.595051][ T9320] __d_alloc+0x34/0xa80 [ 349.595095][ T9320] d_alloc+0x4a/0x1e0 [ 349.595134][ T9320] lookup_one_qstr_excl+0x175/0x250 [ 349.595182][ T9320] start_dirop+0x59/0xb0 [ 349.595238][ T9320] simple_start_creating+0xf9/0x110 [ 349.595293][ T9320] ? __pfx_simple_start_creating+0x10/0x10 [ 349.595451][ T9320] ? mntput+0x70/0xa0 [ 349.595518][ T9320] ? simple_pin_fs+0xa3/0x190 [ 349.595570][ T9320] debugfs_start_creating.part.0+0x82/0x170 [ 349.595610][ T9320] __debugfs_create_file+0xb3/0x4f0 [ 349.595653][ T9320] debugfs_create_file_full+0x41/0x60 [ 349.595694][ T9320] kvm_dev_ioctl+0x1491/0x1a50 [ 349.595748][ T9320] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 349.595802][ T9320] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 349.595846][ T9320] __x64_sys_ioctl+0x18e/0x210 [ 349.595900][ T9320] do_syscall_64+0x106/0xf80 [ 349.595947][ T9320] ? clear_bhb_loop+0x40/0x90 [ 349.596008][ T9320] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 349.596044][ T9320] RIP: 0033:0x7f61f459c799 [ 349.596086][ T9320] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 349.596121][ T9320] RSP: 002b:00007f61f5484028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 349.596154][ T9320] RAX: ffffffffffffffda RBX: 00007f61f4816180 RCX: 00007f61f459c799 [ 349.596177][ T9320] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 349.596196][ T9320] RBP: 00007f61f4632c99 R08: 0000000000000000 R09: 0000000000000000 [ 349.596216][ T9320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 349.596235][ T9320] R13: 00007f61f4816218 R14: 00007f61f4816180 R15: 00007ffd4d4e06a8 [ 349.596281][ T9320] [ 352.241624][ T9350] syz.4.669 (9350) used greatest stack depth: 19672 bytes left [ 352.883934][ T5823] Bluetooth: hci3: unexpected event 0x33 length: 0 < 10 [ 354.990744][ T9401] ubi0: attaching mtd0 [ 355.022171][ T9401] ubi0: scanning is finished [ 355.035071][ T9401] ubi0: empty MTD device detected [ 355.716420][ T9401] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 355.716474][ T9401] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 355.716503][ T9401] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 355.716530][ T9401] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 355.716557][ T9401] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 355.716582][ T9401] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 355.716608][ T9401] ubi0: max/mean erase counter: 0/0, WL threshold: 4096, image sequence number: 972045758 [ 355.716641][ T9401] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 355.719405][ T9417] ubi0: background thread "ubi_bgt0d" started, PID 9417 [ 355.776405][ T9408] ubi0: detaching mtd0 [ 355.829580][ T9408] ubi0: mtd0 is detached [ 358.542225][ T9466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7fe00 [ 358.577299][ T9466] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 358.586159][ T9466] flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 358.603372][ T9466] page_type: f5(slab) [ 358.607925][ T9466] raw: 00fff00000000040 ffff88813fe3d140 dead000000000100 dead000000000122 [ 358.618723][ T9466] raw: 0000000000000000 0000000800040004 00000000f5000000 0000000000000000 [ 358.631762][ T9466] head: 00fff00000000040 ffff88813fe3d140 dead000000000100 dead000000000122 [ 358.642601][ T9466] head: 0000000000000000 0000000800040004 00000000f5000000 0000000000000000 [ 358.656432][ T9466] head: 00fff00000000003 ffffea0001ff8001 00000000ffffffff 00000000ffffffff [ 358.667062][ T9466] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 358.735124][ T9466] page dumped because: unmovable page [ 358.742919][ T9466] page_owner tracks the page as allocated [ 358.750298][ T9466] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 58, tgid 58 (kworker/u8:4), ts 311258840054, free_ts 311129773228 [ 358.774327][ T9466] post_alloc_hook+0x153/0x170 [ 358.787519][ T9466] get_page_from_freelist+0x111d/0x3140 [ 358.794090][ T9466] __alloc_frozen_pages_noprof+0x27c/0x2ba0 [ 358.800985][ T9466] new_slab+0xa6/0x6c0 [ 358.805455][ T9466] refill_objects+0x26b/0x400 [ 358.811149][ T9466] __pcs_replace_empty_main+0x1ab/0x600 [ 358.817898][ T9466] __kmalloc_node_track_caller_noprof+0x694/0x850 [ 358.825095][ T9466] kmalloc_reserve+0xe8/0x350 [ 358.843869][ T9466] __alloc_skb+0x185/0x710 [ 358.848981][ T9466] nsim_dev_trap_report_work+0x2af/0xd10 [ 358.855235][ T9466] process_one_work+0x9d7/0x1920 [ 358.861067][ T9466] worker_thread+0x5da/0xe40 [ 358.866124][ T9466] kthread+0x370/0x450 [ 358.870933][ T9466] ret_from_fork+0x754/0xd80 [ 358.875984][ T9466] ret_from_fork_asm+0x1a/0x30 [ 358.881583][ T9466] page last free pid 8791 tgid 8791 stack trace: [ 358.907554][ T9466] __free_frozen_pages+0x7e1/0x10d0 [ 358.923565][ T9466] qlist_free_all+0x47/0xe0 [ 358.939261][ T9466] kasan_quarantine_reduce+0x1a0/0x1f0 [ 358.954197][ T9466] __kasan_slab_alloc+0x69/0x90 [ 358.967328][ T9466] kmem_cache_alloc_noprof+0x241/0x6e0 [ 358.985095][ T9466] vm_area_dup+0x27/0x8e0 [ 358.999098][ T9466] __split_vma+0x18c/0xd90 [ 359.010704][ T9466] vma_modify+0x197d/0x2250 [ 359.023344][ T9466] vma_modify_flags+0x257/0x3d0 [ 359.029556][ T9466] mprotect_fixup+0x209/0xb70 [ 359.036119][ T9466] do_mprotect_pkey+0x9e1/0xe70 [ 359.042345][ T9466] __x64_sys_mprotect+0x78/0xc0 [ 359.048003][ T9466] do_syscall_64+0x106/0xf80 [ 359.053039][ T9466] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 359.097885][ T9475] syz.4.693 uses obsolete (PF_INET,SOCK_PACKET) [ 362.145111][ T9509] tipc: Started in network mode [ 362.168438][ T9509] tipc: Node identity ffffffff, cluster identity 4711 [ 362.205824][ T9509] tipc: Node number set to 4294967295 [ 362.440835][ T9523] block2mtd: error: cannot open device /sys/modu [ 367.357642][ T9601] block2mtd: error: cannot open device /sys/modu [ 371.164740][ T9666] tipc: Started in network mode [ 371.170768][ T9666] tipc: Node identity ffffffff, cluster identity 4711 [ 371.179418][ T9666] tipc: Node number set to 4294967295 [ 371.628724][ T9677] block2mtd: error: cannot open device /sys/modu [ 374.248461][ T9714] tipc: Started in network mode [ 374.253708][ T9714] tipc: Node identity ffffffff, cluster identity 4711 [ 374.273131][ T9714] tipc: Node number set to 4294967295 [ 374.556888][ T9723] FAULT_INJECTION: forcing a failure. [ 374.556888][ T9723] name failslab, interval 1, probability 0, space 0, times 0 [ 374.617531][ T9723] CPU: 0 UID: 0 PID: 9723 Comm: syz.2.738 Tainted: G L syzkaller #0 PREEMPT(full) [ 374.617582][ T9723] Tainted: [L]=SOFTLOCKUP [ 374.617592][ T9723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 374.617616][ T9723] Call Trace: [ 374.617625][ T9723] [ 374.617638][ T9723] dump_stack_lvl+0x100/0x190 [ 374.617690][ T9723] should_fail_ex.cold+0x5/0xa [ 374.617727][ T9723] ? get_callchain_buffers+0x123/0x380 [ 374.617791][ T9723] should_failslab+0xc2/0x120 [ 374.617825][ T9723] __kmalloc_noprof+0xe0/0x850 [ 374.617873][ T9723] ? rcu_is_cpu_rrupt_from_idle+0x270/0x270 [ 374.617954][ T9723] get_callchain_buffers+0x123/0x380 [ 374.617990][ T9723] ? bpf_lsm_capable+0x9/0x10 [ 374.618022][ T9723] ? security_capable+0x80/0x260 [ 374.618138][ T9723] stack_map_alloc+0x316/0x610 [ 374.618174][ T9723] ? __pfx_stack_map_mem_usage+0x10/0x10 [ 374.618210][ T9723] map_create+0x84e/0x2ba0 [ 374.618270][ T9723] ? __pfx_map_create+0x10/0x10 [ 374.618306][ T9723] ? __might_fault+0xc5/0x140 [ 374.618351][ T9723] ? __might_fault+0xc5/0x140 [ 374.618411][ T9723] __sys_bpf+0x2091/0x4b90 [ 374.618453][ T9723] ? __pfx___sys_bpf+0x10/0x10 [ 374.618487][ T9723] ? proc_fail_nth_write+0x9f/0x220 [ 374.618557][ T9723] ? find_held_lock+0x2b/0x80 [ 374.618595][ T9723] ? find_held_lock+0x2b/0x80 [ 374.618623][ T9723] ? ksys_write+0x190/0x250 [ 374.618663][ T9723] ? __mutex_unlock_slowpath+0x15c/0x790 [ 374.618757][ T9723] ? __fget_files+0x215/0x3d0 [ 374.618808][ T9723] ? fput+0x79/0x100 [ 374.618847][ T9723] ? ksys_write+0x1ac/0x250 [ 374.618875][ T9723] ? __pfx_ksys_write+0x10/0x10 [ 374.618912][ T9723] __x64_sys_bpf+0x7b/0xc0 [ 374.618948][ T9723] ? lockdep_hardirqs_on+0x78/0x100 [ 374.618993][ T9723] do_syscall_64+0x106/0xf80 [ 374.619035][ T9723] ? clear_bhb_loop+0x40/0x90 [ 374.619076][ T9723] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 374.619111][ T9723] RIP: 0033:0x7f61f459c799 [ 374.619137][ T9723] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 374.619168][ T9723] RSP: 002b:00007f61f54c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 374.619207][ T9723] RAX: ffffffffffffffda RBX: 00007f61f4815fa0 RCX: 00007f61f459c799 [ 374.619229][ T9723] RDX: 00000000000006f4 RSI: 0000200000000580 RDI: 0000000000000000 [ 374.619248][ T9723] RBP: 00007f61f54c6090 R08: 0000000000000000 R09: 0000000000000000 [ 374.619267][ T9723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 374.619285][ T9723] R13: 00007f61f4816038 R14: 00007f61f4815fa0 R15: 00007ffd4d4e06a8 [ 374.619337][ T9723] [ 378.913196][ T9773] tipc: Started in network mode [ 378.927366][ T9773] tipc: Node identity ffffffff, cluster identity 4711 [ 378.934527][ T9773] tipc: Node number set to 4294967295 [ 379.023002][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 379.029757][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 381.138678][ T9810] block2mtd: error: cannot open device /sys/modu [ 384.863653][ T9860] block2mtd: error: cannot open device /sys/modu [ 387.857874][ T9884] zswap: compressor  not available [ 390.749326][ T9980] netlink: 342 bytes leftover after parsing attributes in process `syz.4.799'. [ 393.585072][T10015] futex_wake_op: syz.2.809 tries to shift op by -2048; fix this program [ 393.618108][T10015] futex_wake_op: syz.2.809 tries to shift op by -2048; fix this program [ 393.643383][T10015] 0x000000000001-0x000000020000 : "" [ 393.706784][T10015] ftl_cs: FTL header corrupt! [ 395.150468][T10042] netlink: 330 bytes leftover after parsing attributes in process `syz.2.817'. [ 395.160323][T10042] bridge0: port 3(gretap0) entered disabled state [ 395.167610][T10042] bridge0: port 2(bridge_slave_1) entered disabled state [ 395.175094][T10042] bridge0: port 1(bridge_slave_0) entered disabled state [ 397.634326][T10082] FAULT_INJECTION: forcing a failure. [ 397.634326][T10082] name failslab, interval 1, probability 0, space 0, times 0 [ 397.749225][T10082] CPU: 1 UID: 0 PID: 10082 Comm: syz.1.829 Tainted: G L syzkaller #0 PREEMPT(full) [ 397.749283][T10082] Tainted: [L]=SOFTLOCKUP [ 397.749295][T10082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 397.749316][T10082] Call Trace: [ 397.749326][T10082] [ 397.749338][T10082] dump_stack_lvl+0x100/0x190 [ 397.749399][T10082] should_fail_ex.cold+0x5/0xa [ 397.749440][T10082] ? snd_pcm_plugin_build+0x64/0x650 [ 397.749585][T10082] should_failslab+0xc2/0x120 [ 397.749623][T10082] __kmalloc_noprof+0xe0/0x850 [ 397.749677][T10082] ? snd_pcm_hw_params+0x262/0x1cb0 [ 397.749860][T10082] snd_pcm_plugin_build+0x64/0x650 [ 397.749910][T10082] snd_pcm_plugin_build_io+0x207/0x5f0 [ 397.749966][T10082] ? __pfx_snd_pcm_plugin_build_io+0x10/0x10 [ 397.750014][T10082] ? __pfx_snd_pcm_hw_param_near.constprop.0+0x10/0x10 [ 397.750078][T10082] snd_pcm_oss_change_params_locked+0x2eb3/0x39f0 [ 397.750141][T10082] ? __pfx_snd_pcm_oss_change_params_locked+0x10/0x10 [ 397.750183][T10082] ? task_work_add+0x201/0x3b0 [ 397.750240][T10082] ? __pfx___mutex_lock+0x10/0x10 [ 397.750318][T10082] snd_pcm_oss_make_ready_locked+0xb7/0x130 [ 397.750363][T10082] snd_pcm_oss_sync+0x265/0x840 [ 397.750410][T10082] snd_pcm_oss_release+0x238/0x300 [ 397.750452][T10082] ? __pfx_snd_pcm_oss_release+0x10/0x10 [ 397.750491][T10082] __fput+0x3ff/0xb40 [ 397.750542][T10082] task_work_run+0x150/0x240 [ 397.750593][T10082] ? __pfx_task_work_run+0x10/0x10 [ 397.750656][T10082] exit_to_user_mode_loop+0x100/0x4a0 [ 397.750707][T10082] do_syscall_64+0x668/0xf80 [ 397.750753][T10082] ? clear_bhb_loop+0x40/0x90 [ 397.750795][T10082] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 397.750830][T10082] RIP: 0033:0x7f69c779c799 [ 397.750861][T10082] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 397.750895][T10082] RSP: 002b:00007f69c871d028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 397.750929][T10082] RAX: 0000000000000000 RBX: 00007f69c7a16090 RCX: 00007f69c779c799 [ 397.750950][T10082] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000002 [ 397.750970][T10082] RBP: 00007f69c7832c99 R08: 0000000000000000 R09: 0000000000000000 [ 397.750990][T10082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 397.751009][T10082] R13: 00007f69c7a16128 R14: 00007f69c7a16090 R15: 00007fffb0491b88 [ 397.751063][T10082] [ 399.134563][T10094] netlink: 342 bytes leftover after parsing attributes in process `syz.1.831'. [ 403.059552][T10139] netlink: 342 bytes leftover after parsing attributes in process `syz.0.843'. [ 407.624467][T10185] netlink: 342 bytes leftover after parsing attributes in process `syz.2.854'. [ 408.258212][ T5823] Bluetooth: hci4: ISO packet for unknown connection handle 0 [ 411.185801][T10237] FAULT_INJECTION: forcing a failure. [ 411.185801][T10237] name failslab, interval 1, probability 0, space 0, times 0 [ 411.185909][T10237] CPU: 0 UID: 0 PID: 10237 Comm: syz.2.870 Tainted: G L syzkaller #0 PREEMPT(full) [ 411.185961][T10237] Tainted: [L]=SOFTLOCKUP [ 411.185973][T10237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 411.185994][T10237] Call Trace: [ 411.186006][T10237] [ 411.186019][T10237] dump_stack_lvl+0x100/0x190 [ 411.186081][T10237] should_fail_ex.cold+0x5/0xa [ 411.186123][T10237] ? kernfs_fop_write_iter+0x26a/0x5f0 [ 411.186175][T10237] should_failslab+0xc2/0x120 [ 411.186214][T10237] __kmalloc_noprof+0xe0/0x850 [ 411.186280][T10237] kernfs_fop_write_iter+0x26a/0x5f0 [ 411.186327][T10237] vfs_write+0x6ac/0x1070 [ 411.186386][T10237] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 411.186430][T10237] ? __pfx_vfs_write+0x10/0x10 [ 411.186521][T10237] ksys_write+0x12a/0x250 [ 411.186556][T10237] ? __pfx_ksys_write+0x10/0x10 [ 411.186605][T10237] do_syscall_64+0x106/0xf80 [ 411.186654][T10237] ? clear_bhb_loop+0x40/0x90 [ 411.186701][T10237] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 411.186738][T10237] RIP: 0033:0x7f61f459c799 [ 411.186768][T10237] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 411.186804][T10237] RSP: 002b:00007f61f54c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 411.186837][T10237] RAX: ffffffffffffffda RBX: 00007f61f4815fa0 RCX: 00007f61f459c799 [ 411.186869][T10237] RDX: 0000000000000001 RSI: 0000200000000140 RDI: 0000000000000003 [ 411.186892][T10237] RBP: 00007f61f54c6090 R08: 0000000000000000 R09: 0000000000000000 [ 411.186913][T10237] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 411.186934][T10237] R13: 00007f61f4816038 R14: 00007f61f4815fa0 R15: 00007ffd4d4e06a8 [ 411.186983][T10237] [ 414.172202][T10280] FAULT_INJECTION: forcing a failure. [ 414.172202][T10280] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 414.237429][T10280] CPU: 1 UID: 0 PID: 10280 Comm: syz.2.881 Tainted: G L syzkaller #0 PREEMPT(full) [ 414.237479][T10280] Tainted: [L]=SOFTLOCKUP [ 414.237490][T10280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 414.237509][T10280] Call Trace: [ 414.237519][T10280] [ 414.237530][T10280] dump_stack_lvl+0x100/0x190 [ 414.237587][T10280] should_fail_ex.cold+0x5/0xa [ 414.237626][T10280] _copy_from_iter+0x1f4/0x1690 [ 414.237779][T10280] ? __pfx__copy_from_iter+0x10/0x10 [ 414.237815][T10280] ? rcu_is_watching+0x12/0xc0 [ 414.237865][T10280] ? trace_kmalloc+0x101/0x130 [ 414.237898][T10280] ? __kasan_kmalloc+0xaa/0xb0 [ 414.237949][T10280] ? __kmalloc_noprof+0x320/0x850 [ 414.238018][T10280] kernfs_fop_write_iter+0x186/0x5f0 [ 414.238062][T10280] vfs_write+0x6ac/0x1070 [ 414.238115][T10280] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 414.238156][T10280] ? __pfx_vfs_write+0x10/0x10 [ 414.238236][T10280] ksys_write+0x12a/0x250 [ 414.238264][T10280] ? __pfx_ksys_write+0x10/0x10 [ 414.238308][T10280] do_syscall_64+0x106/0xf80 [ 414.238353][T10280] ? clear_bhb_loop+0x40/0x90 [ 414.238394][T10280] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 414.238428][T10280] RIP: 0033:0x7f61f459c799 [ 414.238461][T10280] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 414.238493][T10280] RSP: 002b:00007f61f54c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 414.238526][T10280] RAX: ffffffffffffffda RBX: 00007f61f4815fa0 RCX: 00007f61f459c799 [ 414.238547][T10280] RDX: 0000000000000001 RSI: 0000200000000140 RDI: 0000000000000003 [ 414.238567][T10280] RBP: 00007f61f54c6090 R08: 0000000000000000 R09: 0000000000000000 [ 414.238586][T10280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 414.238604][T10280] R13: 00007f61f4816038 R14: 00007f61f4815fa0 R15: 00007ffd4d4e06a8 [ 414.238646][T10280] [ 416.821321][ T5823] Bluetooth: hci3: ISO packet for unknown connection handle 0 [ 417.462012][T10335] FAULT_INJECTION: forcing a failure. [ 417.462012][T10335] name failslab, interval 1, probability 0, space 0, times 0 [ 417.476082][T10335] CPU: 0 UID: 0 PID: 10335 Comm: syz.4.892 Tainted: G L syzkaller #0 PREEMPT(full) [ 417.476134][T10335] Tainted: [L]=SOFTLOCKUP [ 417.476145][T10335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 417.476166][T10335] Call Trace: [ 417.476177][T10335] [ 417.476188][T10335] dump_stack_lvl+0x100/0x190 [ 417.476245][T10335] should_fail_ex.cold+0x5/0xa [ 417.476286][T10335] should_failslab+0xc2/0x120 [ 417.476324][T10335] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 417.476375][T10335] ? mas_alloc_nodes+0x280/0x390 [ 417.476526][T10335] mas_alloc_nodes+0x280/0x390 [ 417.476571][T10335] mas_preallocate+0x39c/0xf10 [ 417.476620][T10335] ? __memcg_slab_post_alloc_hook+0x4c0/0x990 [ 417.476665][T10335] ? __pfx_mas_preallocate+0x10/0x10 [ 417.476729][T10335] ? anon_vma_name+0x5a/0x250 [ 417.476777][T10335] __split_vma+0x33d/0xd90 [ 417.476828][T10335] ? __pfx___split_vma+0x10/0x10 [ 417.476885][T10335] ? __pfx_mas_prev+0x10/0x10 [ 417.476973][T10335] vms_gather_munmap_vmas+0x39f/0x1500 [ 417.477022][T10335] ? validate_mm+0x261/0x4e0 [ 417.477067][T10335] ? validate_mm+0x261/0x4e0 [ 417.477116][T10335] ? __pfx_vms_gather_munmap_vmas+0x10/0x10 [ 417.477166][T10335] ? validate_mm+0x392/0x4e0 [ 417.477218][T10335] ? __pfx_validate_mm+0x10/0x10 [ 417.477272][T10335] do_vmi_align_munmap+0x287/0x5f0 [ 417.477327][T10335] ? __pfx_do_vmi_align_munmap+0x10/0x10 [ 417.477447][T10335] do_vmi_munmap+0x1f8/0x3e0 [ 417.477507][T10335] __vm_munmap+0x196/0x390 [ 417.477563][T10335] ? __pfx___vm_munmap+0x10/0x10 [ 417.477631][T10335] ? arch_syscall_is_vdso_sigreturn+0xb6/0x200 [ 417.477684][T10335] __x64_sys_munmap+0x59/0x80 [ 417.477722][T10335] do_syscall_64+0x106/0xf80 [ 417.477768][T10335] ? clear_bhb_loop+0x40/0x90 [ 417.477811][T10335] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 417.477845][T10335] RIP: 0033:0x7fed4dd9c5c7 [ 417.477873][T10335] Code: 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 417.477907][T10335] RSP: 002b:00007fed4ebacd18 EFLAGS: 00000206 ORIG_RAX: 000000000000000b [ 417.477939][T10335] RAX: ffffffffffffffda RBX: 00007fed44000000 RCX: 00007fed4dd9c5c7 [ 417.477961][T10335] RDX: 0000000000000000 RSI: 0000000000200000 RDI: 00007fed43e00000 [ 417.477981][T10335] RBP: 0000000000021000 R08: 00000000ffffffff R09: 0000000000000000 [ 417.478000][T10335] R10: 0000000000000022 R11: 0000000000000206 R12: 0000000004000000 [ 417.478020][T10335] R13: 0000000000001000 R14: 00007fed48000000 R15: 0000000000200000 [ 417.478064][T10335] [ 418.810491][T10363] block2mtd: error: cannot open device /sys/modu [ 419.731679][T10378] block2mtd: error: cannot open device /sys/modu [ 419.980932][T10388] netlink: 12 bytes leftover after parsing attributes in process `syz.4.901'. [ 422.343825][T10446] block2mtd: error: cannot open device /sys/modu [ 422.975887][T10461] FAULT_INJECTION: forcing a failure. [ 422.975887][T10461] name failslab, interval 1, probability 0, space 0, times 0 [ 423.022409][T10461] CPU: 0 UID: 0 PID: 10461 Comm: syz.0.918 Tainted: G L syzkaller #0 PREEMPT(full) [ 423.022461][T10461] Tainted: [L]=SOFTLOCKUP [ 423.022472][T10461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 423.022498][T10461] Call Trace: [ 423.022509][T10461] [ 423.022520][T10461] dump_stack_lvl+0x100/0x190 [ 423.022578][T10461] should_fail_ex.cold+0x5/0xa [ 423.022618][T10461] should_failslab+0xc2/0x120 [ 423.022654][T10461] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 423.022703][T10461] ? security_inode_alloc+0x3b/0x2c0 [ 423.022736][T10461] ? lockdep_init_map_type+0x5c/0x250 [ 423.022789][T10461] security_inode_alloc+0x3b/0x2c0 [ 423.022826][T10461] inode_init_always_gfp+0xced/0x1040 [ 423.022868][T10461] alloc_inode+0x8e/0x250 [ 423.022914][T10461] new_inode+0x22/0x1c0 [ 423.022963][T10461] debugfs_create_dir+0xc4/0x440 [ 423.023002][T10461] kvm_dev_ioctl+0x11b6/0x1a50 [ 423.023051][T10461] ? find_held_lock+0x2b/0x80 [ 423.023083][T10461] ? __fget_files+0x215/0x3d0 [ 423.023112][T10461] ? hook_file_ioctl_common+0x146/0x410 [ 423.023151][T10461] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 423.023206][T10461] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 423.023248][T10461] __x64_sys_ioctl+0x18e/0x210 [ 423.023301][T10461] do_syscall_64+0x106/0xf80 [ 423.023348][T10461] ? clear_bhb_loop+0x40/0x90 [ 423.023391][T10461] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 423.023426][T10461] RIP: 0033:0x7f117599c799 [ 423.023454][T10461] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 423.023500][T10461] RSP: 002b:00007f11767c1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 423.023534][T10461] RAX: ffffffffffffffda RBX: 00007f1175c16180 RCX: 00007f117599c799 [ 423.023558][T10461] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 423.023578][T10461] RBP: 00007f1175a32c99 R08: 0000000000000000 R09: 0000000000000000 [ 423.023597][T10461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 423.023616][T10461] R13: 00007f1175c16218 R14: 00007f1175c16180 R15: 00007ffeb4f19f68 [ 423.023662][T10461] [ 423.023717][T10461] debugfs: out of free dentries, can not create directory '10461-10' [ 424.742087][T10484] block2mtd: error: cannot open device /sys/modu [ 425.437883][T10488] usb usb36: usbfs: process 10488 (syz.0.924) did not claim interface 0 before use [ 425.870648][T10496] mkiss: ax0: crc mode is auto. [ 425.931995][ T29] audit: type=1800 audit(32772.020:3): pid=10502 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.928" name="dbroot" dev="configfs" ino=34103 res=0 errno=0 [ 426.029442][T10506] netlink: 12 bytes leftover after parsing attributes in process `syz.2.930'. [ 427.900759][T10542] block2mtd: error: cannot open device /sys/modu [ 428.861486][T10556] netlink: 4 bytes leftover after parsing attributes in process `syz.2.940'. [ 429.329380][T10554] zswap: compressor not available [ 429.336016][T10569] ACPI: EC: Assuming SCI_EVT clearing on QR_EC writes [ 429.451992][T10575] block2mtd: error: cannot open device /sys/modu [ 433.997794][T10638] netlink: 4 bytes leftover after parsing attributes in process `syz.0.964'. [ 434.014380][T10638] netlink: 25 bytes leftover after parsing attributes in process `syz.0.964'. [ 434.102624][T10640] usb usb36: usbfs: process 10640 (syz.1.956) did not claim interface 0 before use [ 434.377511][ T5823] Bluetooth: hci2: Opcode 0x0c03 failed: -110 [ 434.482326][T10640] mkiss: ax0: crc mode is auto. [ 435.872877][T10669] netlink: 4 bytes leftover after parsing attributes in process `syz.2.962'. [ 435.873429][T10669] netlink: 25 bytes leftover after parsing attributes in process `syz.2.962'. [ 437.274159][T10698] netlink: 4 bytes leftover after parsing attributes in process `syz.1.968'. [ 437.305775][T10690] zswap: compressor  not available [ 437.439933][T10704] block2mtd: error: cannot open device /sys/modu [ 440.462322][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.474444][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 441.512775][T10768] netlink: 4 bytes leftover after parsing attributes in process `syz.1.985'. [ 441.653534][T10770] block2mtd: error: cannot open device /sys/modu [ 441.718264][T10772] netlink: 4 bytes leftover after parsing attributes in process `syz.0.986'. [ 441.754392][T10772] netlink: 25 bytes leftover after parsing attributes in process `syz.0.986'. [ 443.386934][T10793] zswap: compressor not available [ 443.395634][T10796] ACPI: EC: Assuming SCI_EVT clearing on QR_EC writes [ 443.533401][T10814] netlink: 4 bytes leftover after parsing attributes in process `syz.0.997'. [ 443.562029][T10817] netlink: 4 bytes leftover after parsing attributes in process `syz.1.998'. [ 443.567028][T10814] FAULT_INJECTION: forcing a failure. [ 443.567028][T10814] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 443.585958][T10814] CPU: 0 UID: 0 PID: 10814 Comm: syz.0.997 Tainted: G L syzkaller #0 PREEMPT(full) [ 443.586013][T10814] Tainted: [L]=SOFTLOCKUP [ 443.586025][T10814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 443.586047][T10814] Call Trace: [ 443.586059][T10814] [ 443.586072][T10814] dump_stack_lvl+0x100/0x190 [ 443.586130][T10814] should_fail_ex.cold+0x5/0xa [ 443.586172][T10814] _copy_from_iter+0x1f4/0x1690 [ 443.586218][T10814] ? rcu_is_watching+0x12/0xc0 [ 443.586275][T10814] ? trace_kmem_cache_alloc+0xf3/0x120 [ 443.586311][T10814] ? __kasan_slab_alloc+0x89/0x90 [ 443.586346][T10814] ? __pfx__copy_from_iter+0x10/0x10 [ 443.586389][T10814] ? __asan_memset+0x23/0x50 [ 443.586438][T10814] ? __build_skb_around+0x278/0x390 [ 443.586482][T10814] ? is_vmalloc_addr+0x86/0xa0 [ 443.586539][T10814] netlink_sendmsg+0x808/0xda0 [ 443.586724][T10814] ? __pfx_netlink_sendmsg+0x10/0x10 [ 443.586784][T10814] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 443.586892][T10814] sock_write_iter+0x524/0x5a0 [ 443.586984][T10814] ? __pfx_netlink_sendmsg+0x10/0x10 [ 443.587039][T10814] ? __pfx_sock_write_iter+0x10/0x10 [ 443.587094][T10814] ? bpf_lsm_file_permission+0x9/0x10 [ 443.587149][T10814] ? security_file_permission+0x76/0x210 [ 443.587195][T10814] ? rw_verify_area+0xce/0x6d0 [ 443.587253][T10814] vfs_write+0x6ac/0x1070 [ 443.587312][T10814] ? __pfx_sock_write_iter+0x10/0x10 [ 443.587350][T10814] ? __pfx_vfs_write+0x10/0x10 [ 443.587409][T10814] ? __pfx_do_sys_openat2+0x10/0x10 [ 443.587478][T10814] ksys_write+0x1f8/0x250 [ 443.587511][T10814] ? __pfx_ksys_write+0x10/0x10 [ 443.587555][T10814] do_syscall_64+0x106/0xf80 [ 443.587603][T10814] ? clear_bhb_loop+0x40/0x90 [ 443.587644][T10814] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 443.587679][T10814] RIP: 0033:0x7f117599c799 [ 443.587707][T10814] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 443.587740][T10814] RSP: 002b:00007f1176803028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 443.587772][T10814] RAX: ffffffffffffffda RBX: 00007f1175c15fa0 RCX: 00007f117599c799 [ 443.587794][T10814] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000002 [ 443.587815][T10814] RBP: 00007f1176803090 R08: 0000000000000000 R09: 0000000000000000 [ 443.587846][T10814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 443.587866][T10814] R13: 00007f1175c16038 R14: 00007f1175c15fa0 R15: 00007ffeb4f19f68 [ 443.587911][T10814] [ 443.591006][T10817] netlink: 25 bytes leftover after parsing attributes in process `syz.1.998'. [ 444.082313][T10822] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1000'. [ 444.318900][T10838] block2mtd: error: cannot open device /sys/modu [ 444.361948][T10836] nvme_fcloop: unknown parameter or missing value '7="­ÿù;¤°&Lë=j³"Yq'R"' [ 444.374675][T10837] FAULT_INJECTION: forcing a failure. [ 444.374675][T10837] name failslab, interval 1, probability 0, space 0, times 0 [ 444.388107][T10837] CPU: 1 UID: 0 PID: 10837 Comm: syz.2.1000 Tainted: G L syzkaller #0 PREEMPT(full) [ 444.388158][T10837] Tainted: [L]=SOFTLOCKUP [ 444.388171][T10837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 444.388199][T10837] Call Trace: [ 444.388211][T10837] [ 444.388223][T10837] dump_stack_lvl+0x100/0x190 [ 444.388284][T10837] should_fail_ex.cold+0x5/0xa [ 444.388324][T10837] should_failslab+0xc2/0x120 [ 444.388360][T10837] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 444.388413][T10837] ? __d_alloc+0x34/0xa80 [ 444.388461][T10837] __d_alloc+0x34/0xa80 [ 444.388503][T10837] d_alloc+0x4a/0x1e0 [ 444.388544][T10837] lookup_one_qstr_excl+0x175/0x250 [ 444.388596][T10837] start_dirop+0x59/0xb0 [ 444.388653][T10837] simple_start_creating+0xf9/0x110 [ 444.388708][T10837] ? __pfx_simple_start_creating+0x10/0x10 [ 444.388765][T10837] ? mntput+0x70/0xa0 [ 444.388816][T10837] ? simple_pin_fs+0xa3/0x190 [ 444.388867][T10837] debugfs_start_creating.part.0+0x82/0x170 [ 444.388906][T10837] __debugfs_create_file+0xb3/0x4f0 [ 444.388948][T10837] debugfs_create_file_full+0x41/0x60 [ 444.388989][T10837] kvm_dev_ioctl+0x1491/0x1a50 [ 444.389045][T10837] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 444.389100][T10837] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 444.389141][T10837] __x64_sys_ioctl+0x18e/0x210 [ 444.389208][T10837] do_syscall_64+0x106/0xf80 [ 444.389257][T10837] ? clear_bhb_loop+0x40/0x90 [ 444.389302][T10837] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 444.389338][T10837] RIP: 0033:0x7f61f459c799 [ 444.389367][T10837] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 444.389401][T10837] RSP: 002b:00007f61f5484028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 444.389434][T10837] RAX: ffffffffffffffda RBX: 00007f61f4816180 RCX: 00007f61f459c799 [ 444.389456][T10837] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 444.389476][T10837] RBP: 00007f61f4632c99 R08: 0000000000000000 R09: 0000000000000000 [ 444.389496][T10837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 444.389515][T10837] R13: 00007f61f4816218 R14: 00007f61f4816180 R15: 00007ffd4d4e06a8 [ 444.389560][T10837] [ 445.928243][T10855] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1007'. [ 445.950078][T10855] FAULT_INJECTION: forcing a failure. [ 445.950078][T10855] name failslab, interval 1, probability 0, space 0, times 0 [ 445.983865][T10855] CPU: 1 UID: 0 PID: 10855 Comm: syz.2.1007 Tainted: G L syzkaller #0 PREEMPT(full) [ 445.983916][T10855] Tainted: [L]=SOFTLOCKUP [ 445.983927][T10855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 445.983946][T10855] Call Trace: [ 445.983956][T10855] [ 445.983968][T10855] dump_stack_lvl+0x100/0x190 [ 445.984023][T10855] should_fail_ex.cold+0x5/0xa [ 445.984061][T10855] should_failslab+0xc2/0x120 [ 445.984097][T10855] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 445.984147][T10855] ? skb_clone+0x190/0x400 [ 445.984276][T10855] skb_clone+0x190/0x400 [ 445.984316][T10855] netlink_deliver_tap+0xaed/0xcc0 [ 445.984364][T10855] netlink_unicast+0x650/0x870 [ 445.984416][T10855] ? __pfx_netlink_unicast+0x10/0x10 [ 445.984463][T10855] ? __asan_memset+0x23/0x50 [ 445.984508][T10855] ? __build_skb_around+0x278/0x390 [ 445.984549][T10855] ? is_vmalloc_addr+0x86/0xa0 [ 445.984602][T10855] netlink_sendmsg+0x8b0/0xda0 [ 445.984666][T10855] ? __pfx_netlink_sendmsg+0x10/0x10 [ 445.984727][T10855] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 445.984841][T10855] sock_write_iter+0x524/0x5a0 [ 445.984875][T10855] ? __pfx_netlink_sendmsg+0x10/0x10 [ 445.984925][T10855] ? __pfx_sock_write_iter+0x10/0x10 [ 445.984973][T10855] ? bpf_lsm_file_permission+0x9/0x10 [ 445.985026][T10855] ? security_file_permission+0x76/0x210 [ 445.985067][T10855] ? rw_verify_area+0xce/0x6d0 [ 445.985119][T10855] vfs_write+0x6ac/0x1070 [ 445.985171][T10855] ? __pfx_sock_write_iter+0x10/0x10 [ 445.985208][T10855] ? __pfx_vfs_write+0x10/0x10 [ 445.985268][T10855] ? __pfx_do_sys_openat2+0x10/0x10 [ 445.985326][T10855] ksys_write+0x1f8/0x250 [ 445.985353][T10855] ? __pfx_ksys_write+0x10/0x10 [ 445.985392][T10855] do_syscall_64+0x106/0xf80 [ 445.985436][T10855] ? clear_bhb_loop+0x40/0x90 [ 445.985478][T10855] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 445.985511][T10855] RIP: 0033:0x7f61f459c799 [ 445.985539][T10855] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 445.985570][T10855] RSP: 002b:00007f61f54c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 445.985606][T10855] RAX: ffffffffffffffda RBX: 00007f61f4815fa0 RCX: 00007f61f459c799 [ 445.985627][T10855] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000002 [ 445.985646][T10855] RBP: 00007f61f54c6090 R08: 0000000000000000 R09: 0000000000000000 [ 445.985665][T10855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 445.985684][T10855] R13: 00007f61f4816038 R14: 00007f61f4815fa0 R15: 00007ffd4d4e06a8 [ 445.985727][T10855] [ 445.985790][T10855] netlink: 25 bytes leftover after parsing attributes in process `syz.2.1007'. [ 447.242072][T10879] FAULT_INJECTION: forcing a failure. [ 447.242072][T10879] name failslab, interval 1, probability 0, space 0, times 0 [ 447.287583][T10879] CPU: 1 UID: 0 PID: 10879 Comm: syz.0.1014 Tainted: G L syzkaller #0 PREEMPT(full) [ 447.287642][T10879] Tainted: [L]=SOFTLOCKUP [ 447.287655][T10879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 447.287676][T10879] Call Trace: [ 447.287686][T10879] [ 447.287698][T10879] dump_stack_lvl+0x100/0x190 [ 447.287757][T10879] should_fail_ex.cold+0x5/0xa [ 447.287796][T10879] should_failslab+0xc2/0x120 [ 447.287831][T10879] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 447.287881][T10879] ? __kernfs_new_node+0xd2/0x960 [ 447.287928][T10879] ? __lock_acquire+0x4a5/0x2630 [ 447.287980][T10879] __kernfs_new_node+0xd2/0x960 [ 447.288025][T10879] ? __kernel_text_address+0xd/0x30 [ 447.288093][T10879] ? __pfx___kernfs_new_node+0x10/0x10 [ 447.288136][T10879] ? do_raw_spin_lock+0x128/0x260 [ 447.288195][T10879] ? find_held_lock+0x2b/0x80 [ 447.288226][T10879] ? kernfs_root+0xee/0x2a0 [ 447.288270][T10879] ? kernfs_root+0xee/0x2a0 [ 447.288325][T10879] kernfs_new_node+0x11b/0x1a0 [ 447.288385][T10879] kernfs_create_dir_ns+0x4c/0x1a0 [ 447.288445][T10879] sysfs_create_dir_ns+0x13a/0x2b0 [ 447.288493][T10879] ? __pfx_sysfs_create_dir_ns+0x10/0x10 [ 447.288540][T10879] ? kfree_const+0x5a/0x70 [ 447.288621][T10879] ? rcu_is_watching+0x12/0xc0 [ 447.288674][T10879] ? kfree_const+0x5a/0x70 [ 447.288722][T10879] ? kfree+0x2ec/0x6b0 [ 447.288767][T10879] kobject_add_internal+0x2c8/0x930 [ 447.288889][T10879] kobject_add+0x16a/0x1e0 [ 447.288942][T10879] ? __pfx_kobject_add+0x10/0x10 [ 447.289016][T10879] kobject_create_and_add+0x7a/0xc0 [ 447.289062][T10879] __add_disk+0x66f/0xe40 [ 447.289194][T10879] ? find_held_lock+0x2b/0x80 [ 447.289232][T10879] add_disk_fwnode+0x3d4/0x5c0 [ 447.289292][T10879] zram_add+0x4d2/0x610 [ 447.289398][T10879] ? __pfx_zram_add+0x10/0x10 [ 447.289469][T10879] ? find_held_lock+0x2b/0x80 [ 447.289500][T10879] ? sysfs_file_kobj+0xe4/0x290 [ 447.289547][T10879] ? __pfx_hot_add_show+0x10/0x10 [ 447.289591][T10879] hot_add_show+0x21/0x80 [ 447.289634][T10879] class_attr_show+0x72/0xa0 [ 447.289713][T10879] ? __pfx_class_attr_show+0x10/0x10 [ 447.289747][T10879] sysfs_kf_seq_show+0x217/0x3a0 [ 447.289797][T10879] seq_read_iter+0x32f/0x1270 [ 447.289869][T10879] kernfs_fop_read_iter+0x46c/0x610 [ 447.289908][T10879] ? rw_verify_area+0xce/0x6d0 [ 447.289956][T10879] ? __pfx_kernfs_fop_read_iter+0x10/0x10 [ 447.289999][T10879] vfs_read+0x825/0xb30 [ 447.290070][T10879] ? __pfx_vfs_read+0x10/0x10 [ 447.290122][T10879] ? do_futex+0x192/0x350 [ 447.290181][T10879] ? __pfx_do_sys_openat2+0x10/0x10 [ 447.290237][T10879] ? __x64_sys_futex+0x34f/0x4d0 [ 447.290279][T10879] ? __x64_sys_futex+0x358/0x4d0 [ 447.290327][T10879] ksys_read+0x12a/0x250 [ 447.290373][T10879] ? __pfx_ksys_read+0x10/0x10 [ 447.290433][T10879] do_syscall_64+0x106/0xf80 [ 447.290477][T10879] ? clear_bhb_loop+0x40/0x90 [ 447.290519][T10879] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 447.290561][T10879] RIP: 0033:0x7f117599c799 [ 447.290590][T10879] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 447.290621][T10879] RSP: 002b:00007f1176803028 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 447.290648][T10879] RAX: ffffffffffffffda RBX: 00007f1175c15fa0 RCX: 00007f117599c799 [ 447.290667][T10879] RDX: 0000000000001000 RSI: 0000200000000ec0 RDI: 0000000000000002 [ 447.290684][T10879] RBP: 00007f1175a32c99 R08: 0000000000000000 R09: 0000000000000000 [ 447.290701][T10879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 447.290717][T10879] R13: 00007f1175c16038 R14: 00007f1175c15fa0 R15: 00007ffeb4f19f68 [ 447.290755][T10879] [ 447.374945][T10879] kobject: kobject_add_internal failed for holders (error: -12 parent: zram1) [ 447.748282][T10879] kobject: kobject_create_and_add: kobject_add error: -12 [ 448.044388][T10886] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1016'. [ 448.305226][T10886] FAULT_INJECTION: forcing a failure. [ 448.305226][T10886] name failslab, interval 1, probability 0, space 0, times 0 [ 448.319220][T10886] CPU: 1 UID: 0 PID: 10886 Comm: syz.2.1016 Tainted: G L syzkaller #0 PREEMPT(full) [ 448.319273][T10886] Tainted: [L]=SOFTLOCKUP [ 448.319285][T10886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 448.319304][T10886] Call Trace: [ 448.319315][T10886] [ 448.319327][T10886] dump_stack_lvl+0x100/0x190 [ 448.319387][T10886] should_fail_ex.cold+0x5/0xa [ 448.319428][T10886] should_failslab+0xc2/0x120 [ 448.319465][T10886] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 448.319518][T10886] ? alloc_inode+0x68/0x250 [ 448.319564][T10886] ? simple_start_creating+0xb0/0x110 [ 448.319619][T10886] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 448.319784][T10886] alloc_inode+0x68/0x250 [ 448.319832][T10886] new_inode+0x22/0x1c0 [ 448.319880][T10886] __debugfs_create_file+0x105/0x4f0 [ 448.319921][T10886] debugfs_create_file_full+0x41/0x60 [ 448.319959][T10886] kvm_dev_ioctl+0x1491/0x1a50 [ 448.320014][T10886] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 448.320067][T10886] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 448.320119][T10886] __x64_sys_ioctl+0x18e/0x210 [ 448.320173][T10886] do_syscall_64+0x106/0xf80 [ 448.320249][T10886] ? clear_bhb_loop+0x40/0x90 [ 448.320292][T10886] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 448.320329][T10886] RIP: 0033:0x7f61f459c799 [ 448.320357][T10886] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 448.320391][T10886] RSP: 002b:00007f61f54c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 448.320424][T10886] RAX: ffffffffffffffda RBX: 00007f61f4815fa0 RCX: 00007f61f459c799 [ 448.320446][T10886] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 448.320466][T10886] RBP: 00007f61f4632c99 R08: 0000000000000000 R09: 0000000000000000 [ 448.320486][T10886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 448.320505][T10886] R13: 00007f61f4816038 R14: 00007f61f4815fa0 R15: 00007ffd4d4e06a8 [ 448.320551][T10886] [ 448.320565][T10886] debugfs: out of free dentries, can not create file 'remote_tlb_flush_requests' [ 448.554915][T10894] block2mtd: error: cannot open device /sys/modu [ 449.682547][T10904] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1027'. [ 450.187843][T10917] FAULT_INJECTION: forcing a failure. [ 450.187843][T10917] name failslab, interval 1, probability 0, space 0, times 0 [ 450.202206][T10917] CPU: 1 UID: 0 PID: 10917 Comm: syz.0.1027 Tainted: G L syzkaller #0 PREEMPT(full) [ 450.202259][T10917] Tainted: [L]=SOFTLOCKUP [ 450.202270][T10917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 450.202290][T10917] Call Trace: [ 450.202300][T10917] [ 450.202313][T10917] dump_stack_lvl+0x100/0x190 [ 450.202371][T10917] should_fail_ex.cold+0x5/0xa [ 450.202411][T10917] should_failslab+0xc2/0x120 [ 450.202448][T10917] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 450.202501][T10917] ? __d_alloc+0x34/0xa80 [ 450.202558][T10917] __d_alloc+0x34/0xa80 [ 450.202600][T10917] d_alloc+0x4a/0x1e0 [ 450.202640][T10917] lookup_one_qstr_excl+0x175/0x250 [ 450.202686][T10917] start_dirop+0x59/0xb0 [ 450.202741][T10917] simple_start_creating+0xf9/0x110 [ 450.202796][T10917] ? __pfx_simple_start_creating+0x10/0x10 [ 450.202852][T10917] ? mntput+0x70/0xa0 [ 450.202912][T10917] ? simple_pin_fs+0xa3/0x190 [ 450.202965][T10917] debugfs_start_creating.part.0+0x82/0x170 [ 450.203002][T10917] __debugfs_create_file+0xb3/0x4f0 [ 450.203044][T10917] debugfs_create_file_full+0x41/0x60 [ 450.203086][T10917] kvm_dev_ioctl+0x1491/0x1a50 [ 450.203141][T10917] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 450.203195][T10917] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 450.203238][T10917] __x64_sys_ioctl+0x18e/0x210 [ 450.203291][T10917] do_syscall_64+0x106/0xf80 [ 450.203338][T10917] ? clear_bhb_loop+0x40/0x90 [ 450.203384][T10917] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 450.203420][T10917] RIP: 0033:0x7f117599c799 [ 450.203449][T10917] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 450.203483][T10917] RSP: 002b:00007f11767a0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 450.203516][T10917] RAX: ffffffffffffffda RBX: 00007f1175c16270 RCX: 00007f117599c799 [ 450.203538][T10917] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 450.203557][T10917] RBP: 00007f1175a32c99 R08: 0000000000000000 R09: 0000000000000000 [ 450.203577][T10917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 450.203596][T10917] R13: 00007f1175c16308 R14: 00007f1175c16270 R15: 00007ffeb4f19f68 [ 450.203641][T10917] [ 450.725860][T10920] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1022'. [ 450.771545][T10920] netlink: 25 bytes leftover after parsing attributes in process `syz.1.1022'. [ 450.826820][T10920] FAULT_INJECTION: forcing a failure. [ 450.826820][T10920] name failslab, interval 1, probability 0, space 0, times 0 [ 450.914602][T10920] CPU: 1 UID: 0 PID: 10920 Comm: syz.1.1022 Tainted: G L syzkaller #0 PREEMPT(full) [ 450.914653][T10920] Tainted: [L]=SOFTLOCKUP [ 450.914663][T10920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 450.914682][T10920] Call Trace: [ 450.914701][T10920] [ 450.914713][T10920] dump_stack_lvl+0x100/0x190 [ 450.914767][T10920] should_fail_ex.cold+0x5/0xa [ 450.914806][T10920] should_failslab+0xc2/0x120 [ 450.914841][T10920] __kmalloc_cache_noprof+0x7a/0x6f0 [ 450.914884][T10920] ? ctnetlink_alloc_filter+0x9f/0xae0 [ 450.915048][T10920] ? lock_acquire+0x1cf/0x380 [ 450.915096][T10920] ctnetlink_alloc_filter+0x9f/0xae0 [ 450.915150][T10920] ? __pfx_ctnetlink_alloc_filter+0x10/0x10 [ 450.915222][T10920] ? trace_contention_end+0x140/0x180 [ 450.915276][T10920] ? __mutex_lock+0x26a/0x1b90 [ 450.915328][T10920] ? nfnetlink_rcv_msg+0x8ce/0x1200 [ 450.915405][T10920] ctnetlink_del_conntrack+0x3a0/0xa80 [ 450.915465][T10920] ? __pfx_ctnetlink_del_conntrack+0x10/0x10 [ 450.915522][T10920] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 450.915615][T10920] ? rcu_is_watching+0x12/0xc0 [ 450.915675][T10920] nfnetlink_rcv_msg+0x9f4/0x1200 [ 450.915735][T10920] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 450.915782][T10920] ? kfree_skbmem+0x19f/0x210 [ 450.915858][T10920] ? __pfx___dev_queue_xmit+0x10/0x10 [ 450.915961][T10920] netlink_rcv_skb+0x159/0x420 [ 450.916010][T10920] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 450.916058][T10920] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 450.916126][T10920] ? ns_capable+0xd2/0xf0 [ 450.916177][T10920] nfnetlink_rcv+0x1b3/0x440 [ 450.916214][T10920] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 450.916251][T10920] ? netlink_deliver_tap+0x1ae/0xcc0 [ 450.916305][T10920] netlink_unicast+0x5aa/0x870 [ 450.916361][T10920] ? __pfx_netlink_unicast+0x10/0x10 [ 450.916408][T10920] ? __asan_memset+0x23/0x50 [ 450.916454][T10920] ? __build_skb_around+0x278/0x390 [ 450.916494][T10920] ? is_vmalloc_addr+0x86/0xa0 [ 450.916547][T10920] netlink_sendmsg+0x8b0/0xda0 [ 450.916605][T10920] ? __pfx_netlink_sendmsg+0x10/0x10 [ 450.916661][T10920] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 450.916730][T10920] sock_write_iter+0x524/0x5a0 [ 450.916764][T10920] ? __pfx_netlink_sendmsg+0x10/0x10 [ 450.916813][T10920] ? __pfx_sock_write_iter+0x10/0x10 [ 450.916861][T10920] ? bpf_lsm_file_permission+0x9/0x10 [ 450.916914][T10920] ? security_file_permission+0x76/0x210 [ 450.916956][T10920] ? rw_verify_area+0xce/0x6d0 [ 450.917008][T10920] vfs_write+0x6ac/0x1070 [ 450.917065][T10920] ? __pfx_sock_write_iter+0x10/0x10 [ 450.917102][T10920] ? __pfx_vfs_write+0x10/0x10 [ 450.917157][T10920] ? __pfx_do_sys_openat2+0x10/0x10 [ 450.917222][T10920] ksys_write+0x1f8/0x250 [ 450.917251][T10920] ? __pfx_ksys_write+0x10/0x10 [ 450.917294][T10920] do_syscall_64+0x106/0xf80 [ 450.917338][T10920] ? clear_bhb_loop+0x40/0x90 [ 450.917380][T10920] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 450.917415][T10920] RIP: 0033:0x7f69c779c799 [ 450.917442][T10920] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 450.917476][T10920] RSP: 002b:00007f69c873e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 450.917506][T10920] RAX: ffffffffffffffda RBX: 00007f69c7a15fa0 RCX: 00007f69c779c799 [ 450.917527][T10920] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000002 [ 450.917546][T10920] RBP: 00007f69c873e090 R08: 0000000000000000 R09: 0000000000000000 [ 450.917565][T10920] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 450.917585][T10920] R13: 00007f69c7a16038 R14: 00007f69c7a15fa0 R15: 00007fffb0491b88 [ 450.917628][T10920] [ 452.938026][T10958] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1028'. [ 453.185011][T10958] FAULT_INJECTION: forcing a failure. [ 453.185011][T10958] name failslab, interval 1, probability 0, space 0, times 0 [ 453.185130][T10958] CPU: 0 UID: 0 PID: 10958 Comm: syz.1.1028 Tainted: G L syzkaller #0 PREEMPT(full) [ 453.185178][T10958] Tainted: [L]=SOFTLOCKUP [ 453.185189][T10958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 453.185209][T10958] Call Trace: [ 453.185220][T10958] [ 453.185232][T10958] dump_stack_lvl+0x100/0x190 [ 453.185290][T10958] should_fail_ex.cold+0x5/0xa [ 453.185332][T10958] should_failslab+0xc2/0x120 [ 453.185370][T10958] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 453.185424][T10958] ? __d_alloc+0x34/0xa80 [ 453.185471][T10958] __d_alloc+0x34/0xa80 [ 453.185513][T10958] d_alloc+0x4a/0x1e0 [ 453.185554][T10958] lookup_one_qstr_excl+0x175/0x250 [ 453.185605][T10958] start_dirop+0x59/0xb0 [ 453.185660][T10958] simple_start_creating+0xf9/0x110 [ 453.185715][T10958] ? __pfx_simple_start_creating+0x10/0x10 [ 453.185771][T10958] ? mntput+0x70/0xa0 [ 453.185823][T10958] ? simple_pin_fs+0xa3/0x190 [ 453.185873][T10958] debugfs_start_creating.part.0+0x82/0x170 [ 453.185912][T10958] __debugfs_create_file+0xb3/0x4f0 [ 453.185955][T10958] debugfs_create_file_full+0x41/0x60 [ 453.185995][T10958] kvm_dev_ioctl+0x1491/0x1a50 [ 453.186062][T10958] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 453.186119][T10958] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 453.186162][T10958] __x64_sys_ioctl+0x18e/0x210 [ 453.186214][T10958] do_syscall_64+0x106/0xf80 [ 453.186259][T10958] ? clear_bhb_loop+0x40/0x90 [ 453.186303][T10958] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 453.186338][T10958] RIP: 0033:0x7f69c779c799 [ 453.186367][T10958] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 453.186402][T10958] RSP: 002b:00007f69c873e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 453.186435][T10958] RAX: ffffffffffffffda RBX: 00007f69c7a15fa0 RCX: 00007f69c779c799 [ 453.186457][T10958] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 453.186478][T10958] RBP: 00007f69c7832c99 R08: 0000000000000000 R09: 0000000000000000 [ 453.186497][T10958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 453.186517][T10958] R13: 00007f69c7a16038 R14: 00007f69c7a15fa0 R15: 00007fffb0491b88 [ 453.186561][T10958] [ 454.602797][T10970] ACPI: \_SB_.LNKS: No IRQ available. Try pci=noacpi or acpi=off [ 454.602855][T10970] pci 0000:00:01.3: PCI INT A: no GSI [ 454.861823][T10975] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1039'. [ 455.635473][T10975] FAULT_INJECTION: forcing a failure. [ 455.635473][T10975] name failslab, interval 1, probability 0, space 0, times 0 [ 455.648808][T10975] CPU: 0 UID: 0 PID: 10975 Comm: syz.0.1039 Tainted: G L syzkaller #0 PREEMPT(full) [ 455.648861][T10975] Tainted: [L]=SOFTLOCKUP [ 455.648872][T10975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 455.648979][T10975] Call Trace: [ 455.648991][T10975] [ 455.649003][T10975] dump_stack_lvl+0x100/0x190 [ 455.649061][T10975] should_fail_ex.cold+0x5/0xa [ 455.649108][T10975] should_failslab+0xc2/0x120 [ 455.649145][T10975] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 455.649196][T10975] ? security_inode_alloc+0x3b/0x2c0 [ 455.649229][T10975] ? lockdep_init_map_type+0x5c/0x250 [ 455.649283][T10975] security_inode_alloc+0x3b/0x2c0 [ 455.649319][T10975] inode_init_always_gfp+0xced/0x1040 [ 455.649362][T10975] alloc_inode+0x8e/0x250 [ 455.649408][T10975] new_inode+0x22/0x1c0 [ 455.649458][T10975] __debugfs_create_file+0x105/0x4f0 [ 455.649501][T10975] debugfs_create_file_full+0x41/0x60 [ 455.649542][T10975] kvm_dev_ioctl+0x1491/0x1a50 [ 455.649598][T10975] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 455.649653][T10975] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 455.649695][T10975] __x64_sys_ioctl+0x18e/0x210 [ 455.649750][T10975] do_syscall_64+0x106/0xf80 [ 455.649798][T10975] ? clear_bhb_loop+0x40/0x90 [ 455.649842][T10975] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 455.649878][T10975] RIP: 0033:0x7f117599c799 [ 455.649973][T10975] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 455.650005][T10975] RSP: 002b:00007f1176803028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 455.650039][T10975] RAX: ffffffffffffffda RBX: 00007f1175c15fa0 RCX: 00007f117599c799 [ 455.650062][T10975] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 455.650082][T10975] RBP: 00007f1175a32c99 R08: 0000000000000000 R09: 0000000000000000 [ 455.650101][T10975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 455.650120][T10975] R13: 00007f1175c16038 R14: 00007f1175c15fa0 R15: 00007ffeb4f19f68 [ 455.650165][T10975] [ 455.650213][T10975] debugfs: out of free dentries, can not create file 'remote_tlb_flush' [ 456.479216][T10995] netlink: zone id is out of range [ 456.484890][T10995] netlink: zone id is out of range [ 456.504707][T10995] netlink: zone id is out of range [ 456.517479][T10995] netlink: zone id is out of range [ 456.528827][T10995] netlink: zone id is out of range [ 456.540602][T10995] netlink: zone id is out of range [ 456.547716][T10995] netlink: zone id is out of range [ 456.597215][T10995] netlink: zone id is out of range [ 456.603944][T10995] netlink: zone id is out of range [ 456.609685][T10995] netlink: zone id is out of range [ 456.696617][T11001] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1036'. [ 456.725915][T11005] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1035'. [ 456.736309][T11005] netlink: 25 bytes leftover after parsing attributes in process `syz.2.1035'. [ 456.745889][T11005] FAULT_INJECTION: forcing a failure. [ 456.745889][T11005] name failslab, interval 1, probability 0, space 0, times 0 [ 456.759044][T11005] CPU: 0 UID: 0 PID: 11005 Comm: syz.2.1035 Tainted: G L syzkaller #0 PREEMPT(full) [ 456.759097][T11005] Tainted: [L]=SOFTLOCKUP [ 456.759107][T11005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 456.759125][T11005] Call Trace: [ 456.759134][T11005] [ 456.759145][T11005] dump_stack_lvl+0x100/0x190 [ 456.759198][T11005] should_fail_ex.cold+0x5/0xa [ 456.759246][T11005] should_failslab+0xc2/0x120 [ 456.759279][T11005] kmem_cache_alloc_node_noprof+0x81/0x6f0 [ 456.759331][T11005] ? __alloc_skb+0x140/0x710 [ 456.759382][T11005] __alloc_skb+0x140/0x710 [ 456.759423][T11005] ? __alloc_skb+0x5b7/0x710 [ 456.759463][T11005] ? __pfx___alloc_skb+0x10/0x10 [ 456.759517][T11005] netlink_ack+0x117/0xb80 [ 456.759587][T11005] netlink_rcv_skb+0x333/0x420 [ 456.759637][T11005] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 456.759680][T11005] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 456.759751][T11005] ? ns_capable+0xd2/0xf0 [ 456.759788][T11005] nfnetlink_rcv+0x1b3/0x440 [ 456.759826][T11005] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 456.759865][T11005] ? netlink_deliver_tap+0x1ae/0xcc0 [ 456.759920][T11005] netlink_unicast+0x5aa/0x870 [ 456.759976][T11005] ? __pfx_netlink_unicast+0x10/0x10 [ 456.760023][T11005] ? __asan_memset+0x23/0x50 [ 456.760069][T11005] ? __build_skb_around+0x278/0x390 [ 456.760108][T11005] ? is_vmalloc_addr+0x86/0xa0 [ 456.760159][T11005] netlink_sendmsg+0x8b0/0xda0 [ 456.760225][T11005] ? __pfx_netlink_sendmsg+0x10/0x10 [ 456.760282][T11005] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 456.760343][T11005] sock_write_iter+0x524/0x5a0 [ 456.760375][T11005] ? __pfx_netlink_sendmsg+0x10/0x10 [ 456.760425][T11005] ? __pfx_sock_write_iter+0x10/0x10 [ 456.760473][T11005] ? bpf_lsm_file_permission+0x9/0x10 [ 456.760524][T11005] ? security_file_permission+0x76/0x210 [ 456.760565][T11005] ? rw_verify_area+0xce/0x6d0 [ 456.760617][T11005] vfs_write+0x6ac/0x1070 [ 456.760670][T11005] ? __pfx_sock_write_iter+0x10/0x10 [ 456.760707][T11005] ? __pfx_vfs_write+0x10/0x10 [ 456.760761][T11005] ? __pfx_do_sys_openat2+0x10/0x10 [ 456.760821][T11005] ksys_write+0x1f8/0x250 [ 456.760862][T11005] ? __pfx_ksys_write+0x10/0x10 [ 456.760903][T11005] do_syscall_64+0x106/0xf80 [ 456.760946][T11005] ? clear_bhb_loop+0x40/0x90 [ 456.760987][T11005] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 456.761019][T11005] RIP: 0033:0x7f61f459c799 [ 456.761044][T11005] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 456.761074][T11005] RSP: 002b:00007f61f54c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 456.761104][T11005] RAX: ffffffffffffffda RBX: 00007f61f4815fa0 RCX: 00007f61f459c799 [ 456.761126][T11005] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000002 [ 456.761146][T11005] RBP: 00007f61f54c6090 R08: 0000000000000000 R09: 0000000000000000 [ 456.761164][T11005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 456.761200][T11005] R13: 00007f61f4816038 R14: 00007f61f4815fa0 R15: 00007ffd4d4e06a8 [ 456.761428][T11005] [ 456.762567][T11001] netlink: 25 bytes leftover after parsing attributes in process `syz.1.1036'. [ 460.174099][T11048] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1047'. [ 460.643477][T11067] hub 1-0:1.0: USB hub found [ 460.663691][T11067] hub 1-0:1.0: 1 port detected [ 460.841169][T11048] FAULT_INJECTION: forcing a failure. [ 460.841169][T11048] name failslab, interval 1, probability 0, space 0, times 0 [ 460.931909][T11048] CPU: 1 UID: 0 PID: 11048 Comm: syz.0.1047 Tainted: G L syzkaller #0 PREEMPT(full) [ 460.931964][T11048] Tainted: [L]=SOFTLOCKUP [ 460.931976][T11048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 460.931995][T11048] Call Trace: [ 460.932006][T11048] [ 460.932019][T11048] dump_stack_lvl+0x100/0x190 [ 460.932078][T11048] should_fail_ex.cold+0x5/0xa [ 460.932118][T11048] should_failslab+0xc2/0x120 [ 460.932155][T11048] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 460.932207][T11048] ? security_inode_alloc+0x3b/0x2c0 [ 460.932247][T11048] ? lockdep_init_map_type+0x5c/0x250 [ 460.932299][T11048] security_inode_alloc+0x3b/0x2c0 [ 460.932335][T11048] inode_init_always_gfp+0xced/0x1040 [ 460.932377][T11048] alloc_inode+0x8e/0x250 [ 460.932424][T11048] new_inode+0x22/0x1c0 [ 460.932474][T11048] debugfs_create_dir+0xc4/0x440 [ 460.932525][T11048] kvm_dev_ioctl+0x11b6/0x1a50 [ 460.932574][T11048] ? find_held_lock+0x2b/0x80 [ 460.932607][T11048] ? __fget_files+0x215/0x3d0 [ 460.932636][T11048] ? hook_file_ioctl_common+0x146/0x410 [ 460.932675][T11048] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 460.932729][T11048] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 460.932770][T11048] __x64_sys_ioctl+0x18e/0x210 [ 460.932822][T11048] do_syscall_64+0x106/0xf80 [ 460.932871][T11048] ? clear_bhb_loop+0x40/0x90 [ 460.932912][T11048] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 460.932948][T11048] RIP: 0033:0x7f117599c799 [ 460.932984][T11048] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 460.933011][T11048] RSP: 002b:00007f1176803028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 460.933034][T11048] RAX: ffffffffffffffda RBX: 00007f1175c15fa0 RCX: 00007f117599c799 [ 460.933050][T11048] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 460.933065][T11048] RBP: 00007f1175a32c99 R08: 0000000000000000 R09: 0000000000000000 [ 460.933079][T11048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 460.933094][T11048] R13: 00007f1175c16038 R14: 00007f1175c15fa0 R15: 00007ffeb4f19f68 [ 460.933126][T11048] [ 461.227734][T11048] debugfs: out of free dentries, can not create directory '11048-10' [ 461.753194][T11077] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1050'. [ 461.829337][T11077] netlink: 25 bytes leftover after parsing attributes in process `syz.1.1050'. [ 461.848687][T11077] FAULT_INJECTION: forcing a failure. [ 461.848687][T11077] name failslab, interval 1, probability 0, space 0, times 0 [ 461.909752][T11077] CPU: 1 UID: 0 PID: 11077 Comm: syz.1.1050 Tainted: G L syzkaller #0 PREEMPT(full) [ 461.909804][T11077] Tainted: [L]=SOFTLOCKUP [ 461.909815][T11077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 461.909834][T11077] Call Trace: [ 461.909843][T11077] [ 461.909855][T11077] dump_stack_lvl+0x100/0x190 [ 461.909910][T11077] should_fail_ex.cold+0x5/0xa [ 461.909948][T11077] should_failslab+0xc2/0x120 [ 461.909982][T11077] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 461.910032][T11077] ? skb_clone+0x190/0x400 [ 461.910085][T11077] skb_clone+0x190/0x400 [ 461.910133][T11077] netlink_deliver_tap+0xaed/0xcc0 [ 461.910190][T11077] netlink_unicast+0x70c/0x870 [ 461.910244][T11077] ? __pfx_netlink_unicast+0x10/0x10 [ 461.910292][T11077] ? __alloc_skb+0x5b7/0x710 [ 461.910349][T11077] netlink_ack+0x655/0xb80 [ 461.910418][T11077] netlink_rcv_skb+0x333/0x420 [ 461.910468][T11077] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 461.910511][T11077] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 461.910580][T11077] ? ns_capable+0xd2/0xf0 [ 461.910617][T11077] nfnetlink_rcv+0x1b3/0x440 [ 461.910654][T11077] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 461.910691][T11077] ? netlink_deliver_tap+0x1ae/0xcc0 [ 461.910752][T11077] netlink_unicast+0x5aa/0x870 [ 461.910809][T11077] ? __pfx_netlink_unicast+0x10/0x10 [ 461.910856][T11077] ? __asan_memset+0x23/0x50 [ 461.910902][T11077] ? __build_skb_around+0x278/0x390 [ 461.910943][T11077] ? is_vmalloc_addr+0x86/0xa0 [ 461.910994][T11077] netlink_sendmsg+0x8b0/0xda0 [ 461.911052][T11077] ? __pfx_netlink_sendmsg+0x10/0x10 [ 461.911108][T11077] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 461.911166][T11077] sock_write_iter+0x524/0x5a0 [ 461.911197][T11077] ? __pfx_netlink_sendmsg+0x10/0x10 [ 461.911247][T11077] ? __pfx_sock_write_iter+0x10/0x10 [ 461.911295][T11077] ? bpf_lsm_file_permission+0x9/0x10 [ 461.911346][T11077] ? security_file_permission+0x76/0x210 [ 461.911386][T11077] ? rw_verify_area+0xce/0x6d0 [ 461.911443][T11077] vfs_write+0x6ac/0x1070 [ 461.911496][T11077] ? __pfx_sock_write_iter+0x10/0x10 [ 461.911533][T11077] ? __pfx_vfs_write+0x10/0x10 [ 461.911587][T11077] ? __pfx_do_sys_openat2+0x10/0x10 [ 461.911651][T11077] ksys_write+0x1f8/0x250 [ 461.911681][T11077] ? __pfx_ksys_write+0x10/0x10 [ 461.911724][T11077] do_syscall_64+0x106/0xf80 [ 461.911767][T11077] ? clear_bhb_loop+0x40/0x90 [ 461.911808][T11077] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 461.911841][T11077] RIP: 0033:0x7f69c779c799 [ 461.911868][T11077] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 461.911899][T11077] RSP: 002b:00007f69c873e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 461.911930][T11077] RAX: ffffffffffffffda RBX: 00007f69c7a15fa0 RCX: 00007f69c779c799 [ 461.911950][T11077] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000002 [ 461.911969][T11077] RBP: 00007f69c873e090 R08: 0000000000000000 R09: 0000000000000000 [ 461.911988][T11077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 461.912006][T11077] R13: 00007f69c7a16038 R14: 00007f69c7a15fa0 R15: 00007fffb0491b88 [ 461.912049][T11077] [ 466.161635][T11113] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input7 [ 468.314763][T11144] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1067'. [ 468.424643][T11146] FAULT_INJECTION: forcing a failure. [ 468.424643][T11146] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 468.512317][T11146] CPU: 1 UID: 0 PID: 11146 Comm: syz.4.1067 Tainted: G L syzkaller #0 PREEMPT(full) [ 468.512367][T11146] Tainted: [L]=SOFTLOCKUP [ 468.512379][T11146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 468.512397][T11146] Call Trace: [ 468.512408][T11146] [ 468.512419][T11146] dump_stack_lvl+0x100/0x190 [ 468.512476][T11146] should_fail_ex.cold+0x5/0xa [ 468.512516][T11146] _copy_from_iter+0x1f4/0x1690 [ 468.512565][T11146] ? policy_nodemask+0xed/0x4f0 [ 468.512599][T11146] ? __pfx__copy_from_iter+0x10/0x10 [ 468.512638][T11146] ? alloc_pages_mpol+0x25a/0x550 [ 468.512674][T11146] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 468.512718][T11146] copy_page_from_iter+0xde/0x180 [ 468.512763][T11146] anon_pipe_write+0xae4/0x1d40 [ 468.512820][T11146] ? __pfx_anon_pipe_write+0x10/0x10 [ 468.512856][T11146] ? apparmor_file_permission+0x13f/0x1c0 [ 468.512896][T11146] ? bpf_lsm_file_permission+0x9/0x10 [ 468.512947][T11146] ? security_file_permission+0x76/0x210 [ 468.512988][T11146] ? rw_verify_area+0xce/0x6d0 [ 468.513038][T11146] vfs_write+0x6ac/0x1070 [ 468.513092][T11146] ? __pfx_anon_pipe_write+0x10/0x10 [ 468.513129][T11146] ? __pfx_vfs_write+0x10/0x10 [ 468.513178][T11146] ? find_held_lock+0x2b/0x80 [ 468.513236][T11146] ksys_write+0x1f8/0x250 [ 468.513266][T11146] ? __pfx_ksys_write+0x10/0x10 [ 468.513308][T11146] do_syscall_64+0x106/0xf80 [ 468.513354][T11146] ? clear_bhb_loop+0x40/0x90 [ 468.513396][T11146] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 468.513430][T11146] RIP: 0033:0x7fed4dd9c799 [ 468.513457][T11146] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 468.513488][T11146] RSP: 002b:00007fed4eb8d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 468.513518][T11146] RAX: ffffffffffffffda RBX: 00007fed4e016090 RCX: 00007fed4dd9c799 [ 468.513539][T11146] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000002 [ 468.513558][T11146] RBP: 00007fed4eb8d090 R08: 0000000000000000 R09: 0000000000000000 [ 468.513577][T11146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 468.513595][T11146] R13: 00007fed4e016128 R14: 00007fed4e016090 R15: 00007ffc3a912488 [ 468.513639][T11146] [ 472.008560][T11192] FAULT_INJECTION: forcing a failure. [ 472.008560][T11192] name failslab, interval 1, probability 0, space 0, times 0 [ 472.034216][T11192] CPU: 1 UID: 0 PID: 11192 Comm: syz.1.1075 Tainted: G L syzkaller #0 PREEMPT(full) [ 472.034268][T11192] Tainted: [L]=SOFTLOCKUP [ 472.034279][T11192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 472.034297][T11192] Call Trace: [ 472.034308][T11192] [ 472.034319][T11192] dump_stack_lvl+0x100/0x190 [ 472.034375][T11192] should_fail_ex.cold+0x5/0xa [ 472.034414][T11192] should_failslab+0xc2/0x120 [ 472.034449][T11192] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 472.034498][T11192] ? vm_area_dup+0x27/0x8e0 [ 472.034551][T11192] vm_area_dup+0x27/0x8e0 [ 472.034597][T11192] __split_vma+0x18c/0xd90 [ 472.034646][T11192] ? find_held_lock+0x2b/0x80 [ 472.034678][T11192] ? __pfx___split_vma+0x10/0x10 [ 472.034720][T11192] ? ima_match_policy+0x8c4/0x2350 [ 472.034858][T11192] vms_gather_munmap_vmas+0x1c6/0x1500 [ 472.034917][T11192] ? __pfx_vms_gather_munmap_vmas+0x10/0x10 [ 472.034973][T11192] ? mas_walk+0x6ef/0x9b0 [ 472.035036][T11192] __mmap_region+0x492/0x29e0 [ 472.035086][T11192] ? tomoyo_check_open_permission+0x1db/0x3c0 [ 472.035148][T11192] ? tomoyo_check_open_permission+0x1db/0x3c0 [ 472.035185][T11192] ? __pfx___mmap_region+0x10/0x10 [ 472.035240][T11192] ? __lock_acquire+0x4a5/0x2630 [ 472.035323][T11192] ? __lock_acquire+0x4a5/0x2630 [ 472.035389][T11192] ? __lock_acquire+0x4a5/0x2630 [ 472.035484][T11192] ? mm_get_unmapped_area_vmflags+0xd7/0x130 [ 472.035538][T11192] mmap_region+0x30a/0x3e0 [ 472.035595][T11192] do_mmap+0xc63/0x12f0 [ 472.035641][T11192] ? __pfx_do_mmap+0x10/0x10 [ 472.035677][T11192] ? __pfx_down_write_killable+0x10/0x10 [ 472.035740][T11192] __do_sys_remap_file_pages+0x8d4/0xa10 [ 472.035795][T11192] ? __fget_files+0x21f/0x3d0 [ 472.035827][T11192] ? __pfx___do_sys_remap_file_pages+0x10/0x10 [ 472.035872][T11192] ? fput+0x79/0x100 [ 472.035910][T11192] ? ksys_write+0x1ac/0x250 [ 472.035940][T11192] ? __pfx_ksys_write+0x10/0x10 [ 472.035983][T11192] do_syscall_64+0x106/0xf80 [ 472.036032][T11192] ? clear_bhb_loop+0x40/0x90 [ 472.036072][T11192] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 472.036107][T11192] RIP: 0033:0x7f69c779c799 [ 472.036134][T11192] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 472.036165][T11192] RSP: 002b:00007f69c871d028 EFLAGS: 00000246 ORIG_RAX: 00000000000000d8 [ 472.036197][T11192] RAX: ffffffffffffffda RBX: 00007f69c7a16090 RCX: 00007f69c779c799 [ 472.036218][T11192] RDX: 0000000000000000 RSI: 0000000000001000 RDI: 0000000000006a27 [ 472.036237][T11192] RBP: 00007f69c871d090 R08: 0000000000000004 R09: 0000000000000000 [ 472.036255][T11192] R10: 0000000000000200 R11: 0000000000000246 R12: 0000000000000001 [ 472.036274][T11192] R13: 00007f69c7a16128 R14: 00007f69c7a16090 R15: 00007fffb0491b88 [ 472.036317][T11192] [ 475.501426][T11240] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1085'. [ 475.525659][T11240] netlink: 25 bytes leftover after parsing attributes in process `syz.4.1085'. [ 475.549696][T11240] FAULT_INJECTION: forcing a failure. [ 475.549696][T11240] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 475.567020][T11240] CPU: 0 UID: 0 PID: 11240 Comm: syz.4.1085 Tainted: G L syzkaller #0 PREEMPT(full) [ 475.567071][T11240] Tainted: [L]=SOFTLOCKUP [ 475.567082][T11240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 475.567101][T11240] Call Trace: [ 475.567111][T11240] [ 475.567122][T11240] dump_stack_lvl+0x100/0x190 [ 475.567175][T11240] should_fail_ex.cold+0x5/0xa [ 475.567207][T11240] _copy_to_user+0x32/0xd0 [ 475.567318][T11240] simple_read_from_buffer+0xcb/0x170 [ 475.567372][T11240] proc_fail_nth_read+0x1af/0x230 [ 475.567409][T11240] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 475.567445][T11240] ? rw_verify_area+0xce/0x6d0 [ 475.567485][T11240] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 475.567519][T11240] vfs_read+0x1e4/0xb30 [ 475.567566][T11240] ? __pfx_vfs_read+0x10/0x10 [ 475.567612][T11240] ? __pfx_do_sys_openat2+0x10/0x10 [ 475.567670][T11240] ksys_read+0x12a/0x250 [ 475.567714][T11240] ? __pfx_ksys_read+0x10/0x10 [ 475.567766][T11240] do_syscall_64+0x106/0xf80 [ 475.567803][T11240] ? clear_bhb_loop+0x40/0x90 [ 475.567837][T11240] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 475.567866][T11240] RIP: 0033:0x7fed4dd5cfce [ 475.567889][T11240] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 475.567922][T11240] RSP: 002b:00007fed4ebadfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 475.567948][T11240] RAX: ffffffffffffffda RBX: 00007fed4ebae6c0 RCX: 00007fed4dd5cfce [ 475.567967][T11240] RDX: 000000000000000f RSI: 00007fed4ebae0a0 RDI: 0000000000000003 [ 475.567983][T11240] RBP: 00007fed4ebae090 R08: 0000000000000000 R09: 0000000000000000 [ 475.567999][T11240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 475.568015][T11240] R13: 00007fed4e016038 R14: 00007fed4e015fa0 R15: 00007ffc3a912488 [ 475.568051][T11240] [ 476.681266][T11255] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1091'. [ 476.894120][T11255] FAULT_INJECTION: forcing a failure. [ 476.894120][T11255] name failslab, interval 1, probability 0, space 0, times 0 [ 476.970494][T11255] CPU: 1 UID: 0 PID: 11255 Comm: syz.2.1091 Tainted: G L syzkaller #0 PREEMPT(full) [ 476.970549][T11255] Tainted: [L]=SOFTLOCKUP [ 476.970560][T11255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 476.970589][T11255] Call Trace: [ 476.970600][T11255] [ 476.970612][T11255] dump_stack_lvl+0x100/0x190 [ 476.970673][T11255] should_fail_ex.cold+0x5/0xa [ 476.970714][T11255] should_failslab+0xc2/0x120 [ 476.970750][T11255] __kmalloc_cache_noprof+0x7a/0x6f0 [ 476.970794][T11255] ? kvm_dev_ioctl+0x1320/0x1a50 [ 476.970843][T11255] kvm_dev_ioctl+0x1320/0x1a50 [ 476.970903][T11255] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 476.970957][T11255] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 476.970998][T11255] __x64_sys_ioctl+0x18e/0x210 [ 476.971049][T11255] do_syscall_64+0x106/0xf80 [ 476.971095][T11255] ? clear_bhb_loop+0x40/0x90 [ 476.971135][T11255] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 476.971169][T11255] RIP: 0033:0x7f61f459c799 [ 476.971198][T11255] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 476.971232][T11255] RSP: 002b:00007f61f54c6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 476.971265][T11255] RAX: ffffffffffffffda RBX: 00007f61f4815fa0 RCX: 00007f61f459c799 [ 476.971286][T11255] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 476.971306][T11255] RBP: 00007f61f4632c99 R08: 0000000000000000 R09: 0000000000000000 [ 476.971326][T11255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 476.971344][T11255] R13: 00007f61f4816038 R14: 00007f61f4815fa0 R15: 00007ffd4d4e06a8 [ 476.971387][T11255] [ 477.620266][T11268] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1094'. [ 480.500186][T11316] block2mtd: error: cannot open device /sys/modu [ 480.874691][T11324] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1105'. [ 482.998640][T11347] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1110'. [ 483.266869][T11347] FAULT_INJECTION: forcing a failure. [ 483.266869][T11347] name failslab, interval 1, probability 0, space 0, times 0 [ 483.281184][T11347] CPU: 1 UID: 0 PID: 11347 Comm: syz.1.1110 Tainted: G L syzkaller #0 PREEMPT(full) [ 483.281246][T11347] Tainted: [L]=SOFTLOCKUP [ 483.281258][T11347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 483.281278][T11347] Call Trace: [ 483.281288][T11347] [ 483.281300][T11347] dump_stack_lvl+0x100/0x190 [ 483.281358][T11347] should_fail_ex.cold+0x5/0xa [ 483.281411][T11347] should_failslab+0xc2/0x120 [ 483.281448][T11347] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 483.281501][T11347] ? alloc_inode+0x68/0x250 [ 483.281548][T11347] ? simple_start_creating+0xb0/0x110 [ 483.281600][T11347] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 483.281658][T11347] alloc_inode+0x68/0x250 [ 483.281703][T11347] new_inode+0x22/0x1c0 [ 483.281752][T11347] __debugfs_create_file+0x105/0x4f0 [ 483.281794][T11347] debugfs_create_file_full+0x41/0x60 [ 483.281835][T11347] kvm_dev_ioctl+0x1491/0x1a50 [ 483.281890][T11347] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 483.281944][T11347] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 483.281986][T11347] __x64_sys_ioctl+0x18e/0x210 [ 483.282040][T11347] do_syscall_64+0x106/0xf80 [ 483.282087][T11347] ? clear_bhb_loop+0x40/0x90 [ 483.282130][T11347] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 483.282164][T11347] RIP: 0033:0x7f69c779c799 [ 483.282192][T11347] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 483.282236][T11347] RSP: 002b:00007f69c873e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 483.282269][T11347] RAX: ffffffffffffffda RBX: 00007f69c7a15fa0 RCX: 00007f69c779c799 [ 483.282292][T11347] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 483.282311][T11347] RBP: 00007f69c7832c99 R08: 0000000000000000 R09: 0000000000000000 [ 483.282332][T11347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 483.282350][T11347] R13: 00007f69c7a16038 R14: 00007f69c7a15fa0 R15: 00007fffb0491b88 [ 483.282395][T11347] [ 483.282419][T11347] debugfs: out of free dentries, can not create file 'remote_tlb_flush_requests' [ 486.467302][T11400] block2mtd: error: cannot open device /sys/modu [ 489.382584][T11441] block2mtd: error: cannot open device /sys/modu [ 490.606133][T11461] block2mtd: error: cannot open device /sys/modu [ 491.809034][T11474] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1135'. [ 492.308586][T11479] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1137'. [ 492.760851][T11487] FAULT_INJECTION: forcing a failure. [ 492.760851][T11487] name failslab, interval 1, probability 0, space 0, times 0 [ 492.775154][T11487] CPU: 1 UID: 0 PID: 11487 Comm: syz.4.1137 Tainted: G L syzkaller #0 PREEMPT(full) [ 492.775207][T11487] Tainted: [L]=SOFTLOCKUP [ 492.775218][T11487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 492.775239][T11487] Call Trace: [ 492.775249][T11487] [ 492.775269][T11487] dump_stack_lvl+0x100/0x190 [ 492.775329][T11487] should_fail_ex.cold+0x5/0xa [ 492.775369][T11487] should_failslab+0xc2/0x120 [ 492.775406][T11487] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 492.775460][T11487] ? __d_alloc+0x34/0xa80 [ 492.775508][T11487] __d_alloc+0x34/0xa80 [ 492.775550][T11487] d_alloc+0x4a/0x1e0 [ 492.775591][T11487] lookup_one_qstr_excl+0x175/0x250 [ 492.775642][T11487] start_dirop+0x59/0xb0 [ 492.775698][T11487] simple_start_creating+0xf9/0x110 [ 492.775754][T11487] ? __pfx_simple_start_creating+0x10/0x10 [ 492.775810][T11487] ? mntput+0x70/0xa0 [ 492.775861][T11487] ? simple_pin_fs+0xa3/0x190 [ 492.775923][T11487] debugfs_start_creating.part.0+0x82/0x170 [ 492.775970][T11487] __debugfs_create_file+0xb3/0x4f0 [ 492.776012][T11487] debugfs_create_file_full+0x41/0x60 [ 492.776053][T11487] kvm_dev_ioctl+0x1491/0x1a50 [ 492.776108][T11487] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 492.776178][T11487] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 492.776216][T11487] __x64_sys_ioctl+0x18e/0x210 [ 492.776307][T11487] do_syscall_64+0x106/0xf80 [ 492.776353][T11487] ? clear_bhb_loop+0x40/0x90 [ 492.776394][T11487] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 492.776436][T11487] RIP: 0033:0x7fed4dd9c799 [ 492.776465][T11487] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 492.776499][T11487] RSP: 002b:00007fed4bbd3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 492.776531][T11487] RAX: ffffffffffffffda RBX: 00007fed4e016270 RCX: 00007fed4dd9c799 [ 492.776552][T11487] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 492.776572][T11487] RBP: 00007fed4de32c99 R08: 0000000000000000 R09: 0000000000000000 [ 492.776590][T11487] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 492.776608][T11487] R13: 00007fed4e016308 R14: 00007fed4e016270 R15: 00007ffc3a912488 [ 492.776653][T11487] [ 493.370688][T11495] block2mtd: error: cannot open device /sys/modu [ 495.456483][T11525] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1145'. [ 496.084278][T11542] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1147'. [ 497.217916][T11554] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1148'. [ 497.511660][T11554] FAULT_INJECTION: forcing a failure. [ 497.511660][T11554] name failslab, interval 1, probability 0, space 0, times 0 [ 497.555813][T11554] CPU: 1 UID: 0 PID: 11554 Comm: syz.1.1148 Tainted: G L syzkaller #0 PREEMPT(full) [ 497.555872][T11554] Tainted: [L]=SOFTLOCKUP [ 497.555885][T11554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 497.555908][T11554] Call Trace: [ 497.555919][T11554] [ 497.555932][T11554] dump_stack_lvl+0x100/0x190 [ 497.555995][T11554] should_fail_ex.cold+0x5/0xa [ 497.556037][T11554] ? kvm_dev_ioctl+0x124f/0x1a50 [ 497.556078][T11554] should_failslab+0xc2/0x120 [ 497.556118][T11554] __kmalloc_noprof+0xe0/0x850 [ 497.556186][T11554] kvm_dev_ioctl+0x124f/0x1a50 [ 497.556239][T11554] ? find_held_lock+0x2b/0x80 [ 497.556275][T11554] ? __fget_files+0x215/0x3d0 [ 497.556318][T11554] ? hook_file_ioctl_common+0x146/0x410 [ 497.556365][T11554] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 497.556426][T11554] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 497.556482][T11554] __x64_sys_ioctl+0x18e/0x210 [ 497.556572][T11554] do_syscall_64+0x106/0xf80 [ 497.556624][T11554] ? clear_bhb_loop+0x40/0x90 [ 497.556674][T11554] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 497.556714][T11554] RIP: 0033:0x7f69c779c799 [ 497.556745][T11554] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 497.556782][T11554] RSP: 002b:00007f69c873e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 497.556819][T11554] RAX: ffffffffffffffda RBX: 00007f69c7a15fa0 RCX: 00007f69c779c799 [ 497.556845][T11554] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 497.556896][T11554] RBP: 00007f69c7832c99 R08: 0000000000000000 R09: 0000000000000000 [ 497.556920][T11554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 497.556942][T11554] R13: 00007f69c7a16038 R14: 00007f69c7a15fa0 R15: 00007fffb0491b88 [ 497.556992][T11554] [ 498.133526][T11569] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1150'. [ 500.015910][T11603] block2mtd: error: cannot open device /sys/modu [ 500.383851][T11610] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1160'. [ 500.737563][T11613] FAULT_INJECTION: forcing a failure. [ 500.737563][T11613] name failslab, interval 1, probability 0, space 0, times 0 [ 500.833574][T11613] CPU: 0 UID: 0 PID: 11613 Comm: syz.1.1161 Tainted: G L syzkaller #0 PREEMPT(full) [ 500.833626][T11613] Tainted: [L]=SOFTLOCKUP [ 500.833638][T11613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 500.833657][T11613] Call Trace: [ 500.833667][T11613] [ 500.833680][T11613] dump_stack_lvl+0x100/0x190 [ 500.833736][T11613] should_fail_ex.cold+0x5/0xa [ 500.833776][T11613] should_failslab+0xc2/0x120 [ 500.833810][T11613] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 500.833859][T11613] ? security_inode_alloc+0x3b/0x2c0 [ 500.833893][T11613] ? lockdep_init_map_type+0x5c/0x250 [ 500.833943][T11613] security_inode_alloc+0x3b/0x2c0 [ 500.833980][T11613] inode_init_always_gfp+0xced/0x1040 [ 500.834020][T11613] alloc_inode+0x8e/0x250 [ 500.834066][T11613] new_inode+0x22/0x1c0 [ 500.834106][T11613] __debugfs_create_file+0x105/0x4f0 [ 500.834137][T11613] debugfs_create_file_full+0x41/0x60 [ 500.834165][T11613] kvm_dev_ioctl+0x1491/0x1a50 [ 500.834204][T11613] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 500.834241][T11613] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 500.834270][T11613] __x64_sys_ioctl+0x18e/0x210 [ 500.834308][T11613] do_syscall_64+0x106/0xf80 [ 500.834350][T11613] ? clear_bhb_loop+0x40/0x90 [ 500.834380][T11613] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 500.834405][T11613] RIP: 0033:0x7f69c779c799 [ 500.834425][T11613] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 500.834449][T11613] RSP: 002b:00007f69c86fc028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 500.834472][T11613] RAX: ffffffffffffffda RBX: 00007f69c7a16180 RCX: 00007f69c779c799 [ 500.834488][T11613] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 500.834502][T11613] RBP: 00007f69c7832c99 R08: 0000000000000000 R09: 0000000000000000 [ 500.834516][T11613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 500.834530][T11613] R13: 00007f69c7a16218 R14: 00007f69c7a16180 R15: 00007fffb0491b88 [ 500.834562][T11613] [ 501.070466][T11613] debugfs: out of free dentries, can not create file 'remote_tlb_flush' [ 501.148823][T11610] FAULT_INJECTION: forcing a failure. [ 501.148823][T11610] name failslab, interval 1, probability 0, space 0, times 0 [ 501.163527][T11610] CPU: 1 UID: 0 PID: 11610 Comm: syz.4.1160 Tainted: G L syzkaller #0 PREEMPT(full) [ 501.163581][T11610] Tainted: [L]=SOFTLOCKUP [ 501.163592][T11610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 501.163613][T11610] Call Trace: [ 501.163625][T11610] [ 501.163637][T11610] dump_stack_lvl+0x100/0x190 [ 501.163696][T11610] should_fail_ex.cold+0x5/0xa [ 501.163738][T11610] should_failslab+0xc2/0x120 [ 501.163775][T11610] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 501.163827][T11610] ? __d_alloc+0x34/0xa80 [ 501.163876][T11610] __d_alloc+0x34/0xa80 [ 501.163920][T11610] d_alloc+0x4a/0x1e0 [ 501.163959][T11610] lookup_one_qstr_excl+0x175/0x250 [ 501.164017][T11610] start_dirop+0x59/0xb0 [ 501.164073][T11610] simple_start_creating+0xf9/0x110 [ 501.164140][T11610] ? __pfx_simple_start_creating+0x10/0x10 [ 501.164196][T11610] ? mntput+0x70/0xa0 [ 501.164261][T11610] ? simple_pin_fs+0xa3/0x190 [ 501.164313][T11610] debugfs_start_creating.part.0+0x82/0x170 [ 501.164352][T11610] __debugfs_create_file+0xb3/0x4f0 [ 501.164395][T11610] debugfs_create_file_full+0x41/0x60 [ 501.164436][T11610] kvm_dev_ioctl+0x1491/0x1a50 [ 501.164491][T11610] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 501.164552][T11610] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 501.164599][T11610] __x64_sys_ioctl+0x18e/0x210 [ 501.164652][T11610] do_syscall_64+0x106/0xf80 [ 501.164699][T11610] ? clear_bhb_loop+0x40/0x90 [ 501.164742][T11610] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 501.164777][T11610] RIP: 0033:0x7fed4dd9c799 [ 501.164803][T11610] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 501.164837][T11610] RSP: 002b:00007fed4ebae028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 501.164872][T11610] RAX: ffffffffffffffda RBX: 00007fed4e015fa0 RCX: 00007fed4dd9c799 [ 501.164893][T11610] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 501.164913][T11610] RBP: 00007fed4de32c99 R08: 0000000000000000 R09: 0000000000000000 [ 501.164933][T11610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 501.164952][T11610] R13: 00007fed4e016038 R14: 00007fed4e015fa0 R15: 00007ffc3a912488 [ 501.164997][T11610] [ 501.932960][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.948094][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 502.661363][T11642] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1165'. [ 502.934437][T11645] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1166'. [ 503.409829][T11645] FAULT_INJECTION: forcing a failure. [ 503.409829][T11645] name failslab, interval 1, probability 0, space 0, times 0 [ 503.590275][T11645] CPU: 0 UID: 0 PID: 11645 Comm: syz.1.1166 Tainted: G L syzkaller #0 PREEMPT(full) [ 503.590327][T11645] Tainted: [L]=SOFTLOCKUP [ 503.590339][T11645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 503.590359][T11645] Call Trace: [ 503.590369][T11645] [ 503.590382][T11645] dump_stack_lvl+0x100/0x190 [ 503.590440][T11645] should_fail_ex.cold+0x5/0xa [ 503.590480][T11645] should_failslab+0xc2/0x120 [ 503.590517][T11645] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 503.590569][T11645] ? security_inode_alloc+0x3b/0x2c0 [ 503.590613][T11645] ? lockdep_init_map_type+0x5c/0x250 [ 503.590663][T11645] security_inode_alloc+0x3b/0x2c0 [ 503.590698][T11645] inode_init_always_gfp+0xced/0x1040 [ 503.590739][T11645] alloc_inode+0x8e/0x250 [ 503.590784][T11645] new_inode+0x22/0x1c0 [ 503.590830][T11645] __debugfs_create_file+0x105/0x4f0 [ 503.590872][T11645] debugfs_create_file_full+0x41/0x60 [ 503.590912][T11645] kvm_dev_ioctl+0x1491/0x1a50 [ 503.590966][T11645] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 503.591018][T11645] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 503.591060][T11645] __x64_sys_ioctl+0x18e/0x210 [ 503.591114][T11645] do_syscall_64+0x106/0xf80 [ 503.591163][T11645] ? clear_bhb_loop+0x40/0x90 [ 503.591206][T11645] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 503.591241][T11645] RIP: 0033:0x7f69c779c799 [ 503.591267][T11645] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 503.591299][T11645] RSP: 002b:00007f69c873e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 503.591331][T11645] RAX: ffffffffffffffda RBX: 00007f69c7a15fa0 RCX: 00007f69c779c799 [ 503.591353][T11645] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 503.591373][T11645] RBP: 00007f69c7832c99 R08: 0000000000000000 R09: 0000000000000000 [ 503.591393][T11645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 503.591413][T11645] R13: 00007f69c7a16038 R14: 00007f69c7a15fa0 R15: 00007fffb0491b88 [ 503.591459][T11645] [ 503.591502][T11645] debugfs: out of free dentries, can not create file 'mmu_unsync' [ 505.370843][ T5823] Bluetooth: hci3: unexpected event 0x1d length: 6 > 5 [ 506.045174][T11677] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1173'. [ 506.150919][T11679] smpboot: CPU 1 is now offline [ 506.355141][T11686] pci 0000:00:00.0: MSI/MSI-X allowed for future drivers [ 507.046466][T11703] block2mtd: error: cannot open device /sys/modu [ 507.179153][T11693] __vm_enough_memory: pid: 11693, comm: syz.1.1177, bytes: 4398046511104 not enough memory for the allocation [ 508.972505][T11726] block2mtd: error: cannot open device /sys/modu [ 509.133340][T11725] block2mtd: error: cannot open device /sys/modu [ 509.434887][T11719] __vm_enough_memory: pid: 11719, comm: syz.2.1189, bytes: 4398046511104 not enough memory for the allocation [ 511.637830][T11749] HfR: entered promiscuous mode [ 512.100353][T11770] block2mtd: error: cannot open device /sys/modu [ 516.438936][T11810] FAULT_INJECTION: forcing a failure. [ 516.438936][T11810] name failslab, interval 1, probability 0, space 0, times 0 [ 516.702434][T11810] CPU: 0 UID: 0 PID: 11810 Comm: syz.2.1199 Tainted: G L syzkaller #0 PREEMPT(full) [ 516.702475][T11810] Tainted: [L]=SOFTLOCKUP [ 516.702483][T11810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 516.702498][T11810] Call Trace: [ 516.702506][T11810] [ 516.702515][T11810] dump_stack_lvl+0x100/0x190 [ 516.702556][T11810] should_fail_ex.cold+0x5/0xa [ 516.702585][T11810] should_failslab+0xc2/0x120 [ 516.702610][T11810] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 516.702648][T11810] ? alloc_inode+0x68/0x250 [ 516.702681][T11810] ? simple_start_creating+0xb0/0x110 [ 516.702720][T11810] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 516.702763][T11810] alloc_inode+0x68/0x250 [ 516.702795][T11810] new_inode+0x22/0x1c0 [ 516.702829][T11810] __debugfs_create_file+0x105/0x4f0 [ 516.702858][T11810] debugfs_create_file_full+0x41/0x60 [ 516.702887][T11810] kvm_dev_ioctl+0x1491/0x1a50 [ 516.702925][T11810] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 516.702962][T11810] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 516.702991][T11810] __x64_sys_ioctl+0x18e/0x210 [ 516.703028][T11810] do_syscall_64+0x106/0xf80 [ 516.703066][T11810] ? clear_bhb_loop+0x40/0x90 [ 516.703097][T11810] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 516.703121][T11810] RIP: 0033:0x7f61f459c799 [ 516.703141][T11810] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 516.703165][T11810] RSP: 002b:00007f61f5484028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 516.703188][T11810] RAX: ffffffffffffffda RBX: 00007f61f4816180 RCX: 00007f61f459c799 [ 516.703204][T11810] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 516.703218][T11810] RBP: 00007f61f4632c99 R08: 0000000000000000 R09: 0000000000000000 [ 516.703233][T11810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 516.703247][T11810] R13: 00007f61f4816218 R14: 00007f61f4816180 R15: 00007ffd4d4e06a8 [ 516.703278][T11810] [ 516.704628][T11810] debugfs: out of free dentries, can not create file 'remote_tlb_flush_requests' [ 518.473453][T11835] FAULT_INJECTION: forcing a failure. [ 518.473453][T11835] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 519.192105][T11835] CPU: 0 UID: 0 PID: 11835 Comm: syz.4.1204 Tainted: G L syzkaller #0 PREEMPT(full) [ 519.192143][T11835] Tainted: [L]=SOFTLOCKUP [ 519.192151][T11835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 519.192165][T11835] Call Trace: [ 519.192172][T11835] [ 519.192181][T11835] dump_stack_lvl+0x100/0x190 [ 519.192221][T11835] should_fail_ex.cold+0x5/0xa [ 519.192249][T11835] _copy_from_user+0x2e/0xd0 [ 519.192277][T11835] memdup_user+0x6b/0xe0 [ 519.192299][T11835] strndup_user+0x78/0xe0 [ 519.192320][T11835] __do_sys_fsconfig+0x276/0xcb0 [ 519.192353][T11835] ? __pfx___do_sys_fsconfig+0x10/0x10 [ 519.192395][T11835] ? fput+0x79/0x100 [ 519.192434][T11835] do_syscall_64+0x106/0xf80 [ 519.192465][T11835] ? clear_bhb_loop+0x40/0x90 [ 519.192493][T11835] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 519.192517][T11835] RIP: 0033:0x7fed4dd9c799 [ 519.192535][T11835] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 519.192558][T11835] RSP: 002b:00007fed4bff6028 EFLAGS: 00000246 ORIG_RAX: 00000000000001af [ 519.192580][T11835] RAX: ffffffffffffffda RBX: 00007fed4e016180 RCX: 00007fed4dd9c799 [ 519.192596][T11835] RDX: 0000200000000300 RSI: 0000000000000002 RDI: 0000000000000007 [ 519.192610][T11835] RBP: 00007fed4bff6090 R08: 0000000000000005 R09: 0000000000000000 [ 519.192624][T11835] R10: 0000200000000280 R11: 0000000000000246 R12: 0000000000000001 [ 519.192638][T11835] R13: 00007fed4e016218 R14: 00007fed4e016180 R15: 00007ffc3a912488 [ 519.192668][T11835] [ 519.488335][T11844] block2mtd: error: cannot open device /sys/modu [ 521.648703][T11855] sock: sock_timestamping_bind_phc: sock not bind to device [ 522.945097][T11871] block2mtd: error: cannot open device /sys/modu [ 523.280259][T11874] net_ratelimit: 6 callbacks suppressed [ 523.280283][T11874] hsr_slave_0: hsr_addr_subst_dest: Unknown node [ 523.293695][T11874] hsr_slave_1: hsr_addr_subst_dest: Unknown node [ 524.273834][T11902] FAULT_INJECTION: forcing a failure. [ 524.273834][T11902] name failslab, interval 1, probability 0, space 0, times 0 [ 524.471284][T11902] CPU: 0 UID: 0 PID: 11902 Comm: syz.0.1218 Tainted: G L syzkaller #0 PREEMPT(full) [ 524.471325][T11902] Tainted: [L]=SOFTLOCKUP [ 524.471333][T11902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 524.471347][T11902] Call Trace: [ 524.471355][T11902] [ 524.471365][T11902] dump_stack_lvl+0x100/0x190 [ 524.471405][T11902] should_fail_ex.cold+0x5/0xa [ 524.471439][T11902] should_failslab+0xc2/0x120 [ 524.471470][T11902] __kmalloc_cache_noprof+0x7a/0x6f0 [ 524.471502][T11902] ? kvm_dev_ioctl+0x1320/0x1a50 [ 524.471536][T11902] kvm_dev_ioctl+0x1320/0x1a50 [ 524.471573][T11902] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 524.471610][T11902] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 524.471639][T11902] __x64_sys_ioctl+0x18e/0x210 [ 524.471676][T11902] do_syscall_64+0x106/0xf80 [ 524.471709][T11902] ? clear_bhb_loop+0x40/0x90 [ 524.471738][T11902] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 524.471763][T11902] RIP: 0033:0x7f117599c799 [ 524.471782][T11902] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 524.471806][T11902] RSP: 002b:00007f11767c1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 524.471829][T11902] RAX: ffffffffffffffda RBX: 00007f1175c16180 RCX: 00007f117599c799 [ 524.471845][T11902] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 524.471859][T11902] RBP: 00007f1175a32c99 R08: 0000000000000000 R09: 0000000000000000 [ 524.471874][T11902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 524.471888][T11902] R13: 00007f1175c16218 R14: 00007f1175c16180 R15: 00007ffeb4f19f68 [ 524.471918][T11902] [ 526.350229][T11923] block2mtd: error: cannot open device /sys/modu [ 526.862723][T11930] FAULT_INJECTION: forcing a failure. [ 526.862723][T11930] name failslab, interval 1, probability 0, space 0, times 0 [ 526.862763][T11930] CPU: 0 UID: 0 PID: 11930 Comm: syz.1.1224 Tainted: G L syzkaller #0 PREEMPT(full) [ 526.862798][T11930] Tainted: [L]=SOFTLOCKUP [ 526.862805][T11930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 526.862820][T11930] Call Trace: [ 526.862827][T11930] [ 526.862836][T11930] dump_stack_lvl+0x100/0x190 [ 526.862877][T11930] should_fail_ex.cold+0x5/0xa [ 526.862907][T11930] should_failslab+0xc2/0x120 [ 526.862932][T11930] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 526.862969][T11930] ? security_inode_alloc+0x3b/0x2c0 [ 526.862993][T11930] ? lockdep_init_map_type+0x5c/0x250 [ 526.863029][T11930] security_inode_alloc+0x3b/0x2c0 [ 526.863054][T11930] inode_init_always_gfp+0xced/0x1040 [ 526.863090][T11930] alloc_inode+0x8e/0x250 [ 526.863122][T11930] new_inode+0x22/0x1c0 [ 526.863157][T11930] __debugfs_create_file+0x105/0x4f0 [ 526.863187][T11930] debugfs_create_file_full+0x41/0x60 [ 526.863215][T11930] kvm_dev_ioctl+0x1491/0x1a50 [ 526.863260][T11930] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 526.863298][T11930] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 526.863328][T11930] __x64_sys_ioctl+0x18e/0x210 [ 526.863366][T11930] do_syscall_64+0x106/0xf80 [ 526.863399][T11930] ? clear_bhb_loop+0x40/0x90 [ 526.863429][T11930] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 526.863454][T11930] RIP: 0033:0x7f69c779c799 [ 526.863473][T11930] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 526.863497][T11930] RSP: 002b:00007f69c86fc028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 526.863521][T11930] RAX: ffffffffffffffda RBX: 00007f69c7a16180 RCX: 00007f69c779c799 [ 526.863537][T11930] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 526.863552][T11930] RBP: 00007f69c7832c99 R08: 0000000000000000 R09: 0000000000000000 [ 526.863566][T11930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 526.863586][T11930] R13: 00007f69c7a16218 R14: 00007f69c7a16180 R15: 00007fffb0491b88 [ 526.863618][T11930] [ 526.896729][T11930] debugfs: out of free dentries, can not create file 'remote_tlb_flush' [ 529.103010][T11964] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1232'. [ 529.157237][T11962] FAULT_INJECTION: forcing a failure. [ 529.157237][T11962] name failslab, interval 1, probability 0, space 0, times 0 [ 529.396135][T11962] CPU: 0 UID: 0 PID: 11962 Comm: syz.4.1231 Tainted: G L syzkaller #0 PREEMPT(full) [ 529.396175][T11962] Tainted: [L]=SOFTLOCKUP [ 529.396183][T11962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 529.396197][T11962] Call Trace: [ 529.396205][T11962] [ 529.396214][T11962] dump_stack_lvl+0x100/0x190 [ 529.396256][T11962] should_fail_ex.cold+0x5/0xa [ 529.396285][T11962] should_failslab+0xc2/0x120 [ 529.396311][T11962] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 529.396349][T11962] ? alloc_inode+0x68/0x250 [ 529.396385][T11962] ? simple_start_creating+0xb0/0x110 [ 529.396424][T11962] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 529.396475][T11962] alloc_inode+0x68/0x250 [ 529.396507][T11962] new_inode+0x22/0x1c0 [ 529.396541][T11962] __debugfs_create_file+0x105/0x4f0 [ 529.396571][T11962] debugfs_create_file_full+0x41/0x60 [ 529.396599][T11962] kvm_dev_ioctl+0x1491/0x1a50 [ 529.396637][T11962] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 529.396675][T11962] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 529.396704][T11962] __x64_sys_ioctl+0x18e/0x210 [ 529.396742][T11962] do_syscall_64+0x106/0xf80 [ 529.396775][T11962] ? clear_bhb_loop+0x40/0x90 [ 529.396805][T11962] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 529.396830][T11962] RIP: 0033:0x7fed4dd9c799 [ 529.396850][T11962] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 529.396874][T11962] RSP: 002b:00007fed4bff6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.396897][T11962] RAX: ffffffffffffffda RBX: 00007fed4e016180 RCX: 00007fed4dd9c799 [ 529.396913][T11962] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 529.396927][T11962] RBP: 00007fed4de32c99 R08: 0000000000000000 R09: 0000000000000000 [ 529.396941][T11962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 529.396956][T11962] R13: 00007fed4e016218 R14: 00007fed4e016180 R15: 00007ffc3a912488 [ 529.396987][T11962] [ 531.027691][T11962] debugfs: out of free dentries, can not create file 'remote_tlb_flush' [ 532.034957][T11989] FAULT_INJECTION: forcing a failure. [ 532.034957][T11989] name failslab, interval 1, probability 0, space 0, times 0 [ 532.098518][ T5823] Bluetooth: hci3: Malformed LE Event: 0x1b [ 532.112200][T11989] CPU: 0 UID: 0 PID: 11989 Comm: syz.2.1238 Tainted: G L syzkaller #0 PREEMPT(full) [ 532.112241][T11989] Tainted: [L]=SOFTLOCKUP [ 532.112249][T11989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 532.112264][T11989] Call Trace: [ 532.112272][T11989] [ 532.112281][T11989] dump_stack_lvl+0x100/0x190 [ 532.112325][T11989] should_fail_ex.cold+0x5/0xa [ 532.112354][T11989] should_failslab+0xc2/0x120 [ 532.112380][T11989] __kmalloc_cache_noprof+0x7a/0x6f0 [ 532.112413][T11989] ? __alloc_workqueue+0x1a0/0x1880 [ 532.112448][T11989] __alloc_workqueue+0x1a0/0x1880 [ 532.112476][T11989] ? __pfx_vsnprintf+0x10/0x10 [ 532.112525][T11989] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 532.112557][T11989] ? lockdep_hardirqs_on+0x78/0x100 [ 532.112589][T11989] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 532.112626][T11989] alloc_workqueue_noprof+0xd2/0x200 [ 532.112656][T11989] ? __pfx_alloc_workqueue_noprof+0x10/0x10 [ 532.112694][T11989] ? __pfx___debug_object_init+0x10/0x10 [ 532.112834][T11989] nci_register_device+0x21e/0xb80 [ 532.112896][T11989] ? __pfx_nci_register_device+0x10/0x10 [ 532.112927][T11989] ? lockdep_init_map_type+0x5c/0x250 [ 532.112966][T11989] virtual_ncidev_open+0x141/0x220 [ 532.113030][T11989] ? __pfx_virtual_ncidev_open+0x10/0x10 [ 532.113061][T11989] misc_open+0x26d/0x450 [ 532.113137][T11989] ? __pfx_misc_open+0x10/0x10 [ 532.113163][T11989] chrdev_open+0x234/0x6a0 [ 532.113188][T11989] ? __pfx_apparmor_file_open+0x10/0x10 [ 532.113229][T11989] ? __pfx_chrdev_open+0x10/0x10 [ 532.113256][T11989] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 532.113297][T11989] do_dentry_open+0x6d8/0x1660 [ 532.113320][T11989] ? __pfx_chrdev_open+0x10/0x10 [ 532.113352][T11989] vfs_open+0x82/0x3f0 [ 532.113386][T11989] path_openat+0x208c/0x31a0 [ 532.113422][T11989] ? __pfx_path_openat+0x10/0x10 [ 532.113458][T11989] do_file_open+0x20e/0x430 [ 532.113486][T11989] ? __pfx_do_file_open+0x10/0x10 [ 532.113532][T11989] ? alloc_fd+0x476/0x790 [ 532.113558][T11989] ? do_getname+0x191/0x390 [ 532.113591][T11989] do_sys_openat2+0x10d/0x1e0 [ 532.113627][T11989] ? __pfx_do_sys_openat2+0x10/0x10 [ 532.113676][T11989] __x64_sys_openat+0x12d/0x210 [ 532.113911][T11989] ? __pfx___x64_sys_openat+0x10/0x10 [ 532.113974][T11989] do_syscall_64+0x106/0xf80 [ 532.114013][T11989] ? clear_bhb_loop+0x40/0x90 [ 532.114048][T11989] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 532.114075][T11989] RIP: 0033:0x7f61f459c799 [ 532.114097][T11989] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 532.114139][T11989] RSP: 002b:00007f61f54a5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 532.114378][T11989] RAX: ffffffffffffffda RBX: 00007f61f4816090 RCX: 00007f61f459c799 [ 532.114397][T11989] RDX: 0000000000000002 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 532.114413][T11989] RBP: 00007f61f4632c99 R08: 0000000000000000 R09: 0000000000000000 [ 532.114428][T11989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 532.114443][T11989] R13: 00007f61f4816128 R14: 00007f61f4816090 R15: 00007ffd4d4e06a8 [ 532.114477][T11989] [ 533.837240][T12021] random: crng reseeded on system resumption [ 534.085822][T12025] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1245'. [ 535.418313][T12047] netlink: 330 bytes leftover after parsing attributes in process `syz.1.1250'. [ 535.482265][T12047] bridge0: port 3(gretap0) entered disabled state [ 535.676296][T12051] FAULT_INJECTION: forcing a failure. [ 535.676296][T12051] name failslab, interval 1, probability 0, space 0, times 0 [ 535.870982][T12051] CPU: 0 UID: 0 PID: 12051 Comm: syz.0.1249 Tainted: G L syzkaller #0 PREEMPT(full) [ 535.871023][T12051] Tainted: [L]=SOFTLOCKUP [ 535.871031][T12051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 535.871045][T12051] Call Trace: [ 535.871053][T12051] [ 535.871062][T12051] dump_stack_lvl+0x100/0x190 [ 535.871105][T12051] should_fail_ex.cold+0x5/0xa [ 535.871133][T12051] ? kvm_dev_ioctl+0x124f/0x1a50 [ 535.871160][T12051] should_failslab+0xc2/0x120 [ 535.871185][T12051] __kmalloc_noprof+0xe0/0x850 [ 535.871227][T12051] kvm_dev_ioctl+0x124f/0x1a50 [ 535.871260][T12051] ? find_held_lock+0x2b/0x80 [ 535.871282][T12051] ? __fget_files+0x215/0x3d0 [ 535.871303][T12051] ? hook_file_ioctl_common+0x146/0x410 [ 535.871339][T12051] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 535.871376][T12051] ? __pfx_kvm_dev_ioctl+0x10/0x10 [ 535.871406][T12051] __x64_sys_ioctl+0x18e/0x210 [ 535.871444][T12051] do_syscall_64+0x106/0xf80 [ 535.871477][T12051] ? clear_bhb_loop+0x40/0x90 [ 535.871507][T12051] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 535.871531][T12051] RIP: 0033:0x7f117599c799 [ 535.871551][T12051] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 535.871574][T12051] RSP: 002b:00007f11767c1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 535.871597][T12051] RAX: ffffffffffffffda RBX: 00007f1175c16180 RCX: 00007f117599c799 [ 535.871613][T12051] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000009 [ 535.871627][T12051] RBP: 00007f1175a32c99 R08: 0000000000000000 R09: 0000000000000000 [ 535.871642][T12051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 535.871656][T12051] R13: 00007f1175c16218 R14: 00007f1175c16180 R15: 00007ffeb4f19f68 [ 535.871687][T12051] [ 540.970751][T12123] nfs: Unknown parameter 'nl802154' [ 541.156544][T12121] random: crng reseeded on system resumption [ 541.395196][T12132] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1265'. [ 542.710886][T12144] input: 00 [ 542.710886][T12144] as /devices/virtual/input/input10 [ 542.810055][T12144] FAULT_INJECTION: forcing a failure. [ 542.810055][T12144] name failslab, interval 1, probability 0, space 0, times 0 [ 542.917644][T12144] CPU: 0 UID: 0 PID: 12144 Comm: syz.1.1272 Tainted: G L syzkaller #0 PREEMPT(full) [ 542.917684][T12144] Tainted: [L]=SOFTLOCKUP [ 542.917692][T12144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 542.917706][T12144] Call Trace: [ 542.917716][T12144] [ 542.917726][T12144] dump_stack_lvl+0x100/0x190 [ 542.917767][T12144] should_fail_ex.cold+0x5/0xa [ 542.917797][T12144] should_failslab+0xc2/0x120 [ 542.917822][T12144] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 542.917861][T12144] ? __d_alloc+0x34/0xa80 [ 542.917886][T12144] ? raw_hash_sk+0x29f/0x5d0 [ 542.917992][T12144] ? raw_hash_sk+0x29f/0x5d0 [ 542.918031][T12144] __d_alloc+0x34/0xa80 [ 542.918062][T12144] d_alloc_pseudo+0x1c/0xc0 [ 542.918096][T12144] alloc_file_pseudo+0xcf/0x230 [ 542.918129][T12144] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 542.918161][T12144] ? alloc_fd+0x476/0x790 [ 542.918189][T12144] sock_alloc_file+0x50/0x210 [ 542.918228][T12144] __sys_socket+0x1c0/0x260 [ 542.918258][T12144] ? __pfx___sys_socket+0x10/0x10 [ 542.918293][T12144] __x64_sys_socket+0x72/0xb0 [ 542.918324][T12144] ? lockdep_hardirqs_on+0x78/0x100 [ 542.918360][T12144] do_syscall_64+0x106/0xf80 [ 542.918393][T12144] ? clear_bhb_loop+0x40/0x90 [ 542.918423][T12144] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 542.918448][T12144] RIP: 0033:0x7f69c779c799 [ 542.918469][T12144] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 542.918493][T12144] RSP: 002b:00007f69c873e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 542.918516][T12144] RAX: ffffffffffffffda RBX: 00007f69c7a15fa0 RCX: 00007f69c779c799 [ 542.918531][T12144] RDX: 000000000000003a RSI: 0000000000000003 RDI: 000000000000000a [ 542.918546][T12144] RBP: 00007f69c7832c99 R08: 0000000000000000 R09: 0000000000000000 [ 542.918561][T12144] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 542.918575][T12144] R13: 00007f69c7a16038 R14: 00007f69c7a15fa0 R15: 00007fffb0491b88 [ 542.918607][T12144] [ 543.208939][T12152] netlink: 4 bytes leftover after parsing attributes in process `'. [ 547.668015][T12207] random: crng reseeded on system resumption [ 547.693803][T12213] nfs: Unknown parameter 'nl802154' [ 547.976099][T12219] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1284'. [ 552.630171][T12287] block2mtd: error: cannot open device /sys/modu [ 553.864546][T12298] FAULT_INJECTION: forcing a failure. [ 553.864546][T12298] name failslab, interval 1, probability 0, space 0, times 0 [ 554.140923][T12298] CPU: 0 UID: 0 PID: 12298 Comm: syz.4.1303 Tainted: G L syzkaller #0 PREEMPT(full) [ 554.140961][T12298] Tainted: [L]=SOFTLOCKUP [ 554.140969][T12298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 554.140983][T12298] Call Trace: [ 554.140991][T12298] [ 554.141001][T12298] dump_stack_lvl+0x100/0x190 [ 554.141041][T12298] should_fail_ex.cold+0x5/0xa [ 554.141068][T12298] ? kernfs_fop_write_iter+0x26a/0x5f0 [ 554.141092][T12298] should_failslab+0xc2/0x120 [ 554.141117][T12298] __kmalloc_noprof+0xe0/0x850 [ 554.141159][T12298] kernfs_fop_write_iter+0x26a/0x5f0 [ 554.141188][T12298] vfs_write+0x6ac/0x1070 [ 554.141226][T12298] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 554.141254][T12298] ? __pfx_vfs_write+0x10/0x10 [ 554.141309][T12298] ksys_write+0x12a/0x250 [ 554.141330][T12298] ? __pfx_ksys_write+0x10/0x10 [ 554.141359][T12298] do_syscall_64+0x106/0xf80 [ 554.141398][T12298] ? clear_bhb_loop+0x40/0x90 [ 554.141426][T12298] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 554.141475][T12298] RIP: 0033:0x7fed4dd9c799 [ 554.141494][T12298] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 554.141531][T12298] RSP: 002b:00007fed4bfd5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 554.141553][T12298] RAX: ffffffffffffffda RBX: 00007fed4e016270 RCX: 00007fed4dd9c799 [ 554.141569][T12298] RDX: 0000000000000009 RSI: 0000200000000000 RDI: 0000000000000005 [ 554.141583][T12298] RBP: 00007fed4bfd5090 R08: 0000000000000000 R09: 0000000000000000 [ 554.141596][T12298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 554.141609][T12298] R13: 00007fed4e016308 R14: 00007fed4e016270 R15: 00007ffc3a912488 [ 554.141641][T12298] [ 554.799807][T12314] vivid-007: ================= START STATUS ================= [ 554.800058][T12314] vivid-007: Generate PTS: true [ 554.800126][T12314] vivid-007: Generate SCR: true [ 554.800192][T12314] tpg source WxH: 320x240 (Y'CbCr) [ 554.800224][T12314] tpg field: 1 [ 554.800232][T12314] tpg crop: (0,0)/320x240 [ 554.800248][T12314] tpg compose: (0,0)/320x240 [ 554.800264][T12314] tpg colorspace: 8 [ 554.800273][T12314] tpg transfer function: 0/0 [ 554.800285][T12314] tpg Y'CbCr encoding: 0/0 [ 554.800296][T12314] tpg quantization: 0/0 [ 554.800307][T12314] tpg RGB range: 0/2 [ 554.800318][T12314] vivid-007: ================== END STATUS ================== [ 554.996290][T12318] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1309'. [ 555.014068][T12314] FAULT_INJECTION: forcing a failure. [ 555.014068][T12314] name fail_futex, interval 1, probability 0, space 0, times 1 [ 555.014112][T12314] CPU: 0 UID: 0 PID: 12314 Comm: syz.4.1308 Tainted: G L syzkaller #0 PREEMPT(full) [ 555.014149][T12314] Tainted: [L]=SOFTLOCKUP [ 555.014156][T12314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 555.014170][T12314] Call Trace: [ 555.014178][T12314] [ 555.014187][T12314] dump_stack_lvl+0x100/0x190 [ 555.014226][T12314] should_fail_ex.cold+0x5/0xa [ 555.014253][T12314] get_futex_key+0x295/0x1620 [ 555.014286][T12314] ? __pfx_get_futex_key+0x10/0x10 [ 555.014316][T12314] ? lock_acquire+0x1cf/0x380 [ 555.014356][T12314] futex_wake+0xea/0x530 [ 555.014399][T12314] ? __pfx_futex_wake+0x10/0x10 [ 555.014436][T12314] ? exit_mm_release+0x19/0x30 [ 555.014473][T12314] do_futex+0x32b/0x350 [ 555.014505][T12314] ? __pfx_do_futex+0x10/0x10 [ 555.014536][T12314] ? __might_fault+0xc5/0x140 [ 555.014578][T12314] mm_release+0x24a/0x2f0 [ 555.014602][T12314] do_exit+0x704/0x2b60 [ 555.014636][T12314] ? __pfx_do_exit+0x10/0x10 [ 555.014666][T12314] ? do_raw_spin_lock+0x128/0x260 [ 555.014699][T12314] ? find_held_lock+0x2b/0x80 [ 555.014720][T12314] ? get_signal+0x7e0/0x21e0 [ 555.014746][T12314] do_group_exit+0xd5/0x2a0 [ 555.014780][T12314] get_signal+0x1ec7/0x21e0 [ 555.014814][T12314] ? __pfx_get_signal+0x10/0x10 [ 555.014841][T12314] ? do_futex+0x192/0x350 [ 555.014874][T12314] arch_do_signal_or_restart+0x91/0x770 [ 555.014905][T12314] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 555.014942][T12314] ? __pfx___x64_sys_futex+0x10/0x10 [ 555.014979][T12314] exit_to_user_mode_loop+0x86/0x4a0 [ 555.015015][T12314] do_syscall_64+0x668/0xf80 [ 555.015048][T12314] ? clear_bhb_loop+0x40/0x90 [ 555.015076][T12314] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 555.015100][T12314] RIP: 0033:0x7fed4dd9c799 [ 555.015118][T12314] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 555.015141][T12314] RSP: 002b:00007fed4eb8d0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 555.015163][T12314] RAX: fffffffffffffe00 RBX: 00007fed4e016098 RCX: 00007fed4dd9c799 [ 555.015179][T12314] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fed4e016098 [ 555.015193][T12314] RBP: 00007fed4e016090 R08: 0000000000000000 R09: 0000000000000000 [ 555.015207][T12314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 555.015221][T12314] R13: 00007fed4e016128 R14: 00007ffc3a9123a0 R15: 00007ffc3a912488 [ 555.015251][T12314] [ 557.352112][T12360] FAULT_INJECTION: forcing a failure. [ 557.352112][T12360] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 557.401363][T12361] block2mtd: error: cannot open device /sys/modu [ 557.648593][T12360] CPU: 0 UID: 0 PID: 12360 Comm: syz.4.1316 Tainted: G L syzkaller #0 PREEMPT(full) [ 557.648631][T12360] Tainted: [L]=SOFTLOCKUP [ 557.648639][T12360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 557.648654][T12360] Call Trace: [ 557.648661][T12360] [ 557.648670][T12360] dump_stack_lvl+0x100/0x190 [ 557.648711][T12360] should_fail_ex.cold+0x5/0xa [ 557.648738][T12360] _copy_from_iter+0x1f4/0x1690 [ 557.648773][T12360] ? __pfx__copy_from_iter+0x10/0x10 [ 557.648799][T12360] ? rcu_is_watching+0x12/0xc0 [ 557.648835][T12360] ? trace_kmalloc+0x101/0x130 [ 557.648858][T12360] ? __kasan_kmalloc+0xaa/0xb0 [ 557.648895][T12360] ? __kmalloc_noprof+0x320/0x850 [ 557.648936][T12360] kernfs_fop_write_iter+0x186/0x5f0 [ 557.648965][T12360] vfs_write+0x6ac/0x1070 [ 557.649003][T12360] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 557.649031][T12360] ? __pfx_vfs_write+0x10/0x10 [ 557.649096][T12360] ksys_write+0x12a/0x250 [ 557.649121][T12360] ? __pfx_ksys_write+0x10/0x10 [ 557.649151][T12360] do_syscall_64+0x106/0xf80 [ 557.649183][T12360] ? clear_bhb_loop+0x40/0x90 [ 557.649213][T12360] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 557.649236][T12360] RIP: 0033:0x7fed4dd9c799 [ 557.649254][T12360] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 557.649284][T12360] RSP: 002b:00007fed4bfd5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 557.649306][T12360] RAX: ffffffffffffffda RBX: 00007fed4e016270 RCX: 00007fed4dd9c799 [ 557.649325][T12360] RDX: 0000000000000009 RSI: 0000200000000000 RDI: 0000000000000005 [ 557.649339][T12360] RBP: 00007fed4bfd5090 R08: 0000000000000000 R09: 0000000000000000 [ 557.649353][T12360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 557.649366][T12360] R13: 00007fed4e016308 R14: 00007fed4e016270 R15: 00007ffc3a912488 [ 557.649402][T12360] [ 558.323989][T12378] binder: 12376:12378 ioctl c00c620f 200000000100 returned -22 [ 558.667487][T12381] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1320'. [ 558.900725][T12388] block2mtd: error: cannot open device /sys/modu [ 559.131419][T12399] : Can't lookup blockdev [ 561.228678][T12434] block2mtd: error: cannot open device /sys/modu [ 561.324915][T12437] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1332'. [ 561.625560][T12445] FAULT_INJECTION: forcing a failure. [ 561.625560][T12445] name failslab, interval 1, probability 0, space 0, times 0 [ 561.700837][T12445] CPU: 0 UID: 0 PID: 12445 Comm: syz.4.1334 Tainted: G L syzkaller #0 PREEMPT(full) [ 561.700878][T12445] Tainted: [L]=SOFTLOCKUP [ 561.700886][T12445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 561.700900][T12445] Call Trace: [ 561.700908][T12445] [ 561.700918][T12445] dump_stack_lvl+0x100/0x190 [ 561.700960][T12445] should_fail_ex.cold+0x5/0xa [ 561.700997][T12445] should_failslab+0xc2/0x120 [ 561.701023][T12445] __kmalloc_node_noprof+0xe6/0x850 [ 561.701060][T12445] ? user_buffer_init+0x2a1/0x6d0 [ 561.701131][T12445] user_buffer_init+0x2a1/0x6d0 [ 561.701173][T12445] tracing_mark_open+0x1b7/0x240 [ 561.701213][T12445] do_dentry_open+0x6d8/0x1660 [ 561.701238][T12445] ? __pfx_tracing_mark_open+0x10/0x10 [ 561.701284][T12445] vfs_open+0x82/0x3f0 [ 561.701318][T12445] path_openat+0x208c/0x31a0 [ 561.701353][T12445] ? __pfx_path_openat+0x10/0x10 [ 561.701393][T12445] do_file_open+0x20e/0x430 [ 561.701420][T12445] ? __pfx_do_file_open+0x10/0x10 [ 561.701467][T12445] ? alloc_fd+0x476/0x790 [ 561.701495][T12445] ? do_getname+0x191/0x390 [ 561.701531][T12445] do_sys_openat2+0x10d/0x1e0 [ 561.701563][T12445] ? __pfx_do_sys_openat2+0x10/0x10 [ 561.701606][T12445] __x64_sys_openat+0x12d/0x210 [ 561.701639][T12445] ? __pfx___x64_sys_openat+0x10/0x10 [ 561.701684][T12445] do_syscall_64+0x106/0xf80 [ 561.701718][T12445] ? clear_bhb_loop+0x40/0x90 [ 561.701748][T12445] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 561.701772][T12445] RIP: 0033:0x7fed4dd9c799 [ 561.701791][T12445] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 561.701815][T12445] RSP: 002b:00007fed4ebae028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 561.701838][T12445] RAX: ffffffffffffffda RBX: 00007fed4e015fa0 RCX: 00007fed4dd9c799 [ 561.701854][T12445] RDX: 0000000000000043 RSI: 0000200000000280 RDI: ffffffffffffff9c [ 561.701870][T12445] RBP: 00007fed4de32c99 R08: 0000000000000000 R09: 0000000000000000 [ 561.701884][T12445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 561.701898][T12445] R13: 00007fed4e016038 R14: 00007fed4e015fa0 R15: 00007ffc3a912488 [ 561.701930][T12445] [ 563.400325][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 563.407642][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 564.991353][T12491] tipc: Trying to set illegal importance in message [ 565.011680][T12492] device-mapper: ioctl: ioctl interface mismatch: kernel(4.50.0), user(0.0.0), cmd(1) [ 565.094172][ T29] audit: type=1807 audit(33934.117:4): UNKNOWN=0"û]$|Ë1jë0B|d™¹ýÓ‰OŸ¬+ö×/ÉéxÔóÈõWÓ¦–Ó^¸´gq%ḦrêOŽ res=0 [ 565.108750][T12492] ------------[ cut here ]------------ [ 565.116617][T12492] ((d_inode(path->dentry))->i_flags & (1 << 19)) && !(path->mnt->mnt_sb->s_iflags & 0x00000002) [ 565.116653][T12492] WARNING: fs/exec.c:118 at path_noexec+0x1cf/0x230, CPU#0: syz.4.1345/12492 [ 565.138532][T12492] Modules linked in: [ 565.142907][T12492] CPU: 0 UID: 0 PID: 12492 Comm: syz.4.1345 Tainted: G L syzkaller #0 PREEMPT(full) [ 565.154766][T12492] Tainted: [L]=SOFTLOCKUP [ 565.159472][T12492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 565.171251][T12492] RIP: 0010:path_noexec+0x1cf/0x230 [ 565.177076][T12492] Code: 58 31 ff 83 e3 02 48 89 de 48 d1 eb e8 0a ea 7e ff 83 e3 01 e8 22 ef 7e ff 89 d8 5b 5d 41 5c c3 cc cc cc cc e8 12 ef 7e ff 90 <0f> 0b 90 e9 46 ff ff ff e8 14 79 ea ff e9 a3 fe ff ff e8 0a 79 ea [ 565.198538][T12492] RSP: 0018:ffffc900058f7bd8 EFLAGS: 00010283 [ 565.204993][T12492] RAX: 00000000000000b0 RBX: 0000000000000000 RCX: ffffc9001951f000 [ 565.214826][T12492] RDX: 0000000000080000 RSI: ffffffff8289246e RDI: ffff8880794a5b80 [ 565.224230][T12492] RBP: ffff88801f2f5c20 R08: 0000000000000007 R09: 0000000000000000 [ 565.232612][T12492] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000080000 [ 565.241014][T12492] R13: 0000000000000001 R14: ffff888062255c48 R15: 0000000000000000 [ 565.249660][T12492] FS: 00007fed4ebae6c0(0000) GS:ffff88812434c000(0000) knlGS:0000000000000000 [ 565.258903][T12492] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 565.266321][T12492] CR2: 0000001b30a09ff8 CR3: 00000000786aa000 CR4: 00000000003526f0 [ 565.275300][T12492] Call Trace: [ 565.278673][T12492] [ 565.282125][T12492] do_mmap+0x857/0x12f0 [ 565.286684][T12492] ? __pfx_do_mmap+0x10/0x10 [ 565.291486][T12492] ? __pfx_down_write_killable+0x10/0x10 [ 565.297802][T12492] vm_mmap_pgoff+0x29e/0x470 [ 565.303230][T12492] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 565.309004][T12492] ? __fget_files+0x215/0x3d0 [ 565.315081][T12492] ? __fget_files+0x21f/0x3d0 [ 565.321027][T12492] ksys_mmap_pgoff+0x3c8/0x650 [ 565.326993][T12492] ? __x64_sys_futex+0x34f/0x4d0 [ 565.332875][T12492] ? __x64_sys_futex+0x358/0x4d0 [ 565.338396][T12492] ? __pfx_ksys_mmap_pgoff+0x10/0x10 [ 565.343888][T12492] ? xfd_validate_state+0x129/0x190 [ 565.349354][T12492] __x64_sys_mmap+0x125/0x190 [ 565.354816][T12492] do_syscall_64+0x106/0xf80 [ 565.359719][T12492] ? clear_bhb_loop+0x40/0x90 [ 565.364612][T12492] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 565.370904][T12492] RIP: 0033:0x7fed4dd9c799 [ 565.375773][T12492] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 565.396566][T12492] RSP: 002b:00007fed4ebae028 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 565.405638][T12492] RAX: ffffffffffffffda RBX: 00007fed4e015fa0 RCX: 00007fed4dd9c799 [ 565.414266][T12492] RDX: 0001000000000001 RSI: 0000000000000003 RDI: 0000000000000000 [ 565.423979][T12492] RBP: 00007fed4de32c99 R08: 0000000000000003 R09: 0000000000000000 [ 565.433543][T12492] R10: 0008000000008011 R11: 0000000000000246 R12: 0000000000000000 [ 565.442190][T12492] R13: 00007fed4e016038 R14: 00007fed4e015fa0 R15: 00007ffc3a912488 [ 565.450849][T12492] [ 565.453912][T12492] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 565.461625][T12492] CPU: 0 UID: 0 PID: 12492 Comm: syz.4.1345 Tainted: G L syzkaller #0 PREEMPT(full) [ 565.473389][T12492] Tainted: [L]=SOFTLOCKUP [ 565.477929][T12492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 565.488099][T12492] Call Trace: [ 565.491490][T12492] [ 565.494809][T12492] dump_stack_lvl+0x100/0x190 [ 565.499884][T12492] vpanic+0x552/0x970 [ 565.503892][T12492] ? __pfx_vpanic+0x10/0x10 [ 565.508555][T12492] panic+0xd1/0xe0 [ 565.512404][T12492] ? __pfx_panic+0x10/0x10 [ 565.516909][T12492] check_panic_on_warn.cold+0x19/0x34 [ 565.522768][T12492] ? path_noexec+0x1cf/0x230 [ 565.528080][T12492] __warn.cold+0x191/0x348 [ 565.532827][T12492] __report_bug+0x296/0x3d0 [ 565.537630][T12492] ? path_noexec+0x1cf/0x230 [ 565.542827][T12492] ? __pfx___report_bug+0x10/0x10 [ 565.548026][T12492] ? __lock_acquire+0x4a5/0x2630 [ 565.553453][T12492] ? arch_get_unmapped_area_topdown+0x3e6/0x9b0 [ 565.559933][T12492] ? path_noexec+0x1cf/0x230 [ 565.564656][T12492] report_bug+0xb2/0x220 [ 565.569199][T12492] ? path_noexec+0x1cf/0x230 [ 565.573939][T12492] handle_bug+0x16a/0x2a0 [ 565.578421][T12492] exc_invalid_op+0x17/0x50 [ 565.583420][T12492] asm_exc_invalid_op+0x1a/0x20 [ 565.588507][T12492] RIP: 0010:path_noexec+0x1cf/0x230 [ 565.594282][T12492] Code: 58 31 ff 83 e3 02 48 89 de 48 d1 eb e8 0a ea 7e ff 83 e3 01 e8 22 ef 7e ff 89 d8 5b 5d 41 5c c3 cc cc cc cc e8 12 ef 7e ff 90 <0f> 0b 90 e9 46 ff ff ff e8 14 79 ea ff e9 a3 fe ff ff e8 0a 79 ea [ 565.616367][T12492] RSP: 0018:ffffc900058f7bd8 EFLAGS: 00010283 [ 565.622617][T12492] RAX: 00000000000000b0 RBX: 0000000000000000 RCX: ffffc9001951f000 [ 565.631951][T12492] RDX: 0000000000080000 RSI: ffffffff8289246e RDI: ffff8880794a5b80 [ 565.640675][T12492] RBP: ffff88801f2f5c20 R08: 0000000000000007 R09: 0000000000000000 [ 565.649215][T12492] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000080000 [ 565.657420][T12492] R13: 0000000000000001 R14: ffff888062255c48 R15: 0000000000000000 [ 565.666062][T12492] ? path_noexec+0x1ce/0x230 [ 565.670994][T12492] ? path_noexec+0x1ce/0x230 [ 565.676071][T12492] do_mmap+0x857/0x12f0 [ 565.680543][T12492] ? __pfx_do_mmap+0x10/0x10 [ 565.685534][T12492] ? __pfx_down_write_killable+0x10/0x10 [ 565.691490][T12492] vm_mmap_pgoff+0x29e/0x470 [ 565.696288][T12492] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 565.701730][T12492] ? __fget_files+0x215/0x3d0 [ 565.706992][T12492] ? __fget_files+0x21f/0x3d0 [ 565.712380][T12492] ksys_mmap_pgoff+0x3c8/0x650 [ 565.717310][T12492] ? __x64_sys_futex+0x34f/0x4d0 [ 565.722297][T12492] ? __x64_sys_futex+0x358/0x4d0 [ 565.727564][T12492] ? __pfx_ksys_mmap_pgoff+0x10/0x10 [ 565.733088][T12492] ? xfd_validate_state+0x129/0x190 [ 565.738530][T12492] __x64_sys_mmap+0x125/0x190 [ 565.743263][T12492] do_syscall_64+0x106/0xf80 [ 565.748333][T12492] ? clear_bhb_loop+0x40/0x90 [ 565.753235][T12492] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 565.759538][T12492] RIP: 0033:0x7fed4dd9c799 [ 565.764719][T12492] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 565.786479][T12492] RSP: 002b:00007fed4ebae028 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 565.795180][T12492] RAX: ffffffffffffffda RBX: 00007fed4e015fa0 RCX: 00007fed4dd9c799 [ 565.803202][T12492] RDX: 0001000000000001 RSI: 0000000000000003 RDI: 0000000000000000 [ 565.811727][T12492] RBP: 00007fed4de32c99 R08: 0000000000000003 R09: 0000000000000000 [ 565.819990][T12492] R10: 0008000000008011 R11: 0000000000000246 R12: 0000000000000000 [ 565.828372][T12492] R13: 00007fed4e016038 R14: 00007fed4e015fa0 R15: 00007ffc3a912488 [ 565.837201][T12492] [ 565.840595][T12492] Kernel Offset: disabled [ 565.845310][T12492] Rebooting in 86400 seconds..