last executing test programs: 11m10.83116225s ago: executing program 0 (id=3442): r0 = openat$auto_proc_pid_numa_maps_operations_internal(0xffffffffffffff9c, 0x0, 0x20000, 0x0) read$auto_proc_sessionid_operations_base(r0, &(0x7f00000000c0)=""/4096, 0x1000) 11m4.418642952s ago: executing program 0 (id=3465): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) mlockall$auto(0x7) inotify_rm_watch$auto(0xffffffffffffffff, 0x84e4) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS1\x00', 0x20000, 0x0) madvise$auto(0x0, 0x2000040080000004, 0xe) modify_ldt$auto(0x1, 0x0, 0x10) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) madvise$auto(0xfffffffffffffffd, 0xffffffffffff0002, 0x19) fallocate$auto(r0, 0x1, 0x9, 0x80000000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_CTRL_CMD_GETFAMILY(r1, &(0x7f00000000c0)={&(0x7f0000000080), 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c800}, 0x8000) mmap$auto(0x2, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) madvise$auto(0x0, 0x8000000000000000, 0x15) madvise$auto(0x0, 0x1010001, 0x100000003) setgroups$auto(0xe32, &(0x7f0000000040)=0x9) uname$auto(&(0x7f0000000280)={"017a23d49d4e4f89b7bb66d0528142ad4998ea9c70c06d0408e91b30b0b0d300722823e67e78003cff84dfc2528569e4ca4367c6216df84c3958d96ed2c499caff", "1e2157148e99091f121521269985a6a599863e135818f2ccc77a864d50fd1b2447c13d33dfb37033d53d69c4ff062abf19efab53fd75a00d4af7dbdef66e913103", "1fa81ccc6ffd05b516bdc4046cdfee68955b5ae48f8a322b6a0e4d8233d9491029f04050fca8a76d8b02739e3347e73f0f398e219952ca06e6c78655a70e097917", "0749ebba3d6f1ed9c077eeeb6deae36535af268af804ea0614e6c5ef0445f6fb05bec835636e440d94396dbeef246ceff774a1af2e8884df1be20351da9874f6fa", "4fbb5ffd975d9cf0800c3bf9046b1351f7371fcaea1fac30b4de0ac23b4d950cba906c482378f4337fe941454b8dbd36e51d285c95a92a20bec5a9907616fad85e", "d802740973602ea52b49799bc04ddb3c4e8995a5f9bd70c8c718fc2ebdffc648dd1195b4ac34305e0d8651eee2435736984e421114030659dd79fedec147e0e6ee"}) ppoll$auto(0x0, 0x9, 0x0, 0x0, 0x8) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) madvise$auto(0x0, 0x200007, 0x19) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000080), r2) sendmsg$auto_HWSIM_CMD_NEW_RADIO(r2, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000dc0)={&(0x7f0000000100)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002abd7000fbdbdf25040000002d0011002f0400000000000000a3d28479f92a9b221ca46c2d19fda4a01d446f93fd8b5c41f47902c296fa844c12cd83f712d3c41e5d000000d9b2bf7abee16ef945928f2896bf2509f225e4bca4ae57da6da3dead11e62f85ea825958a338d6784496b106efd71cddf088b4a443e091e19b2fc7e9130c7422193d5c4fabf604e8c570d71c4c58461b8633682f683e2519165f6d47936022a17dea502446048f83d5c5cf33200a016db15cd855e8cfe01cc4d743acaacd444a2b0065043025c91a632a1380d02c3dccca"], 0x44}, 0x1, 0x0, 0x0, 0x4008040}, 0x4000800) socket(0xa, 0x800, 0x0) 10m59.807263016s ago: executing program 0 (id=3489): r0 = socket(0xa, 0x3, 0x5) sendmmsg$auto(r0, &(0x7f0000000000)={{&(0x7f0000000040), 0xc88, 0x0, 0x0, &(0x7f0000000140), 0x8, 0x80000000}, 0x5}, 0x3b8b, 0x800) 10m56.167133084s ago: executing program 0 (id=3502): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) socket(0x2, 0x3, 0xa) connect$auto(0x3, &(0x7f00000000c0), 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xa00) r0 = socket(0x11, 0x80003, 0x300) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x102, 0x0) mprotect$auto(0x1ffff000, 0x8000000000000001, 0x8) sendmsg$auto_NL80211_CMD_SET_MULTICAST_TO_UNICAST(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_MESH_PEER_AID={0x6, 0xed, 0x772b}]}, 0x1c}, 0x1, 0x0, 0x0, 0x11}, 0x4008844) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) socket(0xa, 0x1, 0x0) getrandom$auto(0x0, 0x6000000, 0x3) syz_genetlink_get_family_id$auto_macsec(&(0x7f0000000300), 0xffffffffffffffff) 10m49.51879469s ago: executing program 0 (id=3522): close_range$auto(0x2, 0xa, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000340)='/sys/devices/platform/vhci_hcd.0/usbip_debug\x00', 0x8002, 0x0) r0 = openat$auto_proc_page_owner_threshold_(0xffffffffffffff9c, &(0x7f0000000000), 0x109280, 0x0) read$auto(r0, &(0x7f0000000100)='\xcb%)\x00', 0x7) openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security/tomoyo/domain_policy\x00', 0x40802, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r1 = socket(0x23, 0x80805, 0x0) poll$auto(&(0x7f0000000000)={r1, 0x1, 0x8}, 0x5, 0x400) listen$auto(r1, 0x3b) setsockopt$auto(r2, 0x113, 0x3, 0x0, 0x79ad226b) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4044000}, 0x800) openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs1\x00', 0x2, 0x0) clone$auto(0x0, 0x68000, &(0x7f0000000100)=0xd60a, &(0x7f0000000140)=0xfffffffd, 0x9) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004800}, 0x20040810) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x0) open(0x0, 0x22040, 0x75) socket(0x25, 0xa, 0xff) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) connect$auto(0x3, &(0x7f00000018c0)=@l2tp={0x2, 0x0, @multicast1}, 0x55) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x3, &(0x7f0000000040)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) 10m43.15806478s ago: executing program 0 (id=3554): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) io_uring_setup$auto(0x6, 0x0) mmap$auto(0x0, 0x202000c, 0x3, 0x9000000eb1, 0xfffffffffffffffa, 0x8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_l2tp(0x0, 0xffffffffffffffff) sendmsg$auto_L2TP_CMD_TUNNEL_MODIFY(r0, 0x0, 0x20008800) semctl$auto(0x4, 0x0, 0x802, 0x2) syz_genetlink_get_family_id$auto_ioam6(0x0, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ovs_packet(0x0, 0xffffffffffffffff) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004040}, 0xc800) r2 = socket(0x10, 0x2, 0x0) statmount$auto(0x0, &(0x7f0000000180)={0x0, 0x1, 0x9, 0x7, 0x3b, 0xffffffffffff8000, 0x1ffde, 0x7, 0x6, 0x2, 0x9, 0x3, 0x6, 0x4, 0xb4, 0x9, 0x2, 0x10000, 0x80, 0x7, 0x40000, 0x7, 0x2000, 0x200, 0x0, 0x84, [0x0, 0x0, 0x0, 0x50100000000000, 0x0, 0x0, 0x100, 0xa, 0x70624ce7, 0x0, 0x6, 0xb, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffffd, 0x7, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x400000000005b8, 0xc, 0x0, 0x804, 0x0, 0x7, 0xffffffffffffffff, 0x5, 0x8000000000008, 0xfffffffffffffffc, 0x3, 0xa38, 0x4, 0x4000000000000, 0xfffffffffffffffc, 0x2, 0x3fffffffff, 0x0, 0x2, 0xffff]}, 0x202, 0xd) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="10002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r2, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0xfc2}, 0x2, 0x0, 0x7, 0xa505}, 0x800}, 0x7, 0x4008) mknod$auto(0x0, 0x1081, 0x3) r3 = open(0x0, 0xa240, 0x15e) close_range$auto(0x2, 0x8, 0x0) openat$auto_trace_clock_fops_trace(0xffffffffffffff9c, &(0x7f0000003fc0)='/sys/kernel/debug/tracing/trace_clock\x00', 0x28801, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/block/loop5/queue/discard_max_hw_bytes\x00', 0x40000, 0x0) name_to_handle_at$auto(r3, &(0x7f0000000000)='(\x00', &(0x7f00000000c0)={0xc4, 0x7, "ee89d18736480af581f07becb0db206c6239e97856232d47be05fe7216334e373c6fb46021ffb8d5076e962b9c3007ba2de676653840ad24070c24fe7a573475d9626ce615417dabb9f35c22f0ace6dc805e3abc140b1db97f0d920698a7cc062f4b2465d1b884fd7ef6a973aa5041f969c3bc4b1707dbda5e07355a7b2eee2bc120e8ec27e67dd94f10498fe4ea7cccfd3fbf8a990a239f2c5071e806e016c4e144fb0d55bea94a3300c656a4a9e5e2d385986d908d2cbe0e3396f7fc18cfecefb0d4a5"}, &(0x7f00000001c0)="c2d36369e257b06ac2a40200f63aa3ba94d224e0607a02aec1fb41a7fd428ba72da3b6b034979b9d95b2b42d47f63839f09cad37157f059bce5ca2ba1c129fc2abd9a5", 0x3) 10m28.117683554s ago: executing program 32 (id=3554): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) io_uring_setup$auto(0x6, 0x0) mmap$auto(0x0, 0x202000c, 0x3, 0x9000000eb1, 0xfffffffffffffffa, 0x8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_l2tp(0x0, 0xffffffffffffffff) sendmsg$auto_L2TP_CMD_TUNNEL_MODIFY(r0, 0x0, 0x20008800) semctl$auto(0x4, 0x0, 0x802, 0x2) syz_genetlink_get_family_id$auto_ioam6(0x0, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ovs_packet(0x0, 0xffffffffffffffff) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004040}, 0xc800) r2 = socket(0x10, 0x2, 0x0) statmount$auto(0x0, &(0x7f0000000180)={0x0, 0x1, 0x9, 0x7, 0x3b, 0xffffffffffff8000, 0x1ffde, 0x7, 0x6, 0x2, 0x9, 0x3, 0x6, 0x4, 0xb4, 0x9, 0x2, 0x10000, 0x80, 0x7, 0x40000, 0x7, 0x2000, 0x200, 0x0, 0x84, [0x0, 0x0, 0x0, 0x50100000000000, 0x0, 0x0, 0x100, 0xa, 0x70624ce7, 0x0, 0x6, 0xb, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffffd, 0x7, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x400000000005b8, 0xc, 0x0, 0x804, 0x0, 0x7, 0xffffffffffffffff, 0x5, 0x8000000000008, 0xfffffffffffffffc, 0x3, 0xa38, 0x4, 0x4000000000000, 0xfffffffffffffffc, 0x2, 0x3fffffffff, 0x0, 0x2, 0xffff]}, 0x202, 0xd) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="10002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r2, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0xfc2}, 0x2, 0x0, 0x7, 0xa505}, 0x800}, 0x7, 0x4008) mknod$auto(0x0, 0x1081, 0x3) r3 = open(0x0, 0xa240, 0x15e) close_range$auto(0x2, 0x8, 0x0) openat$auto_trace_clock_fops_trace(0xffffffffffffff9c, &(0x7f0000003fc0)='/sys/kernel/debug/tracing/trace_clock\x00', 0x28801, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/block/loop5/queue/discard_max_hw_bytes\x00', 0x40000, 0x0) name_to_handle_at$auto(r3, &(0x7f0000000000)='(\x00', &(0x7f00000000c0)={0xc4, 0x7, "ee89d18736480af581f07becb0db206c6239e97856232d47be05fe7216334e373c6fb46021ffb8d5076e962b9c3007ba2de676653840ad24070c24fe7a573475d9626ce615417dabb9f35c22f0ace6dc805e3abc140b1db97f0d920698a7cc062f4b2465d1b884fd7ef6a973aa5041f969c3bc4b1707dbda5e07355a7b2eee2bc120e8ec27e67dd94f10498fe4ea7cccfd3fbf8a990a239f2c5071e806e016c4e144fb0d55bea94a3300c656a4a9e5e2d385986d908d2cbe0e3396f7fc18cfecefb0d4a5"}, &(0x7f00000001c0)="c2d36369e257b06ac2a40200f63aa3ba94d224e0607a02aec1fb41a7fd428ba72da3b6b034979b9d95b2b42d47f63839f09cad37157f059bce5ca2ba1c129fc2abd9a5", 0x3) 4m37.431062692s ago: executing program 1 (id=5108): timer_create$auto(0x9, 0x0, 0x0) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x8002, 0x0) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snd/midiC2D0\x00', 0x101080, 0x0) read$auto_snd_rawmidi_f_ops_rawmidi(r0, &(0x7f0000000080)=""/45, 0x2d) close_range$auto(0x2, 0x8, 0x0) openat$auto_tap_fops_tap(0xffffffffffffff9c, 0x0, 0x500, 0x0) unshare$auto(0x40000080) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYBLOB='&\x00', @ANYBLOB="5de1"], 0x1ac}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) r1 = openat$auto_ftrace_set_event_pid_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/tracing/set_event_pid\x00', 0x1, 0x0) write$auto_ftrace_set_event_pid_fops_trace_events(r1, &(0x7f0000000000)='\t', 0x1) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) read$auto(0xc8, 0x0, 0x200) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ovs_packet(0x0, 0xffffffffffffffff) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004040}, 0xc800) r3 = fsopen$auto(&(0x7f0000000000)='\x00', 0x400) r4 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000080), r3) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x1c, r4, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x10}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004801}, 0x4008000) r5 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/controlC2\x00', 0x0, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r5, 0xc0045516, &(0x7f0000000040)=0x5) read$auto(0x3, 0x0, 0x47) close_range$auto(0x2, 0x8, 0x0) unshare$auto(0x40000080) 4m36.544657852s ago: executing program 1 (id=5111): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$auto_netdev(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$auto_NETDEV_CMD_PAGE_POOL_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB='M\x00\x00'], 0x14}, 0x1, 0x0, 0x0, 0x24048084}, 0x4004810) (async) r2 = syz_genetlink_get_family_id$auto_smc_gen_netlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$auto_SMC_NETLINK_ENABLE_HS_LIMITATION(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4100010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0xd8, r2, 0x300, 0x70bd27, 0x25dfdbfc, {}, "a9ef18cca2ab4c6f34dca746511f70b7cee25ec8e926c8411810f650d2fa7523b35708f38262544245a3f6ac1dde09e6312a1e1c16538d2a2c554f8ba63561ac81dd2ae40dbdab4271099116cff11abd24c1374218aa50fc79fe095f3143b5a209e35974319e9dc13d8a636e4a7d0a4e716be802b8312fb8650d72aef04eeee721b5ef710d4547713d41e26039dbd9085c4211fe9ca6f56929c5dad9fdd348694765d756fba1cfede375303d80123d1f7f04cf6002eff412bb4d6d374467e07219cc"}, 0xd8}, 0x1, 0x0, 0x0, 0x48000}, 0x8000) (async) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) (async) r3 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty12\x00', 0x40000, 0x0) setuid$auto(0xe) (async) ioctl$auto(r3, 0x4b66, 0xd2b6) (async) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) (async, rerun: 32) madvise$auto(0x0, 0xffffffffffff0005, 0x1c) (async, rerun: 32) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/pci0000:00/0000:00:01.3/d3cold_allowed\x00', 0x2, 0x0) (async, rerun: 32) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) (async, rerun: 32) write$auto(0x3, 0x0, 0xffd8) madvise$auto(0x0, 0xffffffffffff0001, 0x15) (async, rerun: 64) socket(0x2, 0x3, 0x2) (async, rerun: 64) setsockopt$auto(0x3, 0x0, 0xd0, 0xfffffffffffffffc, 0x4) (async) madvise$auto(0x0, 0xffffffffffff0005, 0x19) (async) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/mm/ksm/full_scans\x00', 0x103280, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r4, &(0x7f0000003800)=""/168, 0xa8) r5 = openat2$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/arp\x00', 0x60000, 0x0) (async, rerun: 64) lseek$auto(0x3, 0x7fffffffffffffff, 0x0) (async, rerun: 64) r6 = openat$auto_ptdump_fops_(0xffffffffffffff9c, &(0x7f0000000300), 0x40, 0x0) dup2$auto(r5, r6) madvise$auto(0x3, 0x7, 0x5) (async) openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000000), 0x46182, 0x0) 4m34.476626484s ago: executing program 1 (id=5117): close_range$auto(0x0, 0xfffffffffffff000, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x40009, 0xdf, 0x19, r0, 0x28000) r1 = socketpair$auto(0xf, 0x7, 0x8, 0x0) r2 = socket(0x10, 0x3, 0xb) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r3 = openat$auto_vmuser_fops_vmci_host(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) r4 = openat$auto_vmuser_fops_vmci_host(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) syslog$auto(0x4, &(0x7f0000000040)='..\x00', 0x7) mprotect$auto(0x1ffff000, 0x8000000000000001, 0x4) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') getdents64$auto(r5, 0x0, 0x489) ioctl$auto_IOCTL_VMCI_VERSION2(r4, 0x7a7, 0x0) ioctl$auto_IOCTL_VMCI_INIT_CONTEXT(r4, 0x7a0, 0x6) ioctl$auto_IOCTL_VMCI_VERSION2(r3, 0x7a7, 0x0) ioctl$auto_IOCTL_VMCI_INIT_CONTEXT(r3, 0x7a0, 0x6) close_range$auto(0x2, 0x8, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket(0x2, 0x6, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000180)={'bond_slave_1\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_CABLE_TEST_TDR_ACT(r6, &(0x7f0000021740)={0x0, 0x0, &(0x7f0000021700)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r8], 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x4004804) bpf$auto(0x2ed, &(0x7f0000000000)=@bpf_attr_3={0x81, 0x3, 0x40, 0x0, 0x9, 0x1, 0xfc4f, 0x5c8, 0x8001, "c19aafbf643afba53102e7e319e99a7b", r8, 0x0, r0, 0xe, 0x7, 0x3, 0xfffffff8, 0x2, 0xb4f, 0xff, @attach_btf_obj_fd=r1, 0x40, 0x1, 0x7, 0x68, 0x200, r2}, 0xc2) setsockopt$auto(r2, 0x104000000000010e, 0x1, 0x0, 0x16) close_range$auto(0x0, 0xfffffffffffff000, 0x2) socket(0x2, 0x1, 0x0) socket(0x2, 0x6, 0x0) socket$nl_generic(0x10, 0x3, 0x10) userfaultfd$auto(0x1) socket(0xf, 0x3, 0x2) 4m34.058018619s ago: executing program 1 (id=5119): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r0 = openat$auto_proc_clear_refs_operations_internal(0xffffffffffffff9c, &(0x7f0000000600)='/proc/thread-self/clear_refs\x00', 0x2, 0x0) r1 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200", @ANYBLOB=']'], 0x1ac}}, 0x40000) recvmmsg$auto(r1, &(0x7f0000000140)={{0x0, 0x1, &(0x7f0000000080)={0x0, 0x400}, 0x5, 0x0, 0x200002, 0x8}, 0x803}, 0xfffffff9, 0x10, 0x0) write$auto_proc_clear_refs_operations_internal(r0, 0x0, 0xffffff4b) 4m33.063126612s ago: executing program 1 (id=5122): madvise$auto(0x77dc7d81, 0xffffffffffff0005, 0x0) mkdir$auto(&(0x7f0000000080)='./file0\x00', 0xfffe) mkdir$auto(&(0x7f00000000c0)='./file1\x00', 0x9) r0 = openat$auto_generic(0xffffffffffffff9c, &(0x7f0000000080)='/proc/kpageflags\x00', 0x2, 0x0) read$auto_snd_ctl_f_ops_control(r0, &(0x7f0000000100)=""/4096, 0x1000) rename$auto(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000040)='./file0/file0\x00') sendmsg$auto_GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) lstat$auto(0x0, &(0x7f0000000180)={0x4, 0xf, 0x1000000000009, 0x63, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x400000000010, 0x8, 0x40000402, 0x7ffffffb, 0x9, 0xffffffff80000000, 0x9, 0x7, 0x200000100103}) r1 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) clone$auto(0x20003b46, 0x2, 0x0, 0x0, 0x2) close_range$auto(0x2, 0x8, 0x0) ioperm$auto(0x7, 0x71, 0x863) iopl$auto(0x3) ioperm$auto(0x5, 0x3432, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) r2 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x1a9382, 0x0) write$auto(r2, 0x0, 0x5) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/vivid/parameters/vid_cap_nr\x00', 0x48040, 0x0) msgrcv$auto(0x0, 0x0, 0x1000, 0x8000000000000000, 0xb5) setsockopt$auto(0xffffffffffffffff, 0x29, 0x12, &(0x7f0000000080)='\x15!\xa8^J/\xddCx4!\x00\xd3\x8f\x1e\x1b\xc3 \xe2\xa8\xd6\xd9\xc0\xa2\x0f\x88\xb1e\x8a\xd8?\xfe\xda\xc4\xef\xff(i\xc6@\x91[\vBj\x0eQ\xce\x16\'C\x8cYA\x92u\xd5\xb8\\\x82,\xe2=y\x9bR\xbcn\xa0c\x16~\x86\"t\xde\x14\xe4\xa5\xfe\xb5', 0x8) setresuid$auto(0xffffffffffffffff, 0x8, 0x8000) tkill$auto(0x80000000000001, 0x7) ioctl$sock_SIOCGIFINDEX(r1, 0x89fc, &(0x7f0000000040)={'bridge0\x00'}) r3 = open$auto(&(0x7f0000000000)='./file0\x00', 0x7f, 0x8) sendmmsg$auto(r3, &(0x7f0000000280)={{&(0x7f0000000040)="c4ad45fa766b345312c5e30780e7ee8cc64c406168b097b77249ee65ccc071fc2e8a636175be456f0d9741c11fd7bc0fac8382ed883044abc961283395a0df", 0x4, &(0x7f0000000140)={&(0x7f0000000080)="d67740822cdded4a336836049c01063587031709211fc3a108144823ad47b714fcba11254c49da98d01610caf544e7da9c6a604d7a2c2c4315460d2ec417e7330f0e17a4a08727d0c780bf70e7507c679f7ffcaae48277bbc1a61dd5f77b4b5d819c07a1f4bf56ee48858efff68567a545ea623f960b0034fc7d590fca5457c8f7465d3e01ecb23bd237360b1c32261adc4ff84978804610d4f6e0c14b9532bc16c06d7170a407279e", 0x2}, 0x9, &(0x7f0000000180)="4bd0f4a8a964e3129f9058650406c1653fd59a50faeefab14f308afe0669bba5f7b8828a0f695aee0658e326a988a30f9031aff62468bb15a10c85298583a0671ef669cd322ea75d3463e3d06154af3253958de85e9b090852d8f54b9904d384477e264eefb500a5a6aede82e0778ffbebc09f4c6c43edcf0f7455b07321e262bfbc8c83c7f073b29c1d3d945b883e8448f2924bc54e6100158846ed629e6778b02d25eb6ee3ff7b513335ef4a2670fb1acc5a905a5e9bb3892596e890f6f41e0c3bf0126561a9e262bfa6ced9302abc79ba12dd6a6aec44532e4224c558cd62a81b063ee818", 0xfffffffffffff512, 0x1}, 0x1ff}, 0x5, 0xe) 4m32.463895987s ago: executing program 1 (id=5129): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0xf000, 0x8, 0x1000000003, 0x9b72, 0x2, 0x8000) set_mempolicy$auto(0x2, &(0x7f0000000080)=0x7e, 0x4) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x4020009, 0xdb, 0xeb1, 0x401, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) sendmmsg$auto(0xffffffffffffffff, 0x0, 0x1, 0x5) socket$nl_generic(0x10, 0x3, 0x10) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0x9, 0x3, 0x7, 0x0, 0x5, 0xfffffff9, 0x2000000000210006, 0x0, 0x7, 0x5, 0x2, 0x7, 0xaf, 0x9, 0x2, 0x3, 0x105, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, [0x1b16, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x100000, 0x0, 0x77, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc06f, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x107, 0x6, 0x0, 0xfffffffffffffffe, 0x4, 0x0, 0x80000000000]}, 0x1fe, 0x81) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x3, 0x100) socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, 0x0, 0x24004000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1200"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc7}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) madvise$auto(0x0, 0xffffffffffff0005, 0x19) move_pages$auto(0x0, 0xd0, 0x0, &(0x7f0000001140), 0x0, 0x2) clone$auto(0x4, 0x400, 0xfffffffffffffffe, 0xfffffffffffffffc, 0xd1) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) openat$auto_tap_fops_tap(0xffffffffffffff9c, &(0x7f00000000c0), 0x22000, 0x0) 4m31.993495638s ago: executing program 33 (id=5129): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0xf000, 0x8, 0x1000000003, 0x9b72, 0x2, 0x8000) set_mempolicy$auto(0x2, &(0x7f0000000080)=0x7e, 0x4) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x4020009, 0xdb, 0xeb1, 0x401, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) sendmmsg$auto(0xffffffffffffffff, 0x0, 0x1, 0x5) socket$nl_generic(0x10, 0x3, 0x10) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0x9, 0x3, 0x7, 0x0, 0x5, 0xfffffff9, 0x2000000000210006, 0x0, 0x7, 0x5, 0x2, 0x7, 0xaf, 0x9, 0x2, 0x3, 0x105, 0x7, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, [0x1b16, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x100000, 0x0, 0x77, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc06f, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x107, 0x6, 0x0, 0xfffffffffffffffe, 0x4, 0x0, 0x80000000000]}, 0x1fe, 0x81) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x3, 0x100) socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, 0x0, 0x24004000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1200"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc7}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) madvise$auto(0x0, 0xffffffffffff0005, 0x19) move_pages$auto(0x0, 0xd0, 0x0, &(0x7f0000001140), 0x0, 0x2) clone$auto(0x4, 0x400, 0xfffffffffffffffe, 0xfffffffffffffffc, 0xd1) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) openat$auto_tap_fops_tap(0xffffffffffffff9c, &(0x7f00000000c0), 0x22000, 0x0) 5.983542576s ago: executing program 5 (id=6222): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) getrandom$auto(0x0, 0x6000000, 0x3) madvise$auto(0x0, 0xf663, 0x15) 5.362645291s ago: executing program 3 (id=6225): openat$auto_proc_single_file_operations_base(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/cpuset\x00', 0x181100, 0x0) lseek$auto(0x3, 0x20000, 0x1) (fail_nth: 1) 5.272540347s ago: executing program 4 (id=6226): openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x40000, 0x0) mprotect$auto(0x1ffff000, 0x8000000000000001, 0xd) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/mm/transparent_hugepage/enabled\x00', 0x500, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r0, &(0x7f0000000080)=""/23, 0x17) 4.805902627s ago: executing program 4 (id=6228): r0 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp1\x00', 0x20b42, 0x0) write$auto_snd_pcm_oss_f_reg_pcm_oss(r0, &(0x7f00000003c0)="c6c3941114a3ef6b7ae6238d1970b013f1e3b36c3dfdce9c85b5d63716f7f65f0335e2594a68af16651855a1ec20e31571aefe7e61806dceb9bba6e382977fb98715c39656ba977eebd6e6ca00f46d07c9ae16d7a75fe290cdb6754b3750c02f62e9680c2b68eb568c0840a29cce6f3b94484d4b39617dd006527bb804423f4764f3b309ff327e00"/146, 0x92) ioctl$auto_SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x7) ioctl$auto_SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000040)=0xd) r1 = socket(0xa, 0x6, 0x0) listen$auto(r1, 0x26da) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sendmsg$auto_GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8010}, 0x4000804) lstat$auto(0x0, &(0x7f0000000180)={0x11, 0x2, 0x0, 0x1000, 0x0, 0x0, 0x0, 0xfa97, 0xfffffffffffffffb, 0x7fffffffffffffff, 0x4, 0x100000007ffffffe, 0x7fffffffffff7ffb, 0x5f3, 0x7, 0x400000000000004, 0x6}) ioperm$auto(0x800, 0x5, 0xd) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_ovs_ct_limit(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$auto_OVS_CT_LIMIT_CMD_GET(r2, &(0x7f0000001980)={0x0, 0x0, &(0x7f0000001940)={&(0x7f0000006dc0)=ANY=[@ANYBLOB='8:\x00\x00', @ANYRES16=r3, @ANYBLOB="01002abd7000fedbdf2503000000040001801f3a01"], 0x3a38}, 0x1, 0x0, 0x0, 0x4}, 0x40082) pidfd_send_signal$auto(r1, 0x0, &(0x7f0000000340)={@_si_pad}, 0x7) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x89fc, &(0x7f0000000040)={'bridge0\x00'}) r5 = socket(0x11, 0x2, 0x89) bpf$auto(0x0, &(0x7f0000000000)=@link_update={r5, @new_prog_fd=0x4, 0x4}, 0xa3) io_cancel$auto(0x7, &(0x7f0000000100)={0x0, 0x3, 0x8, 0x9c9b, 0x9, r6, 0x1, 0x2, 0x6f, 0x0, 0x6, r5}, &(0x7f0000000140)={0x7, 0x3, 0xffffffffffffffff, 0x8}) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0xa, 0x3, 0x100) mmap$auto(0x1, 0x400008, 0x100000000, 0x9b72, 0x4, 0x8000) read$auto_percpu_stats_fops_(r7, &(0x7f00000002c0)=""/77, 0x4d) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4) open(&(0x7f0000000000)='./file0\x00', 0x261c2, 0x84) close_range$auto(0x2, 0x8000, 0x0) socket(0xa, 0x2, 0x88) ioctl$auto(0x1, 0x5761, 0x1f) 4.5071695s ago: executing program 3 (id=6229): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) getrandom$auto(0x0, 0x6000000, 0x3) madvise$auto(0x0, 0xf663, 0x15) (fail_nth: 2) 4.266281907s ago: executing program 5 (id=6230): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_DEBUG_GET(r0, 0x0, 0x0) 4.100238529s ago: executing program 4 (id=6231): mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) r0 = socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) mmap$auto(0x0, 0x1e09, 0x8, 0x19, r0, 0x8001) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) r1 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x181902, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mbind$auto(0x9, 0x84, 0x4, &(0x7f0000000000), 0x80000000, 0x7f) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb2, 0x402, 0x300000000000) mmap$auto(0xc, 0x0, 0x0, 0x1a, 0x9, 0x3) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) socketpair$auto(0x1, 0x5, 0x8000000000000000, 0x0) recvmmsg$auto(0x3, 0x0, 0x687bcbd, 0x8, 0x0) shutdown$auto(0x200000003, 0x2) sysfs$auto(0x2, 0x1b, 0x0) mmap$auto(0x401, 0x6, 0x8, 0x15, 0xd, 0x6) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) r2 = socket(0x18, 0x5, 0x1) sendmsg$auto_HSR_C_GET_NODE_STATUS(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) ioperm$auto(0x7, 0x6, 0x2) clone$auto(0x21, 0x9, 0xfffffffffffffffe, 0xfffffffffffffffd, 0x6) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) recvmsg$auto(0x4, 0x0, 0x33c) clone$auto(0xd2d4, 0x101, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd) mbind$auto(0x0, 0x100000004, 0x100000000, 0x0, 0x6, 0x2) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) ioctl$auto(r1, 0x80044dfe, 0x9) socket(0x10, 0x2, 0x0) socket(0x10, 0x2, 0xc) 3.885782787s ago: executing program 5 (id=6232): r0 = openat$auto_snd_timer_f_ops_timer(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) mmap$auto(0x2, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) io_uring_setup$auto(0x6, 0x0) readv$auto(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x1}, 0x8) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x1, 0x73) mmap$auto(0x0, 0xa, 0xdb, 0x9b72, r0, 0x8002) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x0) r1 = open(0x0, 0x22240, 0x155) r2 = socket(0x2, 0x80802, 0x0) setsockopt$auto(r2, 0x11, 0x67, 0x0, 0x8) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000040)='/dev/radio8\x00', 0x1600, 0x0) close_range$auto(0x2, 0x8000, 0x0) socket(0x11, 0x80003, 0x300) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptyua\x00', 0x20804, 0x0) openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptyt9\x00', 0x2a2800, 0x0) connect$auto(0x3, &(0x7f0000000100), 0x55) socket(0x10, 0x2, 0x0) socket(0x10, 0x2, 0x4) socket(0x2e99706f8d5ab6cf, 0x3, 0x0) openat$auto_binder_ctl_fops_binderfs(0xffffffffffffff9c, 0x0, 0x800, 0x0) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) read$auto_dfs_dom_ops_debugfs(r1, &(0x7f0000000300)=""/254, 0xfe) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0x1ff}, 0x1, 0x0, 0x1a12, 0xff}, 0x7}, 0x3, 0x0) open(0x0, 0x0, 0xe1d2b27bdc14aa1c) shmat$auto(0x0, 0x0, 0xfffffffa) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptyw4\x00', 0x20080, 0x0) 3.251189694s ago: executing program 3 (id=6233): mmap$auto(0x0, 0x400005, 0xdf, 0x9b72, 0x2, 0x8000) io_uring_setup$auto(0x1, 0x0) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x80002, 0x73) socket(0xa, 0x1, 0x84) statx$auto(0xffffff9c, 0x0, 0x1000, 0x1, 0x0) setsockopt$auto(0x3, 0x10000000084, 0xd, 0x0, 0x4) socketpair$auto(0x1e, 0x1, 0x2, 0x0) r0 = socket(0x11, 0x3, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8953, 0x0) 3.190018414s ago: executing program 5 (id=6234): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = socket(0x2, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) sendmmsg$auto(r0, &(0x7f0000000140)={{&(0x7f00000011c0)="9033ba8a366a1f42fd69c705bbe13b15a407fb1865a90e0cf6c7f9b72ab1c092a5a0c06bcc44cc9dab6dafce82b8a4e8b81e3c63495c2a5578d269b88f274747bf9f404600bee4e85d071af51a3e8b1691b0c0a0", 0x1673, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800007}, 0x0, 0x20000000) openat$auto_proc_pid_set_comm_operations_base(0xffffffffffffff9c, 0x0, 0x2, 0x0) sysfs$auto(0x2, 0x1b, 0x0) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000010c0)='/sys/devices/platform/reg-dummy/regulator/regulator.0/suspend_standby_state\x00', 0x700, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r1, &(0x7f00000000c0)=""/4096, 0x1000) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) mmap$auto(0x0, 0x400005, 0xdf, 0x9b72, 0x2, 0x8000) openat$auto_ppp_device_fops_ppp_generic(0xffffffffffffff9c, &(0x7f0000000080), 0x80080, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/controlC0\x00', 0x220a00, 0x0) memfd_secret$auto(0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) openat$auto_proc_pid_smaps_operations_internal(0xffffffffffffff9c, &(0x7f0000000b00)='/proc/self/smaps\x00', 0x42000, 0x0) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) socketpair$auto(0x1e, 0x1, 0x8000000, 0x0) r3 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/pts/ptmx\x00', 0x0, 0x0) ioctl$auto_TIOCSETD2(r3, 0x5423, 0x0) ioctl$auto_TCFLSH2(r3, 0x541b, 0x1000000000000) clone$auto(0x21, 0x9, 0xfffffffffffffffe, 0xfffffffffffffffd, 0x6) socket$nl_generic(0x10, 0x3, 0x10) io_submit$auto(0x8, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_OVS_DP_CMD_DEL(r2, 0x0, 0x200480c0) recvfrom$auto(0x3, 0x0, 0x800000000e, 0x100, 0x0, 0xfffffffffffffffd) fcntl$auto(0xffffffffffffffff, 0x401, 0x5) 2.719760934s ago: executing program 4 (id=6238): unshare$auto(0x200) lseek$auto(0x3, 0x7fffffffffffffff, 0x1) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') setns(r0, 0x0) umount2$auto(&(0x7f0000000200)='.\x00', 0x0) 2.568047268s ago: executing program 4 (id=6239): socket$nl_generic(0x10, 0x3, 0x10) socket(0x840000000002, 0x3, 0xff) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) socket(0x23, 0x80000, 0x80040001) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00022abd7000fbdbdf2502000900000003000000000008000800"], 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0xc0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="180027"], 0x1ac}}, 0x40000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[], 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) futex$auto(0x0, 0x6, 0x47, 0x0, 0x0, 0x0) setsockopt$auto(0x3, 0x1, 0x41, 0x0, 0x88) connect$auto(0x3, &(0x7f00000000c0), 0x55) lsm_list_modules$auto(0x0, 0x0, 0x0) sendmmsg$auto(0x3, &(0x7f0000000000)={{0x0, 0x2, 0x0, 0x106, 0x0, 0x1, 0x3}, 0xed7138c}, 0x7, 0x3f00) recvmmsg$auto(0xffffffffffffffff, 0x0, 0x1, 0x14a7b5ab, 0x0) openat$auto_buffer_subbuf_size_fops_trace(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/tracing/buffer_subbuf_size_kb\x00', 0x0, 0x0) r0 = openat$auto_proc_page_owner_operations_page_owner(0xffffffffffffff9c, &(0x7f0000000040), 0x2482, 0x0) read$auto_proc_page_owner_operations_page_owner(r0, &(0x7f0000002080)=""/4096, 0x1000) syz_genetlink_get_family_id$auto_batadv(&(0x7f0000000400), 0xffffffffffffffff) unshare$auto(0x40000080) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="2c0000cd36b894df48a9231a1e5258b4f36f6b9cc3d18aecb146764f9ecd83c215abab3a0000000000", @ANYRES16=r2, @ANYBLOB="010029bd7000fddbdf250700000018000180140002006970766c616e30000000000000000000"], 0x3a}, 0x1, 0x0, 0x0, 0x4801}, 0x24000086) gettid() mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) sendmsg$auto_NETDEV_CMD_DEV_GET(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x23, 0x9, 0x3, 0x14, 0x940, 0x1ffe0, 0x8003, 0x6, 0x4000000000006, 0x7, 0x5, 0x2, 0x9, 0x6, 0x9, 0x2, 0x3, 0x2, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x1fe, 0x7) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="11002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) socket(0x10, 0x2, 0x0) 1.987488025s ago: executing program 4 (id=6240): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) 1.943163153s ago: executing program 2 (id=6242): mmap$auto(0x0, 0x8, 0x2000000000000007, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x40, 0x4, 0x14) r0 = openat$auto_objects_fops_(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) keyctl$auto(0x10, 0x0, 0x9, 0x5, 0x80000003) read$auto_objects_fops_(r0, &(0x7f00000000c0)=""/4096, 0x1000) 1.60526133s ago: executing program 2 (id=6243): socket(0x2, 0x80002, 0x73) socket(0xa, 0x2, 0x5) r0 = socket(0x11, 0x3, 0x9) capset$auto(0x0, &(0x7f0000000000)={0x1, 0x6, 0x48}) sendmmsg$auto(r0, &(0x7f00000006c0)={{&(0x7f0000000000), 0x5ac, &(0x7f0000000100)={&(0x7f0000000200)="4c0300", 0x49}, 0x5, &(0x7f0000000700), 0x5, 0x1}, 0x5}, 0x2, 0x100) 1.604196964s ago: executing program 3 (id=6244): r0 = openat$auto_snd_timer_f_ops_timer(0xffffffffffffff9c, &(0x7f00000000c0), 0x40, 0x0) mmap$auto(0x2, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) io_uring_setup$auto(0x6, 0x0) readv$auto(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x1}, 0x8) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x1, 0x73) mmap$auto(0x0, 0xa, 0xdb, 0x9b72, r0, 0x8002) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x0) r1 = open(0x0, 0x22240, 0x155) r2 = socket(0x2, 0x80802, 0x0) setsockopt$auto(r2, 0x11, 0x67, 0x0, 0x8) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000040)='/dev/radio8\x00', 0x1600, 0x0) close_range$auto(0x2, 0x8000, 0x0) socket(0x11, 0x80003, 0x300) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptyua\x00', 0x20804, 0x0) openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptyt9\x00', 0x2a2800, 0x0) connect$auto(0x3, &(0x7f0000000100), 0x55) socket(0x10, 0x2, 0x0) socket(0x10, 0x2, 0x4) socket(0x2e99706f8d5ab6cf, 0x3, 0x0) openat$auto_binder_ctl_fops_binderfs(0xffffffffffffff9c, 0x0, 0x800, 0x0) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) read$auto_dfs_dom_ops_debugfs(r1, &(0x7f0000000300)=""/254, 0xfe) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0x1ff}, 0x1, 0x0, 0x1a12, 0xff}, 0x7}, 0x3, 0x0) open(0x0, 0x0, 0xe1d2b27bdc14aa1c) shmat$auto(0x0, 0x0, 0xfffffffa) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptyw4\x00', 0x20080, 0x0) 1.585523346s ago: executing program 5 (id=6245): socket(0x2, 0x80002, 0x73) socket(0xa, 0x2, 0x5) r0 = socket(0x11, 0x3, 0x9) capset$auto(0x0, &(0x7f0000000000)={0x1, 0x6, 0x48}) sendmmsg$auto(r0, &(0x7f00000006c0)={{&(0x7f0000000000), 0x5ac, &(0x7f0000000100)={&(0x7f0000000200)="4c0300", 0x49}, 0x5, &(0x7f0000000700), 0x5, 0x1}, 0x5}, 0x2, 0x100) (fail_nth: 2) 1.126961188s ago: executing program 2 (id=6246): openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x40000, 0x0) mprotect$auto(0x1ffff000, 0x8000000000000001, 0xd) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/mm/transparent_hugepage/enabled\x00', 0x500, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r0, &(0x7f0000000080)=""/23, 0x17) 815.727393ms ago: executing program 2 (id=6247): r0 = openat$auto_mon_fops_binary_mon_bin(0xffffffffffffff9c, &(0x7f0000000040)='/dev/usbmon26\x00', 0x0, 0x0) mmap$auto(0xfffffffffffffffe, 0x10001, 0x100000000a, 0x11, r0, 0x6) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bus/usb/018/001\x00', 0x1, 0x0) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) 776.891541ms ago: executing program 3 (id=6248): r0 = openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x20) chmod$auto(&(0x7f00000000c0)='./file0\x00', 0xf4ba) execve$auto(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$auto_VHOST_GET_BACKEND_FEATURES(0xffffffffffffffff, 0x8008af26, &(0x7f0000000080)=0x8) execve$auto(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) ioctl$auto_VHOST_SET_OWNER(r0, 0xaf01, 0x5) 571.13488ms ago: executing program 2 (id=6249): open(&(0x7f0000000800)='./file0\x00', 0x22240, 0x154) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) r0 = open(&(0x7f0000000800)='./file0\x00', 0x2a240, 0x0) timer_create$auto(0x8, &(0x7f0000000080)={@sival_ptr=0x0, @inferred=r0, 0x0, @_tid}, 0x0) (fail_nth: 1) 463.640737ms ago: executing program 5 (id=6250): r0 = socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) socket(0x15, 0x5, 0x0) r1 = socket(0x10, 0x2, 0xc) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x0) open(0x0, 0x22240, 0x155) socket(0x2, 0x1, 0x0) r2 = getsockopt$auto(0x3, 0x6, 0x2a, 0x0, 0x0) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000013c0)=ANY=[@ANYBLOB="18000000", @ANYRES8=r1, @ANYRES8=r0, @ANYRES32], 0x18}}, 0x80) mkdir$auto(&(0x7f0000000000)='./file0\x00', 0x5) mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x8000) move_pages$auto(0x1, 0xf54, 0x0, 0x0, 0x0, 0x8000000000000000) mmap$auto(0x0, 0x20009, 0xe3, 0x100000eb1, 0x40000000000a1, 0x8000) socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x0) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) mmap$auto(0x0, 0x9, 0x400000072, 0x8b72, 0x1000000002, 0x8000) madvise$auto(0x0, 0xffffffffffff0001, 0x15) clone$auto(0x21002, 0x9, 0xfffffffffffffffe, 0xfffffffffffffffd, 0x9) mprotect$auto(0x1ffff000, 0x8000000000000001, 0xd) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20040801}, 0x10048884) ioctl$auto_RTC_EPOCH_SET(r2, 0x4008700e, &(0x7f0000000040)) 49.73304ms ago: executing program 2 (id=6251): r0 = socket$nl_generic(0x10, 0x3, 0x10) fstat$auto(0xffffffffffffffff, &(0x7f0000000100)={0x8, 0x400, 0x9, 0x6, 0xee00, 0xee00, 0x0, 0x5, 0xfffffffffffffffe, 0x1, 0x100000001, 0x1, 0x2, 0x8, 0x4, 0xffffffffffffffff, 0x9}) r3 = getegid() setregid$auto(r3, 0x0) chown$auto(&(0x7f00000000c0)='./file0\x00', r1, r3) setresgid$auto(r2, r2, r3) mmap$auto(0x0, 0x400005, 0xfffffffffffffffe, 0x9b72, 0xc76, 0x8000) ioctl$auto_TIOCSTI2(0xffffffffffffffff, 0x5412, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x261c2, 0x84) bpf$auto(0x2, &(0x7f00000001c0)=@raw_tracepoint={0x5, r4, 0x0, 0x3}, 0xc) ioctl$auto_TIOCSTI2(r4, 0x5412, 0x0) r5 = openat$auto_page_owner_stack_operations_page_owner(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) seccomp$auto(0x1, 0x5, &(0x7f0000000300)="b8caf3e4fb7cd6d6ea8001a25d617245cb63e4acfb1a21a5b43a67d658f32519302905626ed327e3ad974616bc9fc9f2a11b3e2d5861bc2825d7789d4b429035b81b9c5929cfdd0bbef6aeeca31211be802dd4899446") openat$auto_page_owner_stack_operations_page_owner(0xffffffffffffff9c, &(0x7f00000013c0), 0x200000, 0x0) r6 = openat$auto_page_owner_stack_operations_page_owner(0xffffffffffffff9c, &(0x7f0000001400), 0xe801, 0x0) read$auto_page_owner_stack_operations_page_owner(r6, &(0x7f0000001440)=""/229, 0xe5) read$auto_page_owner_stack_operations_page_owner(r5, &(0x7f00000003c0)=""/4096, 0x1000) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/net/ip_mr_cache\x00', 0x101c00, 0x0) read$auto_page_owner_stack_operations_page_owner(r4, &(0x7f00000000c0)=""/250, 0xfa) socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_HWSIM_CMD_NEW_RADIO(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x1c, r7, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@HWSIM_ATTR_REG_HINT_ALPHA2={0x5, 0xb, '.'}]}, 0x1c}}, 0x4044820) 0s ago: executing program 3 (id=6252): open(&(0x7f0000000800)='./file0\x00', 0x22240, 0x154) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) r0 = open(&(0x7f0000000800)='./file0\x00', 0x2a240, 0x0) timer_create$auto(0x8, &(0x7f0000000080)={@sival_ptr=0x0, @inferred=r0, 0x0, @_tid}, 0x0) kernel console output (not intermixed with test programs): ll Trace: [ 1282.247347][T25173] [ 1282.250285][T25173] dump_stack_lvl+0x16c/0x1f0 [ 1282.254993][T25173] should_fail_ex+0x497/0x5b0 [ 1282.259708][T25173] _copy_from_user+0x2e/0xd0 [ 1282.264318][T25173] copy_msghdr_from_user+0x99/0x160 [ 1282.269536][T25173] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1282.275374][T25173] ___sys_sendmsg+0xff/0x1e0 [ 1282.279984][T25173] ? __pfx____sys_sendmsg+0x10/0x10 [ 1282.285213][T25173] ? __pfx_lock_release+0x10/0x10 [ 1282.290245][T25173] ? trace_lock_acquire+0x14e/0x1f0 [ 1282.295467][T25173] ? __fget_files+0x206/0x3a0 [ 1282.300162][T25173] __sys_sendmsg+0x16e/0x220 [ 1282.304772][T25173] ? __pfx___sys_sendmsg+0x10/0x10 [ 1282.309919][T25173] do_syscall_64+0xcd/0x250 [ 1282.314440][T25173] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1282.320347][T25173] RIP: 0033:0x7fcd0b985d29 [ 1282.324770][T25173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1282.344396][T25173] RSP: 002b:00007fcd0c80e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1282.352827][T25173] RAX: ffffffffffffffda RBX: 00007fcd0bb75fa0 RCX: 00007fcd0b985d29 [ 1282.360815][T25173] RDX: 0000000000040000 RSI: 0000000020000240 RDI: 0000000000000005 [ 1282.368800][T25173] RBP: 00007fcd0c80e090 R08: 0000000000000000 R09: 0000000000000000 [ 1282.376779][T25173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1282.384766][T25173] R13: 0000000000000000 R14: 00007fcd0bb75fa0 R15: 00007ffda8950488 [ 1282.392772][T25173] [ 1284.386211][T25179] RDS: rds_bind could not find a transport for ::ffff:172.30.65.3, load rds_tcp or rds_rdma? [ 1285.257456][T25188] netlink: 338 bytes leftover after parsing attributes in process `syz.2.5758'. [ 1286.293363][T25195] FAULT_INJECTION: forcing a failure. [ 1286.293363][T25195] name failslab, interval 1, probability 0, space 0, times 0 [ 1286.333507][T25195] CPU: 1 UID: 0 PID: 25195 Comm: syz.2.5760 Not tainted 6.13.0-rc5-syzkaller #0 [ 1286.342593][T25195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1286.352681][T25195] Call Trace: [ 1286.355986][T25195] [ 1286.358966][T25195] dump_stack_lvl+0x16c/0x1f0 [ 1286.363686][T25195] should_fail_ex+0x497/0x5b0 [ 1286.368403][T25195] ? fs_reclaim_acquire+0xae/0x150 [ 1286.373552][T25195] should_failslab+0xc2/0x120 [ 1286.378274][T25195] __kmalloc_noprof+0xce/0x4f0 [ 1286.383082][T25195] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1286.388741][T25195] ? tomoyo_realpath_from_path+0xbf/0x710 [ 1286.394502][T25195] tomoyo_realpath_from_path+0xbf/0x710 [ 1286.400088][T25195] ? tomoyo_path_number_perm+0x235/0x5b0 [ 1286.405770][T25195] tomoyo_path_number_perm+0x248/0x5b0 [ 1286.411273][T25195] ? tomoyo_path_number_perm+0x235/0x5b0 [ 1286.416961][T25195] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1286.423001][T25195] ? __pfx_lock_release+0x10/0x10 [ 1286.428039][T25195] ? trace_lock_acquire+0x14e/0x1f0 [ 1286.433262][T25195] ? lock_acquire+0x2f/0xb0 [ 1286.437780][T25195] ? __fget_files+0x40/0x3a0 [ 1286.442387][T25195] ? __fget_files+0x206/0x3a0 [ 1286.447085][T25195] security_file_ioctl+0x9b/0x240 [ 1286.452126][T25195] __x64_sys_ioctl+0xb7/0x200 [ 1286.456816][T25195] do_syscall_64+0xcd/0x250 [ 1286.461347][T25195] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1286.467256][T25195] RIP: 0033:0x7fcd0b985d29 [ 1286.471680][T25195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1286.491301][T25195] RSP: 002b:00007fcd0c80e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1286.499735][T25195] RAX: ffffffffffffffda RBX: 00007fcd0bb75fa0 RCX: 00007fcd0b985d29 [ 1286.507714][T25195] RDX: 0000000020000100 RSI: 00000000c0606610 RDI: 0000000000000003 [ 1286.515694][T25195] RBP: 00007fcd0c80e090 R08: 0000000000000000 R09: 0000000000000000 [ 1286.523679][T25195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1286.531663][T25195] R13: 0000000000000000 R14: 00007fcd0bb75fa0 R15: 00007ffda8950488 [ 1286.539663][T25195] [ 1286.588617][T25195] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1288.000335][T25221] erspan0: entered allmulticast mode [ 1288.068828][T25221] FAULT_INJECTION: forcing a failure. [ 1288.068828][T25221] name failslab, interval 1, probability 0, space 0, times 0 [ 1288.263794][T25221] CPU: 0 UID: 0 PID: 25221 Comm: syz.3.5764 Not tainted 6.13.0-rc5-syzkaller #0 [ 1288.272888][T25221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1288.282977][T25221] Call Trace: [ 1288.286285][T25221] [ 1288.289240][T25221] dump_stack_lvl+0x16c/0x1f0 [ 1288.293978][T25221] should_fail_ex+0x497/0x5b0 [ 1288.298689][T25221] ? fs_reclaim_acquire+0xae/0x150 [ 1288.303832][T25221] should_failslab+0xc2/0x120 [ 1288.308547][T25221] kmem_cache_alloc_node_noprof+0x72/0x3b0 [ 1288.314396][T25221] ? find_held_lock+0x2d/0x110 [ 1288.319282][T25221] ? __alloc_skb+0x2b3/0x380 [ 1288.323910][T25221] __alloc_skb+0x2b3/0x380 [ 1288.328347][T25221] ? __pfx___alloc_skb+0x10/0x10 [ 1288.333301][T25221] ? mark_held_locks+0x90/0xe0 [ 1288.338090][T25221] ? __local_bh_enable_ip+0xa4/0x120 [ 1288.343394][T25221] inet6_netconf_notify_devconf+0x87/0x180 [ 1288.349219][T25221] ip6_mroute_setsockopt+0xd75/0x25b0 [ 1288.354617][T25221] ? __pfx_ip6_mroute_setsockopt+0x10/0x10 [ 1288.360442][T25221] ? hlock_class+0x4e/0x130 [ 1288.364967][T25221] ? mark_lock+0xb5/0xc60 [ 1288.369326][T25221] ? __pfx_mark_lock+0x10/0x10 [ 1288.374115][T25221] ? __pfx_mark_lock+0x10/0x10 [ 1288.378901][T25221] ? find_held_lock+0x2d/0x110 [ 1288.383689][T25221] ? is_bpf_text_address+0x8a/0x1a0 [ 1288.388909][T25221] ? __pfx_lock_release+0x10/0x10 [ 1288.393942][T25221] ? trace_lock_acquire+0x14e/0x1f0 [ 1288.399177][T25221] ? __pfx_mark_lock+0x10/0x10 [ 1288.403965][T25221] ? __lock_acquire+0x15a9/0x3c40 [ 1288.409011][T25221] ? do_ipv6_setsockopt+0x8f7/0x4660 [ 1288.414315][T25221] do_ipv6_setsockopt+0x8f7/0x4660 [ 1288.419451][T25221] ? __pfx_do_ipv6_setsockopt+0x10/0x10 [ 1288.425011][T25221] ? __lock_acquire+0xcc5/0x3c40 [ 1288.429964][T25221] ? hlock_class+0x4e/0x130 [ 1288.434483][T25221] ? mark_lock+0xb5/0xc60 [ 1288.438830][T25221] ? aa_label_sk_perm+0x19d/0x5a0 [ 1288.443881][T25221] ? __pfx_mark_lock+0x10/0x10 [ 1288.448665][T25221] ? __pfx_aa_label_sk_perm+0x10/0x10 [ 1288.454062][T25221] ? find_held_lock+0x2d/0x110 [ 1288.458867][T25221] ? ipv6_setsockopt+0xcb/0x170 [ 1288.463735][T25221] ipv6_setsockopt+0xcb/0x170 [ 1288.468438][T25221] rawv6_setsockopt+0xdc/0x700 [ 1288.473217][T25221] ? __pfx_rawv6_setsockopt+0x10/0x10 [ 1288.478608][T25221] ? sock_common_setsockopt+0x2e/0xf0 [ 1288.483997][T25221] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 1288.489905][T25221] do_sock_setsockopt+0x222/0x480 [ 1288.494943][T25221] ? __pfx_do_sock_setsockopt+0x10/0x10 [ 1288.500503][T25221] ? lock_acquire+0x2f/0xb0 [ 1288.505032][T25221] __sys_setsockopt+0x1a0/0x230 [ 1288.509908][T25221] __x64_sys_setsockopt+0xbd/0x160 [ 1288.515038][T25221] ? do_syscall_64+0x91/0x250 [ 1288.519732][T25221] ? lockdep_hardirqs_on+0x7c/0x110 [ 1288.524955][T25221] do_syscall_64+0xcd/0x250 [ 1288.529480][T25221] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1288.535396][T25221] RIP: 0033:0x7f9915785d29 [ 1288.539821][T25221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1288.559443][T25221] RSP: 002b:00007f991654b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1288.567884][T25221] RAX: ffffffffffffffda RBX: 00007f9915976080 RCX: 00007f9915785d29 [ 1288.575874][T25221] RDX: 00000000000000ca RSI: 0000000000000029 RDI: 0400000000000003 [ 1288.583858][T25221] RBP: 00007f991654b090 R08: 0000000000000567 R09: 0000000000000000 [ 1288.591838][T25221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1288.599825][T25221] R13: 0000000000000000 R14: 00007f9915976080 R15: 00007ffe86739ce8 [ 1288.607824][T25221] [ 1289.370721][T25244] netlink: 338 bytes leftover after parsing attributes in process `syz.5.5770'. [ 1291.281140][T25283] netlink: 338 bytes leftover after parsing attributes in process `syz.4.5782'. [ 1291.374122][T25285] FAULT_INJECTION: forcing a failure. [ 1291.374122][T25285] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1291.443963][T25285] CPU: 0 UID: 0 PID: 25285 Comm: syz.2.5783 Not tainted 6.13.0-rc5-syzkaller #0 [ 1291.453059][T25285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1291.463149][T25285] Call Trace: [ 1291.466453][T25285] [ 1291.469412][T25285] dump_stack_lvl+0x16c/0x1f0 [ 1291.474130][T25285] should_fail_ex+0x497/0x5b0 [ 1291.478845][T25285] _copy_from_user+0x2e/0xd0 [ 1291.483474][T25285] copy_msghdr_from_user+0x99/0x160 [ 1291.488720][T25285] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1291.494583][T25285] ___sys_sendmsg+0xff/0x1e0 [ 1291.499233][T25285] ? __pfx____sys_sendmsg+0x10/0x10 [ 1291.504491][T25285] ? __pfx_lock_release+0x10/0x10 [ 1291.509544][T25285] ? trace_lock_acquire+0x14e/0x1f0 [ 1291.514790][T25285] ? __fget_files+0x206/0x3a0 [ 1291.519510][T25285] __sys_sendmsg+0x16e/0x220 [ 1291.524137][T25285] ? __pfx___sys_sendmsg+0x10/0x10 [ 1291.529301][T25285] do_syscall_64+0xcd/0x250 [ 1291.533838][T25285] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1291.539763][T25285] RIP: 0033:0x7fcd0b985d29 [ 1291.544201][T25285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1291.563842][T25285] RSP: 002b:00007fcd0c80e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1291.572291][T25285] RAX: ffffffffffffffda RBX: 00007fcd0bb75fa0 RCX: 00007fcd0b985d29 [ 1291.580290][T25285] RDX: 0000000000040082 RSI: 0000000020001980 RDI: 0000000000000003 [ 1291.588291][T25285] RBP: 00007fcd0c80e090 R08: 0000000000000000 R09: 0000000000000000 [ 1291.596286][T25285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1291.604279][T25285] R13: 0000000000000000 R14: 00007fcd0bb75fa0 R15: 00007ffda8950488 [ 1291.612290][T25285] [ 1291.964720][T25297] FAULT_INJECTION: forcing a failure. [ 1291.964720][T25297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1291.983421][T25297] CPU: 1 UID: 0 PID: 25297 Comm: syz.2.5787 Not tainted 6.13.0-rc5-syzkaller #0 [ 1291.992502][T25297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1292.002592][T25297] Call Trace: [ 1292.005898][T25297] [ 1292.008853][T25297] dump_stack_lvl+0x16c/0x1f0 [ 1292.013571][T25297] should_fail_ex+0x497/0x5b0 [ 1292.018296][T25297] _copy_to_user+0x32/0xd0 [ 1292.022760][T25297] simple_read_from_buffer+0xd0/0x160 [ 1292.028168][T25297] proc_fail_nth_read+0x198/0x270 [ 1292.033241][T25297] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1292.038841][T25297] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1292.044430][T25297] vfs_read+0x1df/0xbe0 [ 1292.048621][T25297] ? __fget_files+0x1fc/0x3a0 [ 1292.053338][T25297] ? __pfx___mutex_lock+0x10/0x10 [ 1292.058395][T25297] ? __pfx_vfs_read+0x10/0x10 [ 1292.063096][T25297] ? __fget_files+0x206/0x3a0 [ 1292.067807][T25297] ksys_read+0x12b/0x250 [ 1292.072065][T25297] ? __pfx_ksys_read+0x10/0x10 [ 1292.076850][T25297] do_syscall_64+0xcd/0x250 [ 1292.081372][T25297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1292.087284][T25297] RIP: 0033:0x7fcd0b98473c [ 1292.091714][T25297] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1292.111333][T25297] RSP: 002b:00007fcd0c80e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1292.119761][T25297] RAX: ffffffffffffffda RBX: 00007fcd0bb75fa0 RCX: 00007fcd0b98473c [ 1292.127744][T25297] RDX: 000000000000000f RSI: 00007fcd0c80e0a0 RDI: 0000000000000004 [ 1292.135728][T25297] RBP: 00007fcd0c80e090 R08: 0000000000000000 R09: 0000000000000000 [ 1292.143717][T25297] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 1292.151696][T25297] R13: 0000000000000000 R14: 00007fcd0bb75fa0 R15: 00007ffda8950488 [ 1292.159690][T25297] [ 1294.180347][T25336] FAULT_INJECTION: forcing a failure. [ 1294.180347][T25336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1294.286378][T25336] CPU: 1 UID: 0 PID: 25336 Comm: syz.5.5797 Not tainted 6.13.0-rc5-syzkaller #0 [ 1294.295485][T25336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1294.305581][T25336] Call Trace: [ 1294.308885][T25336] [ 1294.311829][T25336] dump_stack_lvl+0x16c/0x1f0 [ 1294.316533][T25336] should_fail_ex+0x497/0x5b0 [ 1294.321233][T25336] _copy_from_user+0x2e/0xd0 [ 1294.325845][T25336] do_semtimedop+0x173/0x310 [ 1294.330466][T25336] ? __pfx_do_semtimedop+0x10/0x10 [ 1294.335602][T25336] ? ksys_write+0x12b/0x250 [ 1294.340152][T25336] ? __fget_files+0x206/0x3a0 [ 1294.344849][T25336] __x64_sys_semtimedop+0x1b8/0x1f0 [ 1294.350071][T25336] ? __pfx___x64_sys_semtimedop+0x10/0x10 [ 1294.355832][T25336] do_syscall_64+0xcd/0x250 [ 1294.360364][T25336] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1294.366284][T25336] RIP: 0033:0x7ff3b0f85d29 [ 1294.370712][T25336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1294.390338][T25336] RSP: 002b:00007ff3b1cde038 EFLAGS: 00000246 ORIG_RAX: 00000000000000dc [ 1294.398770][T25336] RAX: ffffffffffffffda RBX: 00007ff3b1175fa0 RCX: 00007ff3b0f85d29 [ 1294.406754][T25336] RDX: 0000000000000005 RSI: 00000000200001c0 RDI: 0000000000000000 [ 1294.414737][T25336] RBP: 00007ff3b1cde090 R08: 0000000000000000 R09: 0000000000000000 [ 1294.422720][T25336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1294.430698][T25336] R13: 0000000000000000 R14: 00007ff3b1175fa0 R15: 00007fffb723ad38 [ 1294.438694][T25336] [ 1294.699940][T25345] Process accounting resumed [ 1294.781517][T25341] netlink: 338 bytes leftover after parsing attributes in process `syz.3.5798'. [ 1295.638619][T25367] FAULT_INJECTION: forcing a failure. [ 1295.638619][T25367] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.713196][T25367] CPU: 0 UID: 0 PID: 25367 Comm: syz.5.5807 Not tainted 6.13.0-rc5-syzkaller #0 [ 1295.722295][T25367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1295.732391][T25367] Call Trace: [ 1295.735708][T25367] [ 1295.738664][T25367] dump_stack_lvl+0x16c/0x1f0 [ 1295.743385][T25367] should_fail_ex+0x497/0x5b0 [ 1295.748103][T25367] ? fs_reclaim_acquire+0xae/0x150 [ 1295.753257][T25367] should_failslab+0xc2/0x120 [ 1295.757988][T25367] kmem_cache_alloc_noprof+0x6e/0x3b0 [ 1295.763404][T25367] ? vma_merge_new_range+0x3f0/0xb70 [ 1295.768725][T25367] ? vm_area_alloc+0x1f/0x1c0 [ 1295.773438][T25367] vm_area_alloc+0x1f/0x1c0 [ 1295.777975][T25367] __mmap_region+0x1091/0x2760 [ 1295.782778][T25367] ? __pfx___mmap_region+0x10/0x10 [ 1295.787934][T25367] ? hlock_class+0x4e/0x130 [ 1295.792472][T25367] ? mark_lock+0xb5/0xc60 [ 1295.796918][T25367] ? cap_mmap_addr+0x53/0x320 [ 1295.801639][T25367] mmap_region+0x127/0x320 [ 1295.806099][T25367] do_mmap+0xc00/0xfc0 [ 1295.810206][T25367] vm_mmap_pgoff+0x1ba/0x360 [ 1295.814842][T25367] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 1295.819976][T25367] ? __fget_files+0x206/0x3a0 [ 1295.824675][T25367] ksys_mmap_pgoff+0x7d/0x5c0 [ 1295.829367][T25367] ? __pfx_ksys_write+0x10/0x10 [ 1295.834234][T25367] __x64_sys_mmap+0x125/0x190 [ 1295.838928][T25367] do_syscall_64+0xcd/0x250 [ 1295.843448][T25367] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1295.849356][T25367] RIP: 0033:0x7ff3b0f85d29 [ 1295.853783][T25367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1295.873840][T25367] RSP: 002b:00007ff3b1cde038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1295.882291][T25367] RAX: ffffffffffffffda RBX: 00007ff3b1175fa0 RCX: 00007ff3b0f85d29 [ 1295.890292][T25367] RDX: 00000000000000df RSI: 0000000000400008 RDI: 0000000000000000 [ 1295.898282][T25367] RBP: 00007ff3b1cde090 R08: 0000000000000002 R09: 0000000000008000 [ 1295.906269][T25367] R10: 0000000000009b72 R11: 0000000000000246 R12: 0000000000000001 [ 1295.914249][T25367] R13: 0000000000000000 R14: 00007ff3b1175fa0 R15: 00007fffb723ad38 [ 1295.922243][T25367] [ 1296.580307][T25380] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5810'. [ 1296.640638][T25380] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5810'. [ 1297.180436][T25390] Invalid ELF header magic: != ELF [ 1297.398680][T25394] netlink: 354 bytes leftover after parsing attributes in process `syz.5.5815'. [ 1297.418806][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 1297.427655][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 1297.788932][T25399] Process accounting resumed [ 1299.026264][T25424] xs_local_setup_socket: unhandled error (13) connecting to /var/run/rpcbind.sock [ 1300.650352][T25449] Process accounting resumed [ 1300.736876][T25454] FAULT_INJECTION: forcing a failure. [ 1300.736876][T25454] name failslab, interval 1, probability 0, space 0, times 0 [ 1300.809024][T25454] CPU: 1 UID: 0 PID: 25454 Comm: syz.3.5836 Not tainted 6.13.0-rc5-syzkaller #0 [ 1300.818121][T25454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1300.828205][T25454] Call Trace: [ 1300.831521][T25454] [ 1300.834489][T25454] dump_stack_lvl+0x16c/0x1f0 [ 1300.839215][T25454] should_fail_ex+0x497/0x5b0 [ 1300.843931][T25454] ? fs_reclaim_acquire+0xae/0x150 [ 1300.849082][T25454] should_failslab+0xc2/0x120 [ 1300.853798][T25454] kmem_cache_alloc_noprof+0x6e/0x3b0 [ 1300.859209][T25454] ? __pfx_mas_next_range+0x10/0x10 [ 1300.864446][T25454] ? vm_area_alloc+0x1f/0x1c0 [ 1300.869181][T25454] vm_area_alloc+0x1f/0x1c0 [ 1300.873727][T25454] do_brk_flags+0x293/0x12b0 [ 1300.878372][T25454] ? mas_prev_slot+0x4c5/0x1460 [ 1300.883265][T25454] ? __pfx_do_brk_flags+0x10/0x10 [ 1300.888337][T25454] ? mas_prev_setup.constprop.0+0xb4/0x830 [ 1300.894186][T25454] ? mas_prev+0x9c/0xf0 [ 1300.898405][T25454] ? __pfx_mas_prev+0x10/0x10 [ 1300.903113][T25454] __do_sys_brk+0x6b3/0xa50 [ 1300.907649][T25454] ? __fget_files+0x206/0x3a0 [ 1300.912345][T25454] ? __pfx___do_sys_brk+0x10/0x10 [ 1300.917409][T25454] do_syscall_64+0xcd/0x250 [ 1300.921937][T25454] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1300.927849][T25454] RIP: 0033:0x7f9915785d29 [ 1300.932277][T25454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1300.951912][T25454] RSP: 002b:00007f991656c038 EFLAGS: 00000246 ORIG_RAX: 000000000000000c [ 1300.960354][T25454] RAX: ffffffffffffffda RBX: 00007f9915975fa0 RCX: 00007f9915785d29 [ 1300.968341][T25454] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fffffffefff [ 1300.976324][T25454] RBP: 00007f991656c090 R08: 0000000000000000 R09: 0000000000000000 [ 1300.984305][T25454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1300.992291][T25454] R13: 0000000000000000 R14: 00007f9915975fa0 R15: 00007ffe86739ce8 [ 1301.000297][T25454] [ 1302.174820][T25475] FAULT_INJECTION: forcing a failure. [ 1302.174820][T25475] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1302.220792][T25475] CPU: 1 UID: 0 PID: 25475 Comm: syz.2.5843 Not tainted 6.13.0-rc5-syzkaller #0 [ 1302.229894][T25475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1302.239980][T25475] Call Trace: [ 1302.243293][T25475] [ 1302.246248][T25475] dump_stack_lvl+0x16c/0x1f0 [ 1302.250963][T25475] should_fail_ex+0x497/0x5b0 [ 1302.255682][T25475] _copy_from_user+0x2e/0xd0 [ 1302.260318][T25475] ip6_mroute_setsockopt+0x932/0x25b0 [ 1302.265743][T25475] ? hlock_class+0x4e/0x130 [ 1302.270287][T25475] ? __pfx_ip6_mroute_setsockopt+0x10/0x10 [ 1302.276138][T25475] ? hlock_class+0x4e/0x130 [ 1302.280680][T25475] ? mark_lock+0xb5/0xc60 [ 1302.285048][T25475] ? __pfx_mark_lock+0x10/0x10 [ 1302.289854][T25475] ? __pfx_mark_lock+0x10/0x10 [ 1302.294652][T25475] ? find_held_lock+0x2d/0x110 [ 1302.299452][T25475] ? is_bpf_text_address+0x8a/0x1a0 [ 1302.304691][T25475] ? __pfx_lock_release+0x10/0x10 [ 1302.309739][T25475] ? trace_lock_acquire+0x14e/0x1f0 [ 1302.314989][T25475] ? __pfx_mark_lock+0x10/0x10 [ 1302.319793][T25475] ? __lock_acquire+0x15a9/0x3c40 [ 1302.324855][T25475] ? do_ipv6_setsockopt+0x8f7/0x4660 [ 1302.330167][T25475] do_ipv6_setsockopt+0x8f7/0x4660 [ 1302.335312][T25475] ? __pfx_do_ipv6_setsockopt+0x10/0x10 [ 1302.340881][T25475] ? __lock_acquire+0xcc5/0x3c40 [ 1302.345838][T25475] ? hlock_class+0x4e/0x130 [ 1302.350364][T25475] ? mark_lock+0xb5/0xc60 [ 1302.354717][T25475] ? aa_label_sk_perm+0x19d/0x5a0 [ 1302.359768][T25475] ? __pfx_mark_lock+0x10/0x10 [ 1302.364558][T25475] ? __pfx_aa_label_sk_perm+0x10/0x10 [ 1302.369963][T25475] ? find_held_lock+0x2d/0x110 [ 1302.374771][T25475] ? ipv6_setsockopt+0xcb/0x170 [ 1302.379642][T25475] ipv6_setsockopt+0xcb/0x170 [ 1302.384348][T25475] rawv6_setsockopt+0xdc/0x700 [ 1302.389127][T25475] ? __pfx_rawv6_setsockopt+0x10/0x10 [ 1302.394520][T25475] ? sock_common_setsockopt+0x2e/0xf0 [ 1302.399913][T25475] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 1302.405823][T25475] do_sock_setsockopt+0x222/0x480 [ 1302.410865][T25475] ? __pfx_do_sock_setsockopt+0x10/0x10 [ 1302.416428][T25475] ? lock_acquire+0x2f/0xb0 [ 1302.420964][T25475] __sys_setsockopt+0x1a0/0x230 [ 1302.425848][T25475] __x64_sys_setsockopt+0xbd/0x160 [ 1302.430981][T25475] ? do_syscall_64+0x91/0x250 [ 1302.435679][T25475] ? lockdep_hardirqs_on+0x7c/0x110 [ 1302.440896][T25475] do_syscall_64+0xcd/0x250 [ 1302.445508][T25475] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1302.451420][T25475] RIP: 0033:0x7fcd0b985d29 [ 1302.455848][T25475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1302.475471][T25475] RSP: 002b:00007fcd0c7ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1302.483909][T25475] RAX: ffffffffffffffda RBX: 00007fcd0bb76080 RCX: 00007fcd0b985d29 [ 1302.491891][T25475] RDX: 00000000000000ca RSI: 0000000000000029 RDI: 0400000000000003 [ 1302.499873][T25475] RBP: 00007fcd0c7ed090 R08: 0000000000000567 R09: 0000000000000000 [ 1302.507855][T25475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1302.515839][T25475] R13: 0000000000000000 R14: 00007fcd0bb76080 R15: 00007ffda8950488 [ 1302.523839][T25475] [ 1304.125057][T25494] netlink: 338 bytes leftover after parsing attributes in process `syz.4.5847'. [ 1306.411679][T25543] netlink: 338 bytes leftover after parsing attributes in process `syz.5.5859'. [ 1307.106139][T25553] FAULT_INJECTION: forcing a failure. [ 1307.106139][T25553] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1307.160303][T25555] netlink: 354 bytes leftover after parsing attributes in process `syz.4.5864'. [ 1307.178526][T25553] CPU: 1 UID: 0 PID: 25553 Comm: syz.3.5865 Not tainted 6.13.0-rc5-syzkaller #0 [ 1307.187623][T25553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1307.197715][T25553] Call Trace: [ 1307.201029][T25553] [ 1307.203995][T25553] dump_stack_lvl+0x16c/0x1f0 [ 1307.208723][T25553] should_fail_ex+0x497/0x5b0 [ 1307.213476][T25553] _copy_from_user+0x2e/0xd0 [ 1307.218111][T25553] copy_msghdr_from_user+0x99/0x160 [ 1307.223355][T25553] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1307.229220][T25553] ___sys_sendmsg+0xff/0x1e0 [ 1307.233856][T25553] ? __pfx____sys_sendmsg+0x10/0x10 [ 1307.239109][T25553] ? __pfx_lock_release+0x10/0x10 [ 1307.244166][T25553] ? trace_lock_acquire+0x14e/0x1f0 [ 1307.249421][T25553] ? __fget_files+0x206/0x3a0 [ 1307.254140][T25553] __sys_sendmsg+0x16e/0x220 [ 1307.258773][T25553] ? __pfx___sys_sendmsg+0x10/0x10 [ 1307.263950][T25553] do_syscall_64+0xcd/0x250 [ 1307.268497][T25553] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1307.274430][T25553] RIP: 0033:0x7f9915785d29 [ 1307.278869][T25553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1307.298510][T25553] RSP: 002b:00007f991656c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1307.306970][T25553] RAX: ffffffffffffffda RBX: 00007f9915975fa0 RCX: 00007f9915785d29 [ 1307.314977][T25553] RDX: 0000000000040082 RSI: 0000000020001980 RDI: 0000000000000003 [ 1307.322983][T25553] RBP: 00007f991656c090 R08: 0000000000000000 R09: 0000000000000000 [ 1307.330988][T25553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.338990][T25553] R13: 0000000000000000 R14: 00007f9915975fa0 R15: 00007ffe86739ce8 [ 1307.347008][T25553] [ 1309.103471][T25580] netlink: 338 bytes leftover after parsing attributes in process `syz.5.5872'. [ 1309.663864][T25589] FAULT_INJECTION: forcing a failure. [ 1309.663864][T25589] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.778299][T25589] CPU: 0 UID: 0 PID: 25589 Comm: syz.5.5874 Not tainted 6.13.0-rc5-syzkaller #0 [ 1309.787397][T25589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1309.797486][T25589] Call Trace: [ 1309.800794][T25589] [ 1309.803747][T25589] dump_stack_lvl+0x16c/0x1f0 [ 1309.808468][T25589] should_fail_ex+0x497/0x5b0 [ 1309.813183][T25589] ? fs_reclaim_acquire+0xae/0x150 [ 1309.818334][T25589] should_failslab+0xc2/0x120 [ 1309.823055][T25589] kmem_cache_alloc_node_noprof+0x72/0x3b0 [ 1309.828947][T25589] ? __alloc_skb+0x2b3/0x380 [ 1309.833579][T25589] __alloc_skb+0x2b3/0x380 [ 1309.838032][T25589] ? __pfx___alloc_skb+0x10/0x10 [ 1309.843009][T25589] ? lock_acquire+0x2f/0xb0 [ 1309.847553][T25589] netlink_alloc_large_skb+0x69/0x130 [ 1309.852961][T25589] netlink_sendmsg+0x689/0xd70 [ 1309.857767][T25589] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1309.863094][T25589] ____sys_sendmsg+0x9ae/0xb40 [ 1309.867898][T25589] ? copy_msghdr_from_user+0x10b/0x160 [ 1309.873397][T25589] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1309.878723][T25589] ___sys_sendmsg+0x135/0x1e0 [ 1309.883435][T25589] ? __pfx____sys_sendmsg+0x10/0x10 [ 1309.888683][T25589] ? __pfx_lock_release+0x10/0x10 [ 1309.893744][T25589] ? trace_lock_acquire+0x14e/0x1f0 [ 1309.898998][T25589] ? __fget_files+0x206/0x3a0 [ 1309.903717][T25589] __sys_sendmsg+0x16e/0x220 [ 1309.908350][T25589] ? __pfx___sys_sendmsg+0x10/0x10 [ 1309.913523][T25589] do_syscall_64+0xcd/0x250 [ 1309.918066][T25589] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1309.923999][T25589] RIP: 0033:0x7ff3b0f85d29 [ 1309.928450][T25589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1309.948100][T25589] RSP: 002b:00007ff3b1cde038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1309.956563][T25589] RAX: ffffffffffffffda RBX: 00007ff3b1175fa0 RCX: 00007ff3b0f85d29 [ 1309.964569][T25589] RDX: 0000000000000080 RSI: 0000000020000140 RDI: 0000000000000003 [ 1309.972579][T25589] RBP: 00007ff3b1cde090 R08: 0000000000000000 R09: 0000000000000000 [ 1309.980586][T25589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1309.988590][T25589] R13: 0000000000000000 R14: 00007ff3b1175fa0 R15: 00007fffb723ad38 [ 1309.996612][T25589] [ 1311.019117][T25606] FAULT_INJECTION: forcing a failure. [ 1311.019117][T25606] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1311.067560][T25606] CPU: 0 UID: 0 PID: 25606 Comm: syz.2.5878 Not tainted 6.13.0-rc5-syzkaller #0 [ 1311.076648][T25606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1311.086707][T25606] Call Trace: [ 1311.090008][T25606] [ 1311.092949][T25606] dump_stack_lvl+0x16c/0x1f0 [ 1311.097646][T25606] should_fail_ex+0x497/0x5b0 [ 1311.102336][T25606] _copy_to_user+0x32/0xd0 [ 1311.106766][T25606] __do_sys_adjtimex+0xc9/0x140 [ 1311.111629][T25606] ? __pfx___do_sys_adjtimex+0x10/0x10 [ 1311.117106][T25606] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1311.123110][T25606] ? __pfx_ksys_write+0x10/0x10 [ 1311.127996][T25606] do_syscall_64+0xcd/0x250 [ 1311.132515][T25606] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1311.138415][T25606] RIP: 0033:0x7fcd0b985d29 [ 1311.142834][T25606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1311.162450][T25606] RSP: 002b:00007fcd0c80e038 EFLAGS: 00000246 ORIG_RAX: 000000000000009f [ 1311.170870][T25606] RAX: ffffffffffffffda RBX: 00007fcd0bb75fa0 RCX: 00007fcd0b985d29 [ 1311.178848][T25606] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000200 [ 1311.186824][T25606] RBP: 00007fcd0c80e090 R08: 0000000000000000 R09: 0000000000000000 [ 1311.194802][T25606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1311.202776][T25606] R13: 0000000000000001 R14: 00007fcd0bb75fa0 R15: 00007ffda8950488 [ 1311.210761][T25606] [ 1313.059830][T25630] FAULT_INJECTION: forcing a failure. [ 1313.059830][T25630] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1313.117606][T25632] netlink: 28 bytes leftover after parsing attributes in process `syz.2.5887'. [ 1313.117916][T25630] CPU: 1 UID: 0 PID: 25630 Comm: syz.5.5886 Not tainted 6.13.0-rc5-syzkaller #0 [ 1313.135621][T25630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1313.145699][T25630] Call Trace: [ 1313.148999][T25630] [ 1313.151953][T25630] dump_stack_lvl+0x16c/0x1f0 [ 1313.156671][T25630] should_fail_ex+0x497/0x5b0 [ 1313.161388][T25630] _copy_from_user+0x2e/0xd0 [ 1313.166020][T25630] copy_msghdr_from_user+0x99/0x160 [ 1313.171262][T25630] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1313.177105][T25630] ? __lock_acquire+0xcc5/0x3c40 [ 1313.182083][T25630] ___sys_sendmsg+0xff/0x1e0 [ 1313.186717][T25630] ? __pfx____sys_sendmsg+0x10/0x10 [ 1313.191976][T25630] ? trace_lock_acquire+0x14e/0x1f0 [ 1313.197236][T25630] __sys_sendmmsg+0x201/0x420 [ 1313.201963][T25630] ? __pfx___sys_sendmmsg+0x10/0x10 [ 1313.207209][T25630] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1313.213242][T25630] ? fput+0x67/0x440 [ 1313.217177][T25630] ? ksys_write+0x1ba/0x250 [ 1313.221718][T25630] ? __pfx_ksys_write+0x10/0x10 [ 1313.226604][T25630] __x64_sys_sendmmsg+0x9c/0x100 [ 1313.231582][T25630] ? lockdep_hardirqs_on+0x7c/0x110 [ 1313.236818][T25630] do_syscall_64+0xcd/0x250 [ 1313.241360][T25630] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1313.247286][T25630] RIP: 0033:0x7ff3b0f85d29 [ 1313.251725][T25630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1313.271370][T25630] RSP: 002b:00007ff3b1cde038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1313.279824][T25630] RAX: ffffffffffffffda RBX: 00007ff3b1175fa0 RCX: 00007ff3b0f85d29 [ 1313.287826][T25630] RDX: 0000000000000007 RSI: 0000000020000200 RDI: 0000000000000006 [ 1313.295827][T25630] RBP: 00007ff3b1cde090 R08: 0000000000000000 R09: 0000000000000000 [ 1313.303823][T25630] R10: 0000000000004008 R11: 0000000000000246 R12: 0000000000000001 [ 1313.311819][T25630] R13: 0000000000000000 R14: 00007ff3b1175fa0 R15: 00007fffb723ad38 [ 1313.319832][T25630] [ 1314.010954][T25646] FAULT_INJECTION: forcing a failure. [ 1314.010954][T25646] name failslab, interval 1, probability 0, space 0, times 0 [ 1314.099168][T25646] CPU: 0 UID: 0 PID: 25646 Comm: syz.3.5890 Not tainted 6.13.0-rc5-syzkaller #0 [ 1314.108269][T25646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1314.118355][T25646] Call Trace: [ 1314.121664][T25646] [ 1314.124624][T25646] dump_stack_lvl+0x16c/0x1f0 [ 1314.129343][T25646] should_fail_ex+0x497/0x5b0 [ 1314.134060][T25646] ? fs_reclaim_acquire+0xae/0x150 [ 1314.139222][T25646] should_failslab+0xc2/0x120 [ 1314.143942][T25646] __kmalloc_cache_noprof+0x68/0x420 [ 1314.149266][T25646] ? __virt_addr_valid+0x5e/0x590 [ 1314.154328][T25646] memtype_get_idx+0x3d/0xc0 [ 1314.158950][T25646] seq_read_iter+0x2ab/0x12b0 [ 1314.163677][T25646] seq_read+0x39f/0x4e0 [ 1314.167882][T25646] ? __pfx_seq_read+0x10/0x10 [ 1314.172636][T25646] full_proxy_read+0xfb/0x1b0 [ 1314.177338][T25646] ? __pfx_full_proxy_read+0x10/0x10 [ 1314.182652][T25646] vfs_read+0x1df/0xbe0 [ 1314.186837][T25646] ? __fget_files+0x1fc/0x3a0 [ 1314.191549][T25646] ? __pfx___mutex_lock+0x10/0x10 [ 1314.196605][T25646] ? __pfx_vfs_read+0x10/0x10 [ 1314.201323][T25646] ? __fget_files+0x206/0x3a0 [ 1314.206045][T25646] ksys_read+0x12b/0x250 [ 1314.210315][T25646] ? __pfx_ksys_read+0x10/0x10 [ 1314.215102][T25646] do_syscall_64+0xcd/0x250 [ 1314.219624][T25646] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1314.225534][T25646] RIP: 0033:0x7f9915785d29 [ 1314.229966][T25646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1314.249598][T25646] RSP: 002b:00007f991656c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1314.258031][T25646] RAX: ffffffffffffffda RBX: 00007f9915975fa0 RCX: 00007f9915785d29 [ 1314.266010][T25646] RDX: 0000000000000050 RSI: 0000000020000300 RDI: 0000000000000003 [ 1314.273991][T25646] RBP: 00007f991656c090 R08: 0000000000000000 R09: 0000000000000000 [ 1314.281973][T25646] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1314.289951][T25646] R13: 0000000000000000 R14: 00007f9915975fa0 R15: 00007ffe86739ce8 [ 1314.297952][T25646] [ 1314.724470][T25659] xs_local_setup_socket: unhandled error (13) connecting to /var/run/rpcbind.sock [ 1316.098040][T25683] netlink: 338 bytes leftover after parsing attributes in process `syz.2.5903'. [ 1316.161351][T25684] netlink: 16 bytes leftover after parsing attributes in process `syz.5.5902'. [ 1316.375199][ T5839] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1316.389055][ T5839] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1316.398864][ T5839] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1316.408816][ T5839] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1316.426790][ T5839] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 1316.434159][ T5839] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 1317.039791][T25686] chnl_net:caif_netlink_parms(): no params data found [ 1317.580413][T25699] netlink: 338 bytes leftover after parsing attributes in process `syz.3.5906'. [ 1317.847861][T25686] bridge0: port 1(bridge_slave_0) entered blocking state [ 1317.871335][T25686] bridge0: port 1(bridge_slave_0) entered disabled state [ 1317.900359][T25686] bridge_slave_0: entered allmulticast mode [ 1317.923288][T25686] bridge_slave_0: entered promiscuous mode [ 1317.950173][T25686] bridge0: port 2(bridge_slave_1) entered blocking state [ 1317.957305][T25686] bridge0: port 2(bridge_slave_1) entered disabled state [ 1318.007884][T25686] bridge_slave_1: entered allmulticast mode [ 1318.015046][T25686] bridge_slave_1: entered promiscuous mode [ 1318.110745][T25686] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1318.146292][T25686] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1318.255145][T25686] team0: Port device team_slave_0 added [ 1318.275566][T25686] team0: Port device team_slave_1 added [ 1318.486108][T25686] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1318.504960][T25686] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1318.505246][T21969] Bluetooth: hci2: command tx timeout [ 1318.545431][T25686] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1318.559322][T25686] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1318.566712][T25686] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1318.612649][T25686] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1318.737090][T25734] FAULT_INJECTION: forcing a failure. [ 1318.737090][T25734] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1318.794755][T25734] CPU: 0 UID: 0 PID: 25734 Comm: syz.2.5916 Not tainted 6.13.0-rc5-syzkaller #0 [ 1318.803843][T25734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1318.813915][T25734] Call Trace: [ 1318.817211][T25734] [ 1318.820154][T25734] dump_stack_lvl+0x16c/0x1f0 [ 1318.824854][T25734] should_fail_ex+0x497/0x5b0 [ 1318.829554][T25734] _copy_to_user+0x32/0xd0 [ 1318.834001][T25734] simple_read_from_buffer+0xd0/0x160 [ 1318.839387][T25734] proc_fail_nth_read+0x198/0x270 [ 1318.844433][T25734] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1318.850009][T25734] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1318.855574][T25734] vfs_read+0x1df/0xbe0 [ 1318.859745][T25734] ? __fget_files+0x1fc/0x3a0 [ 1318.864435][T25734] ? __pfx___mutex_lock+0x10/0x10 [ 1318.869475][T25734] ? __pfx_vfs_read+0x10/0x10 [ 1318.874176][T25734] ? __fget_files+0x206/0x3a0 [ 1318.878874][T25734] ksys_read+0x12b/0x250 [ 1318.883128][T25734] ? __pfx_ksys_read+0x10/0x10 [ 1318.887910][T25734] do_syscall_64+0xcd/0x250 [ 1318.892429][T25734] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1318.898339][T25734] RIP: 0033:0x7fcd0b98473c [ 1318.902765][T25734] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1318.922401][T25734] RSP: 002b:00007fcd0c80e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1318.930839][T25734] RAX: ffffffffffffffda RBX: 00007fcd0bb75fa0 RCX: 00007fcd0b98473c [ 1318.938830][T25734] RDX: 000000000000000f RSI: 00007fcd0c80e0a0 RDI: 0000000000000003 [ 1318.946812][T25734] RBP: 00007fcd0c80e090 R08: 0000000000000000 R09: 0000000000000000 [ 1318.954794][T25734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1318.962773][T25734] R13: 0000000000000001 R14: 00007fcd0bb75fa0 R15: 00007ffda8950488 [ 1318.970769][T25734] [ 1319.818828][T25686] hsr_slave_0: entered promiscuous mode [ 1319.879571][T25686] hsr_slave_1: entered promiscuous mode [ 1319.920383][T25686] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1319.951044][T25686] Cannot create hsr debugfs directory [ 1319.957174][T25740] netlink: 338 bytes leftover after parsing attributes in process `syz.5.5918'. [ 1320.475595][T25686] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1320.573659][T21969] Bluetooth: hci2: command tx timeout [ 1320.662629][T25686] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1320.943563][T25686] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1321.132024][T25686] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1321.383698][T25686] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1321.414883][T25686] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1321.566619][T25686] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1321.600164][T25686] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1321.880678][T25686] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1321.925425][T25686] 8021q: adding VLAN 0 to HW filter on device team0 [ 1321.968317][T21991] bridge0: port 1(bridge_slave_0) entered blocking state [ 1321.975482][T21991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1322.060299][T16666] bridge0: port 2(bridge_slave_1) entered blocking state [ 1322.067493][T16666] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1322.413994][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 1322.447578][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 1322.629289][T25686] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1322.642695][T21969] Bluetooth: hci2: command tx timeout [ 1322.692682][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 1323.200871][T25800] FAULT_INJECTION: forcing a failure. [ 1323.200871][T25800] name failslab, interval 1, probability 0, space 0, times 0 [ 1323.214011][T25800] CPU: 1 UID: 0 PID: 25800 Comm: syz.5.5930 Not tainted 6.13.0-rc5-syzkaller #0 [ 1323.223067][T25800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1323.233146][T25800] Call Trace: [ 1323.236443][T25800] [ 1323.239397][T25800] dump_stack_lvl+0x16c/0x1f0 [ 1323.244115][T25800] should_fail_ex+0x497/0x5b0 [ 1323.248835][T25800] should_failslab+0xc2/0x120 [ 1323.253553][T25800] __kmalloc_cache_noprof+0x68/0x420 [ 1323.258879][T25800] ? lock_acquire.part.0+0x11b/0x380 [ 1323.264203][T25800] tipc_nametbl_insert_publ+0x5d/0x1660 [ 1323.269790][T25800] ? rcu_is_watching+0x12/0xc0 [ 1323.274593][T25800] ? do_raw_spin_lock+0x12d/0x2c0 [ 1323.279655][T25800] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 1323.285069][T25800] ? lock_acquire+0x2f/0xb0 [ 1323.289604][T25800] ? tipc_nametbl_publish+0xdb/0x280 [ 1323.294937][T25800] tipc_nametbl_publish+0x137/0x280 [ 1323.300181][T25800] tipc_sk_publish+0x1d8/0x430 [ 1323.304989][T25800] ? __pfx_tipc_sk_publish+0x10/0x10 [ 1323.310318][T25800] ? tipc_group_create+0x4ba/0x650 [ 1323.315467][T25800] tipc_setsockopt+0x9af/0xe80 [ 1323.320277][T25800] ? __pfx_tipc_setsockopt+0x10/0x10 [ 1323.325597][T25800] ? ksys_write+0x191/0x250 [ 1323.330150][T25800] ? __pfx_tipc_setsockopt+0x10/0x10 [ 1323.335477][T25800] do_sock_setsockopt+0x222/0x480 [ 1323.340536][T25800] ? __pfx_do_sock_setsockopt+0x10/0x10 [ 1323.346115][T25800] ? lock_acquire+0x2f/0xb0 [ 1323.350671][T25800] __sys_setsockopt+0x1a0/0x230 [ 1323.355574][T25800] __x64_sys_setsockopt+0xbd/0x160 [ 1323.360732][T25800] ? do_syscall_64+0x91/0x250 [ 1323.365450][T25800] ? lockdep_hardirqs_on+0x7c/0x110 [ 1323.370690][T25800] do_syscall_64+0xcd/0x250 [ 1323.375239][T25800] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1323.381168][T25800] RIP: 0033:0x7ff3b0f85d29 [ 1323.385611][T25800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1323.405256][T25800] RSP: 002b:00007ff3b1cde038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1323.413716][T25800] RAX: ffffffffffffffda RBX: 00007ff3b1175fa0 RCX: 00007ff3b0f85d29 [ 1323.421730][T25800] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000003 [ 1323.429742][T25800] RBP: 00007ff3b1cde090 R08: 0000000000000014 R09: 0000000000000000 [ 1323.437752][T25800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1323.445765][T25800] R13: 0000000000000000 R14: 00007ff3b1175fa0 R15: 00007fffb723ad38 [ 1323.453791][T25800] [ 1323.475733][T25686] veth0_vlan: entered promiscuous mode [ 1323.486393][T25686] veth1_vlan: entered promiscuous mode [ 1323.512591][T25686] veth0_macvtap: entered promiscuous mode [ 1323.522490][T25686] veth1_macvtap: entered promiscuous mode [ 1323.537244][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.547888][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.557870][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.568412][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.578354][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.588859][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.598870][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.610295][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.621118][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.631662][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.641612][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.652160][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.662100][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.672668][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.684425][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.694972][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.705714][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.717065][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.727016][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.737559][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.747481][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.758160][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.768075][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.778570][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.788508][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1323.799016][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.812401][T25686] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1323.820904][T25802] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5931'. [ 1323.897869][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1323.909248][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.920112][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1323.972317][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1323.995513][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1324.010542][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.021083][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1324.031672][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.041795][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1324.052374][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.094779][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1324.124581][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.144435][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1324.188611][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.237413][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1324.283746][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.335193][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1324.376981][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.413146][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1324.425138][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 1324.454572][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.472784][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1324.492609][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.532400][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1324.557838][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.602030][T25686] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1324.621853][T25686] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1324.652872][T25686] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1324.698346][T25686] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1324.731712][T25686] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1324.741692][T25820] Process accounting resumed [ 1324.763100][T25686] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1324.778520][T21969] Bluetooth: hci2: command tx timeout [ 1324.827852][T25686] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1324.934707][T25818] Process accounting resumed [ 1325.131461][T21991] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1325.159672][T21991] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1325.223529][T16666] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1325.239310][T16666] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1326.515137][T25826] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5937'. [ 1326.605177][T25846] FAULT_INJECTION: forcing a failure. [ 1326.605177][T25846] name failslab, interval 1, probability 0, space 0, times 0 [ 1326.640891][T25846] CPU: 1 UID: 0 PID: 25846 Comm: syz.2.5940 Not tainted 6.13.0-rc5-syzkaller #0 [ 1326.649979][T25846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1326.660062][T25846] Call Trace: [ 1326.663336][T25846] [ 1326.666262][T25846] dump_stack_lvl+0x16c/0x1f0 [ 1326.671042][T25846] should_fail_ex+0x497/0x5b0 [ 1326.675718][T25846] ? fs_reclaim_acquire+0xae/0x150 [ 1326.680830][T25846] should_failslab+0xc2/0x120 [ 1326.685508][T25846] kmem_cache_alloc_noprof+0x6e/0x3b0 [ 1326.690879][T25846] ? vma_merge_new_range+0x3f0/0xb70 [ 1326.696164][T25846] ? vm_area_dup+0x53/0x300 [ 1326.700681][T25846] vm_area_dup+0x53/0x300 [ 1326.705051][T25846] copy_vma+0x4fd/0xa90 [ 1326.709259][T25846] ? __pfx_copy_vma+0x10/0x10 [ 1326.713992][T25846] ? move_vma+0x5c7/0x1c50 [ 1326.718463][T25846] ? up_write+0x1b2/0x520 [ 1326.722836][T25846] move_vma+0x640/0x1c50 [ 1326.727131][T25846] ? __pfx_arch_get_unmapped_area_topdown+0x10/0x10 [ 1326.733759][T25846] ? __pfx_move_vma+0x10/0x10 [ 1326.738481][T25846] ? __pfx_mtree_load+0x10/0x10 [ 1326.743380][T25846] ? bpf_lsm_mmap_addr+0x9/0x10 [ 1326.748255][T25846] ? security_mmap_addr+0x6c/0x1e0 [ 1326.753400][T25846] __do_sys_mremap+0xfc7/0x15e0 [ 1326.758322][T25846] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1326.764342][T25846] ? __pfx___do_sys_mremap+0x10/0x10 [ 1326.769664][T25846] ? __fget_files+0x206/0x3a0 [ 1326.774377][T25846] ? fput+0x67/0x440 [ 1326.778314][T25846] ? ksys_write+0x1ba/0x250 [ 1326.782850][T25846] ? __pfx_ksys_write+0x10/0x10 [ 1326.787745][T25846] do_syscall_64+0xcd/0x250 [ 1326.792287][T25846] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1326.798220][T25846] RIP: 0033:0x7fcd0b985d29 [ 1326.802667][T25846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1326.822307][T25846] RSP: 002b:00007fcd0c80e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 1326.830753][T25846] RAX: ffffffffffffffda RBX: 00007fcd0bb75fa0 RCX: 00007fcd0b985d29 [ 1326.838758][T25846] RDX: 0000000000000004 RSI: 0000000000000004 RDI: 0000000000000000 [ 1326.846760][T25846] RBP: 00007fcd0c80e090 R08: 0000000100000000 R09: 0000000000000000 [ 1326.854769][T25846] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000001 [ 1326.862773][T25846] R13: 0000000000000000 R14: 00007fcd0bb75fa0 R15: 00007ffda8950488 [ 1326.870793][T25846] [ 1328.504329][T25884] Process accounting resumed [ 1329.264836][T25901] FAULT_INJECTION: forcing a failure. [ 1329.264836][T25901] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1329.317112][T25901] CPU: 1 UID: 0 PID: 25901 Comm: syz.4.5956 Not tainted 6.13.0-rc5-syzkaller #0 [ 1329.326177][T25901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1329.336265][T25901] Call Trace: [ 1329.339560][T25901] [ 1329.342489][T25901] dump_stack_lvl+0x16c/0x1f0 [ 1329.347169][T25901] should_fail_ex+0x497/0x5b0 [ 1329.351853][T25901] _copy_to_user+0x32/0xd0 [ 1329.356274][T25901] simple_read_from_buffer+0xd0/0x160 [ 1329.361646][T25901] proc_fail_nth_read+0x198/0x270 [ 1329.366676][T25901] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1329.372678][T25901] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1329.378254][T25901] vfs_read+0x1df/0xbe0 [ 1329.382444][T25901] ? __fget_files+0x1fc/0x3a0 [ 1329.387145][T25901] ? __pfx___mutex_lock+0x10/0x10 [ 1329.392186][T25901] ? __pfx_vfs_read+0x10/0x10 [ 1329.396886][T25901] ? __fget_files+0x206/0x3a0 [ 1329.401585][T25901] ksys_read+0x12b/0x250 [ 1329.405845][T25901] ? __pfx_ksys_read+0x10/0x10 [ 1329.410641][T25901] do_syscall_64+0xcd/0x250 [ 1329.415185][T25901] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1329.421099][T25901] RIP: 0033:0x7ff4bb98473c [ 1329.425523][T25901] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1329.445146][T25901] RSP: 002b:00007ff4bc780030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1329.453574][T25901] RAX: ffffffffffffffda RBX: 00007ff4bbb75fa0 RCX: 00007ff4bb98473c [ 1329.461553][T25901] RDX: 000000000000000f RSI: 00007ff4bc7800a0 RDI: 0000000000000003 [ 1329.469533][T25901] RBP: 00007ff4bc780090 R08: 0000000000000000 R09: 0000000000000000 [ 1329.477513][T25901] R10: 0000000020000140 R11: 0000000000000246 R12: 0000000000000001 [ 1329.485491][T25901] R13: 0000000000000001 R14: 00007ff4bbb75fa0 R15: 00007fffb9638ab8 [ 1329.493488][T25901] [ 1330.047056][T25909] Process accounting resumed [ 1330.631184][T25916] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5963'. [ 1332.323311][T25944] netlink: 338 bytes leftover after parsing attributes in process `syz.2.5971'. [ 1332.644849][T25948] Process accounting resumed [ 1333.862352][T25958] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5974'. [ 1335.956076][T25982] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5982'. [ 1336.344997][T25987] Process accounting resumed [ 1336.495660][T25990] FAULT_INJECTION: forcing a failure. [ 1336.495660][T25990] name failslab, interval 1, probability 0, space 0, times 0 [ 1336.546798][T25990] CPU: 0 UID: 0 PID: 25990 Comm: syz.4.5985 Not tainted 6.13.0-rc5-syzkaller #0 [ 1336.555890][T25990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1336.565981][T25990] Call Trace: [ 1336.569291][T25990] [ 1336.572248][T25990] dump_stack_lvl+0x16c/0x1f0 [ 1336.576964][T25990] should_fail_ex+0x497/0x5b0 [ 1336.581678][T25990] ? fs_reclaim_acquire+0xae/0x150 [ 1336.586822][T25990] should_failslab+0xc2/0x120 [ 1336.591538][T25990] kmem_cache_alloc_node_noprof+0x72/0x3b0 [ 1336.597374][T25990] ? __alloc_skb+0x2b3/0x380 [ 1336.601987][T25990] __alloc_skb+0x2b3/0x380 [ 1336.606425][T25990] ? __pfx___alloc_skb+0x10/0x10 [ 1336.611382][T25990] ? lock_acquire+0x2f/0xb0 [ 1336.615916][T25990] netlink_alloc_large_skb+0x69/0x130 [ 1336.621319][T25990] netlink_sendmsg+0x689/0xd70 [ 1336.626102][T25990] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1336.631410][T25990] ____sys_sendmsg+0x9ae/0xb40 [ 1336.636190][T25990] ? copy_msghdr_from_user+0x10b/0x160 [ 1336.641672][T25990] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1336.646990][T25990] ___sys_sendmsg+0x135/0x1e0 [ 1336.651701][T25990] ? __pfx____sys_sendmsg+0x10/0x10 [ 1336.656933][T25990] ? __pfx_lock_release+0x10/0x10 [ 1336.661969][T25990] ? trace_lock_acquire+0x14e/0x1f0 [ 1336.667193][T25990] ? __fget_files+0x206/0x3a0 [ 1336.671891][T25990] __sys_sendmsg+0x16e/0x220 [ 1336.676500][T25990] ? __pfx___sys_sendmsg+0x10/0x10 [ 1336.681647][T25990] do_syscall_64+0xcd/0x250 [ 1336.686172][T25990] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1336.692080][T25990] RIP: 0033:0x7ff4bb985d29 [ 1336.696503][T25990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1336.716141][T25990] RSP: 002b:00007ff4bc780038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1336.724574][T25990] RAX: ffffffffffffffda RBX: 00007ff4bbb75fa0 RCX: 00007ff4bb985d29 [ 1336.732560][T25990] RDX: 00000000200080c0 RSI: 0000000020000180 RDI: 000000000000000b [ 1336.740543][T25990] RBP: 00007ff4bc780090 R08: 0000000000000000 R09: 0000000000000000 [ 1336.748525][T25990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1336.756521][T25990] R13: 0000000000000000 R14: 00007ff4bbb75fa0 R15: 00007fffb9638ab8 [ 1336.764528][T25990] [ 1337.782291][T26000] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5987'. [ 1337.840936][T26000] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1337.848418][T26000] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1337.902203][T26000] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1337.919354][T26000] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1338.039912][T26010] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5989'. [ 1338.788909][T26026] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5993'. [ 1341.554538][T26064] Process accounting resumed [ 1342.023225][T26056] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6000'. [ 1343.207466][T26085] syz.2.6009: vmalloc error: size 4503599627371522, exceeds total pages, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 1343.283454][T26085] CPU: 1 UID: 0 PID: 26085 Comm: syz.2.6009 Not tainted 6.13.0-rc5-syzkaller #0 [ 1343.292548][T26085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1343.302647][T26085] Call Trace: [ 1343.305950][T26085] [ 1343.308904][T26085] dump_stack_lvl+0x16c/0x1f0 [ 1343.313634][T26085] warn_alloc+0x24d/0x3a0 [ 1343.317993][T26085] ? __pfx_warn_alloc+0x10/0x10 [ 1343.322861][T26085] ? __pfx_mark_lock+0x10/0x10 [ 1343.327657][T26085] ? lock_acquire.part.0+0x11b/0x380 [ 1343.332970][T26085] __vmalloc_node_range_noprof+0x10df/0x1530 [ 1343.338972][T26085] ? rcu_is_watching+0x12/0xc0 [ 1343.343757][T26085] ? trace_contention_end+0xee/0x140 [ 1343.349062][T26085] ? dvb_demux_do_ioctl+0x54d/0x1340 [ 1343.354373][T26085] ? dvb_demux_do_ioctl+0x496/0x1340 [ 1343.359685][T26085] ? __pfx___mutex_lock+0x10/0x10 [ 1343.364741][T26085] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 1343.371104][T26085] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1343.377025][T26085] ? dvb_demux_do_ioctl+0x54d/0x1340 [ 1343.382342][T26085] vmalloc_noprof+0x6b/0x90 [ 1343.386868][T26085] ? dvb_demux_do_ioctl+0x54d/0x1340 [ 1343.392179][T26085] dvb_demux_do_ioctl+0x54d/0x1340 [ 1343.397330][T26085] dvb_usercopy+0x165/0x320 [ 1343.401855][T26085] ? __pfx_dvb_demux_do_ioctl+0x10/0x10 [ 1343.407425][T26085] ? __pfx_dvb_usercopy+0x10/0x10 [ 1343.412468][T26085] ? __pfx_lock_release+0x10/0x10 [ 1343.417519][T26085] ? __fget_files+0x206/0x3a0 [ 1343.422222][T26085] dvb_demux_ioctl+0x29/0x40 [ 1343.426832][T26085] ? __pfx_dvb_demux_ioctl+0x10/0x10 [ 1343.432135][T26085] __x64_sys_ioctl+0x190/0x200 [ 1343.436920][T26085] do_syscall_64+0xcd/0x250 [ 1343.441446][T26085] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1343.447367][T26085] RIP: 0033:0x7fcd0b985d29 [ 1343.451794][T26085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1343.471422][T26085] RSP: 002b:00007fcd0c7ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1343.479855][T26085] RAX: ffffffffffffffda RBX: 00007fcd0bb76080 RCX: 00007fcd0b985d29 [ 1343.487844][T26085] RDX: 0010000000000402 RSI: 0000000000006f2d RDI: 0000000000000003 [ 1343.495831][T26085] RBP: 00007fcd0ba01b08 R08: 0000000000000000 R09: 0000000000000000 [ 1343.503810][T26085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1343.511789][T26085] R13: 0000000000000000 R14: 00007fcd0bb76080 R15: 00007ffda8950488 [ 1343.519785][T26085] [ 1343.679171][T26085] Mem-Info: [ 1343.746944][T26085] active_anon:81491 inactive_anon:13823 isolated_anon:0 [ 1343.746944][T26085] active_file:7306 inactive_file:50526 isolated_file:0 [ 1343.746944][T26085] unevictable:768 dirty:576 writeback:0 [ 1343.746944][T26085] slab_reclaimable:12383 slab_unreclaimable:125383 [ 1343.746944][T26085] mapped:49993 shmem:82218 pagetables:947 [ 1343.746944][T26085] sec_pagetables:0 bounce:0 [ 1343.746944][T26085] kernel_misc_reclaimable:0 [ 1343.746944][T26085] free:1203246 free_pcp:7867 free_cma:0 [ 1343.890697][T26085] Node 0 active_anon:202660kB inactive_anon:55292kB active_file:29224kB inactive_file:194852kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:164456kB dirty:2296kB writeback:0kB shmem:203984kB shmem_thp:4096kB shmem_pmdmapped:4096kB anon_thp:0kB writeback_tmp:0kB kernel_stack:12816kB pagetables:3568kB sec_pagetables:0kB all_unreclaimable? no [ 1344.057920][T26085] Node 1 active_anon:126232kB inactive_anon:0kB active_file:0kB inactive_file:7252kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:29968kB dirty:8kB writeback:0kB shmem:127756kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:48kB pagetables:256kB sec_pagetables:0kB all_unreclaimable? no [ 1344.134866][T26085] Node 0 DMA free:15360kB boost:0kB min:208kB low:260kB high:312kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1344.255880][T26085] lowmem_reserve[]: 0 2465 2466 0 0 [ 1344.261208][T26085] Node 0 DMA32 free:1051980kB boost:76944kB min:111144kB low:119692kB high:128240kB reserved_highatomic:0KB active_anon:190416kB inactive_anon:55292kB active_file:29224kB inactive_file:194028kB unevictable:1536kB writepending:2296kB present:3129332kB managed:2551336kB mlocked:0kB bounce:0kB free_pcp:13312kB local_pcp:5216kB free_cma:0kB [ 1344.426992][T26085] lowmem_reserve[]: 0 0 0 0 0 [ 1344.431803][T26085] Node 0 Normal free:0kB boost:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:44kB inactive_anon:0kB active_file:0kB inactive_file:824kB unevictable:0kB writepending:0kB present:1048580kB managed:876kB mlocked:0kB bounce:0kB free_pcp:8kB local_pcp:8kB free_cma:0kB [ 1344.564161][T26085] lowmem_reserve[]: 0 0 0 0 0 [ 1344.568968][T26085] Node 1 Normal free:3739428kB boost:0kB min:55688kB low:69608kB high:83528kB reserved_highatomic:0KB active_anon:132032kB inactive_anon:0kB active_file:0kB inactive_file:7252kB unevictable:1536kB writepending:8kB present:4194300kB managed:4111164kB mlocked:0kB bounce:0kB free_pcp:25296kB local_pcp:14908kB free_cma:0kB [ 1344.693582][T26085] lowmem_reserve[]: 0 0 0 0 0 [ 1344.698388][T26085] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (UM) = 15360kB [ 1344.743227][T26085] Node 0 DMA32: 282*4kB (UME) 927*8kB (UME) 557*16kB (UME) 1124*32kB (UME) 1125*64kB (UME) 765*128kB (UME) 382*256kB (UME) 147*512kB (UME) 176*1024kB (UME) 97*2048kB (UM) 72*4096kB (UM) = 1070192kB [ 1344.832823][T26085] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 1344.852582][T26085] Node 1 Normal: 5*4kB (E) 6*8kB (UE) 2*16kB (ME) 1054*32kB (UM) 829*64kB (UME) 404*128kB (UME) 188*256kB (UME) 117*512kB (UME) 31*1024kB (UM) 26*2048kB (ME) 830*4096kB (UM) = 3731300kB [ 1345.001969][T26085] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1345.011592][T26085] Node 0 hugepages_total=2 hugepages_free=1 hugepages_surp=0 hugepages_size=2048kB [ 1345.050915][T26085] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 1345.071449][T26085] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 1345.080797][T26085] 134585 total pagecache pages [ 1345.104422][T26085] 2 pages in swap cache [ 1345.108670][T26085] Free swap = 108536kB [ 1345.113111][T26085] Total swap = 124996kB [ 1345.117285][T26085] 2097051 pages RAM [ 1345.121233][T26085] 0 pages HighMem/MovableOnly [ 1345.125934][T26085] 427367 pages reserved [ 1345.130108][T26085] 0 pages cma reserved [ 1346.480410][T26125] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6019'. [ 1346.981769][T26123] netlink: 338 bytes leftover after parsing attributes in process `syz.3.6020'. [ 1347.659555][T26132] FAULT_INJECTION: forcing a failure. [ 1347.659555][T26132] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1347.720271][T26132] CPU: 1 UID: 0 PID: 26132 Comm: syz.4.6022 Not tainted 6.13.0-rc5-syzkaller #0 [ 1347.729364][T26132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1347.739451][T26132] Call Trace: [ 1347.742748][T26132] [ 1347.745705][T26132] dump_stack_lvl+0x16c/0x1f0 [ 1347.750425][T26132] should_fail_ex+0x497/0x5b0 [ 1347.755146][T26132] _copy_to_iter+0x4a5/0x1400 [ 1347.759865][T26132] ? __pfx__copy_to_iter+0x10/0x10 [ 1347.765009][T26132] ? __virt_addr_valid+0x1a4/0x590 [ 1347.770160][T26132] ? __virt_addr_valid+0x5e/0x590 [ 1347.775243][T26132] ? __phys_addr_symbol+0x30/0x80 [ 1347.780298][T26132] ? __check_object_size+0x488/0x710 [ 1347.785711][T26132] seq_read_iter+0xd00/0x12b0 [ 1347.790439][T26132] seq_read+0x39f/0x4e0 [ 1347.794623][T26132] ? __pfx_seq_read+0x10/0x10 [ 1347.799351][T26132] full_proxy_read+0xfb/0x1b0 [ 1347.804061][T26132] ? __pfx_full_proxy_read+0x10/0x10 [ 1347.809383][T26132] vfs_read+0x1df/0xbe0 [ 1347.813569][T26132] ? __fget_files+0x1fc/0x3a0 [ 1347.818276][T26132] ? __pfx___mutex_lock+0x10/0x10 [ 1347.823334][T26132] ? __pfx_vfs_read+0x10/0x10 [ 1347.828047][T26132] ? __fget_files+0x206/0x3a0 [ 1347.832769][T26132] ksys_read+0x12b/0x250 [ 1347.837044][T26132] ? __pfx_ksys_read+0x10/0x10 [ 1347.841946][T26132] do_syscall_64+0xcd/0x250 [ 1347.846490][T26132] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1347.852423][T26132] RIP: 0033:0x7ff4bb985d29 [ 1347.856864][T26132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1347.876507][T26132] RSP: 002b:00007ff4bc780038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1347.884957][T26132] RAX: ffffffffffffffda RBX: 00007ff4bbb75fa0 RCX: 00007ff4bb985d29 [ 1347.892956][T26132] RDX: 000000000000002c RSI: 00000000200000c0 RDI: 0000000000000003 [ 1347.900955][T26132] RBP: 00007ff4bc780090 R08: 0000000000000000 R09: 0000000000000000 [ 1347.908952][T26132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1347.916947][T26132] R13: 0000000000000000 R14: 00007ff4bbb75fa0 R15: 00007fffb9638ab8 [ 1347.924992][T26132] [ 1349.670833][T26161] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6031'. [ 1349.857395][T26138] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6024'. [ 1349.964112][T26138] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1349.997906][T26138] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1350.072057][T26138] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1350.124870][T26138] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1351.400347][T26181] ima: policy update failed [ 1351.447839][ T29] audit: type=1802 audit(6030548589.904:32): pid=26181 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=policy_update cause=failed comm="syz.5.6036" res=0 errno=0 [ 1352.657778][T26219] netlink: 338 bytes leftover after parsing attributes in process `syz.4.6044'. [ 1353.276205][T26234] netlink: 'syz.2.6049': attribute type 27 has an invalid length. [ 1353.302617][T26234] netlink: 'syz.2.6049': attribute type 28 has an invalid length. [ 1353.317984][T26234] netlink: 'syz.2.6049': attribute type 29 has an invalid length. [ 1353.337324][T26234] netlink: 'syz.2.6049': attribute type 30 has an invalid length. [ 1353.350431][T26234] netlink: 'syz.2.6049': attribute type 31 has an invalid length. [ 1353.361061][T26234] netlink: 'syz.2.6049': attribute type 32 has an invalid length. [ 1353.370093][T26234] netlink: 'syz.2.6049': attribute type 33 has an invalid length. [ 1353.406446][T26234] netlink: 'syz.2.6049': attribute type 35 has an invalid length. [ 1353.440675][T26234] netlink: 'syz.2.6049': attribute type 37 has an invalid length. [ 1353.488445][T26234] netlink: 'syz.2.6049': attribute type 39 has an invalid length. [ 1353.497632][T26234] netlink: 14 bytes leftover after parsing attributes in process `syz.2.6049'. [ 1354.633971][T26265] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6057'. [ 1355.518761][T26277] netlink: 338 bytes leftover after parsing attributes in process `syz.2.6060'. [ 1355.534741][T26281] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6063'. [ 1356.669613][T26297] FAULT_INJECTION: forcing a failure. [ 1356.669613][T26297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1356.738470][T26297] CPU: 0 UID: 0 PID: 26297 Comm: syz.5.6068 Not tainted 6.13.0-rc5-syzkaller #0 [ 1356.747561][T26297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1356.757636][T26297] Call Trace: [ 1356.760929][T26297] [ 1356.763879][T26297] dump_stack_lvl+0x16c/0x1f0 [ 1356.768597][T26297] should_fail_ex+0x497/0x5b0 [ 1356.773308][T26297] strncpy_from_user+0x3b/0x2d0 [ 1356.778192][T26297] do_tcp_setsockopt+0x673/0x2820 [ 1356.783250][T26297] ? __pfx___mutex_trylock_common+0x10/0x10 [ 1356.789177][T26297] ? __pfx_do_tcp_setsockopt+0x10/0x10 [ 1356.794658][T26297] ? rcu_is_watching+0x12/0xc0 [ 1356.799451][T26297] ? trace_contention_end+0xee/0x140 [ 1356.804775][T26297] ? smc_setsockopt+0x101/0xc00 [ 1356.809691][T26297] tcp_setsockopt+0xe2/0x100 [ 1356.814318][T26297] smc_setsockopt+0x1b4/0xc00 [ 1356.819038][T26297] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 1356.824943][T26297] ? __pfx_smc_setsockopt+0x10/0x10 [ 1356.830171][T26297] ? __pfx_smc_setsockopt+0x10/0x10 [ 1356.835386][T26297] do_sock_setsockopt+0x222/0x480 [ 1356.840421][T26297] ? __pfx_do_sock_setsockopt+0x10/0x10 [ 1356.845972][T26297] ? lock_acquire+0x2f/0xb0 [ 1356.850499][T26297] __sys_setsockopt+0x1a0/0x230 [ 1356.855373][T26297] __x64_sys_setsockopt+0xbd/0x160 [ 1356.860498][T26297] ? do_syscall_64+0x91/0x250 [ 1356.865204][T26297] ? lockdep_hardirqs_on+0x7c/0x110 [ 1356.870511][T26297] do_syscall_64+0xcd/0x250 [ 1356.875044][T26297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1356.880960][T26297] RIP: 0033:0x7ff3b0f85d29 [ 1356.885383][T26297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1356.905004][T26297] RSP: 002b:00007ff3b1cde038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1356.913436][T26297] RAX: ffffffffffffffda RBX: 00007ff3b1175fa0 RCX: 00007ff3b0f85d29 [ 1356.921418][T26297] RDX: 000000000000000d RSI: 0000000000000006 RDI: 0000000000000006 [ 1356.929394][T26297] RBP: 00007ff3b1cde090 R08: 000000000000000c R09: 0000000000000000 [ 1356.937368][T26297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1356.945340][T26297] R13: 0000000000000000 R14: 00007ff3b1175fa0 R15: 00007fffb723ad38 [ 1356.953348][T26297] [ 1356.956456][ C0] vkms_vblank_simulate: vblank timer overrun [ 1358.531037][ T1296] ieee802154 phy0 wpan0: encryption failed: -22 [ 1358.539462][ T1296] ieee802154 phy1 wpan1: encryption failed: -22 [ 1358.948129][T26325] netlink: 338 bytes leftover after parsing attributes in process `syz.4.6076'. [ 1359.054542][T26333] FAULT_INJECTION: forcing a failure. [ 1359.054542][T26333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1359.097229][T26333] CPU: 0 UID: 0 PID: 26333 Comm: syz.3.6080 Not tainted 6.13.0-rc5-syzkaller #0 [ 1359.106317][T26333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1359.116398][T26333] Call Trace: [ 1359.119703][T26333] [ 1359.122667][T26333] dump_stack_lvl+0x16c/0x1f0 [ 1359.127382][T26333] should_fail_ex+0x497/0x5b0 [ 1359.132109][T26333] _copy_to_user+0x32/0xd0 [ 1359.136575][T26333] simple_read_from_buffer+0xd0/0x160 [ 1359.141976][T26333] proc_fail_nth_read+0x198/0x270 [ 1359.147053][T26333] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1359.152653][T26333] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1359.158245][T26333] vfs_read+0x1df/0xbe0 [ 1359.162441][T26333] ? lockdep_hardirqs_on+0x7c/0x110 [ 1359.167677][T26333] ? inet_stream_connect+0x79/0xa0 [ 1359.172822][T26333] ? __local_bh_enable_ip+0xa4/0x120 [ 1359.178149][T26333] ? __pfx_vfs_read+0x10/0x10 [ 1359.182867][T26333] ? __sys_connect_file+0x148/0x1a0 [ 1359.188114][T26333] ? __sys_connect+0xf2/0x170 [ 1359.192840][T26333] ? __pfx___sys_connect+0x10/0x10 [ 1359.198005][T26333] ksys_read+0x12b/0x250 [ 1359.202292][T26333] ? __pfx_ksys_read+0x10/0x10 [ 1359.207117][T26333] do_syscall_64+0xcd/0x250 [ 1359.211658][T26333] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1359.217573][T26333] RIP: 0033:0x7f991578473c [ 1359.222002][T26333] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1359.241629][T26333] RSP: 002b:00007f991656c030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1359.250063][T26333] RAX: ffffffffffffffda RBX: 00007f9915975fa0 RCX: 00007f991578473c [ 1359.258055][T26333] RDX: 000000000000000f RSI: 00007f991656c0a0 RDI: 0000000000000004 [ 1359.266038][T26333] RBP: 00007f991656c090 R08: 0000000000000000 R09: 0000000000000000 [ 1359.274021][T26333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1359.282004][T26333] R13: 0000000000000000 R14: 00007f9915975fa0 R15: 00007ffe86739ce8 [ 1359.290047][T26333] [ 1359.657429][T26335] ima: policy update failed [ 1359.662793][ T29] audit: type=1802 audit(6030548598.168:33): pid=26335 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=policy_update cause=failed comm="syz.4.6081" res=0 errno=0 [ 1361.119163][T26373] FAULT_INJECTION: forcing a failure. [ 1361.119163][T26373] name failslab, interval 1, probability 0, space 0, times 0 [ 1361.162323][T26373] CPU: 1 UID: 0 PID: 26373 Comm: syz.5.6090 Not tainted 6.13.0-rc5-syzkaller #0 [ 1361.171408][T26373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1361.181492][T26373] Call Trace: [ 1361.184792][T26373] [ 1361.187742][T26373] dump_stack_lvl+0x16c/0x1f0 [ 1361.192455][T26373] should_fail_ex+0x497/0x5b0 [ 1361.197180][T26373] ? fs_reclaim_acquire+0xae/0x150 [ 1361.202337][T26373] should_failslab+0xc2/0x120 [ 1361.207057][T26373] kmem_cache_alloc_node_noprof+0x72/0x3b0 [ 1361.212908][T26373] ? __alloc_skb+0x2b3/0x380 [ 1361.217533][T26373] __alloc_skb+0x2b3/0x380 [ 1361.221981][T26373] ? __pfx___alloc_skb+0x10/0x10 [ 1361.226959][T26373] ? lock_acquire+0x2f/0xb0 [ 1361.231497][T26373] netlink_alloc_large_skb+0x69/0x130 [ 1361.236901][T26373] netlink_sendmsg+0x689/0xd70 [ 1361.241700][T26373] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1361.247025][T26373] ____sys_sendmsg+0x9ae/0xb40 [ 1361.251824][T26373] ? copy_msghdr_from_user+0x10b/0x160 [ 1361.257325][T26373] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1361.262652][T26373] ? get_pid_task+0xfc/0x250 [ 1361.267283][T26373] ___sys_sendmsg+0x135/0x1e0 [ 1361.271999][T26373] ? __pfx____sys_sendmsg+0x10/0x10 [ 1361.277259][T26373] ? __pfx_vfs_write+0x10/0x10 [ 1361.282054][T26373] ? do_sys_openat2+0xb1/0x1e0 [ 1361.286866][T26373] __sys_sendmsg+0x16e/0x220 [ 1361.291496][T26373] ? __pfx___sys_sendmsg+0x10/0x10 [ 1361.296658][T26373] do_syscall_64+0xcd/0x250 [ 1361.301193][T26373] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1361.307119][T26373] RIP: 0033:0x7ff3b0f85d29 [ 1361.311553][T26373] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1361.331191][T26373] RSP: 002b:00007ff3b1cde038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1361.339639][T26373] RAX: ffffffffffffffda RBX: 00007ff3b1175fa0 RCX: 00007ff3b0f85d29 [ 1361.347640][T26373] RDX: 0000000000008800 RSI: 0000000020000a40 RDI: 0000000000000002 [ 1361.355641][T26373] RBP: 00007ff3b1cde090 R08: 0000000000000000 R09: 0000000000000000 [ 1361.363641][T26373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1361.371636][T26373] R13: 0000000000000000 R14: 00007ff3b1175fa0 R15: 00007fffb723ad38 [ 1361.379646][T26373] [ 1361.808752][T26374] ima: policy update failed [ 1361.814724][ T29] audit: type=1802 audit(6030548600.330:34): pid=26374 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=policy_update cause=failed comm="syz.3.6092" res=0 errno=0 [ 1362.209506][T26401] FAULT_INJECTION: forcing a failure. [ 1362.209506][T26401] name failslab, interval 1, probability 0, space 0, times 0 [ 1362.238654][T26401] CPU: 1 UID: 0 PID: 26401 Comm: syz.3.6099 Not tainted 6.13.0-rc5-syzkaller #0 [ 1362.247777][T26401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1362.257869][T26401] Call Trace: [ 1362.261161][T26401] [ 1362.264098][T26401] dump_stack_lvl+0x16c/0x1f0 [ 1362.268797][T26401] should_fail_ex+0x497/0x5b0 [ 1362.273488][T26401] ? fs_reclaim_acquire+0xae/0x150 [ 1362.278615][T26401] should_failslab+0xc2/0x120 [ 1362.283309][T26401] __kmalloc_node_noprof+0xd1/0x520 [ 1362.288528][T26401] ? __kvmalloc_node_noprof+0xad/0x1a0 [ 1362.294014][T26401] __kvmalloc_node_noprof+0xad/0x1a0 [ 1362.299315][T26401] seq_read_iter+0x82a/0x12b0 [ 1362.304016][T26401] ? __pfx_aa_file_perm+0x10/0x10 [ 1362.309067][T26401] seq_read+0x39f/0x4e0 [ 1362.313239][T26401] ? __pfx_seq_read+0x10/0x10 [ 1362.317951][T26401] ? __pfx_seq_read+0x10/0x10 [ 1362.322645][T26401] vfs_read+0x1df/0xbe0 [ 1362.326822][T26401] ? __fget_files+0x1fc/0x3a0 [ 1362.331515][T26401] ? __pfx___mutex_lock+0x10/0x10 [ 1362.336560][T26401] ? __pfx_vfs_read+0x10/0x10 [ 1362.341265][T26401] ? __fget_files+0x206/0x3a0 [ 1362.345966][T26401] ksys_read+0x12b/0x250 [ 1362.350228][T26401] ? __pfx_ksys_read+0x10/0x10 [ 1362.355017][T26401] do_syscall_64+0xcd/0x250 [ 1362.359542][T26401] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1362.365450][T26401] RIP: 0033:0x7f9915785d29 [ 1362.369876][T26401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1362.389497][T26401] RSP: 002b:00007f991656c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1362.397922][T26401] RAX: ffffffffffffffda RBX: 00007f9915975fa0 RCX: 00007f9915785d29 [ 1362.405904][T26401] RDX: 0000000000001000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 1362.413889][T26401] RBP: 00007f991656c090 R08: 0000000000000000 R09: 0000000000000000 [ 1362.421873][T26401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1362.429857][T26401] R13: 0000000000000000 R14: 00007f9915975fa0 R15: 00007ffe86739ce8 [ 1362.437851][T26401] [ 1362.832610][T26412] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6102'. [ 1363.035870][T26418] FAULT_INJECTION: forcing a failure. [ 1363.035870][T26418] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1363.094018][T26418] CPU: 0 UID: 0 PID: 26418 Comm: syz.3.6103 Not tainted 6.13.0-rc5-syzkaller #0 [ 1363.103110][T26418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1363.113190][T26418] Call Trace: [ 1363.116489][T26418] [ 1363.119439][T26418] dump_stack_lvl+0x16c/0x1f0 [ 1363.124163][T26418] should_fail_ex+0x497/0x5b0 [ 1363.128875][T26418] _copy_from_user+0x2e/0xd0 [ 1363.133495][T26418] copy_msghdr_from_user+0x99/0x160 [ 1363.138728][T26418] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1363.144581][T26418] ___sys_sendmsg+0xff/0x1e0 [ 1363.149206][T26418] ? __pfx____sys_sendmsg+0x10/0x10 [ 1363.154446][T26418] ? __pfx_lock_release+0x10/0x10 [ 1363.159504][T26418] ? trace_lock_acquire+0x14e/0x1f0 [ 1363.164755][T26418] ? __fget_files+0x206/0x3a0 [ 1363.169482][T26418] __sys_sendmsg+0x16e/0x220 [ 1363.174111][T26418] ? __pfx___sys_sendmsg+0x10/0x10 [ 1363.179275][T26418] do_syscall_64+0xcd/0x250 [ 1363.183828][T26418] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1363.189758][T26418] RIP: 0033:0x7f9915785d29 [ 1363.194206][T26418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1363.213847][T26418] RSP: 002b:00007f991656c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1363.222295][T26418] RAX: ffffffffffffffda RBX: 00007f9915975fa0 RCX: 00007f9915785d29 [ 1363.230301][T26418] RDX: 0000000000000002 RSI: 00000000200079c0 RDI: 0000000000000003 [ 1363.238306][T26418] RBP: 00007f991656c090 R08: 0000000000000000 R09: 0000000000000000 [ 1363.246308][T26418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1363.254309][T26418] R13: 0000000000000000 R14: 00007f9915975fa0 R15: 00007ffe86739ce8 [ 1363.262332][T26418] [ 1363.864955][T26426] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6107'. [ 1363.872409][T26431] netlink: 338 bytes leftover after parsing attributes in process `syz.3.6109'. [ 1364.551576][T26435] FAULT_INJECTION: forcing a failure. [ 1364.551576][T26435] name failslab, interval 1, probability 0, space 0, times 0 [ 1364.564898][T26435] CPU: 1 UID: 0 PID: 26435 Comm: syz.4.6110 Not tainted 6.13.0-rc5-syzkaller #0 [ 1364.573964][T26435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1364.584053][T26435] Call Trace: [ 1364.587355][T26435] [ 1364.590305][T26435] dump_stack_lvl+0x116/0x1f0 [ 1364.595015][T26435] should_fail_ex+0x497/0x5b0 [ 1364.599733][T26435] should_failslab+0xc2/0x120 [ 1364.604453][T26435] __kmalloc_node_track_caller_noprof+0xcf/0x520 [ 1364.610822][T26435] ? trace_lock_acquire+0x14e/0x1f0 [ 1364.616058][T26435] ? netlink_realloc_groups+0x1a8/0x2a0 [ 1364.621645][T26435] krealloc_noprof+0x1fb/0x360 [ 1364.626450][T26435] netlink_realloc_groups+0x1a8/0x2a0 [ 1364.631856][T26435] netlink_setsockopt+0x515/0x8f0 [ 1364.636916][T26435] ? __pfx_netlink_setsockopt+0x10/0x10 [ 1364.642505][T26435] ? __pfx_netlink_setsockopt+0x10/0x10 [ 1364.648083][T26435] do_sock_setsockopt+0x222/0x480 [ 1364.653136][T26435] ? __pfx_do_sock_setsockopt+0x10/0x10 [ 1364.658715][T26435] ? lock_acquire+0x2f/0xb0 [ 1364.663264][T26435] __sys_setsockopt+0x1a0/0x230 [ 1364.668161][T26435] __x64_sys_setsockopt+0xbd/0x160 [ 1364.673317][T26435] ? do_syscall_64+0x91/0x250 [ 1364.678039][T26435] ? lockdep_hardirqs_on+0x7c/0x110 [ 1364.683279][T26435] do_syscall_64+0xcd/0x250 [ 1364.687824][T26435] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1364.693754][T26435] RIP: 0033:0x7ff4bb985d29 [ 1364.698197][T26435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1364.717842][T26435] RSP: 002b:00007ff4bc780038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1364.726300][T26435] RAX: ffffffffffffffda RBX: 00007ff4bbb75fa0 RCX: 00007ff4bb985d29 [ 1364.734330][T26435] RDX: 0000000000000001 RSI: 104000000000010e RDI: 0000000000000005 [ 1364.742342][T26435] RBP: 00007ff4bc780090 R08: 0000000000000016 R09: 0000000000000000 [ 1364.750341][T26435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1364.758330][T26435] R13: 0000000000000000 R14: 00007ff4bbb75fa0 R15: 00007fffb9638ab8 [ 1364.766337][T26435] [ 1365.343825][T26445] FAULT_INJECTION: forcing a failure. [ 1365.343825][T26445] name failslab, interval 1, probability 0, space 0, times 0 [ 1365.357101][T26445] CPU: 1 UID: 0 PID: 26445 Comm: syz.3.6114 Not tainted 6.13.0-rc5-syzkaller #0 [ 1365.366164][T26445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1365.376254][T26445] Call Trace: [ 1365.379554][T26445] [ 1365.382508][T26445] dump_stack_lvl+0x16c/0x1f0 [ 1365.387223][T26445] should_fail_ex+0x497/0x5b0 [ 1365.391931][T26445] ? rcu_is_watching+0x12/0xc0 [ 1365.396740][T26445] should_failslab+0xc2/0x120 [ 1365.401460][T26445] kmem_cache_alloc_noprof+0x6e/0x3b0 [ 1365.406868][T26445] ? lock_acquire+0x2f/0xb0 [ 1365.411400][T26445] ? __inet_hash_connect+0x69f/0x1900 [ 1365.416804][T26445] ? __inet_hash_connect+0x918/0x1900 [ 1365.422218][T26445] __inet_hash_connect+0x918/0x1900 [ 1365.427464][T26445] ? __pfx___inet6_check_established+0x10/0x10 [ 1365.433667][T26445] ? __pfx___inet_hash_connect+0x10/0x10 [ 1365.439341][T26445] ? rcu_is_watching+0x12/0xc0 [ 1365.444146][T26445] dccp_v6_connect+0x9ef/0x1550 [ 1365.449040][T26445] ? __pfx_dccp_v6_connect+0x10/0x10 [ 1365.454383][T26445] ? __pfx_mark_lock+0x10/0x10 [ 1365.459195][T26445] __inet_stream_connect+0x3c7/0x1020 [ 1365.464599][T26445] ? find_held_lock+0x2d/0x110 [ 1365.469401][T26445] ? __pfx___inet_stream_connect+0x10/0x10 [ 1365.475236][T26445] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 1365.480643][T26445] ? __pfx_inet_stream_connect+0x10/0x10 [ 1365.486307][T26445] ? mark_held_locks+0x9f/0xe0 [ 1365.491108][T26445] ? __local_bh_enable_ip+0xa4/0x120 [ 1365.496426][T26445] ? __pfx_inet_stream_connect+0x10/0x10 [ 1365.502093][T26445] inet_stream_connect+0x57/0xa0 [ 1365.507064][T26445] __sys_connect_file+0x13e/0x1a0 [ 1365.512125][T26445] __sys_connect+0x14f/0x170 [ 1365.516762][T26445] ? __pfx___sys_connect+0x10/0x10 [ 1365.521924][T26445] ? __pfx_ksys_write+0x10/0x10 [ 1365.526809][T26445] __x64_sys_connect+0x72/0xb0 [ 1365.531601][T26445] ? lockdep_hardirqs_on+0x7c/0x110 [ 1365.536835][T26445] do_syscall_64+0xcd/0x250 [ 1365.541379][T26445] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1365.547306][T26445] RIP: 0033:0x7f9915785d29 [ 1365.551745][T26445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1365.571394][T26445] RSP: 002b:00007f991656c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1365.579853][T26445] RAX: ffffffffffffffda RBX: 00007f9915975fa0 RCX: 00007f9915785d29 [ 1365.587859][T26445] RDX: 0000000000000055 RSI: 00000000200018c0 RDI: 0000000000000003 [ 1365.595867][T26445] RBP: 00007f991656c090 R08: 0000000000000000 R09: 0000000000000000 [ 1365.603867][T26445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1365.611873][T26445] R13: 0000000000000000 R14: 00007f9915975fa0 R15: 00007ffe86739ce8 [ 1365.619894][T26445] [ 1366.188621][T26451] Process accounting paused [ 1366.281308][T26461] FAULT_INJECTION: forcing a failure. [ 1366.281308][T26461] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1366.326971][T26461] CPU: 0 UID: 0 PID: 26461 Comm: syz.3.6119 Not tainted 6.13.0-rc5-syzkaller #0 [ 1366.336070][T26461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1366.346189][T26461] Call Trace: [ 1366.349495][T26461] [ 1366.352450][T26461] dump_stack_lvl+0x16c/0x1f0 [ 1366.357166][T26461] should_fail_ex+0x497/0x5b0 [ 1366.361886][T26461] ? fs_reclaim_acquire+0xae/0x150 [ 1366.367040][T26461] should_fail_alloc_page+0xe7/0x130 [ 1366.372374][T26461] prepare_alloc_pages.constprop.0+0x16f/0x560 [ 1366.378572][T26461] __alloc_pages_noprof+0x190/0x25b0 [ 1366.383908][T26461] ? __pfx_mark_lock+0x10/0x10 [ 1366.388724][T26461] ? hlock_class+0x4e/0x130 [ 1366.393266][T26461] ? mark_lock+0xb5/0xc60 [ 1366.397651][T26461] ? hlock_class+0x4e/0x130 [ 1366.402205][T26461] ? mark_lock+0xb5/0xc60 [ 1366.406578][T26461] ? __pfx___alloc_pages_noprof+0x10/0x10 [ 1366.412341][T26461] ? hlock_class+0x4e/0x130 [ 1366.416900][T26461] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1366.422834][T26461] ? policy_nodemask+0xea/0x4e0 [ 1366.427730][T26461] alloc_pages_mpol_noprof+0x2c9/0x610 [ 1366.433235][T26461] ? __pfx_alloc_pages_mpol_noprof+0x10/0x10 [ 1366.439265][T26461] ? find_held_lock+0x2d/0x110 [ 1366.444075][T26461] ? __thp_vma_allowable_orders+0x1ca/0xb30 [ 1366.450026][T26461] __pmd_alloc+0x3f/0x860 [ 1366.454396][T26461] __handle_mm_fault+0x94a/0x2a40 [ 1366.459470][T26461] ? __pfx___handle_mm_fault+0x10/0x10 [ 1366.464970][T26461] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1366.470656][T26461] ? find_vma+0xc0/0x140 [ 1366.474934][T26461] ? __pfx_find_vma+0x10/0x10 [ 1366.479650][T26461] handle_mm_fault+0x3fa/0xaa0 [ 1366.484460][T26461] do_user_addr_fault+0x7a3/0x13f0 [ 1366.489610][T26461] exc_page_fault+0x5c/0xc0 [ 1366.494162][T26461] asm_exc_page_fault+0x26/0x30 [ 1366.499044][T26461] RIP: 0010:rep_movs_alternative+0x30/0x70 [ 1366.504889][T26461] Code: f9 40 73 40 83 f9 08 73 21 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 cc cc cc cc 66 0f 1f 84 00 00 00 00 00 <48> 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 [ 1366.524532][T26461] RSP: 0018:ffffc9000d127dd0 EFLAGS: 00050246 [ 1366.530640][T26461] RAX: 0000000000000001 RBX: 0000000000000005 RCX: 0000000000000008 [ 1366.538643][T26461] RDX: fffff52001a24fc7 RSI: 0000000000000005 RDI: ffffc9000d127e30 [ 1366.546650][T26461] RBP: 0000000000000008 R08: 0000000000000001 R09: fffff52001a24fc6 [ 1366.554663][T26461] R10: ffffc9000d127e37 R11: 0000000000000000 R12: 0000000000000000 [ 1366.562674][T26461] R13: ffffc9000d127e30 R14: 000000000000000f R15: dffffc0000000000 [ 1366.570696][T26461] _copy_from_user+0x9a/0xd0 [ 1366.575339][T26461] do_fcntl+0xd73/0x15b0 [ 1366.579636][T26461] ? __pfx_do_fcntl+0x10/0x10 [ 1366.584375][T26461] ? tomoyo_file_fcntl+0x6c/0xc0 [ 1366.589374][T26461] __x64_sys_fcntl+0x170/0x200 [ 1366.594195][T26461] do_syscall_64+0xcd/0x250 [ 1366.598747][T26461] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1366.604682][T26461] RIP: 0033:0x7f9915785d29 [ 1366.609125][T26461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1366.628777][T26461] RSP: 002b:00007f991656c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 1366.637238][T26461] RAX: ffffffffffffffda RBX: 00007f9915975fa0 RCX: 00007f9915785d29 [ 1366.645247][T26461] RDX: 0000000000000005 RSI: 000000000000000f RDI: 0000000000000003 [ 1366.653262][T26461] RBP: 00007f991656c090 R08: 0000000000000000 R09: 0000000000000000 [ 1366.661298][T26461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1366.669305][T26461] R13: 0000000000000000 R14: 00007f9915975fa0 R15: 00007ffe86739ce8 [ 1366.677332][T26461] [ 1367.310014][T26476] netlink: 338 bytes leftover after parsing attributes in process `syz.4.6123'. [ 1368.340634][T26484] netlink: 342 bytes leftover after parsing attributes in process `syz.4.6126'. [ 1368.466237][T26486] FAULT_INJECTION: forcing a failure. [ 1368.466237][T26486] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1368.489639][T26486] CPU: 1 UID: 0 PID: 26486 Comm: syz.4.6127 Not tainted 6.13.0-rc5-syzkaller #0 [ 1368.498725][T26486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1368.508796][T26486] Call Trace: [ 1368.512082][T26486] [ 1368.515021][T26486] dump_stack_lvl+0x16c/0x1f0 [ 1368.519720][T26486] should_fail_ex+0x497/0x5b0 [ 1368.524419][T26486] _copy_from_user+0x2e/0xd0 [ 1368.529036][T26486] copy_msghdr_from_user+0x99/0x160 [ 1368.534259][T26486] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1368.540084][T26486] ? __lock_acquire+0xcc5/0x3c40 [ 1368.545050][T26486] ___sys_sendmsg+0xff/0x1e0 [ 1368.549662][T26486] ? __pfx____sys_sendmsg+0x10/0x10 [ 1368.554890][T26486] ? trace_lock_acquire+0x14e/0x1f0 [ 1368.560125][T26486] __sys_sendmmsg+0x201/0x420 [ 1368.564832][T26486] ? __pfx___sys_sendmmsg+0x10/0x10 [ 1368.570060][T26486] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1368.576070][T26486] ? fput+0x67/0x440 [ 1368.579990][T26486] ? ksys_write+0x1ba/0x250 [ 1368.584505][T26486] ? __pfx_ksys_write+0x10/0x10 [ 1368.589374][T26486] __x64_sys_sendmmsg+0x9c/0x100 [ 1368.594338][T26486] ? lockdep_hardirqs_on+0x7c/0x110 [ 1368.599555][T26486] do_syscall_64+0xcd/0x250 [ 1368.604076][T26486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1368.609989][T26486] RIP: 0033:0x7ff4bb985d29 [ 1368.614417][T26486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1368.634042][T26486] RSP: 002b:00007ff4bc780038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1368.642477][T26486] RAX: ffffffffffffffda RBX: 00007ff4bbb75fa0 RCX: 00007ff4bb985d29 [ 1368.650460][T26486] RDX: 0000000000000007 RSI: 0000000020000200 RDI: 0000000000000003 [ 1368.658440][T26486] RBP: 00007ff4bc780090 R08: 0000000000000000 R09: 0000000000000000 [ 1368.666419][T26486] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 1368.674396][T26486] R13: 0000000000000000 R14: 00007ff4bbb75fa0 R15: 00007fffb9638ab8 [ 1368.682390][T26486] [ 1370.516580][T26506] netlink: 338 bytes leftover after parsing attributes in process `syz.4.6134'. [ 1371.380816][T26517] FAULT_INJECTION: forcing a failure. [ 1371.380816][T26517] name failslab, interval 1, probability 0, space 0, times 0 [ 1371.427146][T26517] CPU: 1 UID: 0 PID: 26517 Comm: syz.5.6138 Not tainted 6.13.0-rc5-syzkaller #0 [ 1371.436237][T26517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1371.446319][T26517] Call Trace: [ 1371.449607][T26517] [ 1371.452552][T26517] dump_stack_lvl+0x16c/0x1f0 [ 1371.457249][T26517] should_fail_ex+0x497/0x5b0 [ 1371.461943][T26517] ? fs_reclaim_acquire+0xae/0x150 [ 1371.467069][T26517] should_failslab+0xc2/0x120 [ 1371.471768][T26517] kmem_cache_alloc_noprof+0x6e/0x3b0 [ 1371.477159][T26517] ? getname_flags.part.0+0x4c/0x550 [ 1371.482477][T26517] getname_flags.part.0+0x4c/0x550 [ 1371.487621][T26517] getname_flags+0x93/0xf0 [ 1371.492055][T26517] user_path_at+0x24/0x60 [ 1371.496400][T26517] __x64_sys_chdir+0xbf/0x270 [ 1371.501095][T26517] ? ksys_write+0x1ba/0x250 [ 1371.505613][T26517] ? __pfx___x64_sys_chdir+0x10/0x10 [ 1371.510925][T26517] do_syscall_64+0xcd/0x250 [ 1371.515448][T26517] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1371.521359][T26517] RIP: 0033:0x7ff3b0f85d29 [ 1371.525786][T26517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1371.545411][T26517] RSP: 002b:00007ff3b1cde038 EFLAGS: 00000246 ORIG_RAX: 0000000000000050 [ 1371.553843][T26517] RAX: ffffffffffffffda RBX: 00007ff3b1175fa0 RCX: 00007ff3b0f85d29 [ 1371.561823][T26517] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 1371.569808][T26517] RBP: 00007ff3b1cde090 R08: 0000000000000000 R09: 0000000000000000 [ 1371.577790][T26517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1371.585774][T26517] R13: 0000000000000000 R14: 00007ff3b1175fa0 R15: 00007fffb723ad38 [ 1371.593775][T26517] [ 1372.833287][T26543] netlink: 342 bytes leftover after parsing attributes in process `syz.4.6145'. [ 1373.086350][T26547] FAULT_INJECTION: forcing a failure. [ 1373.086350][T26547] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1373.168421][T26547] CPU: 1 UID: 0 PID: 26547 Comm: syz.2.6146 Not tainted 6.13.0-rc5-syzkaller #0 [ 1373.177518][T26547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1373.187611][T26547] Call Trace: [ 1373.190919][T26547] [ 1373.193876][T26547] dump_stack_lvl+0x16c/0x1f0 [ 1373.198597][T26547] should_fail_ex+0x497/0x5b0 [ 1373.203366][T26547] ? fs_reclaim_acquire+0xae/0x150 [ 1373.208518][T26547] should_fail_alloc_page+0xe7/0x130 [ 1373.213841][T26547] prepare_alloc_pages.constprop.0+0x16f/0x560 [ 1373.220019][T26547] __alloc_pages_noprof+0x190/0x25b0 [ 1373.225328][T26547] ? hlock_class+0x4e/0x130 [ 1373.229852][T26547] ? mark_lock+0xb5/0xc60 [ 1373.234205][T26547] ? hlock_class+0x4e/0x130 [ 1373.238722][T26547] ? __pfx_mark_lock+0x10/0x10 [ 1373.243507][T26547] ? __pfx___alloc_pages_noprof+0x10/0x10 [ 1373.249253][T26547] ? __lock_acquire+0x15a9/0x3c40 [ 1373.254299][T26547] ? mark_lock+0xb5/0xc60 [ 1373.258663][T26547] ? hlock_class+0x4e/0x130 [ 1373.263187][T26547] ? __lock_acquire+0xcc5/0x3c40 [ 1373.268137][T26547] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1373.274134][T26547] ? policy_nodemask+0xea/0x4e0 [ 1373.279011][T26547] alloc_pages_mpol_noprof+0x2c9/0x610 [ 1373.284499][T26547] ? __pfx_alloc_pages_mpol_noprof+0x10/0x10 [ 1373.290503][T26547] ? __lock_acquire+0xcc5/0x3c40 [ 1373.295456][T26547] folio_alloc_mpol_noprof+0x36/0xd0 [ 1373.300753][T26547] vma_alloc_folio_noprof+0xee/0x1b0 [ 1373.306053][T26547] ? __pfx_vma_alloc_folio_noprof+0x10/0x10 [ 1373.311963][T26547] ? find_held_lock+0x2d/0x110 [ 1373.316751][T26547] do_pte_missing+0x2017/0x3e00 [ 1373.321634][T26547] __handle_mm_fault+0x103c/0x2a40 [ 1373.326770][T26547] ? lock_vma_under_rcu+0x6b9/0x980 [ 1373.331984][T26547] ? __pfx___handle_mm_fault+0x10/0x10 [ 1373.337482][T26547] handle_mm_fault+0x3fa/0xaa0 [ 1373.342269][T26547] do_user_addr_fault+0x60d/0x13f0 [ 1373.347404][T26547] exc_page_fault+0x5c/0xc0 [ 1373.351923][T26547] asm_exc_page_fault+0x26/0x30 [ 1373.356792][T26547] RIP: 0033:0x7fcd0b851b1b [ 1373.361221][T26547] Code: 00 00 00 48 8d 3d fd 33 19 00 48 89 c1 31 c0 e8 6b 44 ff ff eb d2 66 0f 1f 84 00 00 00 00 00 55 31 c0 53 48 81 ec 68 10 00 00 <48> 89 7c 24 08 48 8d 3d 31 34 19 00 48 89 34 24 48 8b 14 24 48 8b [ 1373.380842][T26547] RSP: 002b:00007fcd0c80cfb0 EFLAGS: 00010202 [ 1373.386922][T26547] RAX: 0000000000000000 RBX: 00007fcd0bb75fa0 RCX: 0000000000000000 [ 1373.394904][T26547] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000300 [ 1373.402881][T26547] RBP: 00007fcd0c80e090 R08: 0000000000000000 R09: 0000000000000000 [ 1373.410860][T26547] R10: 0000000020000300 R11: 0000000000000000 R12: 0000000000000001 [ 1373.418842][T26547] R13: 0000000000000000 R14: 00007fcd0bb75fa0 R15: 00007ffda8950488 [ 1373.426835][T26547] [ 1373.614431][T26547] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 1374.697578][T26566] FAULT_INJECTION: forcing a failure. [ 1374.697578][T26566] name failslab, interval 1, probability 0, space 0, times 0 [ 1374.796110][T26568] sctp: [Deprecated]: syz.3.6152 (pid 26568) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1374.796110][T26568] Use struct sctp_sack_info instead [ 1374.855507][T26566] CPU: 1 UID: 0 PID: 26566 Comm: syz.2.6153 Not tainted 6.13.0-rc5-syzkaller #0 [ 1374.864599][T26566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1374.874690][T26566] Call Trace: [ 1374.877994][T26566] [ 1374.880951][T26566] dump_stack_lvl+0x16c/0x1f0 [ 1374.885669][T26566] should_fail_ex+0x497/0x5b0 [ 1374.890385][T26566] ? fs_reclaim_acquire+0xae/0x150 [ 1374.895529][T26566] should_failslab+0xc2/0x120 [ 1374.900239][T26566] kmem_cache_alloc_noprof+0x6e/0x3b0 [ 1374.905644][T26566] ? __thp_vma_allowable_orders+0x1ca/0xb30 [ 1374.911586][T26566] ? __pmd_alloc+0xc3/0x860 [ 1374.916141][T26566] __pmd_alloc+0xc3/0x860 [ 1374.920515][T26566] __handle_mm_fault+0x94a/0x2a40 [ 1374.925595][T26566] ? __pfx___handle_mm_fault+0x10/0x10 [ 1374.931097][T26566] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1374.936775][T26566] ? find_vma+0xc0/0x140 [ 1374.941054][T26566] ? __pfx_find_vma+0x10/0x10 [ 1374.945773][T26566] handle_mm_fault+0x3fa/0xaa0 [ 1374.950590][T26566] do_user_addr_fault+0x7a3/0x13f0 [ 1374.955744][T26566] exc_page_fault+0x5c/0xc0 [ 1374.960282][T26566] asm_exc_page_fault+0x26/0x30 [ 1374.965171][T26566] RIP: 0010:__get_user_8+0x1a/0x30 [ 1374.970319][T26566] Code: 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 ba 00 f0 ff ff ff 7f 00 00 48 39 c2 48 19 d2 48 09 d0 0f 01 cb <48> 8b 10 31 c0 0f 01 ca c3 cc cc cc cc 66 0f 1f 84 00 00 00 00 00 [ 1374.989961][T26566] RSP: 0018:ffffc9000d6c7ef0 EFLAGS: 00050246 [ 1374.996069][T26566] RAX: 0000000000000000 RBX: ffffc9000d6c7f58 RCX: ffffc9000d6c7e58 [ 1375.004078][T26566] RDX: 0000000000000000 RSI: ffffffff8226a93b RDI: ffffffff8bb17040 [ 1375.012089][T26566] RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff2039caa [ 1375.020097][T26566] R10: ffffffff901ce557 R11: 0000000000000000 R12: 00000000000000ce [ 1375.028103][T26566] R13: 0000000000000401 R14: 0000000000000000 R15: 0000000000000000 [ 1375.036137][T26566] ? __x64_sys_io_setup+0x6b/0x210 [ 1375.041289][T26566] __x64_sys_io_setup+0x73/0x210 [ 1375.046265][T26566] do_syscall_64+0xcd/0x250 [ 1375.050811][T26566] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1375.056743][T26566] RIP: 0033:0x7fcd0b985d29 [ 1375.061184][T26566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1375.080823][T26566] RSP: 002b:00007fcd0c80e038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 1375.089271][T26566] RAX: ffffffffffffffda RBX: 00007fcd0bb75fa0 RCX: 00007fcd0b985d29 [ 1375.097273][T26566] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000401 [ 1375.105274][T26566] RBP: 00007fcd0c80e090 R08: 0000000000000000 R09: 0000000000000000 [ 1375.113273][T26566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1375.121273][T26566] R13: 0000000000000000 R14: 00007fcd0bb75fa0 R15: 00007ffda8950488 [ 1375.129293][T26566] [ 1375.233896][T26571] can: request_module (can-proto-0) failed. [ 1376.183527][T26595] netlink: 342 bytes leftover after parsing attributes in process `syz.3.6158'. [ 1377.871257][T26614] bdi 31:0: the stable_pages_required attribute has been removed. Use the stable_writes queue attribute instead. [ 1379.207659][T26630] sctp: [Deprecated]: syz.5.6168 (pid 26630) Use of int in maxseg socket option. [ 1379.207659][T26630] Use struct sctp_assoc_value instead [ 1381.187096][T26648] netlink: 342 bytes leftover after parsing attributes in process `syz.5.6173'. [ 1381.196939][T26652] FAULT_INJECTION: forcing a failure. [ 1381.196939][T26652] name failslab, interval 1, probability 0, space 0, times 0 [ 1381.246050][T26652] CPU: 1 UID: 0 PID: 26652 Comm: syz.2.6175 Not tainted 6.13.0-rc5-syzkaller #0 [ 1381.255139][T26652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1381.265222][T26652] Call Trace: [ 1381.268524][T26652] [ 1381.271475][T26652] dump_stack_lvl+0x16c/0x1f0 [ 1381.276196][T26652] should_fail_ex+0x497/0x5b0 [ 1381.280907][T26652] ? fs_reclaim_acquire+0xae/0x150 [ 1381.286054][T26652] should_failslab+0xc2/0x120 [ 1381.290767][T26652] kmem_cache_alloc_node_noprof+0x72/0x3b0 [ 1381.296614][T26652] ? __alloc_skb+0x2b3/0x380 [ 1381.301244][T26652] __alloc_skb+0x2b3/0x380 [ 1381.305701][T26652] ? __pfx___alloc_skb+0x10/0x10 [ 1381.310676][T26652] ? lock_acquire+0x2f/0xb0 [ 1381.315218][T26652] netlink_alloc_large_skb+0x69/0x130 [ 1381.320626][T26652] netlink_sendmsg+0x689/0xd70 [ 1381.325423][T26652] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1381.330742][T26652] ____sys_sendmsg+0x9ae/0xb40 [ 1381.335527][T26652] ? copy_msghdr_from_user+0x10b/0x160 [ 1381.341004][T26652] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1381.346318][T26652] ___sys_sendmsg+0x135/0x1e0 [ 1381.351015][T26652] ? __pfx____sys_sendmsg+0x10/0x10 [ 1381.356246][T26652] ? __pfx_lock_release+0x10/0x10 [ 1381.361286][T26652] ? trace_lock_acquire+0x14e/0x1f0 [ 1381.366516][T26652] ? __fget_files+0x206/0x3a0 [ 1381.371216][T26652] __sys_sendmsg+0x16e/0x220 [ 1381.375827][T26652] ? __pfx___sys_sendmsg+0x10/0x10 [ 1381.380973][T26652] do_syscall_64+0xcd/0x250 [ 1381.385499][T26652] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1381.391408][T26652] RIP: 0033:0x7fcd0b985d29 [ 1381.395831][T26652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1381.415538][T26652] RSP: 002b:00007fcd0c80e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1381.423966][T26652] RAX: ffffffffffffffda RBX: 00007fcd0bb75fa0 RCX: 00007fcd0b985d29 [ 1381.431947][T26652] RDX: 0000000000040000 RSI: 0000000020000240 RDI: 0000000000000003 [ 1381.439924][T26652] RBP: 00007fcd0c80e090 R08: 0000000000000000 R09: 0000000000000000 [ 1381.447908][T26652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1381.455892][T26652] R13: 0000000000000000 R14: 00007fcd0bb75fa0 R15: 00007ffda8950488 [ 1381.463885][T26652] [ 1381.521174][T26654] aoe: can't write to that file. [ 1384.082747][T26710] FAULT_INJECTION: forcing a failure. [ 1384.082747][T26710] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1384.131169][T26710] CPU: 0 UID: 0 PID: 26710 Comm: syz.2.6192 Not tainted 6.13.0-rc5-syzkaller #0 [ 1384.140268][T26710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1384.150353][T26710] Call Trace: [ 1384.153649][T26710] [ 1384.156596][T26710] dump_stack_lvl+0x16c/0x1f0 [ 1384.161314][T26710] should_fail_ex+0x497/0x5b0 [ 1384.166058][T26710] _copy_to_user+0x32/0xd0 [ 1384.170513][T26710] put_itimerspec64+0x13d/0x1d0 [ 1384.175405][T26710] ? __pfx_put_itimerspec64+0x10/0x10 [ 1384.180815][T26710] ? __pfx_do_timer_gettime+0x10/0x10 [ 1384.186227][T26710] __x64_sys_timer_gettime+0x141/0x170 [ 1384.191719][T26710] ? __pfx___x64_sys_timer_gettime+0x10/0x10 [ 1384.197727][T26710] ? ksys_write+0x1ba/0x250 [ 1384.202276][T26710] do_syscall_64+0xcd/0x250 [ 1384.206818][T26710] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1384.212744][T26710] RIP: 0033:0x7fcd0b985d29 [ 1384.217187][T26710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1384.236830][T26710] RSP: 002b:00007fcd0c80e038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e0 [ 1384.245279][T26710] RAX: ffffffffffffffda RBX: 00007fcd0bb75fa0 RCX: 00007fcd0b985d29 [ 1384.253282][T26710] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1384.261278][T26710] RBP: 00007fcd0c80e090 R08: 0000000000000000 R09: 0000000000000000 [ 1384.269271][T26710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1384.277263][T26710] R13: 0000000000000000 R14: 00007fcd0bb75fa0 R15: 00007ffda8950488 [ 1384.285275][T26710] [ 1384.944149][T26721] FAULT_INJECTION: forcing a failure. [ 1384.944149][T26721] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1385.094524][T26721] CPU: 1 UID: 0 PID: 26721 Comm: syz.3.6195 Not tainted 6.13.0-rc5-syzkaller #0 [ 1385.103626][T26721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1385.113717][T26721] Call Trace: [ 1385.117025][T26721] [ 1385.119988][T26721] dump_stack_lvl+0x16c/0x1f0 [ 1385.124699][T26721] should_fail_ex+0x497/0x5b0 [ 1385.129416][T26721] _copy_from_user+0x2e/0xd0 [ 1385.134049][T26721] copy_msghdr_from_user+0x99/0x160 [ 1385.139289][T26721] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1385.145136][T26721] ? __lock_acquire+0xcc5/0x3c40 [ 1385.150113][T26721] ___sys_sendmsg+0xff/0x1e0 [ 1385.154750][T26721] ? __pfx____sys_sendmsg+0x10/0x10 [ 1385.160001][T26721] ? trace_lock_acquire+0x14e/0x1f0 [ 1385.165252][T26721] __sys_sendmmsg+0x201/0x420 [ 1385.169958][T26721] ? __pfx___sys_sendmmsg+0x10/0x10 [ 1385.175185][T26721] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1385.181189][T26721] ? fput+0x67/0x440 [ 1385.185107][T26721] ? ksys_write+0x1ba/0x250 [ 1385.189630][T26721] ? __pfx_ksys_write+0x10/0x10 [ 1385.194499][T26721] __x64_sys_sendmmsg+0x9c/0x100 [ 1385.199458][T26721] ? lockdep_hardirqs_on+0x7c/0x110 [ 1385.204668][T26721] do_syscall_64+0xcd/0x250 [ 1385.209191][T26721] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1385.215101][T26721] RIP: 0033:0x7f9915785d29 [ 1385.219532][T26721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1385.239160][T26721] RSP: 002b:00007f991656c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1385.247589][T26721] RAX: ffffffffffffffda RBX: 00007f9915975fa0 RCX: 00007f9915785d29 [ 1385.255569][T26721] RDX: 0000000000003b8b RSI: 0000000020000000 RDI: 0000000000000003 [ 1385.263546][T26721] RBP: 00007f991656c090 R08: 0000000000000000 R09: 0000000000000000 [ 1385.271524][T26721] R10: 0000000000000800 R11: 0000000000000246 R12: 0000000000000001 [ 1385.279502][T26721] R13: 0000000000000000 R14: 00007f9915975fa0 R15: 00007ffe86739ce8 [ 1385.287497][T26721] [ 1385.622151][T26730] netlink: 342 bytes leftover after parsing attributes in process `syz.2.6201'. [ 1385.998225][T26738] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6204'. [ 1386.528335][T26738] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6204'. [ 1386.620949][T26748] ptrace attach of "./syz-executor exec"[23243] was attempted by ""[26748] [ 1387.253596][ T29] audit: type=1800 audit(8277292058.948:35): pid=26759 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="" name="dbroot" dev="configfs" ino=105789 res=0 errno=0 [ 1387.637610][T26773] FAULT_INJECTION: forcing a failure. [ 1387.637610][T26773] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1387.663410][T26770] vivid-009: ================= START STATUS ================= [ 1387.723097][T26773] CPU: 0 UID: 0 PID: 26773 Comm: syz.3.6214 Not tainted 6.13.0-rc5-syzkaller #0 [ 1387.732197][T26773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1387.742285][T26773] Call Trace: [ 1387.745593][T26773] [ 1387.748547][T26773] dump_stack_lvl+0x16c/0x1f0 [ 1387.753265][T26773] should_fail_ex+0x497/0x5b0 [ 1387.757988][T26773] _copy_from_user+0x2e/0xd0 [ 1387.762626][T26773] move_addr_to_kernel+0x68/0x160 [ 1387.767689][T26773] __copy_msghdr+0x386/0x470 [ 1387.772323][T26773] copy_msghdr_from_user+0xc2/0x160 [ 1387.777557][T26773] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1387.783392][T26773] ? __lock_acquire+0xcc5/0x3c40 [ 1387.788354][T26773] ___sys_sendmsg+0xff/0x1e0 [ 1387.792962][T26773] ? __pfx____sys_sendmsg+0x10/0x10 [ 1387.798192][T26773] ? trace_lock_acquire+0x14e/0x1f0 [ 1387.803424][T26773] __sys_sendmmsg+0x201/0x420 [ 1387.808132][T26773] ? __pfx___sys_sendmmsg+0x10/0x10 [ 1387.813356][T26773] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1387.819362][T26773] ? fput+0x67/0x440 [ 1387.823281][T26773] ? ksys_write+0x1ba/0x250 [ 1387.827801][T26773] ? __pfx_ksys_write+0x10/0x10 [ 1387.832673][T26773] __x64_sys_sendmmsg+0x9c/0x100 [ 1387.837650][T26773] ? lockdep_hardirqs_on+0x7c/0x110 [ 1387.842880][T26773] do_syscall_64+0xcd/0x250 [ 1387.847411][T26773] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1387.853319][T26773] RIP: 0033:0x7f9915785d29 [ 1387.857749][T26773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1387.877381][T26773] RSP: 002b:00007f991656c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1387.885817][T26773] RAX: ffffffffffffffda RBX: 00007f9915975fa0 RCX: 00007f9915785d29 [ 1387.893803][T26773] RDX: 0000000000000002 RSI: 00000000200001c0 RDI: 0000000000000003 [ 1387.901797][T26773] RBP: 00007f991656c090 R08: 0000000000000000 R09: 0000000000000000 [ 1387.909788][T26773] R10: 0000000000000101 R11: 0000000000000246 R12: 0000000000000001 [ 1387.917778][T26773] R13: 0000000000000000 R14: 00007f9915975fa0 R15: 00007ffe86739ce8 [ 1387.925779][T26773] [ 1387.953902][T26770] vivid-009: Enable Output Cropping: true [ 1387.986755][T26763] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6212'. [ 1388.006882][T26763] ip6tnl0: entered promiscuous mode [ 1388.053565][T26770] vivid-009: Enable Output Composing: true [ 1388.062456][T26770] vivid-009: Enable Output Scaler: true [ 1388.093550][T26770] vivid-009: Tx RGB Quantization Range: Automatic [ 1388.144088][T26770] vivid-009: Transmit Mode: HDMI [ 1388.208456][T26770] vivid-009: Hotplug Present: 0x00000000 [ 1388.224473][T26770] vivid-009: RxSense Present: 0x00000000 [ 1388.288020][T26770] vivid-009: EDID Present: 0x00000000 [ 1388.347756][T26770] vivid-009: ================== END STATUS ================== [ 1388.568772][T26787] netlink: 342 bytes leftover after parsing attributes in process `syz.5.6215'. [ 1389.177480][T26794] sctp: [Deprecated]: syz.2.6218 (pid 26794) Use of int in maxseg socket option. [ 1389.177480][T26794] Use struct sctp_assoc_value instead [ 1389.912075][T26807] netlink: 168 bytes leftover after parsing attributes in process `syz.2.6224'. [ 1390.089582][T26809] FAULT_INJECTION: forcing a failure. [ 1390.089582][T26809] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.167830][T26809] CPU: 1 UID: 0 PID: 26809 Comm: syz.3.6225 Not tainted 6.13.0-rc5-syzkaller #0 [ 1390.176917][T26809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1390.187006][T26809] Call Trace: [ 1390.190310][T26809] [ 1390.193269][T26809] dump_stack_lvl+0x16c/0x1f0 [ 1390.197990][T26809] should_fail_ex+0x497/0x5b0 [ 1390.202698][T26809] ? fs_reclaim_acquire+0xae/0x150 [ 1390.207844][T26809] should_failslab+0xc2/0x120 [ 1390.212559][T26809] __kmalloc_node_noprof+0xd1/0x520 [ 1390.217796][T26809] ? __pfx___mutex_lock+0x10/0x10 [ 1390.222847][T26809] ? __kvmalloc_node_noprof+0xad/0x1a0 [ 1390.228347][T26809] __kvmalloc_node_noprof+0xad/0x1a0 [ 1390.233677][T26809] traverse.part.0.constprop.0+0x392/0x640 [ 1390.239526][T26809] seq_lseek+0x2b4/0x440 [ 1390.243800][T26809] ksys_lseek+0xf0/0x1b0 [ 1390.248068][T26809] do_syscall_64+0xcd/0x250 [ 1390.252603][T26809] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1390.258529][T26809] RIP: 0033:0x7f9915785d29 [ 1390.262965][T26809] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1390.282615][T26809] RSP: 002b:00007f991656c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 1390.291064][T26809] RAX: ffffffffffffffda RBX: 00007f9915975fa0 RCX: 00007f9915785d29 [ 1390.299067][T26809] RDX: 0000000000000001 RSI: 0000000000020000 RDI: 0000000000000003 [ 1390.307075][T26809] RBP: 00007f991656c090 R08: 0000000000000000 R09: 0000000000000000 [ 1390.315075][T26809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1390.323074][T26809] R13: 0000000000000000 R14: 00007f9915975fa0 R15: 00007ffe86739ce8 [ 1390.331093][T26809] [ 1392.714627][T26843] sctp: [Deprecated]: syz.3.6233 (pid 26843) Use of int in maxseg socket option. [ 1392.714627][T26843] Use struct sctp_assoc_value instead [ 1394.085410][T21987] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1394.117792][T26869] FAULT_INJECTION: forcing a failure. [ 1394.117792][T26869] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1394.221574][T26869] CPU: 1 UID: 0 PID: 26869 Comm: syz.5.6245 Not tainted 6.13.0-rc5-syzkaller #0 [ 1394.230680][T26869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1394.240777][T26869] Call Trace: [ 1394.244075][T26869] [ 1394.247029][T26869] dump_stack_lvl+0x16c/0x1f0 [ 1394.251759][T26869] should_fail_ex+0x497/0x5b0 [ 1394.256490][T26869] _copy_from_user+0x2e/0xd0 [ 1394.261121][T26869] kstrtouint_from_user+0xd7/0x1c0 [ 1394.266260][T26869] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 1394.272028][T26869] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1394.277702][T26869] proc_fail_nth_write+0x84/0x250 [ 1394.282777][T26869] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1394.288451][T26869] ? ksys_write+0x12b/0x250 [ 1394.292997][T26869] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1394.298667][T26869] vfs_write+0x24c/0x1150 [ 1394.303039][T26869] ? __fget_files+0x1fc/0x3a0 [ 1394.307754][T26869] ? __pfx___mutex_lock+0x10/0x10 [ 1394.312810][T26869] ? __pfx_vfs_write+0x10/0x10 [ 1394.317619][T26869] ? __fget_files+0x206/0x3a0 [ 1394.322345][T26869] ksys_write+0x12b/0x250 [ 1394.326723][T26869] ? __pfx_ksys_write+0x10/0x10 [ 1394.331635][T26869] do_syscall_64+0xcd/0x250 [ 1394.336181][T26869] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1394.342120][T26869] RIP: 0033:0x7ff3b0f847df [ 1394.346567][T26869] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 1394.366230][T26869] RSP: 002b:00007ff3b1cde030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1394.374681][T26869] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ff3b0f847df [ 1394.382715][T26869] RDX: 0000000000000001 RSI: 00007ff3b1cde0a0 RDI: 0000000000000004 [ 1394.390716][T26869] RBP: 00007ff3b1cde090 R08: 0000000000000000 R09: 0000000000000000 [ 1394.398719][T26869] R10: 0000000000000100 R11: 0000000000000293 R12: 0000000000000001 [ 1394.406726][T26869] R13: 0000000000000000 R14: 00007ff3b1175fa0 R15: 00007fffb723ad38 [ 1394.414746][T26869] [ 1394.500782][T26880] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1394.514669][T26880] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1394.524027][T26880] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1394.539634][T26880] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1394.554477][T26880] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 1394.568082][T26880] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 1394.625054][T21987] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1394.760222][T26886] FAULT_INJECTION: forcing a failure. [ 1394.760222][T26886] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1394.802840][T26886] CPU: 1 UID: 0 PID: 26886 Comm: syz.2.6249 Not tainted 6.13.0-rc5-syzkaller #0 [ 1394.811941][T26886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1394.822033][T26886] Call Trace: [ 1394.825335][T26886] [ 1394.828284][T26886] dump_stack_lvl+0x16c/0x1f0 [ 1394.832997][T26886] should_fail_ex+0x497/0x5b0 [ 1394.837712][T26886] _copy_from_user+0x2e/0xd0 [ 1394.842344][T26886] __x64_sys_timer_create+0x10e/0x1d0 [ 1394.847752][T26886] ? __pfx___x64_sys_timer_create+0x10/0x10 [ 1394.853703][T26886] do_syscall_64+0xcd/0x250 [ 1394.858252][T26886] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1394.864182][T26886] RIP: 0033:0x7fcd0b985d29 [ 1394.868628][T26886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1394.888273][T26886] RSP: 002b:00007fcd0c80e038 EFLAGS: 00000246 ORIG_RAX: 00000000000000de [ 1394.896723][T26886] RAX: ffffffffffffffda RBX: 00007fcd0bb75fa0 RCX: 00007fcd0b985d29 [ 1394.904710][T26886] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000008 [ 1394.912692][T26886] RBP: 00007fcd0c80e090 R08: 0000000000000000 R09: 0000000000000000 [ 1394.920673][T26886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1394.928653][T26886] R13: 0000000000000000 R14: 00007fcd0bb75fa0 R15: 00007ffda8950488 [ 1394.936651][T26886] [ 1395.174327][T26888] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6250'. [ 1395.292664][T21987] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1395.374669][T26877] chnl_net:caif_netlink_parms(): no params data found [ 1395.532962][T21987] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1395.758607][T26877] bridge0: port 1(bridge_slave_0) entered blocking state [ 1395.789881][T26877] bridge0: port 1(bridge_slave_0) entered disabled state [ 1395.816048][T26877] bridge_slave_0: entered allmulticast mode [ 1395.834457][T26877] bridge_slave_0: entered promiscuous mode [ 1395.887620][T26877] bridge0: port 2(bridge_slave_1) entered blocking state [ 1395.894844][T26877] bridge0: port 2(bridge_slave_1) entered disabled state [ 1395.912411][T26877] bridge_slave_1: entered allmulticast mode [ 1395.957440][T26877] bridge_slave_1: entered promiscuous mode [ 1396.130131][T26877] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1396.180579][T26877] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1396.274506][T21987] bridge_slave_1: left allmulticast mode [ 1396.281325][T21987] bridge_slave_1: left promiscuous mode [ 1396.296538][T21987] bridge0: port 2(bridge_slave_1) entered disabled state [ 1396.317362][T21987] bridge_slave_0: left allmulticast mode [ 1396.323405][T26888] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6250'. [ 1396.336676][T21987] bridge_slave_0: left promiscuous mode [ 1396.344613][T21987] bridge0: port 1(bridge_slave_0) entered disabled state [ 1396.643090][T21969] Bluetooth: hci2: command tx timeout [ 1397.257834][T21987] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1397.291629][T21987] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1397.328596][T21987] bond0 (unregistering): Released all slaves [ 1397.412251][T26877] team0: Port device team_slave_0 added [ 1397.455113][T26877] team0: Port device team_slave_1 added [ 1397.588298][T26877] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1397.595290][T26877] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1397.657441][T26877] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1397.737934][T26877] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1397.744931][T26877] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1397.805120][T26877] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1397.993483][T26877] hsr_slave_0: entered promiscuous mode [ 1398.009380][T26877] hsr_slave_1: entered promiscuous mode [ 1398.020138][T26877] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1398.027848][T26877] Cannot create hsr debugfs directory [ 1398.137213][T21987] hsr_slave_0: left promiscuous mode [ 1398.143360][T21987] hsr_slave_1: left promiscuous mode [ 1398.208828][T21987] veth1_macvtap: left promiscuous mode [ 1398.224501][T21987] veth0_macvtap: left promiscuous mode [ 1398.230149][T21987] veth1_vlan: left promiscuous mode [ 1398.259002][T21987] veth0_vlan: left promiscuous mode [ 1398.721744][T21969] Bluetooth: hci2: command tx timeout [ 1399.421710][T21987] team0 (unregistering): Port device team_slave_1 removed [ 1399.529172][T21987] team0 (unregistering): Port device team_slave_0 removed [ 1400.811406][T21969] Bluetooth: hci2: command tx timeout [ 1401.309186][T21987] ref_tracker: net notrefcnt@ffff888029c15ca0 has 1/2 users at [ 1401.309186][T21987] sk_alloc+0xa93/0xb90 [ 1401.309186][T21987] inet6_create+0x380/0x1320 [ 1401.309186][T21987] __sock_create+0x335/0x8d0 [ 1401.309186][T21987] udp_sock_create6+0xc8/0x660 [ 1401.309186][T21987] sctp_udp_sock_start+0x280/0x4b0 [ 1401.309186][T21987] proc_sctp_do_udp_port+0x3ba/0x4a0 [ 1401.309186][T21987] proc_sys_call_handler+0x403/0x5d0 [ 1401.309186][T21987] iter_file_splice_write+0x90f/0x10b0 [ 1401.309186][T21987] direct_splice_actor+0x18f/0x6c0 [ 1401.309186][T21987] splice_direct_to_actor+0x346/0xa40 [ 1401.309186][T21987] do_splice_direct+0x178/0x250 [ 1401.309186][T21987] do_sendfile+0xaed/0xe30 [ 1401.309186][T21987] __x64_sys_sendfile64+0x1da/0x220 [ 1401.309186][T21987] do_syscall_64+0xcd/0x250 [ 1401.309186][T21987] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1401.309186][T21987] [ 1401.397049][T21987] ref_tracker: net notrefcnt@ffff888029c15ca0 has 1/2 users at [ 1401.397049][T21987] sk_alloc+0xa93/0xb90 [ 1401.397049][T21987] inet_create+0x3a1/0x10a0 [ 1401.397049][T21987] __sock_create+0x335/0x8d0 [ 1401.397049][T21987] udp_sock_create4+0xa7/0x450 [ 1401.397049][T21987] sctp_udp_sock_start+0x10b/0x4b0 [ 1401.397049][T21987] proc_sctp_do_udp_port+0x3ba/0x4a0 [ 1401.397049][T21987] proc_sys_call_handler+0x403/0x5d0 [ 1401.397049][T21987] iter_file_splice_write+0x90f/0x10b0 [ 1401.397049][T21987] direct_splice_actor+0x18f/0x6c0 [ 1401.397049][T21987] splice_direct_to_actor+0x346/0xa40 [ 1401.397049][T21987] do_splice_direct+0x178/0x250 [ 1401.397049][T21987] do_sendfile+0xaed/0xe30 [ 1401.397049][T21987] __x64_sys_sendfile64+0x1da/0x220 [ 1401.397049][T21987] do_syscall_64+0xcd/0x250 [ 1401.397049][T21987] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1401.397049][T21987] [ 1401.556040][T21987] ------------[ cut here ]------------ [ 1401.562314][T21987] WARNING: CPU: 1 PID: 21987 at lib/ref_tracker.c:179 ref_tracker_dir_exit+0x3e3/0x680 [ 1401.572255][T21987] Modules linked in: [ 1401.576423][T21987] CPU: 1 UID: 0 PID: 21987 Comm: kworker/u8:8 Not tainted 6.13.0-rc5-syzkaller #0 [ 1401.585648][T21987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1401.595859][T21987] Workqueue: netns cleanup_net [ 1401.600745][T21987] RIP: 0010:ref_tracker_dir_exit+0x3e3/0x680 [ 1401.606820][T21987] Code: 11 02 00 00 4d 39 f5 49 8b 06 4d 89 f7 0f 85 0e ff ff ff 48 8b 2c 24 e8 bb 2d d1 fc 48 8b 74 24 18 48 89 ef e8 ee a4 54 06 90 <0f> 0b 90 e8 a5 2d d1 fc 48 8d 5d 44 be 04 00 00 00 48 89 df e8 34 [ 1401.627859][T21987] RSP: 0018:ffffc9000c1a7b38 EFLAGS: 00010246 [ 1401.635436][T21987] RAX: 0000000000000000 RBX: dffffc0000000000 RCX: 0000000000000000 [ 1401.643601][T21987] RDX: 0000000000000001 RSI: ffffffff8b4cd260 RDI: 0000000000000001 [ 1401.651721][T21987] RBP: ffff888029c15ca0 R08: 0000000000000001 R09: fffffbfff2d36db9 [ 1401.660117][T21987] R10: ffffffff969b6dcf R11: 0000000000000b8f R12: ffff888029c15cf0 [ 1401.668190][T21987] R13: ffff888029c15cf0 R14: ffff888029c15cf0 R15: ffff888029c15cf0 [ 1401.676551][T21987] FS: 0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 1401.685518][T21987] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1401.692217][T21987] CR2: 0000563629d0d131 CR3: 0000000067aec000 CR4: 00000000003526f0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1401.700296][T21987] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1401.708372][T21987] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1401.716466][T21987] Call Trace: [ 1401.721189][T21987] [ 1401.724154][T21987] ? __warn+0xea/0x3c0 [ 1401.729524][T21987] ? ref_tracker_dir_exit+0x3e3/0x680 [ 1401.734951][T21987] ? report_bug+0x3c0/0x580 [ 1401.739570][T21987] ? handle_bug+0x54/0xa0 [ 1401.743937][T21987] ? exc_invalid_op+0x17/0x50 [ 1401.748709][T21987] ? asm_exc_invalid_op+0x1a/0x20 [ 1401.753785][T21987] ? ref_tracker_dir_exit+0x3e3/0x680 [ 1401.759314][T21987] ? ref_tracker_dir_exit+0x3e2/0x680 [ 1401.764731][T21987] ? __pfx_ref_tracker_dir_exit+0x10/0x10 [ 1401.770528][T21987] ? lockdep_hardirqs_on+0x7c/0x110 [ 1401.775837][T21987] ? cleanup_net+0x984/0xbd0 [ 1401.780479][T21987] cleanup_net+0x990/0xbd0 [ 1401.784939][T21987] ? __pfx_cleanup_net+0x10/0x10 [ 1401.790014][T21987] ? lock_acquire+0x2f/0xb0 [ 1401.794546][T21987] ? process_one_work+0x8bb/0x1b30 [ 1401.799747][T21987] process_one_work+0x958/0x1b30 [ 1401.804725][T21987] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1401.810479][T21987] ? __pfx_process_one_work+0x10/0x10 [ 1401.816117][T21987] ? rcu_is_watching+0x12/0xc0 [ 1401.822233][T21987] ? assign_work+0x1a0/0x250 [ 1401.828430][T21987] worker_thread+0x6c8/0xf00 [ 1401.833155][T21987] ? __pfx_worker_thread+0x10/0x10 [ 1401.838367][T21987] kthread+0x2c1/0x3a0 [ 1401.842470][T21987] ? _raw_spin_unlock_irq+0x23/0x50 [ 1401.847809][T21987] ? __pfx_kthread+0x10/0x10 [ 1401.852449][T21987] ret_from_fork+0x45/0x80 [ 1401.856955][T21987] ? __pfx_kthread+0x10/0x10 [ 1401.861580][T21987] ret_from_fork_asm+0x1a/0x30 [ 1401.866457][T21987] [ 1401.869507][T21987] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1401.876807][T21987] CPU: 1 UID: 0 PID: 21987 Comm: kworker/u8:8 Not tainted 6.13.0-rc5-syzkaller #0 [ 1401.886015][T21987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 1401.896077][T21987] Workqueue: netns cleanup_net [ 1401.900868][T21987] Call Trace: [ 1401.904148][T21987] [ 1401.907087][T21987] dump_stack_lvl+0x3d/0x1f0 [ 1401.911694][T21987] panic+0x71d/0x800 [ 1401.915621][T21987] ? __pfx_panic+0x10/0x10 [ 1401.920079][T21987] ? show_trace_log_lvl+0x29d/0x3d0 [ 1401.925312][T21987] ? check_panic_on_warn+0x1f/0xb0 [ 1401.930449][T21987] ? ref_tracker_dir_exit+0x3e3/0x680 [ 1401.935837][T21987] check_panic_on_warn+0xab/0xb0 [ 1401.940793][T21987] __warn+0xf6/0x3c0 [ 1401.944703][T21987] ? ref_tracker_dir_exit+0x3e3/0x680 [ 1401.950092][T21987] report_bug+0x3c0/0x580 [ 1401.954440][T21987] handle_bug+0x54/0xa0 [ 1401.958612][T21987] exc_invalid_op+0x17/0x50 [ 1401.963132][T21987] asm_exc_invalid_op+0x1a/0x20 [ 1401.967994][T21987] RIP: 0010:ref_tracker_dir_exit+0x3e3/0x680 [ 1401.973991][T21987] Code: 11 02 00 00 4d 39 f5 49 8b 06 4d 89 f7 0f 85 0e ff ff ff 48 8b 2c 24 e8 bb 2d d1 fc 48 8b 74 24 18 48 89 ef e8 ee a4 54 06 90 <0f> 0b 90 e8 a5 2d d1 fc 48 8d 5d 44 be 04 00 00 00 48 89 df e8 34 [ 1401.993613][T21987] RSP: 0018:ffffc9000c1a7b38 EFLAGS: 00010246 [ 1401.999690][T21987] RAX: 0000000000000000 RBX: dffffc0000000000 RCX: 0000000000000000 [ 1402.007670][T21987] RDX: 0000000000000001 RSI: ffffffff8b4cd260 RDI: 0000000000000001 [ 1402.015647][T21987] RBP: ffff888029c15ca0 R08: 0000000000000001 R09: fffffbfff2d36db9 [ 1402.023630][T21987] R10: ffffffff969b6dcf R11: 0000000000000b8f R12: ffff888029c15cf0 [ 1402.031611][T21987] R13: ffff888029c15cf0 R14: ffff888029c15cf0 R15: ffff888029c15cf0 [ 1402.039609][T21987] ? ref_tracker_dir_exit+0x3e2/0x680 [ 1402.045009][T21987] ? __pfx_ref_tracker_dir_exit+0x10/0x10 [ 1402.050782][T21987] ? lockdep_hardirqs_on+0x7c/0x110 [ 1402.055998][T21987] ? cleanup_net+0x984/0xbd0 [ 1402.060617][T21987] cleanup_net+0x990/0xbd0 [ 1402.065058][T21987] ? __pfx_cleanup_net+0x10/0x10 [ 1402.070019][T21987] ? lock_acquire+0x2f/0xb0 [ 1402.074530][T21987] ? process_one_work+0x8bb/0x1b30 [ 1402.079653][T21987] process_one_work+0x958/0x1b30 [ 1402.084605][T21987] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 1402.090274][T21987] ? __pfx_process_one_work+0x10/0x10 [ 1402.095663][T21987] ? rcu_is_watching+0x12/0xc0 [ 1402.100457][T21987] ? assign_work+0x1a0/0x250 [ 1402.105079][T21987] worker_thread+0x6c8/0xf00 [ 1402.109695][T21987] ? __pfx_worker_thread+0x10/0x10 [ 1402.114818][T21987] kthread+0x2c1/0x3a0 [ 1402.118901][T21987] ? _raw_spin_unlock_irq+0x23/0x50 [ 1402.124109][T21987] ? __pfx_kthread+0x10/0x10 [ 1402.128713][T21987] ret_from_fork+0x45/0x80 [ 1402.133138][T21987] ? __pfx_kthread+0x10/0x10 [ 1402.137749][T21987] ret_from_fork_asm+0x1a/0x30 [ 1402.142549][T21987] [ 1402.145820][T21987] Kernel Offset: disabled [ 1402.150206][T21987] Rebooting in 86400 seconds..