last executing test programs: 6.848391921s ago: executing program 2 (id=2171): mmap$auto(0x0, 0x202000c, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000500)='/sys/devices/virtual/block/ram12/queue/read_ahead_kb\x00', 0x80000, 0x0) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5) read$auto(r0, 0x0, 0x20) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r1, &(0x7f0000000200)={0x0, 0x7}, 0x3) r2 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$auto_snd_timer_f_ops_timer(0xffffffffffffff9c, &(0x7f0000000200), 0x101802, 0x0) ioctl$auto_SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000100)={0x2, 0x6b7f, 0x9, 0x4, 0x200000aa}) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000480)='/sys/bus/usb/drivers/radio-ma901/uevent\x00', 0x454b82, 0x0) sendfile$auto(r5, r5, 0x0, 0x5) r6 = openat$auto_fuse_dev_operations_fuse_i(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x40000, 0x0) write$auto(r6, &(0x7f00000000c0)='/dev/vts/ptmx\x00', 0x1) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(r3, &(0x7f0000000580)={0x0, 0x2120, &(0x7f0000000540)={&(0x7f0000000400)={0x14, r2, 0x1, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x68, 0x0, 0x4000000}, 0x0) 4.326350152s ago: executing program 3 (id=2185): read$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffffff, &(0x7f0000000080)=""/64, 0x40) 4.222505133s ago: executing program 3 (id=2187): mmap$auto(0x0, 0x2020009, 0x8000000000000003, 0x40000000000eb1, 0xffffffffffffffff, 0x8000) r0 = prctl$auto(0x1000000003b, 0x8, 0x4, 0x5, 0x2) mmap$auto(0x20, 0x400004, 0x23, 0x13, r0, 0x7ac) mmap$auto(0x0, 0x7, 0x8, 0xeb0, 0xffffffffffffffff, 0xe0) writev$auto(0x3, &(0x7f0000000100)={0x0, 0x9}, 0x1) lseek$auto(0x3, 0x3fffffe, 0x4) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/controlC0\x00', 0x47c882, 0x0) unshare$auto(0x40000080) openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000380)='/sys/kernel/debug/lru_gen\x00', 0xc0200, 0x0) socket(0x1e, 0x1, 0x0) openat$auto_cpuid_fops_cpuid(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cpu/0/cpuid\x00', 0x101500, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/amidi2\x00', 0xb87d6158be0b49e4, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/pcmC0D0c\x00', 0x40000, 0x0) mmap$auto(0x0, 0x2020009, 0x8000000003, 0xeb1, 0xfffffffffffffffa, 0x8000) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') r4 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv6/neigh/bond_slave_1/ucast_solicit\x00', 0x101202, 0x0) sendfile$auto(0xffffffffffffffff, r4, 0x0, 0x48) getdents$auto(0xffffffffffffffff, 0x0, 0xfff) fremovexattr$auto(r2, &(0x7f0000000540)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1b|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\x86\xe0\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\xa3F3\xc1\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc\xa9hJ\x95\"\xea\xde\xa7\x88-\xc0z\x93\xa3H\x0e\x96\xbe\x17\xbcw\xe5\xfb!\x85\x8d\xd4\xb6u\x0e\xbe\xc0]*\x91\xc8\v\x06\xef\xfaEEs\xd0Rd\xde5\xe0JF\xe7') ioctl$auto_FS_IOC_ADD_ENCRYPTION_KEY2(0xffffffffffffffff, 0xc0506617, &(0x7f0000000240)={{0x6, 0x0, @descriptor="4162321b541a99f9"}, 0x240, 0x3, '\x00', "e2f7e40b7cce3e65d1db4db51b80cf38922a872425af5bf165b0239ccb25816fc69d199e87a289ed19eb4f7ef27299173036d9aa83b6a2b553d850823e304ad0c7e178b6a35c64a146e217fa11076f4d90d848b2a255f1e9c1ccc47659a82fddd4625b241d40f6746a0e915d47a8809c826e427c348ce0f954421ad80b7f7d62e7074930fb9b2ad0df39da91be4fe1d4d60996a993585aa794162339e39d1382df42ce1cb3c8d0c6d057ac5bea2e1df924ff61f143f22a1e52c49668b162568ed0a319be36fd461ec98b1771754eb030fe955f9a3ed944b2022d7aec2425dd56bd54fd9ef9f639f5bce8e833ea"}) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x6, 0x4000df, 0xeb1, 0x401, 0x8000) r5 = socket(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bond0\x00'}) bpf$auto(0x0, &(0x7f00000000c0)=@link_update={0xffffffffffffffff, @new_map_fd=r3, 0x2, @old_map_fd=r3}, 0x12) 4.071135259s ago: executing program 1 (id=2188): openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/net/eql/ifalias\x00', 0xb02, 0x0) mmap$auto(0x0, 0x240009, 0xdf, 0x9b72, 0x7, 0x28000) execve$auto(0x0, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) openat$auto_ftrace_subsystem_filter_fops_trace_events(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/kernel/debug/tracing/events/vmalloc/filter\x00', 0x103041, 0x0) r0 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x40001, 0x0) ftruncate$auto(0x3, 0x400180200000) mmap$auto(0xa, 0x40009, 0xfffffffffffff227, 0x9b72, 0xffffffffffffffff, 0x28000) write$auto(0xffffffffffffffff, &(0x7f0000000300)='.o\xd3\xa49\xaf\xa9\xe4\xe17\x12\xb3Z\x17I\x82\xdc\xbeiw\xc1\xd1\x8d\x9b\r\x9aR\xe7\x9f\xd8\xab\x16`f\nT\xaa\xfap \xe6\xdaV\xdeD\x8dR5\xd2\xe58\n\xff\x19+\xeb\xb3+\xf6\xc6\a\x00\x00\x00\xf1A\xa5\x95\x1fk\x1f\xff\x99gP\x9e\x88\x97]\x93\xf4\xdd<\xe7p\x0e\xd4C\xdc\x84\v\xafz\xfd\x81\xa3\xb2\xbb\xa4\xd9\xf2P\xa8\xe9\x8f\x13\xa7\x98\x85\xf8\v\aB\xfc\xfa\x14E\xb8y\x884<\xa7\xffyb\x8a\b\xbb\x1b\x13W\xe3\xf7\xd8\x83\xc9\xd7\x8c', 0x6) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x2deb43, 0x0) faccessat2$auto(0xffffffffffffffff, 0x0, 0x0, 0x7) read$auto(r1, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) mmap$auto(0x2, 0x401, 0x1000, 0x8000000000000011, 0xffffffffffffffff, 0x5) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0xc40, 0x0) r3 = syz_genetlink_get_family_id$auto_seg6(&(0x7f0000000100), 0xffffffffffffffff) r4 = openat$auto_nsim_dev_health_break_fops_health(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/netdevsim/netdevsim2/health/break_health\x00', 0x48081, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ovs_packet(&(0x7f0000001940), 0xffffffffffffffff) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYRES64, @ANYRES64=r0, @ANYRESDEC=r3, @ANYRES64=r2, @ANYBLOB="894f844ea904ebea19000000120001640043005af77d2e758fa4192512ca5b0000"], 0x4c}, 0x1, 0x0, 0x0, 0x4004040}, 0x4844) write$auto(r4, 0x0, 0x1ff) prctl$auto_PR_SCHED_CORE_GET(0x9, 0x0, 0x0, 0x0, 0x26fa) r6 = openat$auto_loop_ctl_fops_loop(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) r7 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) write$auto(r7, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) pselect6$auto(0x400, &(0x7f0000000000)={[0x8, 0x4, 0x40000000000000, 0x6, 0x7fffffff, 0xffffffffffffffff, 0xfff, 0x6, 0x3, 0xffffffff, 0x8000000000000001, 0x0, 0x2f, 0x2, 0x8, 0xfffffffffffffffe]}, 0x0, 0x0, 0x0, 0x0) setresuid$auto(0x8, 0x8, 0x0) ioctl$auto_LOOP_CTL_ADD(r6, 0x4c80, 0xfffffffffffffffd) 3.603140611s ago: executing program 0 (id=2190): r0 = timerfd_create$auto_CLOCK_BOOTTIME_ALARM(0x9, 0x5e2) r1 = syz_genetlink_get_family_id$auto_802_15_4_mac(&(0x7f0000000040), r0) sendmsg$auto_IEEE802154_LIST_PHY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0xa8, r1, 0x1, 0x70bd26, 0x25dfdbff, {}, [@IEEE802154_ATTR_REASON={0x5, 0x12, 0xc1}, @IEEE802154_ATTR_CHANNEL_PAGE_LIST={0x84, 0x1e, "c7054e1e16f51a51a185ed803599987056a961857c2b31921ae1d286839c8e9255580dfc15bf92c7d314f5e3adcae460150d70fac15d9b1275587b6cbadebea80b515e520d769d15cc3000905d25e40020c8c35adea1f33fb04ba70ddea4a2187075db7b2940e442a82ed451eced67dc9993e86b70fed2635f1cf63cae58daa2"}, @IEEE802154_ATTR_REASON={0x5, 0x12, 0x4}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20000800}, 0x80) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x800008000) socket(0xa, 0x3, 0x3a) unshare$auto(0x6) rseq$auto(&(0x7f0000000300)={0x12, 0x401, 0x0, 0x6, 0xffffffff, 0x2}, 0x8000, 0x0, 0x6) fcntl$auto(0x8000000000000001, 0x26, 0x8) setsockopt$auto(0x400000000000003, 0x29, 0xd1, 0x0, 0x4) sendmsg$auto_BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000326bd7017fddbdf250200000008002700080000000a001800aaaa8aaaaabb0000"], 0x28}, 0x1, 0x0, 0x0, 0x4c894}, 0x24008000) socket(0x10, 0x2, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB=' \x00\''], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) r2 = clone$auto(0x3, 0x1f, 0x0, 0x0, 0x5) prctl$auto_PR_SET_MM_END_DATA(0xfff, 0x4, r2, 0x4, 0x24e71afe) unshare$auto(0x40000080) 3.263503071s ago: executing program 3 (id=2191): r0 = openat$auto_tracing_fops_trace(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/tracing/per_cpu/cpu0/trace\x00', 0x1a6b75d638828712, 0x0) setsockopt$auto(r0, 0x8, 0x4, &(0x7f0000000000)='/sys/kernel/tracing/per_cpu/cpu0/trace\x00', 0x9) r1 = openat$auto_hwflags_ops_debugfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/ieee80211/phy18/hwflags\x00', 0x149600, 0x0) mlock$auto(0xfffffffffffffffe, 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bus/usb/015/001\x00', 0xa901, 0x0) r5 = openat$auto_tap_fops_tap(0xffffffffffffff9c, &(0x7f0000000040), 0x2001, 0x0) r6 = syz_genetlink_get_family_id$auto_nlbl_cipsov4(&(0x7f0000000180), r4) sendmsg$auto_NLBL_CIPSOV4_C_REMOVE(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r6, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xf9cf}]}, 0x24}}, 0x80) ioctl$auto(r5, 0x400454d0, r5) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000640)={'wlan1\x00', 0x0}) sendmsg$auto_NL80211_CMD_DEL_PMK(r2, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)={&(0x7f0000000c40)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010026bd7000fbdbdf857000000008000300", @ANYRES32=r7], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) getsockopt$auto_SO_LOCK_FILTER(r1, 0xfffff000, 0x2c, &(0x7f00000000c0)='$}Q*\x00', &(0x7f0000000100)=0x2) 2.865719775s ago: executing program 0 (id=2192): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NETDEV_CMD_QUEUE_GET(0xffffffffffffffff, &(0x7f0000003040)={0x0, 0x0, &(0x7f0000003000)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00F\x00', @ANYRES16=0x0, @ANYBLOB="01002cbd7000fbdbdf250a0000000800010080000000080002"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x20004080) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x40000) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) mmap$auto(0x0, 0x2000c, 0xdf, 0x20eb1, 0x40000000000a5, 0x8000) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x7, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/security/tomoyo/audit\x00', 0x200, 0x0) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$auto(0xffffffffffffffff, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) openat$auto_snd_pcm_f_ops_pcm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snd/pcmC0D0p\x00', 0xa00, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ram4\x00', 0xdd01, 0x0) ioctl$auto_BLKRRPART(r0, 0x125f, 0x27) open(0x0, 0x163140, 0x98) msync$auto(0x1ffff000, 0x1800000ff010000, 0x400000004) open(0x0, 0xeee00, 0x31) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/fail-nth\x00', 0x193400, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000040), 0xffffffffffffffff) socket(0xa, 0x801, 0x106) r1 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_HWSIM_CMD_NEW_RADIO(r2, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010029bd7000fedbdf250400000006000b002c690000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000060}, 0x0) socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) 2.795078116s ago: executing program 3 (id=2193): mmap$auto(0x0, 0x2000a, 0x10000000000df, 0xeb2, 0x401, 0x8000) openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/event0\x00', 0x8000, 0x0) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f682, 0x0) socket(0x10, 0x2, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x2000, 0x0) fsconfig$auto_SHMEM_HUGE_FORCE(r0, 0x7, &(0x7f0000000100)='@+\\!\x00', &(0x7f00000001c0)="5b0fdf8e7220ade733b697e361a312e8797cf9bc410c090dd180de688ae19ee0f7d3ce7f185fa1b9c9867d234fdb5c62c6e305f1df4ca134c6413371cb668566fc407fc2b99e953d74e9fe557dc0d6dd24b7fd497737dfcd44938915c5131197660e57624aba5b26b726415e50ca4639", 0xfffffffffffffffe) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$auto_seg6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)={0x28, r2, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@SEG6_ATTR_DST={0x14, 0x1, @loopback}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x800) open(&(0x7f0000000080)='./file0\x00', 0x8082, 0x105) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/midiC2D3\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f00000000c0)='/dev/audio1\x00', 0x100000a3d9) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000000)={{0x0, 0x2, 0x0, 0x3, 0x0, 0xfffffffffffffffc, 0x696b}, 0x7}, 0x2002, 0x9) r4 = socket(0xa, 0x5, 0x84) sendto$auto(r4, 0x0, 0x401, 0x7f, &(0x7f0000000000)=@generic={0xa, "e2e18340cba8fe8000"}, 0x1c) select$auto(0x4, 0x0, &(0x7f0000000080)={[0x209d, 0x5, 0x4, 0xd, 0x250, 0x100000000, 0x2c2, 0x800002017d, 0x2, 0x40, 0xd, 0xd59, 0xfb, 0xff, 0x1d, 0x2]}, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$auto_smc_gen_netlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_SMC_NETLINK_DISABLE_SEID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="013b"], 0x14}, 0x1, 0x0, 0x0, 0x880}, 0x810) sendmmsg$auto(r5, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080), 0xfc2}, 0x2, &(0x7f0000000180), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) r7 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/net/sctp/assocs\x00', 0x0, 0x0) read$auto_proc_reg_file_ops_compat_inode(r7, 0x0, 0xfffffe36) read$auto_proc_reg_file_ops_compat_inode(r7, &(0x7f0000000040)=""/9, 0x9) 2.441752922s ago: executing program 1 (id=2194): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x25, 0x1, 0x0) r1 = openat$auto_snd_timer_f_ops_timer(0xffffffffffffff9c, &(0x7f0000000080), 0x48180, 0x0) ioctl$auto_SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000280)={{0x3, 0x1000, 0x1, 0x1, 0x8}, "654c6dbc7a4d30983899a7e1325b6a29ba1e184410ba9f74e82a3fa6c3ccf1bf"}) ioctl$auto_SNDRV_TIMER_IOCTL_STATUS32(r1, 0x80585414, 0x0) setsockopt$auto(r0, 0x116, 0x7f, 0x0, 0x400) mmap$auto(0x0, 0x2020009, 0x80000000b1, 0x200000000eb1, 0xfffffffffffffffa, 0x0) futex$auto(0x0, 0x88, 0x7, 0x0, 0x0, 0x4) 2.270287925s ago: executing program 1 (id=2195): read$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffffff, &(0x7f0000000080)=""/64, 0x40) 2.078433471s ago: executing program 1 (id=2196): r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'erspan0\x00'}) mmap$auto(0x0, 0x2000a, 0x10000000000df, 0xeb2, 0x401, 0x8000) openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000000180)='/dev/input/event0\x00', 0x8000, 0x0) socket(0x10, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x28, 0x801, 0x0) connect$auto(0x3, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x2711}, 0x51) socket(0xf, 0x3, 0x2) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) socket(0x1e, 0x1, 0x0) fanotify_init$auto(0x5, 0x2000000000002) select$auto(0x6, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x6, 0xfff, 0x1, 0x5, 0x3, 0x95f4da2d, 0xc, 0x6, 0x62, 0x7, 0x7, 0x6d3f, 0xa, 0x4, 0x5]}, 0x0) write$auto(r1, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) socket(0x15, 0x5, 0x0) shutdown$auto(0x200000003, 0x2) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0x409, 0x1, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x62, 0x80000001, 0x8, 0x6, 0x9, 0x2, 0xfffffffffffffffe]}, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x2000, 0x0) fsconfig$auto_SHMEM_HUGE_FORCE(0xffffffffffffffff, 0x7, &(0x7f0000000100)='@+\\!\x00', &(0x7f00000001c0)="5b0fdf8e7220ade733b697e361a312e8797cf9bc410c090dd180de688ae19ee0f7d3ce7f185fa1b9c9867d234fdb5c62c6e305f1df4ca134c6413371cb668566fc407fc2b99e953d74e9fe557dc0d6dd24b7fd497737dfcd44938915c5131197660e57624aba5b26b726415e50ca4639", 0xfffffffffffffffe) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_seg6(&(0x7f0000000040), 0xffffffffffffffff) setsockopt$auto_SO_REUSEPORT(0xffffffffffffffff, 0x1ff, 0xf, &(0x7f0000000240)='SEG6\x00', 0x8) r3 = syz_genetlink_get_family_id$auto_seg6(&(0x7f0000000140), r2) sendmsg$auto_SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="000028030000000c0003000000000000000003000000"], 0x1c}, 0x1, 0x0, 0x0, 0x240040c0}, 0x20000000) open(&(0x7f0000000080)='./file0\x00', 0x8082, 0x105) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/midiC2D3\x00', 0x1, 0x0) 1.742229201s ago: executing program 3 (id=2197): name_to_handle_at$auto(0xffffffffffffffff, &(0x7f0000000000)='/sys/kernel/debug/tracing/set_event_pid\x00', &(0x7f0000000040)={0xae, 0x4, "612cbfdcb527a9500c1ff0f66baa9b44bbfe91cb8ec7e1accb9afa38ae1e4f4181c93994f4aa0b68f90ede7d16f839645211d37432192540a4424a9b264f3df0b5f2f8b0d08d331275fb85190e022c09096d603e01f73cf9cfd61622b655f6f77b5fec2ed8cc689ae07efd6248415d7725309c18a74e28680585a8e392414949d4783df11356abe87c15a1de21ab5e74c259cb1d241195b20b84addde41aad4c690ccbfa91f215a52efc6895bf63"}, &(0x7f0000000100)="d21346fc5f98a2a0fba8b3302ce127f1b05c53e48c8a893ff2e89a688d8a5fa32efef1be2e050d260c77e1e36926803534a4027036463c45f68be6176eb935402fa9d3386a87ba00eeb598b7", 0x1) openat$auto_ftrace_set_event_pid_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/tracing/set_event_pid\x00', 0xa0241, 0x0) 1.676050174s ago: executing program 0 (id=2198): r0 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x2000, 0x0) rseq$auto(&(0x7f00000001c0)={0xe, 0x20401, 0x5fc, 0x10000006, 0xffffffff, 0x6}, 0x8000, 0x0, 0x6) mmap$auto(0x0, 0x10005, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) socket(0x2, 0x801, 0x100) ioctl$auto(0x3, 0x894b, 0x38) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) read$auto(r0, 0x0, 0x1ff) pwritev$auto(0x3, 0x0, 0x5, 0x3, 0x9) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x1e, 0x4, 0x0) socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) get_robust_list$auto(0x0, 0x0, 0x0) setsockopt$auto(r1, 0x10f, 0x87, 0x0, 0x14) setsockopt$auto(0x3, 0x10f, 0x87, 0x0, 0x14) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0x0) ioctl$auto_BTRFS_IOC_QUOTA_RESCAN_STATUS(0xffffffffffffffff, 0x8040942d, &(0x7f0000000000)={0x4, 0x2, [0x5, 0x25, 0x2, 0x5, 0x8, 0x1]}) r2 = open(&(0x7f0000000080)='./cgroup.cpu/cgroup.procs\x00', 0x42842, 0x1a4) read$auto(r2, 0x0, 0x1) close_range$auto(0x2, 0x8, 0x0) socket(0xa, 0x3, 0x3b) connect$auto(0x3, 0x0, 0x55) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) 1.592568194s ago: executing program 3 (id=2199): r0 = openat$auto_dma_heap_fops_dma_heap(0xffffffffffffff9c, &(0x7f0000000200), 0x40502, 0x0) bpf$auto_BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)=@info={r0, 0x8, 0x7}, 0x6) ioctl$auto_SNDCTL_DSP_SETFRAGMENT(0xffffffffffffffff, 0xc004500a, &(0x7f0000000000)) ioctl$auto_SNDCTL_DSP_GETOPTR(0xffffffffffffffff, 0x800c5012, &(0x7f0000000080)) openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000080)='/proc/fs/ext4/sda1/mb_groups\x00', 0x40102, 0x0) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) socket(0x2, 0x1, 0x106) connect$auto(0x3, &(0x7f0000000080)=@nl=@kern={0x10, 0x0, 0x0, 0x800000}, 0x54) openat$auto_vmuser_fops_vmci_host(0xffffffffffffff9c, 0x0, 0x109001, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_taskstats(0x0, r1) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) write$auto(r2, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) keyctl$auto(0x1e, 0xfffffffffffffffc, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x1) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp1\x00', 0x20b42, 0x0) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000480)='/sys/module/zswap/parameters/compressor\x00', 0x82002, 0x0) write$auto_ocfs2_control_fops_stack_user(r3, &(0x7f0000003900)="fb", 0x1) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/libceph/parameters/supported_features\x00', 0x40000, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r4, &(0x7f0000003940)=""/4121, 0x1019) bind$auto(0x3, 0x0, 0x6a) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) close_range$auto(0x2, 0xa, 0x0) getsockopt$auto_SO_INCOMING_NAPI_ID(0xffffffffffffffff, 0x6, 0x38, &(0x7f0000000100)='/dev/ram7\x00', &(0x7f00000001c0)=0x20000000) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f682, 0x0) 1.54003242s ago: executing program 2 (id=2200): openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/input/event1\x00', 0x34d802, 0x0) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) setsockopt$auto(0x400000000000003, 0x29, 0x21, 0xffffffffffffffff, 0x0) r1 = socketcall$auto(0x8000, 0x0) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000080), 0x6d6001, 0x0) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$auto(0x3, 0xae60, 0x10000000000402) r3 = openat$auto_nsim_dev_health_break_fops_health(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/netdevsim/netdevsim5/health/break_health\x00', 0x80000, 0x0) ioctl$auto(0x3, 0xae41, r1) ioctl$auto_KVM_CREATE_VM(r0, 0xae80, 0x0) write$auto(0xffffffffffffffff, &(0x7f0000000100)='\x00\x00\x00\x00\x00\x00\x00x \xec(\x1d\x98\xe9\xc4\xe8\xfc@6=\xab\xf4\x89\x01\x93\xdc\x19\xffv\'\xa1\xd5\x14\x06S\xae\xadB}\xdf]\x99\xc9\x9f4\xbb\xc5\x81\x9d\x8ak\xdeB\xcbd\xd3\x05\xe4P\x84\xcb\xb8#\x13\nYU\'\x95R\xc8\x9d\xb7*\xe0.\xd2\xdf\x1b\x88D\x8c{k\xcec\xe1\xa2j\xec\xc9\xd2\x98\x94I\x102h\x06\x8c\xa2\xc8\x8a7\xb7t', 0x7ef) openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/tracing/per_cpu/cpu0/trace_pipe_raw\x00', 0x82040, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16, @ANYBLOB="1b0026bd7000fddbdf250300000004000800100003800c000b8008001c"], 0x4c}, 0x1, 0x0, 0x0, 0x4004040}, 0xc800) sendmsg$auto_NL80211_CMD_GET_REG(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="1448822dff0f0000000000004cd47cdf3ea3cf2ae8f4fc789766f7d31d238a9cdd72a775f1e664c0b0ba5ed9fa3fd34f240acb2c1e2c319a3eee66a2b8a41613b750cbe3a0954b82fecd2be33813cf3c7737a513360a5e4817cfe6a0000016c703f62c3dcd0000000089d4bc712aa95e0d9e49beea5c8b46c5ef25514c0870d2c825b481c2d1b124ad769fa19e48d7ea3182402d7bd26ee4ef77bc6d1f12a2455a183e2c1ed763754a1a095bcbc577151925cba0e2dc071bfacf1c77b191ef317ede1b99bd493cea0d37af7c7940d283fc46", @ANYBLOB="1000"], 0x1ac}}, 0x44080) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) r4 = socket(0x10, 0x2, 0x0) sendmmsg$auto(r4, &(0x7f0000000200)={{0x0, 0xfffffffe, &(0x7f0000000100)={&(0x7f0000000080), 0xfbe}, 0x2, &(0x7f00000001c0), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) socket(0xa, 0x1, 0x100) openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/lru_gen\x00', 0xc0000, 0x0) socket(0xa, 0x1, 0x100) r5 = socket(0x10, 0x2, 0x4) sendmsg$auto_NFSD_CMD_THREADS_SET(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="2c0000001400c7d2a2e1917949643de42b"], 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x400c000) socket(0x2b, 0x1, 0x1) recvmmsg$auto(r5, &(0x7f0000000580)={{0x0, 0x5, 0x0, 0x0, 0x0, 0x5, 0x80000001}, 0x1}, 0x3, 0x6, 0x0) 1.341210636s ago: executing program 2 (id=2201): close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) r0 = fanotify_init$auto(0x200, 0x1) r1 = open(&(0x7f0000001bc0)='./file0\x00', 0x4140, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) fanotify_init$auto(0x6a1, 0x2000000000002) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/platform/i8042/serio0/modalias\x00', 0x40000, 0x0) setsockopt$auto_SO_ATTACH_REUSEPORT_CBPF(r1, 0x8, 0x33, &(0x7f00000001c0)='[/\x00', 0xfffffffa) fanotify_mark$auto(0x0, 0x105, 0x8009, r1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_hsr(&(0x7f0000000200), r0) pwrite64$auto(0xc8, 0x0, 0xfdf5, 0x41) syz_genetlink_get_family_id$auto_seg6(&(0x7f00000000c0), r0) r2 = openat$auto_proc_fault_inject_operations_base(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/make-it-fail\x00', 0x2000, 0x0) fcntl$auto_F_OFD_SETLK(r2, 0x25, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'hsr0\x00'}) sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000000040)=ANY=[], 0x28}, 0x1, 0x0, 0x0, 0x240208cd}, 0x4054) 1.152849892s ago: executing program 0 (id=2202): socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000040)='/dev/tty12\x00', 0x800, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x1d, 0x2, 0x7) r2 = openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r3, 0x0, 0x20) ioctl$auto(r2, 0x4008af83, r2) writev$auto(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x400}, 0x5) r4 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f00000000c0), r1) sendmsg$auto_ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x75, r4, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@ETHTOOL_A_RINGS_HDS_THRESH={0x8, 0x11, 0x6}, @ETHTOOL_A_RINGS_TX={0x0, 0x9, 0x40efea2b}]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) 1.120493987s ago: executing program 2 (id=2203): openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/net/eql/ifalias\x00', 0xb02, 0x0) mmap$auto(0x0, 0x240009, 0xdf, 0x9b72, 0x7, 0x28000) execve$auto(0x0, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) openat$auto_ftrace_subsystem_filter_fops_trace_events(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/kernel/debug/tracing/events/vmalloc/filter\x00', 0x103041, 0x0) r0 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x40001, 0x0) ftruncate$auto(0x3, 0x400180200000) mmap$auto(0xa, 0x40009, 0xfffffffffffff227, 0x9b72, 0xffffffffffffffff, 0x28000) write$auto(0xffffffffffffffff, &(0x7f0000000300)='.o\xd3\xa49\xaf\xa9\xe4\xe17\x12\xb3Z\x17I\x82\xdc\xbeiw\xc1\xd1\x8d\x9b\r\x9aR\xe7\x9f\xd8\xab\x16`f\nT\xaa\xfap \xe6\xdaV\xdeD\x8dR5\xd2\xe58\n\xff\x19+\xeb\xb3+\xf6\xc6\a\x00\x00\x00\xf1A\xa5\x95\x1fk\x1f\xff\x99gP\x9e\x88\x97]\x93\xf4\xdd<\xe7p\x0e\xd4C\xdc\x84\v\xafz\xfd\x81\xa3\xb2\xbb\xa4\xd9\xf2P\xa8\xe9\x8f\x13\xa7\x98\x85\xf8\v\aB\xfc\xfa\x14E\xb8y\x884<\xa7\xffyb\x8a\b\xbb\x1b\x13W\xe3\xf7\xd8\x83\xc9\xd7\x8c', 0x6) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x2deb43, 0x0) faccessat2$auto(0xffffffffffffffff, 0x0, 0x0, 0x7) read$auto(r1, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) mmap$auto(0x2, 0x401, 0x1000, 0x8000000000000011, 0xffffffffffffffff, 0x5) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0xc40, 0x0) r3 = syz_genetlink_get_family_id$auto_seg6(&(0x7f0000000100), 0xffffffffffffffff) r4 = openat$auto_nsim_dev_health_break_fops_health(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/netdevsim/netdevsim2/health/break_health\x00', 0x48081, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ovs_packet(&(0x7f0000001940), 0xffffffffffffffff) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYRES64, @ANYRES64=r0, @ANYRESDEC=r3, @ANYRES64=r2, @ANYBLOB="894f844ea904ebea19000000120001640043005af77d2e758fa4192512ca5b0000"], 0x4c}, 0x1, 0x0, 0x0, 0x4004040}, 0x4844) write$auto(r4, 0x0, 0x1ff) prctl$auto_PR_SCHED_CORE_GET(0x9, 0x0, 0x0, 0x0, 0x26fa) r6 = openat$auto_loop_ctl_fops_loop(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) r7 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) write$auto(r7, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) pselect6$auto(0x400, &(0x7f0000000000)={[0x8, 0x4, 0x40000000000000, 0x6, 0x7fffffff, 0xffffffffffffffff, 0xfff, 0x6, 0x3, 0xffffffff, 0x8000000000000001, 0x0, 0x2f, 0x2, 0x8, 0xfffffffffffffffe]}, 0x0, 0x0, 0x0, 0x0) setresuid$auto(0x8, 0x8, 0x0) ioctl$auto_LOOP_CTL_ADD(r6, 0x4c80, 0xfffffffffffffffd) 987.280394ms ago: executing program 1 (id=2204): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x25, 0x1, 0x0) r1 = openat$auto_snd_timer_f_ops_timer(0xffffffffffffff9c, &(0x7f0000000080), 0x48180, 0x0) ioctl$auto_SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000280)={{0x3, 0x1000, 0x1, 0x1, 0x8}, "654c6dbc7a4d30983899a7e1325b6a29ba1e184410ba9f74e82a3fa6c3ccf1bf"}) ioctl$auto_SNDRV_TIMER_IOCTL_STATUS32(r1, 0x80585414, 0x0) setsockopt$auto(r0, 0x116, 0x7f, 0x0, 0x400) mmap$auto(0x0, 0x2020009, 0x80000000b1, 0x200000000eb1, 0xfffffffffffffffa, 0x0) futex$auto(0x0, 0x88, 0x7, 0x0, 0x0, 0x4) 258.088747ms ago: executing program 0 (id=2205): read$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffffff, &(0x7f0000000080)=""/64, 0x40) 256.938899ms ago: executing program 1 (id=2206): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NETDEV_CMD_QUEUE_GET(0xffffffffffffffff, &(0x7f0000003040)={0x0, 0x0, &(0x7f0000003000)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00F\x00', @ANYRES16=0x0, @ANYBLOB="01002cbd7000fbdbdf250a0000000800010080000000080002"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x20004080) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x40000) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) mmap$auto(0x0, 0x2000c, 0xdf, 0x20eb1, 0x40000000000a5, 0x8000) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x7, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/security/tomoyo/audit\x00', 0x200, 0x0) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$auto(0xffffffffffffffff, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) openat$auto_snd_pcm_f_ops_pcm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snd/pcmC0D0p\x00', 0xa00, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ram4\x00', 0xdd01, 0x0) ioctl$auto_BLKRRPART(r0, 0x125f, 0x27) open(0x0, 0x163140, 0x98) msync$auto(0x1ffff000, 0x1800000ff010000, 0x400000004) open(0x0, 0xeee00, 0x31) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/fail-nth\x00', 0x193400, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000040), 0xffffffffffffffff) socket(0xa, 0x801, 0x106) r1 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_HWSIM_CMD_NEW_RADIO(r2, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="010029bd7000fedbdf250400000006000b002c690000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000060}, 0x0) socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) 254.881104ms ago: executing program 2 (id=2207): r0 = openat$auto_nsim_dev_take_snapshot_fops_dev(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/netdevsim/netdevsim4/take_snapshot\x00', 0x92dc1, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/block/nbd11/queue/iostats_passthrough\x00', 0x2a001, 0x0) bpf$auto(0x6, &(0x7f00000001c0)=@bpf_attr_0={0x7, 0xb5, 0xc, 0x4, 0x53400000, 0xffffffffffffffff, 0x9, "2af051b26b658a20d8dc6b36c83ce63f", 0x0, 0xffffffffffffffff, 0x5, 0x7, 0x7, 0x6}, 0x10) r1 = openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bus/usb/023/001\x00', 0xa821, 0x0) r2 = getpid() process_vm_readv$auto(r2, &(0x7f0000000000)={0x0, 0xfff}, 0x1, &(0x7f0000000280)={&(0x7f0000000080), 0xf}, 0x5b, 0x0) ioctl$auto_USBDEVFS_SUBMITURB32(r1, 0x802c550a, &(0x7f00000001c0)=ANY=[@ANYBLOB="028006000000000085"]) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_ovs_flow(&(0x7f0000000180), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_OVS_FLOW_CMD_GET(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)={0x1c, r4, 0x1, 0x70bd29, 0x25dfdc02, {}, [@OVS_FLOW_ATTR_PROBE={0x4}, @OVS_FLOW_ATTR_PROBE={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x200400f0}, 0x800) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) r6 = openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/pagemap\x00', 0x80800, 0x0) read$auto(r6, 0x0, 0x39b8) r7 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000080), 0xffffffffffffffff) lstat$auto(0x0, &(0x7f0000000180)={0x4, 0x1c, 0x9, 0x63, 0x0, 0x0, 0x0, 0x1000, 0x8, 0x80000000000000a, 0x40000402, 0x9, 0x9, 0xffffffff80000000, 0xd, 0x6, 0x200000100103}) socket$nl_generic(0x10, 0x3, 0x10) setresuid$auto(0x8000000000000001, 0x1, 0x200) mlockall$auto(0x7) mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x8000) mmap$auto(0x0, 0x20009, 0x29b010c0, 0x100000eb1, 0x40000000000a1, 0x8000) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000000)={0x0, 0xfc2}, 0x2, 0x0, 0x4, 0xa505}, 0x800}, 0x7, 0x4008) sendmsg$auto_ETHTOOL_MSG_TUNNEL_INFO_GET(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r7, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_TUNNEL_INFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xfffffffc}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x24000000}, 0x4000000) write$auto_nsim_dev_take_snapshot_fops_dev(r0, 0x0, 0x0) ioctl$auto(r0, 0x0, r0) getsockopt$auto_SO_SNDLOWAT(r0, 0x0, 0x13, &(0x7f0000000040)='&+\x00', &(0x7f0000000080)=0x80) 74.572834ms ago: executing program 0 (id=2208): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x48a22, 0x0) mmap$auto(0x16, 0x20009, 0xdf, 0x90, 0x401, 0x8000) mmap$auto(0x8, 0x20009, 0xf, 0x800000000000ebf, r0, 0x8) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x3) open(0x0, 0x163340, 0x6a) socket(0x2, 0x4, 0x0) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) mmap$auto(0x3, 0x8, 0xdc, 0x17, 0x2, 0x8000) socketpair$auto(0x3, 0x2, 0x103, 0x0) lsm_list_modules$auto(0x0, 0x0, 0x0) r1 = socket(0x25, 0x801, 0xe) getsockopt$auto(r1, 0x11c, 0x3, 0x0, 0x0) connect$auto(0x3, &(0x7f0000000140)=@in={0x2, 0x4e21, @rand_addr=0x64010101}, 0x851) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7fffffe) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x135) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x2446c0, 0x35) fallocate$auto(0x8000000000000003, 0x0, 0x8001, 0x9) utimes$auto(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) mmap$auto(0x0, 0x1, 0xfd5, 0x12, r3, 0x0) mmap$auto(0x0, 0x9, 0xffb, 0x8000000008011, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0xfffffffffffffffb, 0x2, 0x100000021, 0x113, r4, 0x8000) setsockopt$auto(0x3, 0x0, 0xca, 0xfffffffffffffffc, 0x4) open(0x0, 0x161342, 0x100) r5 = open(&(0x7f0000000040)='./file0\x00', 0x1ebe02, 0x12b) mmap$auto(0x0, 0x8000000000000011, 0xe1, 0xfffffffffffffffd, r5, 0x8000) writev$auto(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x400000000000fdf1}, 0xd39) 0s ago: executing program 2 (id=2209): r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty12\x00', 0x800, 0x0) ioctl$auto(r0, 0x4b65, 0x9) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00', 0x0}) sendmsg$auto_NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0100cda4429629bd7100f9db5f250200000000", @ANYRESOCT=r1], 0x24}, 0x1, 0x0, 0x0, 0x2c0080c0}, 0x80) openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000100), 0x8001, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmmsg$auto(r3, &(0x7f0000000140)={{0x0, 0x3, &(0x7f0000000000)={&(0x7f00000001c0)="b0c3b99f069a212e2bf442acf3134e7caf865da691e5595855cd70a13fd83a24657f040e8f34f8742a811d9af917a807ca5445172329e02299f764fb331d6ac9972a0b622961f6cd6d5a7f5cb78ade77e8f5c25b497b9508512ccf162aec9c0fa6956e5304621c6d8fec57aa165fccb2265ff2852c2290a7196941aca286d7a1daf1d2ae9fdff8dbac289a34822b09d006154752f077628dff1b925505c04bf8f6227f5df7dd1e2e0660b25f342cd0b4", 0xfc2}, 0x5, 0x0, 0x7, 0xa505}, 0x800}, 0x8, 0x4008) r4 = gettid() kcmp$auto(r4, r4, 0x91f, 0xffffffffffffffff, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) kernel console output (not intermixed with test programs): vkms_vblank_simulate: vblank timer overrun [ 476.554479][T13212] FAULT_INJECTION: forcing a failure. [ 476.554479][T13212] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 476.627447][T13212] CPU: 1 UID: 0 PID: 13212 Comm: syz.2.1833 Tainted: G U syzkaller #0 PREEMPT(full) [ 476.627474][T13212] Tainted: [U]=USER [ 476.627479][T13212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 476.627489][T13212] Call Trace: [ 476.627495][T13212] [ 476.627502][T13212] dump_stack_lvl+0x16c/0x1f0 [ 476.627526][T13212] should_fail_ex+0x512/0x640 [ 476.627549][T13212] should_fail_alloc_page+0xe7/0x130 [ 476.627572][T13212] prepare_alloc_pages+0x3c2/0x610 [ 476.627594][T13212] ? rcu_is_watching+0x12/0xc0 [ 476.627611][T13212] __alloc_frozen_pages_noprof+0x18b/0x23f0 [ 476.627629][T13212] ? css_rstat_updated+0x1c2/0x510 [ 476.627645][T13212] ? __pfx_css_rstat_updated+0x10/0x10 [ 476.627667][T13212] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 476.627691][T13212] ? __lock_acquire+0x62e/0x1ce0 [ 476.627713][T13212] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 476.627735][T13212] ? policy_nodemask+0xea/0x4e0 [ 476.627756][T13212] alloc_pages_mpol+0x1fb/0x550 [ 476.627783][T13212] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 476.627805][T13212] ? __lock_acquire+0x62e/0x1ce0 [ 476.627826][T13212] folio_alloc_mpol_noprof+0x36/0x2f0 [ 476.627849][T13212] vma_alloc_folio_noprof+0xed/0x1e0 [ 476.627872][T13212] ? __pfx_vma_alloc_folio_noprof+0x10/0x10 [ 476.627900][T13212] do_pte_missing+0x2230/0x3ba0 [ 476.627915][T13212] ? find_held_lock+0x2b/0x80 [ 476.627934][T13212] __handle_mm_fault+0x152a/0x2a50 [ 476.627955][T13212] ? __pfx___handle_mm_fault+0x10/0x10 [ 476.627972][T13212] ? __pte_offset_map_lock+0x174/0x310 [ 476.627992][T13212] ? find_held_lock+0x2b/0x80 [ 476.628012][T13212] ? follow_page_pte.constprop.0+0x5cf/0x1390 [ 476.628038][T13212] handle_mm_fault+0x589/0xd10 [ 476.628056][T13212] __get_user_pages+0x551/0x34a0 [ 476.628085][T13212] ? __pfx___get_user_pages+0x10/0x10 [ 476.628111][T13212] populate_vma_page_range+0x267/0x3f0 [ 476.628135][T13212] ? __pfx_populate_vma_page_range+0x10/0x10 [ 476.628156][T13212] ? __pfx_find_vma_intersection+0x10/0x10 [ 476.628177][T13212] ? do_mmap+0x69c/0x1210 [ 476.628200][T13212] __mm_populate+0x1d8/0x380 [ 476.628222][T13212] ? __pfx___mm_populate+0x10/0x10 [ 476.628246][T13212] ? up_write+0x1b2/0x520 [ 476.628267][T13212] vm_mmap_pgoff+0x37f/0x470 [ 476.628291][T13212] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 476.628315][T13212] ? __x64_sys_futex+0x1e0/0x4c0 [ 476.628333][T13212] ? __x64_sys_futex+0x1e9/0x4c0 [ 476.628353][T13212] ksys_mmap_pgoff+0x7d/0x5c0 [ 476.628372][T13212] ? xfd_validate_state+0x61/0x180 [ 476.628392][T13212] ? do_execveat_common.isra.0+0x4c6/0x610 [ 476.628412][T13212] __x64_sys_mmap+0x125/0x190 [ 476.628436][T13212] do_syscall_64+0xcd/0x490 [ 476.628458][T13212] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 476.628473][T13212] RIP: 0033:0x7f894658ebe9 [ 476.628487][T13212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 476.628502][T13212] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 476.628516][T13212] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 476.628526][T13212] RDX: 00000000000000df RSI: 0000000000400008 RDI: 0000000000000000 [ 476.628535][T13212] RBP: 00007f8946611e19 R08: 0000000000000002 R09: 0000000000008000 [ 476.628544][T13212] R10: 0000000000009b72 R11: 0000000000000246 R12: 0000000000000000 [ 476.628554][T13212] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 476.628574][T13212] [ 478.683051][T13235] zswap: compressor not available [ 478.821625][ T5866] Bluetooth: hci3: unexpected subevent 0x01 length: 123 > 18 [ 480.199788][T13276] FAULT_INJECTION: forcing a failure. [ 480.199788][T13276] name failslab, interval 1, probability 0, space 0, times 0 [ 480.278976][T13276] CPU: 1 UID: 0 PID: 13276 Comm: syz.1.1851 Tainted: G U syzkaller #0 PREEMPT(full) [ 480.279003][T13276] Tainted: [U]=USER [ 480.279008][T13276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 480.279017][T13276] Call Trace: [ 480.279023][T13276] [ 480.279030][T13276] dump_stack_lvl+0x16c/0x1f0 [ 480.279053][T13276] should_fail_ex+0x512/0x640 [ 480.279073][T13276] ? __kmalloc_noprof+0xbf/0x510 [ 480.279092][T13276] ? lsm_blob_alloc+0x68/0x90 [ 480.279104][T13276] should_failslab+0xc2/0x120 [ 480.279123][T13276] __kmalloc_noprof+0xd2/0x510 [ 480.279144][T13276] lsm_blob_alloc+0x68/0x90 [ 480.279157][T13276] security_sk_alloc+0x30/0x270 [ 480.279174][T13276] sk_prot_alloc+0x1c7/0x2a0 [ 480.279190][T13276] sk_alloc+0x36/0xc20 [ 480.279209][T13276] tap_open+0x2f0/0x1170 [ 480.279228][T13276] ? __pfx_tap_open+0x10/0x10 [ 480.279243][T13276] chrdev_open+0x234/0x6a0 [ 480.279260][T13276] ? __pfx_apparmor_file_open+0x10/0x10 [ 480.279277][T13276] ? __pfx_chrdev_open+0x10/0x10 [ 480.279296][T13276] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 480.279316][T13276] do_dentry_open+0x982/0x1530 [ 480.279334][T13276] ? __pfx_chrdev_open+0x10/0x10 [ 480.279356][T13276] vfs_open+0x82/0x3f0 [ 480.279379][T13276] path_openat+0x1de4/0x2cb0 [ 480.279402][T13276] ? __pfx_path_openat+0x10/0x10 [ 480.279424][T13276] do_filp_open+0x20b/0x470 [ 480.279441][T13276] ? __pfx_do_filp_open+0x10/0x10 [ 480.279471][T13276] ? alloc_fd+0x471/0x7d0 [ 480.279497][T13276] do_sys_openat2+0x11b/0x1d0 [ 480.279518][T13276] ? __pfx_do_sys_openat2+0x10/0x10 [ 480.279541][T13276] ? __fget_files+0x20e/0x3c0 [ 480.279559][T13276] __x64_sys_openat+0x174/0x210 [ 480.279580][T13276] ? __pfx___x64_sys_openat+0x10/0x10 [ 480.279601][T13276] ? ksys_write+0x1ac/0x250 [ 480.279624][T13276] do_syscall_64+0xcd/0x490 [ 480.279644][T13276] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 480.279660][T13276] RIP: 0033:0x7fd12f98ebe9 [ 480.279672][T13276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 480.279687][T13276] RSP: 002b:00007fd130837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 480.279701][T13276] RAX: ffffffffffffffda RBX: 00007fd12fbc5fa0 RCX: 00007fd12f98ebe9 [ 480.279711][T13276] RDX: 0000000000000001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 480.279720][T13276] RBP: 00007fd130837090 R08: 0000000000000000 R09: 0000000000000000 [ 480.279729][T13276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 480.279738][T13276] R13: 00007fd12fbc6038 R14: 00007fd12fbc5fa0 R15: 00007fffc961e008 [ 480.279757][T13276] [ 480.846661][ T5866] Bluetooth: hci3: command 0x0c1a tx timeout [ 482.124491][T13315] FAULT_INJECTION: forcing a failure. [ 482.124491][T13315] name failslab, interval 1, probability 0, space 0, times 0 [ 482.172714][T13315] CPU: 1 UID: 0 PID: 13315 Comm: syz.2.1862 Tainted: G U syzkaller #0 PREEMPT(full) [ 482.172740][T13315] Tainted: [U]=USER [ 482.172745][T13315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 482.172754][T13315] Call Trace: [ 482.172760][T13315] [ 482.172766][T13315] dump_stack_lvl+0x16c/0x1f0 [ 482.172789][T13315] should_fail_ex+0x512/0x640 [ 482.172809][T13315] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 482.172829][T13315] should_failslab+0xc2/0x120 [ 482.172848][T13315] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 482.172865][T13315] ? getname_flags.part.0+0x4c/0x550 [ 482.172890][T13315] getname_flags.part.0+0x4c/0x550 [ 482.172913][T13315] getname_flags+0x93/0xf0 [ 482.172929][T13315] do_sys_openat2+0xb8/0x1d0 [ 482.172949][T13315] ? __pfx_do_sys_openat2+0x10/0x10 [ 482.172972][T13315] ? __fget_files+0x20e/0x3c0 [ 482.172992][T13315] __x64_sys_openat+0x174/0x210 [ 482.173013][T13315] ? __pfx___x64_sys_openat+0x10/0x10 [ 482.173034][T13315] ? ksys_write+0x1ac/0x250 [ 482.173056][T13315] do_syscall_64+0xcd/0x490 [ 482.173077][T13315] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 482.173092][T13315] RIP: 0033:0x7f894658ebe9 [ 482.173104][T13315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 482.173119][T13315] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 482.173133][T13315] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 482.173143][T13315] RDX: 000000000008a340 RSI: 0000200000000300 RDI: ffffffffffffff9c [ 482.173152][T13315] RBP: 00007f89474dd090 R08: 0000000000000000 R09: 0000000000000000 [ 482.173161][T13315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 482.173169][T13315] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 482.173187][T13315] [ 482.359670][ C1] vkms_vblank_simulate: vblank timer overrun [ 482.404371][T13320] netlink: 25 bytes leftover after parsing attributes in process `syz.0.1863'. [ 482.462887][T13322] vhci_hcd: invalid port number 21 [ 484.780365][T13373] input: jJǸ-9%vlQ J86 as /devices/virtual/input/input31 [ 485.149762][T13377] FAULT_INJECTION: forcing a failure. [ 485.149762][T13377] name fail_futex, interval 1, probability 0, space 0, times 0 [ 485.209484][T13377] CPU: 1 UID: 0 PID: 13377 Comm: syz.3.1878 Tainted: G U syzkaller #0 PREEMPT(full) [ 485.209515][T13377] Tainted: [U]=USER [ 485.209520][T13377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 485.209530][T13377] Call Trace: [ 485.209536][T13377] [ 485.209543][T13377] dump_stack_lvl+0x16c/0x1f0 [ 485.209569][T13377] should_fail_ex+0x512/0x640 [ 485.209592][T13377] get_futex_key+0x1d0/0x1560 [ 485.209613][T13377] ? __pfx_get_futex_key+0x10/0x10 [ 485.209630][T13377] ? futex_private_hash_put+0x176/0x300 [ 485.209652][T13377] futex_wake+0xea/0x530 [ 485.209675][T13377] ? __pfx_futex_wake+0x10/0x10 [ 485.209699][T13377] ? ksys_write+0x190/0x250 [ 485.209718][T13377] do_futex+0x1e3/0x350 [ 485.209737][T13377] ? __pfx_do_futex+0x10/0x10 [ 485.209755][T13377] ? cap_task_prctl+0x2af/0xa80 [ 485.209774][T13377] __x64_sys_futex+0x1e0/0x4c0 [ 485.209794][T13377] ? __pfx___x64_sys_futex+0x10/0x10 [ 485.209813][T13377] ? __pfx___do_sys_prctl+0x10/0x10 [ 485.209840][T13377] do_syscall_64+0xcd/0x490 [ 485.209862][T13377] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 485.209876][T13377] RIP: 0033:0x7f673b98ebe9 [ 485.209889][T13377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 485.209904][T13377] RSP: 002b:00007f673c7330e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 485.209918][T13377] RAX: ffffffffffffffda RBX: 00007f673bbc5fa8 RCX: 00007f673b98ebe9 [ 485.209929][T13377] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f673bbc5fac [ 485.209945][T13377] RBP: 00007f673bbc5fa0 R08: 00007f673c734000 R09: 0000000000000000 [ 485.209955][T13377] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 485.209965][T13377] R13: 00007f673bbc6038 R14: 00007fffda9c9d30 R15: 00007fffda9c9e18 [ 485.209984][T13377] [ 485.395279][ C1] vkms_vblank_simulate: vblank timer overrun [ 485.403039][T13378] FAULT_INJECTION: forcing a failure. [ 485.403039][T13378] name failslab, interval 1, probability 0, space 0, times 0 [ 485.416363][T13378] CPU: 1 UID: 0 PID: 13378 Comm: syz.3.1878 Tainted: G U syzkaller #0 PREEMPT(full) [ 485.416387][T13378] Tainted: [U]=USER [ 485.416393][T13378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 485.416402][T13378] Call Trace: [ 485.416408][T13378] [ 485.416414][T13378] dump_stack_lvl+0x16c/0x1f0 [ 485.416439][T13378] should_fail_ex+0x512/0x640 [ 485.416459][T13378] ? __kmalloc_noprof+0xbf/0x510 [ 485.416478][T13378] ? lsm_blob_alloc+0x68/0x90 [ 485.416491][T13378] should_failslab+0xc2/0x120 [ 485.416510][T13378] __kmalloc_noprof+0xd2/0x510 [ 485.416531][T13378] lsm_blob_alloc+0x68/0x90 [ 485.416544][T13378] security_prepare_creds+0x30/0x270 [ 485.416566][T13378] prepare_creds+0x56f/0x7d0 [ 485.416588][T13378] __sys_setresuid+0x46d/0x1160 [ 485.416607][T13378] do_syscall_64+0xcd/0x490 [ 485.416628][T13378] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 485.416644][T13378] RIP: 0033:0x7f673b98ebe9 [ 485.416656][T13378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 485.416671][T13378] RSP: 002b:00007f6739bf6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 485.416685][T13378] RAX: ffffffffffffffda RBX: 00007f673bbc6090 RCX: 00007f673b98ebe9 [ 485.416695][T13378] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 485.416703][T13378] RBP: 00007f673ba11e19 R08: 0000000000000000 R09: 0000000000000000 [ 485.416712][T13378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 485.416721][T13378] R13: 00007f673bbc6128 R14: 00007f673bbc6090 R15: 00007fffda9c9e18 [ 485.416740][T13378] [ 485.585525][ C1] vkms_vblank_simulate: vblank timer overrun [ 485.894811][T13384] FAULT_INJECTION: forcing a failure. [ 485.894811][T13384] name fail_futex, interval 1, probability 0, space 0, times 0 [ 485.915557][T13384] CPU: 1 UID: 0 PID: 13384 Comm: syz.0.1879 Tainted: G U syzkaller #0 PREEMPT(full) [ 485.915583][T13384] Tainted: [U]=USER [ 485.915588][T13384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 485.915598][T13384] Call Trace: [ 485.915603][T13384] [ 485.915609][T13384] dump_stack_lvl+0x16c/0x1f0 [ 485.915634][T13384] should_fail_ex+0x512/0x640 [ 485.915657][T13384] get_futex_key+0x1d0/0x1560 [ 485.915678][T13384] ? __pfx_get_futex_key+0x10/0x10 [ 485.915698][T13384] ? __pfx_netlink_sendmsg+0x10/0x10 [ 485.915722][T13384] futex_wait_setup+0x9d/0x550 [ 485.915748][T13384] __futex_wait+0x194/0x2f0 [ 485.915769][T13384] ? __pfx___futex_wait+0x10/0x10 [ 485.915793][T13384] ? __pfx_futex_wake_mark+0x10/0x10 [ 485.915816][T13384] ? futex_private_hash_put+0x176/0x300 [ 485.915835][T13384] ? futex_private_hash_put+0x18a/0x300 [ 485.915854][T13384] futex_wait+0xe8/0x380 [ 485.915874][T13384] ? __pfx_futex_wait+0x10/0x10 [ 485.915918][T13384] do_futex+0x229/0x350 [ 485.915937][T13384] ? __pfx_do_futex+0x10/0x10 [ 485.915955][T13384] ? fput+0x9b/0xd0 [ 485.915976][T13384] ? __sys_sendmsg+0x18c/0x220 [ 485.915997][T13384] __x64_sys_futex+0x1e0/0x4c0 [ 485.916017][T13384] ? __pfx___x64_sys_futex+0x10/0x10 [ 485.916043][T13384] do_syscall_64+0xcd/0x490 [ 485.916065][T13384] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 485.916080][T13384] RIP: 0033:0x7f48b0d8ebe9 [ 485.916093][T13384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 485.916107][T13384] RSP: 002b:00007f48b1ca10e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 485.916122][T13384] RAX: ffffffffffffffda RBX: 00007f48b0fc5fa8 RCX: 00007f48b0d8ebe9 [ 485.916132][T13384] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f48b0fc5fa8 [ 485.916141][T13384] RBP: 00007f48b0fc5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 485.916151][T13384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 485.916160][T13384] R13: 00007f48b0fc6038 R14: 00007ffd79b164f0 R15: 00007ffd79b165d8 [ 485.916179][T13384] [ 485.918639][T13384] FAULT_INJECTION: forcing a failure. [ 485.918639][T13384] name failslab, interval 1, probability 0, space 0, times 0 [ 486.585708][T13384] CPU: 1 UID: 0 PID: 13384 Comm: syz.0.1879 Tainted: G U syzkaller #0 PREEMPT(full) [ 486.585735][T13384] Tainted: [U]=USER [ 486.585741][T13384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 486.585750][T13384] Call Trace: [ 486.585756][T13384] [ 486.585763][T13384] dump_stack_lvl+0x16c/0x1f0 [ 486.585787][T13384] should_fail_ex+0x512/0x640 [ 486.585810][T13384] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 486.585836][T13384] should_failslab+0xc2/0x120 [ 486.585856][T13384] __kmalloc_cache_noprof+0x6a/0x3e0 [ 486.585872][T13384] ? alloc_ucounts+0x13d/0x440 [ 486.585893][T13384] alloc_ucounts+0x13d/0x440 [ 486.585910][T13384] ? __pfx_alloc_ucounts+0x10/0x10 [ 486.585933][T13384] set_cred_ucounts+0xcd/0x200 [ 486.585956][T13384] __sys_setresuid+0x67c/0x1160 [ 486.585976][T13384] do_syscall_64+0xcd/0x490 [ 486.585997][T13384] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 486.586011][T13384] RIP: 0033:0x7f48b0d8ebe9 [ 486.586023][T13384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 486.586038][T13384] RSP: 002b:00007f48b1ca1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 486.586052][T13384] RAX: ffffffffffffffda RBX: 00007f48b0fc5fa0 RCX: 00007f48b0d8ebe9 [ 486.586062][T13384] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 486.586070][T13384] RBP: 00007f48b0e11e19 R08: 0000000000000000 R09: 0000000000000000 [ 486.586079][T13384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 486.586087][T13384] R13: 00007f48b0fc6038 R14: 00007f48b0fc5fa0 R15: 00007ffd79b165d8 [ 486.586105][T13384] [ 486.755737][ C1] vkms_vblank_simulate: vblank timer overrun [ 486.839192][T13403] device-mapper: ioctl: ioctl interface mismatch: kernel(4.50.0), user(0.8192.1450), cmd(3) [ 486.970653][ T30] audit: type=1806 audit(6138073223.094:16): xattr="" res=-22 [ 487.493598][T13413] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1889'. [ 487.554927][T13413] hsr0: entered allmulticast mode [ 487.583710][T13413] hsr_slave_0: entered allmulticast mode [ 487.626174][T13413] hsr_slave_1: entered allmulticast mode [ 487.745198][T13417] FAULT_INJECTION: forcing a failure. [ 487.745198][T13417] name failslab, interval 1, probability 0, space 0, times 0 [ 487.832331][T13419] FAULT_INJECTION: forcing a failure. [ 487.832331][T13419] name failslab, interval 1, probability 0, space 0, times 0 [ 487.853677][T13422] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 487.900574][T13421] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 487.924024][T13417] CPU: 1 UID: 0 PID: 13417 Comm: syz.0.1890 Tainted: G U syzkaller #0 PREEMPT(full) [ 487.924051][T13417] Tainted: [U]=USER [ 487.924057][T13417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 487.924067][T13417] Call Trace: [ 487.924073][T13417] [ 487.924080][T13417] dump_stack_lvl+0x16c/0x1f0 [ 487.924105][T13417] should_fail_ex+0x512/0x640 [ 487.924126][T13417] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 487.924146][T13417] should_failslab+0xc2/0x120 [ 487.924165][T13417] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 487.924182][T13417] ? alloc_empty_file+0x55/0x1e0 [ 487.924207][T13417] alloc_empty_file+0x55/0x1e0 [ 487.924228][T13417] path_openat+0xda/0x2cb0 [ 487.924244][T13417] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 487.924266][T13417] ? __pfx_path_openat+0x10/0x10 [ 487.924287][T13417] do_filp_open+0x20b/0x470 [ 487.924304][T13417] ? __pfx_do_filp_open+0x10/0x10 [ 487.924334][T13417] ? alloc_fd+0x471/0x7d0 [ 487.924354][T13417] do_sys_openat2+0x11b/0x1d0 [ 487.924375][T13417] ? __pfx_do_sys_openat2+0x10/0x10 [ 487.924407][T13417] __x64_sys_openat+0x174/0x210 [ 487.924429][T13417] ? __pfx___x64_sys_openat+0x10/0x10 [ 487.924458][T13417] do_syscall_64+0xcd/0x490 [ 487.924479][T13417] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 487.924494][T13417] RIP: 0033:0x7f48b0d8ebe9 [ 487.924507][T13417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 487.924525][T13417] RSP: 002b:00007f48b1ca1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 487.924541][T13417] RAX: ffffffffffffffda RBX: 00007f48b0fc5fa0 RCX: 00007f48b0d8ebe9 [ 487.924550][T13417] RDX: 0000000000000040 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 487.924560][T13417] RBP: 00007f48b0e11e19 R08: 0000000000000000 R09: 0000000000000000 [ 487.924569][T13417] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 487.924578][T13417] R13: 00007f48b0fc6038 R14: 00007f48b0fc5fa0 R15: 00007ffd79b165d8 [ 487.924598][T13417] [ 487.926963][T13419] CPU: 1 UID: 0 PID: 13419 Comm: syz.0.1890 Tainted: G U syzkaller #0 PREEMPT(full) [ 487.926987][T13419] Tainted: [U]=USER [ 487.926993][T13419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 487.927002][T13419] Call Trace: [ 487.927008][T13419] [ 487.927014][T13419] dump_stack_lvl+0x16c/0x1f0 [ 487.927037][T13419] should_fail_ex+0x512/0x640 [ 487.927058][T13419] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 487.927075][T13419] should_failslab+0xc2/0x120 [ 487.927095][T13419] __kmalloc_cache_noprof+0x6a/0x3e0 [ 487.927111][T13419] ? alloc_ucounts+0x13d/0x440 [ 487.927132][T13419] alloc_ucounts+0x13d/0x440 [ 487.927150][T13419] ? __pfx_alloc_ucounts+0x10/0x10 [ 487.927173][T13419] set_cred_ucounts+0xcd/0x200 [ 487.927197][T13419] __sys_setresuid+0x67c/0x1160 [ 487.927218][T13419] do_syscall_64+0xcd/0x490 [ 487.927238][T13419] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 487.927254][T13419] RIP: 0033:0x7f48b0d8ebe9 [ 487.927266][T13419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 487.927281][T13419] RSP: 002b:00007f48b1c80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 487.927295][T13419] RAX: ffffffffffffffda RBX: 00007f48b0fc6090 RCX: 00007f48b0d8ebe9 [ 487.927305][T13419] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 487.927314][T13419] RBP: 00007f48b0e11e19 R08: 0000000000000000 R09: 0000000000000000 [ 487.927323][T13419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 487.927332][T13419] R13: 00007f48b0fc6128 R14: 00007f48b0fc6090 R15: 00007ffd79b165d8 [ 487.927350][T13419] [ 488.294382][ C1] vkms_vblank_simulate: vblank timer overrun [ 488.352692][T13426] netlink: 'syz.2.1893': attribute type 1 has an invalid length. [ 488.360578][T13426] netlink: 33 bytes leftover after parsing attributes in process `syz.2.1893'. [ 488.574146][T13437] random: crng reseeded on system resumption [ 491.708676][T13525] FAULT_INJECTION: forcing a failure. [ 491.708676][T13525] name failslab, interval 1, probability 0, space 0, times 0 [ 491.770420][T13525] CPU: 1 UID: 0 PID: 13525 Comm: syz.3.1914 Tainted: G U syzkaller #0 PREEMPT(full) [ 491.770446][T13525] Tainted: [U]=USER [ 491.770452][T13525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 491.770462][T13525] Call Trace: [ 491.770468][T13525] [ 491.770474][T13525] dump_stack_lvl+0x16c/0x1f0 [ 491.770500][T13525] should_fail_ex+0x512/0x640 [ 491.770521][T13525] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 491.770539][T13525] should_failslab+0xc2/0x120 [ 491.770558][T13525] __kmalloc_cache_noprof+0x6a/0x3e0 [ 491.770572][T13525] ? snd_mixer_oss_put_volume1_sw.constprop.0.isra.0+0x305/0x610 [ 491.770596][T13525] ? snd_mixer_oss_put_volume1_sw.constprop.0.isra.0+0x3b3/0x610 [ 491.770619][T13525] ? snd_mixer_oss_put_volume1_sw.constprop.0.isra.0+0xa4/0x610 [ 491.770645][T13525] snd_mixer_oss_put_volume1_sw.constprop.0.isra.0+0xa4/0x610 [ 491.770672][T13525] snd_mixer_oss_put_recsrc1_sw+0x87/0xc0 [ 491.770696][T13525] snd_mixer_oss_ioctl1+0xb52/0x1e40 [ 491.770715][T13525] ? lockdep_hardirqs_on+0x7c/0x110 [ 491.770735][T13525] ? __pfx_snd_mixer_oss_put_recsrc1_sw+0x10/0x10 [ 491.770758][T13525] ? __pfx_snd_mixer_oss_ioctl1+0x10/0x10 [ 491.770778][T13525] ? tomoyo_path_number_perm+0x295/0x580 [ 491.770800][T13525] ? tomoyo_path_number_perm+0x18d/0x580 [ 491.770819][T13525] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 491.770846][T13525] snd_mixer_oss_ioctl_card+0x102/0x170 [ 491.770868][T13525] ? __pfx_snd_mixer_oss_ioctl_card+0x10/0x10 [ 491.770894][T13525] snd_pcm_oss_ioctl+0x137c/0x37a0 [ 491.770910][T13525] ? find_held_lock+0x2b/0x80 [ 491.770924][T13525] ? hook_file_ioctl_common+0x145/0x410 [ 491.770943][T13525] ? __pfx_snd_pcm_oss_ioctl+0x10/0x10 [ 491.770961][T13525] ? __fget_files+0x20e/0x3c0 [ 491.770979][T13525] ? __pfx_snd_pcm_oss_ioctl+0x10/0x10 [ 491.770995][T13525] __x64_sys_ioctl+0x18e/0x210 [ 491.771019][T13525] do_syscall_64+0xcd/0x490 [ 491.771040][T13525] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 491.771055][T13525] RIP: 0033:0x7f673b98ebe9 [ 491.771067][T13525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 491.771082][T13525] RSP: 002b:00007f673c733038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 491.771096][T13525] RAX: ffffffffffffffda RBX: 00007f673bbc5fa0 RCX: 00007f673b98ebe9 [ 491.771106][T13525] RDX: 0000000000000000 RSI: 00000000c0044dff RDI: 0000000000000002 [ 491.771116][T13525] RBP: 00007f673ba11e19 R08: 0000000000000000 R09: 0000000000000000 [ 491.771125][T13525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 491.771133][T13525] R13: 00007f673bbc6038 R14: 00007f673bbc5fa0 R15: 00007fffda9c9e18 [ 491.771153][T13525] [ 492.366504][T13510] FAULT_INJECTION: forcing a failure. [ 492.366504][T13510] name fail_futex, interval 1, probability 0, space 0, times 0 [ 492.488143][T13510] CPU: 1 UID: 0 PID: 13510 Comm: syz.1.1911 Tainted: G U syzkaller #0 PREEMPT(full) [ 492.488170][T13510] Tainted: [U]=USER [ 492.488176][T13510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 492.488185][T13510] Call Trace: [ 492.488190][T13510] [ 492.488196][T13510] dump_stack_lvl+0x16c/0x1f0 [ 492.488220][T13510] should_fail_ex+0x512/0x640 [ 492.488242][T13510] get_futex_key+0xff0/0x1560 [ 492.488264][T13510] ? __pfx_get_futex_key+0x10/0x10 [ 492.488288][T13510] ? __mutex_trylock_common+0xe9/0x250 [ 492.488313][T13510] futex_wake+0xea/0x530 [ 492.488336][T13510] ? __pfx_futex_wake+0x10/0x10 [ 492.488363][T13510] do_futex+0x1e3/0x350 [ 492.488381][T13510] ? __pfx_do_futex+0x10/0x10 [ 492.488398][T13510] ? __might_fault+0xe3/0x190 [ 492.488419][T13510] mm_release+0x24e/0x300 [ 492.488437][T13510] do_exit+0x68e/0x2bf0 [ 492.488460][T13510] ? __pfx_do_exit+0x10/0x10 [ 492.488479][T13510] ? do_raw_spin_lock+0x12c/0x2b0 [ 492.488499][T13510] ? find_held_lock+0x2b/0x80 [ 492.488516][T13510] do_group_exit+0xd3/0x2a0 [ 492.488536][T13510] get_signal+0x2673/0x26d0 [ 492.488560][T13510] ? __pfx_get_signal+0x10/0x10 [ 492.488576][T13510] ? do_futex+0x122/0x350 [ 492.488593][T13510] ? __pfx_do_futex+0x10/0x10 [ 492.488612][T13510] arch_do_signal_or_restart+0x8f/0x790 [ 492.488632][T13510] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 492.488656][T13510] ? __pfx___do_sys_close_range+0x10/0x10 [ 492.488678][T13510] exit_to_user_mode_loop+0x84/0x110 [ 492.488699][T13510] do_syscall_64+0x3f6/0x490 [ 492.488720][T13510] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 492.488735][T13510] RIP: 0033:0x7fd12f98ebe9 [ 492.488748][T13510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 492.488762][T13510] RSP: 002b:00007fd1308370e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 492.488777][T13510] RAX: fffffffffffffe00 RBX: 00007fd12fbc5fa8 RCX: 00007fd12f98ebe9 [ 492.488787][T13510] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fd12fbc5fa8 [ 492.488796][T13510] RBP: 00007fd12fbc5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 492.488805][T13510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 492.488813][T13510] R13: 00007fd12fbc6038 R14: 00007fffc961df20 R15: 00007fffc961e008 [ 492.488831][T13510] [ 493.801146][ T5866] Bluetooth: hci0: unexpected event 0x1d length: 10 > 5 [ 494.812888][T13584] FAULT_INJECTION: forcing a failure. [ 494.812888][T13584] name fail_futex, interval 1, probability 0, space 0, times 0 [ 494.894425][T13584] CPU: 1 UID: 0 PID: 13584 Comm: syz.3.1926 Tainted: G U syzkaller #0 PREEMPT(full) [ 494.894452][T13584] Tainted: [U]=USER [ 494.894457][T13584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 494.894466][T13584] Call Trace: [ 494.894471][T13584] [ 494.894478][T13584] dump_stack_lvl+0x16c/0x1f0 [ 494.894501][T13584] should_fail_ex+0x512/0x640 [ 494.894524][T13584] get_futex_key+0xff0/0x1560 [ 494.894545][T13584] ? __pfx_get_futex_key+0x10/0x10 [ 494.894561][T13584] ? __mutex_trylock_common+0xe9/0x250 [ 494.894586][T13584] futex_wake+0xea/0x530 [ 494.894609][T13584] ? __pfx_futex_wake+0x10/0x10 [ 494.894637][T13584] do_futex+0x1e3/0x350 [ 494.894654][T13584] ? __pfx_do_futex+0x10/0x10 [ 494.894671][T13584] ? __might_fault+0xe3/0x190 [ 494.894692][T13584] mm_release+0x24e/0x300 [ 494.894710][T13584] do_exit+0x68e/0x2bf0 [ 494.894733][T13584] ? __pfx_do_exit+0x10/0x10 [ 494.894752][T13584] ? do_raw_spin_lock+0x12c/0x2b0 [ 494.894772][T13584] ? find_held_lock+0x2b/0x80 [ 494.894789][T13584] do_group_exit+0xd3/0x2a0 [ 494.894810][T13584] get_signal+0x2673/0x26d0 [ 494.894833][T13584] ? __pfx_get_signal+0x10/0x10 [ 494.894849][T13584] ? do_futex+0x122/0x350 [ 494.894866][T13584] ? __pfx_do_futex+0x10/0x10 [ 494.894885][T13584] arch_do_signal_or_restart+0x8f/0x790 [ 494.894906][T13584] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 494.894929][T13584] ? __pfx___do_sys_close_range+0x10/0x10 [ 494.894951][T13584] exit_to_user_mode_loop+0x84/0x110 [ 494.894973][T13584] do_syscall_64+0x3f6/0x490 [ 494.894994][T13584] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 494.895015][T13584] RIP: 0033:0x7f673b98ebe9 [ 494.895027][T13584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 494.895041][T13584] RSP: 002b:00007f673c7330e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 494.895056][T13584] RAX: fffffffffffffe00 RBX: 00007f673bbc5fa8 RCX: 00007f673b98ebe9 [ 494.895066][T13584] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f673bbc5fa8 [ 494.895074][T13584] RBP: 00007f673bbc5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 494.895083][T13584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 494.895092][T13584] R13: 00007f673bbc6038 R14: 00007fffda9c9d30 R15: 00007fffda9c9e18 [ 494.895110][T13584] [ 495.552099][T13609] FAULT_INJECTION: forcing a failure. [ 495.552099][T13609] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 495.595922][T13609] CPU: 1 UID: 0 PID: 13609 Comm: syz.2.1932 Tainted: G U syzkaller #0 PREEMPT(full) [ 495.595949][T13609] Tainted: [U]=USER [ 495.595955][T13609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 495.595970][T13609] Call Trace: [ 495.595975][T13609] [ 495.595982][T13609] dump_stack_lvl+0x16c/0x1f0 [ 495.596008][T13609] should_fail_ex+0x512/0x640 [ 495.596032][T13609] strncpy_from_user+0x3b/0x2e0 [ 495.596053][T13609] getname_flags.part.0+0x8f/0x550 [ 495.596078][T13609] getname_flags+0x93/0xf0 [ 495.596094][T13609] do_sys_openat2+0xb8/0x1d0 [ 495.596116][T13609] ? __pfx_do_sys_openat2+0x10/0x10 [ 495.596145][T13609] __x64_sys_openat+0x174/0x210 [ 495.596167][T13609] ? __pfx___x64_sys_openat+0x10/0x10 [ 495.596197][T13609] do_syscall_64+0xcd/0x490 [ 495.596218][T13609] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 495.596233][T13609] RIP: 0033:0x7f894658ebe9 [ 495.596245][T13609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 495.596260][T13609] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 495.596276][T13609] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 495.596287][T13609] RDX: 0000000000000040 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 495.596296][T13609] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 495.596305][T13609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 495.596314][T13609] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 495.596332][T13609] [ 495.600354][T13609] FAULT_INJECTION: forcing a failure. [ 495.600354][T13609] name failslab, interval 1, probability 0, space 0, times 0 [ 496.119025][T13609] CPU: 1 UID: 0 PID: 13609 Comm: syz.2.1932 Tainted: G U syzkaller #0 PREEMPT(full) [ 496.119053][T13609] Tainted: [U]=USER [ 496.119058][T13609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 496.119068][T13609] Call Trace: [ 496.119074][T13609] [ 496.119081][T13609] dump_stack_lvl+0x16c/0x1f0 [ 496.119105][T13609] should_fail_ex+0x512/0x640 [ 496.119126][T13609] ? __kmalloc_noprof+0xbf/0x510 [ 496.119145][T13609] ? lsm_blob_alloc+0x68/0x90 [ 496.119158][T13609] should_failslab+0xc2/0x120 [ 496.119176][T13609] __kmalloc_noprof+0xd2/0x510 [ 496.119198][T13609] lsm_blob_alloc+0x68/0x90 [ 496.119212][T13609] security_prepare_creds+0x30/0x270 [ 496.119234][T13609] prepare_creds+0x56f/0x7d0 [ 496.119257][T13609] __sys_setresuid+0x46d/0x1160 [ 496.119277][T13609] do_syscall_64+0xcd/0x490 [ 496.119299][T13609] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 496.119314][T13609] RIP: 0033:0x7f894658ebe9 [ 496.119326][T13609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 496.119341][T13609] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 496.119355][T13609] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 496.119365][T13609] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 496.119373][T13609] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 496.119382][T13609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 496.119391][T13609] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 496.119409][T13609] [ 497.204405][T13630] FAULT_INJECTION: forcing a failure. [ 497.204405][T13630] name fail_futex, interval 1, probability 0, space 0, times 0 [ 497.231924][ T5866] Bluetooth: hci2: unexpected subevent 0x0c length: 118 > 5 [ 497.335247][T13630] CPU: 1 UID: 0 PID: 13630 Comm: syz.0.1940 Tainted: G U syzkaller #0 PREEMPT(full) [ 497.335275][T13630] Tainted: [U]=USER [ 497.335280][T13630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 497.335290][T13630] Call Trace: [ 497.335296][T13630] [ 497.335302][T13630] dump_stack_lvl+0x16c/0x1f0 [ 497.335328][T13630] should_fail_ex+0x512/0x640 [ 497.335352][T13630] get_futex_key+0x1d0/0x1560 [ 497.335374][T13630] ? __pfx_get_futex_key+0x10/0x10 [ 497.335398][T13630] futex_wait_setup+0x9d/0x550 [ 497.335425][T13630] __futex_wait+0x194/0x2f0 [ 497.335446][T13630] ? __pfx___futex_wait+0x10/0x10 [ 497.335470][T13630] ? __pfx_futex_wake_mark+0x10/0x10 [ 497.335493][T13630] ? futex_private_hash_put+0x176/0x300 [ 497.335512][T13630] ? futex_private_hash_put+0x18a/0x300 [ 497.335530][T13630] futex_wait+0xe8/0x380 [ 497.335551][T13630] ? __pfx_futex_wait+0x10/0x10 [ 497.335577][T13630] ? up_write+0x1b2/0x520 [ 497.335600][T13630] do_futex+0x229/0x350 [ 497.335618][T13630] ? __pfx_do_futex+0x10/0x10 [ 497.335641][T13630] __x64_sys_futex+0x1e0/0x4c0 [ 497.335662][T13630] ? __pfx___x64_sys_futex+0x10/0x10 [ 497.335679][T13630] ? ksys_mmap_pgoff+0x85/0x5c0 [ 497.335699][T13630] ? xfd_validate_state+0x61/0x180 [ 497.335720][T13630] ? __pfx___do_sys_close_range+0x10/0x10 [ 497.335743][T13630] do_syscall_64+0xcd/0x490 [ 497.335765][T13630] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 497.335780][T13630] RIP: 0033:0x7f48b0d8ebe9 [ 497.335792][T13630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 497.335807][T13630] RSP: 002b:00007f48b1ca10e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 497.335821][T13630] RAX: ffffffffffffffda RBX: 00007f48b0fc5fa8 RCX: 00007f48b0d8ebe9 [ 497.335831][T13630] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f48b0fc5fa8 [ 497.335850][T13630] RBP: 00007f48b0fc5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 497.335860][T13630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 497.335870][T13630] R13: 00007f48b0fc6038 R14: 00007ffd79b164f0 R15: 00007ffd79b165d8 [ 497.335890][T13630] [ 498.587613][T13650] netlink: zone id is out of range [ 498.644360][T13650] netlink: zone id is out of range [ 498.739081][T13650] netlink: zone id is out of range [ 498.784955][T13650] netlink: zone id is out of range [ 498.844216][T13650] netlink: zone id is out of range [ 498.893153][T13650] netlink: zone id is out of range [ 498.955489][T13650] netlink: zone id is out of range [ 499.001033][T13650] netlink: zone id is out of range [ 499.041779][T13650] netlink: zone id is out of range [ 499.094857][T13650] netlink: zone id is out of range [ 499.221319][T13660] netlink: 330 bytes leftover after parsing attributes in process `syz.2.1949'. [ 499.550702][T13663] FAULT_INJECTION: forcing a failure. [ 499.550702][T13663] name failslab, interval 1, probability 0, space 0, times 0 [ 499.668843][T13663] CPU: 1 UID: 0 PID: 13663 Comm: syz.1.1950 Tainted: G U syzkaller #0 PREEMPT(full) [ 499.668870][T13663] Tainted: [U]=USER [ 499.668875][T13663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 499.668884][T13663] Call Trace: [ 499.668891][T13663] [ 499.668897][T13663] dump_stack_lvl+0x16c/0x1f0 [ 499.668922][T13663] should_fail_ex+0x512/0x640 [ 499.668942][T13663] ? __kmalloc_noprof+0xbf/0x510 [ 499.668962][T13663] ? lsm_blob_alloc+0x68/0x90 [ 499.668974][T13663] should_failslab+0xc2/0x120 [ 499.668993][T13663] __kmalloc_noprof+0xd2/0x510 [ 499.669014][T13663] lsm_blob_alloc+0x68/0x90 [ 499.669027][T13663] security_prepare_creds+0x30/0x270 [ 499.669049][T13663] prepare_creds+0x56f/0x7d0 [ 499.669072][T13663] __sys_setresuid+0x46d/0x1160 [ 499.669091][T13663] do_syscall_64+0xcd/0x490 [ 499.669112][T13663] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 499.669127][T13663] RIP: 0033:0x7fd12f98ebe9 [ 499.669140][T13663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 499.669154][T13663] RSP: 002b:00007fd130837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 499.669169][T13663] RAX: ffffffffffffffda RBX: 00007fd12fbc5fa0 RCX: 00007fd12f98ebe9 [ 499.669179][T13663] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 499.669188][T13663] RBP: 00007fd12fa11e19 R08: 0000000000000000 R09: 0000000000000000 [ 499.669197][T13663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 499.669205][T13663] R13: 00007fd12fbc6038 R14: 00007fd12fbc5fa0 R15: 00007fffc961e008 [ 499.669227][T13663] [ 500.423233][T13680] FAULT_INJECTION: forcing a failure. [ 500.423233][T13680] name failslab, interval 1, probability 0, space 0, times 0 [ 500.473115][T13686] netlink: 25 bytes leftover after parsing attributes in process `syz.2.1955'. [ 500.514290][T13685] .SR: entered promiscuous mode [ 500.563243][T13680] CPU: 1 UID: 0 PID: 13680 Comm: syz.3.1954 Tainted: G U syzkaller #0 PREEMPT(full) [ 500.563270][T13680] Tainted: [U]=USER [ 500.563275][T13680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 500.563285][T13680] Call Trace: [ 500.563290][T13680] [ 500.563297][T13680] dump_stack_lvl+0x16c/0x1f0 [ 500.563322][T13680] should_fail_ex+0x512/0x640 [ 500.563343][T13680] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 500.563363][T13680] should_failslab+0xc2/0x120 [ 500.563382][T13680] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 500.563399][T13680] ? d_instantiate+0x77/0x90 [ 500.563417][T13680] ? alloc_empty_file+0x55/0x1e0 [ 500.563440][T13680] alloc_empty_file+0x55/0x1e0 [ 500.563461][T13680] alloc_file_pseudo+0x13a/0x230 [ 500.563483][T13680] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 500.563513][T13680] ? alloc_fd+0x471/0x7d0 [ 500.563533][T13680] sock_alloc_file+0x50/0x210 [ 500.563556][T13680] __sys_socket+0x1c0/0x260 [ 500.563571][T13680] ? __pfx___sys_socket+0x10/0x10 [ 500.563586][T13680] ? xfd_validate_state+0x61/0x180 [ 500.563606][T13680] ? __pfx___do_sys_close_range+0x10/0x10 [ 500.563627][T13680] __x64_sys_socket+0x72/0xb0 [ 500.563641][T13680] ? lockdep_hardirqs_on+0x7c/0x110 [ 500.563660][T13680] do_syscall_64+0xcd/0x490 [ 500.563681][T13680] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 500.563697][T13680] RIP: 0033:0x7f673b98ebe9 [ 500.563709][T13680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 500.563724][T13680] RSP: 002b:00007f673c733038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 500.563739][T13680] RAX: ffffffffffffffda RBX: 00007f673bbc5fa0 RCX: 00007f673b98ebe9 [ 500.563749][T13680] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 500.563758][T13680] RBP: 00007f673ba11e19 R08: 0000000000000000 R09: 0000000000000000 [ 500.563767][T13680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 500.563775][T13680] R13: 00007f673bbc6038 R14: 00007f673bbc5fa0 R15: 00007fffda9c9e18 [ 500.563794][T13680] [ 501.393061][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.399537][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 501.548053][T13703] FAULT_INJECTION: forcing a failure. [ 501.548053][T13703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 501.606077][T13703] CPU: 1 UID: 0 PID: 13703 Comm: syz.0.1962 Tainted: G U syzkaller #0 PREEMPT(full) [ 501.606103][T13703] Tainted: [U]=USER [ 501.606108][T13703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 501.606117][T13703] Call Trace: [ 501.606123][T13703] [ 501.606129][T13703] dump_stack_lvl+0x16c/0x1f0 [ 501.606154][T13703] should_fail_ex+0x512/0x640 [ 501.606177][T13703] _copy_from_iter+0x29f/0x1720 [ 501.606204][T13703] ? __pfx__copy_from_iter+0x10/0x10 [ 501.606227][T13703] ? rcu_is_watching+0x12/0xc0 [ 501.606242][T13703] ? trace_kmalloc+0x2b/0xd0 [ 501.606261][T13703] ? __kmalloc_noprof+0x242/0x510 [ 501.606283][T13703] kernfs_fop_write_iter+0x19a/0x510 [ 501.606301][T13703] vfs_write+0x7d0/0x11d0 [ 501.606318][T13703] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 501.606334][T13703] ? __pfx___mutex_lock+0x10/0x10 [ 501.606353][T13703] ? __pfx_vfs_write+0x10/0x10 [ 501.606382][T13703] ksys_write+0x12a/0x250 [ 501.606398][T13703] ? __pfx_ksys_write+0x10/0x10 [ 501.606420][T13703] do_syscall_64+0xcd/0x490 [ 501.606440][T13703] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 501.606456][T13703] RIP: 0033:0x7f48b0d8ebe9 [ 501.606468][T13703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 501.606482][T13703] RSP: 002b:00007f48b1ca1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 501.606497][T13703] RAX: ffffffffffffffda RBX: 00007f48b0fc5fa0 RCX: 00007f48b0d8ebe9 [ 501.606507][T13703] RDX: 0000000000000081 RSI: 0000200000000040 RDI: 0000000000000003 [ 501.606515][T13703] RBP: 00007f48b1ca1090 R08: 0000000000000000 R09: 0000000000000000 [ 501.606524][T13703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 501.606532][T13703] R13: 00007f48b0fc6038 R14: 00007f48b0fc5fa0 R15: 00007ffd79b165d8 [ 501.606551][T13703] [ 501.970437][T13716] FAULT_INJECTION: forcing a failure. [ 501.970437][T13716] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 501.983606][T13716] CPU: 1 UID: 0 PID: 13716 Comm: syz.2.1966 Tainted: G U syzkaller #0 PREEMPT(full) [ 501.983634][T13716] Tainted: [U]=USER [ 501.983639][T13716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 501.983658][T13716] Call Trace: [ 501.983666][T13716] [ 501.983673][T13716] dump_stack_lvl+0x16c/0x1f0 [ 501.983699][T13716] should_fail_ex+0x512/0x640 [ 501.983724][T13716] _copy_from_iter+0x29f/0x1720 [ 501.983750][T13716] ? __alloc_skb+0x200/0x380 [ 501.983769][T13716] ? __pfx__copy_from_iter+0x10/0x10 [ 501.983793][T13716] ? __pfx_netlink_autobind.isra.0+0x10/0x10 [ 501.983812][T13716] ? __lock_acquire+0xb97/0x1ce0 [ 501.983838][T13716] netlink_sendmsg+0x829/0xdd0 [ 501.983861][T13716] ? __pfx_netlink_sendmsg+0x10/0x10 [ 501.983883][T13716] ? aa_sock_msg_perm.constprop.0+0x100/0x1d0 [ 501.983903][T13716] ____sys_sendmsg+0xa98/0xc70 [ 501.983918][T13716] ? copy_msghdr_from_user+0x10a/0x160 [ 501.983937][T13716] ? __pfx_____sys_sendmsg+0x10/0x10 [ 501.983955][T13716] ? __pfx_futex_wake_mark+0x10/0x10 [ 501.983979][T13716] ___sys_sendmsg+0x134/0x1d0 [ 501.983999][T13716] ? __pfx____sys_sendmsg+0x10/0x10 [ 501.984040][T13716] __sys_sendmsg+0x16d/0x220 [ 501.984059][T13716] ? __pfx___sys_sendmsg+0x10/0x10 [ 501.984077][T13716] ? __x64_sys_futex+0x1e0/0x4c0 [ 501.984106][T13716] do_syscall_64+0xcd/0x490 [ 501.984128][T13716] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 501.984143][T13716] RIP: 0033:0x7f894658ebe9 [ 501.984156][T13716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 501.984171][T13716] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 501.984185][T13716] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 501.984195][T13716] RDX: 0000000000004844 RSI: 0000200000000000 RDI: 000000000000000a [ 501.984205][T13716] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 501.984214][T13716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 501.984223][T13716] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 501.984242][T13716] [ 502.832541][T13716] FAULT_INJECTION: forcing a failure. [ 502.832541][T13716] name failslab, interval 1, probability 0, space 0, times 0 [ 502.947472][T13716] CPU: 1 UID: 0 PID: 13716 Comm: syz.2.1966 Tainted: G U syzkaller #0 PREEMPT(full) [ 502.947500][T13716] Tainted: [U]=USER [ 502.947506][T13716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 502.947516][T13716] Call Trace: [ 502.947522][T13716] [ 502.947528][T13716] dump_stack_lvl+0x16c/0x1f0 [ 502.947553][T13716] should_fail_ex+0x512/0x640 [ 502.947574][T13716] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 502.947592][T13716] should_failslab+0xc2/0x120 [ 502.947613][T13716] __kmalloc_cache_noprof+0x6a/0x3e0 [ 502.947628][T13716] ? alloc_ucounts+0x13d/0x440 [ 502.947650][T13716] alloc_ucounts+0x13d/0x440 [ 502.947668][T13716] ? __pfx_alloc_ucounts+0x10/0x10 [ 502.947691][T13716] set_cred_ucounts+0xcd/0x200 [ 502.947714][T13716] __sys_setresuid+0x67c/0x1160 [ 502.947734][T13716] do_syscall_64+0xcd/0x490 [ 502.947754][T13716] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 502.947769][T13716] RIP: 0033:0x7f894658ebe9 [ 502.947782][T13716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 502.947796][T13716] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 502.947810][T13716] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 502.947820][T13716] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 502.947828][T13716] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 502.947837][T13716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 502.947846][T13716] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 502.947864][T13716] [ 504.030099][T13747] Invalid ELF header magic: != ELF [ 504.590232][T13767] netlink: 25 bytes leftover after parsing attributes in process `syz.3.1978'. [ 504.691860][T13766] FAULT_INJECTION: forcing a failure. [ 504.691860][T13766] name fail_futex, interval 1, probability 0, space 0, times 0 [ 504.752269][T13766] CPU: 1 UID: 0 PID: 13766 Comm: syz.1.1979 Tainted: G U syzkaller #0 PREEMPT(full) [ 504.752297][T13766] Tainted: [U]=USER [ 504.752302][T13766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 504.752312][T13766] Call Trace: [ 504.752318][T13766] [ 504.752324][T13766] dump_stack_lvl+0x16c/0x1f0 [ 504.752351][T13766] should_fail_ex+0x512/0x640 [ 504.752376][T13766] get_futex_key+0x1d0/0x1560 [ 504.752397][T13766] ? __pfx_get_futex_key+0x10/0x10 [ 504.752413][T13766] ? do_raw_spin_lock+0x12c/0x2b0 [ 504.752436][T13766] ? find_held_lock+0x2b/0x80 [ 504.752453][T13766] futex_wait_setup+0x9d/0x550 [ 504.752479][T13766] __futex_wait+0x194/0x2f0 [ 504.752500][T13766] ? __pfx___futex_wait+0x10/0x10 [ 504.752520][T13766] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 504.752538][T13766] ? lockdep_hardirqs_on+0x7c/0x110 [ 504.752559][T13766] ? __pfx_futex_wake_mark+0x10/0x10 [ 504.752582][T13766] ? futex_private_hash_put+0x176/0x300 [ 504.752601][T13766] ? futex_private_hash_put+0x18a/0x300 [ 504.752620][T13766] futex_wait+0xe8/0x380 [ 504.752640][T13766] ? __pfx_futex_wait+0x10/0x10 [ 504.752669][T13766] ? ksys_write+0x190/0x250 [ 504.752691][T13766] do_futex+0x229/0x350 [ 504.752709][T13766] ? __pfx_do_futex+0x10/0x10 [ 504.752728][T13766] ? cap_task_prctl+0x2af/0xa80 [ 504.752747][T13766] __x64_sys_futex+0x1e0/0x4c0 [ 504.752768][T13766] ? __pfx___x64_sys_futex+0x10/0x10 [ 504.752786][T13766] ? __pfx___do_sys_prctl+0x10/0x10 [ 504.752813][T13766] do_syscall_64+0xcd/0x490 [ 504.752834][T13766] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 504.752849][T13766] RIP: 0033:0x7fd12f98ebe9 [ 504.752862][T13766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 504.752876][T13766] RSP: 002b:00007fd1308370e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 504.752891][T13766] RAX: ffffffffffffffda RBX: 00007fd12fbc5fa8 RCX: 00007fd12f98ebe9 [ 504.752901][T13766] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fd12fbc5fa8 [ 504.752910][T13766] RBP: 00007fd12fbc5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 504.752919][T13766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 504.752928][T13766] R13: 00007fd12fbc6038 R14: 00007fffc961df20 R15: 00007fffc961e008 [ 504.752947][T13766] [ 504.985269][T13766] FAULT_INJECTION: forcing a failure. [ 504.985269][T13766] name failslab, interval 1, probability 0, space 0, times 0 [ 504.998479][T13766] CPU: 1 UID: 0 PID: 13766 Comm: syz.1.1979 Tainted: G U syzkaller #0 PREEMPT(full) [ 504.998506][T13766] Tainted: [U]=USER [ 504.998511][T13766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 504.998521][T13766] Call Trace: [ 504.998526][T13766] [ 504.998533][T13766] dump_stack_lvl+0x16c/0x1f0 [ 504.998559][T13766] should_fail_ex+0x512/0x640 [ 504.998579][T13766] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 504.998598][T13766] should_failslab+0xc2/0x120 [ 504.998618][T13766] __kmalloc_cache_noprof+0x6a/0x3e0 [ 504.998633][T13766] ? alloc_ucounts+0x13d/0x440 [ 504.998654][T13766] alloc_ucounts+0x13d/0x440 [ 504.998672][T13766] ? __pfx_alloc_ucounts+0x10/0x10 [ 504.998695][T13766] set_cred_ucounts+0xcd/0x200 [ 504.998718][T13766] __sys_setresuid+0x67c/0x1160 [ 504.998738][T13766] do_syscall_64+0xcd/0x490 [ 504.998758][T13766] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 504.998774][T13766] RIP: 0033:0x7fd12f98ebe9 [ 504.998787][T13766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 504.998801][T13766] RSP: 002b:00007fd130837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 504.998815][T13766] RAX: ffffffffffffffda RBX: 00007fd12fbc5fa0 RCX: 00007fd12f98ebe9 [ 504.998825][T13766] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 504.998833][T13766] RBP: 00007fd12fa11e19 R08: 0000000000000000 R09: 0000000000000000 [ 504.998842][T13766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 504.998851][T13766] R13: 00007fd12fbc6038 R14: 00007fd12fbc5fa0 R15: 00007fffc961e008 [ 504.998869][T13766] [ 505.397934][T13781] ecryptfs_miscdev_write: Minimum acceptable packet size is [14], but amount of data written is only [5]. Discarding response packet. [ 505.952428][T13792] FAULT_INJECTION: forcing a failure. [ 505.952428][T13792] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 506.024260][T13792] CPU: 1 UID: 0 PID: 13792 Comm: syz.2.1986 Tainted: G U syzkaller #0 PREEMPT(full) [ 506.024287][T13792] Tainted: [U]=USER [ 506.024292][T13792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 506.024301][T13792] Call Trace: [ 506.024306][T13792] [ 506.024312][T13792] dump_stack_lvl+0x16c/0x1f0 [ 506.024337][T13792] should_fail_ex+0x512/0x640 [ 506.024360][T13792] should_fail_alloc_page+0xe7/0x130 [ 506.024380][T13792] prepare_alloc_pages+0x3c2/0x610 [ 506.024405][T13792] ? rcu_is_watching+0x12/0xc0 [ 506.024423][T13792] __alloc_frozen_pages_noprof+0x18b/0x23f0 [ 506.024443][T13792] ? rcu_is_watching+0x12/0xc0 [ 506.024457][T13792] ? trace_mm_page_alloc+0x11f/0x1a0 [ 506.024478][T13792] ? __alloc_frozen_pages_noprof+0x294/0x23f0 [ 506.024497][T13792] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 506.024516][T13792] ? is_bpf_text_address+0x8a/0x1a0 [ 506.024533][T13792] ? bpf_ksym_find+0x124/0x1c0 [ 506.024548][T13792] ? is_bpf_text_address+0x94/0x1a0 [ 506.024566][T13792] ? __kernel_text_address+0xd/0x40 [ 506.024580][T13792] ? unwind_get_return_address+0x59/0xa0 [ 506.024603][T13792] alloc_pages_bulk_noprof+0x71c/0x1410 [ 506.024619][T13792] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 506.024642][T13792] ? policy_nodemask+0xea/0x4e0 [ 506.024662][T13792] ? __pfx_alloc_pages_bulk_noprof+0x10/0x10 [ 506.024680][T13792] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 506.024706][T13792] kasan_populate_vmalloc+0xf1/0x1f0 [ 506.024725][T13792] alloc_vmap_area+0x959/0x29c0 [ 506.024753][T13792] ? __pfx_alloc_vmap_area+0x10/0x10 [ 506.024778][T13792] __get_vm_area_node+0x1ca/0x330 [ 506.024802][T13792] __vmalloc_node_range_noprof+0x271/0x14b0 [ 506.024817][T13792] ? __do_sys_init_module+0x158/0x250 [ 506.024839][T13792] ? get_pid_task+0xfc/0x250 [ 506.024859][T13792] ? __do_sys_init_module+0x158/0x250 [ 506.024877][T13792] ? get_pid_task+0x106/0x250 [ 506.024897][T13792] ? find_held_lock+0x2b/0x80 [ 506.024911][T13792] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 506.024926][T13792] ? rcu_is_watching+0x12/0xc0 [ 506.024941][T13792] ? aa_get_newest_label+0xd2/0x250 [ 506.024959][T13792] ? __do_sys_init_module+0x158/0x250 [ 506.024982][T13792] __vmalloc_node_noprof+0xad/0xf0 [ 506.024996][T13792] ? __do_sys_init_module+0x158/0x250 [ 506.025016][T13792] __do_sys_init_module+0x158/0x250 [ 506.025036][T13792] ? __pfx___do_sys_init_module+0x10/0x10 [ 506.025064][T13792] ? syscall_user_dispatch+0x78/0x140 [ 506.025091][T13792] do_syscall_64+0xcd/0x490 [ 506.025112][T13792] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 506.025127][T13792] RIP: 0033:0x7f894658ebe9 [ 506.025139][T13792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 506.025153][T13792] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 00000000000000af [ 506.025168][T13792] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 506.025177][T13792] RDX: 0000000000000000 RSI: 0000000000010000 RDI: 0000000000000000 [ 506.025186][T13792] RBP: 00007f89474dd090 R08: 0000000000000000 R09: 0000000000000000 [ 506.025195][T13792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 506.025204][T13792] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 506.025222][T13792] [ 506.431826][T13801] FAULT_INJECTION: forcing a failure. [ 506.431826][T13801] name fail_futex, interval 1, probability 0, space 0, times 0 [ 506.444695][T13801] CPU: 1 UID: 0 PID: 13801 Comm: syz.2.1989 Tainted: G U syzkaller #0 PREEMPT(full) [ 506.444721][T13801] Tainted: [U]=USER [ 506.444726][T13801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 506.444736][T13801] Call Trace: [ 506.444743][T13801] [ 506.444749][T13801] dump_stack_lvl+0x16c/0x1f0 [ 506.444773][T13801] should_fail_ex+0x512/0x640 [ 506.444797][T13801] get_futex_key+0x1d0/0x1560 [ 506.444818][T13801] ? __pfx_get_futex_key+0x10/0x10 [ 506.444834][T13801] ? trace_pid_list_is_set+0xfb/0x150 [ 506.444854][T13801] ? do_raw_spin_unlock+0x172/0x230 [ 506.444879][T13801] futex_wait_setup+0x9d/0x550 [ 506.444910][T13801] __futex_wait+0x194/0x2f0 [ 506.444932][T13801] ? __pfx___futex_wait+0x10/0x10 [ 506.444952][T13801] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 506.444971][T13801] ? lockdep_hardirqs_on+0x7c/0x110 [ 506.444992][T13801] ? __pfx_futex_wake_mark+0x10/0x10 [ 506.445016][T13801] ? futex_private_hash_put+0x176/0x300 [ 506.445035][T13801] ? futex_private_hash_put+0x18a/0x300 [ 506.445053][T13801] futex_wait+0xe8/0x380 [ 506.445073][T13801] ? __pfx_futex_wait+0x10/0x10 [ 506.445104][T13801] do_futex+0x229/0x350 [ 506.445122][T13801] ? __pfx_do_futex+0x10/0x10 [ 506.445139][T13801] ? fput+0x9b/0xd0 [ 506.445159][T13801] ? __sys_sendmsg+0x18c/0x220 [ 506.445181][T13801] __x64_sys_futex+0x1e0/0x4c0 [ 506.445201][T13801] ? __pfx___x64_sys_futex+0x10/0x10 [ 506.445226][T13801] do_syscall_64+0xcd/0x490 [ 506.445247][T13801] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 506.445262][T13801] RIP: 0033:0x7f894658ebe9 [ 506.445276][T13801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 506.445291][T13801] RSP: 002b:00007f89474dd0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 506.445306][T13801] RAX: ffffffffffffffda RBX: 00007f89467c5fa8 RCX: 00007f894658ebe9 [ 506.445315][T13801] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f89467c5fa8 [ 506.445324][T13801] RBP: 00007f89467c5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 506.445333][T13801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 506.445342][T13801] R13: 00007f89467c6038 R14: 00007ffee4c05e90 R15: 00007ffee4c05f78 [ 506.445361][T13801] [ 506.446452][T13801] FAULT_INJECTION: forcing a failure. [ 506.446452][T13801] name failslab, interval 1, probability 0, space 0, times 0 [ 506.720078][T13801] CPU: 1 UID: 0 PID: 13801 Comm: syz.2.1989 Tainted: G U syzkaller #0 PREEMPT(full) [ 506.720104][T13801] Tainted: [U]=USER [ 506.720110][T13801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 506.720118][T13801] Call Trace: [ 506.720124][T13801] [ 506.720131][T13801] dump_stack_lvl+0x16c/0x1f0 [ 506.720155][T13801] should_fail_ex+0x512/0x640 [ 506.720175][T13801] ? __kmalloc_noprof+0xbf/0x510 [ 506.720193][T13801] ? lsm_blob_alloc+0x68/0x90 [ 506.720206][T13801] should_failslab+0xc2/0x120 [ 506.720225][T13801] __kmalloc_noprof+0xd2/0x510 [ 506.720245][T13801] lsm_blob_alloc+0x68/0x90 [ 506.720258][T13801] security_prepare_creds+0x30/0x270 [ 506.720280][T13801] prepare_creds+0x56f/0x7d0 [ 506.720303][T13801] __sys_setresuid+0x46d/0x1160 [ 506.720323][T13801] do_syscall_64+0xcd/0x490 [ 506.720344][T13801] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 506.720359][T13801] RIP: 0033:0x7f894658ebe9 [ 506.720371][T13801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 506.720385][T13801] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 506.720400][T13801] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 506.720409][T13801] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 506.720418][T13801] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 506.720427][T13801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 506.720435][T13801] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 506.720453][T13801] [ 507.066388][T13811] netlink: 25 bytes leftover after parsing attributes in process `syz.2.1991'. [ 508.335424][T13841] FAULT_INJECTION: forcing a failure. [ 508.335424][T13841] name fail_futex, interval 1, probability 0, space 0, times 0 [ 508.397896][T13841] CPU: 1 UID: 0 PID: 13841 Comm: syz.2.2000 Tainted: G U syzkaller #0 PREEMPT(full) [ 508.397923][T13841] Tainted: [U]=USER [ 508.397928][T13841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 508.397938][T13841] Call Trace: [ 508.397944][T13841] [ 508.397951][T13841] dump_stack_lvl+0x16c/0x1f0 [ 508.397975][T13841] should_fail_ex+0x512/0x640 [ 508.397999][T13841] get_futex_key+0x1d0/0x1560 [ 508.398020][T13841] ? __pfx_get_futex_key+0x10/0x10 [ 508.398035][T13841] ? nsim_dev_health_break_write+0x170/0x210 [ 508.398059][T13841] ? nsim_dev_health_break_write+0x187/0x210 [ 508.398081][T13841] futex_wake+0xea/0x530 [ 508.398103][T13841] ? __pfx_futex_wake+0x10/0x10 [ 508.398127][T13841] ? ksys_write+0x190/0x250 [ 508.398147][T13841] do_futex+0x1e3/0x350 [ 508.398165][T13841] ? __pfx_do_futex+0x10/0x10 [ 508.398188][T13841] __x64_sys_futex+0x1e0/0x4c0 [ 508.398207][T13841] ? fput+0x9b/0xd0 [ 508.398226][T13841] ? __pfx___x64_sys_futex+0x10/0x10 [ 508.398243][T13841] ? ksys_write+0x1ac/0x250 [ 508.398259][T13841] ? __pfx_ksys_write+0x10/0x10 [ 508.398281][T13841] do_syscall_64+0xcd/0x490 [ 508.398302][T13841] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 508.398317][T13841] RIP: 0033:0x7f894658ebe9 [ 508.398330][T13841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 508.398344][T13841] RSP: 002b:00007f89474dd0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 508.398359][T13841] RAX: ffffffffffffffda RBX: 00007f89467c5fa8 RCX: 00007f894658ebe9 [ 508.398369][T13841] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f89467c5fac [ 508.398378][T13841] RBP: 00007f89467c5fa0 R08: 00007f89474de000 R09: 0000000000000000 [ 508.398387][T13841] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 508.398396][T13841] R13: 00007f89467c6038 R14: 00007ffee4c05e90 R15: 00007ffee4c05f78 [ 508.398414][T13841] [ 508.400667][T13841] FAULT_INJECTION: forcing a failure. [ 508.400667][T13841] name failslab, interval 1, probability 0, space 0, times 0 [ 508.647229][T13845] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1999'. [ 508.672896][T13846] netlink: 25 bytes leftover after parsing attributes in process `syz.1.2001'. [ 508.807424][T13845] can: request_module (can-proto-5) failed. [ 509.211480][T13841] CPU: 1 UID: 0 PID: 13841 Comm: syz.2.2000 Tainted: G U syzkaller #0 PREEMPT(full) [ 509.211507][T13841] Tainted: [U]=USER [ 509.211513][T13841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 509.211523][T13841] Call Trace: [ 509.211529][T13841] [ 509.211536][T13841] dump_stack_lvl+0x16c/0x1f0 [ 509.211559][T13841] should_fail_ex+0x512/0x640 [ 509.211581][T13841] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 509.211599][T13841] should_failslab+0xc2/0x120 [ 509.211619][T13841] __kmalloc_cache_noprof+0x6a/0x3e0 [ 509.211635][T13841] ? alloc_ucounts+0x13d/0x440 [ 509.211657][T13841] alloc_ucounts+0x13d/0x440 [ 509.211683][T13841] ? __pfx_alloc_ucounts+0x10/0x10 [ 509.211707][T13841] set_cred_ucounts+0xcd/0x200 [ 509.211732][T13841] __sys_setresuid+0x67c/0x1160 [ 509.211752][T13841] do_syscall_64+0xcd/0x490 [ 509.211773][T13841] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 509.211788][T13841] RIP: 0033:0x7f894658ebe9 [ 509.211801][T13841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 509.211815][T13841] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 509.211830][T13841] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 509.211840][T13841] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 509.211848][T13841] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 509.211858][T13841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 509.211867][T13841] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 509.211885][T13841] [ 510.658972][T13894] FAULT_INJECTION: forcing a failure. [ 510.658972][T13894] name failslab, interval 1, probability 0, space 0, times 0 [ 510.714791][T13894] CPU: 1 UID: 0 PID: 13894 Comm: syz.3.2014 Tainted: G U syzkaller #0 PREEMPT(full) [ 510.714818][T13894] Tainted: [U]=USER [ 510.714823][T13894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 510.714832][T13894] Call Trace: [ 510.714838][T13894] [ 510.714845][T13894] dump_stack_lvl+0x16c/0x1f0 [ 510.714870][T13894] should_fail_ex+0x512/0x640 [ 510.714890][T13894] ? __kmalloc_noprof+0xbf/0x510 [ 510.714909][T13894] ? lsm_blob_alloc+0x68/0x90 [ 510.714922][T13894] should_failslab+0xc2/0x120 [ 510.714942][T13894] __kmalloc_noprof+0xd2/0x510 [ 510.714962][T13894] lsm_blob_alloc+0x68/0x90 [ 510.714976][T13894] security_prepare_creds+0x30/0x270 [ 510.714998][T13894] prepare_creds+0x56f/0x7d0 [ 510.715025][T13894] __sys_setresuid+0x46d/0x1160 [ 510.715046][T13894] do_syscall_64+0xcd/0x490 [ 510.715068][T13894] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 510.715083][T13894] RIP: 0033:0x7f673b98ebe9 [ 510.715096][T13894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 510.715110][T13894] RSP: 002b:00007f673c733038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 510.715125][T13894] RAX: ffffffffffffffda RBX: 00007f673bbc5fa0 RCX: 00007f673b98ebe9 [ 510.715134][T13894] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 510.715143][T13894] RBP: 00007f673ba11e19 R08: 0000000000000000 R09: 0000000000000000 [ 510.715152][T13894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 510.715160][T13894] R13: 00007f673bbc6038 R14: 00007f673bbc5fa0 R15: 00007fffda9c9e18 [ 510.715178][T13894] [ 510.975413][T13902] FAULT_INJECTION: forcing a failure. [ 510.975413][T13902] name failslab, interval 1, probability 0, space 0, times 0 [ 510.988161][T13902] CPU: 1 UID: 0 PID: 13902 Comm: syz.0.2015 Tainted: G U syzkaller #0 PREEMPT(full) [ 510.988188][T13902] Tainted: [U]=USER [ 510.988193][T13902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 510.988203][T13902] Call Trace: [ 510.988209][T13902] [ 510.988215][T13902] dump_stack_lvl+0x16c/0x1f0 [ 510.988241][T13902] should_fail_ex+0x512/0x640 [ 510.988261][T13902] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 510.988281][T13902] should_failslab+0xc2/0x120 [ 510.988300][T13902] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 510.988317][T13902] ? flock_lock_inode+0xbe5/0x1030 [ 510.988333][T13902] flock_lock_inode+0xbe5/0x1030 [ 510.988355][T13902] ? __pfx_flock_lock_inode+0x10/0x10 [ 510.988379][T13902] ? __pfx___might_resched+0x10/0x10 [ 510.988399][T13902] locks_lock_inode_wait+0x1da/0x490 [ 510.988414][T13902] ? __pfx_locks_lock_inode_wait+0x10/0x10 [ 510.988434][T13902] ? common_file_perm+0x1a9/0x340 [ 510.988456][T13902] __do_sys_flock+0x446/0x520 [ 510.988470][T13902] ? __pfx___do_sys_flock+0x10/0x10 [ 510.988504][T13902] ? xfd_validate_state+0x61/0x180 [ 510.988526][T13902] ? __pfx_ksys_write+0x10/0x10 [ 510.988548][T13902] do_syscall_64+0xcd/0x490 [ 510.988571][T13902] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 510.988586][T13902] RIP: 0033:0x7f48b0d8ebe9 [ 510.988600][T13902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 510.988614][T13902] RSP: 002b:00007f48b1c80038 EFLAGS: 00000246 ORIG_RAX: 0000000000000049 [ 510.988629][T13902] RAX: ffffffffffffffda RBX: 00007f48b0fc6090 RCX: 00007f48b0d8ebe9 [ 510.988639][T13902] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 510.988648][T13902] RBP: 00007f48b0e11e19 R08: 0000000000000000 R09: 0000000000000000 [ 510.988657][T13902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 510.988666][T13902] R13: 00007f48b0fc6128 R14: 00007f48b0fc6090 R15: 00007ffd79b165d8 [ 510.988685][T13902] [ 512.994105][T13937] netlink: 25 bytes leftover after parsing attributes in process `syz.0.2025'. [ 513.266261][T13912] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2019'. [ 513.412705][T13912] can: request_module (can-proto-5) failed. [ 513.800015][T13952] sp0: Synchronizing with TNC [ 513.845054][T13952] FAULT_INJECTION: forcing a failure. [ 513.845054][T13952] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 513.921724][T13952] CPU: 1 UID: 0 PID: 13952 Comm: syz.0.2029 Tainted: G U syzkaller #0 PREEMPT(full) [ 513.921750][T13952] Tainted: [U]=USER [ 513.921755][T13952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 513.921764][T13952] Call Trace: [ 513.921770][T13952] [ 513.921777][T13952] dump_stack_lvl+0x16c/0x1f0 [ 513.921801][T13952] should_fail_ex+0x512/0x640 [ 513.921824][T13952] _copy_to_user+0x32/0xd0 [ 513.921840][T13952] simple_read_from_buffer+0xcb/0x170 [ 513.921857][T13952] proc_fail_nth_read+0x197/0x240 [ 513.921873][T13952] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 513.921890][T13952] ? rw_verify_area+0xcf/0x6c0 [ 513.921904][T13952] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 513.921920][T13952] vfs_read+0x1e4/0xcf0 [ 513.921938][T13952] ? __pfx___mutex_lock+0x10/0x10 [ 513.921957][T13952] ? __pfx_vfs_read+0x10/0x10 [ 513.921978][T13952] ? __fget_files+0x20e/0x3c0 [ 513.921999][T13952] ksys_read+0x12a/0x250 [ 513.922015][T13952] ? __pfx_ksys_read+0x10/0x10 [ 513.922031][T13952] ? fput+0x9b/0xd0 [ 513.922053][T13952] do_syscall_64+0xcd/0x490 [ 513.922074][T13952] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 513.922089][T13952] RIP: 0033:0x7f48b0d8d5fc [ 513.922101][T13952] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 513.922115][T13952] RSP: 002b:00007f48b1ca1030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 513.922130][T13952] RAX: ffffffffffffffda RBX: 00007f48b0fc5fa0 RCX: 00007f48b0d8d5fc [ 513.922139][T13952] RDX: 000000000000000f RSI: 00007f48b1ca10a0 RDI: 0000000000000008 [ 513.922149][T13952] RBP: 00007f48b1ca1090 R08: 0000000000000000 R09: 0000000000000000 [ 513.922158][T13952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 513.922166][T13952] R13: 00007f48b0fc6038 R14: 00007f48b0fc5fa0 R15: 00007ffd79b165d8 [ 513.922190][T13952] [ 515.239700][T13981] FAULT_INJECTION: forcing a failure. [ 515.239700][T13981] name failslab, interval 1, probability 0, space 0, times 0 [ 515.280337][T13981] CPU: 1 UID: 0 PID: 13981 Comm: syz.3.2036 Tainted: G U syzkaller #0 PREEMPT(full) [ 515.280365][T13981] Tainted: [U]=USER [ 515.280371][T13981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 515.280381][T13981] Call Trace: [ 515.280387][T13981] [ 515.280394][T13981] dump_stack_lvl+0x16c/0x1f0 [ 515.280419][T13981] should_fail_ex+0x512/0x640 [ 515.280440][T13981] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 515.280460][T13981] should_failslab+0xc2/0x120 [ 515.280480][T13981] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 515.280498][T13981] ? alloc_empty_file+0x55/0x1e0 [ 515.280522][T13981] alloc_empty_file+0x55/0x1e0 [ 515.280543][T13981] path_openat+0xda/0x2cb0 [ 515.280559][T13981] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 515.280580][T13981] ? __pfx_path_openat+0x10/0x10 [ 515.280602][T13981] do_filp_open+0x20b/0x470 [ 515.280619][T13981] ? __pfx_do_filp_open+0x10/0x10 [ 515.280649][T13981] ? alloc_fd+0x471/0x7d0 [ 515.280669][T13981] do_sys_openat2+0x11b/0x1d0 [ 515.280690][T13981] ? __pfx_do_sys_openat2+0x10/0x10 [ 515.280718][T13981] __x64_sys_openat+0x174/0x210 [ 515.280740][T13981] ? __pfx___x64_sys_openat+0x10/0x10 [ 515.280769][T13981] do_syscall_64+0xcd/0x490 [ 515.280789][T13981] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 515.280804][T13981] RIP: 0033:0x7f673b98ebe9 [ 515.280816][T13981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 515.280830][T13981] RSP: 002b:00007f673c733038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 515.280845][T13981] RAX: ffffffffffffffda RBX: 00007f673bbc5fa0 RCX: 00007f673b98ebe9 [ 515.280854][T13981] RDX: 0000000000080643 RSI: 0000200000001940 RDI: ffffffffffffff9c [ 515.280864][T13981] RBP: 00007f673ba11e19 R08: 0000000000000000 R09: 0000000000000000 [ 515.280873][T13981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 515.280881][T13981] R13: 00007f673bbc6038 R14: 00007f673bbc5fa0 R15: 00007fffda9c9e18 [ 515.280900][T13981] [ 517.146563][T14015] usb usb36: usbfs: process 14015 (syz.2.2044) did not claim interface 0 before use [ 517.219503][T14015] FAULT_INJECTION: forcing a failure. [ 517.219503][T14015] name failslab, interval 1, probability 0, space 0, times 0 [ 517.334110][T14015] CPU: 1 UID: 0 PID: 14015 Comm: syz.2.2044 Tainted: G U syzkaller #0 PREEMPT(full) [ 517.334136][T14015] Tainted: [U]=USER [ 517.334142][T14015] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 517.334151][T14015] Call Trace: [ 517.334157][T14015] [ 517.334167][T14015] dump_stack_lvl+0x16c/0x1f0 [ 517.334191][T14015] should_fail_ex+0x512/0x640 [ 517.334211][T14015] ? __kmalloc_node_track_caller_noprof+0xc3/0x510 [ 517.334233][T14015] should_failslab+0xc2/0x120 [ 517.334252][T14015] __kmalloc_node_track_caller_noprof+0xd6/0x510 [ 517.334271][T14015] ? kstrdup_const+0x63/0x80 [ 517.334291][T14015] kstrdup+0x53/0x100 [ 517.334308][T14015] kstrdup_const+0x63/0x80 [ 517.334325][T14015] __kernfs_new_node+0x9b/0x8e0 [ 517.334346][T14015] ? __pfx___kernfs_new_node+0x10/0x10 [ 517.334368][T14015] ? find_held_lock+0x2b/0x80 [ 517.334383][T14015] ? kernfs_root+0xee/0x2a0 [ 517.334409][T14015] kernfs_new_node+0x13c/0x1e0 [ 517.334432][T14015] kernfs_create_link+0xcc/0x240 [ 517.334449][T14015] sysfs_do_create_link_sd+0x90/0x140 [ 517.334468][T14015] sysfs_create_link+0x61/0xc0 [ 517.334485][T14015] driver_sysfs_add+0x91/0x2d0 [ 517.334504][T14015] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 517.334523][T14015] device_bind_driver+0x16/0x70 [ 517.334541][T14015] usb_driver_claim_interface+0x228/0x400 [ 517.334568][T14015] claimintf+0x181/0x240 [ 517.334584][T14015] checkintf+0x161/0x1d0 [ 517.334601][T14015] proc_do_submiturb+0x497/0x3b10 [ 517.334621][T14015] ? find_held_lock+0x2b/0x80 [ 517.334636][T14015] ? __might_fault+0xe3/0x190 [ 517.334651][T14015] ? __might_fault+0x13b/0x190 [ 517.334673][T14015] usbdev_ioctl+0x2d21/0x4070 [ 517.334698][T14015] ? __pfx_usbdev_ioctl+0x10/0x10 [ 517.334720][T14015] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 517.334742][T14015] ? do_vfs_ioctl+0x128/0x14f0 [ 517.334764][T14015] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 517.334795][T14015] ? find_held_lock+0x2b/0x80 [ 517.334808][T14015] ? hook_file_ioctl_common+0x145/0x410 [ 517.334836][T14015] ? __pfx_usbdev_ioctl+0x10/0x10 [ 517.334854][T14015] __x64_sys_ioctl+0x18e/0x210 [ 517.334881][T14015] do_syscall_64+0xcd/0x490 [ 517.334902][T14015] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 517.334920][T14015] RIP: 0033:0x7f894658ebe9 [ 517.334932][T14015] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 517.334947][T14015] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 517.334961][T14015] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 517.334972][T14015] RDX: 0000200000000240 RSI: 000000008038550a RDI: 0000000000000003 [ 517.334983][T14015] RBP: 00007f89474dd090 R08: 0000000000000000 R09: 0000000000000000 [ 517.334992][T14015] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 517.335001][T14015] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 517.335019][T14015] [ 519.226110][T14054] ACPI: Can not change Invalid GPE/Fixed Event status [ 520.846869][T14104] tipc: Started in network mode [ 520.869544][T14104] tipc: Node identity ee00, cluster identity 4711 [ 520.900723][T14104] tipc: Node number set to 60928 [ 521.087406][T14109] kvm: vcpu 0: requested lapic timer restore with starting count register 0x390=2096996216 (16775969728 ns) > initial count (2003505688 ns). Using initial count to start timer. [ 521.643574][T14123] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 521.793140][ T5866] Bluetooth: hci0: unexpected subevent 0x01 length: 123 > 18 [ 522.424844][T14142] netlink: 25 bytes leftover after parsing attributes in process `syz.2.2080'. [ 522.766890][T14148] usb usb23: usbfs: interface 0 claimed by hub while 'syz.2.2082' sets config #-2147483648 [ 523.574778][T14163] random: crng reseeded on system resumption [ 523.848610][ T5186] Bluetooth: hci0: command 0x0c1a tx timeout [ 524.634055][T14180] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2090'. [ 524.918826][T14185] netlink: 25 bytes leftover after parsing attributes in process `syz.2.2091'. [ 524.979917][T14187] usb usb36: usbfs: process 14187 (syz.3.2092) did not claim interface 0 before use [ 525.415558][T14194] FAULT_INJECTION: forcing a failure. [ 525.415558][T14194] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 525.497464][T14194] CPU: 1 UID: 0 PID: 14194 Comm: syz.1.2095 Tainted: G U syzkaller #0 PREEMPT(full) [ 525.497492][T14194] Tainted: [U]=USER [ 525.497498][T14194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 525.497507][T14194] Call Trace: [ 525.497513][T14194] [ 525.497520][T14194] dump_stack_lvl+0x16c/0x1f0 [ 525.497545][T14194] should_fail_ex+0x512/0x640 [ 525.497569][T14194] _copy_from_user+0x2e/0xd0 [ 525.497593][T14194] memdup_user_nul+0x6c/0x120 [ 525.497614][T14194] nsim_dev_health_break_write+0xbd/0x210 [ 525.497636][T14194] ? __pfx_nsim_dev_health_break_write+0x10/0x10 [ 525.497661][T14194] full_proxy_write+0x131/0x1a0 [ 525.497685][T14194] ? __pfx_full_proxy_write+0x10/0x10 [ 525.497706][T14194] vfs_write+0x2a0/0x11d0 [ 525.497727][T14194] ? __pfx___mutex_lock+0x10/0x10 [ 525.497747][T14194] ? __pfx_vfs_write+0x10/0x10 [ 525.497769][T14194] ? __fget_files+0x20e/0x3c0 [ 525.497790][T14194] ksys_write+0x12a/0x250 [ 525.497806][T14194] ? __pfx_ksys_write+0x10/0x10 [ 525.497829][T14194] do_syscall_64+0xcd/0x490 [ 525.497849][T14194] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 525.497866][T14194] RIP: 0033:0x7fd12f98ebe9 [ 525.497878][T14194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 525.497893][T14194] RSP: 002b:00007fd130837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 525.497907][T14194] RAX: ffffffffffffffda RBX: 00007fd12fbc5fa0 RCX: 00007fd12f98ebe9 [ 525.497917][T14194] RDX: 00000000000001ff RSI: 0000000000000000 RDI: 0000000000000007 [ 525.497925][T14194] RBP: 00007fd12fa11e19 R08: 0000000000000000 R09: 0000000000000000 [ 525.497934][T14194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 525.497943][T14194] R13: 00007fd12fbc6038 R14: 00007fd12fbc5fa0 R15: 00007fffc961e008 [ 525.497963][T14194] [ 525.988803][T14204] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2099'. [ 527.547611][T14241] FAULT_INJECTION: forcing a failure. [ 527.547611][T14241] name failslab, interval 1, probability 0, space 0, times 0 [ 527.610675][T14241] CPU: 1 UID: 0 PID: 14241 Comm: syz.3.2106 Tainted: G U syzkaller #0 PREEMPT(full) [ 527.610702][T14241] Tainted: [U]=USER [ 527.610707][T14241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 527.610722][T14241] Call Trace: [ 527.610728][T14241] [ 527.610734][T14241] dump_stack_lvl+0x16c/0x1f0 [ 527.610760][T14241] should_fail_ex+0x512/0x640 [ 527.610802][T14241] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 527.610824][T14241] should_failslab+0xc2/0x120 [ 527.610843][T14241] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 527.610866][T14241] ? getname_flags.part.0+0x4c/0x550 [ 527.610893][T14241] getname_flags.part.0+0x4c/0x550 [ 527.610918][T14241] getname_flags+0x93/0xf0 [ 527.610934][T14241] do_sys_openat2+0xb8/0x1d0 [ 527.610956][T14241] ? __pfx_do_sys_openat2+0x10/0x10 [ 527.610984][T14241] __x64_sys_openat+0x174/0x210 [ 527.611006][T14241] ? __pfx___x64_sys_openat+0x10/0x10 [ 527.611035][T14241] do_syscall_64+0xcd/0x490 [ 527.611055][T14241] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 527.611071][T14241] RIP: 0033:0x7f673b98ebe9 [ 527.611083][T14241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 527.611098][T14241] RSP: 002b:00007f673c733038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 527.611114][T14241] RAX: ffffffffffffffda RBX: 00007f673bbc5fa0 RCX: 00007f673b98ebe9 [ 527.611125][T14241] RDX: 0000000000000040 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 527.611135][T14241] RBP: 00007f673ba11e19 R08: 0000000000000000 R09: 0000000000000000 [ 527.611144][T14241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 527.611153][T14241] R13: 00007f673bbc6038 R14: 00007f673bbc5fa0 R15: 00007fffda9c9e18 [ 527.611171][T14241] [ 527.792043][T14242] FAULT_INJECTION: forcing a failure. [ 527.792043][T14242] name failslab, interval 1, probability 0, space 0, times 0 [ 527.805097][T14242] CPU: 1 UID: 0 PID: 14242 Comm: syz.3.2106 Tainted: G U syzkaller #0 PREEMPT(full) [ 527.805122][T14242] Tainted: [U]=USER [ 527.805128][T14242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 527.805138][T14242] Call Trace: [ 527.805144][T14242] [ 527.805150][T14242] dump_stack_lvl+0x16c/0x1f0 [ 527.805174][T14242] should_fail_ex+0x512/0x640 [ 527.805195][T14242] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 527.805216][T14242] should_failslab+0xc2/0x120 [ 527.805235][T14242] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 527.805253][T14242] ? alloc_uid+0x13d/0x4c0 [ 527.805271][T14242] ? _raw_spin_unlock_irq+0x23/0x50 [ 527.805290][T14242] alloc_uid+0x13d/0x4c0 [ 527.805308][T14242] ? __pfx_alloc_uid+0x10/0x10 [ 527.805325][T14242] ? security_prepare_creds+0xa7/0x270 [ 527.805350][T14242] __sys_setresuid+0x507/0x1160 [ 527.805369][T14242] do_syscall_64+0xcd/0x490 [ 527.805390][T14242] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 527.805405][T14242] RIP: 0033:0x7f673b98ebe9 [ 527.805417][T14242] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 527.805431][T14242] RSP: 002b:00007f6739bf6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 527.805445][T14242] RAX: ffffffffffffffda RBX: 00007f673bbc6090 RCX: 00007f673b98ebe9 [ 527.805455][T14242] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 527.805464][T14242] RBP: 00007f673ba11e19 R08: 0000000000000000 R09: 0000000000000000 [ 527.805472][T14242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 527.805481][T14242] R13: 00007f673bbc6128 R14: 00007f673bbc6090 R15: 00007fffda9c9e18 [ 527.805500][T14242] [ 529.177723][T14274] usb usb13: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 530.575597][T14301] FAULT_INJECTION: forcing a failure. [ 530.575597][T14301] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 530.633040][T14301] CPU: 1 UID: 0 PID: 14301 Comm: syz.1.2123 Tainted: G U syzkaller #0 PREEMPT(full) [ 530.633066][T14301] Tainted: [U]=USER [ 530.633072][T14301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 530.633081][T14301] Call Trace: [ 530.633087][T14301] [ 530.633093][T14301] dump_stack_lvl+0x16c/0x1f0 [ 530.633117][T14301] should_fail_ex+0x512/0x640 [ 530.633140][T14301] should_fail_alloc_page+0xe7/0x130 [ 530.633161][T14301] prepare_alloc_pages+0x3c2/0x610 [ 530.633185][T14301] __alloc_frozen_pages_noprof+0x18b/0x23f0 [ 530.633206][T14301] ? __lock_acquire+0x62e/0x1ce0 [ 530.633229][T14301] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 530.633253][T14301] ? is_bpf_text_address+0x8a/0x1a0 [ 530.633271][T14301] ? bpf_ksym_find+0x124/0x1c0 [ 530.633285][T14301] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 530.633303][T14301] ? is_bpf_text_address+0x94/0x1a0 [ 530.633320][T14301] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 530.633342][T14301] ? policy_nodemask+0xea/0x4e0 [ 530.633362][T14301] alloc_pages_mpol+0x1fb/0x550 [ 530.633381][T14301] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 530.633405][T14301] alloc_pages_noprof+0x131/0x390 [ 530.633423][T14301] __pmd_alloc+0x3b/0x930 [ 530.633446][T14301] __handle_mm_fault+0xa06/0x2a50 [ 530.633463][T14301] ? mt_find+0x3ef/0xa30 [ 530.633484][T14301] ? __pfx___handle_mm_fault+0x10/0x10 [ 530.633497][T14301] ? __pfx_mt_find+0x10/0x10 [ 530.633527][T14301] ? find_vma+0xbf/0x140 [ 530.633550][T14301] ? __pfx_find_vma+0x10/0x10 [ 530.633569][T14301] handle_mm_fault+0x589/0xd10 [ 530.633585][T14301] ? __bpf_trace_exceptions+0x1/0x40 [ 530.633608][T14301] do_user_addr_fault+0x7a6/0x1370 [ 530.633631][T14301] ? rcu_is_watching+0x12/0xc0 [ 530.633651][T14301] exc_page_fault+0x5c/0xb0 [ 530.633670][T14301] asm_exc_page_fault+0x26/0x30 [ 530.633685][T14301] RIP: 0010:rep_movs_alternative+0x30/0x90 [ 530.633703][T14301] Code: 83 f9 08 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 <48> 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 [ 530.633718][T14301] RSP: 0018:ffffc9000b687e58 EFLAGS: 00050202 [ 530.633730][T14301] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 000000000000000c [ 530.633739][T14301] RDX: fffff520016d0fd7 RSI: 0000000000000000 RDI: ffffc9000b687eb0 [ 530.633749][T14301] RBP: 000000000000000c R08: 0000000000000001 R09: fffff520016d0fd7 [ 530.633757][T14301] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000000 [ 530.633766][T14301] R13: ffffc9000b687eb0 R14: 0000000000000001 R15: 0000000000000001 [ 530.633785][T14301] _copy_from_user+0x98/0xd0 [ 530.633808][T14301] __x64_sys_epoll_ctl+0x131/0x1e0 [ 530.633825][T14301] ? __pfx___x64_sys_epoll_ctl+0x10/0x10 [ 530.633847][T14301] do_syscall_64+0xcd/0x490 [ 530.633868][T14301] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 530.633882][T14301] RIP: 0033:0x7fd12f98ebe9 [ 530.633894][T14301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 530.633908][T14301] RSP: 002b:00007fd130837038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 530.633921][T14301] RAX: ffffffffffffffda RBX: 00007fd12fbc5fa0 RCX: 00007fd12f98ebe9 [ 530.633930][T14301] RDX: 8000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 530.633939][T14301] RBP: 00007fd130837090 R08: 0000000000000000 R09: 0000000000000000 [ 530.633947][T14301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 530.633955][T14301] R13: 00007fd12fbc6038 R14: 00007fd12fbc5fa0 R15: 00007fffc961e008 [ 530.633974][T14301] [ 531.553008][T14312] blktrace: Concurrent blktraces are not allowed on ram7 [ 531.586710][T14312] vhci_hcd: invalid port number 23 [ 531.612172][T14312] vhci_hcd: Wrong hub descriptor type for USB 3.0 roothub. [ 531.724664][ T30] audit: type=1804 audit(6138073267.903:17): pid=14312 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz.1.2127" name="/newroot/503/file0" dev="tmpfs" ino=2638 res=1 errno=0 [ 532.828021][T14320] netlink: 'syz.2.2129': attribute type 102 has an invalid length. [ 532.836716][T14338] futex_wake_op: syz.3.2136 tries to shift op by -2048; fix this program [ 532.868322][T14338] futex_wake_op: syz.3.2136 tries to shift op by -2048; fix this program [ 532.909396][T14320] netlink: 224 bytes leftover after parsing attributes in process `syz.2.2129'. [ 533.500829][T14353] zswap: compressor not available [ 533.512691][T14355] Setting dangerous option i915.mitigations - tainting kernel [ 533.559646][T14355] FAULT_INJECTION: forcing a failure. [ 533.559646][T14355] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 533.623490][T14355] CPU: 1 UID: 0 PID: 14355 Comm: syz.1.2139 Tainted: G U syzkaller #0 PREEMPT(full) [ 533.623516][T14355] Tainted: [U]=USER [ 533.623521][T14355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 533.623531][T14355] Call Trace: [ 533.623536][T14355] [ 533.623542][T14355] dump_stack_lvl+0x16c/0x1f0 [ 533.623566][T14355] should_fail_ex+0x512/0x640 [ 533.623589][T14355] should_fail_alloc_page+0xe7/0x130 [ 533.623610][T14355] prepare_alloc_pages+0x3c2/0x610 [ 533.623634][T14355] __alloc_frozen_pages_noprof+0x18b/0x23f0 [ 533.623653][T14355] ? copy_splice_read+0x1a8/0xc20 [ 533.623667][T14355] ? stack_trace_save+0x8e/0xc0 [ 533.623684][T14355] ? __pfx_stack_trace_save+0x10/0x10 [ 533.623698][T14355] ? do_sendfile+0xb06/0xe50 [ 533.623713][T14355] ? stack_depot_save_flags+0x29/0x9c0 [ 533.623736][T14355] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 533.623753][T14355] ? kasan_save_stack+0x33/0x60 [ 533.623769][T14355] ? __kasan_kmalloc+0xaa/0xb0 [ 533.623783][T14355] ? copy_splice_read+0x1a8/0xc20 [ 533.623796][T14355] ? do_splice_read+0x285/0x370 [ 533.623808][T14355] ? splice_direct_to_actor+0x2a1/0xa30 [ 533.623822][T14355] ? do_splice_direct+0x174/0x240 [ 533.623834][T14355] ? do_sendfile+0xb06/0xe50 [ 533.623851][T14355] ? __x64_sys_sendfile64+0x1d8/0x220 [ 533.623869][T14355] ? do_syscall_64+0xcd/0x490 [ 533.623900][T14355] alloc_pages_bulk_noprof+0x71c/0x1410 [ 533.623923][T14355] ? __pfx_alloc_pages_bulk_noprof+0x10/0x10 [ 533.623944][T14355] ? trace_kmalloc+0x2b/0xd0 [ 533.623963][T14355] ? __kmalloc_noprof+0x242/0x510 [ 533.623984][T14355] copy_splice_read+0x1e1/0xc20 [ 533.624002][T14355] ? __pfx_copy_splice_read+0x10/0x10 [ 533.624022][T14355] ? find_held_lock+0x2b/0x80 [ 533.624039][T14355] ? __pfx_copy_splice_read+0x10/0x10 [ 533.624053][T14355] do_splice_read+0x285/0x370 [ 533.624069][T14355] splice_direct_to_actor+0x2a1/0xa30 [ 533.624085][T14355] ? __pfx_direct_splice_actor+0x10/0x10 [ 533.624104][T14355] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 533.624118][T14355] ? get_pid_task+0xfc/0x250 [ 533.624142][T14355] do_splice_direct+0x174/0x240 [ 533.624157][T14355] ? __pfx_do_splice_direct+0x10/0x10 [ 533.624173][T14355] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 533.624190][T14355] ? rw_verify_area+0xcf/0x6c0 [ 533.624212][T14355] do_sendfile+0xb06/0xe50 [ 533.624231][T14355] ? __pfx_do_sendfile+0x10/0x10 [ 533.624247][T14355] ? __fget_files+0x20e/0x3c0 [ 533.624267][T14355] __x64_sys_sendfile64+0x1d8/0x220 [ 533.624285][T14355] ? ksys_write+0x1ac/0x250 [ 533.624301][T14355] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 533.624325][T14355] do_syscall_64+0xcd/0x490 [ 533.624345][T14355] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 533.624360][T14355] RIP: 0033:0x7fd12f98ebe9 [ 533.624372][T14355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 533.624386][T14355] RSP: 002b:00007fd130816038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 533.624404][T14355] RAX: ffffffffffffffda RBX: 00007fd12fbc6090 RCX: 00007fd12f98ebe9 [ 533.624414][T14355] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 533.624422][T14355] RBP: 00007fd130816090 R08: 0000000000000000 R09: 0000000000000000 [ 533.624431][T14355] R10: 000000007ffff000 R11: 0000000000000246 R12: 0000000000000002 [ 533.624440][T14355] R13: 00007fd12fbc6128 R14: 00007fd12fbc6090 R15: 00007fffc961e008 [ 533.624458][T14355] [ 534.200764][T14365] i2c i2c-0: dvb_frontend_start: failed to start kthread (-4) [ 534.848831][T14387] futex_wake_op: syz.1.2147 tries to shift op by -2048; fix this program [ 534.914199][T14387] futex_wake_op: syz.1.2147 tries to shift op by -2048; fix this program [ 535.170875][T14393] ksmbd: Daemon and kernel module version mismatch. ksmbd: 0, kernel module: 1. User-space ksmbd should terminate. [ 535.202613][T14396] FAULT_INJECTION: forcing a failure. [ 535.202613][T14396] name failslab, interval 1, probability 0, space 0, times 0 [ 535.276171][T14396] CPU: 1 UID: 0 PID: 14396 Comm: syz.0.2150 Tainted: G U syzkaller #0 PREEMPT(full) [ 535.276196][T14396] Tainted: [U]=USER [ 535.276201][T14396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 535.276210][T14396] Call Trace: [ 535.276216][T14396] [ 535.276222][T14396] dump_stack_lvl+0x16c/0x1f0 [ 535.276247][T14396] should_fail_ex+0x512/0x640 [ 535.276267][T14396] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 535.276287][T14396] should_failslab+0xc2/0x120 [ 535.276306][T14396] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 535.276322][T14396] ? d_instantiate+0x77/0x90 [ 535.276341][T14396] ? alloc_empty_file+0x55/0x1e0 [ 535.276364][T14396] alloc_empty_file+0x55/0x1e0 [ 535.276384][T14396] alloc_file_pseudo+0x13a/0x230 [ 535.276406][T14396] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 535.276427][T14396] ? alloc_fd+0x471/0x7d0 [ 535.276445][T14396] sock_alloc_file+0x50/0x210 [ 535.276466][T14396] __sys_socket+0x1c0/0x260 [ 535.276481][T14396] ? __pfx___sys_socket+0x10/0x10 [ 535.276495][T14396] ? ksys_write+0x1ac/0x250 [ 535.276510][T14396] ? __pfx_ksys_write+0x10/0x10 [ 535.276530][T14396] __x64_sys_socket+0x72/0xb0 [ 535.276544][T14396] ? lockdep_hardirqs_on+0x7c/0x110 [ 535.276562][T14396] do_syscall_64+0xcd/0x490 [ 535.276582][T14396] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 535.276597][T14396] RIP: 0033:0x7f48b0d8ebe9 [ 535.276609][T14396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 535.276624][T14396] RSP: 002b:00007f48b1ca1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 535.276638][T14396] RAX: ffffffffffffffda RBX: 00007f48b0fc5fa0 RCX: 00007f48b0d8ebe9 [ 535.276648][T14396] RDX: 0000000000000001 RSI: 0000000000000001 RDI: 000000000000002b [ 535.276656][T14396] RBP: 00007f48b1ca1090 R08: 0000000000000000 R09: 0000000000000000 [ 535.276665][T14396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 535.276674][T14396] R13: 00007f48b0fc6038 R14: 00007f48b0fc5fa0 R15: 00007ffd79b165d8 [ 535.276692][T14396] [ 535.801248][T14416] futex_wake_op: syz.0.2158 tries to shift op by -2048; fix this program [ 535.837485][T14416] futex_wake_op: syz.0.2158 tries to shift op by -2048; fix this program [ 535.873323][T14416] netlink: 25 bytes leftover after parsing attributes in process `syz.0.2158'. [ 536.162217][T14414] netlink: 'syz.1.2153': attribute type 102 has an invalid length. [ 536.181574][T14414] netlink: 224 bytes leftover after parsing attributes in process `syz.1.2153'. [ 537.395294][T14437] zswap: compressor not available [ 538.105379][T14458] FAULT_INJECTION: forcing a failure. [ 538.105379][T14458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 538.176504][T14458] CPU: 1 UID: 0 PID: 14458 Comm: syz.2.2168 Tainted: G U syzkaller #0 PREEMPT(full) [ 538.176532][T14458] Tainted: [U]=USER [ 538.176538][T14458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 538.176547][T14458] Call Trace: [ 538.176552][T14458] [ 538.176559][T14458] dump_stack_lvl+0x16c/0x1f0 [ 538.176584][T14458] should_fail_ex+0x512/0x640 [ 538.176607][T14458] strncpy_from_user+0x3b/0x2e0 [ 538.176628][T14458] getname_flags.part.0+0x8f/0x550 [ 538.176653][T14458] getname_flags+0x93/0xf0 [ 538.176669][T14458] do_sys_openat2+0xb8/0x1d0 [ 538.176691][T14458] ? __pfx_do_sys_openat2+0x10/0x10 [ 538.176720][T14458] __x64_sys_openat+0x174/0x210 [ 538.176751][T14458] ? __pfx___x64_sys_openat+0x10/0x10 [ 538.176781][T14458] do_syscall_64+0xcd/0x490 [ 538.176803][T14458] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 538.176818][T14458] RIP: 0033:0x7f894658ebe9 [ 538.176830][T14458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 538.176844][T14458] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 538.176859][T14458] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 538.176869][T14458] RDX: 0000000000000040 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 538.176878][T14458] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 538.176887][T14458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 538.176896][T14458] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 538.176914][T14458] [ 538.918640][T14470] FAULT_INJECTION: forcing a failure. [ 538.918640][T14470] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 538.964041][T14470] CPU: 1 UID: 0 PID: 14470 Comm: syz.2.2171 Tainted: G U syzkaller #0 PREEMPT(full) [ 538.964069][T14470] Tainted: [U]=USER [ 538.964074][T14470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 538.964085][T14470] Call Trace: [ 538.964091][T14470] [ 538.964098][T14470] dump_stack_lvl+0x16c/0x1f0 [ 538.964126][T14470] should_fail_ex+0x512/0x640 [ 538.964150][T14470] should_fail_alloc_page+0xe7/0x130 [ 538.964173][T14470] prepare_alloc_pages+0x3c2/0x610 [ 538.964198][T14470] __alloc_frozen_pages_noprof+0x18b/0x23f0 [ 538.964219][T14470] ? rcu_is_watching+0x12/0xc0 [ 538.964234][T14470] ? trace_mm_page_alloc+0x11f/0x1a0 [ 538.964256][T14470] ? __alloc_frozen_pages_noprof+0x294/0x23f0 [ 538.964276][T14470] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 538.964295][T14470] ? is_bpf_text_address+0x8a/0x1a0 [ 538.964313][T14470] ? bpf_ksym_find+0x124/0x1c0 [ 538.964328][T14470] ? is_bpf_text_address+0x94/0x1a0 [ 538.964346][T14470] ? __kernel_text_address+0xd/0x40 [ 538.964360][T14470] ? unwind_get_return_address+0x59/0xa0 [ 538.964383][T14470] alloc_pages_bulk_noprof+0x71c/0x1410 [ 538.964401][T14470] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 538.964426][T14470] ? policy_nodemask+0xea/0x4e0 [ 538.964447][T14470] ? __pfx_alloc_pages_bulk_noprof+0x10/0x10 [ 538.964465][T14470] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 538.964492][T14470] kasan_populate_vmalloc+0xf1/0x1f0 [ 538.964512][T14470] alloc_vmap_area+0x959/0x29c0 [ 538.964542][T14470] ? __pfx_alloc_vmap_area+0x10/0x10 [ 538.964567][T14470] __get_vm_area_node+0x1ca/0x330 [ 538.964593][T14470] __vmalloc_node_range_noprof+0x271/0x14b0 [ 538.964607][T14470] ? kernel_read_file+0x6ff/0x910 [ 538.964631][T14470] ? __lock_acquire+0x62e/0x1ce0 [ 538.964650][T14470] ? kernel_read_file+0x6ff/0x910 [ 538.964673][T14470] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 538.964698][T14470] ? ima_read_file+0x142/0x1a0 [ 538.964714][T14470] ? __pfx_ima_read_file+0x10/0x10 [ 538.964732][T14470] ? kernel_read_file+0x6ff/0x910 [ 538.964751][T14470] __vmalloc_node_noprof+0xad/0xf0 [ 538.964765][T14470] ? kernel_read_file+0x6ff/0x910 [ 538.964787][T14470] kernel_read_file+0x6ff/0x910 [ 538.964810][T14470] ? __pfx_kernel_read_file+0x10/0x10 [ 538.964835][T14470] kernel_read_file_from_path_initns+0x1cf/0x260 [ 538.964859][T14470] ? __pfx_kernel_read_file_from_path_initns+0x10/0x10 [ 538.964886][T14470] _request_firmware+0x744/0x1470 [ 538.964912][T14470] ? __pfx__request_firmware+0x10/0x10 [ 538.964937][T14470] request_firmware+0x35/0x50 [ 538.964955][T14470] valid_regdb+0x184/0x590 [ 538.964974][T14470] ? __pfx___mutex_lock+0x10/0x10 [ 538.964994][T14470] ? __pfx_valid_regdb+0x10/0x10 [ 538.965017][T14470] reg_reload_regdb+0x11a/0x460 [ 538.965038][T14470] ? __pfx_reg_reload_regdb+0x10/0x10 [ 538.965060][T14470] ? __pfx_nl80211_pre_doit+0x10/0x10 [ 538.965075][T14470] ? nl80211_pre_doit+0x1b0/0xb10 [ 538.965092][T14470] genl_family_rcv_msg_doit+0x209/0x2f0 [ 538.965117][T14470] ? __pfx_genl_family_rcv_msg_doit+0x10/0x10 [ 538.965138][T14470] ? rcu_is_watching+0x12/0xc0 [ 538.965159][T14470] ? bpf_lsm_capable+0x9/0x10 [ 538.965172][T14470] ? security_capable+0x7e/0x260 [ 538.965190][T14470] genl_rcv_msg+0x55c/0x800 [ 538.965206][T14470] ? __pfx_genl_rcv_msg+0x10/0x10 [ 538.965229][T14470] ? __pfx_nl80211_pre_doit+0x10/0x10 [ 538.965243][T14470] ? __pfx_nl80211_reload_regdb+0x10/0x10 [ 538.965262][T14470] ? __pfx_nl80211_post_doit+0x10/0x10 [ 538.965288][T14470] netlink_rcv_skb+0x158/0x420 [ 538.965308][T14470] ? __pfx_genl_rcv_msg+0x10/0x10 [ 538.965331][T14470] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 538.965358][T14470] ? netlink_deliver_tap+0x1ae/0xd30 [ 538.965380][T14470] genl_rcv+0x28/0x40 [ 538.965400][T14470] netlink_unicast+0x5a7/0x870 [ 538.965423][T14470] ? __pfx_netlink_unicast+0x10/0x10 [ 538.965443][T14470] ? __pfx_netlink_autobind.isra.0+0x10/0x10 [ 538.965462][T14470] ? __lock_acquire+0xb97/0x1ce0 [ 538.965485][T14470] netlink_sendmsg+0x8d1/0xdd0 [ 538.965508][T14470] ? __pfx_netlink_sendmsg+0x10/0x10 [ 538.965530][T14470] ? aa_sock_msg_perm.constprop.0+0x100/0x1d0 [ 538.965549][T14470] ____sys_sendmsg+0xa98/0xc70 [ 538.965565][T14470] ? copy_msghdr_from_user+0x10a/0x160 [ 538.965583][T14470] ? __pfx_____sys_sendmsg+0x10/0x10 [ 538.965602][T14470] ? __pfx_futex_wake_mark+0x10/0x10 [ 538.965626][T14470] ___sys_sendmsg+0x134/0x1d0 [ 538.965647][T14470] ? __pfx____sys_sendmsg+0x10/0x10 [ 538.965695][T14470] __sys_sendmsg+0x16d/0x220 [ 538.965717][T14470] ? __pfx___sys_sendmsg+0x10/0x10 [ 538.965736][T14470] ? __x64_sys_futex+0x1e0/0x4c0 [ 538.965767][T14470] do_syscall_64+0xcd/0x490 [ 538.965789][T14470] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 538.965804][T14470] RIP: 0033:0x7f894658ebe9 [ 538.965817][T14470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 538.965832][T14470] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 538.965847][T14470] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 538.965858][T14470] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000005 [ 538.965868][T14470] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 538.965877][T14470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 538.965886][T14470] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 538.965905][T14470] [ 539.579070][T14475] usb usb23: usbfs: interface 0 claimed by hub while 'syz.3.2174' sets config #-2147483648 [ 539.591401][T14475] FAULT_INJECTION: forcing a failure. [ 539.591401][T14475] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 539.606890][T14475] CPU: 1 UID: 0 PID: 14475 Comm: syz.3.2174 Tainted: G U syzkaller #0 PREEMPT(full) [ 539.606913][T14475] Tainted: [U]=USER [ 539.606918][T14475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 539.606928][T14475] Call Trace: [ 539.606933][T14475] [ 539.606939][T14475] dump_stack_lvl+0x16c/0x1f0 [ 539.606962][T14475] should_fail_ex+0x512/0x640 [ 539.606985][T14475] _copy_to_user+0x32/0xd0 [ 539.607001][T14475] simple_read_from_buffer+0xcb/0x170 [ 539.607017][T14475] proc_fail_nth_read+0x197/0x240 [ 539.607034][T14475] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 539.607050][T14475] ? rw_verify_area+0xcf/0x6c0 [ 539.607065][T14475] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 539.607080][T14475] vfs_read+0x1e4/0xcf0 [ 539.607098][T14475] ? __pfx___mutex_lock+0x10/0x10 [ 539.607117][T14475] ? __pfx_vfs_read+0x10/0x10 [ 539.607138][T14475] ? __fget_files+0x20e/0x3c0 [ 539.607159][T14475] ksys_read+0x12a/0x250 [ 539.607174][T14475] ? __pfx_ksys_read+0x10/0x10 [ 539.607190][T14475] ? fput+0x9b/0xd0 [ 539.607212][T14475] do_syscall_64+0xcd/0x490 [ 539.607232][T14475] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 539.607247][T14475] RIP: 0033:0x7f673b98d5fc [ 539.607259][T14475] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 539.607273][T14475] RSP: 002b:00007f673c733030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 539.607286][T14475] RAX: ffffffffffffffda RBX: 00007f673bbc5fa0 RCX: 00007f673b98d5fc [ 539.607296][T14475] RDX: 000000000000000f RSI: 00007f673c7330a0 RDI: 0000000000000004 [ 539.607304][T14475] RBP: 00007f673c733090 R08: 0000000000000000 R09: 0000000000000000 [ 539.607313][T14475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 539.607321][T14475] R13: 00007f673bbc6038 R14: 00007f673bbc5fa0 R15: 00007fffda9c9e18 [ 539.607339][T14475] [ 540.042791][T14488] FAULT_INJECTION: forcing a failure. [ 540.042791][T14488] name failslab, interval 1, probability 0, space 0, times 0 [ 540.055466][T14488] CPU: 1 UID: 0 PID: 14488 Comm: syz.3.2178 Tainted: G U syzkaller #0 PREEMPT(full) [ 540.055491][T14488] Tainted: [U]=USER [ 540.055496][T14488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 540.055506][T14488] Call Trace: [ 540.055512][T14488] [ 540.055519][T14488] dump_stack_lvl+0x16c/0x1f0 [ 540.055543][T14488] should_fail_ex+0x512/0x640 [ 540.055564][T14488] ? __kmalloc_noprof+0xbf/0x510 [ 540.055583][T14488] ? lsm_blob_alloc+0x68/0x90 [ 540.055595][T14488] should_failslab+0xc2/0x120 [ 540.055614][T14488] __kmalloc_noprof+0xd2/0x510 [ 540.055641][T14488] lsm_blob_alloc+0x68/0x90 [ 540.055654][T14488] security_prepare_creds+0x30/0x270 [ 540.055677][T14488] prepare_creds+0x56f/0x7d0 [ 540.055700][T14488] __sys_setresuid+0x46d/0x1160 [ 540.055720][T14488] do_syscall_64+0xcd/0x490 [ 540.055741][T14488] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 540.055757][T14488] RIP: 0033:0x7f673b98ebe9 [ 540.055770][T14488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 540.055785][T14488] RSP: 002b:00007f673c733038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 540.055799][T14488] RAX: ffffffffffffffda RBX: 00007f673bbc5fa0 RCX: 00007f673b98ebe9 [ 540.055809][T14488] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 540.055818][T14488] RBP: 00007f673ba11e19 R08: 0000000000000000 R09: 0000000000000000 [ 540.055828][T14488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 540.055836][T14488] R13: 00007f673bbc6038 R14: 00007f673bbc5fa0 R15: 00007fffda9c9e18 [ 540.055856][T14488] [ 540.596234][T14470] warn_alloc: 1 callbacks suppressed [ 540.596252][T14470] syz.2.2171: vmalloc error: size 1085, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 540.812510][T14470] CPU: 1 UID: 0 PID: 14470 Comm: syz.2.2171 Tainted: G U syzkaller #0 PREEMPT(full) [ 540.812538][T14470] Tainted: [U]=USER [ 540.812544][T14470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 540.812558][T14470] Call Trace: [ 540.812564][T14470] [ 540.812571][T14470] dump_stack_lvl+0x16c/0x1f0 [ 540.812596][T14470] warn_alloc+0x248/0x3a0 [ 540.812616][T14470] ? __pfx_warn_alloc+0x10/0x10 [ 540.812634][T14470] ? kfree+0x2b4/0x4d0 [ 540.812652][T14470] ? __get_vm_area_node+0x208/0x330 [ 540.812679][T14470] __vmalloc_node_range_noprof+0xb2d/0x14b0 [ 540.812699][T14470] ? __lock_acquire+0x62e/0x1ce0 [ 540.812718][T14470] ? kernel_read_file+0x6ff/0x910 [ 540.812742][T14470] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 540.812759][T14470] ? ima_read_file+0x142/0x1a0 [ 540.812774][T14470] ? __pfx_ima_read_file+0x10/0x10 [ 540.812790][T14470] ? kernel_read_file+0x6ff/0x910 [ 540.812808][T14470] __vmalloc_node_noprof+0xad/0xf0 [ 540.812823][T14470] ? kernel_read_file+0x6ff/0x910 [ 540.812844][T14470] kernel_read_file+0x6ff/0x910 [ 540.812866][T14470] ? __pfx_kernel_read_file+0x10/0x10 [ 540.812891][T14470] kernel_read_file_from_path_initns+0x1cf/0x260 [ 540.812914][T14470] ? __pfx_kernel_read_file_from_path_initns+0x10/0x10 [ 540.812941][T14470] _request_firmware+0x744/0x1470 [ 540.812966][T14470] ? __pfx__request_firmware+0x10/0x10 [ 540.812990][T14470] request_firmware+0x35/0x50 [ 540.813008][T14470] valid_regdb+0x184/0x590 [ 540.813026][T14470] ? __pfx___mutex_lock+0x10/0x10 [ 540.813046][T14470] ? __pfx_valid_regdb+0x10/0x10 [ 540.813069][T14470] reg_reload_regdb+0x11a/0x460 [ 540.813090][T14470] ? __pfx_reg_reload_regdb+0x10/0x10 [ 540.813111][T14470] ? __pfx_nl80211_pre_doit+0x10/0x10 [ 540.813126][T14470] ? nl80211_pre_doit+0x1b0/0xb10 [ 540.813144][T14470] genl_family_rcv_msg_doit+0x209/0x2f0 [ 540.813169][T14470] ? __pfx_genl_family_rcv_msg_doit+0x10/0x10 [ 540.813190][T14470] ? rcu_is_watching+0x12/0xc0 [ 540.813212][T14470] ? bpf_lsm_capable+0x9/0x10 [ 540.813225][T14470] ? security_capable+0x7e/0x260 [ 540.813243][T14470] genl_rcv_msg+0x55c/0x800 [ 540.813259][T14470] ? __pfx_genl_rcv_msg+0x10/0x10 [ 540.813281][T14470] ? __pfx_nl80211_pre_doit+0x10/0x10 [ 540.813295][T14470] ? __pfx_nl80211_reload_regdb+0x10/0x10 [ 540.813313][T14470] ? __pfx_nl80211_post_doit+0x10/0x10 [ 540.813340][T14470] netlink_rcv_skb+0x158/0x420 [ 540.813359][T14470] ? __pfx_genl_rcv_msg+0x10/0x10 [ 540.813382][T14470] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 540.813409][T14470] ? netlink_deliver_tap+0x1ae/0xd30 [ 540.813431][T14470] genl_rcv+0x28/0x40 [ 540.813450][T14470] netlink_unicast+0x5a7/0x870 [ 540.813473][T14470] ? __pfx_netlink_unicast+0x10/0x10 [ 540.813492][T14470] ? __pfx_netlink_autobind.isra.0+0x10/0x10 [ 540.813511][T14470] ? __lock_acquire+0xb97/0x1ce0 [ 540.813534][T14470] netlink_sendmsg+0x8d1/0xdd0 [ 540.813563][T14470] ? __pfx_netlink_sendmsg+0x10/0x10 [ 540.813587][T14470] ? aa_sock_msg_perm.constprop.0+0x100/0x1d0 [ 540.813607][T14470] ____sys_sendmsg+0xa98/0xc70 [ 540.813623][T14470] ? copy_msghdr_from_user+0x10a/0x160 [ 540.813641][T14470] ? __pfx_____sys_sendmsg+0x10/0x10 [ 540.813660][T14470] ? __pfx_futex_wake_mark+0x10/0x10 [ 540.813684][T14470] ___sys_sendmsg+0x134/0x1d0 [ 540.813705][T14470] ? __pfx____sys_sendmsg+0x10/0x10 [ 540.813747][T14470] __sys_sendmsg+0x16d/0x220 [ 540.813766][T14470] ? __pfx___sys_sendmsg+0x10/0x10 [ 540.813785][T14470] ? __x64_sys_futex+0x1e0/0x4c0 [ 540.813814][T14470] do_syscall_64+0xcd/0x490 [ 540.813835][T14470] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 540.813850][T14470] RIP: 0033:0x7f894658ebe9 [ 540.813863][T14470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 540.813878][T14470] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 540.813893][T14470] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 540.813903][T14470] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000005 [ 540.813913][T14470] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 540.813922][T14470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 540.813931][T14470] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 540.813951][T14470] [ 540.813957][T14470] Mem-Info: [ 541.505013][T14514] netlink: 25 bytes leftover after parsing attributes in process `syz.0.2186'. [ 541.726347][T14519] FAULT_INJECTION: forcing a failure. [ 541.726347][T14519] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 541.757542][T14519] CPU: 1 UID: 0 PID: 14519 Comm: syz.1.2188 Tainted: G U syzkaller #0 PREEMPT(full) [ 541.757568][T14519] Tainted: [U]=USER [ 541.757574][T14519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 541.757584][T14519] Call Trace: [ 541.757589][T14519] [ 541.757596][T14519] dump_stack_lvl+0x16c/0x1f0 [ 541.757621][T14519] should_fail_ex+0x512/0x640 [ 541.757645][T14519] strncpy_from_user+0x3b/0x2e0 [ 541.757666][T14519] getname_flags.part.0+0x8f/0x550 [ 541.757691][T14519] getname_flags+0x93/0xf0 [ 541.757707][T14519] do_sys_openat2+0xb8/0x1d0 [ 541.757730][T14519] ? __pfx_do_sys_openat2+0x10/0x10 [ 541.757759][T14519] __x64_sys_openat+0x174/0x210 [ 541.757780][T14519] ? __pfx___x64_sys_openat+0x10/0x10 [ 541.757810][T14519] do_syscall_64+0xcd/0x490 [ 541.757831][T14519] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 541.757846][T14519] RIP: 0033:0x7fd12f98ebe9 [ 541.757858][T14519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 541.757873][T14519] RSP: 002b:00007fd130837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 541.757888][T14519] RAX: ffffffffffffffda RBX: 00007fd12fbc5fa0 RCX: 00007fd12f98ebe9 [ 541.757898][T14519] RDX: 0000000000000040 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 541.757908][T14519] RBP: 00007fd12fa11e19 R08: 0000000000000000 R09: 0000000000000000 [ 541.757917][T14519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 541.757926][T14519] R13: 00007fd12fbc6038 R14: 00007fd12fbc5fa0 R15: 00007fffc961e008 [ 541.757945][T14519] [ 541.759205][T14519] FAULT_INJECTION: forcing a failure. [ 541.759205][T14519] name failslab, interval 1, probability 0, space 0, times 0 [ 541.940678][T14470] active_anon:12632 inactive_anon:5 isolated_anon:0 [ 541.940678][T14470] active_file:5883 inactive_file:53993 isolated_file:0 [ 541.940678][T14470] unevictable:768 dirty:527 writeback:0 [ 541.940678][T14470] slab_reclaimable:14046 slab_unreclaimable:107912 [ 541.940678][T14470] mapped:26109 shmem:1467 pagetables:1368 [ 541.940678][T14470] sec_pagetables:0 bounce:0 [ 541.940678][T14470] kernel_misc_reclaimable:0 [ 541.940678][T14470] free:1301539 free_pcp:11048 free_cma:0 [ 541.987301][T14470] Node 0 active_anon:50528kB inactive_anon:20kB active_file:23532kB inactive_file:215656kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:104260kB dirty:2104kB writeback:0kB shmem:4332kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:13104kB pagetables:5340kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 542.111816][T14470] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:316kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:176kB dirty:4kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB kernel_stack:48kB pagetables:132kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 542.162802][T14519] CPU: 1 UID: 0 PID: 14519 Comm: syz.1.2188 Tainted: G U syzkaller #0 PREEMPT(full) [ 542.162828][T14519] Tainted: [U]=USER [ 542.162833][T14519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 542.162843][T14519] Call Trace: [ 542.162849][T14519] [ 542.162856][T14519] dump_stack_lvl+0x16c/0x1f0 [ 542.162881][T14519] should_fail_ex+0x512/0x640 [ 542.162901][T14519] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 542.162920][T14519] should_failslab+0xc2/0x120 [ 542.162940][T14519] __kmalloc_cache_noprof+0x6a/0x3e0 [ 542.162956][T14519] ? alloc_ucounts+0x13d/0x440 [ 542.162976][T14519] alloc_ucounts+0x13d/0x440 [ 542.162994][T14519] ? __pfx_alloc_ucounts+0x10/0x10 [ 542.163017][T14519] set_cred_ucounts+0xcd/0x200 [ 542.163040][T14519] __sys_setresuid+0x67c/0x1160 [ 542.163060][T14519] do_syscall_64+0xcd/0x490 [ 542.163081][T14519] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 542.163096][T14519] RIP: 0033:0x7fd12f98ebe9 [ 542.163109][T14519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 542.163123][T14519] RSP: 002b:00007fd130837038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 542.163137][T14519] RAX: ffffffffffffffda RBX: 00007fd12fbc5fa0 RCX: 00007fd12f98ebe9 [ 542.163147][T14519] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 542.163155][T14519] RBP: 00007fd12fa11e19 R08: 0000000000000000 R09: 0000000000000000 [ 542.163164][T14519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 542.163172][T14519] R13: 00007fd12fbc6038 R14: 00007fd12fbc5fa0 R15: 00007fffc961e008 [ 542.163191][T14519] [ 542.524824][T14470] Node 0 DMA free:15360kB boost:0kB min:208kB low:260kB high:312kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 542.604044][T14470] lowmem_reserve[]: 0 2480 2481 2481 2481 [ 542.616368][T14470] Node 0 DMA32 free:1290944kB boost:0kB min:34076kB low:42592kB high:51108kB reserved_highatomic:0KB free_highatomic:0KB active_anon:59168kB inactive_anon:20kB active_file:23532kB inactive_file:214336kB unevictable:1536kB writepending:2104kB present:3129332kB managed:2539584kB mlocked:0kB bounce:0kB free_pcp:30056kB local_pcp:30056kB free_cma:0kB [ 542.710886][T14470] lowmem_reserve[]: 0 0 1 1 1 [ 542.720876][T14470] Node 0 Normal free:8kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB free_highatomic:0KB active_anon:44kB inactive_anon:0kB active_file:0kB inactive_file:1320kB unevictable:0kB writepending:0kB present:1048580kB managed:1388kB mlocked:0kB bounce:0kB free_pcp:16kB local_pcp:16kB free_cma:0kB [ 542.816987][T14470] lowmem_reserve[]: 0 0 0 0 0 [ 542.861983][T14470] Node 1 Normal free:3900052kB boost:0kB min:55804kB low:69752kB high:83700kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:316kB unevictable:1536kB writepending:4kB present:4194300kB managed:4111100kB mlocked:0kB bounce:0kB free_pcp:3228kB local_pcp:3228kB free_cma:0kB [ 543.000087][T14470] lowmem_reserve[]: 0 0 0 0 0 [ 543.025664][T14470] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 543.108522][T14470] Node 0 DMA32: 4770*4kB (UM) 1593*8kB (UM) 1251*16kB (UME) 1040*32kB (UME) 637*64kB (UME) 170*128kB (UME) 88*256kB (UM) 17*512kB (M) 22*1024kB (UM) 2*2048kB (UM) 265*4096kB (UM) = 1290944kB [ 543.230681][T14470] Node 0 Normal: 0*4kB 1*8kB (M) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 543.320666][T14470] Node 1 Normal: 24*4kB (UME) 58*8kB (UME) 39*16kB (UM) 231*32kB (UME) 93*64kB (UME) 30*128kB (UME) 13*256kB (UM) 5*512kB (UM) 5*1024kB (UME) 2*2048kB (UE) 944*4096kB (M) = 3900096kB [ 543.434715][T14470] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 543.484835][T14470] Node 0 hugepages_total=2 hugepages_free=1 hugepages_surp=0 hugepages_size=2048kB [ 543.544236][T14470] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 543.593114][T14470] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 543.630174][T14470] 67527 total pagecache pages [ 543.652095][T14470] 5 pages in swap cache [ 543.666820][T14470] Free swap = 124976kB [ 543.688196][T14470] Total swap = 124996kB [ 543.724950][T14470] 2097051 pages RAM [ 543.743328][T14470] 0 pages HighMem/MovableOnly [ 543.769062][T14470] 430193 pages reserved [ 543.800239][T14470] 0 pages cma reserved [ 543.827406][T14470] faux_driver regulatory: loading /lib/firmware/regulatory.db.p7s failed with error -12 [ 543.868667][T14470] faux_driver regulatory: Direct firmware load for regulatory.db.p7s failed with error -12 [ 543.938164][T14470] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db.p7s [ 544.623961][T14553] zswap: compressor not available [ 544.732829][T14569] FAULT_INJECTION: forcing a failure. [ 544.732829][T14569] name failslab, interval 1, probability 0, space 0, times 0 [ 544.786580][T14569] CPU: 1 UID: 0 PID: 14569 Comm: syz.2.2203 Tainted: G U syzkaller #0 PREEMPT(full) [ 544.786607][T14569] Tainted: [U]=USER [ 544.786612][T14569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 544.786622][T14569] Call Trace: [ 544.786628][T14569] [ 544.786634][T14569] dump_stack_lvl+0x16c/0x1f0 [ 544.786659][T14569] should_fail_ex+0x512/0x640 [ 544.786680][T14569] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 544.786701][T14569] should_failslab+0xc2/0x120 [ 544.786721][T14569] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 544.786739][T14569] ? getname_flags.part.0+0x4c/0x550 [ 544.786763][T14569] getname_flags.part.0+0x4c/0x550 [ 544.786787][T14569] getname_flags+0x93/0xf0 [ 544.786803][T14569] do_sys_openat2+0xb8/0x1d0 [ 544.786824][T14569] ? __pfx_do_sys_openat2+0x10/0x10 [ 544.786853][T14569] __x64_sys_openat+0x174/0x210 [ 544.786874][T14569] ? __pfx___x64_sys_openat+0x10/0x10 [ 544.786903][T14569] do_syscall_64+0xcd/0x490 [ 544.786924][T14569] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 544.786940][T14569] RIP: 0033:0x7f894658ebe9 [ 544.786953][T14569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 544.786967][T14569] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 544.786982][T14569] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 544.786992][T14569] RDX: 0000000000000040 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 544.787001][T14569] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 544.787010][T14569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 544.787019][T14569] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 544.787039][T14569] [ 544.970841][T14569] FAULT_INJECTION: forcing a failure. [ 544.970841][T14569] name failslab, interval 1, probability 0, space 0, times 0 [ 544.983560][T14569] CPU: 1 UID: 0 PID: 14569 Comm: syz.2.2203 Tainted: G U syzkaller #0 PREEMPT(full) [ 544.983586][T14569] Tainted: [U]=USER [ 544.983591][T14569] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 544.983602][T14569] Call Trace: [ 544.983608][T14569] [ 544.983614][T14569] dump_stack_lvl+0x16c/0x1f0 [ 544.983639][T14569] should_fail_ex+0x512/0x640 [ 544.983660][T14569] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 544.983678][T14569] should_failslab+0xc2/0x120 [ 544.983698][T14569] __kmalloc_cache_noprof+0x6a/0x3e0 [ 544.983713][T14569] ? alloc_ucounts+0x13d/0x440 [ 544.983734][T14569] alloc_ucounts+0x13d/0x440 [ 544.983752][T14569] ? __pfx_alloc_ucounts+0x10/0x10 [ 544.983774][T14569] set_cred_ucounts+0xcd/0x200 [ 544.983797][T14569] __sys_setresuid+0x67c/0x1160 [ 544.983817][T14569] do_syscall_64+0xcd/0x490 [ 544.983838][T14569] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 544.983853][T14569] RIP: 0033:0x7f894658ebe9 [ 544.983866][T14569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 544.983880][T14569] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 544.983895][T14569] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 544.983905][T14569] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 544.983914][T14569] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 544.983922][T14569] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 544.983930][T14569] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 544.983949][T14569] [ 545.479388][T14576] usb usb23: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 545.685636][T14586] ================================================================== [ 545.693705][T14586] BUG: KASAN: slab-use-after-free in dvb_device_open+0x36a/0x3b0 [ 545.701414][T14586] Read of size 8 at addr ffff88802a6c0018 by task syz.2.2209/14586 [ 545.709279][T14586] [ 545.711588][T14586] CPU: 1 UID: 0 PID: 14586 Comm: syz.2.2209 Tainted: G U syzkaller #0 PREEMPT(full) [ 545.711611][T14586] Tainted: [U]=USER [ 545.711617][T14586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 545.711627][T14586] Call Trace: [ 545.711635][T14586] [ 545.711642][T14586] dump_stack_lvl+0x116/0x1f0 [ 545.711664][T14586] print_report+0xcd/0x630 [ 545.711683][T14586] ? __virt_addr_valid+0x81/0x610 [ 545.711701][T14586] ? __phys_addr+0xe8/0x180 [ 545.711719][T14586] ? dvb_device_open+0x36a/0x3b0 [ 545.711740][T14586] kasan_report+0xe0/0x110 [ 545.711758][T14586] ? dvb_device_open+0x36a/0x3b0 [ 545.711779][T14586] ? __pfx_dvb_device_open+0x10/0x10 [ 545.711799][T14586] dvb_device_open+0x36a/0x3b0 [ 545.711819][T14586] ? __pfx_dvb_device_open+0x10/0x10 [ 545.711839][T14586] chrdev_open+0x234/0x6a0 [ 545.711857][T14586] ? __pfx_apparmor_file_open+0x10/0x10 [ 545.711874][T14586] ? __pfx_chrdev_open+0x10/0x10 [ 545.711892][T14586] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 545.711910][T14586] do_dentry_open+0x982/0x1530 [ 545.711929][T14586] ? __pfx_chrdev_open+0x10/0x10 [ 545.711949][T14586] vfs_open+0x82/0x3f0 [ 545.711970][T14586] path_openat+0x1de4/0x2cb0 [ 545.711990][T14586] ? __pfx_path_openat+0x10/0x10 [ 545.712016][T14586] do_filp_open+0x20b/0x470 [ 545.712034][T14586] ? __pfx_do_filp_open+0x10/0x10 [ 545.712058][T14586] ? alloc_fd+0x471/0x7d0 [ 545.712076][T14586] do_sys_openat2+0x11b/0x1d0 [ 545.712098][T14586] ? __pfx_do_sys_openat2+0x10/0x10 [ 545.712119][T14586] ? __sys_sendmsg+0x18c/0x220 [ 545.712140][T14586] __x64_sys_openat+0x174/0x210 [ 545.712161][T14586] ? __pfx___x64_sys_openat+0x10/0x10 [ 545.712186][T14586] do_syscall_64+0xcd/0x490 [ 545.712206][T14586] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 545.712222][T14586] RIP: 0033:0x7f894658ebe9 [ 545.712234][T14586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 545.712250][T14586] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 545.712264][T14586] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 545.712274][T14586] RDX: 0000000000008001 RSI: 0000200000000100 RDI: ffffffffffffff9c [ 545.712284][T14586] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 545.712293][T14586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 545.712302][T14586] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 545.712317][T14586] [ 545.712322][T14586] [ 545.961297][T14586] Allocated by task 1: [ 545.965341][T14586] kasan_save_stack+0x33/0x60 [ 545.970002][T14586] kasan_save_track+0x14/0x30 [ 545.974659][T14586] __kasan_kmalloc+0xaa/0xb0 [ 545.979228][T14586] dvb_register_device+0x1e4/0x2370 [ 545.984413][T14586] dvb_register_frontend+0x5a6/0x880 [ 545.989678][T14586] vidtv_bridge_probe+0x459/0xa90 [ 545.994684][T14586] platform_probe+0x106/0x1d0 [ 545.999340][T14586] really_probe+0x23e/0xa90 [ 546.003821][T14586] __driver_probe_device+0x1de/0x440 [ 546.009108][T14586] driver_probe_device+0x4c/0x1b0 [ 546.014115][T14586] __driver_attach+0x283/0x580 [ 546.018863][T14586] bus_for_each_dev+0x13b/0x1d0 [ 546.023691][T14586] bus_add_driver+0x2e9/0x690 [ 546.028366][T14586] driver_register+0x15c/0x4b0 [ 546.033113][T14586] vidtv_bridge_init+0x45/0x80 [ 546.037860][T14586] do_one_initcall+0x120/0x6e0 [ 546.042602][T14586] kernel_init_freeable+0x5c2/0x910 [ 546.047781][T14586] kernel_init+0x1c/0x2b0 [ 546.052087][T14586] ret_from_fork+0x5d4/0x6f0 [ 546.056661][T14586] ret_from_fork_asm+0x1a/0x30 [ 546.061407][T14586] [ 546.063710][T14586] Freed by task 14365: [ 546.067749][T14586] kasan_save_stack+0x33/0x60 [ 546.072405][T14586] kasan_save_track+0x14/0x30 [ 546.077062][T14586] kasan_save_free_info+0x3b/0x60 [ 546.082073][T14586] __kasan_slab_free+0x60/0x70 [ 546.086819][T14586] kfree+0x2b4/0x4d0 [ 546.090691][T14586] dvb_device_put.part.0+0x60/0x90 [ 546.095785][T14586] dvb_device_open+0x2a4/0x3b0 [ 546.100546][T14586] chrdev_open+0x234/0x6a0 [ 546.104955][T14586] do_dentry_open+0x982/0x1530 [ 546.109710][T14586] vfs_open+0x82/0x3f0 [ 546.113792][T14586] path_openat+0x1de4/0x2cb0 [ 546.118370][T14586] do_filp_open+0x20b/0x470 [ 546.122858][T14586] do_sys_openat2+0x11b/0x1d0 [ 546.127521][T14586] __x64_sys_openat+0x174/0x210 [ 546.132363][T14586] do_syscall_64+0xcd/0x490 [ 546.136850][T14586] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 546.142724][T14586] [ 546.145045][T14586] The buggy address belongs to the object at ffff88802a6c0000 [ 546.145045][T14586] which belongs to the cache kmalloc-256 of size 256 [ 546.159076][T14586] The buggy address is located 24 bytes inside of [ 546.159076][T14586] freed 256-byte region [ffff88802a6c0000, ffff88802a6c0100) [ 546.172776][T14586] [ 546.175090][T14586] The buggy address belongs to the physical page: [ 546.181478][T14586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x2a6c0 [ 546.190215][T14586] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 546.198689][T14586] flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 546.206209][T14586] page_type: f5(slab) [ 546.210169][T14586] raw: 00fff00000000040 ffff88801b841b40 dead000000000122 0000000000000000 [ 546.218728][T14586] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 546.227289][T14586] head: 00fff00000000040 ffff88801b841b40 dead000000000122 0000000000000000 [ 546.235938][T14586] head: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 546.244603][T14586] head: 00fff00000000001 ffffea0000a9b001 00000000ffffffff 00000000ffffffff [ 546.253251][T14586] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 546.261896][T14586] page dumped because: kasan: bad access detected [ 546.268289][T14586] page_owner tracks the page as allocated [ 546.273980][T14586] page last allocated via order 1, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 1, tgid 1 (swapper/0), ts 18996757665, free_ts 0 [ 546.293672][T14586] post_alloc_hook+0x1c0/0x230 [ 546.298442][T14586] get_page_from_freelist+0x132b/0x38e0 [ 546.303989][T14586] __alloc_frozen_pages_noprof+0x261/0x23f0 [ 546.309879][T14586] alloc_pages_mpol+0x1fb/0x550 [ 546.314714][T14586] new_slab+0x247/0x330 [ 546.318845][T14586] ___slab_alloc+0xcf2/0x1740 [ 546.323498][T14586] __slab_alloc.constprop.0+0x56/0xb0 [ 546.328851][T14586] __kmalloc_cache_noprof+0xfb/0x3e0 [ 546.334111][T14586] dvb_register_device+0x1e4/0x2370 [ 546.339293][T14586] dvb_register_frontend+0x5a6/0x880 [ 546.344567][T14586] vidtv_bridge_probe+0x459/0xa90 [ 546.349574][T14586] platform_probe+0x106/0x1d0 [ 546.354234][T14586] really_probe+0x23e/0xa90 [ 546.358716][T14586] __driver_probe_device+0x1de/0x440 [ 546.363983][T14586] driver_probe_device+0x4c/0x1b0 [ 546.368996][T14586] __driver_attach+0x283/0x580 [ 546.373745][T14586] page_owner free stack trace missing [ 546.379086][T14586] [ 546.381388][T14586] Memory state around the buggy address: [ 546.386994][T14586] ffff88802a6bff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 546.395036][T14586] ffff88802a6bff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 546.403073][T14586] >ffff88802a6c0000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 546.411110][T14586] ^ [ 546.415933][T14586] ffff88802a6c0080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 546.423972][T14586] ffff88802a6c0100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 546.432009][T14586] ================================================================== [ 547.453206][T14586] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 547.460420][T14586] CPU: 1 UID: 0 PID: 14586 Comm: syz.2.2209 Tainted: G U syzkaller #0 PREEMPT(full) [ 547.471339][T14586] Tainted: [U]=USER [ 547.475121][T14586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 547.485157][T14586] Call Trace: [ 547.488426][T14586] [ 547.491341][T14586] dump_stack_lvl+0x3d/0x1f0 [ 547.495920][T14586] vpanic+0x6e8/0x7a0 [ 547.499892][T14586] ? __pfx_vpanic+0x10/0x10 [ 547.504380][T14586] ? __pfx_vprintk_emit+0x10/0x10 [ 547.509385][T14586] ? dvb_device_open+0x36a/0x3b0 [ 547.514312][T14586] panic+0xca/0xd0 [ 547.518020][T14586] ? __pfx_panic+0x10/0x10 [ 547.522422][T14586] ? dvb_device_open+0x36a/0x3b0 [ 547.527350][T14586] ? preempt_schedule_common+0x44/0xc0 [ 547.532799][T14586] ? preempt_schedule_thunk+0x16/0x30 [ 547.538168][T14586] check_panic_on_warn+0xab/0xb0 [ 547.543095][T14586] end_report+0x107/0x170 [ 547.547409][T14586] kasan_report+0xee/0x110 [ 547.551809][T14586] ? dvb_device_open+0x36a/0x3b0 [ 547.556738][T14586] ? __pfx_dvb_device_open+0x10/0x10 [ 547.562007][T14586] dvb_device_open+0x36a/0x3b0 [ 547.566754][T14586] ? __pfx_dvb_device_open+0x10/0x10 [ 547.572025][T14586] chrdev_open+0x234/0x6a0 [ 547.576427][T14586] ? __pfx_apparmor_file_open+0x10/0x10 [ 547.581956][T14586] ? __pfx_chrdev_open+0x10/0x10 [ 547.586877][T14586] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 547.593187][T14586] do_dentry_open+0x982/0x1530 [ 547.597933][T14586] ? __pfx_chrdev_open+0x10/0x10 [ 547.602853][T14586] vfs_open+0x82/0x3f0 [ 547.606909][T14586] path_openat+0x1de4/0x2cb0 [ 547.611484][T14586] ? __pfx_path_openat+0x10/0x10 [ 547.616406][T14586] do_filp_open+0x20b/0x470 [ 547.620891][T14586] ? __pfx_do_filp_open+0x10/0x10 [ 547.625904][T14586] ? alloc_fd+0x471/0x7d0 [ 547.630216][T14586] do_sys_openat2+0x11b/0x1d0 [ 547.634880][T14586] ? __pfx_do_sys_openat2+0x10/0x10 [ 547.640066][T14586] ? __sys_sendmsg+0x18c/0x220 [ 547.644819][T14586] __x64_sys_openat+0x174/0x210 [ 547.649657][T14586] ? __pfx___x64_sys_openat+0x10/0x10 [ 547.655018][T14586] do_syscall_64+0xcd/0x490 [ 547.659508][T14586] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 547.665382][T14586] RIP: 0033:0x7f894658ebe9 [ 547.669772][T14586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 547.689366][T14586] RSP: 002b:00007f89474dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 547.697758][T14586] RAX: ffffffffffffffda RBX: 00007f89467c5fa0 RCX: 00007f894658ebe9 [ 547.705708][T14586] RDX: 0000000000008001 RSI: 0000200000000100 RDI: ffffffffffffff9c [ 547.713658][T14586] RBP: 00007f8946611e19 R08: 0000000000000000 R09: 0000000000000000 [ 547.721608][T14586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 547.729555][T14586] R13: 00007f89467c6038 R14: 00007f89467c5fa0 R15: 00007ffee4c05f78 [ 547.737527][T14586] [ 547.740585][T14586] Kernel Offset: disabled [ 547.744899][T14586] Rebooting in 86400 seconds..