last executing test programs: 5m6.980305752s ago: executing program 0 (id=1158): open_by_handle_at$auto(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x42}, 0x4) r0 = socket(0x11, 0x3, 0x9) sendmmsg$auto(r0, &(0x7f00000001c0)={{&(0x7f0000000000), 0x5ab, &(0x7f0000000100)={&(0x7f0000000080), 0x49}, 0x5, &(0x7f00000004c0), 0x6, 0x1080}, 0x5}, 0x2, 0x7f) 5m6.27471436s ago: executing program 0 (id=1162): mmap$auto(0x0, 0x400008, 0x9f, 0x9b72, 0xffffffffffffffff, 0x0) r0 = gettid() mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x0, 0xfffffffffffff000, 0x2) socket(0x2a, 0x2, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x4, 0x28000) setrlimit$auto(0x1000000007, 0x0) getsockopt$auto(0x6, 0x1, 0x4d, 0xfffffffffffffffe, 0x0) socket(0x2, 0x1, 0x0) io_uring_setup$auto(0x6, 0x0) close_range$auto(0x2, 0x8, 0x0) r1 = openat$auto_sw_sync_debugfs_fops_sync_debug(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) ioctl$auto_SW_SYNC_IOC_CREATE_FENCE(r1, 0xc0285700, 0x0) select$auto(0x8, &(0x7f0000000080)={[0x20000009, 0xfffffffffffbfffc, 0x9, 0x5, 0xc, 0x3, 0x7, 0x1ffe000, 0x2, 0x8, 0x5, 0xf, 0xd, 0x1, 0x6, 0x1]}, 0x0, 0x0, 0x0) munmap$auto(0x8000, 0xe26) process_vm_readv$auto(r0, &(0x7f0000000040)={0x0, 0x8}, 0x4, 0x0, 0x6, 0x0) 5m4.102568015s ago: executing program 0 (id=1165): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x6, 0x0) pipe$auto(&(0x7f0000000080)=0xe7da) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_OVS_DP_CMD_NEW(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000740)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="08002dbd7000fcdbdf2501000000080005000800000008000900", @ANYRESOCT, @ANYBLOB="08000900c3fe27df1f0dc51840454c233bca66f99e6f286fc373967e174221e40ee9b85428844974cb1df515d736670f8fa8d09d1fed7825f01bd37e9deb909606c71c198a5281c50475c7cab660b1d9879f70b8c89088abe2c9246166796a016e6442340e3e3a3bd85ecd92c892e0b0943b0c4422a486e7d04de3a9a87d1c12c568918a000000000000000000000000000000c85eb288bb73fc8f62ecf25bf1d4c4fa507ce617bbabed22e79f98f5e7200b6fc37888f3182a290062", @ANYRES32, @ANYBLOB="225705000080000009000100be2c2d000000000008000500000000008b9c8d18c57751be4c0fadf0881749e128cd8c623d1d5646af89ca9a3bd8d209ff425708d3c4a9dc046c6c4a33a612065a5d32e9c0caec16353fa1a7fc17f386eaf512fc3838e1ec00e9a8dc0b2292419af0a2096e2e9e8ad72e55bdc9f05d61d13cabfc07a350107e8c23b53d2bd99dfac9516c75962977bd971c49973274155118a194554bdb3f60a78f5c387b72fc4ab3ced5b4ec72"], 0x48}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) dup2$auto(0x0, 0x4) exit$auto(0x8) io_uring_register$auto(0x2, 0x18, &(0x7f0000000000), 0x1) 5m2.759310782s ago: executing program 0 (id=1169): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system/cpu/vulnerabilities/mds\x00', 0x0, 0x0) read$auto(r0, 0x0, 0x8000) openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mprotect$auto(0x1ffff000, 0x8000000000000001, 0xd) r1 = socket(0xa, 0x1, 0x84) getsockopt$auto(r1, 0x0, 0x483, 0x0, &(0x7f0000000040)=0x3) 5m2.117678843s ago: executing program 0 (id=1170): socket$nl_generic(0x10, 0x3, 0x10) socket(0x11, 0x3, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$auto(0x0, &(0x7f0000000040)=@task_fd_query={0x0, 0x4, 0x3, 0x2, 0x8, 0xc, 0xe3, 0x400000000a, 0x3}, 0x6f4) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) init_module$auto(0x0, 0xffff9, &(0x7f0000000140)='/sys/devices/platform/dummy_hcd.6/usb7/power/wakeup_active_count\x00') prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0xdc3) madvise$auto(0x0, 0x8000000000000000, 0x15) madvise$auto(0x0, 0x2000000080000001, 0x3) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) capget$auto(0x0, 0xfffffffffffffffe) capset$auto(0x0, &(0x7f0000000000)={0x3, 0x7, 0x8}) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x30, 0x80000006, 0x4) r2 = socket(0x10, 0x2, 0x0) statmount$auto(0x0, &(0x7f0000000380)={0x8, 0x1, 0x1ff, 0x7, 0x42, 0x4909b6f8, 0x1ffdf, 0x7, 0x200007, 0x2, 0xa121, 0x3, 0x6, 0x4, 0x10001, 0xa, 0x6, 0x10001, 0x80, 0x100000000, 0x0, 0x7, 0x2100, 0x200, 0x0, 0x83, [0x0, 0x0, 0x0, 0x500ffffffffffd, 0x0, 0x2000, 0x0, 0x1, 0x70624ce7, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffbfff, 0x6, 0x200001, 0x7, 0xffffffffffffffff, 0x3, 0x0, 0x2000000000000000, 0x0, 0x0, 0x400000000005b8, 0xc, 0x3a, 0x0, 0x0, 0x6, 0x0, 0x88e, 0x8000000000008, 0xfffffffffffffffc, 0x9, 0xa38, 0x0, 0x3, 0xfffffffffffffffa, 0x8, 0x9, 0x200], "b8af35e9a84b9ec07904d771c7013fad3c86ca53b2560ebd2a79294cac59571672a420398c8d4c8254005314a6a7f2ba51acffcb26a130d636fd800ebd667c210831df9eeba6035e0400f4d432e403416e79cdb6304e139fd04ac2ccbf018bcc05339c47422a6e1d8f7ef8f9c81b0b5f3fd2ef01704dce8f41"}, 0x1fe, 0xd) sendmsg$auto_OVS_VPORT_CMD_DEL(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r2, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000000)={0x0, 0xfc2}, 0x2, 0x0, 0x7, 0xa505}, 0x800}, 0x7, 0x4008) madvise$auto(0x0, 0xffffffffffff0005, 0x19) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) mmap$auto(0x200001, 0x200006, 0x10040, 0x40ebd, 0xffffffffffffffff, 0xb00000000000) mmap$auto(0x0, 0x40000a, 0xdf, 0x12, 0xa, 0x8000) close_range$auto(0x2, 0x8000, 0x0) open(0x0, 0xa22c0, 0x155) 4m57.838405344s ago: executing program 0 (id=1180): socket$nl_generic(0x10, 0x3, 0x10) socket(0x11, 0x3, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$auto(0x0, &(0x7f0000000040)=@task_fd_query={0x0, 0x4, 0x3, 0x2, 0x8, 0xc, 0xe3, 0x400000000a, 0x3}, 0x6f4) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0xdc3) madvise$auto(0x0, 0x8000000000000000, 0x15) madvise$auto(0x0, 0x2000000080000001, 0x3) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) capget$auto(0x0, 0xfffffffffffffffe) capset$auto(0x0, &(0x7f0000000000)={0x3, 0x7, 0x8}) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x30, 0x80000006, 0x4) r2 = socket(0x10, 0x2, 0x0) statmount$auto(0x0, &(0x7f0000000380)={0x8, 0x1, 0x1ff, 0x7, 0x42, 0x4909b6f8, 0x1ffdf, 0x7, 0x200007, 0x2, 0xa121, 0x3, 0x6, 0x4, 0x10001, 0xa, 0x6, 0x10001, 0x80, 0x100000000, 0x0, 0x7, 0x2100, 0x200, 0x0, 0x83, [0x0, 0x0, 0x0, 0x500ffffffffffd, 0x0, 0x2000, 0x0, 0x1, 0x70624ce7, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffbfff, 0x6, 0x200001, 0x7, 0xffffffffffffffff, 0x3, 0x0, 0x2000000000000000, 0x0, 0x0, 0x400000000005b8, 0xc, 0x3a, 0x0, 0x0, 0x6, 0x0, 0x88e, 0x8000000000008, 0xfffffffffffffffc, 0x9, 0xa38, 0x0, 0x3, 0xfffffffffffffffa, 0x8, 0x9, 0x200], "b8af35e9a84b9ec07904d771c7013fad3c86ca53b2560ebd2a79294cac59571672a420398c8d4c8254005314a6a7f2ba51acffcb26a130d636fd800ebd667c210831df9eeba6035e0400f4d432e403416e79cdb6304e139fd04ac2ccbf018bcc05339c47422a6e1d8f7ef8f9c81b0b5f3fd2ef01704dce8f41"}, 0x1fe, 0xd) sendmsg$auto_OVS_VPORT_CMD_DEL(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r2, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000000)={0x0, 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) madvise$auto(0x0, 0xffffffffffff0005, 0x19) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) mmap$auto(0x200001, 0x200006, 0x10040, 0x40ebd, 0xffffffffffffffff, 0xb00000000000) open(0x0, 0xa22c0, 0x155) 4m56.961768119s ago: executing program 2 (id=1182): socket$nl_generic(0x10, 0x3, 0x10) socket(0x11, 0x3, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$auto(0x0, &(0x7f0000000040)=@task_fd_query={0x0, 0x4, 0x3, 0x2, 0x8, 0xc, 0xe3, 0x400000000a, 0x3}, 0x6f4) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) init_module$auto(0x0, 0xffff9, &(0x7f0000000140)='/sys/devices/platform/dummy_hcd.6/usb7/power/wakeup_active_count\x00') prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0xdc3) madvise$auto(0x0, 0x8000000000000000, 0x15) madvise$auto(0x0, 0x2000000080000001, 0x3) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) capget$auto(0x0, 0xfffffffffffffffe) capset$auto(0x0, &(0x7f0000000000)={0x3, 0x7, 0x8}) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x30, 0x80000006, 0x4) r2 = socket(0x10, 0x2, 0x0) statmount$auto(0x0, &(0x7f0000000380)={0x8, 0x1, 0x1ff, 0x7, 0x42, 0x4909b6f8, 0x1ffdf, 0x7, 0x200007, 0x2, 0xa121, 0x3, 0x6, 0x4, 0x10001, 0xa, 0x6, 0x10001, 0x80, 0x100000000, 0x0, 0x7, 0x2100, 0x200, 0x0, 0x83, [0x0, 0x0, 0x0, 0x500ffffffffffd, 0x0, 0x2000, 0x0, 0x1, 0x70624ce7, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffbfff, 0x6, 0x200001, 0x7, 0xffffffffffffffff, 0x3, 0x0, 0x2000000000000000, 0x0, 0x0, 0x400000000005b8, 0xc, 0x3a, 0x0, 0x0, 0x6, 0x0, 0x88e, 0x8000000000008, 0xfffffffffffffffc, 0x9, 0xa38, 0x0, 0x3, 0xfffffffffffffffa, 0x8, 0x9, 0x200], "b8af35e9a84b9ec07904d771c7013fad3c86ca53b2560ebd2a79294cac59571672a420398c8d4c8254005314a6a7f2ba51acffcb26a130d636fd800ebd667c210831df9eeba6035e0400f4d432e403416e79cdb6304e139fd04ac2ccbf018bcc05339c47422a6e1d8f7ef8f9c81b0b5f3fd2ef01704dce8f41"}, 0x1fe, 0xd) sendmsg$auto_OVS_VPORT_CMD_DEL(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r2, &(0x7f0000000200)={{0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) madvise$auto(0x0, 0xffffffffffff0005, 0x19) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) mmap$auto(0x200001, 0x200006, 0x10040, 0x40ebd, 0xffffffffffffffff, 0xb00000000000) mmap$auto(0x0, 0x40000a, 0xdf, 0x12, 0xa, 0x8000) close_range$auto(0x2, 0x8000, 0x0) open(0x0, 0xa22c0, 0x155) 4m51.590024444s ago: executing program 2 (id=1192): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) getrandom$auto(0x0, 0x6000000, 0x3) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x89fc, &(0x7f0000000000)={'ip_vti0\x00'}) close_range$auto(0x2, 0x8, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x1) r2 = syz_genetlink_get_family_id$auto_nl802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$auto_NL802154_CMD_LIST_ASSOCIATIONS(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x305, 0x70bd27, 0x25dfdbff}, 0x14}}, 0x84) sendmmsg$auto(r0, &(0x7f0000000380)={{&(0x7f00000001c0)="33100d0f91a55f81d776a4637ebe7077ca4cf08759020eb82993432e636c1ff8966565154a07b2b8ce9931ecd679d10582c5f7a1b71f2534b5e4ff1192421d5df86c3bd9587750a2770c35bfd2b1e1e188a3d97149fdddc6e34900bc14bcf6cc4fefa6cfcae9cfbae78cb71035ae1ced3b5843d63e12c1c94dcb56ec963192e68b0480ec93d5747fd53ffe739d5fbbb3385e2f949743220bbff7d94702168bdda38c4a1619a99d8f0f0c0cfdb4cb6bd5ca5db4d3f97193f1f5b510fbee1e917becdc3f96477e258afc5abf3d539b7fabb53729a88910191733246cfbd7949c3d7bbe87d0ded5e1b101071d645627b9b80da7477ff01b", 0x3caa, &(0x7f00000002c0)={&(0x7f0000000080), 0xfffffffffffffff9}, 0xa, &(0x7f0000000300)="db39bdecf2643e9cebb6a16a560d13a2be39660298f35cf8688865d316d0adfbc70e6326081efc4167cdcc1f100105e8636f3eb0c3a6ac9776d61045fa6feb654cfcbfab2a051977d6722db2ef70d82ed1f32b1f4a77e15740b3fdd20df294fadacdbf09bf5101aebdf4f0", 0xfffffffffffffff0, 0x9}, 0x705}, 0x3, 0x7f) read$auto(r0, &(0x7f0000000080)='/dev/kvm\x00', 0x9) r3 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/timers\x00', 0x0, 0x0) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) read$auto(r3, &(0x7f0000000180)='l.\x00\x0fx\x1e-[\x85\xe7e\x12\x1f\xcc_G\x11\x95\x9ex\x1bY@\xe1\xf7\a\"o\xec\b>\xee!y\xf1\xd7W\xfa\xd01#D\xe9\xef\xf2\xb8\x1e\x91u[\x17\xae\x8e\xb7R\x19\xe8X\xb2c\xc9/0\xe1\x10\x8d#*\xd7s\xd1:\xe1\x88%\xca\'X\a\a\xb0\xc3\xea\xa9\xce.n\x81\xa44\x04\x95\x06z\xb2DD=\xbf.\xdd\x17\xc9\x982\xb8\xcb\x15Y`\x84\x86i7\x8a\xa3L\xc0\x11\xc8\xea\xe5YR9=wA\xa26\xe2Ka\x17\x94\xf1d\x89\x17\x1e\x9b\x8c-\x1d\xd2\xd3o0\xf6\x8f\xce\xb5Y\xc6\x00R\xb2\x183E\x1c\x06\x00\xadj\x807u#Vwv\xfen\x81T\xf0 \x02\xbb\x9c\xe6\xe8Y0{\x83\xaa\xbd\xff2i\x83\x92\xfc\xfao\xa0\xb9}\xa5\xc7\xf2S\x90\xac\xe8\xcb\x9fn\xfc\x0e@\xf5H\b\x14\xce\xaec8$Z\xf9_ym\xdc', 0x1) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x8c00, 0x0) write$auto(0x1, &(0x7f0000000000)='//\xf2\x00', 0x80000000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r4 = socket(0x2, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) sendmmsg$auto(r4, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0xd, 0x0, 0x4}, 0x800009}, 0x5, 0x20000000) sendmmsg$auto(0x3, 0x0, 0x31cd3c7c, 0xb1) connect$auto(r4, &(0x7f00000000c0)=@in={0x2, 0x0, @multicast2}, 0xe) sendmsg$auto_GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x4000804) syz_genetlink_get_family_id$auto_l2tp(&(0x7f0000000180), 0xffffffffffffffff) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xe000) mmap$auto(0x0, 0x4, 0x4000000000df, 0x78, 0x4, 0x300000000000) getsockopt$auto(0x4, 0x6, 0x1b, 0xfffffffffffffffc, 0x0) socket$nl_generic(0x10, 0x3, 0x10) read$auto_v4l2_fops_v4l2_dev(0xffffffffffffffff, &(0x7f0000000100)=""/4096, 0x1000) 4m48.026206166s ago: executing program 2 (id=1198): mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) mmap$auto(0x10000000, 0x8, 0x1000000004, 0x9b72, 0x2, 0x8000) msgctl$auto(0x0, 0x3, 0x0) r0 = socket(0x11, 0x80003, 0x300) sendmmsg$auto(r0, 0x0, 0x3d7, 0xd2a7) setsockopt$auto(r0, 0x107, 0x12, 0x0, 0x4) syz_genetlink_get_family_id$auto_ovs_flow(0x0, 0xffffffffffffffff) r1 = fsopen$auto(&(0x7f00000000c0)='\'\\^@\x00', 0x1) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)={0xb8, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_MAC_MASK={0xa2, 0xd7, "a32f19b4ab2784d72e87555ac5a0cccc08f4970f67c670b370f38abee09e513963c6c54c60a7c7542e40b49ea2d8763b75c9fa34125bde6d811a43e7cb52ed457b58335708154e71278e0d4ddafa188164343c95a9aba3c2909f76ec500419a74a3202bf013a3f7f855641ae5e6ac9dde01764287b174890298af0ee0b3019af1b5bc43f60e0906c4eeb5c4fa7c4492233e69359b7f8f640216a666d8500"}]}, 0xb8}, 0x1, 0x0, 0x0, 0x2000c041}, 0x88055) r2 = socket$nl_generic(0x10, 0x3, 0x10) prctl$auto(0x44, 0x100000000, 0x4e6, 0xfffffffffffffffd, 0x902) r3 = syz_genetlink_get_family_id$auto_ipvs(0x0, 0xffffffffffffffff) sendmsg$auto_IPVS_CMD_ZERO(r2, &(0x7f0000000580)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x168, r3, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3f0}, @IPVS_CMD_ATTR_SERVICE={0x14b, 0x1, 0x0, 0x1, [@typed={0x8, 0x74, 0x0, 0x0, @pid}, @generic="203f4426f8bc5162a8de9cb8119975ce65a32135ef2df93d5e0462373fa7bcc70c6d376622e66a81eb0277b82aa9a917d216750dca713a290eee285d657f126952cadaa9026950ebec3a10cb4547aecacb0d6cfcb23b374b9ada159582fd51585ad99d5fa8be4f5fd48a8b6f0931", @generic, @generic="5e6038ac9bbd865f3b332dc002b1aebee661cdadfb45cd525cb76db8041b075b6ced731b9eafbc33aba1a08860aa5386cc32f24b200d2a76216713dfa95b552429cfddeb383b76ce0df69aa2d45c200a8f8571548388867439d4ca696f7c4a4e3920a235d9bd221492cfce08ad75e542888075b17784c9a316ea81419c98eb7febb4efa4cb8e0b8f566e320079ef8f7c1b26be2bbb0a2e40b2bd20e3e7cc7136fceccf339dc5166043e8bdd05f4e8c6c14a396", @generic="793f9dfe0f2fd1d75e30d25b157eef47617c7404c4f4", @typed={0x8, 0xd3, 0x0, 0x0, @ipv4=@rand_addr=0x64010100}]}]}, 0x168}, 0x1, 0x0, 0x0, 0x40804}, 0x4880) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0x9, 0x3, 0x12, 0x940, 0x1fee0, 0x3, 0x6, 0x80000002, 0x9, 0x80000005, 0x2, 0x7, 0xb0, 0x9, 0x5, 0x3, 0x5, 0x7, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff]}, 0x1fe, 0x82) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="11002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r4 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r4, &(0x7f0000000200)={{0x0, 0x2000000, &(0x7f0000000100)={&(0x7f0000000080), 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) 4m46.688956924s ago: executing program 2 (id=1201): socket$nl_generic(0x10, 0x3, 0x10) socket(0x11, 0x3, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$auto(0x0, &(0x7f0000000040)=@task_fd_query={0x0, 0x4, 0x3, 0x2, 0x8, 0xc, 0xe3, 0x400000000a, 0x3}, 0x6f4) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) init_module$auto(0x0, 0xffff9, &(0x7f0000000140)='/sys/devices/platform/dummy_hcd.6/usb7/power/wakeup_active_count\x00') prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0xdc3) madvise$auto(0x0, 0x8000000000000000, 0x15) madvise$auto(0x0, 0x2000000080000001, 0x3) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) capget$auto(0x0, 0xfffffffffffffffe) capset$auto(0x0, &(0x7f0000000000)={0x3, 0x7, 0x8}) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x30, 0x80000006, 0x4) r2 = socket(0x10, 0x2, 0x0) statmount$auto(0x0, &(0x7f0000000380)={0x8, 0x1, 0x1ff, 0x7, 0x42, 0x4909b6f8, 0x1ffdf, 0x7, 0x200007, 0x2, 0xa121, 0x3, 0x6, 0x4, 0x10001, 0xa, 0x6, 0x10001, 0x80, 0x100000000, 0x0, 0x7, 0x2100, 0x200, 0x0, 0x83, [0x0, 0x0, 0x0, 0x500ffffffffffd, 0x0, 0x2000, 0x0, 0x1, 0x70624ce7, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffbfff, 0x6, 0x200001, 0x7, 0xffffffffffffffff, 0x3, 0x0, 0x2000000000000000, 0x0, 0x0, 0x400000000005b8, 0xc, 0x3a, 0x0, 0x0, 0x6, 0x0, 0x88e, 0x8000000000008, 0xfffffffffffffffc, 0x9, 0xa38, 0x0, 0x3, 0xfffffffffffffffa, 0x8, 0x9, 0x200], "b8af35e9a84b9ec07904d771c7013fad3c86ca53b2560ebd2a79294cac59571672a420398c8d4c8254005314a6a7f2ba51acffcb26a130d636fd800ebd667c210831df9eeba6035e0400f4d432e403416e79cdb6304e139fd04ac2ccbf018bcc05339c47422a6e1d8f7ef8f9c81b0b5f3fd2ef01704dce8f41"}, 0x1fe, 0xd) sendmsg$auto_OVS_VPORT_CMD_DEL(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r2, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000000)={0x0, 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) madvise$auto(0x0, 0xffffffffffff0005, 0x19) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) mmap$auto(0x200001, 0x200006, 0x10040, 0x40ebd, 0xffffffffffffffff, 0xb00000000000) open(0x0, 0xa22c0, 0x155) 4m42.570022014s ago: executing program 32 (id=1180): socket$nl_generic(0x10, 0x3, 0x10) socket(0x11, 0x3, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$auto(0x0, &(0x7f0000000040)=@task_fd_query={0x0, 0x4, 0x3, 0x2, 0x8, 0xc, 0xe3, 0x400000000a, 0x3}, 0x6f4) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0xdc3) madvise$auto(0x0, 0x8000000000000000, 0x15) madvise$auto(0x0, 0x2000000080000001, 0x3) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) capget$auto(0x0, 0xfffffffffffffffe) capset$auto(0x0, &(0x7f0000000000)={0x3, 0x7, 0x8}) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x30, 0x80000006, 0x4) r2 = socket(0x10, 0x2, 0x0) statmount$auto(0x0, &(0x7f0000000380)={0x8, 0x1, 0x1ff, 0x7, 0x42, 0x4909b6f8, 0x1ffdf, 0x7, 0x200007, 0x2, 0xa121, 0x3, 0x6, 0x4, 0x10001, 0xa, 0x6, 0x10001, 0x80, 0x100000000, 0x0, 0x7, 0x2100, 0x200, 0x0, 0x83, [0x0, 0x0, 0x0, 0x500ffffffffffd, 0x0, 0x2000, 0x0, 0x1, 0x70624ce7, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffbfff, 0x6, 0x200001, 0x7, 0xffffffffffffffff, 0x3, 0x0, 0x2000000000000000, 0x0, 0x0, 0x400000000005b8, 0xc, 0x3a, 0x0, 0x0, 0x6, 0x0, 0x88e, 0x8000000000008, 0xfffffffffffffffc, 0x9, 0xa38, 0x0, 0x3, 0xfffffffffffffffa, 0x8, 0x9, 0x200], "b8af35e9a84b9ec07904d771c7013fad3c86ca53b2560ebd2a79294cac59571672a420398c8d4c8254005314a6a7f2ba51acffcb26a130d636fd800ebd667c210831df9eeba6035e0400f4d432e403416e79cdb6304e139fd04ac2ccbf018bcc05339c47422a6e1d8f7ef8f9c81b0b5f3fd2ef01704dce8f41"}, 0x1fe, 0xd) sendmsg$auto_OVS_VPORT_CMD_DEL(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r2, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000000)={0x0, 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) madvise$auto(0x0, 0xffffffffffff0005, 0x19) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) mmap$auto(0x200001, 0x200006, 0x10040, 0x40ebd, 0xffffffffffffffff, 0xb00000000000) open(0x0, 0xa22c0, 0x155) 4m40.58913254s ago: executing program 2 (id=1208): socket(0x2, 0x801, 0x100) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_nbd(&(0x7f0000000340), 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./cgroup\x00', 0x0, 0x64) r2 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000280)='/proc/fs/netfs/caches\x00', 0x20000, 0x0) read$auto_proc_iter_file_ops_compat_inode(r2, &(0x7f00000002c0)=""/233, 0xe9) read$auto(0x3, 0x0, 0x80) fchdir$auto(r1) sendmsg$auto_NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, 0x0, 0xc005) r3 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/controlC2\x00', 0x101842, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000300)={{@raw=0x1, 0xa, 0xf8, 0x4671, "a401d243991a4dc376cc2bd4dbe3040e3cff152230323227f8d6c24be7ceeed84366bbadec197ea40209a468", @raw}, 0x1ec, 0x80d, 0x1, @inferred, @reserved="b2089ab0bbaab63c40853405fb772ade9448008d0040560232dbb586cf8f11ca82a2ba37174118952b850ad2099d3a3bc1c77e916330e96e2989bebf719430efe8c9a59c9349eac701c2bbb3122607916561a6da1cfdfc5dc83f4cc979d6dbf96bcb58d1f9042592b39ceec6193960c9a37975bc0153c5fce4d94f329d47f6d4", "2bb2d72b107f03a0ef0c6760e2e1fd64b8ae4a5be70b75810dfa4cc7182ed519d3613ea5b4243440fc9595b760cee784decb284ff015aa97d8f86dd61fd4f929"}) sendmsg$auto_NBD_CMD_CONNECT(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40080}, 0x20040000) mmap$auto(0x0, 0x8, 0x1000000004, 0x9b72, 0x2, 0x8000) setsockopt$auto(0xffffffffffffffff, 0x10000000084, 0x3, 0x0, 0x3) mlockall$auto(0x7) mlockall$auto(0x6b94) ioctl$auto_USB_RAW_IOCTL_CONFIGURE(0xffffffffffffffff, 0x5509, 0x0) acct$auto(&(0x7f0000000200)='/proc/sys/kernel/sched_deadline_period_max_us\x00') acct$auto(0x0) ioctl$auto(0xc8, 0x6, 0x5d6e859b) madvise$auto(0x0, 0xffffffffffff0001, 0x9) sendmsg$auto_GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x4000804) lstat$auto(0x0, &(0x7f0000000180)={0x4, 0x10, 0x9, 0x63, 0x0, 0x0, 0x0, 0xffff, 0x40000000000f, 0x7, 0x40000402, 0x7ffffffb, 0x9, 0xffffffff80000000, 0x9, 0x7, 0x200000100103}) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x89fc, &(0x7f0000000040)={'bridge0\x00'}) 4m36.014112159s ago: executing program 2 (id=1221): socket$nl_generic(0x10, 0x3, 0x10) socket(0x11, 0x3, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$auto(0x0, &(0x7f0000000040)=@task_fd_query={0x0, 0x4, 0x3, 0x2, 0x8, 0xc, 0xe3, 0x400000000a, 0x3}, 0x6f4) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) init_module$auto(0x0, 0xffff9, &(0x7f0000000140)='/sys/devices/platform/dummy_hcd.6/usb7/power/wakeup_active_count\x00') prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0xdc3) madvise$auto(0x0, 0x8000000000000000, 0x15) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) capget$auto(0x0, 0xfffffffffffffffe) capset$auto(0x0, &(0x7f0000000000)={0x3, 0x7, 0x8}) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x30, 0x80000006, 0x4) r2 = socket(0x10, 0x2, 0x0) statmount$auto(0x0, &(0x7f0000000380)={0x8, 0x1, 0x1ff, 0x7, 0x42, 0x4909b6f8, 0x1ffdf, 0x7, 0x200007, 0x2, 0xa121, 0x3, 0x6, 0x4, 0x10001, 0xa, 0x6, 0x10001, 0x80, 0x100000000, 0x0, 0x7, 0x2100, 0x200, 0x0, 0x83, [0x0, 0x0, 0x0, 0x500ffffffffffd, 0x0, 0x2000, 0x0, 0x1, 0x70624ce7, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffbfff, 0x6, 0x200001, 0x7, 0xffffffffffffffff, 0x3, 0x0, 0x2000000000000000, 0x0, 0x0, 0x400000000005b8, 0xc, 0x3a, 0x0, 0x0, 0x6, 0x0, 0x88e, 0x8000000000008, 0xfffffffffffffffc, 0x9, 0xa38, 0x0, 0x3, 0xfffffffffffffffa, 0x8, 0x9, 0x200], "b8af35e9a84b9ec07904d771c7013fad3c86ca53b2560ebd2a79294cac59571672a420398c8d4c8254005314a6a7f2ba51acffcb26a130d636fd800ebd667c210831df9eeba6035e0400f4d432e403416e79cdb6304e139fd04ac2ccbf018bcc05339c47422a6e1d8f7ef8f9c81b0b5f3fd2ef01704dce8f41"}, 0x1fe, 0xd) sendmsg$auto_OVS_VPORT_CMD_DEL(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r2, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000000)={0x0, 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) madvise$auto(0x0, 0xffffffffffff0005, 0x19) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) mmap$auto(0x200001, 0x200006, 0x10040, 0x40ebd, 0xffffffffffffffff, 0xb00000000000) open(0x0, 0xa22c0, 0x155) 4m20.708339013s ago: executing program 33 (id=1221): socket$nl_generic(0x10, 0x3, 0x10) socket(0x11, 0x3, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$auto(0x0, &(0x7f0000000040)=@task_fd_query={0x0, 0x4, 0x3, 0x2, 0x8, 0xc, 0xe3, 0x400000000a, 0x3}, 0x6f4) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) init_module$auto(0x0, 0xffff9, &(0x7f0000000140)='/sys/devices/platform/dummy_hcd.6/usb7/power/wakeup_active_count\x00') prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0xdc3) madvise$auto(0x0, 0x8000000000000000, 0x15) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) capget$auto(0x0, 0xfffffffffffffffe) capset$auto(0x0, &(0x7f0000000000)={0x3, 0x7, 0x8}) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x30, 0x80000006, 0x4) r2 = socket(0x10, 0x2, 0x0) statmount$auto(0x0, &(0x7f0000000380)={0x8, 0x1, 0x1ff, 0x7, 0x42, 0x4909b6f8, 0x1ffdf, 0x7, 0x200007, 0x2, 0xa121, 0x3, 0x6, 0x4, 0x10001, 0xa, 0x6, 0x10001, 0x80, 0x100000000, 0x0, 0x7, 0x2100, 0x200, 0x0, 0x83, [0x0, 0x0, 0x0, 0x500ffffffffffd, 0x0, 0x2000, 0x0, 0x1, 0x70624ce7, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffbfff, 0x6, 0x200001, 0x7, 0xffffffffffffffff, 0x3, 0x0, 0x2000000000000000, 0x0, 0x0, 0x400000000005b8, 0xc, 0x3a, 0x0, 0x0, 0x6, 0x0, 0x88e, 0x8000000000008, 0xfffffffffffffffc, 0x9, 0xa38, 0x0, 0x3, 0xfffffffffffffffa, 0x8, 0x9, 0x200], "b8af35e9a84b9ec07904d771c7013fad3c86ca53b2560ebd2a79294cac59571672a420398c8d4c8254005314a6a7f2ba51acffcb26a130d636fd800ebd667c210831df9eeba6035e0400f4d432e403416e79cdb6304e139fd04ac2ccbf018bcc05339c47422a6e1d8f7ef8f9c81b0b5f3fd2ef01704dce8f41"}, 0x1fe, 0xd) sendmsg$auto_OVS_VPORT_CMD_DEL(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r2, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000000)={0x0, 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) madvise$auto(0x0, 0xffffffffffff0005, 0x19) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) mmap$auto(0x200001, 0x200006, 0x10040, 0x40ebd, 0xffffffffffffffff, 0xb00000000000) open(0x0, 0xa22c0, 0x155) 59.810308315s ago: executing program 5 (id=2201): r0 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/vrf/strict_mode\x00', 0x484242, 0x0) sendfile$auto(r0, 0x3, 0x0, 0x400000000008) 59.535265361s ago: executing program 5 (id=2204): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) madvise$auto(0x0, 0xffffffffffff0004, 0x19) (async) madvise$auto(0xfffffffffffffffc, 0x200007, 0x8) (async) mremap$auto(0x0, 0x4, 0x4, 0x7, 0x100000000) (async) madvise$auto(0x0, 0x200007, 0x19) (async) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000007c0)='/sys/kernel/mm/ksm/pages_skipped\x00', 0x40c00, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r0, 0x0, 0x0) (async, rerun: 32) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio1\x00', 0x801, 0x0) (rerun: 32) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 64) r1 = clone$auto(0x20003b46, 0x2, 0x0, 0x0, 0x2) (rerun: 64) socket(0x10, 0x3, 0x6) r2 = socket(0x22, 0x2, 0x2) (async) r3 = geteuid() setreuid$auto(r3, 0x0) (async) r4 = getuid() (async, rerun: 32) msgctl$auto(0xfffffff7, 0x9, &(0x7f0000000140)={{0x5, 0xee00, 0xee01, 0x2, 0x5, 0x100, 0x934}, &(0x7f00000000c0)=0x1, &(0x7f0000000100)=0x30, 0xffffffffffffff69, 0x9, 0x5, 0xd2, 0x8000, 0x3, 0x8, 0x8, @raw=0x5f9, @inferred=r1}) (rerun: 32) sendmsg$auto_NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='d$\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002abd7000fedbdf250b000000fb0019801000198004003c8008003600", @ANYRES32=r3, @ANYBLOB="7263385d276bf1c9e0c00607750d586b1bc728752c7b94302247890519b3752ad9f9fcf81fa163e19af022eaff952058e5469551b70aecef1a7e6a18ce2840306662e8c696bbeceaa0a77d298b441151158827d68afd367d4da40f8aea571d0225e7cbbc36d6b8e83560b3eb4e957d946dc58b14cb5b10109969137634d57c3163024faf26d98d41047185dbe4b1d96cf5e0b894d5837fac549a4e6f3c681ca73b35cb36509492cd727ed246bc1a3be0dddbdfaaf0a9b700bff7b5570ee7470a6b586ac069ab54cf307f0133a1e4befa5798d91400ec00ff0200000000000000000000000000010005002400060000004423198053c4ade7b60ddeddb1c08ded5e3ff8668aaa4eaaec30327fec1a536a381b89440a5eb9a2b867c7c18f12d373c6f648d03eb50766d43719878d51c5a95218eed26820b5e16fc55f1ad0f674da2f931ecdea70e64c6d4f3caf90175ed70910f8a3bf819c852eb8013e02ae10f3792563a49dba74fdbc6f0a52836d9a0ba1752e86a38cd945a7664f4d84156d5dd9a55e83c672859331f687ca83e54c6428d161ba3fd4234863eaef43d3d6f23578bbde9d6bf55d1ee5f37dea274dc3b6deb5989ca4036bbbfc1b81c8e06e393d74c26297af3f88eb135e485e8ca77d94022731f0c0e445c714b0f1664aa37a7f7130956e9012831725621a8f7abe09aac71373fa57a7b4de01f7815e5872d4687773077c7f6bdac8b5415641891a7021ae6b2b1108c261ac8e6f6dc97098d73e34334f0e64df2dd5ba3fc9334dbea52b78d258933a16631e63b80aed72b728fc7aa3afe48efb735f8765e294ee45340f790223db99e4d89ce3923b767f9cda7caa7c743100e6ec8e4f0f78074678bb695e95ec8b1ac935092edeb694589c2110367b6f2a7fc32e3c264257723784aa8eb6bfebf3d57d7d71824b75f1e2510d8d948e334981d58f103304926c6d5f1a04878d430674f6f3949b32988c7511a4e0b8049c6358dbd923a3317c35b42e04b7d1e288edac7a9b99fbacc75bd5c07cf9c5652a80a0e7bdd208182276422f5553ec67114d02659602c47afc69ffb727255102493f30a73c46ac747553a5158c0f48544ee727701492c975380c999801b82c1ac495d1726eb57cbeee6efd127d95398bcc285e93540b16f650c1ad2213c086baddeed741c4e57f12219cf5751c8d46280402a93be22a6c664293547b32924f7268ad86e78ec4cc16112791d206129833c07f90ba88a5f517d0071a19eb8260a6662b41212f0a40486644e51d467329254ed84b34a49d01865c2768ab5eda22d48cd663bbcaeac1bffb06084028169d8d31f3ca1d5bbec83442951b7e529329ea32e1c1e8f3af03a6851bf9101d4656e68b40f03120818af37e004a228bdd5d30654f60310dcc9082764b402125a5cb271f6955c32f21bdf75cf64c3464cd0fcb047c4360837bf6416524b6c36d05dbe99fee429c6338622e3c55c2df5201d2aaecfd26b05b27f011d3c4b3162c03df5e0a8579163982666d2539127791eec6cefa5c3be1ab7a6d3086cb7fb6ccdad4fab435958b20c6dc0071790fc9de93004ea4846e8404976bc3a7ccadc49de1fe7a837170e8941c3439df82c068113a45e841255ebd9043e4be4b1ec6bf446354b93aa041a54093c24a35d8fb0d19c017d90adcd3be942b03e31a4a6c9dbbd8dc45b025ba3c57ad7dfd357aa2e2bdd39312be32d9b7acabcd403b880dd6e7b12816754cabf6f1228eb93addb81a2154c1c5100a031e6e47c3e165b584f5b0429d48233acddda390180674589d4eaeb933ff70a03ee4d462254f64c9556738ec5b53d2787236f41fad8eceda365ba3260a784df7c91cc00769de63f184c79624e35b989878c24956d3b76ca9853010f26909dfaa6c37e8429a88e4686867cb7e56d71cfdc1d2e470f46a998582a6dc1edd1d3ae5ddd1d2cd3a5254168f9cd926e84f35cbf48316cd0da4cf4065ae7ccafcc30f54e3de9e10db23a8dd943dfe4ac61110a0b8b3c9a63a357ff841d980cb1e32a711e2068ac0a6e3e72b4e189b60e81bdcb418b6e8009246766ec69f300a4a44f3370d490123c38e24c74da9f5560654914fec625ca1c29e4855a2f95947588e41b76edb00316bf4fd1ffbfe8e4a7a109e5b3ea8bc6fcd1f09ce61e2cfd216291f87f597c8644f130c7d99c6654c4765f23bbe9aa39c9668e47f47a7fa62d68d35936166e5f8c533a9c8eb54a1fa0c95b83e28ea9d4bfae8dead130fa5f35449aaf8ca858fd9d94a03adcbabd5db198972346e9b58a639f77f319ccd35da495b535f5e454edbb1598f5049f0acb7087c0b7d81400a34fb76a817f5e19eabd1d44c5c7b4fab07dee069835791b25c280749896b1c61047e015cba54262bc419c16e4c82642e37d7c001ffae0eb454c6d2673c9c02cc66c1175df7f52cab9caf8d9f4a381c4e54c43a12243363812e85ceb5641fa165355da311e42f5ee43a3e4879f00c7da641600dbd0f14e75dae01922f835caf6fc37ca1cdf92d15bfa52484ec711ad2d4bf53e76a756b1dbaab18c74fd9c44d454561858eae605799f85e0698cbf36a4571ddd1f1f2562f5823784cdae08a528974b2ff1061e30ca863c01d9fbc5c9731612c609d63a2c351423c788478d56d16a7e04da2a0fb7a6409da892ab11942fe7ef59ec0d498d5b9902e1cd3c6965364fc698034c5abec16b62f5573d499424773135f672cde8c068207696dc41fc4a57fbe4a8aefb467831c6607b2b5c0535efc8d6369c5221fa4829b36bf2f1f67d422a1714683a68a2c917100b8440e6fd006b8162dec94ce5394ebe45894cd4fea5bf8947b77d3b02e7df295239943bdb241580680a5222ea9aa4c4fe932a3d623e077df06ffe894b27be0a8a31189e67015a764cc1b12c975a8c10038052703d36606ca5630149b2805f00cfe5d22c57109d4864cdb5855ada04cf055852d500c080f262793ebb077b0b2b90349bb8a84f468b01f0c60715723735e79de641907fe80352fff467296686c5bff7a0f9dd166bbecca3c6660c6ab6fccc5e94bbcdf94e6da1e087c9337901e63af352d7c4b292f1348201a4de7234ce8949cbe378d425bf20d7a3c847f5acbb162374aae9e7ec9c1f7559a89439ca5d93c205119f998f30c94069357faeeddef961d746d42867c31c18f745342350d7c7d3a8518a3cc7d612e23ce327a24693841d3e37956c93c6217d209860d56843b1e8eb5a4c23143b5c1d5cb4ef2c36cba9b6b96d10dfba178dfb40d9ce9794e48e54014564d312c045cc148bd652435614b7122755797a018ee8a9495caadd4a6701dfe88faceace56b7c3a3c8febe8c5e06202d4916c15cd353c7a485e7842e13c60f92a4e019636a94d211f177ba860cf94b139d95ae6ebab9b1d011eaf2fbb35c3c755e333ec499b2b93005925b10797b954912dbd66d7cc7438d5b7afdcf9433987b6f0fe293f752b2dc2b0a741eba4f133f098baa3f955b03e8ec6bcd24f2a37a561567ecc6b62f3cfff931d26d08b55635097ef37b4e12ddc4de7290ab1b52c70d969ab07b0f76d7c8b0a718a8151177ccd8cb72be58d0dafd4b4818dd6fd609889f81514c651cc3a8da2735e36f1dfe214a15094ac7be3f570d08ef92beabad26bf4af6ce7fb863f3a2e5a79068df3afe45d06475af1f0909b5251098df519c10cd1502b1b90c23ac213bd42f83fb4dab1ca53d52d8a8daae3e7dc3ad2f7833826b4084c1ccc1ed12dc43f21e6f3c647693ff5656252bc1797c7d97ce065f798849fdf253d1bc03645070ebb2d185789385eb7ba3825f38040a0a515068dc50960993de38e6bb824b0856969e042ffc40cab58ae484bd59d84e62406bbca090a3bef19f0d2f99b22d5f63218d2ca3ad577c8116b96a7c95496aa03e9ecb9d71243e47dca55bd5dc013dd068cbae6e3a8bc0298bf4fd011ba64ae565a1f1e104e090fe7a93960c9912f2f7f33ef0e480f3707c1d70c1beb567d2a484c9a5743f9dcad945c28b30e3af05ead7d8f495f2814f270e02d7770d9816f3bd7f740130c52b1da67767ebf220ac0bb894b61d99218d60db243ee9a48481897f96087f5599ce20d09960256db9da75397d63d8e55452155802cd0dabbbaa612870626071d949a6cfac2249a797cbbfc3ac752886df01c40f814c7b05601f2dbb42c4b17e083070a9c26b45f2f102c896bf5698f999acdaf0b19cae5018328c84ba6403b29120d418f58966df5b5008e85d64f7b42e495d5049b6d169d408426ee4d96918fb9aab45b06c13bc9adbc5c0a81a50d683f014b5596caf53277c3baffd0f36e9a99ba2bd8347bfdd36b0bf042fe105100e7c3b2e1fee99f5757ec01cf5d27b3a965b6d42d3affebeae99a5118d8f0ba9390cbe4493e558f5c2219695e33bcb93891c0f921d79bf4fbe3f3fabd290ebce0980addc0f4832e94d68b4e9286abfa628a2eead304102827eabb77ceea40690afaec76ba8479f8c6ac2ba07f829110f94af48d3d7cb21015e915201815fad5ec7a9be2c7ebb2b436cccec58a30e014943e40485b89d6027269be34d4f4e025c9aad7dc3827b35f4217ec665b6379a1b64ea319cbd7379b13c5c249af3e6c88a5690873a4e114ad04bc8e7d6feacde700e2c3bb12205ca45ba44f3f5407a41fcaed7065ec80fa427b6a53d2639747ae6e017de4d9c04feea5b8e12c9a42cfb87a45f16874240a1982ba9012ab0c081a8cef00b485db9a0c744e8a04d49a97fd2b7176216ad503538295ec843dd1af02fe780e953a069c16a23a28a523441765763b297f49f2e85658aa394d19db395dc6ef80b31620be145dc356be3ea1ceba316a4b05f6efef66a651320812252e3945b88f499f6d93b3e82559a930c8e1b925ecbad4bbb4ec8b928525ec17582806289d55025945abd4bff6875710eb09722c6a4bf38c4a231e4a8b01b8955be93ac2abb8e0723b7d8ffde96a843d98f1cfe6d7a324459cb2f256b9d84a50d5468a1d40d60235c97c8e2ac0b9c944c1723bd71c22bcd0dad0b2a54e80046c9f1f85a3d2f80c8ba1df2a52a7f3bec8cc27e1493bb188fea4a65071ce812cd2db7ef9cb888781c10a91ffce834815e8fb874afe22c50550f2f1374df87579516a2b26b6d626d1282c10cd013ef2f706e3df1741ffc3632c04fbce8d66f4277617b3b1fe316702b4c4f0bcc1649a7b4c292d3a448aa262b200bf166c4ac5261c6655781fe73e783ff5dada5041a34ae002e0c1ca119dd888f4fcefd5018eb8dded821a4be5e5dbac57a9e86f857fe2162615099f327b15f7dc7340ab4b4419debce66bfc5a551ff79c724b090602cfa3d6c4f434af227265ec33443b288aea06cfa9eb19db65e1a0f8acc8dc6bd9f15f4aab3304b8239eeee77eb25af88543f925d6077a18657e46a6dc421b648354f84cc5e8307aae30343f0122413f0e4e21416ede2fec547c603540b9163418306b3f642363d3fc2c62d5b895bb5d00b700b5e2872cc2ded725ac974ddc9c37c980f68af613273b1251226f8b375410568f4e924d19bfe49d247bf3a1876f938f6a45d02df7f099db26bede7276517646885444ba2a453e273d4d0c3364f64e99c0b36380ea9609a94d43495c703dc6e11c8f04de39d8a7d7de240b9f2afda7b2fdf452f85675652ecd94ad0192a8d399bd4f83dbf920e69135b5f0d103020a83bbad7617d548604b0ee702199d3b0f14f5d10f0aacc3f9c1e0f99f1c6a95d2bbb2e789ced7d3b021968d833f4d0158f1498851d3d159ba7ce499bc3da9e150952f02970372c50bf1c869c527ce1d1d19afe2868894e95b216cb2cffe0bacc34ce7131154b6d3119a1913289673ef7e6806b1c9816339d631f5de63e3557426457973f1baa44e7faeb1f65e3c9c5ca0a3689f7b2dc80c34c7b4314cc1332a13d822b72fdb88ca47e241cacc656f099b666be83f9bb67e715ae6b8beadf6be675e410f9f43dcef4a8e1a2f85592bd9709f03ecd91a56106831d65e104a9b6235ccc4fba746defd3cd4dbd9f398061e251dcab0a55029bd771af3be506e652d2420c3ea8ac8659b829891f5cb5d1bc82826e9102696ff13c1a041e9c1535a4086ef17d592d91c499c81b6dde9751df94db0a83402d4400003800400f78008001100080000001400c600fe8000000000000000000000000000aa08009400", @ANYRES32=r1, @ANYBLOB="04002a800800a900ffffffff08002d00", @ANYRES32=r4, @ANYBLOB="9000c6801400cf00ff010000000000000000000000000001040014806500b000f563a2f0968de2ed429223ba5445e9479fabb8c51a5649c105c29a6150cf7b7a0799ad8f639ade9d41c3989ed9d130c7c0db73ac7507a4b40da4c3bfe59d2830546a62e9d94d90102d08bc0fe38a4632902021a37f1bb4ccb2c4207aa6c17d13730000000c00b300010000000000000066026c8004005e8054530a3ce6e291ff7f827f31783cbaadbc61a0fa5148b1a55fd6fee03d4b3f160428065b3e29660485b628f302bc5ed6b13b9f2c70e7220252ed31defb952f1bb50797be38607b77b51c950398a91bd5b45f3ac58d60482be54b32d97760bb4019f7d217ef40b86f506fdc45e3a0b39382a3ee303cefda05de3c1a856a796699ee19be96060b8f11bbabf97659d7eba1040056807c002c00a235941bb21e7f56977e27852739b4bc144b81a35732deef6bf7540ac40a65d5b368e621953a936df4d5e294c5ece69f276192c9ee98fc54995a833198e375fa4b4c5615c134df3b4195a636c0b9298d4863a02693846f9a32a645a692ba5ac7035f2c579e5f54deace3ae94912cfdb824d99bcc1bb32f19fa7db47a1493ae3cb68ab609c9f5ebc95689f8f58b0297a55b14383d3b299b5bc2fc9096b0b516e288d0e4eae2d8847f28d45233edd3f1c4a64912e0dbf5d08ea9f047561567e78b0a2696451b44b2f5a2f29d3e89f6b40afd1444515e7fa750a73e5571b145e74ac0079f1390386e2ff73918be632236de5f8d3e2f085eeae89f6c12a9fbafd3f5bd5fb000cd71bdaaa5e88445a546c6874e1ea411891efb8e4ed853e0513d6bc76d90a4004900aa78444f8ed8573b758d4d8a073de8e86755644fe8cbcf13621cdf284610d8e88d1aae5f0db06c085681a96d2e3132fd7045ea536a0dc262fab0087c94a857148c3414ad43df24de74cfb535ac196cf08b60ed9659f096b795a006384ff5aa0cc42e7f2c2dddcbbfa5625c8d88f1c4830778e03b0ca43e15a7ce9b52398b29d3736fc80bcc192538f51fbf67102754d4b21f4c2d7e53067380d54718404e501d00007682dc5ca77754667df97068d3c680f18af08e72a99142a290417d79dbbca6ab4f71cfaa6eef345366bae0f934419d69cdeb4a31ca525edcd52734b1fe78a7d3e561fe621538f321eb2a673ae2a148ffba5bea6953b690fbd6a7e42d067f858a83beb844b2ae639a20d11c3b2fdf73ad28122807526fba74b4fa417b0600b997051cf8a0e9466d0340382eb6a42f948e7dbb5e29437cb3a1c778c942d504176cbeba6e5247103e35226fa71a37b507733abc9cd4d37affba79f8e9eaf34b1ae92e837c339a41012286635e686e7271f5651c861ad15565aa9afc50d53e4a83bc3a89f6193cea562b11ce1de979fdd3cc874bbc1f3500f0a1ced27b472276e1ce6e804196f4c864b102325cbd812af5b43740d965559d0357fd225484a11101a98ce6b28b034041f8b972c94d5ec69f7f30ce9aa3fca1dd08442a602a0c151d93395c953b782067c5c461315b474494eb85db04f00053c2ead6f5277c7e33ffc7a70a0229bec567d5e32067ebcc1a0fbef9b3b5f25c701185d1ff31aa795ee8d29810b19519fb6a6948aab8a02c06ce2b55b0c1e1242eebb3cac7874d5ab5b8b3890c0a367d23cdf10c8fe559aea2f2ce19735a610ae8bab77a72fd7f71732a95c0c5c3d9bcbce2541fc9e1b5ba06ad36c856c98c0c82cf1cd1e5700fd477c8f39ed34ab74ccec5aa94ee675d98a14533c4b61d9e7151778b3fbf11fd0e5771a281bcf8d58b268b508e642c6bded90b81d5a6cf3741018c93302f5f398940cf5810c4c8ca2ad8a47b38392ef8c3b6b9d045df1f3db5d6b3b0c1c43fe37296bcbe3e97dfc1f8d154fc5472a9b4308095f2da529de38c96755d6bf72c538706900a6e6238ab6854b93fe3475efb43fe2589b7367dacba0167f816609a43a873c55f2fc85d24e191c37840b1f966eb17c7b6bee3427ce777d740907d5bb619d3d9b48c5312d7191850d6dd320169eea3b5720e74755ded0d1fa498f1bcecd8332d758dd2b80c106e83da8897ad2d5fe52153a7e9cc15487731974f6145e7b6739eb353c1f7b3d279860f54009c153e690546affcfd8e34006f8d225d303d62af0e04ee320864aeaf869afae6d949b215caab5f1e90cc508be10549784e1fb7f8c2390451d96a79422413f68f97ceabfb36357496df991f8f823f78880f6d434673f3593cf95c280b02c57fdeadb8e04662430afbb614c2e87222cfcfbacc2a114e03721ce892acf0477890c7b5ae7d7dbac84b47c78d496cacb76137ccff0c45a8b1706ac280ecfcf9206ae0aef90948f2f52dc96c5ac6be9908a3a1db057b08aa0112531eba9d4e3d9ba1c2d8a3fbadbf5f8f9044132adb0226cc05af809ded6a5d7d119d342255e302c500dc8906e8f2262842c4147d22f454daba41278b47b7b963597ee611b3e07941080271ee849ff36315a21ce1be2c51d7dc4df6cbf71c8f52b9337ab202f17c1c07b7dfdf547e28774894134d6966010cf8664bbcddaa8a7123f74d8832e000cf2b2e0826642f8b90cedee5ed485ef5f9679e6c4573efd509bf4d2b68e539172de0e6a80f897a37a976da6aad9f97418491dcbc0f52e9e4ff03d0423b4e380186fb3b98a6369224aa42542a93398378a7f0003eef4dd5ca8d1412f266eee8e4f090308fb6c515ee918fa87757a0adbae5a9c42090c506318d0d8b642c1abbee7b4c560c8511fb8553b037ab5113aca892ce1560a98cb82ec1c73cad68e41be56e2a00f27fc2772293fabd58358a4dfa625f4385fccb4721ef8667a5a6419a3505d3202c3e53fd769ca5d5655ee9f371f69dbe1b45c8382b4776ecbc3432940a84d8463b9a81692a03c8172088d1a68a6dd9f38f130cca0bfa2f55a581d043ef98ba25c531de3051733d3840c4b9c92f621412e47cc418824d8781b15e7458b3f5957dddd54ab99ed1064d822cd8735c755d1d48571d8d686ab2db891a333991275eda8ed1dafe480290cf20cd1c548179d51bf291696f967583adcd6cb84c7a083fbeac3a25834a616dae3281e92d606cfffd74d629b96e2a8bebd18359652c999361a467f209112c44224e4c9f3d8abd3519801dd4146ea13c42e39b998b3d70487c93dd6354037589558619149b7c1d3a2a0d372874e78d557baa542fabb7db10594dcdefc174eb5be12d6440493dd6e1d89b35e95410c9bb6073b49c849434cf40bac80427c8bc8b8917983759610f3359e42904dfe73ca1fd3a756cd36b8a4a62fa770533f34ebf44d2c776241da9d9e1b00ce99894abf2244af3a5330b38648601691cb87b97f0a362708bc52f90438c49d4f1da0c580581ff841d5490642c3dfd9dd64505b1fec529f3803546898daa976b7b656f6bfadd5753ae1d23aca7de4157c0f4006554689a16cbad45e1a7ab042029fa8c09af981618bb005a4152a70dfd506163e505f598701b9beabd754f71f651d70914fd865d9d85a0c386f9cdbfb6b0f8beb0f666d51d1f11332d71866ce1b32ee217887bbb7401f88b0d4ec9e0d34d17067735cdd34a01e991619f31e913d4204f8277c00d481f2ec58a2ced5ead306ea8c00067b186604417624a2fe9468133e890f938f2fbb31cc78b1026d8a7a02772e2fafa32c4c26736cbcecf5ec5bf262279b665ea1362ab2af1c90620040a5f353a80578233e71729a9f680cbc9a247fff184add89405954a08d67f26ca3e1cded56f250ad12ba8c26958bc500a67e2403406a347f9376fce00ae53dc759bcdd9aca43aa2111dde7f38bf8c5b066f424287e606c70e6e7fa3da5e84804ed9c7cc935731c5ee8b1775b85f9bff2a8bb9cb15c18f0fccaaacc2499704204cf59ada99e31e547af1071a99a1eb5f2826476e425ec3d38d69991a72ec1dc09264fd8f4fc5bafca4a162658b0bc29f0a8cbc41916206512db02e8324c34499dc1ce64c93a4c60dac85aaecfaa4ad0b32c29f10e402e4024a119eb55fdfde0d4d9b84a971e57f520697303a01b61d5e011c88b4c85ea44e61707a4247251b9d4e8734127e5ae4c92b5d9f820bca653c09581a29f09af40b1eb87c4bf9e9b149d0f06a048b7b9b450fed66a47e61baa92ba9265880d2a99b76a497330ccc5233553d5b30ff79d86bbd1e5519a7e25f5fc50d2f78cbd1ef2e47442916e4bfc1f577bfeada322b487652d49d0fe766a7597129e61fd21556b6e3431c7ca2f55c38d670906acadbea829002f13650f32e6f9cb16405d4773b71029715b4c177e3421f1d26acc3abf8d99e3baf7bc11df03de98df1073ee8dcd2b8a5fca3b73218c0f06bf0a24787fb776cc89bebf973353beab425fa4a190263934c4931e5c86364bb2b804f064bd802225c45cb26e64bbfc07c7d9c31eda1f353ff223e88cb96f0ab1822ffea9531ef504b01dbe2790e2f716ed6b68a3e682ce959222aaef928136d7701da2a584c7a6b63d0de9628d3f7ca03d9fbfdc46d96f92cb5f1b5a53a614a521c08537a046e5ddedb6201dc2b18f37b60d5e66464eccd694846e3ae02646a254269f9225422155f6ed20d648a8a97bfbfdc5edf03dd7be81fa6e5668d72988d07bc8ff71f27e18b0586d45e4566a0b8b0c5706d23e3baffd0f2e5a4d0a40b6a8b11aa0f1a4d8fe0174e744ed2eab2625fae92c97307471edf89d9469d3f17b159855e70adca5ed01bb5025332424ba9370663d797c822198be483fd948130848ebfde686e7c549a66e2d3d0278c8a0399c3adc91e666bbc76b7b843a7de24bd0ccd61ece94695b664ae494a6ba17d685ab462f1e65ea07ece259f2713eb4b57bb695a504b14b294451ccf5c045bd50c87e5dd0e5b978c0a1930be743521924eac4ae07d17742d2a66b7a7d2033b7dd207e466f8c966dfd82023871d7979a0278ede2fca2e8f496deb541049ea0bbd844e3304ed2d73db91ab67bcbead5a7b02c34a57f92513cbe18d9d08a00fb81cbee6878e399396cc78be125227929aa4fbe9b03e49d9e0020f1978d4450395b13be256e2993d6291b8f6fb0d354349a99c3d92dadb3fc5dce52dc7f0819f0f68fdd12c9ab426910e7a4cbdab5f8b08b3db1301e14d5a27ca134fdcd8b26d3133948a63371ad97014694e2859b61347aab1af5c6ea6a3bda21b3837d5a880916b16c44bb53dbfa2eb925a1ce1610b5b0d6d0aa13b5d6853273b6ac799d462fe9f715205835cb3de61fbc52be532c0c086565b8e31b5117df3d1d63f160a33f69e10eade3782706a735068ef823ec3af54a0d1f27998e719b1e0b4039d964debe877dd181c98f717e96b989a4d385c5783be5f788b506799d7ab7041908fb5775e54fdc10fc5901e3f80d342424202590b38c7390193a7f174a8dbc0ef7d3f851604d0d014a335a64a4a55fc26d6a96ebaf4a5dc7936bc53c1008b036097c0db0868799b71deb8bbadfb8c132e7ef4389c6fb96023b9dc081c1400211cf0c62cc063a0846f043114279b053480a856789bbfa53573516769512bb8c3772ca0c5a90a604225e1aeebdb82a4127e72e79843c59b23bb63081d7206475d6f13a4560544736d78d2268b6cb21fedc52e5593822d30316df1d90879c8de98fb0cbf4ac31f1909574f1b7c3a6a888e83bee858b4aadd4cca21c80621d7feb23aede04017ae5434e360f787988006532ab0819843a3e1386968acaaab2f8867f6529431630aa43c87e6e8f3a3f0db2fb5c6b147c50b9fde3e2639be49a6387b14467e802c121d2d31caf986c994cc63de68f7e0aca5e3009a43327e13359f654511e266f20928aac9a7a997e56c6747c10df23bddccb3d19597f1849c3b9994b33e3610f683f74899b74fa980db265348ae8b6b27a913dfcd48e533234013da79843e08b47d1688cfb1b3f9224827c5f8ba764a62e69c3a1d65a78bd1094995931d81509614f136d8e1f41798bfc4f2bcfb1c5731194554bbd2f9f09fbc8ef8a0325f89280d91674b4762ed71c8f1384e0f536afc727b88b0fb0dbe9772a25d360350536e79f5938a89c4b3987bf4e0134549edad224f8f914cb41ec202489f278dae200a95a964941c470da6705a6e9ab6121a87bf99d5f29864dbc57a2ff239e9bc4f58b0e9d660af91ac0eb195babad7f5d220fe0497c519e4ab677d9869f92b54df5789be0098925a1ceaaccfec9ea16965255282b4fb3140814356adf7d77785518fda8dc29625b63005707ddbd7b6974249bebcf8db41a8c3515b9c16d18834a26ff879288202ee2f7e783c3ab023f2f9fd5a5a8fbf8b0474f9ad4c875db8967fb2dc820e18d62155875d1c771488561ebf4f7414efb4ea112b99e0e1e38327ddbbd29db459ede6218ca4f00ea0f6abfa48cd4204b9b3b0b3182a8b6864efd5fd745cb4a16a5ee6e8403c8420d01e9c93180a9cb0f692a736bae0d864f3b89b4e31218fc862b8d721d0e2f00dce7d20314e3bc617566d24c1d58409567b5901d539a0c9f1250e159f454d08b3b1214170f935fcb3f828b5b3840d64cfa89a180d817532e8f7bda07c2c6ed0c31a7bc4978338c12768443c064b7313c63f32d3cc70c98f0a9ae325e4711f8563bd88bf4b5c2fb8cce9d0e4ffd63dec92215536c45466ebeec3d5c871581ebf7b7ec868e04753f8146bb58102651dde824b9389e402250423366923eae061f40d9550f4734b65ad17a5095abd9020f1d0b54a984da1b7980ecb3f5e6aed52ed288f6fee4f86cfb16bfd3f210a619f7e6a92deff5f785e5611b56cadd2fc40ef8423da3937e41097d20711eab7f18ad2183e526e32a709407492ebaa40f57fd2955f1010cc6776754b9b5ca976dd5fda90402d06483fe0a21208003600", @ANYRES32=r5, @ANYBLOB="08002c8100000000"], 0x2464}}, 0x404c004) (async) socket(0x2b, 0x1, 0x1) unshare$auto(0x40000080) (async) io_uring_setup$auto(0x1, 0x0) (async) futex$auto(0x0, 0x6, 0x8, 0x0, 0x0, 0x80000001) socket$nl_generic(0x10, 0x3, 0x10) set_mempolicy$auto(0x1, &(0x7f0000000000)=0xdfaf, 0x5) (async, rerun: 32) syz_genetlink_get_family_id$auto_ethtool(&(0x7f00000007c0), 0xffffffffffffffff) (rerun: 32) 57.751605867s ago: executing program 5 (id=2212): mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/mm/ksm/advisor_mode\x00', 0xa0340, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r0, &(0x7f0000001140)=""/4093, 0xffd) read$auto(r0, 0x0, 0xfffffffffffffffe) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) madvise$auto(0x0, 0x3, 0x15) setresuid$auto(0x0, 0x1, 0x0) mlockall$auto(0x3) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/user\x00') ioctl$auto(r1, 0xb704, 0x6) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x80002, 0x73) socket(0xa, 0x1, 0xfffffff4) sendmsg$auto_NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x404c0c0}, 0x80) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) mmap$auto(0x0, 0x2005, 0x6, 0x400000040ebe, 0x401, 0x2) io_uring_setup$auto(0x6, 0x0) remap_file_pages$auto(0x0, 0xf3a4, 0x0, 0x5, 0x15) r2 = openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/input/event2\x00', 0x80, 0x0) ioctl$auto_evdev_fops_evdev(r2, 0x8000450a, 0x0) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000080), r3) r4 = getpid() recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x4, 0x0, 0x9a6, 0x6) pidfd_open$auto(r4, 0x0) write$auto(0x3, 0x0, 0xfffffdef) 48.179191062s ago: executing program 5 (id=2240): close_range$auto(0x2, 0x8, 0x0) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/midiC2D3\x00', 0x181841, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) socketpair$auto(0x1e, 0x1, 0x0, 0x0) r1 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/pts/ptmx\x00', 0x0, 0x0) ioctl$auto_TIOCSETD2(r1, 0x5423, 0x0) openat$auto_ipsec_dbg_fops_ipsec(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/netdevsim/netdevsim5/ports/0/ipsec\x00', 0x101400, 0x0) close_range$auto(r0, 0x8, 0x7f) 39.432283608s ago: executing program 5 (id=2270): mmap$auto(0x0, 0x4, 0xdf, 0x9b72, 0x2, 0x0) r0 = openat$auto_hsr_node_table_fops_(0xffffffffffffff9c, &(0x7f00000001c0), 0x80, 0x0) connect$auto(r0, &(0x7f0000000200)=@qipcrtr={0x2a, 0x4}, 0x0) close_range$auto(0x2, 0x8, 0x0) close_range$auto(0x2, r0, 0x0) r1 = socket(0x10, 0x3, 0x86) r2 = socket(0x10, 0x2, 0xc) socket(0xa, 0x2, 0x0) socket(0x10, 0x2, 0xc) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1], 0x14}, 0x1, 0x0, 0x0, 0x801}, 0x40840) socket(0x2, 0x6, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)=ANY=[], 0x18}, 0x1, 0x0, 0x0, 0x60008004}, 0x24044081) mprotect$auto(0x1ffff003, 0x8000000000000001, 0x809) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r3 = socket(0xa, 0x3, 0x6) socket(0x10, 0x2, 0x0) recvfrom$auto(0x3, 0x0, 0x800000000e, 0xfffff4a4, 0x0, 0xfffffffffffffffd) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000001d00), r4) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'wlan1\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_RINGS_SET(r4, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000000380)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="010027bd7000fddbdf25100000000c00018008000100", @ANYRES32=r7, @ANYBLOB="0800080002000000"], 0x28}, 0x1, 0x0, 0x0, 0x90}, 0xc0040) epoll_wait$auto(r3, &(0x7f0000000140)={0x9, 0x2000000000000}, 0x9, 0x7) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x3ff, 0x8000) socket(0xa, 0x5, 0x0) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000021}, 0x8004) connect$auto(0x3, &(0x7f0000000140), 0x55) io_uring_setup$auto(0x1, 0x0) 33.008091915s ago: executing program 5 (id=2295): unshare$auto(0x40000080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f00000007c0), 0xffffffffffffffff) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/system/memory/memory7/online\x00', 0xc3100, 0x0) mprotect$auto(0x1ffff000, 0x8000000000000001, 0xd) r2 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv6/conf/dummy0/addr_gen_mode\x00', 0x1, 0x0) write$auto(r2, &(0x7f0000001680)='\v\x90\xd1\xda\xbc>1\x8ag\x14\x18\xbe\xdc\x00', 0x1) r3 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), r0) ioctl$auto_KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x2, 0x801, 0x106) openat$auto_cachefiles_daemon_fops_internal(0xffffffffffffff9c, &(0x7f0000000000), 0x402, 0x0) statmount$auto(0x0, &(0x7f0000000180)={0xa, 0x1, 0x1fd, 0x7, 0x5, 0x7184, 0x1ffde, 0x7, 0x3, 0x9, 0x9, 0x8, 0x4, 0x200000000001, 0xb4, 0xfffffffffffffff8, 0x8, 0x6, 0x4000080, 0x0, 0x100, 0xe, 0x22000, 0x200, 0x0, 0x84, [0x3, 0x3, 0x0, 0x2, 0x3, 0x2000, 0x0, 0xc, 0x70624ce7, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x8, 0x1000000000000000, 0x6, 0x0, 0xfffffffffffbfffd, 0x2000000000000004, 0x10000000000001, 0x10000000000, 0xffffffffffffffff, 0x4, 0xfffffffffffffe00, 0x0, 0x8, 0x1005, 0x400000000005b8, 0xffff, 0x0, 0x100, 0x0, 0x1, 0x2, 0x88e, 0x40, 0xfffffffffffffffc, 0x8, 0xa3c, 0x0, 0x3, 0x3ff, 0x2, 0x8, 0x7, 0xc567]}, 0x1fe, 0x4000d) poll$auto(&(0x7f0000000000)={0xffffffffffffffff, 0x6, 0x5}, 0x81, 0x4) mprotect$auto(0x1ffff000, 0x8000000000000001, 0x4) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) getpgid(0x0) socket(0x28, 0x1, 0x0) setsockopt$auto(0x1, 0x1, 0x12, &(0x7f0000000040)='\x00\x89e\xad\x97\xc5\xe8\x91g\xc1\xceE\xea=\x0f\xf4\xba4\x05>y/21\xfd\'\xc7\x1c\xaeV`\xc7^\x05\"H\xb8\x12\x99\x1fF\xdc\xc4\x02FV\x04D&9?\xa8d\xc97B\x9f)\xc6\xbb\x15_\xfd\xa5\xaf\xf8\xb8\x8a\x186\xa9\x0eY;\x9a\xe32T\xddn\xa6zK\xef\xf7\x04\x81\xb4\xb7;\x12\x1ch$\xbd\xd1x\x15\xa8\x9c\xba\x83\xa7\xbdwf8\xc03z|\xcd\xbc\xa1+8\xcet\x960\a\x80\x88!\x9e\x96\xcd\xb5oB\xc1L\xb2\xb1\xe6\xf9\x92\xd4\xcd\v0|G\xb7\xc3+\xb5\xa9\xb4\x05>ry\xa1\xf1)#\xc0\x8d(', 0xbb) sendmsg$auto_NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f00000000c0)={0x3b8, r3, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x6}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x6b}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, 0x3}, @NL80211_ATTR_IE_ASSOC_RESP={0x383, 0x80, "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"}]}, 0x3b8}, 0x1, 0x0, 0x0, 0x40049}, 0x24040082) sendmsg$auto_ETHTOOL_MSG_TUNNEL_INFO_GET(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000f00)={0x14, r1, 0x705, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x880) 17.036906436s ago: executing program 34 (id=2295): unshare$auto(0x40000080) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f00000007c0), 0xffffffffffffffff) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/system/memory/memory7/online\x00', 0xc3100, 0x0) mprotect$auto(0x1ffff000, 0x8000000000000001, 0xd) r2 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv6/conf/dummy0/addr_gen_mode\x00', 0x1, 0x0) write$auto(r2, &(0x7f0000001680)='\v\x90\xd1\xda\xbc>1\x8ag\x14\x18\xbe\xdc\x00', 0x1) r3 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), r0) ioctl$auto_KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socket(0x2, 0x801, 0x106) openat$auto_cachefiles_daemon_fops_internal(0xffffffffffffff9c, &(0x7f0000000000), 0x402, 0x0) statmount$auto(0x0, &(0x7f0000000180)={0xa, 0x1, 0x1fd, 0x7, 0x5, 0x7184, 0x1ffde, 0x7, 0x3, 0x9, 0x9, 0x8, 0x4, 0x200000000001, 0xb4, 0xfffffffffffffff8, 0x8, 0x6, 0x4000080, 0x0, 0x100, 0xe, 0x22000, 0x200, 0x0, 0x84, [0x3, 0x3, 0x0, 0x2, 0x3, 0x2000, 0x0, 0xc, 0x70624ce7, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x8, 0x1000000000000000, 0x6, 0x0, 0xfffffffffffbfffd, 0x2000000000000004, 0x10000000000001, 0x10000000000, 0xffffffffffffffff, 0x4, 0xfffffffffffffe00, 0x0, 0x8, 0x1005, 0x400000000005b8, 0xffff, 0x0, 0x100, 0x0, 0x1, 0x2, 0x88e, 0x40, 0xfffffffffffffffc, 0x8, 0xa3c, 0x0, 0x3, 0x3ff, 0x2, 0x8, 0x7, 0xc567]}, 0x1fe, 0x4000d) poll$auto(&(0x7f0000000000)={0xffffffffffffffff, 0x6, 0x5}, 0x81, 0x4) mprotect$auto(0x1ffff000, 0x8000000000000001, 0x4) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) getpgid(0x0) socket(0x28, 0x1, 0x0) setsockopt$auto(0x1, 0x1, 0x12, &(0x7f0000000040)='\x00\x89e\xad\x97\xc5\xe8\x91g\xc1\xceE\xea=\x0f\xf4\xba4\x05>y/21\xfd\'\xc7\x1c\xaeV`\xc7^\x05\"H\xb8\x12\x99\x1fF\xdc\xc4\x02FV\x04D&9?\xa8d\xc97B\x9f)\xc6\xbb\x15_\xfd\xa5\xaf\xf8\xb8\x8a\x186\xa9\x0eY;\x9a\xe32T\xddn\xa6zK\xef\xf7\x04\x81\xb4\xb7;\x12\x1ch$\xbd\xd1x\x15\xa8\x9c\xba\x83\xa7\xbdwf8\xc03z|\xcd\xbc\xa1+8\xcet\x960\a\x80\x88!\x9e\x96\xcd\xb5oB\xc1L\xb2\xb1\xe6\xf9\x92\xd4\xcd\v0|G\xb7\xc3+\xb5\xa9\xb4\x05>ry\xa1\xf1)#\xc0\x8d(', 0xbb) sendmsg$auto_NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000480)={&(0x7f00000000c0)={0x3b8, r3, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@NL80211_ATTR_BANDS={0x8, 0xef, 0x6}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x6b}, @NL80211_ATTR_BEACON_INTERVAL={0x8, 0xc, 0x3}, @NL80211_ATTR_IE_ASSOC_RESP={0x383, 0x80, "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"}]}, 0x3b8}, 0x1, 0x0, 0x0, 0x40049}, 0x24040082) sendmsg$auto_ETHTOOL_MSG_TUNNEL_INFO_GET(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f0000000f00)={0x14, r1, 0x705, 0x70bd25, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x880) 9.620310453s ago: executing program 3 (id=2345): move_pages$auto(0x1, 0xf54, 0x0, 0x0, 0x0, 0x8000000000000000) socket(0x1, 0x801, 0x0) connect$auto(0x3, &(0x7f00000000c0), 0x55) recvmmsg$auto(0x3, 0x0, 0x10000, 0x6, 0x0) connect$auto(0x3, &(0x7f0000000140), 0x55) socket(0x11, 0x3, 0x9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$auto(0x0, &(0x7f0000000040)=@task_fd_query={0x0, 0x4, 0x3, 0x2, 0x8, 0xc, 0xe3, 0x400000000a, 0x3}, 0x6f4) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000440)='/sys/devices/virtual/net/bond0/queues/tx-6/traffic_class\x00', 0xe0a00, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) init_module$auto(0x0, 0xffff9, &(0x7f0000000140)='/sys/devices/platform/dummy_hcd.6/usb7/power/wakeup_active_count\x00') prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0xdc3) madvise$auto(0x0, 0x8000000000000000, 0x15) madvise$auto(0x0, 0x2000000080000001, 0x3) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) capget$auto(0x0, 0xfffffffffffffffe) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f00000005c0), r1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'gretap0\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_STRSET_GET(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000080)={0x28, r2, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_STRSET_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_PHY_INDEX={0x8, 0x4, 0x7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000004}, 0x10) capset$auto(0x0, &(0x7f0000000000)={0x3, 0x7, 0x8}) move_mount$auto(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x91e4) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x30, 0x80000006, 0x4) socket(0x10, 0x2, 0x0) statmount$auto(0x0, &(0x7f0000000380)={0x8, 0x1, 0x1ff, 0x7, 0x42, 0x4909b6f8, 0x1ffdf, 0x7, 0x200007, 0x2, 0xa121, 0x3, 0x6, 0x4, 0x10001, 0xa, 0x6, 0x10001, 0x80, 0x100000000, 0x0, 0x7, 0x2100, 0x200, 0x0, 0x83, [0x0, 0x0, 0x0, 0x500ffffffffffd, 0x0, 0x2000, 0x0, 0x1, 0x70624ce7, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffbfff, 0x6, 0x200001, 0x7, 0xffffffffffffffff, 0x3, 0x0, 0x2000000000000000, 0x0, 0x0, 0x400000000005b8, 0xc, 0x3a, 0x40000000, 0x0, 0x80000000000006, 0x0, 0x88e, 0x8000000000008, 0xfffffffffffffffc, 0x9, 0xa38, 0x0, 0x3, 0xfffffffffffffffa, 0x10000008, 0x9, 0x200], "b8af35e9a84b9ec07904d771c7013fad3c86ca53b2560ebd2a79294cac59571672a420398c8d4c8254005314a6a7f2ba51acffcb26a130d636fd800ebd667c210831df9eeba6035e0400f4d432e403416e79cdb6304e139fd04ac2ccbf018bcc05339c47422a6e1d8f7ef8f9c81b0b5f3fd2ef01704dce8f41"}, 0x1fe, 0xd) sendmsg$auto_OVS_VPORT_CMD_DEL(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x8000) 7.817969833s ago: executing program 3 (id=2352): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000e40)='/sys/devices/pci0000:00/0000:00:01.3/config\x00', 0x2, 0x0) write$auto_kernfs_file_fops_kernfs_internal(r0, &(0x7f0000000040), 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x7, 0x800008000) write$auto(0x3, 0x0, 0xfffffdef) 7.366211633s ago: executing program 3 (id=2354): mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) mmap$auto(0x10000000, 0x8, 0x1000000004, 0x9b72, 0x2, 0x8000) msgctl$auto(0x0, 0x3, 0x0) r0 = socket(0x11, 0x80003, 0x300) sendmmsg$auto(r0, &(0x7f0000000940)={{&(0x7f00000006c0)="e524abc67e1a0a6fa889c3411f1ef83faa9ec567db4dbe9a4eb3e36febcde130c5a9767bc3c1da4345349edde43beddd0c900bb5c7ccac6ab6ddd3babeeb0c1c0dc55bbd55463cc1326d2017968f2d3d280e8fe962716e3f9a575a65624134a7a9af7378e31452c3aee42bf71bace88f6728b256dfc9df9483ec39c4e84fb725915a87660ce3b13fe31b1a47a23f7016b5a8d98097a5f8805c91ec6af58081afd7df7e901a9540cc813fc1d94bcd8e620fae6d30e1ce8d89c0a811b78fef113cbf63b39651deb8a54f04dca2be9caa680cfc5657725e83f560b0307962201640ed85725de9bc6f8ec216966d62ef12517db0242610bcd6", 0x0, &(0x7f00000008c0)={&(0x7f00000007c0)="3b4f8c5df0f4aab009357ddb9431f5e9c113681f37330bb6255285b48673000b4057028010aa2c65657846cc113429051f8af79c7dfe36271bc53b62013829d01c7f516662580bf9554abfec61e7512958762fea50b01600d46bc5183cef0a33a502c599f9a2262574c6483828baf53fd0b53fca841686436b77590bafcf4a343ee92cc87f22e7be76a3ebb3aa78584341e372f8d89f6faa768b43c3e29bd07f24b5578050bb0c6ff3b56eeccbd7769ac496a2316bd695ed74238a540f4b725b9cafe9a9", 0x100000001}, 0xffffffffffffffff, &(0x7f0000000900)="68cc3d9c11bb65513f1c2143f2ec176a", 0x4, 0xef}, 0x1e2}, 0x3d7, 0xd2a7) setsockopt$auto(r0, 0x107, 0x12, 0x0, 0x4) syz_genetlink_get_family_id$auto_ovs_flow(0x0, 0xffffffffffffffff) r1 = fsopen$auto(&(0x7f00000000c0)='\'\\^@\x00', 0x1) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)={0xb8, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_MAC_MASK={0xa2, 0xd7, "a32f19b4ab2784d72e87555ac5a0cccc08f4970f67c670b370f38abee09e513963c6c54c60a7c7542e40b49ea2d8763b75c9fa34125bde6d811a43e7cb52ed457b58335708154e71278e0d4ddafa188164343c95a9aba3c2909f76ec500419a74a3202bf013a3f7f855641ae5e6ac9dde01764287b174890298af0ee0b3019af1b5bc43f60e0906c4eeb5c4fa7c4492233e69359b7f8f640216a666d8500"}]}, 0xb8}, 0x1, 0x0, 0x0, 0x2000c041}, 0x88055) socket$nl_generic(0x10, 0x3, 0x10) prctl$auto(0x44, 0x100000000, 0x4e6, 0xfffffffffffffffd, 0x902) syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000000080), 0xffffffffffffffff) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0x9, 0x3, 0x12, 0x940, 0x1fee0, 0x3, 0x6, 0x80000002, 0x9, 0x80000005, 0x2, 0x7, 0xb0, 0x9, 0x5, 0x3, 0x5, 0x7, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff]}, 0x1fe, 0x82) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="11002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r2 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x1ac}}, 0x40000) sendmmsg$auto(r2, &(0x7f0000000200)={{0x0, 0x2000000, &(0x7f0000000100)={&(0x7f0000000080), 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) 6.905143592s ago: executing program 3 (id=2357): mmap$auto(0x0, 0x5, 0x4000000000df, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) socket(0xa, 0x2, 0x3a) mmap$auto(0x0, 0x20009, 0xe, 0xeb1, 0x403, 0x8000) move_pages$auto(0x1, 0xf54, 0x0, 0x0, 0x0, 0x8000000000000000) setsockopt$auto(0x3, 0x1, 0x2e, 0x0, 0x9) bpf$auto(0x0, &(0x7f00000001c0)=@task_fd_query={0x0, 0xffffffffffffffff, 0x801, 0x10008, 0x400, 0x1000049, 0xffffffffffffffff, 0x20000000000804, 0x3}, 0x6f3) ioctl$auto_def_blk_fops_fs(0xffffffffffffffff, 0x125f, 0x0) setreuid$auto(0x0, 0x20000000004) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01eb"], 0x14}, 0x1, 0x0, 0x0, 0x20040800}, 0x24004000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1200"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) 6.607133352s ago: executing program 3 (id=2358): close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) r0 = fanotify_init$auto(0x400800, 0x0) fanotify_mark$auto(0x400000000000, 0x101, 0x9, r0, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x0, 0x100000000008000) r1 = openat$auto_ocfs2_control_fops_stack_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) readv$auto(r1, 0x0, 0x2) read$auto(0x3, 0x0, 0x80) sendto$auto(0x3, 0x0, 0x2000f, 0x0, &(0x7f0000000040), 0x1c) writev$auto(0xca, &(0x7f0000000080)={&(0x7f0000000040), 0xa}, 0x7e) clone$auto(0x7, 0x7fffffffffffffff, &(0x7f0000000000)=0x9, &(0x7f00000000c0)=0x1ff, 0x0) (fail_nth: 6) 5.351370031s ago: executing program 3 (id=2360): openat$auto__ctl_fops_dm_ioctl(0xffffffffffffff9c, &(0x7f0000000000), 0x400203, 0x0) openat$auto_uprobe_profile_ops_trace_uprobe(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/tracing/uprobe_profile\x00', 0x0, 0x0) 3.967407455s ago: executing program 1 (id=2367): mknod$auto(&(0x7f0000000040)='\xfd\x90\x8f2\x14\x92\x00\xbf\xdf\xcf\x9a\xae}\xd9\xf95\xc5gV\x82\f\xe5h\xfe\x83\xe4\xbe\x8c\x1f\xa5\xf1_T\xde\xf7\xd4\x83D\x9eXS\xd6\x90T\xc1v\xad#\xc4q\x8b\xed2\xadW:0\xef\x9c.=\xba\x0fy\x8f\xcd\xd6\xde\xa9i\xec\xe8\xca\x9f\xf3\x82b\xa2y\xa87J\xfc \xc5\xd8\x80\xba\xaaV\x8f{\x1f\x1b\xb0\n\x97\\\xa7\xe3\xdf\xc29-*;#r\xc8\xd1\x14RcF\x87\xe4\x1c\x1fGL\xa5\x19\x90\xd6\x8d*\xe6\b(\x1a\xea\x95\xdc\xa6)5\xae&yAl\x1e\xe3j Lp\x91\r\xed%\xafZ\xf8w\xf2}\xcdGS\xce\xb9\xdck\x86\x00.6\xe6{\xc1\x00\x1bW5\x81\xda!\xcb.O\xa9\xf3\xa7\x88+\xb9\xf3\x9a7\xa4\xe6)<\xa79\xa4\x87\\\xb4\xbf\v\x03\x87\xac\x87r\x02\x05\xdb\xe4\xde,V\xb6G\xba.WR\xe2<~\xdd\xb2\xe53hj_;\xa5qm\x92\xc7P\xc9.\x82w8\x1f\xfcX\xe4\x14\xc72cC\xd3\x00'/263, 0x1, 0x4) close_range$auto(0x2, 0x8, 0x0) socket(0xa, 0x801, 0x84) socket(0x11, 0x2, 0x1) r0 = socket(0x2, 0x801, 0x100) sendmsg$auto_IOAM6_CMD_NS_SET_SCHEMA(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24004874}, 0x44054) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) bpf$auto(0x4000000, &(0x7f0000000100)=@bpf_attr_5={@target_ifindex=r1, r0, 0x9c, 0x0, 0x1, @relative_fd, 0x5}, 0x96) 3.705933867s ago: executing program 1 (id=2370): r0 = socket(0x10, 0x2, 0x0) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0x9, 0x7, 0x3e, 0xfffffffffffffffa, 0x1ffde, 0x7, 0x6, 0x2, 0x9, 0x3, 0x6, 0x4, 0xb4, 0x9, 0x2, 0x10000, 0x80, 0x7, 0x0, 0x7, 0x2000, 0x200, 0x0, 0x84, [0x0, 0x0, 0x0, 0x50100000000000, 0x0, 0x0, 0x0, 0xa, 0x70624ce7, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd, 0x1, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x400000000005b8, 0xc, 0x3, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x890, 0x8000000000008, 0xfffffffffffffff8, 0x3, 0xa38, 0x0, 0x0, 0xfffffffffffffffc, 0x2, 0x4000000000]}, 0x1fe, 0x200d) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) r1 = syz_genetlink_get_family_id$auto_nfsd(&(0x7f00000034c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x0, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@HSR_A_IF2_AGE={0x8, 0x4, 0xab7}, @HSR_A_IF2_SEQ={0x6, 0x7, 0x8000}, @HSR_A_IFINDEX={0x8, 0x2, r3}, @HSR_A_NODE_ADDR_B={0xa, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @HSR_A_NODE_ADDR={0xa, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, @HSR_A_NODE_ADDR={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x35}}, @HSR_A_IFINDEX={0x8, 0x2, r3}, @HSR_A_IF1_SEQ={0x6, 0x6, 0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x40080}, 0x40) sendmsg$auto_NFSD_CMD_LISTENER_SET(0xffffffffffffffff, &(0x7f0000003700)={0x0, 0x0, &(0x7f00000036c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1], 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmmsg$auto(r0, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080), 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) (fail_nth: 6) 3.143473071s ago: executing program 1 (id=2372): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000e40)='/sys/devices/pci0000:00/0000:00:01.3/config\x00', 0x2, 0x0) write$auto_kernfs_file_fops_kernfs_internal(r0, &(0x7f0000000040)="079778", 0x3) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x7, 0x800008000) write$auto(0x3, 0x0, 0xfffffdef) 2.675403525s ago: executing program 1 (id=2375): mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) mmap$auto(0x10000000, 0x8, 0x1000000004, 0x9b72, 0x2, 0x8000) msgctl$auto(0x0, 0x3, 0x0) r0 = socket(0x11, 0x80003, 0x300) sendmmsg$auto(r0, &(0x7f0000000940)={{&(0x7f00000006c0)="e524abc67e1a0a6fa889c3411f1ef83faa9ec567db4dbe9a4eb3e36febcde130c5a9767bc3c1da4345349edde43beddd0c900bb5c7ccac6ab6ddd3babeeb0c1c0dc55bbd55463cc1326d2017968f2d3d280e8fe962716e3f9a575a65624134a7a9af7378e31452c3aee42bf71bace88f6728b256dfc9df9483ec39c4e84fb725915a87660ce3b13fe31b1a47a23f7016b5a8d98097a5f8805c91ec6af58081afd7df7e901a9540cc813fc1d94bcd8e620fae6d30e1ce8d89c0a811b78fef113cbf63b39651deb8a54f04dca2be9caa680cfc5657725e83f560b0307962201640ed85725de9bc6f8ec216966d62ef12517db0242610bcd6", 0x0, &(0x7f00000008c0)={&(0x7f00000007c0)="3b4f8c5df0f4aab009357ddb9431f5e9c113681f37330bb6255285b48673000b4057028010aa2c65657846cc113429051f8af79c7dfe36271bc53b62013829d01c7f516662580bf9554abfec61e7512958762fea50b01600d46bc5183cef0a33a502c599f9a2262574c6483828baf53fd0b53fca841686436b77590bafcf4a343ee92cc87f22e7be76a3ebb3aa78584341e372f8d89f6faa768b43c3e29bd07f24b5578050bb0c6ff3b56eeccbd7769ac496a2316bd695ed74238a540f4b725b9cafe9a9", 0x100000001}, 0xffffffffffffffff, &(0x7f0000000900)="68cc3d9c11bb65513f1c2143f2ec176a", 0x4, 0xef}, 0x1e2}, 0x3d7, 0xd2a7) setsockopt$auto(r0, 0x107, 0x12, 0x0, 0x4) syz_genetlink_get_family_id$auto_ovs_flow(0x0, 0xffffffffffffffff) r1 = fsopen$auto(&(0x7f00000000c0)='\'\\^@\x00', 0x1) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)={0xb8, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_MAC_MASK={0xa2, 0xd7, "a32f19b4ab2784d72e87555ac5a0cccc08f4970f67c670b370f38abee09e513963c6c54c60a7c7542e40b49ea2d8763b75c9fa34125bde6d811a43e7cb52ed457b58335708154e71278e0d4ddafa188164343c95a9aba3c2909f76ec500419a74a3202bf013a3f7f855641ae5e6ac9dde01764287b174890298af0ee0b3019af1b5bc43f60e0906c4eeb5c4fa7c4492233e69359b7f8f640216a666d8500"}]}, 0xb8}, 0x1, 0x0, 0x0, 0x2000c041}, 0x88055) socket$nl_generic(0x10, 0x3, 0x10) prctl$auto(0x44, 0x100000000, 0x4e6, 0xfffffffffffffffd, 0x902) syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000000080), 0xffffffffffffffff) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0x9, 0x3, 0x12, 0x940, 0x1fee0, 0x3, 0x6, 0x80000002, 0x9, 0x80000005, 0x2, 0x7, 0xb0, 0x9, 0x5, 0x3, 0x5, 0x7, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff]}, 0x1fe, 0x82) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="11002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r2 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x1ac}}, 0x40000) sendmmsg$auto(r2, &(0x7f0000000200)={{0x0, 0x2000000, &(0x7f0000000100)={&(0x7f0000000080), 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) 2.516077021s ago: executing program 4 (id=2376): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x1d, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/controlC2\x00', 0x101842, 0x0) openat$auto_proc_pid_attr_operations_base(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/apparmor/exec\x00', 0x200200, 0x0) openat$auto_proc_single_file_operations_base(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/cpuset\x00', 0x181100, 0x0) pipe$auto(0x0) r0 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snd/controlC1\x00', 0x22082, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, 0x0) (fail_nth: 2) 2.377738886s ago: executing program 1 (id=2378): close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x3, 0xa) setsockopt$auto(0x3, 0x0, 0x23, 0x0, 0x4) r0 = openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000100)='/dev/radio6\x00', 0x8a240, 0x0) ioctl$auto(r0, 0x5646, r0) read$auto_v4l2_fops_v4l2_dev(r0, &(0x7f0000000080)=""/27, 0x1b) ioctl$auto(r0, 0x10001, r0) prlimit64$auto(0xffffffffffffffff, 0x3ff, 0x0, 0x0) 1.896824532s ago: executing program 6 (id=2379): socket$nl_generic(0x10, 0x3, 0x10) socket(0x2a, 0x2, 0x6) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0xa, 0x3, 0x100) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) eventfd$auto(0x3ffff7f6) socket$nl_generic(0x10, 0x3, 0x10) socket(0xa, 0x3, 0x6) socket(0xa, 0x2, 0x88) r0 = socket(0x10, 0x2, 0xc) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="18000000", @ANYRES8=r0, @ANYBLOB='\nG'], 0x18}, 0x1, 0x0, 0x0, 0x64048001}, 0x80) mprotect$auto(0x1ffff000, 0x8000000000000001, 0xd) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x20000000, 0x0, 0x1}, 0x4000000) 1.723178404s ago: executing program 4 (id=2380): r0 = socket(0x2, 0x1, 0x0) r1 = openat$auto_adf_ctl_ops_adf_ctl_drv(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) close_range$auto(0x2, r1, 0xffffffff) r2 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/cec18\x00', 0x900, 0x0) ioctl$auto_CEC_ADAP_S_LOG_ADDRS(r2, 0xc05c6104, &(0x7f0000000100)={"fda25684", 0xffff, 0x6, 0x3, 0x3, 0x9, "c625aa3f222ce10e00", "430600", "090018bc", "4e1d00", ['\x00', "f860f20000473a6f08e10005", "b06f8ca10c660500000017c8", "5f0700000000000000392a98"]}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x1e, 0x1, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x2) socket(0x21, 0x2, 0x2) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r5 = socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) setsockopt$auto(0x3, 0x1, 0x2b, 0x0, 0x9) socket(0x1d, 0x2, 0x2) r6 = socket(0x1d, 0x2, 0x7) setsockopt$auto(0x3, 0x6b, 0xb, 0xffffffffffffffff, 0x3) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_NBD_CMD_STATUS(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)={0x14, 0x0, 0x1, 0x70bd2b, 0x25dfdbfe}, 0xfde6}, 0x1, 0x0, 0x0, 0x4040}, 0x40) capget$auto(&(0x7f00000000c0)={0x8, 0x0}, &(0x7f0000000180)={0x1000, 0x3, 0x3}) sendmsg$auto_NBD_CMD_DISCONNECT(r6, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb8, 0x0, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_DEVICE_LIST={0x8f, 0x9, 0x0, 0x1, [@generic="d20af3a3c1da02c5ca65026f73f4b207d87077a715425e6bf68df87103b13a8cca0250b9f554410178925c57badee2c2a60b67ebae57f92af35944af5e0192ec8414a45469734c4753375a3002a7b28ff8cb611778ae23711f0337491cdd6c9c2b15fc24086486229a28818d7282e8", @typed={0x8, 0x13f, 0x0, 0x0, @pid=r8}, @typed={0x14, 0x11d, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x29}}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x2a2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x8}]}, 0xb8}}, 0x20008001) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) r9 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x280, 0x0) ioctl$auto_SNDRV_RAWMIDI_IOCTL_USER_PVERSION(r5, 0x40045702, &(0x7f0000000340)=0x9) openat$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffff9c, &(0x7f00000011c0), 0xa2741, 0x0) pread64$auto(r9, 0x0, 0x8, 0x8) mmap$auto(0xa4, 0x1000, 0x4000000000df, 0xeb1, 0x401, 0xe) capget$auto(0x0, 0xfffffffffffffffe) setsockopt$auto(r3, 0x10f, 0x87, 0x0, 0x14) bind$auto(r4, &(0x7f0000000040)=@tipc=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x0, 0x2}}, 0x66) sendmmsg$auto(r0, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800009}, 0x5, 0x20000000) 1.581832539s ago: executing program 6 (id=2381): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x2, 0x1, 0x0) close_range$auto(0x2, 0x8, 0x0) r1 = openat$auto_posix_clock_file_operations_posix_clock(0xffffffffffffff9c, &(0x7f0000005280), 0x40400, 0x0) ioctl$auto_posix_clock_file_operations_posix_clock(r1, 0xc4c03d12, 0x0) memfd_create$auto(0x0, 0xe) socket(0x2, 0x1, 0x106) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @loopback}, 0x6a) sendmmsg$auto(r0, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800009}, 0x5, 0x20000000) write$auto(0x3, 0x0, 0xfdf3) iopl$auto(0x3) sched_rr_get_interval$auto(0x0, &(0x7f0000000000)={0x0, 0x80000000}) recvfrom$auto(0x3, 0x0, 0x800000000e, 0x7, 0x0, 0xfffffffffffffffd) write$auto(0x3, 0x0, 0xfffffdef) recvfrom$auto(0x3, 0x0, 0x8100000012, 0x200000fb, 0x0, 0xfffffffffffffffd) 1.519736221s ago: executing program 6 (id=2382): r0 = socket(0xa, 0x1, 0x84) r1 = accept$auto(0x3, 0xffffffffffffffff, 0xffffffffffffffff) ioperm$auto(0x3, 0xe, 0x2000000000000149) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x848000000015, 0x805, 0x0) bind$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x37}}, 0x6b) connect$auto(0x3, 0x0, 0x55) mmap$auto(0x0, 0x2020009, 0x3, 0xeb2, 0xfffffffffffffffb, 0x8000) r3 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/can/rcvlist_sff\x00', 0x0, 0x0) pread64$auto(r3, 0x0, 0x1ff, 0x5) r4 = syz_genetlink_get_family_id$auto_ovs_vport(&(0x7f0000000300), r2) sendmsg$auto_OVS_VPORT_CMD_GET(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, r4, 0x100, 0x70bd2a, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x800) statfs$auto(0x0, 0x0) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/block/nbd12/queue/max_segment_size\x00', 0x600, 0x0) r6 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000001480)='/proc/self/net/rxrpc/locals\x00', 0x40, 0x0) r7 = openat$auto_mon_fops_binary_mon_bin(0xffffffffffffff9c, &(0x7f0000000000)='/dev/usbmon1\x00', 0x82d03, 0x0) splice$auto(0x4, 0x0, 0x2, 0x0, 0x1000, 0xf) mprotect$auto(0x1ffff000, 0x8000000000000001, 0xd) r8 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual/block/nullb0/queue/zoned\x00', 0x101000, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) read$auto(r8, 0x0, 0x20) syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) ioctl$auto_MON_IOCG_STATS(r7, 0x80089203, 0x0) r9 = syz_genetlink_get_family_id$auto_thermal(&(0x7f0000000180), r1) sendmsg$auto_THERMAL_GENL_CMD_THRESHOLD_FLUSH(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x50, r9, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@THERMAL_GENL_ATTR_TZ_TRIP={0x10, 0x5, 0x0, 0x1, [@typed={0xc, 0x11f, 0x0, 0x0, @u64=0x101}]}, @THERMAL_GENL_ATTR_TZ_TEMP={0x8, 0x3, 0x3}, @THERMAL_GENL_ATTR_CDEV_MAX_STATE={0x8, 0x12, 0xff}, @THERMAL_GENL_ATTR_CDEV_ID={0x8, 0x10, 0xce8b}, @THERMAL_GENL_ATTR_CDEV_NAME={0x14, 0x13, 'veth1_to_team\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000000}, 0x40) pread64$auto(r6, &(0x7f0000001bc0)='veth1\x00', 0x200000000003, 0x8) read$auto_kernfs_file_fops_kernfs_internal(r5, &(0x7f0000000040)=""/223, 0xdf) 1.413070551s ago: executing program 4 (id=2383): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000e40)='/sys/devices/pci0000:00/0000:00:01.3/config\x00', 0x2, 0x0) write$auto_kernfs_file_fops_kernfs_internal(r0, &(0x7f0000000040)="079778", 0x3) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x7, 0x800008000) write$auto(0x3, 0x0, 0xfffffdef) 1.113252703s ago: executing program 6 (id=2384): openat$auto_fuse_dev_operations_fuse_i(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) socket(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) socket(0xa, 0x3, 0x3a) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) eventfd$auto(0x3) eventfd$auto(0x0) r1 = socket(0xa, 0x2, 0x88) bpf$auto(0x0, &(0x7f0000000000)=@link_update={r1, @new_prog_fd=r0, 0x3}, 0xa3) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) openat$auto_proc_pid_attr_operations_base(0xffffffffffffff9c, &(0x7f0000001100)='/proc/self/attr/apparmor/exec\x00', 0x181a00, 0x0) ioperm$auto(0x7, 0x6, 0x2) openat$auto_rfkill_fops_core(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) close_range$auto(0x2, 0x8, 0x0) 917.456932ms ago: executing program 4 (id=2385): socket(0x2a, 0x2, 0x1) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) bpf$auto(0x5, 0x0, 0x101) r0 = socket(0x2, 0x1, 0x106) setsockopt$auto(r0, 0x6, 0xd, &(0x7f0000000040)='nsKcg>', 0x2) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) madvise$auto(0xfffffffffffffffe, 0xfffffffffffefffd, 0x2) madvise$auto(0x0, 0xffffffffffff0001, 0x15) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x400, 0x2020009, 0x3, 0x19d0, 0xfffffffffffffffa, 0x0) mkdir$auto(&(0x7f0000000100)='}[,&*}\x00', 0x8001) syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000040), 0xffffffffffffffff) mount$auto(0x0, &(0x7f0000000100)='}[,&*}\x00', &(0x7f0000000140)='ifsd\xe9', 0x10001, 0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/mpls/platform_labels\x00', 0x202, 0x0) pwrite64$auto(r2, &(0x7f0000000000)='/pzoc\x0f\x00\x00\x00fy_groups\x00\x00\x00\x00\b\x00'/35, 0x10, 0x11) r3 = socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(r1, 0x8, 0xa) mmap$auto(0x4, 0x7fffffffffffffff, 0x4000000000df, 0xeb1, 0xd4, 0x807ffffd) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x27, 0x3, 0x0) r5 = socket(0xb2cc632f14fd8283, 0x4, 0x0) get_robust_list$auto(0x0, 0x0, 0x0) setsockopt$auto(r5, 0x10f, 0x87, 0x0, 0x14) ioctl$auto(r4, 0x2, 0x6) setsockopt$auto(r2, 0x10f, 0x9, 0x0, 0x4c159f6d) sendmsg$auto_NETDEV_CMD_QUEUE_GET(r3, 0x0, 0x4000) mount$auto(0x0, &(0x7f0000000100), 0x0, 0x100000, 0x0) r6 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') setns(r6, 0x0) 556.045051ms ago: executing program 6 (id=2386): mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) mmap$auto(0x10000000, 0x8, 0x1000000004, 0x9b72, 0x2, 0x8000) msgctl$auto(0x0, 0x3, 0x0) r0 = socket(0x11, 0x80003, 0x300) sendmmsg$auto(r0, &(0x7f0000000940)={{&(0x7f00000006c0)="e524abc67e1a0a6fa889c3411f1ef83faa9ec567db4dbe9a4eb3e36febcde130c5a9767bc3c1da4345349edde43beddd0c900bb5c7ccac6ab6ddd3babeeb0c1c0dc55bbd55463cc1326d2017968f2d3d280e8fe962716e3f9a575a65624134a7a9af7378e31452c3aee42bf71bace88f6728b256dfc9df9483ec39c4e84fb725915a87660ce3b13fe31b1a47a23f7016b5a8d98097a5f8805c91ec6af58081afd7df7e901a9540cc813fc1d94bcd8e620fae6d30e1ce8d89c0a811b78fef113cbf63b39651deb8a54f04dca2be9caa680cfc5657725e83f560b0307962201640ed85725de9bc6f8ec216966d62ef12517db0242610bcd6", 0x0, &(0x7f00000008c0)={&(0x7f00000007c0)="3b4f8c5df0f4aab009357ddb9431f5e9c113681f37330bb6255285b48673000b4057028010aa2c65657846cc113429051f8af79c7dfe36271bc53b62013829d01c7f516662580bf9554abfec61e7512958762fea50b01600d46bc5183cef0a33a502c599f9a2262574c6483828baf53fd0b53fca841686436b77590bafcf4a343ee92cc87f22e7be76a3ebb3aa78584341e372f8d89f6faa768b43c3e29bd07f24b5578050bb0c6ff3b56eeccbd7769ac496a2316bd695ed74238a540f4b725b9cafe9a9", 0x100000001}, 0xffffffffffffffff, &(0x7f0000000900)="68cc3d9c11bb65513f1c2143f2ec176a", 0x4, 0xef}, 0x1e2}, 0x3d7, 0xd2a7) setsockopt$auto(r0, 0x107, 0x12, 0x0, 0x4) syz_genetlink_get_family_id$auto_ovs_flow(0x0, 0xffffffffffffffff) r1 = fsopen$auto(&(0x7f00000000c0)='\'\\^@\x00', 0x1) sendmsg$auto_NL80211_CMD_GET_REG(r1, &(0x7f0000000680)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)={0xb8, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@NL80211_ATTR_MAC_MASK={0xa2, 0xd7, "a32f19b4ab2784d72e87555ac5a0cccc08f4970f67c670b370f38abee09e513963c6c54c60a7c7542e40b49ea2d8763b75c9fa34125bde6d811a43e7cb52ed457b58335708154e71278e0d4ddafa188164343c95a9aba3c2909f76ec500419a74a3202bf013a3f7f855641ae5e6ac9dde01764287b174890298af0ee0b3019af1b5bc43f60e0906c4eeb5c4fa7c4492233e69359b7f8f640216a666d8500"}]}, 0xb8}, 0x1, 0x0, 0x0, 0x2000c041}, 0x88055) socket$nl_generic(0x10, 0x3, 0x10) prctl$auto(0x44, 0x100000000, 0x4e6, 0xfffffffffffffffd, 0x902) syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000000080), 0xffffffffffffffff) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0x9, 0x3, 0x12, 0x940, 0x1fee0, 0x3, 0x6, 0x80000002, 0x9, 0x80000005, 0x2, 0x7, 0xb0, 0x9, 0x5, 0x3, 0x5, 0x7, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff]}, 0x1fe, 0x82) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="11002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r2 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) sendmmsg$auto(r2, 0x0, 0x7, 0x4008) 452.59708ms ago: executing program 4 (id=2387): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) ioctl$auto(0x3, 0xc1485544, 0xb551) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) socket(0x2, 0x6, 0x0) io_uring_setup$auto(0x1, 0x0) close_range$auto(0x2, 0x8, 0x0) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x8c00, 0x0) ioctl$auto_KVM_CREATE_VM(r0, 0xae01, 0x0) close_range$auto(0x2, 0x8, 0x4000008) 202.22619ms ago: executing program 1 (id=2388): openat$auto_safesetid_uid_file_fops_securityfs(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) mbind$auto(0x1, 0x2, 0xca, &(0x7f0000000040)=0xff, 0x3, 0xe) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) getpid() mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = socket(0x2, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x4e22, @remote}, 0x6a) sendmmsg$auto(r0, &(0x7f0000000140)={{&(0x7f0000000040), 0x80012, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800009}, 0x5, 0x20000002) r1 = syz_genetlink_get_family_id$auto_nfc(0x0, r0) sendmsg$auto_NFC_CMD_VENDOR(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r1, 0x100, 0x70bd27, 0x25dfdbfd}, 0x14}}, 0x40) write$auto(0x3, 0x0, 0xfffffdef) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x60740, 0x0) recvfrom$auto(0x3, 0x0, 0x800000000e, 0x100, 0x0, 0xfffffffffffffffd) mmap$auto(0x0, 0x400005, 0xdf, 0x9b72, 0x2, 0x8000) connect$auto(0x3, 0x0, 0x55) connect$auto(0x3, &(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x55) sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x840) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_nbd(&(0x7f0000000040), r2) close_range$auto(0x2, 0xa, 0x0) openat$auto_mtd_fops_mtdchar(0xffffffffffffff9c, 0x0, 0x28082, 0x0) ioctl$auto(0x3, 0x1269, 0x38) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_MACSEC_CMD_UPD_OFFLOAD(r3, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4040085}, 0x42014) move_pages$auto(0x0, 0xd1, &(0x7f0000001100)=&(0x7f0000000040), 0x0, 0x0, 0x0) close_range$auto(0x2, 0x8000, 0x0) socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x2, 0x8000, 0x0) io_uring_setup$auto(0x59, &(0x7f0000000080)={0x8, 0xd, 0x2, 0x9, 0x100007, 0x8, 0xffffffffffffffff, [], {0x6, 0x6, 0xf, 0x29f, 0x100, 0x7f, 0x101, 0x6, 0x2}, {0x82, 0x7, 0x52, 0x3, 0x1, 0x40, 0x76c6, 0x8, 0x100000000}}) openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs1\x00', 0x2, 0x0) 90.405965ms ago: executing program 4 (id=2389): socket(0x2, 0x801, 0x100) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_nbd(&(0x7f0000000340), 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./cgroup\x00', 0x0, 0x64) r2 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000280)='/proc/fs/netfs/caches\x00', 0x20000, 0x0) read$auto_proc_iter_file_ops_compat_inode(r2, &(0x7f00000002c0)=""/233, 0xe9) read$auto(0x3, 0x0, 0x80) fchdir$auto(r1) sendmsg$auto_NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, 0x0, 0xc005) pwrite64$auto(0xc8, &(0x7f0000000540)='\vX\xb5n\x91p\xe6\x94\xa1\x90z\x99\x88d\x11\x01J\x99\x12:\x00!\r>\x94\x1a\xd3\xd3\x1d\x93\xab{Lh\xf8\xbebZ\xddL\'\x03\xf1`\x9f\x1e\xf9\xa4\x04\nlE@\xc1\xf2o\xdb\x96t2s\xb3\"\x8fY\x06r\xfex\x88\f\x14^\x0fo\x84\xfc\x89\v\xea\x1b\x95\xafQ;CQ\"\x01\x0e\xa4\xdf\x11\x030\x19o\x17\xf7\xcc7\xd3\x1b\xe0y[\xce\xbb\a\x90\x11x\xfb\xdao>C\x8a\xeeq\xf0\xcdr\xc1\xa8\xcd\xf9.=(\xeb\xd1\x14^\x87&^\xcc\x181\xd6\xa3k\xd9\x9f\xefC\xda\x1f+\xb4`\xdd02S\x18\x9efHu\xfe\xfd\x90\xdb\xff9{\xa6 \x88\x19\x82?\x88\xed\x88V\x95\x13\xa2(o\xdf\x82\xca\xb4C\x06-&\xf1\xa22(\xc7}\x0eE.R<\xea\x8e\x13\x9c', 0x2b, 0x6) r3 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/controlC2\x00', 0x101842, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f0000000300)={{@raw=0x1, 0xa, 0xf8, 0x4671, "a401d243991a4dc376cc2bd4dbe3040e3cff152230323227f8d6c24be7ceeed84366bbadec197ea40209a468", @raw}, 0x1ec, 0x80d, 0x1, @inferred, @reserved="b2089ab0bbaab63c40853405fb772ade9448008d0040560232dbb586cf8f11ca82a2ba37174118952b850ad2099d3a3bc1c77e916330e96e2989bebf719430efe8c9a59c9349eac701c2bbb3122607916561a6da1cfdfc5dc83f4cc979d6dbf96bcb58d1f9042592b39ceec6193960c9a37975bc0153c5fce4d94f329d47f6d4", "2bb2d72b107f03a0ef0c6760e2e1fd64b8ae4a5be70b75810dfa4cc7182ed519d3613ea5b4243440fc9595b760cee784decb284ff015aa97d8f86dd61fd4f929"}) sendmsg$auto_NBD_CMD_CONNECT(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40080}, 0x20040000) mmap$auto(0x0, 0x8, 0x1000000004, 0x9b72, 0x2, 0x8000) setsockopt$auto(0xffffffffffffffff, 0x10000000084, 0x3, 0x0, 0x3) mlockall$auto(0x7) mlockall$auto(0x6b94) ioctl$auto_USB_RAW_IOCTL_CONFIGURE(0xffffffffffffffff, 0x5509, 0x0) acct$auto(&(0x7f0000000200)='/proc/sys/kernel/sched_deadline_period_max_us\x00') acct$auto(0x0) ioctl$auto(0xc8, 0x6, 0x5d6e859b) madvise$auto(0x0, 0xffffffffffff0001, 0x9) sendmsg$auto_GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x4000804) lstat$auto(0x0, &(0x7f0000000180)={0x4, 0x10, 0x9, 0x63, 0x0, 0x0, 0x0, 0xffff, 0x40000000000f, 0x7, 0x40000402, 0x7ffffffb, 0x9, 0xffffffff80000000, 0x9, 0x7, 0x200000100103}) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x89fc, &(0x7f0000000040)={'bridge0\x00'}) (fail_nth: 4) 0s ago: executing program 6 (id=2390): socket(0xa, 0x3, 0x3a) syz_genetlink_get_family_id$auto_ovs_flow(0x0, 0xffffffffffffffff) mmap$auto(0x2f, 0xffffffffffffffff, 0xdf, 0x9b76, 0x0, 0x5) sendmsg$auto_WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYRES8, @ANYRESDEC], 0x14}, 0x1, 0x0, 0x0, 0x20048890}, 0x2000c041) socket(0xa, 0x5, 0x0) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="1100"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0xc800) r0 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) kernel console output (not intermixed with test programs): lloc_noprof+0xce/0x4f0 [ 557.621308][T13537] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 557.626961][T13537] ? tomoyo_realpath_from_path+0xbf/0x710 [ 557.632698][T13537] tomoyo_realpath_from_path+0xbf/0x710 [ 557.638259][T13537] ? tomoyo_path_number_perm+0x235/0x5b0 [ 557.643916][T13537] tomoyo_path_number_perm+0x248/0x5b0 [ 557.649390][T13537] ? tomoyo_path_number_perm+0x235/0x5b0 [ 557.655040][T13537] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 557.661096][T13537] ? __pfx_lock_release+0x10/0x10 [ 557.666127][T13537] ? trace_lock_acquire+0x14e/0x1f0 [ 557.671341][T13537] ? lock_acquire+0x2f/0xb0 [ 557.675850][T13537] ? __fget_files+0x40/0x3a0 [ 557.680453][T13537] ? __fget_files+0x206/0x3a0 [ 557.685146][T13537] security_file_ioctl+0x9b/0x240 [ 557.690179][T13537] __x64_sys_ioctl+0xb7/0x200 [ 557.694874][T13537] do_syscall_64+0xcd/0x250 [ 557.699392][T13537] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 557.705298][T13537] RIP: 0033:0x7ffaa5d85d29 [ 557.709829][T13537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 557.729461][T13537] RSP: 002b:00007ffaa6b40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 557.737987][T13537] RAX: ffffffffffffffda RBX: 00007ffaa5f75fa0 RCX: 00007ffaa5d85d29 [ 557.745970][T13537] RDX: 0000000000000000 RSI: 00000000c4c85512 RDI: 0000000000000008 [ 557.753950][T13537] RBP: 00007ffaa6b40090 R08: 0000000000000000 R09: 0000000000000000 [ 557.761932][T13537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 557.769908][T13537] R13: 0000000000000000 R14: 00007ffaa5f75fa0 R15: 00007fff5bbcad98 [ 557.777993][T13537] [ 557.856407][T13537] ERROR: Out of memory at tomoyo_realpath_from_path. [ 558.060909][T13550] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2042'. [ 558.581439][T13574] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2047'. [ 558.750867][T13578] Process accounting resumed [ 558.851200][T13579] FAULT_INJECTION: forcing a failure. [ 558.851200][T13579] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 558.881971][T13579] CPU: 0 UID: 0 PID: 13579 Comm: syz.3.2050 Not tainted 6.13.0-rc5-syzkaller #0 [ 558.891079][T13579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 558.901180][T13579] Call Trace: [ 558.904608][T13579] [ 558.907574][T13579] dump_stack_lvl+0x16c/0x1f0 [ 558.912298][T13579] should_fail_ex+0x497/0x5b0 [ 558.917019][T13579] _copy_from_user+0x2e/0xd0 [ 558.921654][T13579] get_user_ifreq+0xf1/0x250 [ 558.926283][T13579] sock_ioctl+0x58c/0x6c0 [ 558.930653][T13579] ? __pfx_sock_ioctl+0x10/0x10 [ 558.935551][T13579] ? __fget_files+0x206/0x3a0 [ 558.940273][T13579] ? __pfx_sock_ioctl+0x10/0x10 [ 558.945161][T13579] __x64_sys_ioctl+0x190/0x200 [ 558.949960][T13579] do_syscall_64+0xcd/0x250 [ 558.954502][T13579] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 558.960441][T13579] RIP: 0033:0x7ffa7ad85d29 [ 558.964881][T13579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 558.984523][T13579] RSP: 002b:00007ffa7bbcc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 558.992977][T13579] RAX: ffffffffffffffda RBX: 00007ffa7af76080 RCX: 00007ffa7ad85d29 [ 559.000983][T13579] RDX: 0000000020000040 RSI: 00000000000089fc RDI: 0000000000000008 [ 559.008975][T13579] RBP: 00007ffa7bbcc090 R08: 0000000000000000 R09: 0000000000000000 [ 559.016973][T13579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 559.024973][T13579] R13: 0000000000000000 R14: 00007ffa7af76080 R15: 00007ffd7df88d78 [ 559.033026][T13579] [ 559.343727][T13590] FAULT_INJECTION: forcing a failure. [ 559.343727][T13590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 559.380244][T13590] CPU: 1 UID: 0 PID: 13590 Comm: syz.3.2054 Not tainted 6.13.0-rc5-syzkaller #0 [ 559.389362][T13590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 559.399459][T13590] Call Trace: [ 559.402767][T13590] [ 559.405726][T13590] dump_stack_lvl+0x16c/0x1f0 [ 559.410453][T13590] should_fail_ex+0x497/0x5b0 [ 559.415296][T13590] _copy_to_iter+0x4a5/0x1400 [ 559.420038][T13590] ? __pfx__copy_to_iter+0x10/0x10 [ 559.425195][T13590] ? __virt_addr_valid+0x1a4/0x590 [ 559.430361][T13590] ? __virt_addr_valid+0x5e/0x590 [ 559.435426][T13590] ? __phys_addr_symbol+0x30/0x80 [ 559.440494][T13590] ? __check_object_size+0x488/0x710 [ 559.445828][T13590] seq_read_iter+0xd00/0x12b0 [ 559.450574][T13590] seq_read+0x39f/0x4e0 [ 559.454774][T13590] ? __pfx_seq_read+0x10/0x10 [ 559.459508][T13590] ? __pfx_seq_read+0x10/0x10 [ 559.464222][T13590] proc_reg_read+0x23d/0x330 [ 559.468846][T13590] ? __pfx_proc_reg_read+0x10/0x10 [ 559.473995][T13590] vfs_read+0x1df/0xbe0 [ 559.478188][T13590] ? __fget_files+0x1fc/0x3a0 [ 559.482906][T13590] ? __pfx___mutex_lock+0x10/0x10 [ 559.487971][T13590] ? __pfx_vfs_read+0x10/0x10 [ 559.492692][T13590] ? __fget_files+0x206/0x3a0 [ 559.497417][T13590] ksys_read+0x12b/0x250 [ 559.501703][T13590] ? __pfx_ksys_read+0x10/0x10 [ 559.506515][T13590] do_syscall_64+0xcd/0x250 [ 559.511059][T13590] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 559.516990][T13590] RIP: 0033:0x7ffa7ad85d29 [ 559.521415][T13590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 559.541041][T13590] RSP: 002b:00007ffa7bbed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 559.549475][T13590] RAX: ffffffffffffffda RBX: 00007ffa7af75fa0 RCX: 00007ffa7ad85d29 [ 559.557460][T13590] RDX: 0000000000001f40 RSI: 0000000000000000 RDI: 0000000000000003 [ 559.565441][T13590] RBP: 00007ffa7bbed090 R08: 0000000000000000 R09: 0000000000000000 [ 559.573427][T13590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 559.581403][T13590] R13: 0000000000000000 R14: 00007ffa7af75fa0 R15: 00007ffd7df88d78 [ 559.589397][T13590] [ 559.843967][T13602] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2058'. [ 560.845239][T13634] FAULT_INJECTION: forcing a failure. [ 560.845239][T13634] name failslab, interval 1, probability 0, space 0, times 0 [ 560.884242][T13634] CPU: 1 UID: 0 PID: 13634 Comm: syz.5.2066 Not tainted 6.13.0-rc5-syzkaller #0 [ 560.893361][T13634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 560.903536][T13634] Call Trace: [ 560.906833][T13634] [ 560.909784][T13634] dump_stack_lvl+0x16c/0x1f0 [ 560.914499][T13634] should_fail_ex+0x497/0x5b0 [ 560.919211][T13634] ? fs_reclaim_acquire+0xae/0x150 [ 560.924362][T13634] should_failslab+0xc2/0x120 [ 560.929080][T13634] kmem_cache_alloc_node_noprof+0x72/0x3b0 [ 560.934927][T13634] ? __alloc_skb+0x2b3/0x380 [ 560.939558][T13634] __alloc_skb+0x2b3/0x380 [ 560.944023][T13634] ? __pfx___alloc_skb+0x10/0x10 [ 560.949017][T13634] netlink_alloc_large_skb+0x69/0x130 [ 560.954515][T13634] netlink_sendmsg+0x689/0xd70 [ 560.959319][T13634] ? __pfx_netlink_sendmsg+0x10/0x10 [ 560.964648][T13634] ____sys_sendmsg+0x9ae/0xb40 [ 560.969444][T13634] ? copy_msghdr_from_user+0x10b/0x160 [ 560.974941][T13634] ? __pfx_____sys_sendmsg+0x10/0x10 [ 560.980253][T13634] ? __lock_acquire+0xcc5/0x3c40 [ 560.985240][T13634] ? hlock_class+0x4e/0x130 [ 560.989771][T13634] ? __lock_acquire+0x15a9/0x3c40 [ 560.994829][T13634] ___sys_sendmsg+0x135/0x1e0 [ 560.999587][T13634] ? __pfx____sys_sendmsg+0x10/0x10 [ 561.004828][T13634] ? __pfx___lock_acquire+0x10/0x10 [ 561.010085][T13634] ? __pfx___might_resched+0x10/0x10 [ 561.015491][T13634] ? __might_fault+0xe3/0x190 [ 561.020217][T13634] __sys_sendmmsg+0x201/0x420 [ 561.024942][T13634] ? __pfx___sys_sendmmsg+0x10/0x10 [ 561.030188][T13634] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 561.036224][T13634] ? fput+0x67/0x440 [ 561.040162][T13634] ? ksys_write+0x1ba/0x250 [ 561.044691][T13634] ? __pfx_ksys_write+0x10/0x10 [ 561.049576][T13634] __x64_sys_sendmmsg+0x9c/0x100 [ 561.054551][T13634] ? lockdep_hardirqs_on+0x7c/0x110 [ 561.059780][T13634] do_syscall_64+0xcd/0x250 [ 561.064333][T13634] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 561.070264][T13634] RIP: 0033:0x7f5510385d29 [ 561.074702][T13634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 561.094340][T13634] RSP: 002b:00007f551116a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 561.102794][T13634] RAX: ffffffffffffffda RBX: 00007f5510575fa0 RCX: 00007f5510385d29 [ 561.110803][T13634] RDX: 0000000000000003 RSI: 0000000020000080 RDI: 0000000000000003 [ 561.118795][T13634] RBP: 00007f551116a090 R08: 0000000000000000 R09: 0000000000000000 [ 561.126826][T13634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 561.134820][T13634] R13: 0000000000000000 R14: 00007f5510575fa0 R15: 00007fff6c871328 [ 561.142850][T13634] [ 561.839117][T13657] netlink: 146 bytes leftover after parsing attributes in process `syz.1.2072'. [ 562.910630][T13699] netlink: 342 bytes leftover after parsing attributes in process `syz.1.2085'. [ 563.113618][T13709] device-mapper: ioctl: Invalid ioctl structure: uuid , name , dev 400008000010006 [ 563.156489][T13706] raw_sendmsg: syz.4.2086 forgot to set AF_INET. Fix it! [ 563.287709][ T5834] Bluetooth: hci1: ACL packet for unknown connection handle 0 [ 563.576263][T13726] FAULT_INJECTION: forcing a failure. [ 563.576263][T13726] name failslab, interval 1, probability 0, space 0, times 0 [ 563.589349][T13726] CPU: 1 UID: 0 PID: 13726 Comm: syz.5.2093 Not tainted 6.13.0-rc5-syzkaller #0 [ 563.598416][T13726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 563.608512][T13726] Call Trace: [ 563.611820][T13726] [ 563.614781][T13726] dump_stack_lvl+0x16c/0x1f0 [ 563.619515][T13726] should_fail_ex+0x497/0x5b0 [ 563.624235][T13726] ? fs_reclaim_acquire+0xae/0x150 [ 563.629391][T13726] should_failslab+0xc2/0x120 [ 563.634113][T13726] kmem_cache_alloc_noprof+0x6e/0x3b0 [ 563.639535][T13726] ? alloc_empty_file+0x73/0x1e0 [ 563.644536][T13726] alloc_empty_file+0x73/0x1e0 [ 563.649518][T13726] alloc_file_pseudo+0x13d/0x200 [ 563.654496][T13726] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 563.659997][T13726] ? alloc_fd+0x41f/0x760 [ 563.664365][T13726] sock_alloc_file+0x50/0x1d0 [ 563.669092][T13726] __sys_socket+0x1c2/0x260 [ 563.673629][T13726] ? __pfx___sys_socket+0x10/0x10 [ 563.678691][T13726] ? do_user_addr_fault+0x83d/0x13f0 [ 563.684002][T13726] __x64_sys_socket+0x72/0xb0 [ 563.688715][T13726] ? lockdep_hardirqs_on+0x7c/0x110 [ 563.694136][T13726] do_syscall_64+0xcd/0x250 [ 563.698678][T13726] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 563.704605][T13726] RIP: 0033:0x7f5510387c47 [ 563.709042][T13726] Code: f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 0f 1f 44 00 00 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 563.728689][T13726] RSP: 002b:00007f5511168fa8 EFLAGS: 00000286 ORIG_RAX: 0000000000000029 [ 563.737142][T13726] RAX: ffffffffffffffda RBX: 00007f5510575fa0 RCX: 00007f5510387c47 [ 563.745156][T13726] RDX: 0000000000000010 RSI: 0000000000000003 RDI: 0000000000000010 [ 563.753158][T13726] RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000000 [ 563.761156][T13726] R10: 00000000200034c0 R11: 0000000000000286 R12: 0000000000000001 [ 563.769156][T13726] R13: 0000000000000001 R14: 00007f5510575fa0 R15: 00007fff6c871328 [ 563.777169][T13726] [ 563.783397][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 563.790375][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 564.024194][T13741] FAULT_INJECTION: forcing a failure. [ 564.024194][T13741] name failslab, interval 1, probability 0, space 0, times 0 [ 564.037293][T13741] CPU: 0 UID: 0 PID: 13741 Comm: syz.5.2098 Not tainted 6.13.0-rc5-syzkaller #0 [ 564.046361][T13741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 564.056448][T13741] Call Trace: [ 564.059764][T13741] [ 564.062723][T13741] dump_stack_lvl+0x16c/0x1f0 [ 564.067448][T13741] should_fail_ex+0x497/0x5b0 [ 564.072163][T13741] ? fs_reclaim_acquire+0xae/0x150 [ 564.077308][T13741] should_failslab+0xc2/0x120 [ 564.082025][T13741] kmem_cache_alloc_noprof+0x6e/0x3b0 [ 564.087435][T13741] ? lock_acquire+0x2f/0xb0 [ 564.091967][T13741] ? __proc_create+0xa4/0x8b0 [ 564.096675][T13741] ? __proc_create+0x2c3/0x8b0 [ 564.101463][T13741] __proc_create+0x2c3/0x8b0 [ 564.106073][T13741] ? __pfx___proc_create+0x10/0x10 [ 564.111202][T13741] ? _raw_write_unlock+0x28/0x50 [ 564.116166][T13741] _proc_mkdir+0xbb/0x200 [ 564.120512][T13741] ? __pfx__proc_mkdir+0x10/0x10 [ 564.125459][T13741] ? kmem_cache_alloc_noprof+0x21b/0x3b0 [ 564.131112][T13741] ? __pfx_netfilter_net_init+0x10/0x10 [ 564.136672][T13741] netfilter_net_init+0x37b/0x4b0 [ 564.141708][T13741] ? sysctl_net_init+0x27/0x30 [ 564.146504][T13741] ops_init+0x1df/0x5f0 [ 564.150685][T13741] setup_net+0x21f/0x860 [ 564.154952][T13741] ? __pfx_setup_net+0x10/0x10 [ 564.159736][T13741] ? down_read_killable+0xcc/0x380 [ 564.164866][T13741] ? __pfx_down_read_killable+0x10/0x10 [ 564.170448][T13741] ? debug_mutex_init+0x37/0x70 [ 564.175327][T13741] copy_net_ns+0x2b4/0x6c0 [ 564.179761][T13741] create_new_namespaces+0x3ea/0xad0 [ 564.185080][T13741] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 564.190744][T13741] ksys_unshare+0x45d/0xa40 [ 564.195449][T13741] ? __pfx_ksys_unshare+0x10/0x10 [ 564.200501][T13741] ? ksys_write+0x1ba/0x250 [ 564.205032][T13741] __x64_sys_unshare+0x31/0x40 [ 564.209815][T13741] do_syscall_64+0xcd/0x250 [ 564.214342][T13741] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 564.220255][T13741] RIP: 0033:0x7f5510385d29 [ 564.224687][T13741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 564.244305][T13741] RSP: 002b:00007f551116a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 564.252726][T13741] RAX: ffffffffffffffda RBX: 00007f5510575fa0 RCX: 00007f5510385d29 [ 564.260704][T13741] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 564.268695][T13741] RBP: 00007f551116a090 R08: 0000000000000000 R09: 0000000000000000 [ 564.276683][T13741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 564.284659][T13741] R13: 0000000000000001 R14: 00007f5510575fa0 R15: 00007fff6c871328 [ 564.292679][T13741] [ 564.295733][ C0] vkms_vblank_simulate: vblank timer overrun [ 564.384056][T13741] cannot create netfilter proc entry [ 564.641500][T13751] Invalid ELF header magic: != ELF [ 564.703347][T13751] netlink: 'syz.5.2100': attribute type 64 has an invalid length. [ 564.711265][T13751] netlink: 74 bytes leftover after parsing attributes in process `syz.5.2100'. [ 564.971975][T13767] FAULT_INJECTION: forcing a failure. [ 564.971975][T13767] name failslab, interval 1, probability 0, space 0, times 0 [ 565.013213][T13767] CPU: 1 UID: 0 PID: 13767 Comm: syz.5.2104 Not tainted 6.13.0-rc5-syzkaller #0 [ 565.022313][T13767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 565.032397][T13767] Call Trace: [ 565.035700][T13767] [ 565.038658][T13767] dump_stack_lvl+0x16c/0x1f0 [ 565.043379][T13767] should_fail_ex+0x497/0x5b0 [ 565.048091][T13767] ? fs_reclaim_acquire+0xae/0x150 [ 565.053234][T13767] should_failslab+0xc2/0x120 [ 565.057959][T13767] __kmalloc_cache_noprof+0x68/0x420 [ 565.063290][T13767] ? lock_acquire.part.0+0x11b/0x380 [ 565.068606][T13767] ? find_held_lock+0x2d/0x110 [ 565.073407][T13767] usbdev_open+0x9e/0x8c0 [ 565.077765][T13767] ? __pfx_lock_release+0x10/0x10 [ 565.082822][T13767] ? kobject_get_unless_zero+0x157/0x1e0 [ 565.088499][T13767] ? __pfx_usbdev_open+0x10/0x10 [ 565.093462][T13767] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 565.098869][T13767] ? lock_acquire+0x2f/0xb0 [ 565.103403][T13767] ? chrdev_open+0x80/0x6a0 [ 565.107957][T13767] ? __pfx_usbdev_open+0x10/0x10 [ 565.112920][T13767] chrdev_open+0x237/0x6a0 [ 565.117380][T13767] ? __pfx_apparmor_file_open+0x10/0x10 [ 565.122962][T13767] ? __pfx_chrdev_open+0x10/0x10 [ 565.127951][T13767] do_dentry_open+0xf59/0x1ea0 [ 565.132748][T13767] ? __pfx_chrdev_open+0x10/0x10 [ 565.137731][T13767] vfs_open+0x82/0x3f0 [ 565.141836][T13767] ? may_open+0x1f2/0x400 [ 565.146208][T13767] path_openat+0x1e6a/0x2d60 [ 565.150846][T13767] ? __pfx_path_openat+0x10/0x10 [ 565.155814][T13767] ? __pfx___lock_acquire+0x10/0x10 [ 565.161042][T13767] ? lock_acquire.part.0+0x11b/0x380 [ 565.166359][T13767] ? find_held_lock+0x2d/0x110 [ 565.171169][T13767] do_filp_open+0x20c/0x470 [ 565.175707][T13767] ? __pfx_do_filp_open+0x10/0x10 [ 565.180758][T13767] ? find_held_lock+0x2d/0x110 [ 565.185577][T13767] ? alloc_fd+0x41f/0x760 [ 565.189947][T13767] do_sys_openat2+0x17a/0x1e0 [ 565.194675][T13767] ? __pfx_do_sys_openat2+0x10/0x10 [ 565.199922][T13767] ? __fget_files+0x206/0x3a0 [ 565.204640][T13767] __x64_sys_openat+0x175/0x210 [ 565.209535][T13767] ? __pfx___x64_sys_openat+0x10/0x10 [ 565.214950][T13767] ? ksys_write+0x1ba/0x250 [ 565.219501][T13767] do_syscall_64+0xcd/0x250 [ 565.224041][T13767] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 565.229975][T13767] RIP: 0033:0x7f5510385d29 [ 565.234416][T13767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 565.254053][T13767] RSP: 002b:00007f551116a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 565.262504][T13767] RAX: ffffffffffffffda RBX: 00007f5510575fa0 RCX: 00007f5510385d29 [ 565.270514][T13767] RDX: 0000000000143000 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 565.278522][T13767] RBP: 00007f551116a090 R08: 0000000000000000 R09: 0000000000000000 [ 565.286529][T13767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 565.294530][T13767] R13: 0000000000000001 R14: 00007f5510575fa0 R15: 00007fff6c871328 [ 565.302556][T13767] [ 565.425369][T13775] binder: 13774:13775 ioctl c0105512 1 returned -22 [ 565.467073][T13770] Invalid ELF header magic: != ELF [ 566.269933][T13797] FAULT_INJECTION: forcing a failure. [ 566.269933][T13797] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 566.293378][T13797] CPU: 1 UID: 0 PID: 13797 Comm: syz.4.2113 Not tainted 6.13.0-rc5-syzkaller #0 [ 566.302491][T13797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 566.312578][T13797] Call Trace: [ 566.315886][T13797] [ 566.318838][T13797] dump_stack_lvl+0x16c/0x1f0 [ 566.323563][T13797] should_fail_ex+0x497/0x5b0 [ 566.328283][T13797] _copy_to_iter+0x4a5/0x1400 [ 566.333013][T13797] ? __pfx__copy_to_iter+0x10/0x10 [ 566.338169][T13797] ? __folio_put+0x32f/0x450 [ 566.342803][T13797] ? __pfx___folio_put+0x10/0x10 [ 566.347787][T13797] copy_page_to_iter+0xf1/0x180 [ 566.352680][T13797] pipe_to_user+0xb0/0x170 [ 566.357139][T13797] ? anon_pipe_buf_release+0x11a/0x240 [ 566.361837][T13799] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2114'. [ 566.362612][T13797] __splice_from_pipe+0x3a0/0x810 [ 566.376515][T13797] ? __pfx_pipe_to_user+0x10/0x10 [ 566.381562][T13797] __do_sys_vmsplice+0x6f9/0xee0 [ 566.386521][T13797] ? __pfx_lock_release+0x10/0x10 [ 566.391570][T13797] ? trace_lock_acquire+0x14e/0x1f0 [ 566.396798][T13797] ? __pfx___do_sys_vmsplice+0x10/0x10 [ 566.402273][T13797] ? ksys_write+0x12b/0x250 [ 566.406818][T13797] ? ksys_write+0x191/0x250 [ 566.411338][T13797] ? __pfx_lock_release+0x10/0x10 [ 566.416398][T13797] ? __fget_files+0x206/0x3a0 [ 566.421097][T13797] ? fput+0x67/0x440 [ 566.425012][T13797] ? ksys_write+0x1ba/0x250 [ 566.429526][T13797] ? __pfx_ksys_write+0x10/0x10 [ 566.434393][T13797] ? do_syscall_64+0xcd/0x250 [ 566.439082][T13797] do_syscall_64+0xcd/0x250 [ 566.443598][T13797] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 566.449505][T13797] RIP: 0033:0x7f2dd3585d29 [ 566.453928][T13797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.473542][T13797] RSP: 002b:00007f2dd43bf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000116 [ 566.481964][T13797] RAX: ffffffffffffffda RBX: 00007f2dd3776080 RCX: 00007f2dd3585d29 [ 566.489941][T13797] RDX: 0000000000000003 RSI: 0000000020000040 RDI: 0000000000000004 [ 566.497916][T13797] RBP: 00007f2dd43bf090 R08: 0000000000000000 R09: 0000000000000000 [ 566.505890][T13797] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 566.513868][T13797] R13: 0000000000000001 R14: 00007f2dd3776080 R15: 00007ffce2d1cb38 [ 566.521861][T13797] [ 566.888278][T13806] FAULT_INJECTION: forcing a failure. [ 566.888278][T13806] name failslab, interval 1, probability 0, space 0, times 0 [ 566.903484][T13806] CPU: 1 UID: 0 PID: 13806 Comm: syz.1.2115 Not tainted 6.13.0-rc5-syzkaller #0 [ 566.912566][T13806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 566.922633][T13806] Call Trace: [ 566.925931][T13806] [ 566.928866][T13806] dump_stack_lvl+0x16c/0x1f0 [ 566.933563][T13806] should_fail_ex+0x497/0x5b0 [ 566.938254][T13806] ? fs_reclaim_acquire+0xae/0x150 [ 566.943377][T13806] should_failslab+0xc2/0x120 [ 566.948071][T13806] __kmalloc_noprof+0xce/0x4f0 [ 566.952847][T13806] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 566.958485][T13806] ? tomoyo_realpath_from_path+0xbf/0x710 [ 566.964218][T13806] tomoyo_realpath_from_path+0xbf/0x710 [ 566.969775][T13806] ? tomoyo_path_number_perm+0x235/0x5b0 [ 566.975431][T13806] tomoyo_path_number_perm+0x248/0x5b0 [ 566.980909][T13806] ? tomoyo_path_number_perm+0x235/0x5b0 [ 566.986563][T13806] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 566.992584][T13806] ? __pfx_lock_release+0x10/0x10 [ 566.997621][T13806] ? trace_lock_acquire+0x14e/0x1f0 [ 567.002842][T13806] ? lock_acquire+0x2f/0xb0 [ 567.007362][T13806] ? __fget_files+0x40/0x3a0 [ 567.011968][T13806] ? __fget_files+0x206/0x3a0 [ 567.016667][T13806] security_file_ioctl+0x9b/0x240 [ 567.021705][T13806] __x64_sys_ioctl+0xb7/0x200 [ 567.026395][T13806] do_syscall_64+0xcd/0x250 [ 567.030917][T13806] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 567.036829][T13806] RIP: 0033:0x7ffaa5d85d29 [ 567.041251][T13806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 567.060870][T13806] RSP: 002b:00007ffaa6b1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 567.069294][T13806] RAX: ffffffffffffffda RBX: 00007ffaa5f76080 RCX: 00007ffaa5d85d29 [ 567.077271][T13806] RDX: 0000000000000038 RSI: 0000000000005404 RDI: 0000000000000003 [ 567.085245][T13806] RBP: 00007ffaa6b1f090 R08: 0000000000000000 R09: 0000000000000000 [ 567.093222][T13806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 567.101196][T13806] R13: 0000000000000001 R14: 00007ffaa5f76080 R15: 00007fff5bbcad98 [ 567.109186][T13806] [ 567.127155][T13806] ERROR: Out of memory at tomoyo_realpath_from_path. [ 567.674492][T13816] capability: warning: `syz.4.2119' uses 32-bit capabilities (legacy support in use) [ 567.956451][T13835] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2125'. [ 568.072781][T13835] bond0: (slave bond_slave_0): Releasing backup interface [ 569.541291][T13866] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 [ 570.304750][ T29] audit: type=1800 audit(1735577511.016:84): pid=13882 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.5.2138" name="dbroot" dev="configfs" ino=35354 res=0 errno=0 [ 570.386726][T13886] FAULT_INJECTION: forcing a failure. [ 570.386726][T13886] name failslab, interval 1, probability 0, space 0, times 0 [ 570.421152][T13886] CPU: 1 UID: 0 PID: 13886 Comm: syz.3.2139 Not tainted 6.13.0-rc5-syzkaller #0 [ 570.430269][T13886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 570.440362][T13886] Call Trace: [ 570.443670][T13886] [ 570.446627][T13886] dump_stack_lvl+0x16c/0x1f0 [ 570.451350][T13886] should_fail_ex+0x497/0x5b0 [ 570.456069][T13886] ? fs_reclaim_acquire+0xae/0x150 [ 570.461221][T13886] should_failslab+0xc2/0x120 [ 570.465948][T13886] __kmalloc_noprof+0xce/0x4f0 [ 570.470752][T13886] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 570.476413][T13886] ? tomoyo_realpath_from_path+0xbf/0x710 [ 570.482162][T13886] tomoyo_realpath_from_path+0xbf/0x710 [ 570.487738][T13886] ? tomoyo_path_number_perm+0x235/0x5b0 [ 570.493403][T13886] tomoyo_path_number_perm+0x248/0x5b0 [ 570.498894][T13886] ? tomoyo_path_number_perm+0x235/0x5b0 [ 570.504558][T13886] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 570.510594][T13886] ? __pfx_lock_release+0x10/0x10 [ 570.515635][T13886] ? trace_lock_acquire+0x14e/0x1f0 [ 570.520854][T13886] ? lock_acquire+0x2f/0xb0 [ 570.525361][T13886] ? __fget_files+0x40/0x3a0 [ 570.529967][T13886] ? __fget_files+0x206/0x3a0 [ 570.534660][T13886] security_file_ioctl+0x9b/0x240 [ 570.539698][T13886] __x64_sys_ioctl+0xb7/0x200 [ 570.544387][T13886] do_syscall_64+0xcd/0x250 [ 570.548906][T13886] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 570.554814][T13886] RIP: 0033:0x7ffa7ad85d29 [ 570.559246][T13886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 570.578954][T13886] RSP: 002b:00007ffa7bbed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 570.587465][T13886] RAX: ffffffffffffffda RBX: 00007ffa7af75fa0 RCX: 00007ffa7ad85d29 [ 570.595443][T13886] RDX: 0000000000000038 RSI: 0000000000005404 RDI: 0000000000000003 [ 570.603419][T13886] RBP: 00007ffa7bbed090 R08: 0000000000000000 R09: 0000000000000000 [ 570.611484][T13886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 570.619459][T13886] R13: 0000000000000000 R14: 00007ffa7af75fa0 R15: 00007ffd7df88d78 [ 570.627451][T13886] [ 570.630601][ C1] vkms_vblank_simulate: vblank timer overrun [ 570.723906][T13884] Process accounting resumed [ 570.729313][T13886] ERROR: Out of memory at tomoyo_realpath_from_path. [ 571.345244][T13911] device-mapper: ioctl: Invalid ioctl structure: uuid , name , dev 400008000010006 [ 572.352700][T13913] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 572.373259][T13913] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 573.038568][T13940] netlink: 338 bytes leftover after parsing attributes in process `syz.3.2153'. [ 573.104527][T13939] netlink: 338 bytes leftover after parsing attributes in process `syz.3.2153'. [ 573.141061][T13939] netlink: 338 bytes leftover after parsing attributes in process `syz.3.2153'. [ 573.216526][T13940] netlink: 338 bytes leftover after parsing attributes in process `syz.3.2153'. [ 573.273938][T13956] FAULT_INJECTION: forcing a failure. [ 573.273938][T13956] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 573.345305][T13958] FAULT_INJECTION: forcing a failure. [ 573.345305][T13958] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 573.359246][T13956] CPU: 1 UID: 0 PID: 13956 Comm: syz.5.2156 Not tainted 6.13.0-rc5-syzkaller #0 [ 573.368329][T13956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 573.378410][T13956] Call Trace: [ 573.381715][T13956] [ 573.384662][T13956] dump_stack_lvl+0x16c/0x1f0 [ 573.389371][T13956] should_fail_ex+0x497/0x5b0 [ 573.394079][T13956] _copy_to_user+0x32/0xd0 [ 573.398530][T13956] simple_read_from_buffer+0xd0/0x160 [ 573.403927][T13956] proc_fail_nth_read+0x198/0x270 [ 573.409004][T13956] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 573.414577][T13956] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 573.420141][T13956] vfs_read+0x1df/0xbe0 [ 573.424319][T13956] ? __fget_files+0x1fc/0x3a0 [ 573.429005][T13956] ? __pfx___mutex_lock+0x10/0x10 [ 573.434044][T13956] ? __pfx_vfs_read+0x10/0x10 [ 573.438746][T13956] ? __fget_files+0x206/0x3a0 [ 573.443444][T13956] ksys_read+0x12b/0x250 [ 573.447696][T13956] ? __pfx_ksys_read+0x10/0x10 [ 573.452477][T13956] do_syscall_64+0xcd/0x250 [ 573.457002][T13956] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 573.462925][T13956] RIP: 0033:0x7f551038473c [ 573.467362][T13956] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 573.486996][T13956] RSP: 002b:00007f551116a030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 573.495445][T13956] RAX: ffffffffffffffda RBX: 00007f5510575fa0 RCX: 00007f551038473c [ 573.503429][T13956] RDX: 000000000000000f RSI: 00007f551116a0a0 RDI: 0000000000000004 [ 573.511413][T13956] RBP: 00007f551116a090 R08: 0000000000000000 R09: 0000000000000000 [ 573.519393][T13956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 573.527372][T13956] R13: 0000000000000000 R14: 00007f5510575fa0 R15: 00007fff6c871328 [ 573.535379][T13956] [ 573.538534][ C1] vkms_vblank_simulate: vblank timer overrun [ 573.613583][T13958] CPU: 1 UID: 0 PID: 13958 Comm: syz.4.2157 Not tainted 6.13.0-rc5-syzkaller #0 [ 573.622787][T13958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 573.632882][T13958] Call Trace: [ 573.636189][T13958] [ 573.639147][T13958] dump_stack_lvl+0x16c/0x1f0 [ 573.643866][T13958] should_fail_ex+0x497/0x5b0 [ 573.648586][T13958] _copy_from_iter+0x29b/0x1400 [ 573.653477][T13958] ? trace_lock_acquire+0x14e/0x1f0 [ 573.658713][T13958] ? __alloc_skb+0x200/0x380 [ 573.663343][T13958] ? __pfx__copy_from_iter+0x10/0x10 [ 573.668668][T13958] ? __virt_addr_valid+0x1a4/0x590 [ 573.673817][T13958] ? __virt_addr_valid+0x5e/0x590 [ 573.678872][T13958] ? __phys_addr_symbol+0x30/0x80 [ 573.683929][T13958] ? __check_object_size+0x488/0x710 [ 573.689258][T13958] netlink_sendmsg+0x813/0xd70 [ 573.694058][T13958] ? __pfx_netlink_sendmsg+0x10/0x10 [ 573.699380][T13958] ____sys_sendmsg+0x9ae/0xb40 [ 573.704170][T13958] ? copy_msghdr_from_user+0x10b/0x160 [ 573.709664][T13958] ? __pfx_____sys_sendmsg+0x10/0x10 [ 573.714977][T13958] ? __lock_acquire+0xcc5/0x3c40 [ 573.719947][T13958] ? hlock_class+0x4e/0x130 [ 573.724487][T13958] ? __lock_acquire+0x15a9/0x3c40 [ 573.729540][T13958] ___sys_sendmsg+0x135/0x1e0 [ 573.734258][T13958] ? __pfx____sys_sendmsg+0x10/0x10 [ 573.739485][T13958] ? __pfx___lock_acquire+0x10/0x10 [ 573.744736][T13958] ? __pfx___might_resched+0x10/0x10 [ 573.750048][T13958] ? __might_fault+0xe3/0x190 [ 573.754767][T13958] __sys_sendmmsg+0x201/0x420 [ 573.759490][T13958] ? __pfx___sys_sendmmsg+0x10/0x10 [ 573.764825][T13958] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 573.770845][T13958] ? fput+0x67/0x440 [ 573.774774][T13958] ? ksys_write+0x1ba/0x250 [ 573.779304][T13958] ? __pfx_ksys_write+0x10/0x10 [ 573.784194][T13958] __x64_sys_sendmmsg+0x9c/0x100 [ 573.789169][T13958] ? lockdep_hardirqs_on+0x7c/0x110 [ 573.794397][T13958] do_syscall_64+0xcd/0x250 [ 573.798969][T13958] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 573.804922][T13958] RIP: 0033:0x7f2dd3585d29 [ 573.809367][T13958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 573.829016][T13958] RSP: 002b:00007f2dd43e0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 573.837482][T13958] RAX: ffffffffffffffda RBX: 00007f2dd3775fa0 RCX: 00007f2dd3585d29 [ 573.845834][T13958] RDX: 0000000000000003 RSI: 0000000020000080 RDI: 0000000000000003 [ 573.853837][T13958] RBP: 00007f2dd43e0090 R08: 0000000000000000 R09: 0000000000000000 [ 573.861833][T13958] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 573.869828][T13958] R13: 0000000000000000 R14: 00007f2dd3775fa0 R15: 00007ffce2d1cb38 [ 573.877843][T13958] [ 573.880939][ C1] vkms_vblank_simulate: vblank timer overrun [ 575.156034][T13976] Invalid ELF header magic: != ELF [ 575.959313][T13982] nfs: Unknown parameter 'w`_I+; HY Lu>>uh*C<+ ' [ 576.040349][T13984] FAULT_INJECTION: forcing a failure. [ 576.040349][T13984] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 576.143183][T13984] CPU: 0 UID: 0 PID: 13984 Comm: syz.1.2166 Not tainted 6.13.0-rc5-syzkaller #0 [ 576.152290][T13984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 576.162403][T13984] Call Trace: [ 576.165701][T13984] [ 576.168653][T13984] dump_stack_lvl+0x16c/0x1f0 [ 576.173402][T13984] should_fail_ex+0x497/0x5b0 [ 576.178118][T13984] _copy_from_user+0x2e/0xd0 [ 576.182753][T13984] generic_map_lookup_batch+0x428/0xb90 [ 576.188346][T13984] ? __pfx_lock_release+0x10/0x10 [ 576.190687][T13986] Invalid ELF header magic: != ELF [ 576.193390][T13984] ? __pfx_generic_map_lookup_batch+0x10/0x10 [ 576.193420][T13984] ? lock_acquire+0x2f/0xb0 [ 576.193440][T13984] ? __might_fault+0xe3/0x190 [ 576.213918][T13984] ? __pfx_generic_map_lookup_batch+0x10/0x10 [ 576.220024][T13984] bpf_map_do_batch+0x483/0x640 [ 576.224921][T13984] __sys_bpf+0x55a2/0x57a0 [ 576.229379][T13984] ? __pfx___sys_bpf+0x10/0x10 [ 576.234170][T13984] ? vfs_write+0x306/0x1150 [ 576.238721][T13984] ? __pfx_vfs_write+0x10/0x10 [ 576.243513][T13984] ? do_sys_openat2+0xb1/0x1e0 [ 576.248339][T13984] ? ksys_write+0x1ba/0x250 [ 576.252869][T13984] ? __pfx_ksys_write+0x10/0x10 [ 576.257753][T13984] __x64_sys_bpf+0x78/0xc0 [ 576.262209][T13984] ? lockdep_hardirqs_on+0x7c/0x110 [ 576.267459][T13984] do_syscall_64+0xcd/0x250 [ 576.271995][T13984] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 576.277925][T13984] RIP: 0033:0x7ffaa5d85d29 [ 576.282378][T13984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 576.302022][T13984] RSP: 002b:00007ffaa6b40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 576.310471][T13984] RAX: ffffffffffffffda RBX: 00007ffaa5f75fa0 RCX: 00007ffaa5d85d29 [ 576.318498][T13984] RDX: 0000000000000092 RSI: 0000000020000040 RDI: 0000000000000018 [ 576.326515][T13984] RBP: 00007ffaa6b40090 R08: 0000000000000000 R09: 0000000000000000 [ 576.334523][T13984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 576.342536][T13984] R13: 0000000000000000 R14: 00007ffaa5f75fa0 R15: 00007fff5bbcad98 [ 576.350567][T13984] [ 578.096548][T14008] FAULT_INJECTION: forcing a failure. [ 578.096548][T14008] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 578.132059][T14008] CPU: 0 UID: 0 PID: 14008 Comm: syz.4.2175 Not tainted 6.13.0-rc5-syzkaller #0 [ 578.141177][T14008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 578.151262][T14008] Call Trace: [ 578.154563][T14008] [ 578.157539][T14008] dump_stack_lvl+0x16c/0x1f0 [ 578.162265][T14008] should_fail_ex+0x497/0x5b0 [ 578.166985][T14008] _copy_from_iter+0x29b/0x1400 [ 578.171888][T14008] ? trace_lock_acquire+0x14e/0x1f0 [ 578.177123][T14008] ? __alloc_skb+0x200/0x380 [ 578.181840][T14008] ? __pfx__copy_from_iter+0x10/0x10 [ 578.187164][T14008] ? __virt_addr_valid+0x1a4/0x590 [ 578.192299][T14008] ? __virt_addr_valid+0x5e/0x590 [ 578.197348][T14008] ? __phys_addr_symbol+0x30/0x80 [ 578.202388][T14008] ? __check_object_size+0x488/0x710 [ 578.207692][T14008] netlink_sendmsg+0x813/0xd70 [ 578.212472][T14008] ? __pfx_netlink_sendmsg+0x10/0x10 [ 578.217776][T14008] ____sys_sendmsg+0x9ae/0xb40 [ 578.222550][T14008] ? copy_msghdr_from_user+0x10b/0x160 [ 578.228030][T14008] ? __pfx_____sys_sendmsg+0x10/0x10 [ 578.233351][T14008] ___sys_sendmsg+0x135/0x1e0 [ 578.238046][T14008] ? __pfx____sys_sendmsg+0x10/0x10 [ 578.243268][T14008] ? __pfx_lock_release+0x10/0x10 [ 578.248299][T14008] ? trace_lock_acquire+0x14e/0x1f0 [ 578.253526][T14008] ? __fget_files+0x206/0x3a0 [ 578.258220][T14008] __sys_sendmsg+0x16e/0x220 [ 578.262841][T14008] ? __pfx___sys_sendmsg+0x10/0x10 [ 578.268009][T14008] do_syscall_64+0xcd/0x250 [ 578.272561][T14008] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 578.278495][T14008] RIP: 0033:0x7f2dd3585d29 [ 578.282919][T14008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 578.302637][T14008] RSP: 002b:00007f2dd43e0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 578.311188][T14008] RAX: ffffffffffffffda RBX: 00007f2dd3775fa0 RCX: 00007f2dd3585d29 [ 578.319349][T14008] RDX: 0000000004040810 RSI: 0000000020000240 RDI: 0000000000000003 [ 578.327330][T14008] RBP: 00007f2dd43e0090 R08: 0000000000000000 R09: 0000000000000000 [ 578.335311][T14008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 578.343289][T14008] R13: 0000000000000000 R14: 00007f2dd3775fa0 R15: 00007ffce2d1cb38 [ 578.351374][T14008] [ 578.427841][T14011] FAULT_INJECTION: forcing a failure. [ 578.427841][T14011] name failslab, interval 1, probability 0, space 0, times 0 [ 578.441306][T14011] CPU: 0 UID: 0 PID: 14011 Comm: syz.5.2174 Not tainted 6.13.0-rc5-syzkaller #0 [ 578.450379][T14011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 578.460467][T14011] Call Trace: [ 578.463776][T14011] [ 578.466728][T14011] dump_stack_lvl+0x16c/0x1f0 [ 578.471448][T14011] should_fail_ex+0x497/0x5b0 [ 578.476334][T14011] ? fs_reclaim_acquire+0xae/0x150 [ 578.481483][T14011] should_failslab+0xc2/0x120 [ 578.486214][T14011] __kmalloc_cache_noprof+0x68/0x420 [ 578.491538][T14011] ? __genradix_ptr_alloc+0x32e/0x5d0 [ 578.496957][T14011] sctp_auth_shkey_create+0x87/0x1f0 [ 578.502713][T14011] sctp_auth_asoc_copy_shkeys+0x1f4/0x360 [ 578.508469][T14011] sctp_association_new+0x1978/0x28b0 [ 578.513874][T14011] sctp_connect_new_asoc+0x1b7/0x790 [ 578.519180][T14011] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 578.525006][T14011] ? lock_acquire+0x2f/0xb0 [ 578.529528][T14011] ? sctp_endpoint_lookup_assoc+0xac/0x2a0 [ 578.535371][T14011] __sctp_connect+0x3f5/0xc60 [ 578.540072][T14011] ? sctp_inet_connect+0xac/0x200 [ 578.545128][T14011] ? __pfx___sctp_connect+0x10/0x10 [ 578.550349][T14011] ? __pfx_sctp_inet_connect+0x10/0x10 [ 578.555827][T14011] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 578.561736][T14011] ? __pfx_sctp_inet_connect+0x10/0x10 [ 578.567206][T14011] sctp_inet_connect+0x15f/0x200 [ 578.572160][T14011] __sys_connect_file+0x13e/0x1a0 [ 578.577202][T14011] __sys_connect+0x14f/0x170 [ 578.581803][T14011] ? __pfx___sys_connect+0x10/0x10 [ 578.586937][T14011] ? __pfx_ksys_write+0x10/0x10 [ 578.591801][T14011] __x64_sys_connect+0x72/0xb0 [ 578.596573][T14011] ? lockdep_hardirqs_on+0x7c/0x110 [ 578.601785][T14011] do_syscall_64+0xcd/0x250 [ 578.606309][T14011] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 578.612240][T14011] RIP: 0033:0x7f5510385d29 [ 578.616667][T14011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 578.636291][T14011] RSP: 002b:00007f551116a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 578.644721][T14011] RAX: ffffffffffffffda RBX: 00007f5510575fa0 RCX: 00007f5510385d29 [ 578.652697][T14011] RDX: 0000000000000054 RSI: 0000000020000080 RDI: 0000000000000003 [ 578.660670][T14011] RBP: 00007f551116a090 R08: 0000000000000000 R09: 0000000000000000 [ 578.668732][T14011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 578.676708][T14011] R13: 0000000000000000 R14: 00007f5510575fa0 R15: 00007fff6c871328 [ 578.684699][T14011] [ 578.896565][T14021] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2178'. [ 578.989124][T14023] ima: policy update failed [ 579.001451][ T29] audit: type=1802 audit(8277292041.120:85): pid=14023 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=policy_update cause=failed comm="syz.5.2179" res=0 errno=0 [ 579.080611][T14027] openvswitch: netlink: Tunnel attr 0 has unexpected len 0 expected 8 [ 579.090171][T14027] openvswitch: netlink: Tunnel attr 0 has unexpected len 0 expected 8 [ 579.911420][T14013] EXT4-fs error (device sda1): ext4_validate_block_bitmap:423: comm syz.1.2176: bg 1: bad block bitmap checksum [ 579.945312][T14013] EXT4-fs error (device sda1) in ext4_mb_clear_bb:6550: Filesystem failed CRC [ 580.269400][T14041] FAULT_INJECTION: forcing a failure. [ 580.269400][T14041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 580.323168][T14041] CPU: 1 UID: 0 PID: 14041 Comm: syz.4.2185 Not tainted 6.13.0-rc5-syzkaller #0 [ 580.332268][T14041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 580.342440][T14041] Call Trace: [ 580.345744][T14041] [ 580.348693][T14041] dump_stack_lvl+0x16c/0x1f0 [ 580.353411][T14041] should_fail_ex+0x497/0x5b0 [ 580.358126][T14041] _copy_to_user+0x32/0xd0 [ 580.362578][T14041] simple_read_from_buffer+0xd0/0x160 [ 580.367984][T14041] proc_fail_nth_read+0x198/0x270 [ 580.373152][T14041] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 580.378751][T14041] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 580.384337][T14041] vfs_read+0x1df/0xbe0 [ 580.388526][T14041] ? __fget_files+0x1fc/0x3a0 [ 580.393236][T14041] ? __pfx___mutex_lock+0x10/0x10 [ 580.398309][T14041] ? __pfx_vfs_read+0x10/0x10 [ 580.403028][T14041] ? __fget_files+0x206/0x3a0 [ 580.407753][T14041] ksys_read+0x12b/0x250 [ 580.412040][T14041] ? __pfx_ksys_read+0x10/0x10 [ 580.416861][T14041] do_syscall_64+0xcd/0x250 [ 580.421401][T14041] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 580.427330][T14041] RIP: 0033:0x7f2dd358473c [ 580.431771][T14041] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 580.451408][T14041] RSP: 002b:00007f2dd43e0030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 580.459855][T14041] RAX: ffffffffffffffda RBX: 00007f2dd3775fa0 RCX: 00007f2dd358473c [ 580.467855][T14041] RDX: 000000000000000f RSI: 00007f2dd43e00a0 RDI: 0000000000000005 [ 580.475855][T14041] RBP: 00007f2dd43e0090 R08: 0000000000000000 R09: 0000000000000000 [ 580.483850][T14041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 580.491842][T14041] R13: 0000000000000000 R14: 00007f2dd3775fa0 R15: 00007ffce2d1cb38 [ 580.499852][T14041] [ 580.751437][T14058] Process accounting resumed [ 580.760398][T14056] netlink: 8 bytes leftover after parsing attributes in process `syz.5.2190'. [ 580.793141][T14058] FAULT_INJECTION: forcing a failure. [ 580.793141][T14058] name failslab, interval 1, probability 0, space 0, times 0 [ 580.871095][T14056] Invalid ELF header magic: != ELF [ 580.880373][T14058] CPU: 1 UID: 0 PID: 14058 Comm: syz.1.2187 Not tainted 6.13.0-rc5-syzkaller #0 [ 580.889452][T14058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 580.899537][T14058] Call Trace: [ 580.902832][T14058] [ 580.905784][T14058] dump_stack_lvl+0x16c/0x1f0 [ 580.910505][T14058] should_fail_ex+0x497/0x5b0 [ 580.915217][T14058] ? fs_reclaim_acquire+0xae/0x150 [ 580.920375][T14058] should_failslab+0xc2/0x120 [ 580.925103][T14058] __kmalloc_cache_noprof+0x68/0x420 [ 580.930427][T14058] ? rcu_is_watching+0x12/0xc0 [ 580.935230][T14058] ? trace_kmalloc+0x2d/0xd0 [ 580.939851][T14058] ? __pfx_free_modprobe_argv+0x10/0x10 [ 580.945431][T14058] call_usermodehelper_setup+0x9a/0x340 [ 580.951015][T14058] __request_module+0x3d6/0x6c0 [ 580.955907][T14058] ? tcp_ca_find_autoload+0x10d/0x2f0 [ 580.961311][T14058] ? __pfx___request_module+0x10/0x10 [ 580.966721][T14058] ? aa_get_newest_label+0x376/0x680 [ 580.972130][T14058] ? find_held_lock+0x2d/0x110 [ 580.976928][T14058] ? __pfx_lock_release+0x10/0x10 [ 580.981970][T14058] ? tcp_ca_find_autoload+0xec/0x2f0 [ 580.987280][T14058] tcp_ca_find_autoload+0x10d/0x2f0 [ 580.992516][T14058] tcp_set_default_congestion_control+0x63/0x3b0 [ 580.998861][T14058] proc_tcp_congestion_control+0x19a/0x1b0 [ 581.004690][T14058] ? __pfx_proc_tcp_congestion_control+0x10/0x10 [ 581.011046][T14058] ? __phys_addr_symbol+0x30/0x80 [ 581.016096][T14058] ? __check_object_size+0x488/0x710 [ 581.021488][T14058] proc_sys_call_handler+0x403/0x5d0 [ 581.026797][T14058] ? __pfx_proc_sys_call_handler+0x10/0x10 [ 581.032618][T14058] ? hlock_class+0x4e/0x130 [ 581.037162][T14058] ? __lock_acquire+0xcc5/0x3c40 [ 581.042111][T14058] ? __pfx_proc_sys_write+0x10/0x10 [ 581.047405][T14058] __kernel_write_iter+0x318/0xa80 [ 581.052529][T14058] ? __pfx___kernel_write_iter+0x10/0x10 [ 581.058279][T14058] __kernel_write+0xf6/0x140 [ 581.062893][T14058] ? __pfx___kernel_write+0x10/0x10 [ 581.068108][T14058] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 581.073755][T14058] ? rcu_is_watching+0x12/0xc0 [ 581.078537][T14058] ? acct_pin_kill+0x2d/0x100 [ 581.083224][T14058] ? lock_acquire+0x2f/0xb0 [ 581.087736][T14058] ? acct_pin_kill+0x2d/0x100 [ 581.092425][T14058] do_acct_process+0xcb0/0x14a0 [ 581.097301][T14058] ? __pfx_do_acct_process+0x10/0x10 [ 581.102636][T14058] ? do_raw_spin_lock+0x12d/0x2c0 [ 581.107684][T14058] acct_pin_kill+0x2d/0x100 [ 581.112198][T14058] pin_kill+0x194/0x7c0 [ 581.116386][T14058] ? __pfx_pin_kill+0x10/0x10 [ 581.121084][T14058] ? rcu_is_watching+0x12/0xc0 [ 581.125860][T14058] ? __pfx_autoremove_wake_function+0x10/0x10 [ 581.131946][T14058] ? __x64_sys_acct+0xfe/0x220 [ 581.136717][T14058] ? lock_acquire+0x2f/0xb0 [ 581.141243][T14058] ? __x64_sys_acct+0xfe/0x220 [ 581.146044][T14058] __x64_sys_acct+0x15b/0x220 [ 581.150751][T14058] ? lockdep_hardirqs_on+0x7c/0x110 [ 581.155987][T14058] do_syscall_64+0xcd/0x250 [ 581.160532][T14058] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 581.166535][T14058] RIP: 0033:0x7ffaa5d85d29 [ 581.170974][T14058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 581.190686][T14058] RSP: 002b:00007ffaa6b1f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 581.199137][T14058] RAX: ffffffffffffffda RBX: 00007ffaa5f76080 RCX: 00007ffaa5d85d29 [ 581.207141][T14058] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 581.215132][T14058] RBP: 00007ffaa6b1f090 R08: 0000000000000000 R09: 0000000000000000 [ 581.223127][T14058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 581.231105][T14058] R13: 0000000000000000 R14: 00007ffaa5f76080 R15: 00007fff5bbcad98 [ 581.239192][T14058] [ 581.455416][T14068] FAULT_INJECTION: forcing a failure. [ 581.455416][T14068] name failslab, interval 1, probability 0, space 0, times 0 [ 581.485456][T14068] CPU: 1 UID: 0 PID: 14068 Comm: syz.4.2194 Not tainted 6.13.0-rc5-syzkaller #0 [ 581.494555][T14068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 581.504642][T14068] Call Trace: [ 581.507937][T14068] [ 581.510896][T14068] dump_stack_lvl+0x16c/0x1f0 [ 581.515623][T14068] should_fail_ex+0x497/0x5b0 [ 581.520343][T14068] ? fs_reclaim_acquire+0xae/0x150 [ 581.525492][T14068] should_failslab+0xc2/0x120 [ 581.530220][T14068] kmem_cache_alloc_node_noprof+0x72/0x3b0 [ 581.536073][T14068] ? __alloc_skb+0x2b3/0x380 [ 581.540700][T14068] __alloc_skb+0x2b3/0x380 [ 581.545148][T14068] ? __pfx___alloc_skb+0x10/0x10 [ 581.550135][T14068] netlink_alloc_large_skb+0x69/0x130 [ 581.555542][T14068] netlink_sendmsg+0x689/0xd70 [ 581.560343][T14068] ? __pfx_netlink_sendmsg+0x10/0x10 [ 581.565667][T14068] ____sys_sendmsg+0x9ae/0xb40 [ 581.570471][T14068] ? copy_msghdr_from_user+0x10b/0x160 [ 581.576054][T14068] ? __pfx_____sys_sendmsg+0x10/0x10 [ 581.581384][T14068] ___sys_sendmsg+0x135/0x1e0 [ 581.586105][T14068] ? __pfx____sys_sendmsg+0x10/0x10 [ 581.591355][T14068] ? __pfx_lock_release+0x10/0x10 [ 581.596408][T14068] ? trace_lock_acquire+0x14e/0x1f0 [ 581.601652][T14068] ? __fget_files+0x206/0x3a0 [ 581.606369][T14068] __sys_sendmsg+0x16e/0x220 [ 581.611000][T14068] ? __pfx___sys_sendmsg+0x10/0x10 [ 581.616180][T14068] do_syscall_64+0xcd/0x250 [ 581.620728][T14068] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 581.626680][T14068] RIP: 0033:0x7f2dd3585d29 [ 581.631123][T14068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 581.650766][T14068] RSP: 002b:00007f2dd43e0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 581.659309][T14068] RAX: ffffffffffffffda RBX: 00007f2dd3775fa0 RCX: 00007f2dd3585d29 [ 581.667320][T14068] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000003 [ 581.675329][T14068] RBP: 00007f2dd43e0090 R08: 0000000000000000 R09: 0000000000000000 [ 581.683330][T14068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 581.691337][T14068] R13: 0000000000000000 R14: 00007f2dd3775fa0 R15: 00007ffce2d1cb38 [ 581.699364][T14068] [ 582.008845][T14076] Invalid ELF header magic: != ELF [ 582.144621][T14081] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2198'. [ 582.184493][T14081] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2198'. [ 582.978350][T14098] Invalid ELF header magic: != ELF [ 583.031855][T14103] FAULT_INJECTION: forcing a failure. [ 583.031855][T14103] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 583.071650][T14103] CPU: 1 UID: 0 PID: 14103 Comm: syz.4.2206 Not tainted 6.13.0-rc5-syzkaller #0 [ 583.080754][T14103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 583.090819][T14103] Call Trace: [ 583.094112][T14103] [ 583.097048][T14103] dump_stack_lvl+0x16c/0x1f0 [ 583.101751][T14103] should_fail_ex+0x497/0x5b0 [ 583.106445][T14103] _copy_from_iter+0x29b/0x1400 [ 583.111316][T14103] ? trace_lock_acquire+0x14e/0x1f0 [ 583.116534][T14103] ? __alloc_skb+0x200/0x380 [ 583.121141][T14103] ? __pfx__copy_from_iter+0x10/0x10 [ 583.126458][T14103] ? __virt_addr_valid+0x1a4/0x590 [ 583.131600][T14103] ? __virt_addr_valid+0x5e/0x590 [ 583.136645][T14103] ? __phys_addr_symbol+0x30/0x80 [ 583.141690][T14103] ? __check_object_size+0x488/0x710 [ 583.147017][T14103] netlink_sendmsg+0x813/0xd70 [ 583.151814][T14103] ? __pfx_netlink_sendmsg+0x10/0x10 [ 583.157129][T14103] ____sys_sendmsg+0x9ae/0xb40 [ 583.161912][T14103] ? copy_msghdr_from_user+0x10b/0x160 [ 583.167394][T14103] ? __pfx_____sys_sendmsg+0x10/0x10 [ 583.172702][T14103] ___sys_sendmsg+0x135/0x1e0 [ 583.177395][T14103] ? __pfx____sys_sendmsg+0x10/0x10 [ 583.182620][T14103] ? __pfx_lock_release+0x10/0x10 [ 583.187660][T14103] ? trace_lock_acquire+0x14e/0x1f0 [ 583.192882][T14103] ? __fget_files+0x206/0x3a0 [ 583.197576][T14103] __sys_sendmsg+0x16e/0x220 [ 583.202183][T14103] ? __pfx___sys_sendmsg+0x10/0x10 [ 583.207328][T14103] do_syscall_64+0xcd/0x250 [ 583.211850][T14103] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 583.217762][T14103] RIP: 0033:0x7f2dd3585d29 [ 583.222186][T14103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 583.241802][T14103] RSP: 002b:00007f2dd43e0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 583.250227][T14103] RAX: ffffffffffffffda RBX: 00007f2dd3775fa0 RCX: 00007f2dd3585d29 [ 583.258213][T14103] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000000000003 [ 583.266190][T14103] RBP: 00007f2dd43e0090 R08: 0000000000000000 R09: 0000000000000000 [ 583.274164][T14103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 583.282138][T14103] R13: 0000000000000000 R14: 00007f2dd3775fa0 R15: 00007ffce2d1cb38 [ 583.290129][T14103] [ 583.615033][T14131] FAULT_INJECTION: forcing a failure. [ 583.615033][T14131] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 583.629297][T14131] CPU: 1 UID: 0 PID: 14131 Comm: syz.4.2208 Not tainted 6.13.0-rc5-syzkaller #0 [ 583.638374][T14131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 583.648463][T14131] Call Trace: [ 583.651764][T14131] [ 583.654716][T14131] dump_stack_lvl+0x16c/0x1f0 [ 583.659416][T14131] should_fail_ex+0x497/0x5b0 [ 583.664109][T14131] ? fs_reclaim_acquire+0xae/0x150 [ 583.669232][T14131] should_fail_alloc_page+0xe7/0x130 [ 583.674537][T14131] prepare_alloc_pages.constprop.0+0x16f/0x560 [ 583.680702][T14131] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 583.686878][T14131] __alloc_pages_noprof+0x190/0x25b0 [ 583.692177][T14131] ? __kernel_text_address+0xd/0x40 [ 583.697388][T14131] ? arch_stack_walk+0xa7/0x100 [ 583.702259][T14131] ? hlock_class+0x4e/0x130 [ 583.706778][T14131] ? __pfx___alloc_pages_noprof+0x10/0x10 [ 583.712521][T14131] ? __pfx___lock_acquire+0x10/0x10 [ 583.717728][T14131] ? kasan_save_stack+0x42/0x60 [ 583.722626][T14131] ? kasan_save_stack+0x33/0x60 [ 583.727511][T14131] ? kasan_save_track+0x14/0x30 [ 583.732391][T14131] ? kasan_save_free_info+0x3b/0x60 [ 583.737617][T14131] ? __kasan_slab_free+0x51/0x70 [ 583.742577][T14131] ? kmem_cache_free+0x152/0x4c0 [ 583.747536][T14131] ? alloc_vmap_area+0x1f98/0x2a70 [ 583.752669][T14131] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 583.758584][T14131] ? policy_nodemask+0xea/0x4e0 [ 583.763454][T14131] alloc_pages_mpol_noprof+0x2c9/0x610 [ 583.768935][T14131] ? __pfx_alloc_pages_mpol_noprof+0x10/0x10 [ 583.774934][T14131] ? do_raw_spin_lock+0x12d/0x2c0 [ 583.779986][T14131] ? lock_acquire+0x2f/0xb0 [ 583.784495][T14131] ? kasan_populate_vmalloc_pte+0xfb/0x160 [ 583.790315][T14131] ? __pfx_kasan_populate_vmalloc_pte+0x10/0x10 [ 583.796566][T14131] get_free_pages_noprof+0xc/0x40 [ 583.801598][T14131] kasan_populate_vmalloc_pte+0x2d/0x160 [ 583.807242][T14131] ? __pfx_kasan_populate_vmalloc_pte+0x10/0x10 [ 583.813506][T14131] __apply_to_page_range+0x5fd/0xd30 [ 583.818808][T14131] ? __pfx_kasan_populate_vmalloc_pte+0x10/0x10 [ 583.825157][T14131] ? __pfx___apply_to_page_range+0x10/0x10 [ 583.830987][T14131] ? insert_vmap_area+0x2ef/0x4d0 [ 583.836026][T14131] alloc_vmap_area+0x93e/0x2a70 [ 583.840897][T14131] ? __pfx_alloc_vmap_area+0x10/0x10 [ 583.846198][T14131] __get_vm_area_node+0x19e/0x2f0 [ 583.851240][T14131] __vmalloc_node_range_noprof+0x26a/0x1530 [ 583.857146][T14131] ? __do_sys_init_module+0x13c/0x220 [ 583.862526][T14131] ? ksys_write+0x12b/0x250 [ 583.867040][T14131] ? find_held_lock+0x2d/0x110 [ 583.871824][T14131] ? __do_sys_init_module+0x13c/0x220 [ 583.877206][T14131] ? aa_get_newest_label+0x376/0x680 [ 583.882507][T14131] ? __pfx_aa_get_newest_label+0x10/0x10 [ 583.888154][T14131] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 583.894500][T14131] ? apparmor_capable+0x114/0x1d0 [ 583.899538][T14131] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 583.905529][T14131] ? __do_sys_init_module+0x13c/0x220 [ 583.910908][T14131] __vmalloc_noprof+0x6d/0x90 [ 583.915598][T14131] ? __do_sys_init_module+0x13c/0x220 [ 583.920978][T14131] __do_sys_init_module+0x13c/0x220 [ 583.926187][T14131] ? __pfx___do_sys_init_module+0x10/0x10 [ 583.931933][T14131] do_syscall_64+0xcd/0x250 [ 583.936458][T14131] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 583.942366][T14131] RIP: 0033:0x7f2dd3585d29 [ 583.946874][T14131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 583.966490][T14131] RSP: 002b:00007f2dd43e0038 EFLAGS: 00000246 ORIG_RAX: 00000000000000af [ 583.974914][T14131] RAX: ffffffffffffffda RBX: 00007f2dd3775fa0 RCX: 00007f2dd3585d29 [ 583.982890][T14131] RDX: 0000000020000140 RSI: 00000000000ffff9 RDI: 0000000000000000 [ 583.990865][T14131] RBP: 00007f2dd43e0090 R08: 0000000000000000 R09: 0000000000000000 [ 583.998837][T14131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 584.006812][T14131] R13: 0000000000000000 R14: 00007f2dd3775fa0 R15: 00007ffce2d1cb38 [ 584.014802][T14131] [ 586.098234][T14177] delete_channel: no stack [ 587.214446][T14202] FAULT_INJECTION: forcing a failure. [ 587.214446][T14202] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 587.273159][T14202] CPU: 1 UID: 0 PID: 14202 Comm: syz.1.2221 Not tainted 6.13.0-rc5-syzkaller #0 [ 587.282275][T14202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 587.292390][T14202] Call Trace: [ 587.295702][T14202] [ 587.298662][T14202] dump_stack_lvl+0x16c/0x1f0 [ 587.303386][T14202] should_fail_ex+0x497/0x5b0 [ 587.308114][T14202] ? fs_reclaim_acquire+0xae/0x150 [ 587.313281][T14202] should_fail_alloc_page+0xe7/0x130 [ 587.318642][T14202] prepare_alloc_pages.constprop.0+0x16f/0x560 [ 587.324861][T14202] __alloc_pages_noprof+0x190/0x25b0 [ 587.330213][T14202] ? hlock_class+0x4e/0x130 [ 587.334758][T14202] ? mark_lock+0xb5/0xc60 [ 587.339299][T14202] ? __pfx_mark_lock+0x10/0x10 [ 587.344126][T14202] ? hlock_class+0x4e/0x130 [ 587.348683][T14202] ? __pfx_mark_lock+0x10/0x10 [ 587.353493][T14202] ? __pfx___alloc_pages_noprof+0x10/0x10 [ 587.359260][T14202] ? hlock_class+0x4e/0x130 [ 587.363797][T14202] ? __lock_acquire+0xcc5/0x3c40 [ 587.368853][T14202] ? hlock_class+0x4e/0x130 [ 587.373397][T14202] ? hlock_class+0x4e/0x130 [ 587.377937][T14202] ? hlock_class+0x4e/0x130 [ 587.382480][T14202] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 587.388413][T14202] ? policy_nodemask+0xea/0x4e0 [ 587.393310][T14202] alloc_pages_mpol_noprof+0x2c9/0x610 [ 587.398809][T14202] ? __pfx_alloc_pages_mpol_noprof+0x10/0x10 [ 587.404827][T14202] ? __pfx___lock_acquire+0x10/0x10 [ 587.410052][T14202] ? find_held_lock+0x2d/0x110 [ 587.414863][T14202] pte_alloc_one+0x20/0x390 [ 587.419404][T14202] do_pte_missing+0x1ae7/0x3e00 [ 587.424309][T14202] __handle_mm_fault+0x103c/0x2a40 [ 587.429476][T14202] ? __pfx___handle_mm_fault+0x10/0x10 [ 587.434970][T14202] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 587.440648][T14202] ? find_vma+0xc0/0x140 [ 587.444924][T14202] ? __pfx_find_vma+0x10/0x10 [ 587.449718][T14202] ? reacquire_held_locks+0x20b/0x4c0 [ 587.455214][T14202] handle_mm_fault+0x3fa/0xaa0 [ 587.460024][T14202] do_user_addr_fault+0x7a3/0x13f0 [ 587.465172][T14202] exc_page_fault+0x5c/0xc0 [ 587.469705][T14202] asm_exc_page_fault+0x26/0x30 [ 587.474597][T14202] RIP: 0010:rep_movs_alternative+0x4a/0x70 [ 587.480442][T14202] Code: 75 f1 c3 cc cc cc cc 66 0f 1f 84 00 00 00 00 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 c3 cc cc cc cc 48 89 c8 48 c1 e9 03 83 e0 07 f3 48 a5 89 c1 [ 587.500093][T14202] RSP: 0018:ffffc9000d0b76a0 EFLAGS: 00050206 [ 587.506204][T14202] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000068 [ 587.514386][T14202] RDX: fffff52001a16f09 RSI: 0000000000000000 RDI: ffffc9000d0b77e0 [ 587.522389][T14202] RBP: 0000000000000068 R08: 0000000000000001 R09: fffff52001a16f08 [ 587.530390][T14202] R10: ffffc9000d0b7847 R11: 0000000000000000 R12: 0000000000000000 [ 587.538401][T14202] R13: ffffc9000d0b77e0 R14: 1ffff92001a16ede R15: ffff888061cc0000 [ 587.546418][T14202] _copy_from_user+0x9a/0xd0 [ 587.551058][T14202] do_ip_vs_get_ctl+0x2b1/0x1110 [ 587.556042][T14202] ? __pfx_do_ip_vs_get_ctl+0x10/0x10 [ 587.561455][T14202] ? __mutex_lock+0x1cc/0xa60 [ 587.566162][T14202] ? __pfx___lock_acquire+0x10/0x10 [ 587.571386][T14202] ? __mutex_unlock_slowpath+0x164/0x690 [ 587.577063][T14202] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 587.583099][T14202] ? nf_getsockopt+0x79/0xe0 [ 587.587727][T14202] nf_getsockopt+0x79/0xe0 [ 587.592183][T14202] ip_getsockopt+0x18e/0x1e0 [ 587.596808][T14202] ? __pfx_ip_getsockopt+0x10/0x10 [ 587.601941][T14202] ? __lock_acquire+0x15a9/0x3c40 [ 587.607004][T14202] ipv6_getsockopt+0x230/0x280 [ 587.611802][T14202] ? __pfx_ipv6_getsockopt+0x10/0x10 [ 587.617129][T14202] ? __pfx_mark_lock+0x10/0x10 [ 587.621940][T14202] sctp_getsockopt+0x1d2/0x7ae0 [ 587.626833][T14202] ? hlock_class+0x4e/0x130 [ 587.631367][T14202] ? mark_lock+0xb5/0xc60 [ 587.635725][T14202] ? aa_label_sk_perm+0x19d/0x5a0 [ 587.640792][T14202] ? __pfx_sctp_getsockopt+0x10/0x10 [ 587.646114][T14202] ? __lock_acquire+0x15a9/0x3c40 [ 587.651182][T14202] ? __pfx___lock_acquire+0x10/0x10 [ 587.656419][T14202] ? find_held_lock+0x2d/0x110 [ 587.661301][T14202] ? __might_fault+0x13b/0x190 [ 587.666101][T14202] ? __pfx_lock_release+0x10/0x10 [ 587.671153][T14202] ? trace_lock_acquire+0x14e/0x1f0 [ 587.676391][T14202] ? lock_acquire+0x2f/0xb0 [ 587.680916][T14202] ? __might_fault+0xe3/0x190 [ 587.685629][T14202] ? __might_fault+0xe3/0x190 [ 587.690347][T14202] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 587.696285][T14202] ? do_sock_getsockopt+0x3fe/0x870 [ 587.701512][T14202] do_sock_getsockopt+0x3fe/0x870 [ 587.706584][T14202] ? __pfx_do_sock_getsockopt+0x10/0x10 [ 587.712161][T14202] ? lock_acquire+0x2f/0xb0 [ 587.716708][T14202] ? __fget_files+0x40/0x3a0 [ 587.721371][T14202] ? __fget_files+0x206/0x3a0 [ 587.726084][T14202] __sys_getsockopt+0x12f/0x260 [ 587.730979][T14202] __x64_sys_getsockopt+0xbd/0x160 [ 587.736123][T14202] ? do_syscall_64+0x91/0x250 [ 587.740832][T14202] ? lockdep_hardirqs_on+0x7c/0x110 [ 587.746062][T14202] do_syscall_64+0xcd/0x250 [ 587.750599][T14202] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 587.756524][T14202] RIP: 0033:0x7ffaa5d85d29 [ 587.760974][T14202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 587.780615][T14202] RSP: 002b:00007ffaa6b40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 587.789064][T14202] RAX: ffffffffffffffda RBX: 00007ffaa5f75fa0 RCX: 00007ffaa5d85d29 [ 587.797069][T14202] RDX: 0000000000000483 RSI: 0000000000000000 RDI: 0000000000000003 [ 587.805069][T14202] RBP: 00007ffaa6b40090 R08: 0000000020000040 R09: 0000000000000000 [ 587.813070][T14202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 587.821072][T14202] R13: 0000000000000000 R14: 00007ffaa5f75fa0 R15: 00007fff5bbcad98 [ 587.829182][T14202] [ 589.052193][T14208] FAULT_INJECTION: forcing a failure. [ 589.052193][T14208] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 589.083259][T14208] CPU: 1 UID: 0 PID: 14208 Comm: syz.1.2223 Not tainted 6.13.0-rc5-syzkaller #0 [ 589.092360][T14208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 589.102441][T14208] Call Trace: [ 589.105742][T14208] [ 589.108698][T14208] dump_stack_lvl+0x16c/0x1f0 [ 589.113417][T14208] should_fail_ex+0x497/0x5b0 [ 589.118140][T14208] _copy_from_user+0x2e/0xd0 [ 589.122789][T14208] copy_msghdr_from_user+0x99/0x160 [ 589.128027][T14208] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 589.133879][T14208] ? __pfx___lock_acquire+0x10/0x10 [ 589.139111][T14208] ___sys_recvmsg+0xdc/0x1a0 [ 589.143743][T14208] ? __pfx____sys_recvmsg+0x10/0x10 [ 589.148977][T14208] ? find_held_lock+0x2d/0x110 [ 589.153775][T14208] ? __pfx___might_resched+0x10/0x10 [ 589.159069][T14208] ? __might_fault+0xe3/0x190 [ 589.163770][T14208] do_recvmmsg+0x2f8/0x740 [ 589.168211][T14208] ? __pfx_do_recvmmsg+0x10/0x10 [ 589.173165][T14208] ? vfs_write+0x306/0x1150 [ 589.177693][T14208] ? __mutex_unlock_slowpath+0x164/0x690 [ 589.183363][T14208] ? __fget_files+0x206/0x3a0 [ 589.188070][T14208] __x64_sys_recvmmsg+0x239/0x290 [ 589.193119][T14208] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 589.198693][T14208] do_syscall_64+0xcd/0x250 [ 589.203224][T14208] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 589.209140][T14208] RIP: 0033:0x7ffaa5d85d29 [ 589.213564][T14208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 589.233188][T14208] RSP: 002b:00007ffaa6b40038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 589.241614][T14208] RAX: ffffffffffffffda RBX: 00007ffaa5f75fa0 RCX: 00007ffaa5d85d29 [ 589.249600][T14208] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 589.257580][T14208] RBP: 00007ffaa6b40090 R08: 0000000000000000 R09: 0000000000000000 [ 589.265558][T14208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 589.273532][T14208] R13: 0000000000000000 R14: 00007ffaa5f75fa0 R15: 00007fff5bbcad98 [ 589.281526][T14208] [ 591.622981][T14246] Invalid ELF header magic: != ELF [ 592.574896][T14260] FAULT_INJECTION: forcing a failure. [ 592.574896][T14260] name failslab, interval 1, probability 0, space 0, times 0 [ 592.676949][T14251] kexec: Could not allocate control_code_buffer [ 592.681638][T14260] CPU: 1 UID: 0 PID: 14260 Comm: syz.4.2235 Not tainted 6.13.0-rc5-syzkaller #0 [ 592.692282][T14260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 592.702340][T14260] Call Trace: [ 592.705618][T14260] [ 592.708549][T14260] dump_stack_lvl+0x16c/0x1f0 [ 592.713240][T14260] should_fail_ex+0x497/0x5b0 [ 592.717926][T14260] ? fs_reclaim_acquire+0xae/0x150 [ 592.723048][T14260] should_failslab+0xc2/0x120 [ 592.727743][T14260] kmem_cache_alloc_noprof+0x6e/0x3b0 [ 592.733134][T14260] ? ptlock_alloc+0x1f/0x70 [ 592.737656][T14260] ptlock_alloc+0x1f/0x70 [ 592.741996][T14260] pte_alloc_one+0x74/0x390 [ 592.746506][T14260] do_pte_missing+0x1ae7/0x3e00 [ 592.751426][T14260] __handle_mm_fault+0x103c/0x2a40 [ 592.756576][T14260] ? __pfx___handle_mm_fault+0x10/0x10 [ 592.762062][T14260] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 592.767730][T14260] ? find_vma+0xc0/0x140 [ 592.771989][T14260] ? __pfx_find_vma+0x10/0x10 [ 592.776680][T14260] handle_mm_fault+0x3fa/0xaa0 [ 592.781464][T14260] do_user_addr_fault+0x7a3/0x13f0 [ 592.786591][T14260] exc_page_fault+0x5c/0xc0 [ 592.791104][T14260] asm_exc_page_fault+0x26/0x30 [ 592.795968][T14260] RIP: 0010:rep_movs_alternative+0x13/0x70 [ 592.801793][T14260] Code: cc cc cc 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 83 f9 40 73 40 83 f9 08 73 21 85 c9 74 0f <8a> 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 c3 cc cc cc cc 66 0f [ 592.821410][T14260] RSP: 0018:ffffc900063379e0 EFLAGS: 00050202 [ 592.827485][T14260] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000007 [ 592.835460][T14260] RDX: fffff52000c66f4c RSI: 0000000000000000 RDI: ffffc90006337a58 [ 592.843443][T14260] RBP: 0000000000000007 R08: 0000000000000001 R09: fffff52000c66f4b [ 592.851414][T14260] R10: ffffc90006337a5e R11: 0000000000000000 R12: 0000000000000000 [ 592.859386][T14260] R13: ffffc90006337a58 R14: 1ffff92000c66f45 R15: ffffc90006337d80 [ 592.867372][T14260] _copy_from_user+0x9a/0xd0 [ 592.871982][T14260] ____sys_sendmsg+0x56e/0xb40 [ 592.876755][T14260] ? __pfx_____sys_sendmsg+0x10/0x10 [ 592.882057][T14260] ___sys_sendmsg+0x135/0x1e0 [ 592.886753][T14260] ? __pfx____sys_sendmsg+0x10/0x10 [ 592.891972][T14260] ? trace_lock_acquire+0x14e/0x1f0 [ 592.897198][T14260] ? __pfx_lock_release+0x10/0x10 [ 592.902223][T14260] ? proc_fail_nth_write+0xa0/0x250 [ 592.907436][T14260] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 592.913172][T14260] __sys_sendmmsg+0x201/0x420 [ 592.917947][T14260] ? __pfx___sys_sendmmsg+0x10/0x10 [ 592.923192][T14260] ? do_sys_openat2+0xb1/0x1e0 [ 592.927969][T14260] ? __pfx_do_sys_openat2+0x10/0x10 [ 592.933193][T14260] ? ksys_write+0x1ba/0x250 [ 592.937706][T14260] ? __pfx_ksys_write+0x10/0x10 [ 592.942566][T14260] __x64_sys_sendmmsg+0x9c/0x100 [ 592.947515][T14260] ? lockdep_hardirqs_on+0x7c/0x110 [ 592.952720][T14260] do_syscall_64+0xcd/0x250 [ 592.957236][T14260] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 592.963140][T14260] RIP: 0033:0x7f2dd3585d29 [ 592.967556][T14260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 592.987163][T14260] RSP: 002b:00007f2dd43e0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 592.995687][T14260] RAX: ffffffffffffffda RBX: 00007f2dd3775fa0 RCX: 00007f2dd3585d29 [ 593.003658][T14260] RDX: 0000000000000007 RSI: 0000000020000200 RDI: 0000000000000000 [ 593.011630][T14260] RBP: 00007f2dd43e0090 R08: 0000000000000000 R09: 0000000000000000 [ 593.019599][T14260] R10: 0000000000004008 R11: 0000000000000246 R12: 0000000000000001 [ 593.027669][T14260] R13: 0000000000000000 R14: 00007f2dd3775fa0 R15: 00007ffce2d1cb38 [ 593.035653][T14260] [ 593.345224][T14263] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2236'. [ 594.143169][ T1120] EXT4-fs error (device sda1): ext4_validate_block_bitmap:423: comm kworker/u8:6: bg 2: bad block bitmap checksum [ 594.229282][ T1120] EXT4-fs (sda1): Delayed block allocation failed for inode 1924 at logical offset 969 with max blocks 2 with error 74 [ 594.299647][ T1120] EXT4-fs (sda1): This should not happen!! Data will be lost [ 594.299647][ T1120] [ 595.318238][T14277] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2241'. [ 595.395959][T14275] Invalid ELF header magic: != ELF [ 595.916621][T14287] FAULT_INJECTION: forcing a failure. [ 595.916621][T14287] name failslab, interval 1, probability 0, space 0, times 0 [ 595.953217][T14287] CPU: 1 UID: 0 PID: 14287 Comm: syz.1.2244 Not tainted 6.13.0-rc5-syzkaller #0 [ 595.962751][T14287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 595.972835][T14287] Call Trace: [ 595.976144][T14287] [ 595.979091][T14287] dump_stack_lvl+0x16c/0x1f0 [ 595.983805][T14287] should_fail_ex+0x497/0x5b0 [ 595.988520][T14287] ? fs_reclaim_acquire+0xae/0x150 [ 595.993669][T14287] should_failslab+0xc2/0x120 [ 595.998386][T14287] kmem_cache_alloc_node_noprof+0x72/0x3b0 [ 596.004229][T14287] ? kasan_save_stack+0x33/0x60 [ 596.009116][T14287] ? __alloc_skb+0x2b3/0x380 [ 596.013752][T14287] __alloc_skb+0x2b3/0x380 [ 596.018206][T14287] ? __pfx___alloc_skb+0x10/0x10 [ 596.023178][T14287] ? __lock_acquire+0xcc5/0x3c40 [ 596.028150][T14287] alloc_skb_with_frags+0xe4/0x850 [ 596.033301][T14287] ? __pfx___lock_acquire+0x10/0x10 [ 596.038523][T14287] ? hlock_class+0x4e/0x130 [ 596.043063][T14287] ? __pfx_mark_lock+0x10/0x10 [ 596.047856][T14287] ? mark_lock+0xb5/0xc60 [ 596.052222][T14287] sock_alloc_send_pskb+0x7f1/0x980 [ 596.057454][T14287] ? find_held_lock+0x2d/0x110 [ 596.062258][T14287] ? __pfx_sock_alloc_send_pskb+0x10/0x10 [ 596.068020][T14287] ? lock_acquire+0x2f/0xb0 [ 596.072549][T14287] ? sock_cmsg_send+0x1a0/0x280 [ 596.077437][T14287] packet_sendmsg+0x1f70/0x5660 [ 596.082337][T14287] ? __pfx___might_resched+0x10/0x10 [ 596.087649][T14287] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 596.093579][T14287] ? __pfx_packet_sendmsg+0x10/0x10 [ 596.098814][T14287] ? aa_umount+0x140/0x6e0 [ 596.103265][T14287] ? __might_fault+0xe3/0x190 [ 596.107978][T14287] ? __might_fault+0xe3/0x190 [ 596.112701][T14287] ____sys_sendmsg+0x9ae/0xb40 [ 596.117507][T14287] ? __pfx_____sys_sendmsg+0x10/0x10 [ 596.122824][T14287] ? __lock_acquire+0xcc5/0x3c40 [ 596.127803][T14287] ___sys_sendmsg+0x135/0x1e0 [ 596.132522][T14287] ? __pfx____sys_sendmsg+0x10/0x10 [ 596.137770][T14287] ? trace_lock_acquire+0x14e/0x1f0 [ 596.143025][T14287] __sys_sendmmsg+0x201/0x420 [ 596.147742][T14287] ? __pfx___sys_sendmmsg+0x10/0x10 [ 596.152985][T14287] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 596.159006][T14287] ? fput+0x67/0x440 [ 596.162939][T14287] ? ksys_write+0x1ba/0x250 [ 596.167472][T14287] ? __pfx_ksys_write+0x10/0x10 [ 596.172355][T14287] __x64_sys_sendmmsg+0x9c/0x100 [ 596.177329][T14287] ? lockdep_hardirqs_on+0x7c/0x110 [ 596.182567][T14287] do_syscall_64+0xcd/0x250 [ 596.187116][T14287] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 596.193041][T14287] RIP: 0033:0x7ffaa5d85d29 [ 596.197487][T14287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 596.217129][T14287] RSP: 002b:00007ffaa6b40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 596.225582][T14287] RAX: ffffffffffffffda RBX: 00007ffaa5f75fa0 RCX: 00007ffaa5d85d29 [ 596.233580][T14287] RDX: 0000000000000002 RSI: 00000000200001c0 RDI: 0000000000000003 [ 596.241572][T14287] RBP: 00007ffaa6b40090 R08: 0000000000000000 R09: 0000000000000000 [ 596.249566][T14287] R10: 000000000000007f R11: 0000000000000246 R12: 0000000000000001 [ 596.257560][T14287] R13: 0000000000000000 R14: 00007ffaa5f75fa0 R15: 00007fff5bbcad98 [ 596.265574][T14287] [ 596.794254][T14291] netlink: 'syz.1.2246': attribute type 2 has an invalid length. [ 596.811940][T14291] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2246'. [ 597.433624][T14298] netlink: 'syz.1.2249': attribute type 2 has an invalid length. [ 597.473413][T14298] netlink: 674 bytes leftover after parsing attributes in process `syz.1.2249'. [ 597.499328][T14299] FAULT_INJECTION: forcing a failure. [ 597.499328][T14299] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 597.713673][T14299] CPU: 1 UID: 0 PID: 14299 Comm: syz.3.2248 Not tainted 6.13.0-rc5-syzkaller #0 [ 597.722775][T14299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 597.732865][T14299] Call Trace: [ 597.736172][T14299] [ 597.739119][T14299] dump_stack_lvl+0x16c/0x1f0 [ 597.743852][T14299] should_fail_ex+0x497/0x5b0 [ 597.748575][T14299] _copy_to_user+0x32/0xd0 [ 597.753043][T14299] simple_read_from_buffer+0xd0/0x160 [ 597.758453][T14299] proc_fail_nth_read+0x198/0x270 [ 597.763522][T14299] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 597.769111][T14299] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 597.774694][T14299] vfs_read+0x1df/0xbe0 [ 597.778882][T14299] ? __fget_files+0x1fc/0x3a0 [ 597.783586][T14299] ? __pfx___mutex_lock+0x10/0x10 [ 597.788638][T14299] ? __pfx_vfs_read+0x10/0x10 [ 597.793356][T14299] ? __fget_files+0x206/0x3a0 [ 597.798081][T14299] ksys_read+0x12b/0x250 [ 597.802351][T14299] ? __pfx_ksys_read+0x10/0x10 [ 597.807164][T14299] do_syscall_64+0xcd/0x250 [ 597.811705][T14299] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 597.817632][T14299] RIP: 0033:0x7ffa7ad8473c [ 597.822070][T14299] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 597.841706][T14299] RSP: 002b:00007ffa7bbcc030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 597.850157][T14299] RAX: ffffffffffffffda RBX: 00007ffa7af76080 RCX: 00007ffa7ad8473c [ 597.858151][T14299] RDX: 000000000000000f RSI: 00007ffa7bbcc0a0 RDI: 0000000000000006 [ 597.866148][T14299] RBP: 00007ffa7bbcc090 R08: 0000000000000000 R09: 0000000000000000 [ 597.874143][T14299] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 597.882131][T14299] R13: 0000000000000001 R14: 00007ffa7af76080 R15: 00007ffd7df88d78 [ 597.890136][T14299] [ 599.516460][T14322] FAULT_INJECTION: forcing a failure. [ 599.516460][T14322] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 599.529748][T14322] CPU: 1 UID: 0 PID: 14322 Comm: syz.1.2255 Not tainted 6.13.0-rc5-syzkaller #0 [ 599.538798][T14322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 599.548866][T14322] Call Trace: [ 599.552150][T14322] [ 599.555087][T14322] dump_stack_lvl+0x16c/0x1f0 [ 599.559785][T14322] should_fail_ex+0x497/0x5b0 [ 599.564486][T14322] _copy_from_iter+0x29b/0x1400 [ 599.569359][T14322] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 599.575269][T14322] ? __pfx__copy_from_iter+0x10/0x10 [ 599.580570][T14322] ? alloc_pages_mpol_noprof+0x315/0x610 [ 599.586226][T14322] ? __pfx_alloc_pages_mpol_noprof+0x10/0x10 [ 599.592231][T14322] copy_page_from_iter+0xa5/0x120 [ 599.597302][T14322] pipe_write+0xd1e/0x1b30 [ 599.601765][T14322] ? __pfx_pipe_write+0x10/0x10 [ 599.606653][T14322] ? apparmor_file_permission+0x251/0x400 [ 599.612408][T14322] ? bpf_lsm_file_permission+0x9/0x10 [ 599.617812][T14322] ? security_file_permission+0x71/0x210 [ 599.623470][T14322] vfs_write+0x5ae/0x1150 [ 599.627841][T14322] ? __pfx_pipe_write+0x10/0x10 [ 599.632733][T14322] ? __pfx_vfs_write+0x10/0x10 [ 599.637530][T14322] ? __fget_files+0x40/0x3a0 [ 599.642158][T14322] ksys_write+0x207/0x250 [ 599.646505][T14322] ? __pfx_ksys_write+0x10/0x10 [ 599.651382][T14322] do_syscall_64+0xcd/0x250 [ 599.655906][T14322] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 599.661816][T14322] RIP: 0033:0x7ffaa5d85d29 [ 599.666239][T14322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 599.685853][T14322] RSP: 002b:00007ffaa6b1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 599.694373][T14322] RAX: ffffffffffffffda RBX: 00007ffaa5f76080 RCX: 00007ffaa5d85d29 [ 599.702355][T14322] RDX: 0000000080000000 RSI: 0000000020000000 RDI: 0000000000000001 [ 599.710332][T14322] RBP: 00007ffaa6b1f090 R08: 0000000000000000 R09: 0000000000000000 [ 599.718318][T14322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 599.726306][T14322] R13: 0000000000000000 R14: 00007ffaa5f76080 R15: 00007fff5bbcad98 [ 599.734299][T14322] [ 600.105597][T14329] FAULT_INJECTION: forcing a failure. [ 600.105597][T14329] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 600.129578][T14329] CPU: 1 UID: 0 PID: 14329 Comm: syz.3.2257 Not tainted 6.13.0-rc5-syzkaller #0 [ 600.138667][T14329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 600.148753][T14329] Call Trace: [ 600.152052][T14329] [ 600.155004][T14329] dump_stack_lvl+0x16c/0x1f0 [ 600.159720][T14329] should_fail_ex+0x497/0x5b0 [ 600.164437][T14329] _copy_from_iter+0x29b/0x1400 [ 600.169329][T14329] ? trace_lock_acquire+0x14e/0x1f0 [ 600.174566][T14329] ? __alloc_skb+0x200/0x380 [ 600.179195][T14329] ? __pfx__copy_from_iter+0x10/0x10 [ 600.184513][T14329] ? __virt_addr_valid+0x1a4/0x590 [ 600.189657][T14329] ? __virt_addr_valid+0x5e/0x590 [ 600.194714][T14329] ? __phys_addr_symbol+0x30/0x80 [ 600.199754][T14329] ? __check_object_size+0x488/0x710 [ 600.205061][T14329] netlink_sendmsg+0x813/0xd70 [ 600.209846][T14329] ? __pfx_netlink_sendmsg+0x10/0x10 [ 600.215164][T14329] ____sys_sendmsg+0x9ae/0xb40 [ 600.219954][T14329] ? copy_msghdr_from_user+0x10b/0x160 [ 600.225440][T14329] ? __pfx_____sys_sendmsg+0x10/0x10 [ 600.230770][T14329] ___sys_sendmsg+0x135/0x1e0 [ 600.235479][T14329] ? __pfx____sys_sendmsg+0x10/0x10 [ 600.240712][T14329] ? __pfx_lock_release+0x10/0x10 [ 600.245749][T14329] ? trace_lock_acquire+0x14e/0x1f0 [ 600.250970][T14329] ? __fget_files+0x206/0x3a0 [ 600.255663][T14329] __sys_sendmsg+0x16e/0x220 [ 600.260269][T14329] ? __pfx___sys_sendmsg+0x10/0x10 [ 600.265417][T14329] do_syscall_64+0xcd/0x250 [ 600.269940][T14329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 600.275937][T14329] RIP: 0033:0x7ffa7ad85d29 [ 600.280363][T14329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 600.299980][T14329] RSP: 002b:00007ffa7bbed038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 600.308584][T14329] RAX: ffffffffffffffda RBX: 00007ffa7af75fa0 RCX: 00007ffa7ad85d29 [ 600.316564][T14329] RDX: 0000000000040000 RSI: 0000000020000240 RDI: 0000000000000005 [ 600.324551][T14329] RBP: 00007ffa7bbed090 R08: 0000000000000000 R09: 0000000000000000 [ 600.332702][T14329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 600.340695][T14329] R13: 0000000000000000 R14: 00007ffa7af75fa0 R15: 00007ffd7df88d78 [ 600.348699][T14329] [ 602.012824][T14366] crash hp: kexec_trylock() failed, kdump image may be inaccurate [ 602.025151][T14367] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 602.209657][T14369] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 602.268324][T14370] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr syzkaller syzkaller login: [ 602.860295][T14354] kexec: Could not allocate control_code_buffer [ 603.392292][T14380] netlink: 28 bytes leftover after parsing attributes in process `syz.3.2271'. [ 603.692089][T14392] netlink: 'syz.3.2274': attribute type 1 has an invalid length. [ 605.750678][T14420] openvswitch: netlink: IP tunnel TTL not specified. [ 606.726313][T14440] FAULT_INJECTION: forcing a failure. [ 606.726313][T14440] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 606.759887][T14440] CPU: 0 UID: 0 PID: 14440 Comm: syz.4.2288 Not tainted 6.13.0-rc5-syzkaller #0 [ 606.769001][T14440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 606.779065][T14440] Call Trace: [ 606.782355][T14440] [ 606.785291][T14440] dump_stack_lvl+0x16c/0x1f0 [ 606.789985][T14440] should_fail_ex+0x497/0x5b0 [ 606.794691][T14440] _copy_to_iter+0x4a5/0x1400 [ 606.799387][T14440] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 606.805380][T14440] ? __pfx__copy_to_iter+0x10/0x10 [ 606.810501][T14440] ? __virt_addr_valid+0x1a4/0x590 [ 606.815636][T14440] ? __virt_addr_valid+0x5e/0x590 [ 606.820673][T14440] ? __phys_addr_symbol+0x30/0x80 [ 606.825712][T14440] ? __check_object_size+0x488/0x710 [ 606.831016][T14440] seq_read_iter+0xd00/0x12b0 [ 606.835716][T14440] seq_read+0x39f/0x4e0 [ 606.840896][T14440] ? __pfx_seq_read+0x10/0x10 [ 606.845639][T14440] ? __pfx_seq_read+0x10/0x10 [ 606.850346][T14440] proc_reg_read+0x23d/0x330 [ 606.854963][T14440] ? __pfx_proc_reg_read+0x10/0x10 [ 606.860091][T14440] vfs_read+0x1df/0xbe0 [ 606.864274][T14440] ? __fget_files+0x1fc/0x3a0 [ 606.868974][T14440] ? __pfx___mutex_lock+0x10/0x10 [ 606.874021][T14440] ? __pfx_vfs_read+0x10/0x10 [ 606.878725][T14440] ? __fget_files+0x206/0x3a0 [ 606.883437][T14440] ksys_read+0x12b/0x250 [ 606.887693][T14440] ? __pfx_ksys_read+0x10/0x10 [ 606.892480][T14440] do_syscall_64+0xcd/0x250 [ 606.897003][T14440] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 606.903000][T14440] RIP: 0033:0x7f2dd3585d29 [ 606.907428][T14440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 606.927045][T14440] RSP: 002b:00007f2dd43e0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 606.935470][T14440] RAX: ffffffffffffffda RBX: 00007f2dd3775fa0 RCX: 00007f2dd3585d29 [ 606.943447][T14440] RDX: 00000000000000c7 RSI: 0000000020000380 RDI: 0000000000000003 [ 606.951424][T14440] RBP: 00007f2dd43e0090 R08: 0000000000000000 R09: 0000000000000000 [ 606.959404][T14440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 606.967391][T14440] R13: 0000000000000000 R14: 00007f2dd3775fa0 R15: 00007ffce2d1cb38 [ 606.975417][T14440] [ 607.478739][T14444] EXT4-fs error (device sda1): ext4_validate_inode_bitmap:104: comm syz-executor: Corrupt inode bitmap - block_group = 0, inode_bitmap = 137 [ 607.502222][T14444] EXT4-fs error (device sda1): ext4_validate_inode_bitmap:104: comm syz-executor: Corrupt inode bitmap - block_group = 1, inode_bitmap = 138 [ 607.526083][T14444] EXT4-fs error (device sda1): ext4_validate_block_bitmap:423: comm syz-executor: bg 0: bad block bitmap checksum [ 607.589540][T14446] EXT4-fs error (device sda1): ext4_validate_block_bitmap:423: comm syz-executor: bg 3: bad block bitmap checksum [ 607.915982][T12561] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 607.962284][T12561] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 607.982693][T12561] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 608.052149][T12561] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 608.064696][T14452] netlink: 85 bytes leftover after parsing attributes in process `syz.4.2291'. [ 608.078676][T12561] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 608.098431][T12561] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 608.128050][T14452] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2291'. [ 608.539550][T14456] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2292'. [ 608.643538][T14456] netlink: 4 bytes leftover after parsing attributes in process `syz.4.2292'. [ 608.745902][T14449] chnl_net:caif_netlink_parms(): no params data found [ 608.972346][T14468] netlink: 'syz.4.2293': attribute type 1 has an invalid length. [ 609.056855][T14449] bridge0: port 1(bridge_slave_0) entered blocking state [ 609.070514][T14449] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.103563][T14449] bridge_slave_0: entered allmulticast mode [ 609.110879][T14449] bridge_slave_0: entered promiscuous mode [ 609.147597][T14449] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.154889][T14449] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.166857][T14449] bridge_slave_1: entered allmulticast mode [ 609.176443][T14449] bridge_slave_1: entered promiscuous mode [ 609.380056][T11790] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 609.580129][T11790] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 609.606014][T14449] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 609.629686][T14449] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 609.715665][T11790] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 609.774885][T14449] team0: Port device team_slave_0 added [ 609.805860][T14449] team0: Port device team_slave_1 added [ 609.857765][T11790] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 609.937240][T14449] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 609.944522][T14449] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 610.013183][T14449] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 610.046095][T14449] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 610.073906][T14449] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 610.123071][T14449] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 610.237366][T12561] Bluetooth: hci2: command tx timeout [ 610.274403][T14449] hsr_slave_0: entered promiscuous mode [ 610.299574][T14449] hsr_slave_1: entered promiscuous mode [ 610.318327][T14449] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 610.344379][T14449] Cannot create hsr debugfs directory [ 610.463503][T11790] team0: left allmulticast mode [ 610.468435][T11790] team_slave_0: left allmulticast mode [ 610.491863][T11790] team_slave_1: left allmulticast mode [ 610.501791][T11790] team0: left promiscuous mode [ 610.512802][T11790] team_slave_0: left promiscuous mode [ 610.527979][T11790] team_slave_1: left promiscuous mode [ 610.544195][T11790] bridge0: port 3(team0) entered disabled state [ 610.582073][T11790] bridge_slave_1: left allmulticast mode [ 610.588194][T11790] bridge_slave_1: left promiscuous mode [ 610.619374][T11790] bridge0: port 2(bridge_slave_1) entered disabled state [ 610.638429][T11790] bridge_slave_0: left allmulticast mode [ 610.653103][T11790] bridge_slave_0: left promiscuous mode [ 610.674889][T11790] bridge0: port 1(bridge_slave_0) entered disabled state [ 612.009439][T11790] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 612.023950][T11790] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 612.038217][T11790] bond0 (unregistering): Released all slaves [ 612.087405][T14486] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 612.108211][T14486] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 612.169279][T14496] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 612.209415][T14497] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 612.288823][T12561] Bluetooth: hci2: command tx timeout [ 612.312602][T14499] FAULT_INJECTION: forcing a failure. [ 612.312602][T14499] name failslab, interval 1, probability 0, space 0, times 0 [ 612.329741][T14499] CPU: 0 UID: 0 PID: 14499 Comm: syz.3.2301 Not tainted 6.13.0-rc5-syzkaller #0 [ 612.338819][T14499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 612.348908][T14499] Call Trace: [ 612.352210][T14499] [ 612.355169][T14499] dump_stack_lvl+0x16c/0x1f0 [ 612.359940][T14499] should_fail_ex+0x497/0x5b0 [ 612.364657][T14499] ? fs_reclaim_acquire+0xae/0x150 [ 612.369804][T14499] should_failslab+0xc2/0x120 [ 612.374533][T14499] kmem_cache_alloc_noprof+0x6e/0x3b0 [ 612.379943][T14499] ? is_bpf_text_address+0x30/0x1a0 [ 612.385179][T14499] ? ptlock_alloc+0x1f/0x70 [ 612.389718][T14499] ptlock_alloc+0x1f/0x70 [ 612.394085][T14499] pte_alloc_one+0x74/0x390 [ 612.398632][T14499] do_pte_missing+0x1ae7/0x3e00 [ 612.403537][T14499] __handle_mm_fault+0x103c/0x2a40 [ 612.408695][T14499] ? __pfx___handle_mm_fault+0x10/0x10 [ 612.414194][T14499] ? __pfx_lock_acquire.part.0+0x10/0x10 [ 612.419877][T14499] ? find_vma+0xc0/0x140 [ 612.424170][T14499] ? __pfx_find_vma+0x10/0x10 [ 612.428881][T14499] handle_mm_fault+0x3fa/0xaa0 [ 612.433778][T14499] do_user_addr_fault+0x7a3/0x13f0 [ 612.438934][T14499] exc_page_fault+0x5c/0xc0 [ 612.443471][T14499] asm_exc_page_fault+0x26/0x30 [ 612.448355][T14499] RIP: 0010:rep_movs_alternative+0x4a/0x70 [ 612.454204][T14499] Code: 75 f1 c3 cc cc cc cc 66 0f 1f 84 00 00 00 00 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 df 83 f9 08 73 e8 eb c9 a4 c3 cc cc cc cc 48 89 c8 48 c1 e9 03 83 e0 07 f3 48 a5 89 c1 [ 612.473849][T14499] RSP: 0018:ffffc90005fcf7e8 EFLAGS: 00050206 [ 612.479946][T14499] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 00000000000000c4 [ 612.487936][T14499] RDX: ffffed1005f4c2b9 RSI: 0000000000000000 RDI: ffff88802fa61500 [ 612.495936][T14499] RBP: ffffc90005fcfd60 R08: 0000000000000001 R09: ffffed1005f4c2b8 [ 612.503932][T14499] R10: ffff88802fa615c3 R11: 0000000000000000 R12: 00000000000000c4 [ 612.511929][T14499] R13: 00007ffffffff000 R14: ffff88802fa61500 R15: 00000000000000c4 [ 612.519946][T14499] _copy_from_iter+0x384/0x1400 [ 612.524843][T14499] ? trace_lock_acquire+0x14e/0x1f0 [ 612.530086][T14499] ? __alloc_skb+0x200/0x380 [ 612.534814][T14499] ? __pfx__copy_from_iter+0x10/0x10 [ 612.540135][T14499] ? __virt_addr_valid+0x1a4/0x590 [ 612.545283][T14499] ? __virt_addr_valid+0x5e/0x590 [ 612.550342][T14499] ? __phys_addr_symbol+0x30/0x80 [ 612.555401][T14499] ? __check_object_size+0x488/0x710 [ 612.560727][T14499] netlink_sendmsg+0x813/0xd70 [ 612.565529][T14499] ? __pfx_netlink_sendmsg+0x10/0x10 [ 612.570854][T14499] ____sys_sendmsg+0x9ae/0xb40 [ 612.575653][T14499] ? copy_msghdr_from_user+0x10b/0x160 [ 612.581147][T14499] ? __pfx_____sys_sendmsg+0x10/0x10 [ 612.586457][T14499] ? __lock_acquire+0xcc5/0x3c40 [ 612.591439][T14499] ___sys_sendmsg+0x135/0x1e0 [ 612.596157][T14499] ? __pfx____sys_sendmsg+0x10/0x10 [ 612.601409][T14499] ? trace_lock_acquire+0x14e/0x1f0 [ 612.606669][T14499] __sys_sendmmsg+0x201/0x420 [ 612.611390][T14499] ? __pfx___sys_sendmmsg+0x10/0x10 [ 612.616644][T14499] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 612.622671][T14499] ? fput+0x67/0x440 [ 612.626605][T14499] ? ksys_write+0x1ba/0x250 [ 612.631141][T14499] ? __pfx_ksys_write+0x10/0x10 [ 612.636030][T14499] __x64_sys_sendmmsg+0x9c/0x100 [ 612.641013][T14499] ? lockdep_hardirqs_on+0x7c/0x110 [ 612.646249][T14499] do_syscall_64+0xcd/0x250 [ 612.650790][T14499] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 612.656717][T14499] RIP: 0033:0x7ffa7ad85d29 [ 612.661157][T14499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 612.680789][T14499] RSP: 002b:00007ffa7bbed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 612.689234][T14499] RAX: ffffffffffffffda RBX: 00007ffa7af75fa0 RCX: 00007ffa7ad85d29 [ 612.697224][T14499] RDX: 0000000000000003 RSI: 0000000020000080 RDI: 0000000000000003 [ 612.705214][T14499] RBP: 00007ffa7bbed090 R08: 0000000000000000 R09: 0000000000000000 [ 612.713212][T14499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 612.721208][T14499] R13: 0000000000000000 R14: 00007ffa7af75fa0 R15: 00007ffd7df88d78 [ 612.729223][T14499] [ 612.877471][T14502] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 612.908458][T14503] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 613.091472][T11790] hsr_slave_1: left promiscuous mode [ 613.109520][T11790] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 613.126058][T11790] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 613.144918][T11790] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 613.157671][T11790] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 613.230445][T11790] veth1_macvtap: left promiscuous mode [ 614.132627][T12561] Bluetooth: hci4: SCO packet for unknown connection handle 0 [ 614.363732][T12561] Bluetooth: hci2: command tx timeout [ 614.522421][T11790] team0 (unregistering): Port device team_slave_1 removed [ 614.684533][T11790] team0 (unregistering): Port device team_slave_0 removed [ 616.443285][T12561] Bluetooth: hci2: command tx timeout [ 620.217228][T14584] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 620.255299][T14585] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 620.420851][T14586] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2320'. [ 624.133325][T14615] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 624.641892][T14449] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 624.667253][T14449] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 624.710010][T14449] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 624.732297][T14449] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 624.802129][T14619] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 624.892725][T14621] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 624.965749][T14622] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 625.010113][T14449] 8021q: adding VLAN 0 to HW filter on device bond0 [ 625.027019][T14623] EXT4-fs error (device sda1): ext4_xattr_ibody_get:653: inode #89: comm dhcpcd: corrupted in-inode xattr: bad magic number in in-inode xattr [ 625.064882][T14449] 8021q: adding VLAN 0 to HW filter on device team0 [ 625.087045][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 625.096907][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 625.112407][ T35] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.119638][ T35] bridge0: port 1(bridge_slave_0) entered forwarding state [ 625.163772][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.170911][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 625.278090][T14449] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 625.641899][T14449] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 625.764859][T14449] veth0_vlan: entered promiscuous mode [ 625.790375][T14449] veth1_vlan: entered promiscuous mode [ 625.874910][T14449] veth0_macvtap: entered promiscuous mode [ 625.909929][T14449] veth1_macvtap: entered promiscuous mode [ 625.958364][T14449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 625.987275][ T5834] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 626.000889][T14449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 626.012127][ T5834] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 626.023817][ T5834] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 626.033586][ T5834] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 626.045016][T14449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 626.055682][ T5834] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 626.063646][ T5834] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 626.071922][T14449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 626.122157][T14449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 626.154571][T14449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 626.225712][T14449] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 626.255726][T14449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 626.284539][T14449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 626.324984][T14449] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 626.354497][T14449] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 626.384345][T14449] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 626.400954][T14449] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 626.411752][T14449] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 626.443567][T14449] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 626.452326][T14449] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 626.965735][ T35] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 627.021361][ T35] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 627.059327][T14631] chnl_net:caif_netlink_parms(): no params data found [ 627.117554][ T35] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 627.148626][ T35] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 627.420446][T14631] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.445771][T14631] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.476734][T14631] bridge_slave_0: entered allmulticast mode [ 627.486760][T14631] bridge_slave_0: entered promiscuous mode [ 627.537918][T14631] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.555907][T14631] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.581779][T14631] bridge_slave_1: entered allmulticast mode [ 627.589593][T14631] bridge_slave_1: entered promiscuous mode [ 627.742608][T14631] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 627.766948][T14631] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 627.962371][T14631] team0: Port device team_slave_0 added [ 627.996249][T14631] team0: Port device team_slave_1 added [ 628.123690][ T5834] Bluetooth: hci3: command tx timeout [ 628.258897][T14631] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 628.289151][T14631] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 628.363274][T14631] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 628.385376][T14631] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 628.401227][T14631] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 628.412858][T14650] Invalid ELF header magic: != ELF [ 628.467497][T14631] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 629.458598][T14631] hsr_slave_0: entered promiscuous mode [ 629.565817][T14631] hsr_slave_1: entered promiscuous mode [ 629.724197][T14631] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 629.747433][T14631] Cannot create hsr debugfs directory [ 630.216089][ T5834] Bluetooth: hci3: command tx timeout [ 630.360569][ T29] audit: type=1800 audit(8277292092.479:86): pid=14664 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.4.2337" name="features" dev="configfs" ino=38751 res=0 errno=0 [ 630.492329][T14667] FAULT_INJECTION: forcing a failure. [ 630.492329][T14667] name failslab, interval 1, probability 0, space 0, times 0 [ 630.543655][T14667] CPU: 1 UID: 0 PID: 14667 Comm: syz.4.2338 Not tainted 6.13.0-rc5-syzkaller #0 [ 630.552757][T14667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 630.562852][T14667] Call Trace: [ 630.566158][T14667] [ 630.569114][T14667] dump_stack_lvl+0x16c/0x1f0 [ 630.573841][T14667] should_fail_ex+0x497/0x5b0 [ 630.578558][T14667] ? fs_reclaim_acquire+0xae/0x150 [ 630.583711][T14667] should_failslab+0xc2/0x120 [ 630.588429][T14667] __kmalloc_noprof+0xce/0x4f0 [ 630.593228][T14667] ? ima_alloc_init_template+0xb8/0x720 [ 630.598827][T14667] ima_alloc_init_template+0xb8/0x720 [ 630.604234][T14667] ? __pfx_d_absolute_path+0x10/0x10 [ 630.609564][T14667] ima_store_measurement+0x1ea/0x5c0 [ 630.614890][T14667] ? __pfx_ima_store_measurement+0x10/0x10 [ 630.620747][T14667] ? __pfx_ima_get_hash_algo+0x10/0x10 [ 630.626247][T14667] process_measurement+0x1bcb/0x2370 [ 630.631580][T14667] ? __pfx_process_measurement+0x10/0x10 [ 630.637245][T14667] ? local_lock_acquire+0x10/0x150 [ 630.642407][T14667] ? mod_objcg_state+0x4c4/0x8d0 [ 630.647371][T14667] ? lockdep_hardirqs_on+0x7c/0x110 [ 630.652614][T14667] ? __pfx_tracing_trace_options_show+0x10/0x10 [ 630.659043][T14667] ? single_open+0x15f/0x1f0 [ 630.663654][T14667] ? inode_to_bdi+0x9e/0x160 [ 630.668263][T14667] ima_file_check+0xc6/0x110 [ 630.672903][T14667] ? __pfx_ima_file_check+0x10/0x10 [ 630.678119][T14667] security_file_post_open+0x8e/0x210 [ 630.683515][T14667] path_openat+0x1419/0x2d60 [ 630.688131][T14667] ? __pfx_path_openat+0x10/0x10 [ 630.693080][T14667] ? __pfx___lock_acquire+0x10/0x10 [ 630.698286][T14667] ? lock_acquire.part.0+0x11b/0x380 [ 630.703589][T14667] ? find_held_lock+0x2d/0x110 [ 630.708368][T14667] do_filp_open+0x20c/0x470 [ 630.712884][T14667] ? __pfx_do_filp_open+0x10/0x10 [ 630.717923][T14667] ? find_held_lock+0x2d/0x110 [ 630.722722][T14667] ? alloc_fd+0x41f/0x760 [ 630.727072][T14667] do_sys_openat2+0x17a/0x1e0 [ 630.731773][T14667] ? __pfx_do_sys_openat2+0x10/0x10 [ 630.736991][T14667] ? __fget_files+0x206/0x3a0 [ 630.741683][T14667] __x64_sys_openat+0x175/0x210 [ 630.746551][T14667] ? __pfx___x64_sys_openat+0x10/0x10 [ 630.751936][T14667] ? ksys_write+0x1ba/0x250 [ 630.756462][T14667] do_syscall_64+0xcd/0x250 [ 630.760988][T14667] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 630.766958][T14667] RIP: 0033:0x7f2dd3585d29 [ 630.771385][T14667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 630.791106][T14667] RSP: 002b:00007f2dd43e0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 630.799532][T14667] RAX: ffffffffffffffda RBX: 00007f2dd3775fa0 RCX: 00007f2dd3585d29 [ 630.807507][T14667] RDX: 0000000000000002 RSI: 0000000020000000 RDI: ffffffffffffff9c [ 630.815483][T14667] RBP: 00007f2dd43e0090 R08: 0000000000000000 R09: 0000000000000000 [ 630.823462][T14667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 630.831438][T14667] R13: 0000000000000000 R14: 00007f2dd3775fa0 R15: 00007ffce2d1cb38 [ 630.839431][T14667] [ 630.868298][ T29] audit: type=1804 audit(8277292092.979:87): pid=14667 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=add_template_measure cause=ENOMEM comm="syz.4.2338" name="/newroot/sys/kernel/tracing/trace_options" dev="tracefs" ino=1173 res=0 errno=0 [ 632.014616][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 632.023234][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 632.031888][ T0] NOHZ tick-stop error: local softirq work is pending, handler #240!!! [ 632.283230][ T5834] Bluetooth: hci3: command tx timeout [ 632.614966][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 632.714155][T14631] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 632.891795][T14696] Invalid ELF header magic: != ELF [ 633.521224][T14631] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 633.592235][T14631] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 633.681276][T14631] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 633.919118][T14631] 8021q: adding VLAN 0 to HW filter on device bond0 [ 633.951820][T14631] 8021q: adding VLAN 0 to HW filter on device team0 [ 633.984619][T10157] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.991789][T10157] bridge0: port 1(bridge_slave_0) entered forwarding state [ 634.042627][T10157] bridge0: port 2(bridge_slave_1) entered blocking state [ 634.049865][T10157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 634.373328][ T5834] Bluetooth: hci3: command tx timeout [ 634.449271][T14631] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 634.676092][T14719] netlink: 28 bytes leftover after parsing attributes in process `syz.4.2351'. [ 634.840218][T14631] veth0_vlan: entered promiscuous mode [ 634.877046][T14631] veth1_vlan: entered promiscuous mode [ 634.883243][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 634.892098][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 634.989410][T14631] veth0_macvtap: entered promiscuous mode [ 635.034777][T14631] veth1_macvtap: entered promiscuous mode [ 635.071336][T14631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 635.121062][T14631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 635.142442][T14631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 635.171721][T14631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 635.200710][T14631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 635.233507][T14631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 635.263276][T14631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 635.295320][T14631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 635.344457][T14631] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 635.409656][T14631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 635.463439][T14631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 635.503183][T14631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 635.553201][T14631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 635.583106][T14631] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 635.623117][T14631] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 635.654316][T14631] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 635.865460][T14631] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 635.895596][T14631] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 635.934704][T14631] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 635.941334][ T5834] Bluetooth: hci0: ACL packet for unknown connection handle 0 [ 635.961267][T14749] syz.3.2358: vmalloc error: size 4096, failed to allocate pages, mode:0xdc2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 635.973192][T14631] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 635.978372][T14749] CPU: 1 UID: 0 PID: 14749 Comm: syz.3.2358 Not tainted 6.13.0-rc5-syzkaller #0 [ 635.995040][T14749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 636.005143][T14749] Call Trace: [ 636.008453][T14749] [ 636.011411][T14749] dump_stack_lvl+0x16c/0x1f0 [ 636.016129][T14749] warn_alloc+0x24d/0x3a0 [ 636.020509][T14749] ? __pfx_warn_alloc+0x10/0x10 [ 636.025404][T14749] ? policy_nodemask+0xea/0x4e0 [ 636.030309][T14749] ? alloc_pages_mpol_noprof+0x315/0x610 [ 636.035990][T14749] ? __pfx_alloc_pages_mpol_noprof+0x10/0x10 [ 636.042012][T14749] ? trace_kmalloc+0x2d/0xd0 [ 636.046638][T14749] ? __pfx___might_resched+0x10/0x10 [ 636.051960][T14749] __vmalloc_node_range_noprof+0x12c0/0x1530 [ 636.057982][T14749] ? kernel_clone+0xfd/0x960 [ 636.062610][T14749] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 636.068972][T14749] ? rcu_is_watching+0x12/0xc0 [ 636.073770][T14749] ? trace_kmem_cache_alloc+0x2d/0xd0 [ 636.079171][T14749] ? kmem_cache_alloc_node_noprof+0x219/0x3b0 [ 636.085280][T14749] ? copy_process+0x49c/0x6f20 [ 636.090079][T14749] ? kernel_clone+0xfd/0x960 [ 636.094704][T14749] copy_process+0x29b3/0x6f20 [ 636.099425][T14749] ? kernel_clone+0xfd/0x960 [ 636.104051][T14749] ? get_pid_task+0xfc/0x250 [ 636.108691][T14749] ? __pfx_lock_release+0x10/0x10 [ 636.113758][T14749] ? trace_lock_acquire+0x14e/0x1f0 [ 636.119001][T14749] ? __pfx_copy_process+0x10/0x10 [ 636.124061][T14749] ? find_held_lock+0x2d/0x110 [ 636.128870][T14749] kernel_clone+0xfd/0x960 [ 636.133321][T14749] ? __pfx_kernel_clone+0x10/0x10 [ 636.138386][T14749] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 636.144411][T14749] __do_sys_clone+0xba/0x100 [ 636.149037][T14749] ? __pfx___do_sys_clone+0x10/0x10 [ 636.154285][T14749] do_syscall_64+0xcd/0x250 [ 636.158978][T14749] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 636.164907][T14749] RIP: 0033:0x7ffa7ad85d29 [ 636.169341][T14749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 636.188983][T14749] RSP: 002b:00007ffa7bbcc038 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 636.197432][T14749] RAX: ffffffffffffffda RBX: 00007ffa7af76080 RCX: 00007ffa7ad85d29 [ 636.205430][T14749] RDX: 0000000020000000 RSI: 7fffffffffffffff RDI: 0000000000000007 [ 636.213429][T14749] RBP: 00007ffa7bbcc090 R08: 0000000000000000 R09: 0000000000000000 [ 636.221427][T14749] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 636.229429][T14749] R13: 0000000000000000 R14: 00007ffa7af76080 R15: 00007ffd7df88d78 [ 636.237436][T14749] [ 636.244019][T14749] Mem-Info: [ 636.283236][T14749] active_anon:25273 inactive_anon:2619 isolated_anon:0 [ 636.283236][T14749] active_file:7487 inactive_file:52139 isolated_file:0 [ 636.283236][T14749] unevictable:768 dirty:361 writeback:0 [ 636.283236][T14749] slab_reclaimable:11267 slab_unreclaimable:97590 [ 636.283236][T14749] mapped:26812 shmem:8777 pagetables:889 [ 636.283236][T14749] sec_pagetables:0 bounce:0 [ 636.283236][T14749] kernel_misc_reclaimable:0 [ 636.283236][T14749] free:1305803 free_pcp:437 free_cma:0 [ 636.348413][T14749] Node 0 active_anon:101592kB inactive_anon:10476kB active_file:29948kB inactive_file:208548kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:107748kB dirty:1440kB writeback:0kB shmem:34072kB shmem_thp:2048kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:11124kB pagetables:3556kB sec_pagetables:0kB all_unreclaimable? no [ 636.383115][T14749] Node 1 active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:8kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:1536kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:16kB pagetables:0kB sec_pagetables:0kB all_unreclaimable? no [ 636.413493][T14749] Node 0 DMA free:15360kB boost:0kB min:208kB low:260kB high:312kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 636.441068][T14749] lowmem_reserve[]: 0 2465 2466 0 0 [ 636.446987][T14749] Node 0 DMA32 free:1306852kB boost:0kB min:34200kB low:42748kB high:51296kB reserved_highatomic:0KB active_anon:102156kB inactive_anon:10476kB active_file:29948kB inactive_file:207724kB unevictable:1536kB writepending:1440kB present:3129332kB managed:2551336kB mlocked:0kB bounce:0kB free_pcp:3520kB local_pcp:2536kB free_cma:0kB [ 636.468000][ T1120] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 636.478398][T14749] lowmem_reserve[]: [ 636.494579][T14749] 0 0 0 0 0 [ 636.497880][T14749] Node 0 Normal free:8kB boost:0kB min:8kB low:8kB high:8kB reserved_highatomic:0KB active_anon:36kB inactive_anon:0kB active_file:0kB inactive_file:824kB unevictable:0kB writepending:0kB present:1048580kB managed:876kB mlocked:0kB bounce:0kB free_pcp:8kB local_pcp:0kB free_cma:0kB [ 636.552450][ T1120] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 636.563170][T14749] lowmem_reserve[]: 0 0 0 0 0 [ 636.567953][T14749] Node 1 Normal free:3904124kB boost:0kB min:55688kB low:69608kB high:83528kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:8kB unevictable:1536kB writepending:4kB present:4194300kB managed:4111164kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 636.711433][T14749] lowmem_reserve[]: 0 0 0 0 0 [ 636.716351][T14749] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 636.740678][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 636.755516][T14749] Node 0 DMA32: 2021*4kB (UME) 2950*8kB (UME) 2344*16kB (UME) 1976*32kB (UME) 1144*64kB (UM) 552*128kB (UME) 361*256kB (UM) 205*512kB (UME) 134*1024kB (UME) 53*2048kB (UME) 142*4096kB (UM) = 1301060kB [ 636.776393][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 636.795820][T14749] Node 0 Normal: 0*4kB 1*8kB (M) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 636.813142][T14749] Node 1 Normal: 241*4kB (UME) 45*8kB (UME) 43*16kB (UME) 221*32kB (UME) 96*64kB (UME) 30*128kB (UME) 18*256kB (UME) 9*512kB (UM) 5*1024kB (UM) 4*2048kB (UE) 943*4096kB (M) = 3904124kB [ 636.831894][T14749] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 636.843196][T14749] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 636.852558][T14749] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 636.862256][T14749] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 636.872025][T14749] 66098 total pagecache pages [ 636.877197][T14749] 50 pages in swap cache [ 636.881463][T14749] Free swap = 115176kB [ 636.885669][T14749] Total swap = 124996kB [ 636.889978][T14749] 2097051 pages RAM [ 636.893869][T14749] 0 pages HighMem/MovableOnly [ 636.898554][T14749] 427367 pages reserved [ 636.903618][T14749] 0 pages cma reserved [ 637.086359][ T5834] Bluetooth: hci2: ACL packet for unknown connection handle 0 [ 637.838393][T14760] netlink: 'syz.6.2330': attribute type 33 has an invalid length. [ 637.871067][T14760] netlink: 322 bytes leftover after parsing attributes in process `syz.6.2330'. [ 637.895882][T12561] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 637.911782][T14759] netlink: 'syz.6.2330': attribute type 33 has an invalid length. [ 637.923393][T12561] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 637.941445][T12561] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 637.950926][T12561] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 637.961890][T12561] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 637.969837][T12561] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 638.009053][T14759] netlink: 322 bytes leftover after parsing attributes in process `syz.6.2330'. [ 638.317001][ T12] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.494715][ T12] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.701802][ T12] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 638.726896][T14793] FAULT_INJECTION: forcing a failure. [ 638.726896][T14793] name failslab, interval 1, probability 0, space 0, times 0 [ 638.783142][T14793] CPU: 0 UID: 0 PID: 14793 Comm: syz.1.2370 Not tainted 6.13.0-rc5-syzkaller #0 [ 638.792247][T14793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 638.802334][T14793] Call Trace: [ 638.805634][T14793] [ 638.808589][T14793] dump_stack_lvl+0x16c/0x1f0 [ 638.813306][T14793] should_fail_ex+0x497/0x5b0 [ 638.818026][T14793] should_failslab+0xc2/0x120 [ 638.822745][T14793] kmem_cache_alloc_noprof+0x6e/0x3b0 [ 638.828163][T14793] ? skb_clone+0x190/0x3f0 [ 638.832643][T14793] skb_clone+0x190/0x3f0 [ 638.836931][T14793] netlink_deliver_tap+0xafd/0xca0 [ 638.842083][T14793] netlink_unicast+0x5e1/0x7f0 [ 638.847060][T14793] ? __pfx_netlink_unicast+0x10/0x10 [ 638.852377][T14793] ? __phys_addr_symbol+0x30/0x80 [ 638.857436][T14793] ? __check_object_size+0x488/0x710 [ 638.862768][T14793] netlink_sendmsg+0x8b8/0xd70 [ 638.867566][T14793] ? __pfx_netlink_sendmsg+0x10/0x10 [ 638.872886][T14793] ? __might_fault+0xe3/0x190 [ 638.877613][T14793] ____sys_sendmsg+0x9ae/0xb40 [ 638.882415][T14793] ? __pfx_____sys_sendmsg+0x10/0x10 [ 638.887729][T14793] ? __lock_acquire+0xcc5/0x3c40 [ 638.892707][T14793] ___sys_sendmsg+0x135/0x1e0 [ 638.897422][T14793] ? __pfx____sys_sendmsg+0x10/0x10 [ 638.902657][T14793] ? trace_lock_acquire+0x14e/0x1f0 [ 638.907891][T14793] __sys_sendmmsg+0x201/0x420 [ 638.912590][T14793] ? __pfx___sys_sendmmsg+0x10/0x10 [ 638.917814][T14793] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 638.923820][T14793] ? fput+0x67/0x440 [ 638.927730][T14793] ? ksys_write+0x1ba/0x250 [ 638.932241][T14793] ? __pfx_ksys_write+0x10/0x10 [ 638.937124][T14793] __x64_sys_sendmmsg+0x9c/0x100 [ 638.942077][T14793] ? lockdep_hardirqs_on+0x7c/0x110 [ 638.947287][T14793] do_syscall_64+0xcd/0x250 [ 638.951805][T14793] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 638.957711][T14793] RIP: 0033:0x7fd24a585d29 [ 638.962136][T14793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 638.981747][T14793] RSP: 002b:00007fd2483f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 638.990167][T14793] RAX: ffffffffffffffda RBX: 00007fd24a775fa0 RCX: 00007fd24a585d29 [ 638.998147][T14793] RDX: 0000000000000007 RSI: 0000000020000200 RDI: 0000000000000003 [ 639.006120][T14793] RBP: 00007fd2483f6090 R08: 0000000000000000 R09: 0000000000000000 [ 639.014096][T14793] R10: 0000000000004008 R11: 0000000000000246 R12: 0000000000000001 [ 639.022074][T14793] R13: 0000000000000000 R14: 00007fd24a775fa0 R15: 00007ffd3ffbc268 [ 639.030067][T14793] [ 639.274856][ T12] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 639.334104][T14768] chnl_net:caif_netlink_parms(): no params data found [ 639.580212][T14768] bridge0: port 1(bridge_slave_0) entered blocking state [ 639.623233][T14768] bridge0: port 1(bridge_slave_0) entered disabled state [ 639.633657][T14768] bridge_slave_0: entered allmulticast mode [ 639.640745][T14768] bridge_slave_0: entered promiscuous mode [ 639.689589][T14768] bridge0: port 2(bridge_slave_1) entered blocking state [ 639.703204][T14768] bridge0: port 2(bridge_slave_1) entered disabled state [ 639.721305][T14768] bridge_slave_1: entered allmulticast mode [ 639.739279][T14768] bridge_slave_1: entered promiscuous mode [ 640.006758][T14768] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 640.044774][ T5834] Bluetooth: hci0: command tx timeout [ 640.088247][T14768] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 640.134041][T14818] FAULT_INJECTION: forcing a failure. [ 640.134041][T14818] name failslab, interval 1, probability 0, space 0, times 0 [ 640.191201][T14818] CPU: 0 UID: 0 PID: 14818 Comm: syz.4.2376 Not tainted 6.13.0-rc5-syzkaller #0 [ 640.200383][T14818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 640.210476][T14818] Call Trace: [ 640.213781][T14818] [ 640.216733][T14818] dump_stack_lvl+0x16c/0x1f0 [ 640.221452][T14818] should_fail_ex+0x497/0x5b0 [ 640.226165][T14818] ? fs_reclaim_acquire+0xae/0x150 [ 640.231310][T14818] should_failslab+0xc2/0x120 [ 640.236030][T14818] __kmalloc_noprof+0xce/0x4f0 [ 640.240825][T14818] ? d_absolute_path+0x137/0x1b0 [ 640.245800][T14818] ? tomoyo_encode2+0x100/0x3e0 [ 640.250687][T14818] tomoyo_encode2+0x100/0x3e0 [ 640.255398][T14818] tomoyo_realpath_from_path+0x1a7/0x710 [ 640.261079][T14818] tomoyo_path_number_perm+0x248/0x5b0 [ 640.266577][T14818] ? tomoyo_path_number_perm+0x235/0x5b0 [ 640.272253][T14818] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 640.278300][T14818] ? __pfx_lock_release+0x10/0x10 [ 640.283365][T14818] ? trace_lock_acquire+0x14e/0x1f0 [ 640.288600][T14818] ? lock_acquire+0x2f/0xb0 [ 640.293136][T14818] ? __fget_files+0x40/0x3a0 [ 640.297766][T14818] ? __fget_files+0x206/0x3a0 [ 640.302486][T14818] security_file_ioctl+0x9b/0x240 [ 640.307549][T14818] __x64_sys_ioctl+0xb7/0x200 [ 640.312266][T14818] do_syscall_64+0xcd/0x250 [ 640.316817][T14818] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 640.322750][T14818] RIP: 0033:0x7f2dd3585d29 [ 640.327287][T14818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 640.346933][T14818] RSP: 002b:00007f2dd43e0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 640.355381][T14818] RAX: ffffffffffffffda RBX: 00007f2dd3775fa0 RCX: 00007f2dd3585d29 [ 640.363376][T14818] RDX: 0000000000000000 RSI: 00000000c4c85512 RDI: 0000000000000008 [ 640.371369][T14818] RBP: 00007f2dd43e0090 R08: 0000000000000000 R09: 0000000000000000 [ 640.379359][T14818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 640.387437][T14818] R13: 0000000000000000 R14: 00007f2dd3775fa0 R15: 00007ffce2d1cb38 [ 640.395448][T14818] [ 640.427234][T14825] vivid-003: ================= START STATUS ================= [ 640.459272][T14818] ERROR: Out of memory at tomoyo_realpath_from_path. [ 640.503277][T14825] vivid-003: Radio HW Seek Mode: Bounded [ 640.509350][T14825] vivid-003: Radio Programmable HW Seek: false [ 640.545930][T14825] vivid-003: RDS Rx I/O Mode: Block I/O [ 640.564094][T14825] vivid-003: Generate RBDS Instead of RDS: false [ 640.570532][T14825] vivid-003: RDS Reception: true [ 640.583769][T14825] vivid-003: RDS Program Type: 0 inactive [ 640.589591][T14825] vivid-003: RDS PS Name: inactive [ 640.663240][T14828] netlink: 4 bytes leftover after parsing attributes in process `syz.6.2379'. [ 640.681919][T14825] vivid-003: RDS Radio Text: inactive [ 640.699577][T14825] vivid-003: RDS Traffic Announcement: false inactive [ 640.738552][T14825] vivid-003: RDS Traffic Program: false inactive [ 640.794244][T14825] vivid-003: RDS Music: false inactive [ 640.799860][T14825] vivid-003: ================== END STATUS ================== [ 641.860161][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 641.929100][ T12] bond0 (unregistering): Released all slaves [ 641.968447][T14768] team0: Port device team_slave_0 added [ 641.995923][T14768] team0: Port device team_slave_1 added [ 642.075483][ T12] : left promiscuous mode [ 642.135488][ T5834] Bluetooth: hci0: command tx timeout [ 642.305037][T14768] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 642.351047][T14768] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 642.420618][T14768] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 642.432508][T14864] Process accounting resumed [ 642.468526][T14768] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 642.469869][T14862] ------------[ cut here ]------------ [ 642.482049][T14862] WARNING: CPU: 1 PID: 14862 at mm/page_alloc.c:4729 __alloc_pages_noprof+0xeff/0x25b0 [ 642.486583][T14768] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 642.492164][T14862] Modules linked in: [ 642.519466][T14868] netlink: 28 bytes leftover after parsing attributes in process `syz.6.2390'. [ 642.522842][T14862] CPU: 1 UID: 0 PID: 14862 Comm: syz.1.2388 Not tainted 6.13.0-rc5-syzkaller #0 [ 642.540797][T14862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 642.542866][T14768] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 642.550917][T14862] RIP: 0010:__alloc_pages_noprof+0xeff/0x25b0 [ 642.550966][T14862] Code: 24 2c 00 00 00 00 89 cd 0f 84 8b f9 ff ff 8b 34 24 48 89 da 8b 7c 24 08 e8 de b2 fe ff e9 69 f9 ff ff c6 05 14 6d 16 0e 01 90 <0f> 0b 90 31 db e9 9f f3 ff ff 89 14 24 e8 6f a4 0c 00 8b 14 24 e9 [ 642.550991][T14862] RSP: 0018:ffffc90003ea78e8 EFLAGS: 00010246 [ 642.551016][T14862] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 642.551034][T14862] RDX: 0000000000000000 RSI: 0000000000000013 RDI: 0000000000040cc0 [ 642.551052][T14862] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000100 [ 642.551070][T14862] R10: 0000000000000100 R11: ffffffff81fb8de4 R12: 0000000000000013 [ 642.551088][T14862] R13: 0000000000040cc0 R14: 1ffff920007d4f31 R15: 00000000ffffffff [ 642.551108][T14862] FS: 00007fd2483f66c0(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 [ 642.644494][T14862] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 642.651116][T14862] CR2: 0000001b32f0dff8 CR3: 0000000076c1a000 CR4: 00000000003526f0 [ 642.659198][T14862] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 642.667258][T14862] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 642.675314][T14862] Call Trace: [ 642.678979][T14862] [ 642.681940][T14862] ? __warn+0xea/0x3c0 [ 642.686531][T14862] ? __alloc_pages_noprof+0xeff/0x25b0 [ 642.692055][T14862] ? report_bug+0x3c0/0x580 [ 642.696722][T14862] ? handle_bug+0x54/0xa0 [ 642.701440][T14862] ? exc_invalid_op+0x17/0x50 [ 642.706508][T14862] ? asm_exc_invalid_op+0x1a/0x20 [ 642.711591][T14862] ? kasan_save_track+0x14/0x30 [ 642.716550][T14862] ? __alloc_pages_noprof+0xeff/0x25b0 [ 642.722062][T14862] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 642.728026][T14862] ? lockdep_hardirqs_on+0x7c/0x110 [ 642.733300][T14862] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 642.739150][T14862] ? stack_depot_save_flags+0x36d/0x9e0 [ 642.744804][T14862] ? __pfx___alloc_pages_noprof+0x10/0x10 [ 642.750570][T14862] ? kasan_save_stack+0x33/0x60 [ 642.755518][T14862] ? __kasan_kmalloc+0xaa/0xb0 [ 642.760334][T14862] ? safesetid_uid_file_write+0x84/0xc0 [ 642.766145][T14862] ? vfs_write+0x24c/0x1150 [ 642.770684][T14862] ? ksys_write+0x12b/0x250 [ 642.775284][T14862] ? do_syscall_64+0xcd/0x250 [ 642.780352][T14862] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 642.787021][T14862] ___kmalloc_large_node+0x84/0x1b0 [ 642.792285][T14862] __kmalloc_large_node_noprof+0x1c/0x70 [ 642.798027][T14862] __kmalloc_node_track_caller_noprof.cold+0x5/0x5f [ 642.804990][T14862] ? handle_policy_update+0x188/0x11e0 [ 642.810497][T14862] memdup_user_nul+0x2b/0x110 [ 642.815590][T14862] handle_policy_update+0x188/0x11e0 [ 642.820935][T14862] ? __pfx_handle_policy_update+0x10/0x10 [ 642.826853][T14862] ? apparmor_capable+0x114/0x1d0 [ 642.832012][T14862] ? bpf_lsm_capable+0x9/0x10 [ 642.836785][T14862] ? security_capable+0x7e/0x260 [ 642.841773][T14862] safesetid_uid_file_write+0x84/0xc0 [ 642.847227][T14862] ? __pfx_safesetid_uid_file_write+0x10/0x10 [ 642.853375][T14862] vfs_write+0x24c/0x1150 [ 642.857758][T14862] ? __fget_files+0x1fc/0x3a0 [ 642.862474][T14862] ? __pfx___mutex_lock+0x10/0x10 [ 642.867590][T14862] ? __pfx_vfs_write+0x10/0x10 [ 642.872405][T14862] ? __fget_files+0x206/0x3a0 [ 642.877201][T14862] ksys_write+0x12b/0x250 [ 642.881565][T14862] ? __pfx_ksys_write+0x10/0x10 [ 642.886818][T14862] do_syscall_64+0xcd/0x250 [ 642.891369][T14862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 642.897750][T14862] RIP: 0033:0x7fd24a585d29 [ 642.902205][T14862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 642.922234][T14862] RSP: 002b:00007fd2483f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 642.931036][T14862] RAX: ffffffffffffffda RBX: 00007fd24a775fa0 RCX: 00007fd24a585d29 [ 642.939122][T14862] RDX: 00000000fffffdef RSI: 0000000000000000 RDI: 0000000000000003 [ 642.947150][T14862] RBP: 00007fd24a601b08 R08: 0000000000000000 R09: 0000000000000000 [ 642.955201][T14862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 642.963227][T14862] R13: 0000000000000000 R14: 00007fd24a775fa0 R15: 00007ffd3ffbc268 [ 642.971246][T14862] [ 642.974378][T14862] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 642.981672][T14862] CPU: 1 UID: 0 PID: 14862 Comm: syz.1.2388 Not tainted 6.13.0-rc5-syzkaller #0 [ 642.990720][T14862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 643.000789][T14862] Call Trace: [ 643.004075][T14862] [ 643.007017][T14862] dump_stack_lvl+0x3d/0x1f0 [ 643.011637][T14862] panic+0x71d/0x800 [ 643.015557][T14862] ? __pfx_panic+0x10/0x10 [ 643.020001][T14862] ? show_trace_log_lvl+0x29d/0x3d0 [ 643.025225][T14862] ? __alloc_pages_noprof+0xeff/0x25b0 [ 643.030710][T14862] check_panic_on_warn+0xab/0xb0 [ 643.035673][T14862] __warn+0xf6/0x3c0 [ 643.039586][T14862] ? __alloc_pages_noprof+0xeff/0x25b0 [ 643.045062][T14862] report_bug+0x3c0/0x580 [ 643.049410][T14862] handle_bug+0x54/0xa0 [ 643.053583][T14862] exc_invalid_op+0x17/0x50 [ 643.058102][T14862] asm_exc_invalid_op+0x1a/0x20 [ 643.062972][T14862] RIP: 0010:__alloc_pages_noprof+0xeff/0x25b0 [ 643.069056][T14862] Code: 24 2c 00 00 00 00 89 cd 0f 84 8b f9 ff ff 8b 34 24 48 89 da 8b 7c 24 08 e8 de b2 fe ff e9 69 f9 ff ff c6 05 14 6d 16 0e 01 90 <0f> 0b 90 31 db e9 9f f3 ff ff 89 14 24 e8 6f a4 0c 00 8b 14 24 e9 [ 643.088672][T14862] RSP: 0018:ffffc90003ea78e8 EFLAGS: 00010246 [ 643.094838][T14862] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 643.102821][T14862] RDX: 0000000000000000 RSI: 0000000000000013 RDI: 0000000000040cc0 [ 643.110795][T14862] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000100 [ 643.118772][T14862] R10: 0000000000000100 R11: ffffffff81fb8de4 R12: 0000000000000013 [ 643.126761][T14862] R13: 0000000000040cc0 R14: 1ffff920007d4f31 R15: 00000000ffffffff [ 643.134752][T14862] ? kasan_save_track+0x14/0x30 [ 643.139639][T14862] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 643.145460][T14862] ? lockdep_hardirqs_on+0x7c/0x110 [ 643.150675][T14862] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 643.156505][T14862] ? stack_depot_save_flags+0x36d/0x9e0 [ 643.162083][T14862] ? __pfx___alloc_pages_noprof+0x10/0x10 [ 643.167825][T14862] ? kasan_save_stack+0x33/0x60 [ 643.172718][T14862] ? __kasan_kmalloc+0xaa/0xb0 [ 643.177501][T14862] ? safesetid_uid_file_write+0x84/0xc0 [ 643.183059][T14862] ? vfs_write+0x24c/0x1150 [ 643.187572][T14862] ? ksys_write+0x12b/0x250 [ 643.192083][T14862] ? do_syscall_64+0xcd/0x250 [ 643.196775][T14862] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 643.202889][T14862] ___kmalloc_large_node+0x84/0x1b0 [ 643.208101][T14862] __kmalloc_large_node_noprof+0x1c/0x70 [ 643.213771][T14862] __kmalloc_node_track_caller_noprof.cold+0x5/0x5f [ 643.220384][T14862] ? handle_policy_update+0x188/0x11e0 [ 643.225859][T14862] memdup_user_nul+0x2b/0x110 [ 643.230553][T14862] handle_policy_update+0x188/0x11e0 [ 643.235855][T14862] ? __pfx_handle_policy_update+0x10/0x10 [ 643.241582][T14862] ? apparmor_capable+0x114/0x1d0 [ 643.246628][T14862] ? bpf_lsm_capable+0x9/0x10 [ 643.252008][T14862] ? security_capable+0x7e/0x260 [ 643.256969][T14862] safesetid_uid_file_write+0x84/0xc0 [ 643.262354][T14862] ? __pfx_safesetid_uid_file_write+0x10/0x10 [ 643.268427][T14862] vfs_write+0x24c/0x1150 [ 643.272772][T14862] ? __fget_files+0x1fc/0x3a0 [ 643.277462][T14862] ? __pfx___mutex_lock+0x10/0x10 [ 643.282500][T14862] ? __pfx_vfs_write+0x10/0x10 [ 643.287283][T14862] ? __fget_files+0x206/0x3a0 [ 643.292066][T14862] ksys_write+0x12b/0x250 [ 643.296410][T14862] ? __pfx_ksys_write+0x10/0x10 [ 643.301282][T14862] do_syscall_64+0xcd/0x250 [ 643.305814][T14862] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 643.311721][T14862] RIP: 0033:0x7fd24a585d29 [ 643.316147][T14862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 643.335773][T14862] RSP: 002b:00007fd2483f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 643.344210][T14862] RAX: ffffffffffffffda RBX: 00007fd24a775fa0 RCX: 00007fd24a585d29 [ 643.352197][T14862] RDX: 00000000fffffdef RSI: 0000000000000000 RDI: 0000000000000003 [ 643.360182][T14862] RBP: 00007fd24a601b08 R08: 0000000000000000 R09: 0000000000000000 [ 643.368170][T14862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 643.376155][T14862] R13: 0000000000000000 R14: 00007fd24a775fa0 R15: 00007ffd3ffbc268 [ 643.384155][T14862] [ 643.387425][T14862] Kernel Offset: disabled [ 643.391826][T14862] Rebooting in 86400 seconds..