last executing test programs: 6.835718802s ago: executing program 3 (id=2146): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual/graphics/fbcon/rotate_all\x00', 0xa001, 0x0) (async, rerun: 32) lsm_set_self_attr$auto(0x9, 0x0, 0x80, 0x0) (rerun: 32) mmap$auto(0x0, 0x2000c, 0xdf, 0x20eb1, 0x40000000000a5, 0x8000) (async) semctl$auto(0x201, 0xfffffffffffffffa, 0x3, 0x0) r1 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty12\x00', 0x800, 0x0) ioctl$auto(r1, 0x4b47, 0x1) write$auto(r0, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) socket(0x2d, 0x2, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async) ioctl$auto(0x3, 0x89e0, 0x91) (async, rerun: 32) process_madvise$auto_PIDFD_SELF_THREAD(0xffffffffffffd8f0, 0x0, 0x0, 0xdec, 0x0) (async, rerun: 32) ioctl$auto(0x3, 0x89e1, 0x91) 6.316256258s ago: executing program 3 (id=2149): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) set_mempolicy$auto(0x1, &(0x7f0000000180)=0x2, 0x6) sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082dbd7000fedbdf250300000008000400b70a0000060007000080000008000200", @ANYRES32, @ANYBLOB="0a0005000180c200000e00000a0001000180c200000e00000a000100aaaaaaaaaa35000008000200", @ANYRES32, @ANYBLOB="060006000500000008002e"], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x40) r0 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="f2000000", @ANYBLOB], 0x1ac}, 0x1, 0x0, 0x0, 0x24040840}, 0x94) sendmmsg$auto(r0, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0xfc2}, 0x2, 0x0, 0x7, 0xa505}, 0x800}, 0x7, 0x4008) 5.825859311s ago: executing program 3 (id=2152): r0 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security/tomoyo/exception_policy\x00', 0x40802, 0x0) write$auto_tomoyo_operations_securityfs_if(r0, &(0x7f00000001c0)="0a1b9a3ce8040000cd1aec49ec53c2efa0149258607deb6e163bb15497886d8ea5c2574c58e9867ecec3371cadb848770dc8f745b2c76eedba12b9bdbcf3401910e7733aca465c9bd40a", 0x4a) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/net/dummy0/ifalias\x00', 0x8041, 0x0) write$auto(r1, &(0x7f0000000500)='%[.[\x00T\n&\xc1\x1e\xae\xb8\xd7\x95\x17\xa3\x7f\xa3\xa7\xf2M\xd1(h\xa51T\x9fQG0\xe8\xd1\xd7m\xafF\x04\"h\xe6\x10\f)\x7f\x83\xcc\xb4\xa4:R\f\xe7\xe6\xb1I\x03\x9a\xca\x8f\x8c\xbb\xe1*\x9d\x11\x9a\x04F9\"\xe3\xc2\x0f\xc5\xcf\x0f\xb1,w\xfe\x06h\xff\x03\x00\x00E\x8b}\xa2\xb9g\xa3\xbe|l3\xda\x9bzl\x8c\x8b\xce\x12*=`\x11\xef2\xf3 \xec\xbe:h\x9e\xc8\xf1\x15\xfa\x90\x9d\xeec\xbf\xf9\xf2\xcc\xf5\xa3F\xc2', 0x6) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r2 = openat$auto_debug_help_fops_orangefs_debugfs(0xffffffffffffff9c, &(0x7f0000000140), 0x18180, 0x0) msgctl$auto_IPC_SET(0x8d0b, 0x1, &(0x7f0000000300)={{0x10000, 0x0, 0xee01, 0xd11, 0x7, 0x1, 0x7}, &(0x7f0000000180)=0xff, &(0x7f00000001c0)=0xb7, 0xfffffffffffffffa, 0x9, 0x1, 0x8, 0x9, 0x4f, 0x2000, 0x82, @inferred, @raw=0x1e80}) close_range$auto(0x2, 0x8, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000340)='/sys/devices/platform/vhci_hcd.5/usb19/19-0:1.0/usb19-port7/location\x00', 0x0, 0x0) openat$auto_fuse_dev_operations_fuse_i(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x20a301, 0x0) r3 = ioctl$auto_NS_GET_MNTNS_ID(0xffffffffffffffff, 0x8008b705, 0x0) ioctl$auto_posix_clock_file_operations_posix_clock(r3, 0xfffffffffffff3f0, &(0x7f00000003c0)="b5e8ae3241f47aa8e8e3b4f8675786ccca5547373c1711f0956b0f7222958097946f7452dd539d864223b1b3167221c7a7ff5db865abbe8367db846c84aa518e") (async) ioctl$auto_posix_clock_file_operations_posix_clock(r3, 0xfffffffffffff3f0, &(0x7f00000003c0)="b5e8ae3241f47aa8e8e3b4f8675786ccca5547373c1711f0956b0f7222958097946f7452dd539d864223b1b3167221c7a7ff5db865abbe8367db846c84aa518e") openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x10400, 0x0) epoll_ctl$auto_EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000004c0)={0x7, 0x6}) close_range$auto(0x2, 0x8, 0x0) (async) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) (async) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) unshare$auto(0x40000080) unshare$auto(0x40000080) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ram14\x00', 0x729102, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/devices/platform/vhci_hcd.1/usb11/11-0:1.0/usb11-port6/quirks\x00', 0x200, 0x0) (async) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000005c0)='/sys/devices/platform/vhci_hcd.1/usb11/11-0:1.0/usb11-port6/quirks\x00', 0x200, 0x0) socketpair$auto(0x1e, 0x4, 0x800000, 0x0) (async) r4 = socketpair$auto(0x1e, 0x4, 0x800000, 0x0) ioctl$auto(0xffffffffffffffff, 0x4b72, r4) (async) ioctl$auto(0xffffffffffffffff, 0x4b72, r4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) (async) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) pread64$auto(r2, &(0x7f0000000280)=':$\x99%^(+]\'\\!\x00', 0x2, 0x6) (async) pread64$auto(r2, &(0x7f0000000280)=':$\x99%^(+]\'\\!\x00', 0x2, 0x6) fstat$auto(0xffffffffffffffff, &(0x7f0000000640)={0x5, 0x9, 0x10005, 0x103, 0xee01, 0x0, 0x0, 0xffffffffffffff91, 0x0, 0x2, 0xec, 0x4, 0xfffffffc, 0x1, 0x4, 0xfffffffffffffff8}) r5 = openat$auto_tracing_fops_trace(0xffffffffffffff9c, 0x0, 0x4800, 0x0) read$auto_tracing_fops_trace(r5, &(0x7f0000000440)=""/219, 0xdb) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB='!\x00\''], 0x1ac}, 0x1, 0x0, 0x0, 0x44}, 0x40090) socket(0x10, 0x2, 0x0) (async) r6 = socket(0x10, 0x2, 0x0) sendmmsg$auto(r6, &(0x7f0000000080)={{0x0, 0x8002, &(0x7f00000002c0)={0x0, 0xc4}, 0x2, 0x0, 0x0, 0x1}, 0x5}, 0x3, 0x0) (async) sendmmsg$auto(r6, &(0x7f0000000080)={{0x0, 0x8002, &(0x7f00000002c0)={0x0, 0xc4}, 0x2, 0x0, 0x0, 0x1}, 0x5}, 0x3, 0x0) 4.477588017s ago: executing program 3 (id=2155): mmap$auto(0x5, 0x20009, 0x4000000000df, 0x400eb1, 0x401, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x4, 0x7) socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x2, 0xa, 0x0) socket(0xa, 0x2, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = socket(0x2b, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x22}}, 0x6a) sendmmsg$auto(r0, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x7, 0xb}, 0x800009}, 0x5, 0x20000000) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) write$auto(r0, 0x0, 0xfffffde9) recvfrom$auto(0x3, 0x0, 0x800000000e, 0x100, 0x0, 0xfffffffffffffffd) r1 = openat$auto_proc_pid_maps_operations_internal(0xffffffffffffff9c, 0x0, 0x100, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) capget$auto(0x0, 0xfffffffffffffffe) r2 = socket(0xa, 0x5, 0x0) getsockopt$auto(r2, 0x84, 0x7a, 0x0, 0x0) mmap$auto(0x0, 0x4000400008, 0x800000000000df, 0x9b72, 0x2, 0x8000) mbind$auto(0x2000, 0x100000004, 0x100000000, 0x0, 0x2, 0x2) madvise$auto(0x6, 0xffffffff97fb20a5, 0xfffe) r3 = openat$auto_mon_fops_binary_mon_bin(0xffffffffffffff9c, &(0x7f0000000080)='/dev/usbmon2\x00', 0x40080, 0x0) listen$auto(r1, 0x5) ioctl$auto_MON_IOCQ_URB_LEN(r3, 0x9201, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0xd4981, 0x0) socket(0x1f, 0x800, 0xffffff01) ioctl$auto(0xffffffffffffffff, 0xc0285629, 0xffffffffffffffff) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, 0x0, 0x6482, 0x0) unshare$auto(0x40000080) io_uring_setup$auto(0x59, &(0x7f0000000080)={0x7fffffff, 0x1d, 0x3000, 0x6, 0x7, 0x400a, 0xffffffffffffffff, [], {0x6, 0x6, 0x8c48, 0x29b, 0x3, 0x7f, 0x0, 0x6}, {0x100, 0x1, 0x52, 0x85, 0x2, 0x1a7b870a, 0x76c5, 0x8, 0x100000000}}) 3.908181059s ago: executing program 1 (id=2160): mkdir$auto(&(0x7f0000000100)='}[,&*}\x00', 0x8001) r0 = socket(0xb, 0x1, 0x84) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) shutdown$auto(0x200000003, 0x2) uname$auto(0x0) setsockopt$auto(0x3, 0x10000000084, 0x85, 0x0, 0x90) close_range$auto(0x2, 0x8, 0x0) memfd_secret$auto(0x0) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20342, 0x0) mmap$auto(0x0, 0x8, 0x8, 0x13, 0x3, 0x0) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r2) ioctl$auto_KVM_CREATE_VM(r1, 0x5000aea5, 0x20) connect$auto(r0, &(0x7f0000000080)=@in={0x2, 0x3, @private=0xa010100}, 0x54) close_range$auto(0x2, 0x8, 0x0) mount$auto(0x0, &(0x7f00000000c0)='}[,&*}\x00', &(0x7f0000000140)='nfsd\x00', 0x8, 0x0) chdir$auto(&(0x7f0000000000)='}[,&*}\x00') mknod$auto(&(0x7f0000000580)='u[,&*}\x00\a\x00\x00\x00?\xa4\x1fN\xa1~5Z\xc7\r\f}M4\xa8m\xe6\x19[11\xab\xff-E\xac9(\xb4O\xa0t4h\x9f-gn\x1f\x01\x00\x00\x00\x00\x00\x00\x00\xaeR\x81\r_\x0e\x19\b\x85\bvv(e\xdax)\t\x15\xf6\xc8\xee\x04\x16\xc1\x9a!\x87I7\x8cD&zg\xb0a\xab|E\xde\x14\xee[\xc8\xc0\xa8Nh\x0f\xa3\xdbT\xb3\xb8\xd2F\xa0\xc4]\xaf\xc43&\xe4\x01\x05\xd2\x15\xf8\xf1!\x9d\x92\xbbH\xd3^aD\x87\xd8\xe7\xd2\xf3[r\xc5S&}D[\x97\xf1\xd9\xf8Y\x1c\x03\x84\xb4\xd7\x16\x19\xe5\x17\x10\xd8fcG:\xfbY8\x17w\x98?\x03@\xe5\x02\x05\x93h\xb9\xf7\xef\x84\x8aGlN\a\x1e\x00\x00\x00\x00\x00\x00\x00\xf1p\xeb\xe9(%\x89\xef\x85\xdfr\xce\x00\x00\x00\x00\xff\x00\xa2M\'d\x12\x1c\x12\xca\xa5_\x8d\xdf\xc5\x8d\x19?\xfc~\xb3X\x14\xa7\xa9M\x87\xfcTW\x1bR\xbci\x8d\x8aNEO\xb3~~\xa8\xa6\x894\x80;s\xb7\xa3V\x1b\x14|\x9e\xd4\x05\x85\x0f!\xab-E\'\x97Y\xb7\xe8fMv_\xf8\xa0S\xef\xb7\b\xe7!T.g\x92\x87\t$\x06\xa4\xfb\x83\x8c\x17^\x82\xe7\xd3\xf6q\x1a\xa0\xf82[W\x90\xdd\xe3\xde\xa9\xde\x94`-\x9a\x1e}\xebO*\xb85,v.\xfc5\xba?vlt\xda%\x06a\x15I\x1f\xe3\x05+\x810T2\xf9\x9b\xc7\xd1\t\x03\xf2\x8d\x8a\x90\xb54\bH<9\xf1\x91 D\x85g,\xaa\xca\xcd\xd5\xcb\x9a\xb1j\xf2F\xce\x14\x92\xf9\xd7\xec\xc5\x1e\x8aq2\xce\x881f\xd7\xd4\x9e\xf6\xb6P\x01\xe8T\xb5X\xb9d-I\xd6\x91\xc3\xe2\x88S\x82l=\x02t$p\t\x8cY\x06\r\x83\xb0\x86\xc6\x84\x1c\xce\xb6\xf0\xdfC\x9fj<\xfe\xa4\x1f\x82L\xe4\x13+H\x00\x00\x00\x00\x00\x00\x00\x01M\x16\xa0\xbeB6\xfb\xa2-\x17\x93Q\x9fKusl5\xa2$M\xb4\x18\x1db\xf3\xce\x8c\xe5Rna\xd5\xbbQ\xc7\xa7+\vH\xc1l\x1bIv\xe8_', 0x1081, 0x9) 3.462358108s ago: executing program 1 (id=2161): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) set_mempolicy$auto(0x1, &(0x7f0000000180)=0x2, 0x6) sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082dbd7000fedbdf250300000008000400b70a0000060007000080000008000200", @ANYRES32, @ANYBLOB="0a0005000180c200000e00000a0001000180c200000e00000a000100aaaaaaaaaa35000008000200", @ANYRES32, @ANYBLOB="060006000500000008002e"], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x40) r0 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB='.'], 0x1ac}, 0x1, 0x0, 0x0, 0x24040840}, 0x94) sendmmsg$auto(r0, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0xfc2}, 0x2, 0x0, 0x7, 0xa505}, 0x800}, 0x7, 0x4008) 3.120170401s ago: executing program 1 (id=2163): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async) mmap$auto(0x0, 0x400005, 0xdf, 0x9b72, 0x2, 0x8000) read$auto_fake_panic_fops_(0xffffffffffffffff, 0x0, 0x0) (async) r0 = openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/pcmC1D0c\x00', 0x9003, 0x0) ioctl$auto_SNDRV_PCM_IOCTL_HW_REFINE2(r0, 0xc2604110, &(0x7f0000000040)={0x6, [{[0x2, 0xf5e, 0x1ff, 0xd, 0x7f, 0x8, 0x4, 0x663d349e]}, {[0x2, 0xa6, 0x5c915993, 0xfffffffd, 0x6, 0xe, 0x80000001, 0x3]}, {[0x6, 0xe, 0x2, 0x579c8feb, 0x9, 0x6, 0x7, 0xa53]}], [{[0x75d, 0x9, 0x6, 0x17f29ee4, 0x400, 0x7, 0xc, 0x44]}, {[0x1, 0xeade, 0x1, 0x3, 0xf0, 0x5, 0x101, 0x1]}, {[0x7e61, 0x6, 0x7, 0x20000, 0x0, 0x5, 0x100, 0x9]}, {[0x4, 0x5, 0x1, 0xfffffff7, 0x5, 0x0, 0xfffffffb, 0x1]}, {[0x3, 0x1000, 0x8, 0x8, 0x2, 0xe88, 0xf, 0xd403]}], [{0xfffffffa, 0x4, 0x0, 0x0, 0x1, 0x1}, {0x7f, 0x6, 0x1, 0x0, 0x0, 0x1}, {0x3, 0x1, 0x1, 0x0, 0x0, 0x1}, {0x61, 0x1, 0x0, 0x0, 0x0, 0x1}, {0x5, 0x49c5fc8b, 0x0, 0x0, 0x0, 0x1}, {0x7ff, 0x7, 0x0, 0x1, 0x1, 0x1}, {0x6, 0x9, 0x0, 0x1, 0x1}, {0x9, 0x6, 0x0, 0x1}, {0x7fd, 0x7, 0x0, 0x1, 0x0, 0x1}, {0x7, 0xfffffffd, 0x1, 0x1, 0x1}, {0x8, 0x4, 0x0, 0x0, 0x1, 0x1}, {0x3, 0x5, 0x1, 0x1, 0x0, 0x1}], [{0xbe, 0xd5, 0x0, 0x1, 0x0, 0x1}, {0xc2, 0x7fffffff, 0x1, 0x1, 0x1}, {0xbc, 0xbb5e, 0x1, 0x0, 0x0, 0x1}, {0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x100, 0x12e800, 0x1, 0x1, 0x1, 0x1}, {0x2, 0xf, 0x0, 0x1, 0x1}, {0xffff, 0x8, 0x0, 0x0, 0x0, 0x1}, {0x9, 0x3, 0x1, 0x1, 0x0, 0x1}, {0x80000000, 0x6, 0x0, 0x1}], 0x100, 0x2, 0x4, 0x9, 0x5, 0x0, 0x8, "938f570ba48ab1df6ea169301a0f4b75", "16fef137d6f6aa1d93e7fd319170d04be4063eb16bddc7a41e5782dfff02104539c9b5e571a002e14933724526d0c013"}) openat$auto_vmwgfx_driver_fops_vmwgfx_drv(0xffffffffffffff9c, 0x0, 0x200100, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000040), 0xffffffffffffffff) (async) mmap$auto(0x4, 0x2020009, 0x5, 0x7f, r0, 0x4008000) (async) move_pages$auto(0x0, 0x1002, 0x0, 0x0, 0x0, 0x2) close_range$auto(0x2, 0x8, 0x0) (async) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) (async) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x48000) (async) ioctl$auto(0x3, 0x4038ae7a, 0x38) (async) sendmsg$auto_ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010027bd7000fddbdf25190000001900018014000200772c616e3000"/38], 0x2c}, 0x1, 0x0, 0x0, 0x20040840}, 0x40000) (async) close_range$auto(0x2, 0x8, 0x0) (async) socket(0xa, 0x5, 0x0) (async) socket(0xa, 0x801, 0x84) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) r4 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) msgctl$auto_IPC_INFO(0x100, 0x3, &(0x7f00000012c0)={{0x62d, 0xffffffffffffffff, 0xee00, 0x1, 0x5, 0x1, 0x9}, 0x0, 0x0, 0x1b, 0x7, 0x5, 0x7, 0x1, 0xdd34, 0x7, 0x8, @raw=0xffff}) (async) write$auto(r4, &(0x7f0000000400)='/dev/audio1\x00', 0xa3d9) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) (async) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000300)='/sys/bus/usb/drivers/cdc_phonet/bind\x00', 0x40000, 0x0) (async) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) (async) get_robust_list$auto(0x0, 0x0, 0x0) (async) lsm_list_modules$auto(0x0, 0x0, 0x0) sendmmsg$auto(0x3, &(0x7f0000000000)={{0x0, 0x2, 0x0, 0x106, 0x0, 0x6c, 0x697c}, 0xed71390}, 0x9a6, 0x0) 3.04467791s ago: executing program 2 (id=2164): r0 = syz_genetlink_get_family_id$auto_netdev(&(0x7f0000000140), 0xffffffffffffffff) close_range$auto(0x2, 0x8, 0x0) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0x100000000, 0xd77, 0x5, 0x7181, 0x81, 0x7, 0x3, 0x9a89, 0x5, 0x80005, 0x800, 0x1fffffffffff, 0xb4, 0x3, 0x2, 0x10007, 0x80, 0x0, 0x0, 0xa, 0x22004, 0x200, 0x4, 0x84, 0x0, 0x0, 0x0, 0x0, 0x1, [0x0, 0x0, 0xea4, 0x4, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x100000000, 0x0, 0x3, 0x4, 0x5, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000000]}, 0x1fe, 0xd) sendmsg$auto_NETDEV_CMD_QUEUE_GET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r0, @ANYBLOB="010025bd7000fbdbdf0002"], 0x1c}, 0x1, 0x0, 0x0, 0x40801}, 0x4000000) r1 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)=ANY=[], 0x1ac}, 0x1, 0x0, 0x0, 0x40814}, 0x2004c0c4) sendmmsg$auto(r1, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080), 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0xda5c}, 0x800}, 0x7, 0x4008) (fail_nth: 2) 2.955351445s ago: executing program 0 (id=2165): mmap$auto(0x0, 0x5, 0x4000000000e2, 0xeb1, 0x401, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$auto_nlctrl(&(0x7f0000003fc0), 0xffffffffffffffff) sendmsg$auto_CTRL_CMD_GETFAMILY2(r1, &(0x7f00000040c0)={0x0, 0x0, &(0x7f0000004080)={&(0x7f0000004000)={0x24, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@CTRL_ATTR_FAMILY_NAME={0xf, 0x2, 'veth0_vlan\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000050) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000001340), 0xffffffffffffffff) sendmsg$auto_HWSIM_CMD_NEW_RADIO(r3, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={0x14, r4, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x24040000}, 0x18800) setsockopt$auto(r0, 0x110, 0x4, 0x0, 0x4) socket(0xf, 0x3, 0x2) shmctl$auto_IPC_RMID(0x0, 0x0, &(0x7f00000000c0)={{0x3, 0x0, 0x0, 0xdec, 0x5, 0xa5, 0x7}, 0x5, 0x5b, 0xfffffffffffffffc, 0x682, @inferred=0xffffffffffffffff, @inferred=0xffffffffffffffff, 0x63f, 0x0, &(0x7f00000001c0)="029fb61e8bf880faf81027e520b3adf48399973e055347f4030b39b57fb334db07a4e318ff4cee953d8a6fbb06562f05e3d21a98d583886f5bd191686fe750fb841c2ad3bc5d0563e8ba264b5f72133bb785edf7a827d0fc1e17f7ffc9944120f0e23b84d430d8ef4bf218eda0bddbcf8142813a76e32bf9feb08d3b2da03604757efab39be26480528bc0e7500e32542ac7fdab5315efdd4fe5502f0347faa7809a952f0a1b8a17abea4a4b4a31489541616765ec5f2ae5bd2bb358b167baea3bdb966ae73fc3067fbe225b2c7a", &(0x7f0000000380)="799e926014af5f06f0a25425ba9f4c71d658b1e59c9476e8a2ba22ab9f44f4e83e217feefafe5d44d72cb9e978e6310e621698cd35eec4872652a53f9c7198bc7ab411cc52ae463eed01592f60ab9c874185fddb4cc1c419e7a97b2681be55f679d15e698465ea676f62e5722f5827774650694e5247d5e7e7fc56f2b392a01f3ca44699e78c6b457d30712cd67ae6a5458776ccdc81d262fbf074af47305887f250c061e5f071c5c186eb0cfa13088b88f2601c2c0de534f9ca70c9cd3b92f69284f11a92e7711b35080ee6cd7639eb1fe7f3f621038e"}) ioctl$auto(0xffffffffffffffff, 0xc0045401, 0xffffffffffffffff) 2.623356953s ago: executing program 2 (id=2166): mmap$auto(0x0, 0x5, 0x4000000000e2, 0xeb1, 0x401, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$auto_nlctrl(&(0x7f0000003fc0), 0xffffffffffffffff) sendmsg$auto_CTRL_CMD_GETFAMILY2(r1, &(0x7f00000040c0)={0x0, 0x0, &(0x7f0000004080)={&(0x7f0000004000)={0x24, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@CTRL_ATTR_FAMILY_NAME={0xf, 0x2, 'veth0_vlan\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000050) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000001340), 0xffffffffffffffff) sendmsg$auto_HWSIM_CMD_NEW_RADIO(r3, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={0x14, r4, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x24040000}, 0x18800) setsockopt$auto(r0, 0x110, 0x4, 0x0, 0x4) syz_genetlink_get_family_id$auto_tipcv2(&(0x7f0000000180), 0xffffffffffffffff) socket(0xf, 0x3, 0x2) shmctl$auto_IPC_RMID(0x0, 0x0, &(0x7f00000000c0)={{0x3, 0x0, 0x0, 0xdec, 0x5, 0xa5, 0x7}, 0x5, 0x5b, 0xfffffffffffffffc, 0x682, @inferred=0xffffffffffffffff, @inferred=0xffffffffffffffff, 0x63f, 0x0, &(0x7f00000001c0)="029fb61e8bf880faf81027e520b3adf48399973e055347f4030b39b57fb334db07a4e318ff4cee953d8a6fbb06562f05e3d21a98d583886f5bd191686fe750fb841c2ad3bc5d0563e8ba264b5f72133bb785edf7a827d0fc1e17f7ffc9944120f0e23b84d430d8ef4bf218eda0bddbcf8142813a76e32bf9feb08d3b2da03604757efab39be26480528bc0e7500e32542ac7fdab5315efdd4fe5502f0347faa7809a952f0a1b8a17abea4a4b4a31489541616765ec5f2ae5bd2bb358b167baea3bdb966ae73fc3067fbe225b2c7a", &(0x7f0000000380)="799e926014af5f06f0a25425ba9f4c71d658b1e59c9476e8a2ba22ab9f44f4e83e217feefafe5d44d72cb9e978e6310e621698cd35eec4872652a53f9c7198bc7ab411cc52ae463eed01592f60ab9c874185fddb4cc1c419e7a97b2681be55f679d15e698465ea676f62e5722f5827774650694e5247d5e7e7fc56f2b392a01f3ca44699e78c6b457d30712cd67ae6a5458776ccdc81d262fbf074af47305887f250c061e5f071c5c186eb0cfa13088b88f2601c2c0de534f9ca70c9cd3b92f69284f11a92e7711b35080ee6cd7639eb1fe7f3f621038e"}) ioctl$auto(0xffffffffffffffff, 0xc0045401, 0xffffffffffffffff) 2.315025535s ago: executing program 0 (id=2167): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0x8, 0x0) socketpair$auto(0x1e, 0x1, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x2000000000000021, 0x2, 0x10000000000002) r0 = socket(0x15, 0x5, 0x0) setsockopt$auto(r0, 0x114, 0x8, 0x0, 0x4) bind$auto(0x3, 0x0, 0x6a) 2.247611384s ago: executing program 2 (id=2168): r0 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/scsi/scsi\x00', 0x400, 0x0) read$auto(r0, &(0x7f0000000000)='/\x00', 0x6) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x80002, 0x73) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) socket(0x10, 0x2, 0x0) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00211459a600fbdbdf250200000008000300000000001b0004"], 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0xc0) sendmsg$auto_TCP_METRICS_CMD_GET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB='\n\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01002d"], 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB='Z'], 0x1ac}}, 0x40000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[], 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/fail-nth\x00', 0x0, 0x0) read$auto(r1, &(0x7f0000000000)='\x00', 0x3c1) close_range$auto(0x2, 0x8, 0x0) socketpair$auto(0x1e, 0x1, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x2000000000000021, 0x2, 0x10000000000002) r2 = semctl$auto_GETPID(0x4, 0x0, 0xb, 0x2) getsid$auto(r2) r3 = socket(0x15, 0x5, 0x0) setsockopt$auto(r3, 0x114, 0x8, 0x0, 0x4) bind$auto(0x3, 0x0, 0x6a) 1.93497025s ago: executing program 0 (id=2169): mkdir$auto(&(0x7f0000000100)='}[,&*}\x00', 0x8001) r0 = socket(0xb, 0x1, 0x84) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) shutdown$auto(0x200000003, 0x2) uname$auto(0x0) setsockopt$auto(0x3, 0x10000000084, 0x85, 0x0, 0x90) close_range$auto(0x2, 0x8, 0x0) memfd_secret$auto(0x0) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20342, 0x0) mmap$auto(0x0, 0x8, 0x8, 0x13, 0x3, 0x0) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r2) ioctl$auto_KVM_CREATE_VM(r1, 0x5000aea5, 0x20) connect$auto(r0, &(0x7f0000000080)=@in={0x2, 0x3, @private=0xa010100}, 0x54) close_range$auto(0x2, 0x8, 0x0) mount$auto(0x0, &(0x7f00000000c0)='}[,&*}\x00', &(0x7f0000000140)='nfsd\x00', 0x8, 0x0) chdir$auto(&(0x7f0000000000)='}[,&*}\x00') mknod$auto(&(0x7f0000000580)='u[,&*}\x00\a\x00\x00\x00?\xa4\x1fN\xa1~5Z\xc7\r\f}M4\xa8m\xe6\x19[11\xab\xff-E\xac9(\xb4O\xa0t4h\x9f-gn\x1f\x01\x00\x00\x00\x00\x00\x00\x00\xaeR\x81\r_\x0e\x19\b\x85\bvv(e\xdax)\t\x15\xf6\xc8\xee\x04\x16\xc1\x9a!\x87I7\x8cD&zg\xb0a\xab|E\xde\x14\xee[\xc8\xc0\xa8Nh\x0f\xa3\xdbT\xb3\xb8\xd2F\xa0\xc4]\xaf\xc43&\xe4\x01\x05\xd2\x15\xf8\xf1!\x9d\x92\xbbH\xd3^aD\x87\xd8\xe7\xd2\xf3[r\xc5S&}D[\x97\xf1\xd9\xf8Y\x1c\x03\x84\xb4\xd7\x16\x19\xe5\x17\x10\xd8fcG:\xfbY8\x17w\x98?\x03@\xe5\x02\x05\x93h\xb9\xf7\xef\x84\x8aGlN\a\x1e\x00\x00\x00\x00\x00\x00\x00\xf1p\xeb\xe9(%\x89\xef\x85\xdfr\xce\x00\x00\x00\x00\xff\x00\xa2M\'d\x12\x1c\x12\xca\xa5_\x8d\xdf\xc5\x8d\x19?\xfc~\xb3X\x14\xa7\xa9M\x87\xfcTW\x1bR\xbci\x8d\x8aNEO\xb3~~\xa8\xa6\x894\x80;s\xb7\xa3V\x1b\x14|\x9e\xd4\x05\x85\x0f!\xab-E\'\x97Y\xb7\xe8fMv_\xf8\xa0S\xef\xb7\b\xe7!T.g\x92\x87\t$\x06\xa4\xfb\x83\x8c\x17^\x82\xe7\xd3\xf6q\x1a\xa0\xf82[W\x90\xdd\xe3\xde\xa9\xde\x94`-\x9a\x1e}\xebO*\xb85,v.\xfc5\xba?vlt\xda%\x06a\x15I\x1f\xe3\x05+\x810T2\xf9\x9b\xc7\xd1\t\x03\xf2\x8d\x8a\x90\xb54\bH<9\xf1\x91 D\x85g,\xaa\xca\xcd\xd5\xcb\x9a\xb1j\xf2F\xce\x14\x92\xf9\xd7\xec\xc5\x1e\x8aq2\xce\x881f\xd7\xd4\x9e\xf6\xb6P\x01\xe8T\xb5X\xb9d-I\xd6\x91\xc3\xe2\x88S\x82l=\x02t$p\t\x8cY\x06\r\x83\xb0\x86\xc6\x84\x1c\xce\xb6\xf0\xdfC\x9fj<\xfe\xa4\x1f\x82L\xe4\x13+H\x00\x00\x00\x00\x00\x00\x00\x01M\x16\xa0\xbeB6\xfb\xa2-\x17\x93Q\x9fKusl5\xa2$M\xb4\x18\x1db\xf3\xce\x8c\xe5Rna\xd5\xbbQ\xc7\xa7+\vH\xc1l\x1bIv\xe8_', 0x1081, 0x9) 1.934796995s ago: executing program 1 (id=2170): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0x8, 0x0) socketpair$auto(0x1e, 0x1, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x2000000000000021, 0x2, 0x10000000000002) r0 = socket(0x15, 0x5, 0x0) setsockopt$auto(r0, 0x114, 0x8, 0x0, 0x4) bind$auto(0x3, 0x0, 0x6a) (fail_nth: 2) 1.740193576s ago: executing program 2 (id=2171): mmap$auto(0x0, 0x20009, 0xdf, 0x400eb1, 0x401, 0x8000) r0 = openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x2a801, 0x0) poll$auto(&(0x7f0000000240)={r0, 0x20, 0x2}, 0x5, 0x104) write$auto(0x3, 0x0, 0xfffffdef) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) socket(0x18, 0x2, 0x2) io_uring_setup$auto(0x6, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x21, 0x2, 0x2) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x60742, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, 0x0, 0x6a200, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) r1 = openat$auto_trace_options_fops_trace(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/tracing/options/blk_classic\x00', 0x5, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_sw_sync_debugfs_fops_sync_debug(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) ioctl$auto_SW_SYNC_IOC_CREATE_FENCE(r2, 0xc0285700, 0x0) r3 = openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, 0x0, 0x80800, 0x0) read$auto(r3, 0x0, 0x39b8) r4 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000180)='ns/uts\x00') ioctl$auto(0x3, 0xc0383e04, r4) write$auto(r1, 0x0, 0x6) pipe2$auto(&(0x7f0000000000)=r1, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x400008, 0x1000df, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, r5, 0x1000000000008000) preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xfffffffd}, 0x6, 0x8, 0x5) 1.451328368s ago: executing program 0 (id=2172): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) set_mempolicy$auto(0x1, &(0x7f0000000180)=0x2, 0x6) sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082dbd7000fedbdf250300000008000400b70a0000060007000080000008000200", @ANYRES32, @ANYBLOB="0a0005000180c200000e00000a0001000180c200000e00000a000100aaaaaaaaaa35000008000200", @ANYRES32, @ANYBLOB="060006000500000008002e"], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x40) r0 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB='.'], 0x1ac}, 0x1, 0x0, 0x0, 0x24040840}, 0x94) sendmmsg$auto(r0, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0xfc2}, 0x2, 0x0, 0x7, 0xa505}, 0x800}, 0x7, 0x4008) 1.332476001s ago: executing program 3 (id=2173): openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) mmap$auto(0x400000000000008d, 0x3, 0x4000000000df, 0x9416, 0x401, 0x7ff) prctl$auto(0x23, 0x7, 0x7fffffffefff, 0x0, 0x0) mmap$auto(0x7fff, 0x400008, 0xda, 0x9b72, 0x2, 0x480000000008001) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) mbind$auto(0x2000000, 0x2091d2, 0x4, 0x0, 0x6, 0x2) 1.172267583s ago: executing program 1 (id=2174): mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x8000) socket(0x2, 0x2, 0x0) bind$auto(0x3, &(0x7f0000000100)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x700, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x801, 0x0) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x9, 0x8, 0x1, 0x2, 0x4, 0x15f4da0e, 0x3, 0xd08, 0xc, 0x8, 0x4, 0x6d3f, 0x9, 0x2, 0x4000000000000d]}, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) socket(0x1f, 0x80000, 0x3) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8002) r0 = syz_genetlink_get_family_id$auto_l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$auto_L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01ef2cbd7000f9dbdf25fcff0000060002000104030a309f720000000500070000000000080009000800000008000a000800000008001700d760c505c3a8101552", @ANYRES32, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) madvise$auto(0x8000000000000000, 0x0, 0x2) prctl$auto(0x400, 0x7fff, 0x0, 0x10000, 0x100000000000007) bind$auto(0x3, 0x0, 0x6a) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) prctl$auto(0x1, 0x400000001, 0x0, 0x1, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x7f, 0x0) close_range$auto(0x2, 0xa, 0x0) openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0xc0, 0x0) 1.120303292s ago: executing program 2 (id=2175): msgget$auto(0xc, 0x77d9) msgsnd$auto(0x0, &(0x7f0000000000)={0x1, 0x5}, 0x8, 0x9) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) unshare$auto(0x40000080) ioctl$auto_TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptya5\x00', 0x62c00, 0x0) openat$auto_uinput_fops_uinput(0xffffffffffffff9c, 0x0, 0x101001, 0x0) openat$auto_vmuser_fops_vmci_host(0xffffffffffffff9c, &(0x7f0000000040), 0x109001, 0x0) openat$auto_vmuser_fops_vmci_host(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000500)='/dev/tty34\x00', 0x2200, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x4, 0x948b, 0x3, 0x15f4da07, 0x3, 0x3, 0x62, 0x8000001f, 0x7, 0x6d3e, 0x9, 0x2, 0x8]}, 0x0) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) mincore$auto(0x1000, 0x8001, 0x0) unshare$auto(0x20000080) connect$auto(0x3, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x2710}, 0x10) unshare$auto(0x40000080) mmap$auto(0x406, 0x5, 0x7f, 0x17, r0, 0x8000) madvise$auto(0x0, 0xffffffffffff0001, 0x15) munmap$auto(0x20001000, 0x7fb3) r2 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/route\x00', 0x0, 0x0) pread64$auto(r2, 0x0, 0x8, 0x8000) ptrace$auto(0x10, 0x10000000000001, 0xffffffffffffff56, 0x868f) accept4$auto(0xffffffffffffffff, &(0x7f0000000180)=@isdn={0x22, 0x8, 0x7, 0x10, 0x4}, &(0x7f00000001c0)=0xff, 0x8001) sendmsg$auto(0xffffffffffffffff, 0x0, 0xfff) capset$auto(0x0, 0x0) select$auto(0x9, &(0x7f00000000c0)={[0xeeda, 0x5, 0x100000003, 0x9, 0x6, 0x1ff, 0x100000000, 0x3, 0x8, 0x401, 0x0, 0x8, 0x6, 0x9a8c, 0x9, 0x10001]}, &(0x7f0000000200)={[0x8, 0x6, 0x2, 0xb, 0x1, 0x4, 0x0, 0x7fff, 0xa, 0x193, 0xfffffffffffffff9, 0x3, 0x5a4, 0x1000, 0x80000001, 0x1]}, 0x0, &(0x7f0000000280)={0x10006, 0xcc}) 951.281441ms ago: executing program 0 (id=2176): mmap$auto(0x0, 0x5, 0x4000000000e2, 0xeb1, 0x401, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$auto_nlctrl(&(0x7f0000003fc0), 0xffffffffffffffff) sendmsg$auto_CTRL_CMD_GETFAMILY2(r1, &(0x7f00000040c0)={0x0, 0x0, &(0x7f0000004080)={&(0x7f0000004000)={0x24, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@CTRL_ATTR_FAMILY_NAME={0xf, 0x2, 'veth0_vlan\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000050) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000001340), 0xffffffffffffffff) sendmsg$auto_HWSIM_CMD_NEW_RADIO(r3, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={0x14, r4, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x24040000}, 0x18800) setsockopt$auto(r0, 0x110, 0x4, 0x0, 0x4) socket(0xf, 0x3, 0x2) shmctl$auto_IPC_RMID(0x0, 0x0, &(0x7f00000000c0)={{0x3, 0x0, 0x0, 0xdec, 0x5, 0xa5, 0x7}, 0x5, 0x5b, 0xfffffffffffffffc, 0x682, @inferred=0xffffffffffffffff, @inferred=0xffffffffffffffff, 0x63f, 0x0, &(0x7f00000001c0)="029fb61e8bf880faf81027e520b3adf48399973e055347f4030b39b57fb334db07a4e318ff4cee953d8a6fbb06562f05e3d21a98d583886f5bd191686fe750fb841c2ad3bc5d0563e8ba264b5f72133bb785edf7a827d0fc1e17f7ffc9944120f0e23b84d430d8ef4bf218eda0bddbcf8142813a76e32bf9feb08d3b2da03604757efab39be26480528bc0e7500e32542ac7fdab5315efdd4fe5502f0347faa7809a952f0a1b8a17abea4a4b4a31489541616765ec5f2ae5bd2bb358b167baea3bdb966ae73fc3067fbe225b2c7a", &(0x7f0000000380)="799e926014af5f06f0a25425ba9f4c71d658b1e59c9476e8a2ba22ab9f44f4e83e217feefafe5d44d72cb9e978e6310e621698cd35eec4872652a53f9c7198bc7ab411cc52ae463eed01592f60ab9c874185fddb4cc1c419e7a97b2681be55f679d15e698465ea676f62e5722f5827774650694e5247d5e7e7fc56f2b392a01f3ca44699e78c6b457d30712cd67ae6a5458776ccdc81d262fbf074af47305887f250c061e5f071c5c186eb0cfa13088b88f2601c2c0de534f9ca70c9cd3b92f69284f11a92e7711b35080ee6cd7639eb1fe7f3f621038e"}) ioctl$auto(0xffffffffffffffff, 0xc0045401, 0xffffffffffffffff) 192.655379ms ago: executing program 0 (id=2177): mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x8000) socket(0x2, 0x2, 0x0) bind$auto(0x3, &(0x7f0000000100)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x700, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x801, 0x0) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x9, 0x8, 0x1, 0x2, 0x4, 0x15f4da0e, 0x3, 0xd08, 0xc, 0x8, 0x4, 0x6d3f, 0x9, 0x2, 0x4000000000000d]}, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) socket(0x1f, 0x80000, 0x3) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = syz_genetlink_get_family_id$auto_l2tp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$auto_L2TP_CMD_TUNNEL_CREATE(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01ef2cbd7000f9dbdf25fcff0000060002000104030a309f720000000500070000000000080009000800000008000a000800000008001700d760c505c3a8101552", @ANYRES32, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x261c2, 0x84) syz_genetlink_get_family_id$auto_nl802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_NL802154_CMD_SET_MAX_FRAME_RETRIES(r1, 0x0, 0x800) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) getsockopt$auto(0xffffffffffffffff, 0x84, 0xff, 0x0, 0x0) openat$auto_urandom_fops_random(0xffffffffffffff9c, 0x0, 0x40, 0x0) bpf$auto(0x5, &(0x7f0000000080)=@bpf_attr_7={@prog_id=0xc, 0x92f1, 0x4}, 0xa) madvise$auto(0x8000000000000000, 0x0, 0x2) prctl$auto(0x400, 0x7fff, 0x0, 0x10000, 0x100000000000007) bind$auto(0x3, 0x0, 0x6a) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) prctl$auto(0x1, 0x400000001, 0x0, 0x1, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x7f, 0x0) 108.649068ms ago: executing program 1 (id=2178): mmap$auto(0x0, 0x5, 0x4000000000e2, 0xeb1, 0x401, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$auto_nlctrl(&(0x7f0000003fc0), 0xffffffffffffffff) sendmsg$auto_CTRL_CMD_GETFAMILY2(r1, &(0x7f00000040c0)={0x0, 0x0, &(0x7f0000004080)={&(0x7f0000004000)={0x24, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@CTRL_ATTR_FAMILY_NAME={0xf, 0x2, 'veth0_vlan\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000050) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000001340), 0xffffffffffffffff) sendmsg$auto_HWSIM_CMD_NEW_RADIO(r3, &(0x7f0000001400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)={0x14, r4, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x24040000}, 0x18800) setsockopt$auto(r0, 0x110, 0x4, 0x0, 0x4) syz_genetlink_get_family_id$auto_tipcv2(&(0x7f0000000180), 0xffffffffffffffff) socket(0xf, 0x3, 0x2) shmctl$auto_IPC_RMID(0x0, 0x0, &(0x7f00000000c0)={{0x3, 0x0, 0x0, 0xdec, 0x5, 0xa5, 0x7}, 0x5, 0x5b, 0xfffffffffffffffc, 0x682, @inferred=0xffffffffffffffff, @inferred=0xffffffffffffffff, 0x63f, 0x0, &(0x7f00000001c0)="029fb61e8bf880faf81027e520b3adf48399973e055347f4030b39b57fb334db07a4e318ff4cee953d8a6fbb06562f05e3d21a98d583886f5bd191686fe750fb841c2ad3bc5d0563e8ba264b5f72133bb785edf7a827d0fc1e17f7ffc9944120f0e23b84d430d8ef4bf218eda0bddbcf8142813a76e32bf9feb08d3b2da03604757efab39be26480528bc0e7500e32542ac7fdab5315efdd4fe5502f0347faa7809a952f0a1b8a17abea4a4b4a31489541616765ec5f2ae5bd2bb358b167baea3bdb966ae73fc3067fbe225b2c7a", &(0x7f0000000380)="799e926014af5f06f0a25425ba9f4c71d658b1e59c9476e8a2ba22ab9f44f4e83e217feefafe5d44d72cb9e978e6310e621698cd35eec4872652a53f9c7198bc7ab411cc52ae463eed01592f60ab9c874185fddb4cc1c419e7a97b2681be55f679d15e698465ea676f62e5722f5827774650694e5247d5e7e7fc56f2b392a01f3ca44699e78c6b457d30712cd67ae6a5458776ccdc81d262fbf074af47305887f250c061e5f071c5c186eb0cfa13088b88f2601c2c0de534f9ca70c9cd3b92f69284f11a92e7711b35080ee6cd7639eb1fe7f3f621038e"}) ioctl$auto(0xffffffffffffffff, 0xc0045401, 0xffffffffffffffff) 49.041948ms ago: executing program 3 (id=2179): mmap$auto(0x0, 0x2020006, 0x1000000000000007, 0xeb1, 0x0, 0x1008000) close_range$auto(0x0, 0xfffffffffffff000, 0x2) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000040), 0x200001, 0x0) r0 = openat$auto_proc_pid_maps_operations_internal(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/maps\x00', 0x40302, 0x0) ioctl$auto_PROCMAP_QUERY(r0, 0xc0686611, &(0x7f0000000080)={0x101, 0x34, 0x7fff, 0x5, 0x80000000009, 0x1, 0x800, 0x101, 0x5, 0x7f93, 0xfffffffe, 0x7ffffffd, 0x3, 0x7, 0x9}) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0xa, 0x2, 0x73) socket(0x23, 0x2, 0x0) r2 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000180), r1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'syzkaller1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'team_slave_1\x00', 0x0}) sendmsg$auto_OVS_DP_CMD_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000229bd7000ffdbdf250400000008000900", @ANYRES32=r3, @ANYBLOB="080007008d100000140001002f70726f632f73656c662f6d61707300080005000000000008000900", @ANYRES32=r4, @ANYBLOB="d27ea4b580c74010adf46dfe77e814991632de00000000000003ff4705b555e2860976127be38a7d8a00"/53], 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendto$auto(0x4, 0x0, 0x3f000000, 0x10000, &(0x7f0000000140)=@in={0x23, 0x4e33}, 0x80) close_range$auto(0x2, 0x8, 0x0) r5 = openat$auto_msr_fops_msr(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cpu/0/msr\x00', 0x8142, 0x0) ioctl$auto_X86_IOC_WRMSR_REGS(r5, 0xc02063a1, &(0x7f0000000440)=[0x7acb, 0x6, 0x9, 0x3, 0x4, 0x7f, 0x3, 0x2]) r6 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptyv4\x00', 0xe2293938c4e9e814, 0x0) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000000)='/dev/v4l-subdev5\x00', 0x280, 0x0) ioctl$auto(0x3, 0x2, r6) 0s ago: executing program 2 (id=2180): close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0xc) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/memory.kmem.tcp.limit_in_bytes\x00', 0xc2481, 0x0) sendmsg$auto_NFC_CMD_GET_SE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYRESDEC], 0x3c}}, 0x0) writev$auto(r2, &(0x7f0000000080)={&(0x7f0000000040), 0x1000}, 0x3) ioctl$auto(0x3, 0xae41, r1) ioctl$auto_KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000080)={0x2, 0x0, [{0x280, 0x400, 0x9}]}) kernel console output (not intermixed with test programs):                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               syzkaller syzkaller login: [ 913.505510][T15782] FAULT_INJECTION: forcing a failure. [ 913.505510][T15782] name failslab, interval 1, probability 0, space 0, times 0 [ 913.594819][T15782] CPU: 1 UID: 0 PID: 15782 Comm: syz.0.1788 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 913.594865][T15782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 913.594883][T15782] Call Trace: [ 913.594894][T15782] [ 913.594907][T15782] dump_stack_lvl+0x16c/0x1f0 [ 913.594961][T15782] should_fail_ex+0x512/0x640 [ 913.595022][T15782] should_failslab+0xc2/0x120 [ 913.595054][T15782] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 913.595105][T15782] ? skb_clone+0x190/0x3f0 [ 913.595140][T15782] skb_clone+0x190/0x3f0 [ 913.595170][T15782] netlink_deliver_tap+0xabd/0xd30 [ 913.595213][T15782] netlink_unicast+0x5df/0x7f0 [ 913.595255][T15782] ? __pfx_netlink_unicast+0x10/0x10 [ 913.595288][T15782] ? __build_skb_around+0x278/0x3b0 [ 913.595332][T15782] ? is_vmalloc_addr+0x86/0xa0 [ 913.595383][T15782] netlink_sendmsg+0x8d1/0xdd0 [ 913.595427][T15782] ? __pfx_netlink_sendmsg+0x10/0x10 [ 913.595481][T15782] ____sys_sendmsg+0xa98/0xc70 [ 913.595522][T15782] ? __pfx_____sys_sendmsg+0x10/0x10 [ 913.595570][T15782] ? __pfx__kstrtoull+0x10/0x10 [ 913.595616][T15782] ___sys_sendmsg+0x134/0x1d0 [ 913.595669][T15782] ? __pfx____sys_sendmsg+0x10/0x10 [ 913.595741][T15782] ? find_held_lock+0x2b/0x80 [ 913.595801][T15782] __sys_sendmmsg+0x200/0x420 [ 913.595856][T15782] ? __pfx___sys_sendmmsg+0x10/0x10 [ 913.595923][T15782] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 913.595996][T15782] ? fput+0x70/0xf0 [ 913.596034][T15782] ? ksys_write+0x1ac/0x250 [ 913.596078][T15782] ? __pfx_ksys_write+0x10/0x10 [ 913.596129][T15782] __x64_sys_sendmmsg+0x9c/0x100 [ 913.596177][T15782] ? lockdep_hardirqs_on+0x7c/0x110 [ 913.596224][T15782] do_syscall_64+0xcd/0x490 [ 913.596256][T15782] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 913.596289][T15782] RIP: 0033:0x7f1e0af8e929 [ 913.596313][T15782] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 913.596343][T15782] RSP: 002b:00007f1e0bd27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 913.596373][T15782] RAX: ffffffffffffffda RBX: 00007f1e0b1b5fa0 RCX: 00007f1e0af8e929 [ 913.596393][T15782] RDX: 0000000000000007 RSI: 0000200000000200 RDI: 0000000000000002 [ 913.596411][T15782] RBP: 00007f1e0bd27090 R08: 0000000000000000 R09: 0000000000000000 [ 913.596430][T15782] R10: 0000000000004008 R11: 0000000000000246 R12: 0000000000000001 [ 913.596448][T15782] R13: 0000000000000000 R14: 00007f1e0b1b5fa0 R15: 00007fff9096fe68 [ 913.596488][T15782] [ 913.856755][T15782] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1788'. [ 914.194353][T15788] FAULT_INJECTION: forcing a failure. [ 914.194353][T15788] name failslab, interval 1, probability 0, space 0, times 0 [ 914.254534][T15788] CPU: 1 UID: 0 PID: 15788 Comm: syz.3.1789 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 914.254584][T15788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 914.254604][T15788] Call Trace: [ 914.254616][T15788] [ 914.254630][T15788] dump_stack_lvl+0x16c/0x1f0 [ 914.254701][T15788] should_fail_ex+0x512/0x640 [ 914.254750][T15788] ? __kvmalloc_node_noprof+0x124/0x620 [ 914.254801][T15788] should_failslab+0xc2/0x120 [ 914.254834][T15788] __kvmalloc_node_noprof+0x137/0x620 [ 914.254883][T15788] ? io_alloc_cache_init+0x33/0x170 [ 914.254938][T15788] ? io_alloc_cache_init+0x33/0x170 [ 914.254986][T15788] io_alloc_cache_init+0x33/0x170 [ 914.255037][T15788] io_uring_setup+0x63b/0x2080 [ 914.255084][T15788] ? __pfx_io_uring_setup+0x10/0x10 [ 914.255126][T15788] ? do_futex+0x122/0x350 [ 914.255168][T15788] ? __pfx_do_futex+0x10/0x10 [ 914.255203][T15788] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 914.255283][T15788] ? xfd_validate_state+0x61/0x180 [ 914.255326][T15788] ? __pfx_do_writev+0x10/0x10 [ 914.255378][T15788] __x64_sys_io_uring_setup+0xc2/0x170 [ 914.255425][T15788] do_syscall_64+0xcd/0x490 [ 914.255457][T15788] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 914.255492][T15788] RIP: 0033:0x7f455c38e929 [ 914.255520][T15788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 914.255552][T15788] RSP: 002b:00007f455d24a038 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 914.255585][T15788] RAX: ffffffffffffffda RBX: 00007f455c5b6160 RCX: 00007f455c38e929 [ 914.255606][T15788] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 914.255625][T15788] RBP: 00007f455c410b39 R08: 0000000000000000 R09: 0000000000000000 [ 914.255644][T15788] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 914.255663][T15788] R13: 0000000000000000 R14: 00007f455c5b6160 R15: 00007ffd67acf3d8 [ 914.255716][T15788] [ 915.939876][T15892] page: refcount:29 mapcount:27 mapping:0000000000000000 index:0x0 pfn:0x78807 [ 916.018332][T15892] flags: 0xfff18000000214(referenced|dirty|workingset|node=0|zone=1|lastcpupid=0x7ff) [ 916.060371][T15892] raw: 00fff18000000214 0000000000000000 dead000000000122 0000000000000000 [ 916.094912][T15892] raw: 0000000000000000 0000000000000000 0000001d0000001a 0000000000000000 [ 916.135374][T15892] page dumped because: unmovable page [ 916.140857][T15892] page_owner tracks the page as allocated [ 916.751147][T15892] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2dc2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), pid 5827, tgid 5827 (syz-executor), ts 102090173904, free_ts 88113222200 [ 916.890385][T15892] post_alloc_hook+0x1c0/0x230 [ 916.921612][T15892] get_page_from_freelist+0x1321/0x3890 [ 916.944193][T15892] __alloc_frozen_pages_noprof+0x261/0x23f0 [ 916.975138][T15892] alloc_pages_mpol+0x1fb/0x550 [ 916.980799][T15892] alloc_pages_noprof+0x131/0x390 [ 917.153069][T15892] __vmalloc_node_range_noprof+0x72f/0x14b0 [ 917.282145][T15892] vmalloc_user_noprof+0x9e/0xe0 [ 917.305381][T15892] kcov_ioctl+0x4c/0x730 [ 917.321155][T15892] __x64_sys_ioctl+0x18b/0x210 [ 917.349131][T15892] do_syscall_64+0xcd/0x490 [ 917.372147][T15892] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 917.719313][T15892] page last free pid 5728 tgid 5728 stack trace: [ 917.784881][T15892] __free_frozen_pages+0x7fe/0x1180 [ 917.959062][T15892] __folio_put+0x329/0x450 [ 917.971114][T15892] anon_pipe_buf_release+0x3ed/0x500 [ 917.999082][T15892] anon_pipe_read+0x5ca/0x1210 [ 918.081633][T15892] vfs_read+0xa95/0xc60 [ 918.101220][T15892] ksys_read+0x1f8/0x250 [ 918.174492][T15892] do_syscall_64+0xcd/0x490 [ 918.179116][T15892] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 918.643522][T15918] ptrace attach of "./syz-executor exec"[5834] was attempted by "./syz-executor exec"[15918] [ 921.122121][T16031] ptrace attach of "./syz-executor exec"[5842] was attempted by "./syz-executor exec"[16031] [ 925.201867][T16178] page: refcount:28 mapcount:27 mapping:0000000000000000 index:0x0 pfn:0x78807 [ 925.902530][T16178] flags: 0xfff18000000214(referenced|dirty|workingset|node=0|zone=1|lastcpupid=0x7ff) [ 925.956218][T16176] FAULT_INJECTION: forcing a failure. [ 925.956218][T16176] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 925.971622][T16178] raw: 00fff18000000214 0000000000000000 dead000000000122 0000000000000000 [ 926.007434][T16176] CPU: 0 UID: 0 PID: 16176 Comm: syz.2.1806 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 926.007478][T16176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 926.007495][T16176] Call Trace: [ 926.007506][T16176] [ 926.007517][T16176] dump_stack_lvl+0x16c/0x1f0 [ 926.007571][T16176] should_fail_ex+0x512/0x640 [ 926.007623][T16176] _copy_to_user+0x32/0xd0 [ 926.007684][T16176] do_pagemap_scan+0xb81/0xcf0 [ 926.007732][T16176] ? __pfx_do_pagemap_scan+0x10/0x10 [ 926.007816][T16176] do_pagemap_cmd+0x58/0x80 [ 926.007851][T16176] ? __pfx_do_pagemap_cmd+0x10/0x10 [ 926.007890][T16176] __x64_sys_ioctl+0x18b/0x210 [ 926.007930][T16176] do_syscall_64+0xcd/0x490 [ 926.007962][T16176] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 926.007995][T16176] RIP: 0033:0x7fe9edb8e929 [ 926.008020][T16176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 926.008051][T16176] RSP: 002b:00007fe9eeaba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 926.008082][T16176] RAX: ffffffffffffffda RBX: 00007fe9eddb6080 RCX: 00007fe9edb8e929 [ 926.008101][T16176] RDX: 000020000000c380 RSI: 00000000c0606610 RDI: 0000000000000002 [ 926.008120][T16176] RBP: 00007fe9eeaba090 R08: 0000000000000000 R09: 0000000000000000 [ 926.008137][T16176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 926.008154][T16176] R13: 0000000000000000 R14: 00007fe9eddb6080 R15: 00007ffce8a61478 [ 926.008192][T16176] [ 926.092323][T16178] raw: 0000000000000000 0000000000000000 0000001c0000001a 0000000000000000 [ 926.237910][T16178] page dumped because: unmovable page [ 926.249724][T16178] page_owner tracks the page as allocated [ 926.261178][T16178] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x2dc2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), pid 5827, tgid 5827 (syz-executor), ts 102090173904, free_ts 88113222200 [ 926.362442][T16178] post_alloc_hook+0x1c0/0x230 [ 926.377627][T16178] get_page_from_freelist+0x1321/0x3890 [ 926.390102][T16178] __alloc_frozen_pages_noprof+0x261/0x23f0 [ 926.399233][T16178] alloc_pages_mpol+0x1fb/0x550 [ 926.405709][T16178] alloc_pages_noprof+0x131/0x390 [ 926.410967][T16178] __vmalloc_node_range_noprof+0x72f/0x14b0 [ 926.420633][T16178] vmalloc_user_noprof+0x9e/0xe0 [ 926.451299][T16178] kcov_ioctl+0x4c/0x730 [ 926.504405][T16178] __x64_sys_ioctl+0x18b/0x210 [ 926.509297][T16178] do_syscall_64+0xcd/0x490 [ 926.543540][T16178] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 926.576249][T16178] page last free pid 5728 tgid 5728 stack trace: [ 926.597420][T16178] __free_frozen_pages+0x7fe/0x1180 [ 926.611904][T16178] __folio_put+0x329/0x450 [ 926.632064][T16178] anon_pipe_buf_release+0x3ed/0x500 [ 926.644254][T16178] anon_pipe_read+0x5ca/0x1210 [ 926.666309][T16178] vfs_read+0xa95/0xc60 [ 926.721070][T16178] ksys_read+0x1f8/0x250 [ 926.725435][T16178] do_syscall_64+0xcd/0x490 [ 926.773459][T16178] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 927.584651][T16399] FAULT_INJECTION: forcing a failure. [ 927.584651][T16399] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 927.684866][T16399] CPU: 0 UID: 0 PID: 16399 Comm: syz.0.1811 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 927.684910][T16399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 927.684928][T16399] Call Trace: [ 927.684938][T16399] [ 927.684951][T16399] dump_stack_lvl+0x16c/0x1f0 [ 927.685007][T16399] should_fail_ex+0x512/0x640 [ 927.685059][T16399] _copy_from_user+0x2e/0xd0 [ 927.685110][T16399] copy_msghdr_from_user+0x98/0x160 [ 927.685161][T16399] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 927.685219][T16399] ? kfree+0x24f/0x4d0 [ 927.685256][T16399] ? find_held_lock+0x2b/0x80 [ 927.685296][T16399] ___sys_recvmsg+0xdb/0x1a0 [ 927.685345][T16399] ? __pfx____sys_recvmsg+0x10/0x10 [ 927.685421][T16399] ? __pfx___might_resched+0x10/0x10 [ 927.685464][T16399] do_recvmmsg+0x2fe/0x750 [ 927.685521][T16399] ? __pfx_do_recvmmsg+0x10/0x10 [ 927.685567][T16399] ? vfs_write+0x15d/0x1150 [ 927.685621][T16399] ? __pfx_vfs_write+0x10/0x10 [ 927.685691][T16399] __x64_sys_recvmmsg+0x22a/0x280 [ 927.685725][T16399] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 927.685769][T16399] do_syscall_64+0xcd/0x490 [ 927.685811][T16399] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 927.685842][T16399] RIP: 0033:0x7f1e0af8e929 [ 927.685868][T16399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 927.685902][T16399] RSP: 002b:00007f1e0bd27038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 927.685931][T16399] RAX: ffffffffffffffda RBX: 00007f1e0b1b5fa0 RCX: 00007f1e0af8e929 [ 927.685951][T16399] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 927.685969][T16399] RBP: 00007f1e0bd27090 R08: 0000000000000000 R09: 0000000000000000 [ 927.685987][T16399] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000001 [ 927.686006][T16399] R13: 0000000000000000 R14: 00007f1e0b1b5fa0 R15: 00007fff9096fe68 [ 927.686047][T16399] [ 931.883927][T16653] FAULT_INJECTION: forcing a failure. [ 931.883927][T16653] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 931.933475][T16653] CPU: 0 UID: 0 PID: 16653 Comm: syz.1.1828 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 931.933523][T16653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 931.933543][T16653] Call Trace: [ 931.933554][T16653] [ 931.933566][T16653] dump_stack_lvl+0x16c/0x1f0 [ 931.933621][T16653] should_fail_ex+0x512/0x640 [ 931.933676][T16653] _copy_from_user+0x2e/0xd0 [ 931.933730][T16653] copy_msghdr_from_user+0x98/0x160 [ 931.933785][T16653] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 931.933843][T16653] ? kfree+0x24f/0x4d0 [ 931.933882][T16653] ? __lock_acquire+0x622/0x1c90 [ 931.933931][T16653] ___sys_recvmsg+0xdb/0x1a0 [ 931.933982][T16653] ? __pfx____sys_recvmsg+0x10/0x10 [ 931.934055][T16653] ? __pfx___might_resched+0x10/0x10 [ 931.934098][T16653] do_recvmmsg+0x2fe/0x750 [ 931.934146][T16653] ? __pfx_do_recvmmsg+0x10/0x10 [ 931.934187][T16653] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 931.934237][T16653] ? __fget_files+0x20e/0x3c0 [ 931.934277][T16653] __x64_sys_recvmmsg+0x22a/0x280 [ 931.934301][T16653] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 931.934333][T16653] do_syscall_64+0xcd/0x490 [ 931.934356][T16653] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 931.934381][T16653] RIP: 0033:0x7fa73078e929 [ 931.934398][T16653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 931.934422][T16653] RSP: 002b:00007fa731646038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 931.934450][T16653] RAX: ffffffffffffffda RBX: 00007fa7309b5fa0 RCX: 00007fa73078e929 [ 931.934466][T16653] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 931.934481][T16653] RBP: 00007fa731646090 R08: 0000000000000000 R09: 0000000000000000 [ 931.934495][T16653] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 931.934509][T16653] R13: 0000000000000000 R14: 00007fa7309b5fa0 R15: 00007fff4903dbb8 [ 931.934539][T16653] [ 933.637462][T16771] FAULT_INJECTION: forcing a failure. [ 933.637462][T16771] name failslab, interval 1, probability 0, space 0, times 0 [ 933.650551][T16771] CPU: 0 UID: 0 PID: 16771 Comm: syz.1.1833 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 933.650598][T16771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 933.650618][T16771] Call Trace: [ 933.650629][T16771] [ 933.650642][T16771] dump_stack_lvl+0x16c/0x1f0 [ 933.650697][T16771] should_fail_ex+0x512/0x640 [ 933.650744][T16771] ? __kvmalloc_node_noprof+0x124/0x620 [ 933.650796][T16771] should_failslab+0xc2/0x120 [ 933.650827][T16771] __kvmalloc_node_noprof+0x137/0x620 [ 933.650875][T16771] ? io_alloc_cache_init+0x33/0x170 [ 933.650933][T16771] ? io_alloc_cache_init+0x33/0x170 [ 933.650984][T16771] io_alloc_cache_init+0x33/0x170 [ 933.651036][T16771] io_uring_setup+0x63b/0x2080 [ 933.651083][T16771] ? __pfx_io_uring_setup+0x10/0x10 [ 933.651123][T16771] ? do_futex+0x122/0x350 [ 933.651165][T16771] ? __pfx_do_futex+0x10/0x10 [ 933.651201][T16771] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 933.651285][T16771] ? xfd_validate_state+0x61/0x180 [ 933.651327][T16771] ? __pfx_do_writev+0x10/0x10 [ 933.651382][T16771] __x64_sys_io_uring_setup+0xc2/0x170 [ 933.651428][T16771] do_syscall_64+0xcd/0x490 [ 933.651480][T16771] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 933.651513][T16771] RIP: 0033:0x7fa73078e929 [ 933.651539][T16771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 933.651571][T16771] RSP: 002b:00007fa731604038 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 933.651601][T16771] RAX: ffffffffffffffda RBX: 00007fa7309b6160 RCX: 00007fa73078e929 [ 933.651622][T16771] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 933.651641][T16771] RBP: 00007fa730810b39 R08: 0000000000000000 R09: 0000000000000000 [ 933.651659][T16771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 933.651678][T16771] R13: 0000000000000000 R14: 00007fa7309b6160 R15: 00007fff4903dbb8 [ 933.651719][T16771] [ 933.916844][T16775] FAULT_INJECTION: forcing a failure. [ 933.916844][T16775] name failslab, interval 1, probability 0, space 0, times 0 [ 933.931094][T16775] CPU: 0 UID: 0 PID: 16775 Comm: syz.3.1831 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 933.931127][T16775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 933.931141][T16775] Call Trace: [ 933.931149][T16775] [ 933.931157][T16775] dump_stack_lvl+0x16c/0x1f0 [ 933.931200][T16775] should_fail_ex+0x512/0x640 [ 933.931234][T16775] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 933.931274][T16775] should_failslab+0xc2/0x120 [ 933.931296][T16775] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 933.931330][T16775] ? alloc_empty_file+0x55/0x1e0 [ 933.931357][T16775] alloc_empty_file+0x55/0x1e0 [ 933.931381][T16775] path_openat+0xda/0x2cb0 [ 933.931411][T16775] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 933.931445][T16775] ? __pfx_path_openat+0x10/0x10 [ 933.931479][T16775] ? __lock_acquire+0xb8a/0x1c90 [ 933.931511][T16775] do_filp_open+0x20b/0x470 [ 933.931544][T16775] ? __pfx_do_filp_open+0x10/0x10 [ 933.931597][T16775] ? alloc_fd+0x471/0x7d0 [ 933.931636][T16775] do_sys_openat2+0x11b/0x1d0 [ 933.931661][T16775] ? __pfx_do_sys_openat2+0x10/0x10 [ 933.931688][T16775] ? __fget_files+0x20e/0x3c0 [ 933.931724][T16775] __x64_sys_openat+0x174/0x210 [ 933.931749][T16775] ? __pfx___x64_sys_openat+0x10/0x10 [ 933.931773][T16775] ? ksys_write+0x1ac/0x250 [ 933.931815][T16775] do_syscall_64+0xcd/0x490 [ 933.931837][T16775] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 933.931859][T16775] RIP: 0033:0x7f455c38e929 [ 933.931877][T16775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 933.931901][T16775] RSP: 002b:00007f455d28c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 933.931922][T16775] RAX: ffffffffffffffda RBX: 00007f455c5b5fa0 RCX: 00007f455c38e929 [ 933.931938][T16775] RDX: 0000000000002a81 RSI: 0000200000000100 RDI: ffffffffffffff9c [ 933.931954][T16775] RBP: 00007f455d28c090 R08: 0000000000000000 R09: 0000000000000000 [ 933.931968][T16775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 933.931982][T16775] R13: 0000000000000001 R14: 00007f455c5b5fa0 R15: 00007ffd67acf3d8 [ 933.932012][T16775] [ 934.508155][T16780] ubi: mtd0 is already attached to ubi0 [ 935.642790][T16794] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x78800 [ 935.679953][T16794] head: order:1 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 935.730094][T16794] flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 935.751247][T16794] page_type: f5(slab) [ 935.755333][T16794] raw: 00fff00000000040 ffff88801b841b40 dead000000000122 0000000000000000 [ 935.800056][T16794] raw: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 935.825647][T16794] head: 00fff00000000040 ffff88801b841b40 dead000000000122 0000000000000000 [ 935.880657][T16794] head: 0000000000000000 0000000000100010 00000000f5000000 0000000000000000 [ 935.942833][T16794] head: 00fff00000000001 ffffea0001e20001 00000000ffffffff 00000000ffffffff [ 935.961209][T16794] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000002 [ 936.026895][T16794] page dumped because: unmovable page [ 936.165232][T16794] page_owner tracks the page as allocated [ 936.221668][T16794] page last allocated via order 1, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 16291, tgid 16290 (syz.3.1810), ts 926987280306, free_ts 926274803329 [ 936.261208][T16794] post_alloc_hook+0x1c0/0x230 [ 936.266108][T16794] get_page_from_freelist+0x1321/0x3890 [ 936.278921][T16794] __alloc_frozen_pages_noprof+0x261/0x23f0 [ 936.288027][T16794] alloc_pages_mpol+0x1fb/0x550 [ 936.341825][T16794] new_slab+0x23b/0x330 [ 936.356497][T16794] ___slab_alloc+0xd9c/0x1940 [ 936.379072][T16794] __slab_alloc.constprop.0+0x56/0xb0 [ 936.385167][T16794] __kmalloc_noprof+0x2f2/0x510 [ 936.391625][T16794] ops_init+0x77/0x5f0 [ 936.395912][T16794] setup_net+0x1ff/0x510 [ 936.400503][T16794] copy_net_ns+0x2a6/0x5f0 [ 936.406921][T16794] create_new_namespaces+0x3ea/0xa90 [ 936.414786][T16794] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 936.451818][T16794] ksys_unshare+0x45b/0xa40 [ 936.456613][T16794] __x64_sys_unshare+0x31/0x40 [ 936.476941][T16794] do_syscall_64+0xcd/0x490 [ 936.507868][T16794] page last free pid 16174 tgid 16168 stack trace: [ 936.524499][T16794] free_unref_folios+0xa65/0x1800 [ 936.538928][T16794] folios_put_refs+0x56f/0x740 [ 936.560740][T16794] shmem_undo_range+0x58f/0x1150 [ 936.571377][T16794] shmem_evict_inode+0x3a1/0xbe0 [ 936.587135][T16794] evict+0x3e6/0x920 [ 936.597320][T16794] iput+0x521/0x880 [ 936.607259][T16794] dentry_unlink_inode+0x29c/0x480 [ 936.621083][T16794] __dentry_kill+0x1d0/0x600 [ 936.625798][T16794] dput.part.0+0x4b1/0x9b0 [ 936.643235][T16794] dput+0x1f/0x30 [ 936.661172][T16794] __fput+0x51c/0xb70 [ 936.665328][T16794] task_work_run+0x14d/0x240 [ 936.681293][T16794] do_exit+0x864/0x2bd0 [ 936.687506][T16794] do_group_exit+0xd3/0x2a0 [ 936.701306][T16794] get_signal+0x2673/0x26d0 [ 936.711316][T16794] arch_do_signal_or_restart+0x8f/0x790 [ 937.160455][T14566] udevd[14566]: inotify_add_watch(7, /dev/nbd4128, 10) failed: No such file or directory [ 937.988590][T16828] ucma_write: process 2138 (syz.1.1844) changed security contexts after opening file descriptor, this is not allowed. [ 938.905218][T16842] FAULT_INJECTION: forcing a failure. [ 938.905218][T16842] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 938.920560][T16842] CPU: 1 UID: 0 PID: 16842 Comm: syz.3.1849 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 938.920604][T16842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 938.920623][T16842] Call Trace: [ 938.920632][T16842] [ 938.920644][T16842] dump_stack_lvl+0x16c/0x1f0 [ 938.920709][T16842] should_fail_ex+0x512/0x640 [ 938.920760][T16842] _copy_from_user+0x2e/0xd0 [ 938.920811][T16842] copy_msghdr_from_user+0x98/0x160 [ 938.920861][T16842] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 938.920918][T16842] ? kfree+0x24f/0x4d0 [ 938.920955][T16842] ? find_held_lock+0x2b/0x80 [ 938.920997][T16842] ___sys_recvmsg+0xdb/0x1a0 [ 938.921046][T16842] ? __pfx____sys_recvmsg+0x10/0x10 [ 938.921117][T16842] ? __pfx___might_resched+0x10/0x10 [ 938.921155][T16842] do_recvmmsg+0x2fe/0x750 [ 938.921211][T16842] ? __pfx_do_recvmmsg+0x10/0x10 [ 938.921255][T16842] ? vfs_write+0x15d/0x1150 [ 938.921307][T16842] ? __pfx_vfs_write+0x10/0x10 [ 938.921384][T16842] __x64_sys_recvmmsg+0x22a/0x280 [ 938.921419][T16842] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 938.921466][T16842] do_syscall_64+0xcd/0x490 [ 938.921498][T16842] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 938.921530][T16842] RIP: 0033:0x7f455c38e929 [ 938.921555][T16842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 938.921585][T16842] RSP: 002b:00007f455d28c038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 938.921616][T16842] RAX: ffffffffffffffda RBX: 00007f455c5b5fa0 RCX: 00007f455c38e929 [ 938.921636][T16842] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 938.921661][T16842] RBP: 00007f455d28c090 R08: 0000000000000000 R09: 0000000000000000 [ 938.921678][T16842] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000001 [ 938.921697][T16842] R13: 0000000000000000 R14: 00007f455c5b5fa0 R15: 00007ffd67acf3d8 [ 938.921733][T16842] [ 939.428114][ T30] audit: type=1800 audit(6045312735.308:6): pid=16853 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm=08 name="lu_gp_id" dev="configfs" ino=41761 res=0 errno=0 [ 941.103332][T16960] cgroup: fork rejected by pids controller in /syz1 [ 941.483144][T17094] FAULT_INJECTION: forcing a failure. [ 941.483144][T17094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 941.533107][T17094] CPU: 1 UID: 0 PID: 17094 Comm: syz.3.1862 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 941.533154][T17094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 941.533173][T17094] Call Trace: [ 941.533183][T17094] [ 941.533194][T17094] dump_stack_lvl+0x16c/0x1f0 [ 941.533245][T17094] should_fail_ex+0x512/0x640 [ 941.533293][T17094] _copy_from_user+0x2e/0xd0 [ 941.533343][T17094] copy_msghdr_from_user+0x98/0x160 [ 941.533402][T17094] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 941.533456][T17094] ? kfree+0x24f/0x4d0 [ 941.533494][T17094] ? __lock_acquire+0x622/0x1c90 [ 941.533541][T17094] ___sys_recvmsg+0xdb/0x1a0 [ 941.533589][T17094] ? __pfx____sys_recvmsg+0x10/0x10 [ 941.533660][T17094] ? __pfx___might_resched+0x10/0x10 [ 941.533700][T17094] do_recvmmsg+0x2fe/0x750 [ 941.533757][T17094] ? __pfx_do_recvmmsg+0x10/0x10 [ 941.533817][T17094] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 941.533880][T17094] ? __fget_files+0x20e/0x3c0 [ 941.533931][T17094] __x64_sys_recvmmsg+0x22a/0x280 [ 941.533965][T17094] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 941.534009][T17094] do_syscall_64+0xcd/0x490 [ 941.534039][T17094] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 941.534074][T17094] RIP: 0033:0x7f455c38e929 [ 941.534096][T17094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 941.534124][T17094] RSP: 002b:00007f455d28c038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 941.534151][T17094] RAX: ffffffffffffffda RBX: 00007f455c5b5fa0 RCX: 00007f455c38e929 [ 941.534168][T17094] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 941.534184][T17094] RBP: 00007f455d28c090 R08: 0000000000000000 R09: 0000000000000000 [ 941.534203][T17094] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 941.534220][T17094] R13: 0000000000000000 R14: 00007f455c5b5fa0 R15: 00007ffd67acf3d8 [ 941.534259][T17094] [ 941.835639][ T1305] ieee802154 phy0 wpan0: encryption failed: -22 [ 941.845354][ T1305] ieee802154 phy1 wpan1: encryption failed: -22 [ 942.015226][T17098] can: request_module (can-proto-4) failed. [ 944.121641][T17234] FAULT_INJECTION: forcing a failure. [ 944.121641][T17234] name failslab, interval 1, probability 0, space 0, times 0 [ 944.137011][T17234] CPU: 0 UID: 0 PID: 17234 Comm: syz.1.1870 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 944.137054][T17234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 944.137072][T17234] Call Trace: [ 944.137083][T17234] [ 944.137095][T17234] dump_stack_lvl+0x16c/0x1f0 [ 944.137150][T17234] should_fail_ex+0x512/0x640 [ 944.137202][T17234] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 944.137253][T17234] should_failslab+0xc2/0x120 [ 944.137283][T17234] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 944.137332][T17234] ? security_file_alloc+0x34/0x2b0 [ 944.137380][T17234] security_file_alloc+0x34/0x2b0 [ 944.137422][T17234] init_file+0x93/0x4c0 [ 944.137453][T17234] alloc_empty_file+0x73/0x1e0 [ 944.137487][T17234] path_openat+0xda/0x2cb0 [ 944.137529][T17234] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 944.137573][T17234] ? __pfx_path_openat+0x10/0x10 [ 944.137616][T17234] ? __lock_acquire+0xb8a/0x1c90 [ 944.137655][T17234] do_filp_open+0x20b/0x470 [ 944.137695][T17234] ? __pfx_do_filp_open+0x10/0x10 [ 944.137755][T17234] ? alloc_fd+0x471/0x7d0 [ 944.137801][T17234] do_sys_openat2+0x11b/0x1d0 [ 944.137833][T17234] ? __pfx_do_sys_openat2+0x10/0x10 [ 944.137866][T17234] ? __fget_files+0x20e/0x3c0 [ 944.137908][T17234] __x64_sys_openat+0x174/0x210 [ 944.137940][T17234] ? __pfx___x64_sys_openat+0x10/0x10 [ 944.137971][T17234] ? ksys_write+0x1ac/0x250 [ 944.138026][T17234] do_syscall_64+0xcd/0x490 [ 944.138057][T17234] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 944.138087][T17234] RIP: 0033:0x7fa73078e929 [ 944.138112][T17234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 944.138139][T17234] RSP: 002b:00007fa731646038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 944.138165][T17234] RAX: ffffffffffffffda RBX: 00007fa7309b5fa0 RCX: 00007fa73078e929 [ 944.138220][T17234] RDX: 0000000000002a81 RSI: 0000200000000100 RDI: ffffffffffffff9c [ 944.138239][T17234] RBP: 00007fa731646090 R08: 0000000000000000 R09: 0000000000000000 [ 944.138258][T17234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 944.138275][T17234] R13: 0000000000000001 R14: 00007fa7309b5fa0 R15: 00007fff4903dbb8 [ 944.138314][T17234] [ 945.804692][ T30] audit: type=1806 audit(6045312741.688:7): xattr="" res=-22 [ 947.980703][T17380] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1878'. [ 949.852393][T17509] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1887'. [ 950.207527][T17518] FAULT_INJECTION: forcing a failure. [ 950.207527][T17518] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 950.257756][T17518] CPU: 0 UID: 0 PID: 17518 Comm: syz.0.1891 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 950.257799][T17518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 950.257818][T17518] Call Trace: [ 950.257828][T17518] [ 950.257840][T17518] dump_stack_lvl+0x16c/0x1f0 [ 950.257904][T17518] should_fail_ex+0x512/0x640 [ 950.257955][T17518] _copy_from_user+0x2e/0xd0 [ 950.258007][T17518] copy_msghdr_from_user+0x98/0x160 [ 950.258058][T17518] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 950.258116][T17518] ? kfree+0x24f/0x4d0 [ 950.258154][T17518] ? __lock_acquire+0x622/0x1c90 [ 950.258203][T17518] ___sys_recvmsg+0xdb/0x1a0 [ 950.258254][T17518] ? __pfx____sys_recvmsg+0x10/0x10 [ 950.258337][T17518] ? __pfx___might_resched+0x10/0x10 [ 950.258378][T17518] do_recvmmsg+0x2fe/0x750 [ 950.258433][T17518] ? __pfx_do_recvmmsg+0x10/0x10 [ 950.258491][T17518] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 950.258557][T17518] ? __fget_files+0x20e/0x3c0 [ 950.258611][T17518] __x64_sys_recvmmsg+0x22a/0x280 [ 950.258644][T17518] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 950.258687][T17518] do_syscall_64+0xcd/0x490 [ 950.258720][T17518] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 950.258751][T17518] RIP: 0033:0x7f1e0af8e929 [ 950.258775][T17518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 950.258806][T17518] RSP: 002b:00007f1e0bd27038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 950.258836][T17518] RAX: ffffffffffffffda RBX: 00007f1e0b1b5fa0 RCX: 00007f1e0af8e929 [ 950.258856][T17518] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 950.258880][T17518] RBP: 00007f1e0bd27090 R08: 0000000000000000 R09: 0000000000000000 [ 950.258901][T17518] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 950.258920][T17518] R13: 0000000000000000 R14: 00007f1e0b1b5fa0 R15: 00007fff9096fe68 [ 950.258961][T17518] [ 951.754307][T14566] udevd[14566]: inotify_add_watch(7, /dev/nbd4128, 10) failed: No such file or directory [ 952.555778][T17663] FAULT_INJECTION: forcing a failure. [ 952.555778][T17663] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 952.605358][T17663] CPU: 1 UID: 0 PID: 17663 Comm: syz.1.1900 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 952.605404][T17663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 952.605423][T17663] Call Trace: [ 952.605433][T17663] [ 952.605446][T17663] dump_stack_lvl+0x16c/0x1f0 [ 952.605501][T17663] should_fail_ex+0x512/0x640 [ 952.605565][T17663] _copy_from_user+0x2e/0xd0 [ 952.605618][T17663] copy_msghdr_from_user+0x98/0x160 [ 952.605672][T17663] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 952.605731][T17663] ? kfree+0x24f/0x4d0 [ 952.605771][T17663] ? __lock_acquire+0x622/0x1c90 [ 952.605819][T17663] ___sys_recvmsg+0xdb/0x1a0 [ 952.605868][T17663] ? __pfx____sys_recvmsg+0x10/0x10 [ 952.605941][T17663] ? __pfx___might_resched+0x10/0x10 [ 952.605983][T17663] do_recvmmsg+0x2fe/0x750 [ 952.606039][T17663] ? __pfx_do_recvmmsg+0x10/0x10 [ 952.606098][T17663] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 952.606162][T17663] ? __fget_files+0x20e/0x3c0 [ 952.606213][T17663] __x64_sys_recvmmsg+0x22a/0x280 [ 952.606247][T17663] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 952.606292][T17663] do_syscall_64+0xcd/0x490 [ 952.606323][T17663] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 952.606354][T17663] RIP: 0033:0x7fa73078e929 [ 952.606378][T17663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 952.606408][T17663] RSP: 002b:00007fa731625038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 952.606437][T17663] RAX: ffffffffffffffda RBX: 00007fa7309b6080 RCX: 00007fa73078e929 [ 952.606457][T17663] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 952.606475][T17663] RBP: 00007fa731625090 R08: 0000000000000000 R09: 0000000000000000 [ 952.606493][T17663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 952.606520][T17663] R13: 0000000000000000 R14: 00007fa7309b6080 R15: 00007fff4903dbb8 [ 952.606562][T17663] [ 954.234684][T17784] ptrace attach of "./syz-executor exec"[5834] was attempted by "./syz-executor exec"[17784] [ 955.816633][T17921] cgroup: fork rejected by pids controller in /syz3 [ 956.221268][T18035] FAULT_INJECTION: forcing a failure. [ 956.221268][T18035] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 956.247265][T18035] CPU: 1 UID: 0 PID: 18035 Comm: syz.1.1921 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 956.247301][T18035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 956.247315][T18035] Call Trace: [ 956.247323][T18035] [ 956.247331][T18035] dump_stack_lvl+0x16c/0x1f0 [ 956.247374][T18035] should_fail_ex+0x512/0x640 [ 956.247412][T18035] _copy_from_user+0x2e/0xd0 [ 956.247458][T18035] copy_msghdr_from_user+0x98/0x160 [ 956.247502][T18035] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 956.247545][T18035] ? kfree+0x24f/0x4d0 [ 956.247592][T18035] ? find_held_lock+0x2b/0x80 [ 956.247621][T18035] ___sys_recvmsg+0xdb/0x1a0 [ 956.247666][T18035] ? __pfx____sys_recvmsg+0x10/0x10 [ 956.247737][T18035] ? __pfx___might_resched+0x10/0x10 [ 956.247771][T18035] do_recvmmsg+0x2fe/0x750 [ 956.247814][T18035] ? __pfx_do_recvmmsg+0x10/0x10 [ 956.247849][T18035] ? vfs_write+0x15d/0x1150 [ 956.247890][T18035] ? __pfx_vfs_write+0x10/0x10 [ 956.247942][T18035] ? rcu_is_watching+0x12/0xc0 [ 956.247963][T18035] ? blkcg_maybe_throttle_current+0x650/0xf30 [ 956.248018][T18035] __x64_sys_recvmmsg+0x22a/0x280 [ 956.248043][T18035] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 956.248076][T18035] do_syscall_64+0xcd/0x490 [ 956.248099][T18035] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 956.248123][T18035] RIP: 0033:0x7fa73078e929 [ 956.248142][T18035] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 956.248169][T18035] RSP: 002b:00007fa731646038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 956.248191][T18035] RAX: ffffffffffffffda RBX: 00007fa7309b5fa0 RCX: 00007fa73078e929 [ 956.248207][T18035] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 956.248221][T18035] RBP: 00007fa731646090 R08: 0000000000000000 R09: 0000000000000000 [ 956.248236][T18035] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 956.248250][T18035] R13: 0000000000000000 R14: 00007fa7309b5fa0 R15: 00007fff4903dbb8 [ 956.248279][T18035] [ 956.722373][T18043] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1923'. [ 958.746577][T18171] FAULT_INJECTION: forcing a failure. [ 958.746577][T18171] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 958.760003][T18171] CPU: 0 UID: 0 PID: 18171 Comm: syz.2.1933 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 958.760043][T18171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 958.760061][T18171] Call Trace: [ 958.760069][T18171] [ 958.760079][T18171] dump_stack_lvl+0x16c/0x1f0 [ 958.760120][T18171] should_fail_ex+0x512/0x640 [ 958.760157][T18171] _copy_from_user+0x2e/0xd0 [ 958.760194][T18171] copy_msghdr_from_user+0x98/0x160 [ 958.760235][T18171] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 958.760279][T18171] ? kfree+0x24f/0x4d0 [ 958.760308][T18171] ? __lock_acquire+0x622/0x1c90 [ 958.760344][T18171] ___sys_recvmsg+0xdb/0x1a0 [ 958.760383][T18171] ? __pfx____sys_recvmsg+0x10/0x10 [ 958.760437][T18171] ? __pfx___might_resched+0x10/0x10 [ 958.760468][T18171] do_recvmmsg+0x2fe/0x750 [ 958.760509][T18171] ? __pfx_do_recvmmsg+0x10/0x10 [ 958.760553][T18171] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 958.760602][T18171] ? __fget_files+0x20e/0x3c0 [ 958.760642][T18171] __x64_sys_recvmmsg+0x22a/0x280 [ 958.760666][T18171] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 958.760698][T18171] do_syscall_64+0xcd/0x490 [ 958.760721][T18171] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 958.760746][T18171] RIP: 0033:0x7fe9edb8e929 [ 958.760765][T18171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 958.760787][T18171] RSP: 002b:00007fe9eeadb038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 958.760809][T18171] RAX: ffffffffffffffda RBX: 00007fe9eddb5fa0 RCX: 00007fe9edb8e929 [ 958.760825][T18171] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 958.760840][T18171] RBP: 00007fe9eeadb090 R08: 0000000000000000 R09: 0000000000000000 [ 958.760854][T18171] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 958.760869][T18171] R13: 0000000000000000 R14: 00007fe9eddb5fa0 R15: 00007ffce8a61478 [ 958.760898][T18171] [ 958.954605][ C0] vkms_vblank_simulate: vblank timer overrun [ 963.443674][T18254] netlink: 330 bytes leftover after parsing attributes in process `syz.0.1955'. [ 964.575371][T18272] ptrace attach of "./syz-executor exec"[5834] was attempted by "./syz-executor exec"[18272] [ 965.300669][T18385] FAULT_INJECTION: forcing a failure. [ 965.300669][T18385] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 965.385550][T18385] CPU: 1 UID: 0 PID: 18385 Comm: syz.0.1963 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 965.385587][T18385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 965.385602][T18385] Call Trace: [ 965.385609][T18385] [ 965.385619][T18385] dump_stack_lvl+0x16c/0x1f0 [ 965.385661][T18385] should_fail_ex+0x512/0x640 [ 965.385700][T18385] _copy_from_user+0x2e/0xd0 [ 965.385740][T18385] copy_msghdr_from_user+0x98/0x160 [ 965.385779][T18385] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 965.385823][T18385] ? kfree+0x24f/0x4d0 [ 965.385850][T18385] ? find_held_lock+0x2b/0x80 [ 965.385880][T18385] ___sys_recvmsg+0xdb/0x1a0 [ 965.385917][T18385] ? __pfx____sys_recvmsg+0x10/0x10 [ 965.385971][T18385] ? __pfx___might_resched+0x10/0x10 [ 965.386002][T18385] do_recvmmsg+0x2fe/0x750 [ 965.386043][T18385] ? __pfx_do_recvmmsg+0x10/0x10 [ 965.386078][T18385] ? vfs_write+0x15d/0x1150 [ 965.386119][T18385] ? __pfx_vfs_write+0x10/0x10 [ 965.386169][T18385] __x64_sys_recvmmsg+0x22a/0x280 [ 965.386194][T18385] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 965.386225][T18385] do_syscall_64+0xcd/0x490 [ 965.386249][T18385] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 965.386276][T18385] RIP: 0033:0x7f1e0af8e929 [ 965.386294][T18385] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 965.386317][T18385] RSP: 002b:00007f1e0bd27038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 965.386339][T18385] RAX: ffffffffffffffda RBX: 00007f1e0b1b5fa0 RCX: 00007f1e0af8e929 [ 965.386355][T18385] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 965.386369][T18385] RBP: 00007f1e0bd27090 R08: 0000000000000000 R09: 0000000000000000 [ 965.386390][T18385] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 965.386404][T18385] R13: 0000000000000000 R14: 00007f1e0b1b5fa0 R15: 00007fff9096fe68 [ 965.386433][T18385] [ 965.990514][T18395] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1967'. [ 966.842889][T18452] FAULT_INJECTION: forcing a failure. [ 966.842889][T18452] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 966.887799][T18452] CPU: 1 UID: 0 PID: 18452 Comm: syz.3.1971 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 966.887835][T18452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 966.887850][T18452] Call Trace: [ 966.887857][T18452] [ 966.887865][T18452] dump_stack_lvl+0x16c/0x1f0 [ 966.887911][T18452] should_fail_ex+0x512/0x640 [ 966.887951][T18452] _copy_from_user+0x2e/0xd0 [ 966.887990][T18452] copy_msghdr_from_user+0x98/0x160 [ 966.888029][T18452] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 966.888073][T18452] ? kfree+0x24f/0x4d0 [ 966.888102][T18452] ? __lock_acquire+0x622/0x1c90 [ 966.888138][T18452] ___sys_recvmsg+0xdb/0x1a0 [ 966.888176][T18452] ? __pfx____sys_recvmsg+0x10/0x10 [ 966.888231][T18452] ? __pfx___might_resched+0x10/0x10 [ 966.888262][T18452] do_recvmmsg+0x2fe/0x750 [ 966.888304][T18452] ? __pfx_do_recvmmsg+0x10/0x10 [ 966.888350][T18452] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 966.888400][T18452] ? __fget_files+0x20e/0x3c0 [ 966.888439][T18452] __x64_sys_recvmmsg+0x22a/0x280 [ 966.888464][T18452] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 966.888496][T18452] do_syscall_64+0xcd/0x490 [ 966.888519][T18452] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 966.888544][T18452] RIP: 0033:0x7f455c38e929 [ 966.888562][T18452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 966.888586][T18452] RSP: 002b:00007f455d28c038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 966.888618][T18452] RAX: ffffffffffffffda RBX: 00007f455c5b5fa0 RCX: 00007f455c38e929 [ 966.888634][T18452] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 966.888649][T18452] RBP: 00007f455d28c090 R08: 0000000000000000 R09: 0000000000000000 [ 966.888663][T18452] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 966.888677][T18452] R13: 0000000000000000 R14: 00007f455c5b5fa0 R15: 00007ffd67acf3d8 [ 966.888707][T18452] [ 968.007637][T14566] udevd[14566]: inotify_add_watch(7, /dev/nbd4128, 10) failed: No such file or directory [ 968.054870][T14566] udevd[14566]: inotify_add_watch(7, /dev/nbd4128, 10) failed: No such file or directory [ 970.051863][T18651] cgroup: fork rejected by pids controller in /syz0 [ 972.894918][T18898] dlm: non-version read from control device 128 [ 974.254271][T19018] ptrace attach of "./syz-executor exec"[5834] was attempted by "./syz-executor exec"[19018] [ 974.873380][T19036] netlink: 28 bytes leftover after parsing attributes in process `syz.0.1997'. [ 974.898090][T19036] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 974.944708][T19036] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 974.979450][T19036] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 974.991777][T19036] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 976.631423][T19063] FAULT_INJECTION: forcing a failure. [ 976.631423][T19063] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 976.663558][T19063] CPU: 0 UID: 0 PID: 19063 Comm: syz.2.2003 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 976.663598][T19063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 976.663613][T19063] Call Trace: [ 976.663621][T19063] [ 976.663629][T19063] dump_stack_lvl+0x16c/0x1f0 [ 976.663677][T19063] should_fail_ex+0x512/0x640 [ 976.663728][T19063] _copy_from_user+0x2e/0xd0 [ 976.663778][T19063] copy_msghdr_from_user+0x98/0x160 [ 976.663816][T19063] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 976.663866][T19063] ? kfree+0x24f/0x4d0 [ 976.663905][T19063] ? __lock_acquire+0x622/0x1c90 [ 976.663954][T19063] ___sys_recvmsg+0xdb/0x1a0 [ 976.664004][T19063] ? __pfx____sys_recvmsg+0x10/0x10 [ 976.664078][T19063] ? __pfx___might_resched+0x10/0x10 [ 976.664120][T19063] do_recvmmsg+0x2fe/0x750 [ 976.664175][T19063] ? __pfx_do_recvmmsg+0x10/0x10 [ 976.664233][T19063] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 976.664296][T19063] ? __fget_files+0x20e/0x3c0 [ 976.664348][T19063] __x64_sys_recvmmsg+0x22a/0x280 [ 976.664380][T19063] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 976.664423][T19063] do_syscall_64+0xcd/0x490 [ 976.664454][T19063] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 976.664486][T19063] RIP: 0033:0x7fe9edb8e929 [ 976.664519][T19063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 976.664550][T19063] RSP: 002b:00007fe9eeadb038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 976.664578][T19063] RAX: ffffffffffffffda RBX: 00007fe9eddb5fa0 RCX: 00007fe9edb8e929 [ 976.664597][T19063] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 976.664614][T19063] RBP: 00007fe9eeadb090 R08: 0000000000000000 R09: 0000000000000000 [ 976.664632][T19063] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 976.664650][T19063] R13: 0000000000000000 R14: 00007fe9eddb5fa0 R15: 00007ffce8a61478 [ 976.664689][T19063] [ 977.468433][T19082] RDS: rds_bind could not find a transport for ::ffff:172.20.20.187, load rds_tcp or rds_rdma? [ 977.994775][T19193] ubi: mtd0 is already attached to ubi0 [ 978.022952][ T30] audit: type=1804 audit(6045312773.908:8): pid=19193 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz.1.2012" name="/newroot/sys/kernel/debug/tracing/per_cpu/cpu0/trace_pipe_raw" dev="tracefs" ino=67 res=1 errno=0 [ 978.299272][T19301] FAULT_INJECTION: forcing a failure. [ 978.299272][T19301] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 978.329832][T19301] CPU: 1 UID: 0 PID: 19301 Comm: syz.0.2022 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 978.329876][T19301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 978.329890][T19301] Call Trace: [ 978.329898][T19301] [ 978.329907][T19301] dump_stack_lvl+0x16c/0x1f0 [ 978.329950][T19301] should_fail_ex+0x512/0x640 [ 978.329988][T19301] _copy_from_user+0x2e/0xd0 [ 978.330026][T19301] copy_msghdr_from_user+0x98/0x160 [ 978.330065][T19301] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 978.330107][T19301] ? kfree+0x24f/0x4d0 [ 978.330136][T19301] ? __lock_acquire+0x622/0x1c90 [ 978.330172][T19301] ___sys_recvmsg+0xdb/0x1a0 [ 978.330214][T19301] ? __pfx____sys_recvmsg+0x10/0x10 [ 978.330286][T19301] ? __pfx___might_resched+0x10/0x10 [ 978.330328][T19301] do_recvmmsg+0x2fe/0x750 [ 978.330383][T19301] ? __pfx_do_recvmmsg+0x10/0x10 [ 978.330443][T19301] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 978.330513][T19301] ? __fget_files+0x20e/0x3c0 [ 978.330565][T19301] __x64_sys_recvmmsg+0x22a/0x280 [ 978.330593][T19301] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 978.330630][T19301] do_syscall_64+0xcd/0x490 [ 978.330657][T19301] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 978.330684][T19301] RIP: 0033:0x7f1e0af8e929 [ 978.330706][T19301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 978.330733][T19301] RSP: 002b:00007f1e08df6038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 978.330758][T19301] RAX: ffffffffffffffda RBX: 00007f1e0b1b6080 RCX: 00007f1e0af8e929 [ 978.330776][T19301] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 978.330792][T19301] RBP: 00007f1e08df6090 R08: 0000000000000000 R09: 0000000000000000 [ 978.330808][T19301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 978.330824][T19301] R13: 0000000000000000 R14: 00007f1e0b1b6080 R15: 00007fff9096fe68 [ 978.330858][T19301] [ 979.333343][T19318] RDS: rds_bind could not find a transport for ::ffff:172.20.20.187, load rds_tcp or rds_rdma? [ 981.581235][T19660] RDS: rds_bind could not find a transport for ::ffff:172.20.20.187, load rds_tcp or rds_rdma? [ 981.906959][T19673] FAULT_INJECTION: forcing a failure. [ 981.906959][T19673] name failslab, interval 1, probability 0, space 0, times 0 [ 981.925465][T19673] CPU: 1 UID: 0 PID: 19673 Comm: syz.0.2037 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 981.925512][T19673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 981.925531][T19673] Call Trace: [ 981.925543][T19673] [ 981.925555][T19673] dump_stack_lvl+0x16c/0x1f0 [ 981.925611][T19673] should_fail_ex+0x512/0x640 [ 981.925659][T19673] ? fs_reclaim_acquire+0xae/0x150 [ 981.925701][T19673] should_failslab+0xc2/0x120 [ 981.925734][T19673] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 981.925786][T19673] ? security_inode_alloc+0x3b/0x2b0 [ 981.925829][T19673] security_inode_alloc+0x3b/0x2b0 [ 981.925866][T19673] inode_init_always_gfp+0xce4/0x1030 [ 981.925942][T19673] alloc_inode+0x86/0x240 [ 981.925976][T19673] new_inode+0x22/0x1c0 [ 981.926014][T19673] __rpc_create_common+0x57/0x2f0 [ 981.926081][T19673] rpc_populate.constprop.0+0x153/0x5d0 [ 981.926143][T19673] rpc_fill_super+0x2bc/0x840 [ 981.926192][T19673] ? sget_fc+0x808/0xc20 [ 981.926235][T19673] ? __pfx_set_anon_super_fc+0x10/0x10 [ 981.926276][T19673] ? __pfx_rpc_fill_super+0x10/0x10 [ 981.926324][T19673] get_tree_keyed+0x10b/0x1d0 [ 981.926372][T19673] vfs_get_tree+0x8b/0x340 [ 981.926410][T19673] vfs_cmd_create+0xd7/0x2a0 [ 981.926465][T19673] __do_sys_fsconfig+0x7b8/0xbe0 [ 981.926500][T19673] ? __pfx___do_sys_fsconfig+0x10/0x10 [ 981.926552][T19673] do_syscall_64+0xcd/0x490 [ 981.926585][T19673] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 981.926617][T19673] RIP: 0033:0x7f1e0af8e929 [ 981.926643][T19673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 981.926675][T19673] RSP: 002b:00007f1e0bd27038 EFLAGS: 00000246 ORIG_RAX: 00000000000001af [ 981.926706][T19673] RAX: ffffffffffffffda RBX: 00007f1e0b1b5fa0 RCX: 00007f1e0af8e929 [ 981.926727][T19673] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000006 [ 981.926745][T19673] RBP: 00007f1e0b010b39 R08: 0000000000000000 R09: 0000000000000000 [ 981.926765][T19673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 981.926783][T19673] R13: 0000000000000000 R14: 00007f1e0b1b5fa0 R15: 00007fff9096fe68 [ 981.926825][T19673] [ 981.926968][T19673] net/sunrpc/rpc_pipe.c: __rpc_create_common failed to allocate inode for dentry gssd [ 982.238199][T19673] net/sunrpc/rpc_pipe.c: rpc_populate failed to populate directory / [ 983.844680][ T30] audit: type=1800 audit(6045312779.718:9): pid=19705 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.2045" name="lu_gp_id" dev="configfs" ino=45894 res=0 errno=0 [ 984.209411][T19815] .SR: entered promiscuous mode [ 984.427155][T19815] Invalid ELF header magic: != ELF [ 984.438763][T19823] FAULT_INJECTION: forcing a failure. [ 984.438763][T19823] name failslab, interval 1, probability 0, space 0, times 0 [ 984.487647][T19823] CPU: 0 UID: 0 PID: 19823 Comm: syz.0.2051 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 984.487692][T19823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 984.487710][T19823] Call Trace: [ 984.487720][T19823] [ 984.487732][T19823] dump_stack_lvl+0x16c/0x1f0 [ 984.487785][T19823] should_fail_ex+0x512/0x640 [ 984.487828][T19823] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 984.487872][T19823] should_failslab+0xc2/0x120 [ 984.487901][T19823] __kmalloc_cache_noprof+0x6a/0x3e0 [ 984.487939][T19823] ? _raw_spin_unlock+0x28/0x50 [ 984.487976][T19823] ? snd_rawmidi_open+0x3c3/0xbf0 [ 984.488018][T19823] snd_rawmidi_open+0x3c3/0xbf0 [ 984.488061][T19823] ? __pfx_snd_rawmidi_open+0x10/0x10 [ 984.488113][T19823] ? kobject_get_unless_zero+0x156/0x1e0 [ 984.488143][T19823] ? __pfx_snd_rawmidi_open+0x10/0x10 [ 984.488179][T19823] snd_open+0x1fe/0x450 [ 984.488204][T19823] ? __pfx_snd_open+0x10/0x10 [ 984.488229][T19823] chrdev_open+0x231/0x6a0 [ 984.488269][T19823] ? __pfx_apparmor_file_open+0x10/0x10 [ 984.488304][T19823] ? __pfx_chrdev_open+0x10/0x10 [ 984.488351][T19823] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 984.488394][T19823] do_dentry_open+0x744/0x1c10 [ 984.488440][T19823] ? __pfx_chrdev_open+0x10/0x10 [ 984.488487][T19823] vfs_open+0x82/0x3f0 [ 984.488519][T19823] path_openat+0x1de4/0x2cb0 [ 984.488568][T19823] ? __pfx_path_openat+0x10/0x10 [ 984.488608][T19823] ? __lock_acquire+0xb8a/0x1c90 [ 984.488647][T19823] do_filp_open+0x20b/0x470 [ 984.488685][T19823] ? __pfx_do_filp_open+0x10/0x10 [ 984.488747][T19823] ? alloc_fd+0x471/0x7d0 [ 984.488792][T19823] do_sys_openat2+0x11b/0x1d0 [ 984.488821][T19823] ? __pfx_do_sys_openat2+0x10/0x10 [ 984.488854][T19823] ? __fget_files+0x20e/0x3c0 [ 984.488897][T19823] __x64_sys_openat+0x174/0x210 [ 984.488927][T19823] ? __pfx___x64_sys_openat+0x10/0x10 [ 984.488956][T19823] ? ksys_write+0x1ac/0x250 [ 984.489003][T19823] do_syscall_64+0xcd/0x490 [ 984.489029][T19823] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 984.489057][T19823] RIP: 0033:0x7f1e0af8e929 [ 984.489077][T19823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 984.489111][T19823] RSP: 002b:00007f1e0bd27038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 984.489136][T19823] RAX: ffffffffffffffda RBX: 00007f1e0b1b5fa0 RCX: 00007f1e0af8e929 [ 984.489153][T19823] RDX: 0000000000002a81 RSI: 0000200000000100 RDI: ffffffffffffff9c [ 984.489170][T19823] RBP: 00007f1e0bd27090 R08: 0000000000000000 R09: 0000000000000000 [ 984.489186][T19823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 984.489201][T19823] R13: 0000000000000001 R14: 00007f1e0b1b5fa0 R15: 00007fff9096fe68 [ 984.489234][T19823] [ 984.764426][ C0] vkms_vblank_simulate: vblank timer overrun [ 985.212826][T19933] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2054'. [ 986.125565][T19940] FAULT_INJECTION: forcing a failure. [ 986.125565][T19940] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 986.209957][T19940] CPU: 0 UID: 0 PID: 19940 Comm: syz.2.2056 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 986.209993][T19940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 986.210008][T19940] Call Trace: [ 986.210023][T19940] [ 986.210032][T19940] dump_stack_lvl+0x16c/0x1f0 [ 986.210077][T19940] should_fail_ex+0x512/0x640 [ 986.210117][T19940] _copy_from_user+0x2e/0xd0 [ 986.210157][T19940] copy_msghdr_from_user+0x98/0x160 [ 986.210197][T19940] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 986.210240][T19940] ? kfree+0x24f/0x4d0 [ 986.210269][T19940] ? __lock_acquire+0x622/0x1c90 [ 986.210306][T19940] ___sys_recvmsg+0xdb/0x1a0 [ 986.210344][T19940] ? __pfx____sys_recvmsg+0x10/0x10 [ 986.210398][T19940] ? __pfx___might_resched+0x10/0x10 [ 986.210429][T19940] do_recvmmsg+0x2fe/0x750 [ 986.210471][T19940] ? __pfx_do_recvmmsg+0x10/0x10 [ 986.210515][T19940] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 986.210563][T19940] ? __fget_files+0x20e/0x3c0 [ 986.210603][T19940] __x64_sys_recvmmsg+0x22a/0x280 [ 986.210627][T19940] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 986.210659][T19940] do_syscall_64+0xcd/0x490 [ 986.210684][T19940] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 986.210708][T19940] RIP: 0033:0x7fe9edb8e929 [ 986.210728][T19940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 986.210752][T19940] RSP: 002b:00007fe9eeadb038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 986.210774][T19940] RAX: ffffffffffffffda RBX: 00007fe9eddb5fa0 RCX: 00007fe9edb8e929 [ 986.210790][T19940] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 986.210804][T19940] RBP: 00007fe9eeadb090 R08: 0000000000000000 R09: 0000000000000000 [ 986.210818][T19940] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 986.210833][T19940] R13: 0000000000000000 R14: 00007fe9eddb5fa0 R15: 00007ffce8a61478 [ 986.210862][T19940] [ 986.405250][ C0] vkms_vblank_simulate: vblank timer overrun [ 987.910071][T15234] udevd[15234]: inotify_add_watch(7, /dev/nbd4128, 10) failed: No such file or directory [ 987.969788][T14566] udevd[14566]: inotify_add_watch(7, /dev/nbd4128, 10) failed: No such file or directory [ 988.029660][T20082] netlink: 7 bytes leftover after parsing attributes in process `syz.1.2062'. [ 988.127716][T20082] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2062'. [ 988.875380][T20189] netlink: 20 bytes leftover after parsing attributes in process `syz.1.2066'. [ 989.973326][T20305] RDS: rds_bind could not find a transport for ::ffff:172.20.20.187, load rds_tcp or rds_rdma? [ 990.247076][T20181] ptrace attach of "./syz-executor exec"[5834] was attempted by "./syz-executor exec"[20181] [ 991.106589][T20421] FAULT_INJECTION: forcing a failure. [ 991.106589][T20421] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 991.156040][T20421] CPU: 1 UID: 0 PID: 20421 Comm: syz.2.2076 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 991.156090][T20421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 991.156109][T20421] Call Trace: [ 991.156119][T20421] [ 991.156131][T20421] dump_stack_lvl+0x16c/0x1f0 [ 991.156193][T20421] should_fail_ex+0x512/0x640 [ 991.156246][T20421] _copy_from_user+0x2e/0xd0 [ 991.156299][T20421] copy_msghdr_from_user+0x98/0x160 [ 991.156351][T20421] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 991.156410][T20421] ? kfree+0x24f/0x4d0 [ 991.156445][T20421] ? find_held_lock+0x2b/0x80 [ 991.156486][T20421] ___sys_recvmsg+0xdb/0x1a0 [ 991.156545][T20421] ? __pfx____sys_recvmsg+0x10/0x10 [ 991.156618][T20421] ? __pfx___might_resched+0x10/0x10 [ 991.156660][T20421] do_recvmmsg+0x2fe/0x750 [ 991.156717][T20421] ? __pfx_do_recvmmsg+0x10/0x10 [ 991.156765][T20421] ? vfs_write+0x15d/0x1150 [ 991.156817][T20421] ? __pfx_vfs_write+0x10/0x10 [ 991.156886][T20421] __x64_sys_recvmmsg+0x22a/0x280 [ 991.156919][T20421] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 991.156963][T20421] do_syscall_64+0xcd/0x490 [ 991.156996][T20421] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 991.157029][T20421] RIP: 0033:0x7fe9edb8e929 [ 991.157054][T20421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 991.157085][T20421] RSP: 002b:00007fe9eeadb038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 991.157114][T20421] RAX: ffffffffffffffda RBX: 00007fe9eddb5fa0 RCX: 00007fe9edb8e929 [ 991.157134][T20421] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 991.157151][T20421] RBP: 00007fe9eeadb090 R08: 0000000000000000 R09: 0000000000000000 [ 991.157168][T20421] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 991.157186][T20421] R13: 0000000000000000 R14: 00007fe9eddb5fa0 R15: 00007ffce8a61478 [ 991.157225][T20421] [ 991.838883][T20445] FAULT_INJECTION: forcing a failure. [ 991.838883][T20445] name failslab, interval 1, probability 0, space 0, times 0 [ 991.904627][T20445] CPU: 0 UID: 0 PID: 20445 Comm: syz.1.2081 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 991.904678][T20445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 991.904699][T20445] Call Trace: [ 991.904710][T20445] [ 991.904723][T20445] dump_stack_lvl+0x16c/0x1f0 [ 991.904782][T20445] should_fail_ex+0x512/0x640 [ 991.904830][T20445] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 991.904886][T20445] should_failslab+0xc2/0x120 [ 991.904918][T20445] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 991.904967][T20445] ? __proc_create+0xc3/0x8c0 [ 991.905018][T20445] ? __proc_create+0x2ce/0x8c0 [ 991.905098][T20445] __proc_create+0x2ce/0x8c0 [ 991.905153][T20445] ? __pfx___proc_create+0x10/0x10 [ 991.905213][T20445] ? _raw_write_unlock+0x28/0x50 [ 991.905260][T20445] ? proc_register+0x314/0x5f0 [ 991.905316][T20445] proc_create_reg+0x7d/0x180 [ 991.905349][T20445] proc_create_data+0x86/0x110 [ 991.905378][T20445] ? __pfx_proc_create_data+0x10/0x10 [ 991.905409][T20445] ? cache_register_net+0x137/0x5e0 [ 991.905451][T20445] cache_register_net+0x2d6/0x5e0 [ 991.905489][T20445] nfsd_export_init+0xb6/0x250 [ 991.905532][T20445] ? __pfx_nfsd_net_init+0x10/0x10 [ 991.905564][T20445] nfsd_net_init+0x33/0x3d0 [ 991.905598][T20445] ? __pfx_nfsd_net_init+0x10/0x10 [ 991.905631][T20445] ops_init+0x1e2/0x5f0 [ 991.905671][T20445] setup_net+0x1ff/0x510 [ 991.905700][T20445] ? lockdep_init_map_type+0x5c/0x280 [ 991.905747][T20445] ? __pfx_setup_net+0x10/0x10 [ 991.905782][T20445] ? debug_mutex_init+0x37/0x70 [ 991.905818][T20445] copy_net_ns+0x2a6/0x5f0 [ 991.905857][T20445] create_new_namespaces+0x3ea/0xa90 [ 991.905902][T20445] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 991.905943][T20445] ksys_unshare+0x45b/0xa40 [ 991.905988][T20445] ? __pfx_ksys_unshare+0x10/0x10 [ 991.906032][T20445] ? xfd_validate_state+0x61/0x180 [ 991.906088][T20445] __x64_sys_unshare+0x31/0x40 [ 991.906130][T20445] do_syscall_64+0xcd/0x490 [ 991.906160][T20445] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 991.906192][T20445] RIP: 0033:0x7fa73078e929 [ 991.906218][T20445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 991.906249][T20445] RSP: 002b:00007fa731625038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 991.906280][T20445] RAX: ffffffffffffffda RBX: 00007fa7309b6080 RCX: 00007fa73078e929 [ 991.906301][T20445] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 991.906319][T20445] RBP: 00007fa730810b39 R08: 0000000000000000 R09: 0000000000000000 [ 991.906339][T20445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 991.906358][T20445] R13: 0000000000000000 R14: 00007fa7309b6080 R15: 00007fff4903dbb8 [ 991.906399][T20445] [ 992.852306][T20556] RDS: rds_bind could not find a transport for ::ffff:172.20.20.187, load rds_tcp or rds_rdma? [ 993.641676][T20672] FAULT_INJECTION: forcing a failure. [ 993.641676][T20672] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 993.691086][T20672] CPU: 0 UID: 0 PID: 20672 Comm: syz.3.2087 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 993.691131][T20672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 993.691149][T20672] Call Trace: [ 993.691159][T20672] [ 993.691171][T20672] dump_stack_lvl+0x16c/0x1f0 [ 993.691224][T20672] should_fail_ex+0x512/0x640 [ 993.691277][T20672] _copy_from_user+0x2e/0xd0 [ 993.691327][T20672] copy_msghdr_from_user+0x98/0x160 [ 993.691388][T20672] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 993.691446][T20672] ? kfree+0x24f/0x4d0 [ 993.691483][T20672] ? __lock_acquire+0x622/0x1c90 [ 993.691532][T20672] ___sys_recvmsg+0xdb/0x1a0 [ 993.691583][T20672] ? __pfx____sys_recvmsg+0x10/0x10 [ 993.691659][T20672] ? __pfx___might_resched+0x10/0x10 [ 993.691699][T20672] do_recvmmsg+0x2fe/0x750 [ 993.691754][T20672] ? __pfx_do_recvmmsg+0x10/0x10 [ 993.691814][T20672] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 993.691879][T20672] ? __fget_files+0x20e/0x3c0 [ 993.691934][T20672] __x64_sys_recvmmsg+0x22a/0x280 [ 993.691968][T20672] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 993.692013][T20672] do_syscall_64+0xcd/0x490 [ 993.692044][T20672] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 993.692077][T20672] RIP: 0033:0x7f455c38e929 [ 993.692101][T20672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 993.692132][T20672] RSP: 002b:00007f455d28c038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 993.692162][T20672] RAX: ffffffffffffffda RBX: 00007f455c5b5fa0 RCX: 00007f455c38e929 [ 993.692181][T20672] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 993.692198][T20672] RBP: 00007f455d28c090 R08: 0000000000000000 R09: 0000000000000000 [ 993.692215][T20672] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 993.692232][T20672] R13: 0000000000000000 R14: 00007f455c5b5fa0 R15: 00007ffd67acf3d8 [ 993.692272][T20672] [ 994.575807][T20787] FAULT_INJECTION: forcing a failure. [ 994.575807][T20787] name failslab, interval 1, probability 0, space 0, times 0 [ 994.646118][T20787] CPU: 1 UID: 0 PID: 20787 Comm: syz.3.2092 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 994.646167][T20787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 994.646186][T20787] Call Trace: [ 994.646197][T20787] [ 994.646210][T20787] dump_stack_lvl+0x16c/0x1f0 [ 994.646267][T20787] should_fail_ex+0x512/0x640 [ 994.646315][T20787] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 994.646371][T20787] should_failslab+0xc2/0x120 [ 994.646403][T20787] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 994.646449][T20787] ? __proc_create+0xc3/0x8c0 [ 994.646499][T20787] ? __proc_create+0x2ce/0x8c0 [ 994.646555][T20787] __proc_create+0x2ce/0x8c0 [ 994.646606][T20787] ? __pfx___proc_create+0x10/0x10 [ 994.646666][T20787] ? _raw_write_unlock+0x28/0x50 [ 994.646719][T20787] proc_create_reg+0x7d/0x180 [ 994.646753][T20787] proc_create_data+0x86/0x110 [ 994.646784][T20787] ? __pfx_proc_create_data+0x10/0x10 [ 994.646819][T20787] ? cache_register_net+0x137/0x5e0 [ 994.646862][T20787] cache_register_net+0x1e0/0x5e0 [ 994.646902][T20787] nfsd_export_init+0xb6/0x250 [ 994.646937][T20787] ? __pfx_nfsd_net_init+0x10/0x10 [ 994.646970][T20787] nfsd_net_init+0x33/0x3d0 [ 994.647015][T20787] ? __pfx_nfsd_net_init+0x10/0x10 [ 994.647051][T20787] ops_init+0x1e2/0x5f0 [ 994.647089][T20787] setup_net+0x1ff/0x510 [ 994.647119][T20787] ? lockdep_init_map_type+0x5c/0x280 [ 994.647170][T20787] ? __pfx_setup_net+0x10/0x10 [ 994.647206][T20787] ? debug_mutex_init+0x37/0x70 [ 994.647243][T20787] copy_net_ns+0x2a6/0x5f0 [ 994.647284][T20787] create_new_namespaces+0x3ea/0xa90 [ 994.647332][T20787] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 994.647372][T20787] ksys_unshare+0x45b/0xa40 [ 994.647415][T20787] ? __pfx_ksys_unshare+0x10/0x10 [ 994.647458][T20787] ? xfd_validate_state+0x61/0x180 [ 994.647514][T20787] __x64_sys_unshare+0x31/0x40 [ 994.647556][T20787] do_syscall_64+0xcd/0x490 [ 994.647589][T20787] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 994.647623][T20787] RIP: 0033:0x7f455c38e929 [ 994.647649][T20787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 994.647681][T20787] RSP: 002b:00007f455d26b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 994.647714][T20787] RAX: ffffffffffffffda RBX: 00007f455c5b6080 RCX: 00007f455c38e929 [ 994.647736][T20787] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 994.647756][T20787] RBP: 00007f455c410b39 R08: 0000000000000000 R09: 0000000000000000 [ 994.647776][T20787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 994.647793][T20787] R13: 0000000000000000 R14: 00007f455c5b6080 R15: 00007ffd67acf3d8 [ 994.647830][T20787] [ 995.601753][T15234] udevd[15234]: inotify_add_watch(7, /dev/nbd4128, 10) failed: No such file or directory [ 995.638606][T14566] udevd[14566]: inotify_add_watch(7, /dev/nbd4128, 10) failed: No such file or directory [ 995.894780][T21001] sd 0:0:1:0: PR command failed: 1026 [ 995.900310][T21001] sd 0:0:1:0: Sense Key : Illegal Request [current] [ 995.922913][T21001] sd 0:0:1:0: Add. Sense: Invalid command operation code [ 996.520828][T21113] FAULT_INJECTION: forcing a failure. [ 996.520828][T21113] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 996.594292][T21113] CPU: 0 UID: 0 PID: 21113 Comm: syz.2.2099 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 996.594337][T21113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 996.594356][T21113] Call Trace: [ 996.594367][T21113] [ 996.594378][T21113] dump_stack_lvl+0x16c/0x1f0 [ 996.594434][T21113] should_fail_ex+0x512/0x640 [ 996.594486][T21113] _copy_from_user+0x2e/0xd0 [ 996.594537][T21113] copy_msghdr_from_user+0x98/0x160 [ 996.594590][T21113] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 996.594649][T21113] ? kfree+0x24f/0x4d0 [ 996.594686][T21113] ? __lock_acquire+0x622/0x1c90 [ 996.594735][T21113] ___sys_recvmsg+0xdb/0x1a0 [ 996.594785][T21113] ? __pfx____sys_recvmsg+0x10/0x10 [ 996.594858][T21113] ? __pfx___might_resched+0x10/0x10 [ 996.594900][T21113] do_recvmmsg+0x2fe/0x750 [ 996.594955][T21113] ? __pfx_do_recvmmsg+0x10/0x10 [ 996.595025][T21113] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 996.595096][T21113] ? __fget_files+0x20e/0x3c0 [ 996.595147][T21113] __x64_sys_recvmmsg+0x22a/0x280 [ 996.595179][T21113] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 996.595222][T21113] do_syscall_64+0xcd/0x490 [ 996.595251][T21113] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 996.595280][T21113] RIP: 0033:0x7fe9edb8e929 [ 996.595302][T21113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 996.595329][T21113] RSP: 002b:00007fe9eeaba038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 996.595358][T21113] RAX: ffffffffffffffda RBX: 00007fe9eddb6080 RCX: 00007fe9edb8e929 [ 996.595377][T21113] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 996.595394][T21113] RBP: 00007fe9eeaba090 R08: 0000000000000000 R09: 0000000000000000 [ 996.595412][T21113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 996.595429][T21113] R13: 0000000000000000 R14: 00007fe9eddb6080 R15: 00007ffce8a61478 [ 996.595467][T21113] [ 997.842224][T21003] ptrace attach of "./syz-executor exec"[5838] was attempted by "./syz-executor exec"[21003] [ 999.797997][T21344] FAULT_INJECTION: forcing a failure. [ 999.797997][T21344] name failslab, interval 1, probability 0, space 0, times 0 [ 999.811161][T21344] CPU: 0 UID: 0 PID: 21344 Comm: syz.0.2104 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 999.811204][T21344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 999.811224][T21344] Call Trace: [ 999.811234][T21344] [ 999.811247][T21344] dump_stack_lvl+0x16c/0x1f0 [ 999.811300][T21344] should_fail_ex+0x512/0x640 [ 999.811348][T21344] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 999.811401][T21344] should_failslab+0xc2/0x120 [ 999.811435][T21344] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 999.811483][T21344] ? __proc_create+0xc3/0x8c0 [ 999.811530][T21344] ? __proc_create+0x2ce/0x8c0 [ 999.811584][T21344] __proc_create+0x2ce/0x8c0 [ 999.811636][T21344] ? __pfx___proc_create+0x10/0x10 [ 999.811692][T21344] ? _raw_write_unlock+0x28/0x50 [ 999.811740][T21344] ? proc_register+0x314/0x5f0 [ 999.811794][T21344] proc_create_reg+0x7d/0x180 [ 999.811827][T21344] proc_create_data+0x86/0x110 [ 999.811868][T21344] ? __pfx_proc_create_data+0x10/0x10 [ 999.811903][T21344] ? cache_register_net+0x137/0x5e0 [ 999.811944][T21344] cache_register_net+0x25a/0x5e0 [ 999.811984][T21344] nfsd_export_init+0xb6/0x250 [ 999.812020][T21344] ? __pfx_nfsd_net_init+0x10/0x10 [ 999.812051][T21344] nfsd_net_init+0x33/0x3d0 [ 999.812086][T21344] ? __pfx_nfsd_net_init+0x10/0x10 [ 999.812120][T21344] ops_init+0x1e2/0x5f0 [ 999.812156][T21344] setup_net+0x1ff/0x510 [ 999.812184][T21344] ? lockdep_init_map_type+0x5c/0x280 [ 999.812229][T21344] ? __pfx_setup_net+0x10/0x10 [ 999.812262][T21344] ? debug_mutex_init+0x37/0x70 [ 999.812297][T21344] copy_net_ns+0x2a6/0x5f0 [ 999.812337][T21344] create_new_namespaces+0x3ea/0xa90 [ 999.812383][T21344] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 999.812425][T21344] ksys_unshare+0x45b/0xa40 [ 999.812469][T21344] ? __pfx_ksys_unshare+0x10/0x10 [ 999.812514][T21344] ? xfd_validate_state+0x61/0x180 [ 999.812571][T21344] __x64_sys_unshare+0x31/0x40 [ 999.812614][T21344] do_syscall_64+0xcd/0x490 [ 999.812649][T21344] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 999.812682][T21344] RIP: 0033:0x7f1e0af8e929 [ 999.812708][T21344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 999.812741][T21344] RSP: 002b:00007f1e08df6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 999.812773][T21344] RAX: ffffffffffffffda RBX: 00007f1e0b1b6080 RCX: 00007f1e0af8e929 [ 999.812795][T21344] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 999.812813][T21344] RBP: 00007f1e0b010b39 R08: 0000000000000000 R09: 0000000000000000 [ 999.812831][T21344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 999.812862][T21344] R13: 0000000000000000 R14: 00007f1e0b1b6080 R15: 00007fff9096fe68 [ 999.812906][T21344] [ 1001.207576][T21470] xs_local_setup_socket: unhandled error (13) connecting to /var/run/rpcbind.sock [ 1002.839205][T21788] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2119'. [ 1003.162171][T21801] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2121'. [ 1003.183529][T21800] RDS: rds_bind could not find a transport for ::ffff:172.20.20.187, load rds_tcp or rds_rdma? [ 1003.246752][T21803] FAULT_INJECTION: forcing a failure. [ 1003.246752][T21803] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1003.274790][T21803] CPU: 0 UID: 0 PID: 21803 Comm: syz.0.2122 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 1003.274825][T21803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1003.274839][T21803] Call Trace: [ 1003.274847][T21803] [ 1003.274855][T21803] dump_stack_lvl+0x16c/0x1f0 [ 1003.274898][T21803] should_fail_ex+0x512/0x640 [ 1003.274938][T21803] _copy_from_user+0x2e/0xd0 [ 1003.274977][T21803] copy_msghdr_from_user+0x98/0x160 [ 1003.275017][T21803] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1003.275060][T21803] ? kfree+0x24f/0x4d0 [ 1003.275089][T21803] ? __lock_acquire+0x622/0x1c90 [ 1003.275125][T21803] ___sys_recvmsg+0xdb/0x1a0 [ 1003.275163][T21803] ? __pfx____sys_recvmsg+0x10/0x10 [ 1003.275218][T21803] ? __pfx___might_resched+0x10/0x10 [ 1003.275249][T21803] do_recvmmsg+0x2fe/0x750 [ 1003.275291][T21803] ? __pfx_do_recvmmsg+0x10/0x10 [ 1003.275335][T21803] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 1003.275384][T21803] ? __fget_files+0x20e/0x3c0 [ 1003.275424][T21803] __x64_sys_recvmmsg+0x22a/0x280 [ 1003.275449][T21803] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 1003.275480][T21803] do_syscall_64+0xcd/0x490 [ 1003.275528][T21803] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1003.275552][T21803] RIP: 0033:0x7f1e0af8e929 [ 1003.275571][T21803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1003.275594][T21803] RSP: 002b:00007f1e0bd27038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1003.275616][T21803] RAX: ffffffffffffffda RBX: 00007f1e0b1b5fa0 RCX: 00007f1e0af8e929 [ 1003.275632][T21803] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1003.275646][T21803] RBP: 00007f1e0bd27090 R08: 0000000000000000 R09: 0000000000000000 [ 1003.275661][T21803] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 1003.275675][T21803] R13: 0000000000000000 R14: 00007f1e0b1b5fa0 R15: 00007fff9096fe68 [ 1003.275705][T21803] [ 1003.479275][ T1305] ieee802154 phy0 wpan0: encryption failed: -22 [ 1003.485685][ T1305] ieee802154 phy1 wpan1: encryption failed: -22 [ 1005.342538][T22034] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2127'. [ 1005.413117][T15234] udevd[15234]: inotify_add_watch(7, /dev/nbd4128, 10) failed: No such file or directory [ 1006.402641][T22249] ptrace attach of "./syz-executor exec"[5838] was attempted by "./syz-executor exec"[22249] [ 1006.611691][T22255] FAULT_INJECTION: forcing a failure. [ 1006.611691][T22255] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1006.630116][T22255] CPU: 0 UID: 0 PID: 22255 Comm: syz.1.2133 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 1006.630159][T22255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1006.630174][T22255] Call Trace: [ 1006.630181][T22255] [ 1006.630190][T22255] dump_stack_lvl+0x16c/0x1f0 [ 1006.630232][T22255] should_fail_ex+0x512/0x640 [ 1006.630276][T22255] _copy_from_user+0x2e/0xd0 [ 1006.630314][T22255] move_addr_to_kernel+0x65/0x170 [ 1006.630347][T22255] __sys_bind+0x11b/0x260 [ 1006.630379][T22255] ? __pfx___sys_bind+0x10/0x10 [ 1006.630407][T22255] ? __fget_files+0x20e/0x3c0 [ 1006.630450][T22255] ? __pfx_ksys_write+0x10/0x10 [ 1006.630491][T22255] __x64_sys_bind+0x72/0xb0 [ 1006.630520][T22255] ? lockdep_hardirqs_on+0x7c/0x110 [ 1006.630556][T22255] do_syscall_64+0xcd/0x490 [ 1006.630579][T22255] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1006.630604][T22255] RIP: 0033:0x7fa73078e929 [ 1006.630623][T22255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1006.630646][T22255] RSP: 002b:00007fa731625038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1006.630668][T22255] RAX: ffffffffffffffda RBX: 00007fa7309b6080 RCX: 00007fa73078e929 [ 1006.630684][T22255] RDX: 000000000000006a RSI: 0000000000000000 RDI: 0000000000000003 [ 1006.630699][T22255] RBP: 00007fa731625090 R08: 0000000000000000 R09: 0000000000000000 [ 1006.630713][T22255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1006.630728][T22255] R13: 0000000000000000 R14: 00007fa7309b6080 R15: 00007fff4903dbb8 [ 1006.630757][T22255] [ 1009.702591][T22495] FAULT_INJECTION: forcing a failure. [ 1009.702591][T22495] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1009.715854][T22495] CPU: 0 UID: 0 PID: 22495 Comm: syz.2.2143 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 1009.715896][T22495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1009.715914][T22495] Call Trace: [ 1009.715924][T22495] [ 1009.715937][T22495] dump_stack_lvl+0x16c/0x1f0 [ 1009.715999][T22495] should_fail_ex+0x512/0x640 [ 1009.716053][T22495] _copy_from_user+0x2e/0xd0 [ 1009.716104][T22495] copy_msghdr_from_user+0x98/0x160 [ 1009.716155][T22495] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1009.716212][T22495] ? kfree+0x24f/0x4d0 [ 1009.716248][T22495] ? find_held_lock+0x2b/0x80 [ 1009.716287][T22495] ___sys_recvmsg+0xdb/0x1a0 [ 1009.716337][T22495] ? __pfx____sys_recvmsg+0x10/0x10 [ 1009.716413][T22495] ? __pfx___might_resched+0x10/0x10 [ 1009.716454][T22495] do_recvmmsg+0x2fe/0x750 [ 1009.716512][T22495] ? __pfx_do_recvmmsg+0x10/0x10 [ 1009.716559][T22495] ? vfs_write+0x15d/0x1150 [ 1009.716613][T22495] ? __pfx_vfs_write+0x10/0x10 [ 1009.716685][T22495] __x64_sys_recvmmsg+0x22a/0x280 [ 1009.716718][T22495] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 1009.716764][T22495] do_syscall_64+0xcd/0x490 [ 1009.716795][T22495] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1009.716827][T22495] RIP: 0033:0x7fe9edb8e929 [ 1009.716851][T22495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1009.716881][T22495] RSP: 002b:00007fe9eeadb038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1009.716911][T22495] RAX: ffffffffffffffda RBX: 00007fe9eddb5fa0 RCX: 00007fe9edb8e929 [ 1009.716932][T22495] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1009.716951][T22495] RBP: 00007fe9eeadb090 R08: 0000000000000000 R09: 0000000000000000 [ 1009.716974][T22495] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 1009.716994][T22495] R13: 0000000000000000 R14: 00007fe9eddb5fa0 R15: 00007ffce8a61478 [ 1009.717036][T22495] [ 1010.043003][T22499] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2144'. [ 1012.538461][T22746] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2156'. [ 1012.686846][T22748] FAULT_INJECTION: forcing a failure. [ 1012.686846][T22748] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1012.703672][T22748] CPU: 1 UID: 0 PID: 22748 Comm: syz.1.2157 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 1012.703717][T22748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1012.703731][T22748] Call Trace: [ 1012.703739][T22748] [ 1012.703748][T22748] dump_stack_lvl+0x16c/0x1f0 [ 1012.703790][T22748] should_fail_ex+0x512/0x640 [ 1012.703828][T22748] _copy_from_user+0x2e/0xd0 [ 1012.703864][T22748] copy_msghdr_from_user+0x98/0x160 [ 1012.703902][T22748] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1012.703942][T22748] ? kfree+0x24f/0x4d0 [ 1012.703969][T22748] ? __lock_acquire+0x622/0x1c90 [ 1012.704004][T22748] ___sys_recvmsg+0xdb/0x1a0 [ 1012.704040][T22748] ? __pfx____sys_recvmsg+0x10/0x10 [ 1012.704092][T22748] ? __pfx___might_resched+0x10/0x10 [ 1012.704122][T22748] do_recvmmsg+0x2fe/0x750 [ 1012.704161][T22748] ? __pfx_do_recvmmsg+0x10/0x10 [ 1012.704203][T22748] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 1012.704249][T22748] ? __fget_files+0x20e/0x3c0 [ 1012.704286][T22748] __x64_sys_recvmmsg+0x22a/0x280 [ 1012.704310][T22748] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 1012.704340][T22748] do_syscall_64+0xcd/0x490 [ 1012.704362][T22748] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1012.704385][T22748] RIP: 0033:0x7fa73078e929 [ 1012.704403][T22748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1012.704425][T22748] RSP: 002b:00007fa731646038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1012.704446][T22748] RAX: ffffffffffffffda RBX: 00007fa7309b5fa0 RCX: 00007fa73078e929 [ 1012.704461][T22748] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1012.704474][T22748] RBP: 00007fa731646090 R08: 0000000000000000 R09: 0000000000000000 [ 1012.704488][T22748] R10: 00000000000003ff R11: 0000000000000246 R12: 0000000000000002 [ 1012.704501][T22748] R13: 0000000000000000 R14: 00007fa7309b5fa0 R15: 00007fff4903dbb8 [ 1012.704536][T22748] [ 1012.905046][ C1] vkms_vblank_simulate: vblank timer overrun [ 1014.006413][T22972] FAULT_INJECTION: forcing a failure. [ 1014.006413][T22972] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1014.047643][T22975] netlink: 24 bytes leftover after parsing attributes in process `syz.1.2163'. [ 1014.068772][T22972] CPU: 1 UID: 0 PID: 22972 Comm: syz.2.2164 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 1014.068816][T22972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1014.068833][T22972] Call Trace: [ 1014.068843][T22972] [ 1014.068855][T22972] dump_stack_lvl+0x16c/0x1f0 [ 1014.068910][T22972] should_fail_ex+0x512/0x640 [ 1014.068960][T22972] _copy_from_user+0x2e/0xd0 [ 1014.069009][T22972] ____sys_sendmsg+0x607/0xc70 [ 1014.069051][T22972] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1014.069097][T22972] ? __pfx__kstrtoull+0x10/0x10 [ 1014.069145][T22972] ___sys_sendmsg+0x134/0x1d0 [ 1014.069198][T22972] ? __pfx____sys_sendmsg+0x10/0x10 [ 1014.069269][T22972] ? find_held_lock+0x2b/0x80 [ 1014.069327][T22972] __sys_sendmmsg+0x200/0x420 [ 1014.069384][T22972] ? __pfx___sys_sendmmsg+0x10/0x10 [ 1014.069451][T22972] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1014.069520][T22972] ? fput+0x70/0xf0 [ 1014.069549][T22972] ? ksys_write+0x1ac/0x250 [ 1014.069590][T22972] ? __pfx_ksys_write+0x10/0x10 [ 1014.069652][T22972] __x64_sys_sendmmsg+0x9c/0x100 [ 1014.069699][T22972] ? lockdep_hardirqs_on+0x7c/0x110 [ 1014.069747][T22972] do_syscall_64+0xcd/0x490 [ 1014.069778][T22972] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1014.069811][T22972] RIP: 0033:0x7fe9edb8e929 [ 1014.069837][T22972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1014.069868][T22972] RSP: 002b:00007fe9eeadb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1014.069898][T22972] RAX: ffffffffffffffda RBX: 00007fe9eddb5fa0 RCX: 00007fe9edb8e929 [ 1014.069918][T22972] RDX: 0000000000000007 RSI: 0000200000000200 RDI: 0000000000000002 [ 1014.069935][T22972] RBP: 00007fe9eeadb090 R08: 0000000000000000 R09: 0000000000000000 [ 1014.069952][T22972] R10: 0000000000004008 R11: 0000000000000246 R12: 0000000000000001 [ 1014.069969][T22972] R13: 0000000000000000 R14: 00007fe9eddb5fa0 R15: 00007ffce8a61478 [ 1014.070008][T22972] [ 1014.268651][ C1] vkms_vblank_simulate: vblank timer overrun [ 1014.965314][T23089] netlink: 'syz.2.2168': attribute type 4 has an invalid length. [ 1014.973370][T23089] netlink: 314 bytes leftover after parsing attributes in process `syz.2.2168'. [ 1015.217875][T23093] FAULT_INJECTION: forcing a failure. [ 1015.217875][T23093] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1015.256443][T23093] CPU: 1 UID: 0 PID: 23093 Comm: syz.1.2170 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 1015.256488][T23093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1015.256507][T23093] Call Trace: [ 1015.256525][T23093] [ 1015.256538][T23093] dump_stack_lvl+0x16c/0x1f0 [ 1015.256592][T23093] should_fail_ex+0x512/0x640 [ 1015.256646][T23093] _copy_to_user+0x32/0xd0 [ 1015.256699][T23093] simple_read_from_buffer+0xcb/0x170 [ 1015.256744][T23093] proc_fail_nth_read+0x197/0x270 [ 1015.256784][T23093] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1015.256825][T23093] ? rw_verify_area+0xcf/0x680 [ 1015.256864][T23093] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1015.256903][T23093] vfs_read+0x1e4/0xc60 [ 1015.256953][T23093] ? __pfx___mutex_lock+0x10/0x10 [ 1015.256983][T23093] ? __pfx_vfs_read+0x10/0x10 [ 1015.257037][T23093] ? __fget_files+0x20e/0x3c0 [ 1015.257094][T23093] ksys_read+0x12a/0x250 [ 1015.257137][T23093] ? __pfx_ksys_read+0x10/0x10 [ 1015.257193][T23093] do_syscall_64+0xcd/0x490 [ 1015.257225][T23093] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1015.257258][T23093] RIP: 0033:0x7fa73078d33c [ 1015.257284][T23093] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1015.257316][T23093] RSP: 002b:00007fa731646030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1015.257345][T23093] RAX: ffffffffffffffda RBX: 00007fa7309b5fa0 RCX: 00007fa73078d33c [ 1015.257366][T23093] RDX: 000000000000000f RSI: 00007fa7316460a0 RDI: 0000000000000004 [ 1015.257384][T23093] RBP: 00007fa731646090 R08: 0000000000000000 R09: 0000000000000000 [ 1015.257402][T23093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1015.257420][T23093] R13: 0000000000000000 R14: 00007fa7309b5fa0 R15: 00007fff4903dbb8 [ 1015.257462][T23093] [ 1017.047034][T23333] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 1017.050521][T23332] kmem.tcp.limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 1017.054916][T23333] #PF: supervisor instruction fetch in kernel mode [ 1017.054940][T23333] #PF: error_code(0x0010) - not-present page [ 1017.054958][T23333] PGD 8000000044077067 P4D 8000000044077067 PUD 0 [ 1017.054997][T23333] Oops: Oops: 0010 [#1] SMP KASAN PTI [ 1017.094332][T23333] CPU: 1 UID: 0 PID: 23333 Comm: syz.3.2179 Not tainted 6.16.0-rc2-syzkaller-00082-gfb4d33ab452e #0 PREEMPT(full) [ 1017.106460][T23333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1017.116561][T23333] RIP: 0010:0x0 [ 1017.120060][T23333] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 1017.127452][T23333] RSP: 0018:ffffc9001aed79c8 EFLAGS: 00010287 [ 1017.133554][T23333] RAX: 00000000000008d8 RBX: 0000000000000000 RCX: ffffc9000c02c000 [ 1017.141644][T23333] RDX: 0000000000080000 RSI: ffffea0001517200 RDI: ffff8880346de000 [ 1017.149646][T23333] RBP: ffffea0001517200 R08: 0000000000000007 R09: 0000000000000000 [ 1017.157649][T23333] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff920035daf3a [ 1017.166091][T23333] R13: ffff8880346de000 R14: 0000000000000000 R15: dffffc0000000000 [ 1017.174132][T23333] FS: 00007f455d28c6c0(0000) GS:ffff888124861000(0000) knlGS:0000000000000000 [ 1017.183137][T23333] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1017.189756][T23333] CR2: ffffffffffffffd6 CR3: 000000001eee0000 CR4: 00000000003526f0 [ 1017.197764][T23333] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1017.205770][T23333] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1017.213792][T23333] Call Trace: [ 1017.217111][T23333] [ 1017.220067][T23333] filemap_read_folio+0xc8/0x2a0 [ 1017.225195][T23333] ? __pfx_filemap_read_folio+0x10/0x10 [ 1017.230803][T23333] ? __filemap_get_folio+0x32b/0xc30 [ 1017.236123][T23333] ? down_read+0x13d/0x480 [ 1017.240578][T23333] do_read_cache_folio+0x263/0x5c0 [ 1017.245727][T23333] freader_get_folio+0x337/0x930 [ 1017.250728][T23333] freader_fetch+0xc2/0x5e0 [ 1017.255274][T23333] ? mt_find+0x3ef/0xa30 [ 1017.259550][T23333] __build_id_parse.isra.0+0xec/0x7a0 [ 1017.264986][T23333] ? __pfx___build_id_parse.isra.0+0x10/0x10 [ 1017.271029][T23333] ? __pfx_find_vma+0x10/0x10 [ 1017.275747][T23333] do_procmap_query+0xd96/0x1090 [ 1017.280733][T23333] ? __pfx_do_procmap_query+0x10/0x10 [ 1017.286171][T23333] ? __x64_sys_openat+0x174/0x210 [ 1017.291245][T23333] procfs_procmap_ioctl+0x7d/0xb0 [ 1017.296444][T23333] ? __pfx_procfs_procmap_ioctl+0x10/0x10 [ 1017.302299][T23333] __x64_sys_ioctl+0x18b/0x210 [ 1017.307148][T23333] do_syscall_64+0xcd/0x490 [ 1017.311706][T23333] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1017.317650][T23333] RIP: 0033:0x7f455c38e929 [ 1017.322096][T23333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1017.341844][T23333] RSP: 002b:00007f455d28c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1017.350295][T23333] RAX: ffffffffffffffda RBX: 00007f455c5b5fa0 RCX: 00007f455c38e929 [ 1017.358309][T23333] RDX: 0000200000000080 RSI: 00000000c0686611 RDI: 0000000000000003 [ 1017.366348][T23333] RBP: 00007f455c410b39 R08: 0000000000000000 R09: 0000000000000000 [ 1017.374359][T23333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1017.382367][T23333] R13: 0000000000000000 R14: 00007f455c5b5fa0 R15: 00007ffd67acf3d8 [ 1017.390383][T23333] [ 1017.393443][T23333] Modules linked in: [ 1017.397368][T23333] CR2: 0000000000000000 [ 1017.401553][T23333] ---[ end trace 0000000000000000 ]--- [ 1017.407029][T23333] RIP: 0010:0x0 [ 1017.410524][T23333] Code: Unable to access opcode bytes at 0xffffffffffffffd6. [ 1017.418001][T23333] RSP: 0018:ffffc9001aed79c8 EFLAGS: 00010287 [ 1017.424159][T23333] RAX: 00000000000008d8 RBX: 0000000000000000 RCX: ffffc9000c02c000 [ 1017.432180][T23333] RDX: 0000000000080000 RSI: ffffea0001517200 RDI: ffff8880346de000 [ 1017.440182][T23333] RBP: ffffea0001517200 R08: 0000000000000007 R09: 0000000000000000 [ 1017.448184][T23333] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff920035daf3a [ 1017.456185][T23333] R13: ffff8880346de000 R14: 0000000000000000 R15: dffffc0000000000 [ 1017.464184][T23333] FS: 00007f455d28c6c0(0000) GS:ffff888124861000(0000) knlGS:0000000000000000 [ 1017.473148][T23333] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1017.479772][T23333] CR2: ffffffffffffffd6 CR3: 000000001eee0000 CR4: 00000000003526f0 [ 1017.487810][T23333] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1017.495821][T23333] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1017.503860][T23333] Kernel panic - not syncing: Fatal exception [ 1017.510270][T23333] Kernel Offset: disabled [ 1017.514619][T23333] Rebooting in 86400 seconds..