primary cpu clock, resume [ 149.748795][T13644] ACPI: Low-level resume complete [ 149.748879][T13644] PM: Restoring platform NVS memory [ 149.748889][T13644] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 149.759299][T13644] Enabling non-boot CPUs ... [ 149.759477][T13644] x86: Booting SMP configuration: [ 149.759481][T13644] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 149.759650][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 149.760593][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 149.762057][T13644] CPU1 is up [ 149.762279][T13644] ACPI: Waking up from system sleep state S3 [ 149.859993][T13644] OOM killer enabled. [ 149.860693][T13644] Restarting tasks ... [ 149.865204][ T1034] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 149.869448][ T1034] block loop4: uevent: failed to send synthetic uevent [ 149.880703][T13644] done. [ 149.882319][T13644] PM: suspend exit 22:45:57 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)}], 0x1}}], 0x2, 0x8dc0) 22:45:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:45:57 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 22:45:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 149.948346][T13665] PM: suspend entry (deep) [ 149.959436][T13665] Filesystems sync: 0.009 seconds [ 149.961675][T13665] Freezing user space processes ... (elapsed 0.003 seconds) done. [ 149.966875][T13665] OOM killer disabled. [ 149.967553][T13665] Freezing remaining freezable tasks ... (elapsed 0.003 seconds) done. [ 149.972776][T13665] printk: Suspending console(s) (use no_console_suspend to debug) 22:45:58 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:45:58 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)}], 0x1}}], 0x2, 0x8dc0) 22:45:58 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) [ 150.052441][ T1805] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 150.534762][T12851] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 150.553147][T13665] ACPI: Preparing to enter system sleep state S3 [ 150.553216][T13665] PM: Saving platform NVS memory [ 150.553220][T13665] Disabling non-boot CPUs ... [ 150.555597][T13665] smpboot: CPU 1 is now offline [ 150.558213][T13665] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 150.558275][T13665] ACPI: Low-level resume complete [ 150.558353][T13665] PM: Restoring platform NVS memory [ 150.558363][T13665] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 150.570997][T13665] Enabling non-boot CPUs ... [ 150.571153][T13665] x86: Booting SMP configuration: [ 150.571192][T13665] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 150.571363][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 150.572238][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 150.573507][T13665] CPU1 is up [ 150.573799][T13665] ACPI: Waking up from system sleep state S3 [ 150.999795][T13665] OOM killer enabled. [ 151.000640][T13665] Restarting tasks ... [ 151.003304][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 151.007480][ T1034] block loop5: uevent: failed to send synthetic uevent [ 151.015809][T13665] done. [ 151.018198][T13665] PM: suspend exit 22:45:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:45:58 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:45:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:45:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:45:58 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90", 0x1}], 0x1}}], 0x2, 0x8dc0) [ 151.092049][T13690] PM: suspend entry (deep) [ 151.104377][T13690] Filesystems sync: 0.010 seconds [ 151.111858][T13690] Freezing user space processes ... (elapsed 0.013 seconds) done. [ 151.128187][T13690] OOM killer disabled. [ 151.129429][T13690] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 151.132234][T13690] printk: Suspending console(s) (use no_console_suspend to debug) 22:45:59 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:45:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:45:59 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:45:59 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 151.306520][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 151.406468][T12851] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 151.808766][T13690] ACPI: Preparing to enter system sleep state S3 [ 151.808883][T13690] PM: Saving platform NVS memory [ 151.808887][T13690] Disabling non-boot CPUs ... [ 151.812088][T13690] smpboot: CPU 1 is now offline [ 151.814721][T13690] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 151.814783][T13690] ACPI: Low-level resume complete [ 151.814942][T13690] PM: Restoring platform NVS memory [ 151.814950][T13690] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 151.825717][T13690] Enabling non-boot CPUs ... [ 151.825969][T13690] x86: Booting SMP configuration: [ 151.825974][T13690] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 151.826142][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 151.827172][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 151.828540][T13690] CPU1 is up [ 151.828882][T13690] ACPI: Waking up from system sleep state S3 [ 151.936070][T13690] OOM killer enabled. [ 151.937124][T13690] Restarting tasks ... [ 151.939147][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 151.943177][ T1034] block loop5: uevent: failed to send synthetic uevent [ 151.961054][T13690] done. [ 151.962543][T13690] PM: suspend exit [ 151.969612][T13702] PM: suspend entry (deep) [ 151.979437][T13702] Filesystems sync: 0.008 seconds [ 151.981435][T13702] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 151.999660][T13702] OOM killer disabled. [ 152.000492][T13702] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 152.003287][T13702] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:00 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, 0x0, 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:00 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90", 0x1}], 0x1}}], 0x2, 0x8dc0) 22:46:00 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 152.129034][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 152.627580][T13702] ACPI: Preparing to enter system sleep state S3 [ 152.627732][T13702] PM: Saving platform NVS memory [ 152.627736][T13702] Disabling non-boot CPUs ... [ 152.630209][T13702] smpboot: CPU 1 is now offline [ 152.632589][T13702] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 152.632729][T13702] ACPI: Low-level resume complete [ 152.632812][T13702] PM: Restoring platform NVS memory [ 152.632820][T13702] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 152.643217][T13702] Enabling non-boot CPUs ... [ 152.643421][T13702] x86: Booting SMP configuration: [ 152.643425][T13702] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 152.643623][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 152.644697][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 152.646006][T13702] CPU1 is up [ 152.646277][T13702] ACPI: Waking up from system sleep state S3 [ 152.752061][T13702] OOM killer enabled. [ 152.752711][T13702] Restarting tasks ... [ 152.754759][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 152.758753][ T1034] block loop3: uevent: failed to send synthetic uevent [ 152.765906][T13702] done. 22:46:00 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:00 executing program 4: r0 = openat$sysfs(0xffffff9c, 0x0, 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 152.788610][T13702] PM: suspend exit 22:46:00 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90", 0x1}], 0x1}}], 0x2, 0x8dc0) 22:46:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:00 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, 0x0, 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x2400487e) 22:46:00 executing program 4: r0 = openat$sysfs(0xffffff9c, 0x0, 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:00 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x1, 0x8dc0) 22:46:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:00 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, 0x0, 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x2400487e) 22:46:00 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x1, 0x8dc0) 22:46:00 executing program 4: r0 = openat$sysfs(0xffffff9c, 0x0, 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x2400487e) 22:46:00 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:00 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x1, 0x8dc0) 22:46:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x2400487e) 22:46:00 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:00 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:00 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x2400487e) 22:46:00 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:00 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:00 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x2400487e) 22:46:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:00 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:00 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:01 executing program 0: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:01 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:01 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:01 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2400487e) 22:46:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:01 executing program 0: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2400487e) 22:46:01 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:01 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:01 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x2400487e) [ 153.353886][T13827] PM: suspend entry (deep) [ 153.363471][T13827] Filesystems sync: 0.007 seconds [ 153.366911][T13827] Freezing user space processes ... [ 153.373624][T13819] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 153.376701][T13819] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000f805926a [ 153.398869][T13827] (elapsed 0.031 seconds) done. [ 153.400203][T13827] OOM killer disabled. [ 153.400964][T13827] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 153.403808][T13827] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:01 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 153.450721][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 153.941658][T13827] ACPI: Preparing to enter system sleep state S3 [ 153.941726][T13827] PM: Saving platform NVS memory [ 153.941731][T13827] Disabling non-boot CPUs ... [ 153.944959][T13827] smpboot: CPU 1 is now offline [ 153.947816][T13827] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 153.947956][T13827] ACPI: Low-level resume complete [ 153.948031][T13827] PM: Restoring platform NVS memory [ 153.948040][T13827] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 153.958697][T13827] Enabling non-boot CPUs ... [ 153.958934][T13827] x86: Booting SMP configuration: [ 153.958937][T13827] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 153.959119][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 153.960034][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 153.961572][T13827] CPU1 is up [ 153.961880][T13827] ACPI: Waking up from system sleep state S3 [ 154.069307][T13827] OOM killer enabled. [ 154.069926][T13827] Restarting tasks ... [ 154.078532][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 154.082058][ T1034] block loop3: uevent: failed to send synthetic uevent [ 154.092475][T13827] done. [ 154.095081][T13827] PM: suspend exit 22:46:01 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0x7, 0x3) [ 154.136739][T13844] PM: suspend entry (deep) [ 154.144302][T13844] Filesystems sync: 0.006 seconds [ 154.150532][T13844] Freezing user space processes ... (elapsed 0.008 seconds) done. [ 154.160780][T13844] OOM killer disabled. [ 154.162107][T13844] Freezing remaining freezable tasks ... (elapsed 0.000 seconds) done. [ 154.164393][T13844] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:03 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:03 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0x7, 0x3) [ 154.323081][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 154.828833][T13844] ACPI: Preparing to enter system sleep state S3 [ 154.828905][T13844] PM: Saving platform NVS memory [ 154.828909][T13844] Disabling non-boot CPUs ... [ 154.831132][T13844] smpboot: CPU 1 is now offline [ 154.833467][T13844] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 154.833532][T13844] ACPI: Low-level resume complete [ 154.833602][T13844] PM: Restoring platform NVS memory [ 154.833611][T13844] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 154.844982][T13844] Enabling non-boot CPUs ... [ 154.845152][T13844] x86: Booting SMP configuration: [ 154.845155][T13844] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 154.845391][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 154.846390][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 154.847803][T13844] CPU1 is up [ 154.848111][T13844] ACPI: Waking up from system sleep state S3 [ 155.674050][T13844] OOM killer enabled. [ 155.674686][T13844] Restarting tasks ... [ 155.678079][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 155.682142][ T1034] block loop5: uevent: failed to send synthetic uevent [ 155.693931][T13844] done. [ 155.695145][T13844] PM: suspend exit [ 155.717412][T13855] PM: suspend entry (deep) [ 155.729235][T13855] Filesystems sync: 0.010 seconds [ 155.734956][T13855] Freezing user space processes ... (elapsed 0.011 seconds) done. [ 155.747712][T13855] OOM killer disabled. [ 155.748573][T13855] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 155.751813][T13855] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:04 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 22:46:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:04 executing program 1: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:04 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 22:46:04 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 155.916113][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 156.086075][T12851] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 156.428590][T13855] ACPI: Preparing to enter system sleep state S3 [ 156.428700][T13855] PM: Saving platform NVS memory [ 156.428704][T13855] Disabling non-boot CPUs ... [ 156.431870][T13855] smpboot: CPU 1 is now offline [ 156.434280][T13855] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 156.434343][T13855] ACPI: Low-level resume complete [ 156.434434][T13855] PM: Restoring platform NVS memory [ 156.434443][T13855] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 156.444296][T13855] Enabling non-boot CPUs ... [ 156.444527][T13855] x86: Booting SMP configuration: [ 156.444530][T13855] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 156.444785][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 156.445821][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 156.447537][T13855] CPU1 is up [ 156.447858][T13855] ACPI: Waking up from system sleep state S3 [ 156.556193][T13855] OOM killer enabled. [ 156.557186][T13855] Restarting tasks ... [ 156.559563][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 156.563740][T13855] done. [ 156.571726][ T1034] block loop5: uevent: failed to send synthetic uevent 22:46:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 156.598601][T13855] PM: suspend exit [ 156.603857][T13865] PM: suspend entry (deep) [ 156.634005][T13865] Filesystems sync: 0.025 seconds [ 156.652691][T13865] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 156.668043][T13865] OOM killer disabled. [ 156.672137][T13865] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 156.681675][T13865] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x1, 0x2400487e) 22:46:05 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 22:46:05 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:05 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) [ 156.787362][T13223] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 157.267546][T12851] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 157.285333][T13865] ACPI: Preparing to enter system sleep state S3 [ 157.285571][T13865] PM: Saving platform NVS memory [ 157.285575][T13865] Disabling non-boot CPUs ... [ 157.288034][T13865] smpboot: CPU 1 is now offline [ 157.290663][T13865] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 157.290775][T13865] ACPI: Low-level resume complete [ 157.290886][T13865] PM: Restoring platform NVS memory [ 157.290895][T13865] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 157.302998][T13865] Enabling non-boot CPUs ... [ 157.303187][T13865] x86: Booting SMP configuration: [ 157.303190][T13865] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 157.303371][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 157.304461][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 157.305820][T13865] CPU1 is up [ 157.306043][T13865] ACPI: Waking up from system sleep state S3 [ 157.735646][T13865] OOM killer enabled. [ 157.736228][T13865] Restarting tasks ... [ 157.743035][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 157.745636][ T1034] block loop5: uevent: failed to send synthetic uevent [ 157.746098][T13865] done. [ 157.748015][T13865] PM: suspend exit 22:46:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x1, 0x2400487e) 22:46:05 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:05 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 22:46:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x1, 0x2400487e) 22:46:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:05 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 22:46:05 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{0x0}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:05 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x3) 22:46:05 executing program 1: memfd_create(&(0x7f0000000040)='+/]\x00', 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:05 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{0x0}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:05 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x3) 22:46:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:05 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x3) [ 158.001939][T13923] PM: suspend entry (deep) [ 158.010423][T13923] Filesystems sync: 0.007 seconds [ 158.012407][T13923] Freezing user space processes ... (elapsed 0.023 seconds) done. [ 158.037993][T13923] OOM killer disabled. [ 158.038741][T13923] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 158.041395][T13923] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:06 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x3) 22:46:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000040)={0x1}) 22:46:06 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x3) [ 158.401715][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 158.906702][T13923] ACPI: Preparing to enter system sleep state S3 [ 158.906767][T13923] PM: Saving platform NVS memory [ 158.906770][T13923] Disabling non-boot CPUs ... [ 158.910186][T13923] smpboot: CPU 1 is now offline [ 158.912691][T13923] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 158.912753][T13923] ACPI: Low-level resume complete [ 158.912831][T13923] PM: Restoring platform NVS memory [ 158.912839][T13923] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 158.922768][T13923] Enabling non-boot CPUs ... [ 158.923027][T13923] x86: Booting SMP configuration: [ 158.923102][T13923] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 158.923272][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 158.924401][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 158.925854][T13923] CPU1 is up [ 158.926068][T13923] ACPI: Waking up from system sleep state S3 [ 159.023000][T13923] OOM killer enabled. [ 159.023735][T13923] Restarting tasks ... [ 159.032500][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 159.033929][T13923] done. [ 159.034531][ T1034] block loop5: uevent: failed to send synthetic uevent [ 159.055457][T13923] PM: suspend exit 22:46:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{0x0}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000040)={0x1}) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) 22:46:06 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x3) 22:46:06 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x3) 22:46:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x0, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:06 executing program 0 (fault-call:1 fault-nth:0): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:07 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x3) 22:46:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x0, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:07 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x3) 22:46:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 159.256139][T13967] FAULT_INJECTION: forcing a failure. [ 159.256139][T13967] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 159.258852][T13967] CPU: 1 PID: 13967 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.260270][T13967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.261876][T13967] Call Trace: [ 159.262403][T13967] dump_stack+0x137/0x19d [ 159.263236][T13967] should_fail+0x23c/0x250 [ 159.264218][T13967] should_fail_usercopy+0x16/0x20 [ 159.265108][T13967] _copy_from_user+0x1c/0xd0 [ 159.265868][T13967] perf_copy_attr+0x156/0x650 [ 159.266633][T13967] __se_sys_perf_event_open+0xb6/0x2740 [ 159.267636][T13967] ? vfs_write+0x50c/0x770 [ 159.268488][T13967] __x64_sys_perf_event_open+0x63/0x70 [ 159.269478][T13967] do_syscall_64+0x4a/0x90 [ 159.270284][T13967] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.271263][T13967] RIP: 0033:0x4665d9 [ 159.271940][T13967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.275095][T13967] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 159.276413][T13967] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 159.278415][T13967] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 159.279757][T13967] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.281103][T13967] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 159.282312][T13967] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:07 executing program 1 (fault-call:1 fault-nth:0): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x0, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:07 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x3) 22:46:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="18", 0x1}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:07 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x3) 22:46:07 executing program 0 (fault-call:1 fault-nth:1): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:07 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x0) [ 159.378554][T13993] FAULT_INJECTION: forcing a failure. [ 159.378554][T13993] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.381288][T13993] CPU: 1 PID: 13993 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.382972][T13993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.384906][T13993] Call Trace: [ 159.385757][T13993] dump_stack+0x137/0x19d [ 159.386726][T13993] should_fail+0x23c/0x250 [ 159.387474][T13993] should_fail_usercopy+0x16/0x20 [ 159.388625][T13993] _copy_from_user+0x1c/0xd0 [ 159.389400][T13993] perf_copy_attr+0x156/0x650 [ 159.390291][T13993] __se_sys_perf_event_open+0xb6/0x2740 [ 159.391204][T13993] ? vfs_write+0x50c/0x770 [ 159.391998][T13993] __x64_sys_perf_event_open+0x63/0x70 [ 159.392883][T13993] do_syscall_64+0x4a/0x90 [ 159.393756][T13993] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.394708][T13995] FAULT_INJECTION: forcing a failure. [ 159.394708][T13995] name failslab, interval 1, probability 0, space 0, times 1 [ 159.394788][T13993] RIP: 0033:0x4665d9 [ 159.397307][T13993] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.400789][T13993] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 159.402572][T13993] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 159.403985][T13993] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 159.405245][T13993] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.406474][T13993] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 159.408009][T13993] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 159.409748][T13995] CPU: 0 PID: 13995 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.411594][T13995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.413374][T13995] Call Trace: [ 159.413942][T13995] dump_stack+0x137/0x19d [ 159.414868][T13995] should_fail+0x23c/0x250 [ 159.415865][T13995] __should_failslab+0x81/0x90 [ 159.416874][T13995] should_failslab+0x5/0x20 [ 159.417684][T13995] kmem_cache_alloc_node+0x58/0x2b0 [ 159.418522][T13995] ? cred_has_capability+0x1af/0x210 [ 159.419301][T13995] ? perf_event_alloc+0x160/0x1790 [ 159.420098][T13995] perf_event_alloc+0x160/0x1790 [ 159.420858][T13995] __se_sys_perf_event_open+0x5c7/0x2740 [ 159.421857][T13995] ? vfs_write+0x50c/0x770 [ 159.423114][T13995] __x64_sys_perf_event_open+0x63/0x70 [ 159.424332][T13995] do_syscall_64+0x4a/0x90 [ 159.425004][T13995] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.426049][T13995] RIP: 0033:0x4665d9 22:46:07 executing program 1 (fault-call:1 fault-nth:1): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x0) 22:46:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="18", 0x1}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:07 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x3) [ 159.426788][T13995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.430324][T13995] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 159.431620][T13995] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 159.432989][T13995] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 159.434482][T13995] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.435701][T13995] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 159.437226][T13995] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:07 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x0) 22:46:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x0) 22:46:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="18", 0x1}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 159.469799][T14002] FAULT_INJECTION: forcing a failure. [ 159.469799][T14002] name failslab, interval 1, probability 0, space 0, times 0 [ 159.472179][T14002] CPU: 0 PID: 14002 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.473588][T14002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.475647][T14002] Call Trace: [ 159.476155][T14002] dump_stack+0x137/0x19d [ 159.476949][T14002] should_fail+0x23c/0x250 [ 159.477806][T14002] __should_failslab+0x81/0x90 [ 159.478691][T14002] should_failslab+0x5/0x20 [ 159.479407][T14002] kmem_cache_alloc_node+0x58/0x2b0 [ 159.480470][T14002] ? cred_has_capability+0x1af/0x210 [ 159.481588][T14002] ? perf_event_alloc+0x160/0x1790 [ 159.482717][T14002] perf_event_alloc+0x160/0x1790 [ 159.483664][T14002] __se_sys_perf_event_open+0x5c7/0x2740 [ 159.485128][T14002] ? vfs_write+0x50c/0x770 [ 159.486027][T14002] __x64_sys_perf_event_open+0x63/0x70 [ 159.487460][T14002] do_syscall_64+0x4a/0x90 [ 159.488236][T14002] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.489178][T14002] RIP: 0033:0x4665d9 [ 159.489836][T14002] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.492748][T14002] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 159.493971][T14002] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 159.495073][T14002] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 159.496374][T14002] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.497696][T14002] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 159.498821][T14002] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:07 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x0) 22:46:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x0) 22:46:07 executing program 1 (fault-call:1 fault-nth:2): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:07 executing program 0 (fault-call:1 fault-nth:2): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:07 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x0) 22:46:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x0) [ 159.602300][T14028] FAULT_INJECTION: forcing a failure. [ 159.602300][T14028] name failslab, interval 1, probability 0, space 0, times 0 [ 159.604935][T14028] CPU: 0 PID: 14028 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.606798][T14028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.608571][T14028] Call Trace: [ 159.609143][T14028] dump_stack+0x137/0x19d [ 159.609975][T14028] should_fail+0x23c/0x250 [ 159.610767][T14028] ? perf_uprobe_init+0x45/0x140 [ 159.611654][T14028] __should_failslab+0x81/0x90 [ 159.612524][T14028] should_failslab+0x5/0x20 [ 159.613285][T14028] __kmalloc_track_caller+0x64/0x340 [ 159.614432][T14028] ? strnlen_user+0x137/0x1c0 [ 159.615234][T14028] strndup_user+0x73/0x120 [ 159.616012][T14028] perf_uprobe_init+0x45/0x140 [ 159.616874][T14028] perf_uprobe_event_init+0xde/0x140 [ 159.618077][T14028] perf_try_init_event+0x21a/0x400 [ 159.619002][T14028] perf_event_alloc+0xa60/0x1790 [ 159.620062][T14028] __se_sys_perf_event_open+0x5c7/0x2740 [ 159.621247][T14028] ? vfs_write+0x50c/0x770 [ 159.622024][T14028] __x64_sys_perf_event_open+0x63/0x70 [ 159.622967][T14028] do_syscall_64+0x4a/0x90 [ 159.623777][T14028] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.624698][T14028] RIP: 0033:0x4665d9 [ 159.625428][T14028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.628672][T14028] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 159.630089][T14028] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 159.631359][T14028] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 159.632723][T14028] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.634255][T14028] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 159.635661][T14028] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x0) 22:46:07 executing program 5 (fault-call:5 fault-nth:0): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:07 executing program 4 (fault-call:1 fault-nth:0): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:07 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x0) 22:46:07 executing program 0 (fault-call:1 fault-nth:3): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 159.676876][T14042] FAULT_INJECTION: forcing a failure. [ 159.676876][T14042] name failslab, interval 1, probability 0, space 0, times 0 [ 159.679540][T14042] CPU: 0 PID: 14042 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.681215][T14042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.682932][T14042] Call Trace: [ 159.683540][T14042] dump_stack+0x137/0x19d [ 159.684591][T14042] should_fail+0x23c/0x250 [ 159.685483][T14042] ? perf_uprobe_init+0x45/0x140 [ 159.686298][T14042] __should_failslab+0x81/0x90 [ 159.687081][T14042] should_failslab+0x5/0x20 [ 159.688250][T14042] __kmalloc_track_caller+0x64/0x340 [ 159.689298][T14042] ? strnlen_user+0x137/0x1c0 [ 159.690368][T14042] strndup_user+0x73/0x120 [ 159.691335][T14042] perf_uprobe_init+0x45/0x140 [ 159.692222][T14042] perf_uprobe_event_init+0xde/0x140 [ 159.693087][T14042] perf_try_init_event+0x21a/0x400 [ 159.693958][T14042] perf_event_alloc+0xa60/0x1790 [ 159.694934][T14042] __se_sys_perf_event_open+0x5c7/0x2740 [ 159.696057][T14042] ? vfs_write+0x50c/0x770 [ 159.696853][T14042] __x64_sys_perf_event_open+0x63/0x70 [ 159.697807][T14042] do_syscall_64+0x4a/0x90 [ 159.698586][T14042] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.699999][T14042] RIP: 0033:0x4665d9 [ 159.700708][T14042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.703742][T14042] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 159.705063][T14042] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 159.706523][T14042] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 159.708138][T14042] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.710095][T14042] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 159.711950][T14042] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 159.738588][T14050] FAULT_INJECTION: forcing a failure. [ 159.738588][T14050] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.741594][T14050] CPU: 0 PID: 14050 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.743319][T14050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.745215][T14050] Call Trace: [ 159.745755][T14050] dump_stack+0x137/0x19d [ 159.746500][T14050] should_fail+0x23c/0x250 [ 159.747231][T14050] should_fail_usercopy+0x16/0x20 [ 159.748354][T14050] _copy_from_user+0x1c/0xd0 [ 159.749049][T14050] __copy_msghdr_from_user+0x44/0x350 [ 159.750058][T14050] ? __fget_light+0x21b/0x260 [ 159.750894][T14050] __sys_sendmmsg+0x1f0/0x4b0 [ 159.751746][T14050] ? kstrtoull+0x30e/0x350 [ 159.751757][T14054] FAULT_INJECTION: forcing a failure. [ 159.751757][T14054] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.755864][T14050] ? kstrtouint_from_user+0x104/0x130 [ 159.756802][T14050] ? do_anonymous_page+0x411/0x8b0 [ 159.758301][T14050] ? fsnotify_perm+0x59/0x2e0 [ 159.759304][T14050] ? __fsnotify_parent+0x32f/0x430 [ 159.760293][T14050] ? get_pid_task+0x8b/0xc0 [ 159.761213][T14050] ? vfs_write+0x50c/0x770 [ 159.761962][T14050] ? __fget_light+0x21b/0x260 [ 159.763105][T14050] ? __cond_resched+0x11/0x40 [ 159.764009][T14050] ? fput+0x2d/0x130 [ 159.764619][T14050] ? ksys_write+0x157/0x180 [ 159.765257][T14050] __x64_sys_sendmmsg+0x53/0x60 [ 159.766600][T14050] do_syscall_64+0x4a/0x90 [ 159.767275][T14050] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.768193][T14050] RIP: 0033:0x4665d9 [ 159.768781][T14050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.772049][T14050] RSP: 002b:00007f6094af3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 159.773298][T14050] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 159.774637][T14050] RDX: 0000000000000002 RSI: 0000000020002840 RDI: 0000000000000003 [ 159.775922][T14050] RBP: 00007f6094af31d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.777183][T14050] R10: 000000002400487e R11: 0000000000000246 R12: 0000000000000001 [ 159.778663][T14050] R13: 00007ffeb26b180f R14: 00007f6094af3300 R15: 0000000000022000 [ 159.779922][T14054] CPU: 1 PID: 14054 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.781783][T14054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.783554][T14054] Call Trace: [ 159.784164][T14054] dump_stack+0x137/0x19d [ 159.784937][T14054] should_fail+0x23c/0x250 [ 159.785772][T14054] should_fail_usercopy+0x16/0x20 [ 159.786579][T14054] _copy_from_user+0x1c/0xd0 [ 159.787332][T14054] strndup_user+0xb0/0x120 [ 159.788026][T14054] perf_uprobe_init+0x45/0x140 22:46:07 executing program 1 (fault-call:1 fault-nth:3): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x0) [ 159.788766][T14054] perf_uprobe_event_init+0xde/0x140 [ 159.789815][T14054] perf_try_init_event+0x21a/0x400 [ 159.790896][T14054] perf_event_alloc+0xa60/0x1790 [ 159.791780][T14054] __se_sys_perf_event_open+0x5c7/0x2740 [ 159.792928][T14054] ? vfs_write+0x50c/0x770 [ 159.793967][T14054] __x64_sys_perf_event_open+0x63/0x70 [ 159.794878][T14054] do_syscall_64+0x4a/0x90 [ 159.795585][T14054] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.796522][T14054] RIP: 0033:0x4665d9 [ 159.797085][T14054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.800115][T14054] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 159.801354][T14054] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 159.802418][T14054] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 159.803854][T14054] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.805637][T14054] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 159.807066][T14054] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 159.815467][T14053] FAULT_INJECTION: forcing a failure. [ 159.815467][T14053] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.817859][T14053] CPU: 1 PID: 14053 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.819242][T14053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.821291][T14053] Call Trace: [ 159.821876][T14053] dump_stack+0x137/0x19d [ 159.822558][T14053] should_fail+0x23c/0x250 [ 159.823421][T14053] should_fail_usercopy+0x16/0x20 [ 159.824359][T14053] _copy_from_user+0x1c/0xd0 [ 159.825159][T14053] __x64_sys_sendfile64+0x77/0x130 [ 159.826224][T14053] do_syscall_64+0x4a/0x90 [ 159.826958][T14053] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.827895][T14053] RIP: 0033:0x4665d9 [ 159.828513][T14053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.832292][T14053] RSP: 002b:00007f347a1c8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 159.833914][T14053] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 159.835130][T14053] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 159.836455][T14053] RBP: 00007f347a1c81d0 R08: 0000000000000000 R09: 0000000000000000 22:46:07 executing program 5 (fault-call:5 fault-nth:1): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 159.837857][T14053] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 159.839393][T14053] R13: 00007ffc0c4960ef R14: 00007f347a1c8300 R15: 0000000000022000 22:46:07 executing program 0 (fault-call:1 fault-nth:4): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:07 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x0) [ 159.863145][T14060] FAULT_INJECTION: forcing a failure. [ 159.863145][T14060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.865674][T14060] CPU: 1 PID: 14060 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.867405][T14060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.869047][T14060] Call Trace: [ 159.869615][T14060] dump_stack+0x137/0x19d [ 159.870291][T14060] should_fail+0x23c/0x250 [ 159.871042][T14060] should_fail_usercopy+0x16/0x20 [ 159.871883][T14060] _copy_from_user+0x1c/0xd0 [ 159.872697][T14060] strndup_user+0xb0/0x120 [ 159.873511][T14060] perf_uprobe_init+0x45/0x140 [ 159.874363][T14060] perf_uprobe_event_init+0xde/0x140 [ 159.875428][T14060] perf_try_init_event+0x21a/0x400 [ 159.876408][T14060] perf_event_alloc+0xa60/0x1790 [ 159.877305][T14060] __se_sys_perf_event_open+0x5c7/0x2740 [ 159.878402][T14060] ? vfs_write+0x50c/0x770 [ 159.879217][T14060] __x64_sys_perf_event_open+0x63/0x70 [ 159.880219][T14060] do_syscall_64+0x4a/0x90 [ 159.881067][T14060] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.882029][T14060] RIP: 0033:0x4665d9 [ 159.882634][T14060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.885551][T14060] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 159.886815][T14060] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 159.888099][T14060] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 159.889402][T14060] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.890670][T14060] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 159.891749][T14060] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 159.901063][T14061] FAULT_INJECTION: forcing a failure. [ 159.901063][T14061] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.903355][T14061] CPU: 1 PID: 14061 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.905261][T14061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.907657][T14061] Call Trace: [ 159.908233][T14061] dump_stack+0x137/0x19d [ 159.909013][T14061] should_fail+0x23c/0x250 [ 159.909821][T14061] should_fail_usercopy+0x16/0x20 [ 159.910763][T14061] _copy_from_user+0x1c/0xd0 [ 159.911721][T14061] __copy_msghdr_from_user+0x2a5/0x350 [ 159.912797][T14061] __sys_sendmmsg+0x1f0/0x4b0 [ 159.913800][T14061] ? kstrtoull+0x30f/0x350 [ 159.914472][T14061] ? kstrtouint_from_user+0x104/0x130 [ 159.915313][T14061] ? do_anonymous_page+0x411/0x8b0 [ 159.916219][T14061] ? fsnotify_perm+0x59/0x2e0 [ 159.916994][T14061] ? __fsnotify_parent+0x32f/0x430 [ 159.918000][T14061] ? get_pid_task+0x8b/0xc0 [ 159.918764][T14061] ? vfs_write+0x50c/0x770 [ 159.919394][T14061] ? __fget_light+0x21b/0x260 [ 159.920177][T14061] ? __cond_resched+0x11/0x40 [ 159.920857][T14061] ? fput+0x2d/0x130 [ 159.921433][T14061] ? ksys_write+0x157/0x180 [ 159.922132][T14061] __x64_sys_sendmmsg+0x53/0x60 [ 159.922930][T14061] do_syscall_64+0x4a/0x90 [ 159.923803][T14061] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.924627][T14061] RIP: 0033:0x4665d9 [ 159.925317][T14061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.928315][T14061] RSP: 002b:00007f6094af3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 159.929706][T14061] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 159.931113][T14061] RDX: 0000000000000002 RSI: 0000000020002840 RDI: 0000000000000003 [ 159.932329][T14061] RBP: 00007f6094af31d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.933796][T14061] R10: 000000002400487e R11: 0000000000000246 R12: 0000000000000001 [ 159.934948][T14061] R13: 00007ffeb26b180f R14: 00007f6094af3300 R15: 0000000000022000 [ 159.939174][T14069] FAULT_INJECTION: forcing a failure. [ 159.939174][T14069] name failslab, interval 1, probability 0, space 0, times 0 [ 159.941607][T14069] CPU: 0 PID: 14069 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.943085][T14069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.944608][T14069] Call Trace: [ 159.945125][T14069] dump_stack+0x137/0x19d [ 159.945922][T14069] should_fail+0x23c/0x250 [ 159.946779][T14069] ? getname_kernel+0x37/0x1d0 [ 159.947775][T14069] __should_failslab+0x81/0x90 [ 159.948859][T14069] should_failslab+0x5/0x20 [ 159.949576][T14069] kmem_cache_alloc+0x46/0x2f0 [ 159.950311][T14069] getname_kernel+0x37/0x1d0 [ 159.951100][T14069] kern_path+0x19/0x40 [ 159.951796][T14069] create_local_trace_uprobe+0x3f/0x3c0 [ 159.952809][T14069] perf_uprobe_init+0xbe/0x140 [ 159.953730][T14069] perf_uprobe_event_init+0xde/0x140 [ 159.954763][T14069] perf_try_init_event+0x21a/0x400 [ 159.955733][T14069] perf_event_alloc+0xa60/0x1790 [ 159.956593][T14069] __se_sys_perf_event_open+0x5c7/0x2740 [ 159.957561][T14069] ? vfs_write+0x50c/0x770 [ 159.958416][T14069] __x64_sys_perf_event_open+0x63/0x70 [ 159.959309][T14069] do_syscall_64+0x4a/0x90 [ 159.960104][T14069] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 159.961164][T14069] RIP: 0033:0x4665d9 22:46:07 executing program 1 (fault-call:1 fault-nth:4): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:07 executing program 4 (fault-call:1 fault-nth:1): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:07 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:07 executing program 5 (fault-call:5 fault-nth:2): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 159.961832][T14069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 159.965455][T14069] RSP: 002b:00007f01ec548188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 159.966882][T14069] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 159.968190][T14069] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 159.969625][T14069] RBP: 00007f01ec5481d0 R08: 0000000000000000 R09: 0000000000000000 [ 159.971045][T14069] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 159.972566][T14069] R13: 00007fff07e2807f R14: 00007f01ec548300 R15: 0000000000022000 [ 159.987062][T14071] FAULT_INJECTION: forcing a failure. [ 159.987062][T14071] name failslab, interval 1, probability 0, space 0, times 0 [ 159.989329][T14071] CPU: 1 PID: 14071 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 159.991118][T14071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 159.993064][T14071] Call Trace: [ 159.993710][T14071] dump_stack+0x137/0x19d [ 159.994656][T14071] should_fail+0x23c/0x250 [ 159.995565][T14071] ? getname_kernel+0x37/0x1d0 [ 159.996636][T14071] __should_failslab+0x81/0x90 [ 159.997639][T14071] should_failslab+0x5/0x20 [ 159.998366][T14071] kmem_cache_alloc+0x46/0x2f0 [ 159.999102][T14071] getname_kernel+0x37/0x1d0 [ 159.999949][T14071] kern_path+0x19/0x40 [ 160.000721][T14071] create_local_trace_uprobe+0x3f/0x3c0 [ 160.001609][T14071] perf_uprobe_init+0xbe/0x140 [ 160.002407][T14071] perf_uprobe_event_init+0xde/0x140 [ 160.003377][T14071] perf_try_init_event+0x21a/0x400 [ 160.004232][T14071] perf_event_alloc+0xa60/0x1790 [ 160.005250][T14071] __se_sys_perf_event_open+0x5c7/0x2740 [ 160.006306][T14071] ? vfs_write+0x50c/0x770 [ 160.007056][T14071] __x64_sys_perf_event_open+0x63/0x70 [ 160.008143][T14071] do_syscall_64+0x4a/0x90 [ 160.008905][T14071] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.009969][T14071] RIP: 0033:0x4665d9 22:46:07 executing program 0 (fault-call:1 fault-nth:5): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 160.010752][T14071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.014377][T14071] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 160.015846][T14071] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.017136][T14071] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 160.018512][T14071] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.021460][T14071] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 160.022833][T14071] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 160.036901][T14076] FAULT_INJECTION: forcing a failure. [ 160.036901][T14076] name failslab, interval 1, probability 0, space 0, times 0 [ 160.039084][T14076] CPU: 1 PID: 14076 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.040552][T14076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.042126][T14076] Call Trace: [ 160.042664][T14076] dump_stack+0x137/0x19d [ 160.043453][T14076] should_fail+0x23c/0x250 [ 160.044268][T14076] __should_failslab+0x81/0x90 [ 160.046054][T14076] ? alloc_pipe_info+0xac/0x350 [ 160.047121][T14076] should_failslab+0x5/0x20 [ 160.048034][T14076] kmem_cache_alloc_trace+0x49/0x310 [ 160.049051][T14076] alloc_pipe_info+0xac/0x350 [ 160.050032][T14076] splice_direct_to_actor+0x5f7/0x650 [ 160.050982][T14076] ? kcsan_setup_watchpoint+0x231/0x3e0 [ 160.052070][T14076] ? do_splice_direct+0x170/0x170 [ 160.052885][T14076] ? security_file_permission+0x87/0xa0 [ 160.053833][T14076] ? rw_verify_area+0x136/0x250 [ 160.054670][T14076] do_splice_direct+0xf5/0x170 [ 160.055382][T14076] do_sendfile+0x773/0xda0 [ 160.056064][T14076] __x64_sys_sendfile64+0xa9/0x130 [ 160.056876][T14076] do_syscall_64+0x4a/0x90 [ 160.057669][T14076] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.058585][T14076] RIP: 0033:0x4665d9 [ 160.059303][T14076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:46:07 executing program 3 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 160.062871][T14076] RSP: 002b:00007f347a1c8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 160.064504][T14076] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.066506][T14076] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 160.068072][T14076] RBP: 00007f347a1c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.069686][T14076] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 160.070913][T14076] R13: 00007ffc0c4960ef R14: 00007f347a1c8300 R15: 0000000000022000 [ 160.077719][T14079] FAULT_INJECTION: forcing a failure. [ 160.077719][T14079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 160.080337][T14079] CPU: 0 PID: 14079 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.081856][T14079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.083575][T14079] Call Trace: [ 160.084148][T14079] dump_stack+0x137/0x19d [ 160.084978][T14079] should_fail+0x23c/0x250 [ 160.085902][T14079] should_fail_usercopy+0x16/0x20 [ 160.086997][T14079] _copy_from_user+0x1c/0xd0 [ 160.087868][T14079] __copy_msghdr_from_user+0x44/0x350 [ 160.088645][T14079] ? __fget_light+0x21b/0x260 [ 160.089452][T14079] __sys_sendmmsg+0x1f0/0x4b0 [ 160.090139][T14079] ? kstrtoull+0x30e/0x350 [ 160.090763][T14079] ? kstrtouint_from_user+0x104/0x130 [ 160.091671][T14079] ? do_anonymous_page+0x411/0x8b0 [ 160.092902][T14079] ? fsnotify_perm+0x59/0x2e0 [ 160.093796][T14079] ? __fsnotify_parent+0x32f/0x430 [ 160.094596][T14079] ? get_pid_task+0x8b/0xc0 [ 160.095347][T14079] ? vfs_write+0x50c/0x770 [ 160.096139][T14079] ? __fget_light+0x21b/0x260 [ 160.097105][T14079] ? __cond_resched+0x11/0x40 [ 160.097946][T14079] ? fput+0x2d/0x130 [ 160.098705][T14079] ? ksys_write+0x157/0x180 [ 160.098927][T14081] FAULT_INJECTION: forcing a failure. [ 160.098927][T14081] name failslab, interval 1, probability 0, space 0, times 0 [ 160.099397][T14079] __x64_sys_sendmmsg+0x53/0x60 [ 160.102322][T14079] do_syscall_64+0x4a/0x90 [ 160.103104][T14079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.104133][T14079] RIP: 0033:0x4665d9 [ 160.104782][T14079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.108423][T14079] RSP: 002b:00007f784e819188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 160.109675][T14079] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.110812][T14079] RDX: 0000000000000002 RSI: 0000000020005800 RDI: 0000000000000003 22:46:07 executing program 1 (fault-call:1 fault-nth:5): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 160.112306][T14079] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.114017][T14079] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000001 [ 160.115947][T14079] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 [ 160.117157][T14081] CPU: 1 PID: 14081 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.118634][T14081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.120173][T14081] Call Trace: [ 160.120765][T14081] dump_stack+0x137/0x19d [ 160.121547][T14081] should_fail+0x23c/0x250 [ 160.122362][T14081] ? dst_alloc+0x108/0x300 [ 160.123007][T14081] __should_failslab+0x81/0x90 [ 160.124501][T14081] should_failslab+0x5/0x20 [ 160.125264][T14081] kmem_cache_alloc+0x46/0x2f0 [ 160.126195][T14081] dst_alloc+0x108/0x300 [ 160.126918][T14081] __mkroute_output+0x452/0xc40 [ 160.127783][T14081] ip_route_output_key_hash_rcu+0x7a8/0x800 [ 160.128726][T14081] ip_route_output_flow+0xaa/0x160 [ 160.129462][T14081] udp_sendmsg+0xd48/0x12f0 [ 160.130205][T14081] ? udp_sendmsg+0x12f0/0x12f0 [ 160.131036][T14081] ? __wake_up+0x8d/0xc0 [ 160.131693][T14081] udpv6_sendmsg+0x520/0x16b0 [ 160.132384][T14081] ? _raw_read_unlock_bh+0x17/0x20 [ 160.133158][T14081] ? sock_i_uid+0x59/0x60 [ 160.134046][T14081] ? sock_prot_inuse_add+0x31/0x50 [ 160.134874][T14081] ? _raw_spin_unlock_bh+0x33/0x40 [ 160.135634][T14081] ? udp_lib_get_port+0xc05/0xe20 [ 160.136476][T14081] ? local_bh_enable+0x1b/0x20 [ 160.137189][T14081] ? ipv6_portaddr_hash+0x142/0x1d0 [ 160.137954][T14081] ? _raw_spin_unlock_bh+0x33/0x40 [ 160.138681][T14081] ? release_sock+0x104/0x110 [ 160.139374][T14081] inet6_sendmsg+0x5f/0x80 [ 160.140262][T14081] ? inet6_compat_ioctl+0x250/0x250 [ 160.141060][T14081] ____sys_sendmsg+0x360/0x4d0 [ 160.141791][T14081] ? import_iovec+0x69/0x80 [ 160.142575][T14081] __sys_sendmmsg+0x315/0x4b0 [ 160.143271][T14081] ? kstrtoull+0x30f/0x350 [ 160.144207][T14081] ? kstrtouint_from_user+0x104/0x130 [ 160.145160][T14081] ? do_anonymous_page+0x411/0x8b0 [ 160.146033][T14081] ? fsnotify_perm+0x59/0x2e0 [ 160.146784][T14081] ? __fsnotify_parent+0x32f/0x430 [ 160.147730][T14081] ? get_pid_task+0x8b/0xc0 [ 160.148499][T14081] ? vfs_write+0x50c/0x770 [ 160.149168][T14081] ? __cond_resched+0x11/0x40 [ 160.149916][T14081] ? fput+0x2d/0x130 [ 160.150457][T14081] ? ksys_write+0x157/0x180 [ 160.151096][T14081] __x64_sys_sendmmsg+0x53/0x60 [ 160.151946][T14081] do_syscall_64+0x4a/0x90 [ 160.152742][T14081] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.153861][T14081] RIP: 0033:0x4665d9 [ 160.154785][T14081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.157793][T14081] RSP: 002b:00007f6094af3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 160.159203][T14081] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.160979][T14081] RDX: 0000000000000002 RSI: 0000000020002840 RDI: 0000000000000003 [ 160.162359][T14081] RBP: 00007f6094af31d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.163507][T14081] R10: 000000002400487e R11: 0000000000000246 R12: 0000000000000001 [ 160.165055][T14081] R13: 00007ffeb26b180f R14: 00007f6094af3300 R15: 0000000000022000 [ 160.169273][T14088] FAULT_INJECTION: forcing a failure. [ 160.169273][T14088] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 160.171939][T14088] CPU: 0 PID: 14088 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.173950][T14088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.176206][T14088] Call Trace: [ 160.176807][T14088] dump_stack+0x137/0x19d [ 160.177835][T14088] should_fail+0x23c/0x250 [ 160.178587][T14088] should_fail_usercopy+0x16/0x20 [ 160.178839][T14087] FAULT_INJECTION: forcing a failure. [ 160.178839][T14087] name failslab, interval 1, probability 0, space 0, times 0 [ 160.179470][T14088] _copy_from_user+0x1c/0xd0 [ 160.182543][T14088] __x64_sys_sendfile64+0x77/0x130 [ 160.183554][T14088] do_syscall_64+0x4a/0x90 [ 160.184487][T14088] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.185528][T14088] RIP: 0033:0x4665d9 [ 160.186075][T14088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.188970][T14088] RSP: 002b:00007f0b07b6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 160.190466][T14088] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.191885][T14088] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 160.193357][T14088] RBP: 00007f0b07b6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.194805][T14088] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 160.196118][T14088] R13: 00007ffcd827a75f R14: 00007f0b07b6b300 R15: 0000000000022000 [ 160.197712][T14087] CPU: 1 PID: 14087 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.199881][T14087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.202019][T14087] Call Trace: [ 160.202680][T14087] dump_stack+0x137/0x19d [ 160.203451][T14087] should_fail+0x23c/0x250 [ 160.204115][T14087] __should_failslab+0x81/0x90 [ 160.205039][T14087] ? proc_self_get_link+0x90/0x100 [ 160.205956][T14087] should_failslab+0x5/0x20 [ 160.206719][T14087] kmem_cache_alloc_trace+0x49/0x310 [ 160.207726][T14087] proc_self_get_link+0x90/0x100 [ 160.208412][T14087] ? proc_setup_self+0x1d0/0x1d0 [ 160.209326][T14087] step_into+0x9b4/0xec0 [ 160.209975][T14087] walk_component+0x190/0x350 [ 160.210873][T14087] link_path_walk+0x4ba/0x780 [ 160.211576][T14087] path_lookupat+0x7b/0x570 [ 160.212263][T14087] filename_lookup+0xff/0x390 22:46:08 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 160.213204][T14087] ? kmem_cache_alloc+0x201/0x2f0 [ 160.214416][T14087] ? getname_kernel+0x37/0x1d0 [ 160.216232][T14087] kern_path+0x2e/0x40 [ 160.217124][T14087] create_local_trace_uprobe+0x3f/0x3c0 [ 160.218252][T14087] perf_uprobe_init+0xbe/0x140 [ 160.219304][T14087] perf_uprobe_event_init+0xde/0x140 [ 160.220166][T14087] perf_try_init_event+0x21a/0x400 [ 160.221211][T14087] perf_event_alloc+0xa60/0x1790 [ 160.221989][T14087] __se_sys_perf_event_open+0x5c7/0x2740 [ 160.222871][T14087] ? vfs_write+0x50c/0x770 [ 160.223501][T14087] __x64_sys_perf_event_open+0x63/0x70 [ 160.224676][T14087] do_syscall_64+0x4a/0x90 [ 160.225402][T14087] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.226367][T14087] RIP: 0033:0x4665d9 [ 160.227240][T14087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.230675][T14087] RSP: 002b:00007f01ec548188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 160.232280][T14087] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 160.234051][T14087] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 160.235158][T14087] RBP: 00007f01ec5481d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.236497][T14087] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 160.238037][T14087] R13: 00007fff07e2807f R14: 00007f01ec548300 R15: 0000000000022000 [ 160.244452][T14090] FAULT_INJECTION: forcing a failure. [ 160.244452][T14090] name failslab, interval 1, probability 0, space 0, times 0 [ 160.246674][T14090] CPU: 1 PID: 14090 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.248582][T14090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.250339][T14090] Call Trace: [ 160.250874][T14090] dump_stack+0x137/0x19d [ 160.251886][T14090] should_fail+0x23c/0x250 [ 160.252569][T14090] __should_failslab+0x81/0x90 [ 160.253538][T14090] ? proc_self_get_link+0x90/0x100 [ 160.254399][T14090] should_failslab+0x5/0x20 [ 160.255239][T14090] kmem_cache_alloc_trace+0x49/0x310 [ 160.255788][T14092] FAULT_INJECTION: forcing a failure. [ 160.255788][T14092] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 160.256254][T14090] proc_self_get_link+0x90/0x100 [ 160.259385][T14090] ? proc_setup_self+0x1d0/0x1d0 [ 160.260098][T14090] step_into+0x9b4/0xec0 [ 160.260924][T14090] walk_component+0x190/0x350 [ 160.261811][T14090] link_path_walk+0x4ba/0x780 [ 160.262951][T14090] path_lookupat+0x7b/0x570 [ 160.263862][T14090] filename_lookup+0xff/0x390 [ 160.264767][T14090] ? kmem_cache_alloc+0x201/0x2f0 [ 160.265829][T14090] ? getname_kernel+0x37/0x1d0 [ 160.266573][T14090] kern_path+0x2e/0x40 [ 160.267411][T14090] create_local_trace_uprobe+0x3f/0x3c0 [ 160.268437][T14090] perf_uprobe_init+0xbe/0x140 [ 160.269220][T14090] perf_uprobe_event_init+0xde/0x140 [ 160.270013][T14090] perf_try_init_event+0x21a/0x400 [ 160.270807][T14090] perf_event_alloc+0xa60/0x1790 [ 160.271587][T14090] __se_sys_perf_event_open+0x5c7/0x2740 [ 160.272722][T14090] ? vfs_write+0x50c/0x770 [ 160.273509][T14090] __x64_sys_perf_event_open+0x63/0x70 [ 160.274417][T14090] do_syscall_64+0x4a/0x90 [ 160.275268][T14090] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.276368][T14090] RIP: 0033:0x4665d9 [ 160.277204][T14090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.280133][T14090] RSP: 002b:00007f059dd68188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 160.281598][T14090] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 160.283490][T14090] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 160.284918][T14090] RBP: 00007f059dd681d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.286536][T14090] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 160.287829][T14090] R13: 00007ffe1f4edd0f R14: 00007f059dd68300 R15: 0000000000022000 [ 160.289238][T14092] CPU: 0 PID: 14092 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.290753][T14092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.293099][T14092] Call Trace: [ 160.293773][T14092] dump_stack+0x137/0x19d [ 160.294602][T14092] should_fail+0x23c/0x250 [ 160.295335][T14092] should_fail_usercopy+0x16/0x20 [ 160.296364][T14092] _copy_from_user+0x1c/0xd0 [ 160.297277][T14092] __copy_msghdr_from_user+0x2a5/0x350 [ 160.298298][T14092] __sys_sendmmsg+0x1f0/0x4b0 [ 160.299171][T14092] ? kstrtoull+0x30f/0x350 [ 160.299964][T14092] ? kstrtouint_from_user+0x104/0x130 [ 160.301063][T14092] ? do_anonymous_page+0x411/0x8b0 [ 160.302180][T14092] ? fsnotify_perm+0x59/0x2e0 [ 160.303092][T14092] ? __fsnotify_parent+0x32f/0x430 [ 160.304401][T14092] ? get_pid_task+0x8b/0xc0 [ 160.305295][T14092] ? vfs_write+0x50c/0x770 [ 160.306406][T14092] ? __fget_light+0x21b/0x260 [ 160.307456][T14092] ? __cond_resched+0x11/0x40 [ 160.308428][T14092] ? fput+0x2d/0x130 [ 160.309252][T14092] ? ksys_write+0x157/0x180 [ 160.309988][T14092] __x64_sys_sendmmsg+0x53/0x60 [ 160.310858][T14092] do_syscall_64+0x4a/0x90 [ 160.311703][T14092] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.312797][T14092] RIP: 0033:0x4665d9 22:46:08 executing program 4 (fault-call:1 fault-nth:2): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:08 executing program 5 (fault-call:5 fault-nth:3): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:08 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 160.313559][T14092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.317564][T14092] RSP: 002b:00007f784e819188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 160.318950][T14092] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.320478][T14092] RDX: 0000000000000002 RSI: 0000000020005800 RDI: 0000000000000003 [ 160.321820][T14092] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.323210][T14092] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000001 [ 160.324569][T14092] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 [ 160.367333][T14098] FAULT_INJECTION: forcing a failure. [ 160.367333][T14098] name failslab, interval 1, probability 0, space 0, times 0 [ 160.369978][T14098] CPU: 0 PID: 14098 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.371550][T14098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.373508][T14098] Call Trace: [ 160.374048][T14098] dump_stack+0x137/0x19d [ 160.374858][T14098] should_fail+0x23c/0x250 [ 160.375717][T14098] ? kcalloc+0x32/0x40 [ 160.376420][T14098] __should_failslab+0x81/0x90 [ 160.377056][T14101] FAULT_INJECTION: forcing a failure. [ 160.377056][T14101] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 160.377508][T14098] should_failslab+0x5/0x20 [ 160.377528][T14098] __kmalloc+0x66/0x340 [ 160.381000][T14098] ? kmem_cache_alloc_trace+0x215/0x310 [ 160.382130][T14098] ? alloc_pipe_info+0xac/0x350 [ 160.382992][T14098] kcalloc+0x32/0x40 [ 160.383566][T14098] alloc_pipe_info+0x1be/0x350 [ 160.384439][T14098] splice_direct_to_actor+0x5f7/0x650 [ 160.385299][T14098] ? do_splice_direct+0x170/0x170 [ 160.386229][T14098] ? security_file_permission+0x87/0xa0 [ 160.387268][T14098] ? rw_verify_area+0x136/0x250 [ 160.388070][T14098] do_splice_direct+0xf5/0x170 [ 160.388791][T14098] do_sendfile+0x773/0xda0 [ 160.389677][T14098] __x64_sys_sendfile64+0xa9/0x130 [ 160.390716][T14098] do_syscall_64+0x4a/0x90 [ 160.391942][T14098] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.393667][T14098] RIP: 0033:0x4665d9 [ 160.394546][T14098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.399203][T14098] RSP: 002b:00007f347a1c8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 160.400746][T14098] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.402530][T14098] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 160.404577][T14098] RBP: 00007f347a1c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.406030][T14098] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 160.407451][T14098] R13: 00007ffc0c4960ef R14: 00007f347a1c8300 R15: 0000000000022000 [ 160.409031][T14101] CPU: 1 PID: 14101 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.411897][T14101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.414896][T14101] Call Trace: [ 160.415626][T14101] dump_stack+0x137/0x19d 22:46:08 executing program 4 (fault-call:1 fault-nth:3): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 160.416881][T14101] should_fail+0x23c/0x250 [ 160.418475][T14101] should_fail_usercopy+0x16/0x20 [ 160.420144][T14101] _copy_from_user+0x1c/0xd0 [ 160.421612][T14101] iovec_from_user+0xc4/0x2d0 [ 160.423224][T14101] ? should_fail+0xd6/0x250 [ 160.424444][T14101] __import_iovec+0x49/0x270 [ 160.425802][T14101] ? __copy_msghdr_from_user+0x232/0x350 [ 160.427381][T14101] import_iovec+0x69/0x80 [ 160.428423][T14101] __sys_sendmmsg+0x2c9/0x4b0 [ 160.429698][T14101] ? kstrtoull+0x30f/0x350 [ 160.430834][T14101] ? kstrtouint_from_user+0x104/0x130 [ 160.432193][T14101] ? do_anonymous_page+0x411/0x8b0 [ 160.434336][T14101] ? fsnotify_perm+0x59/0x2e0 [ 160.435572][T14101] ? __fsnotify_parent+0x32f/0x430 [ 160.436972][T14101] ? get_pid_task+0x8b/0xc0 [ 160.438261][T14101] ? vfs_write+0x50c/0x770 [ 160.439649][T14101] ? __cond_resched+0x11/0x40 [ 160.440913][T14101] ? fput+0x2d/0x130 [ 160.442276][T14101] ? ksys_write+0x157/0x180 [ 160.443705][T14101] __x64_sys_sendmmsg+0x53/0x60 [ 160.445261][T14101] do_syscall_64+0x4a/0x90 [ 160.446597][T14101] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.448482][T14101] RIP: 0033:0x4665d9 [ 160.449635][T14101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.455188][T14101] RSP: 002b:00007f784e819188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 160.457554][T14101] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.459285][T14101] RDX: 0000000000000002 RSI: 0000000020005800 RDI: 0000000000000003 [ 160.459871][T14102] FAULT_INJECTION: forcing a failure. [ 160.459871][T14102] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 160.461071][T14101] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 22:46:08 executing program 1 (fault-call:1 fault-nth:6): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 160.461085][T14101] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000001 [ 160.461096][T14101] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 [ 160.469682][T14102] CPU: 0 PID: 14102 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.471903][T14102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.474689][T14102] Call Trace: [ 160.475229][T14102] dump_stack+0x137/0x19d [ 160.476108][T14102] should_fail+0x23c/0x250 [ 160.477153][T14102] should_fail_usercopy+0x16/0x20 [ 160.478302][T14102] _copy_from_user+0x1c/0xd0 [ 160.479609][T14102] __copy_msghdr_from_user+0x44/0x350 [ 160.480719][T14102] ? import_iovec+0x69/0x80 [ 160.481743][T14102] __sys_sendmmsg+0x1f0/0x4b0 [ 160.482707][T14102] ? kstrtoull+0x30f/0x350 [ 160.483915][T14102] ? kstrtouint_from_user+0x104/0x130 [ 160.485633][T14102] ? __fsnotify_parent+0x32f/0x430 [ 160.486970][T14102] ? get_pid_task+0x8b/0xc0 [ 160.487897][T14102] ? vfs_write+0x50c/0x770 [ 160.489055][T14102] ? __cond_resched+0x11/0x40 [ 160.490330][T14102] ? fput+0x2d/0x130 [ 160.491417][T14102] ? ksys_write+0x157/0x180 [ 160.492374][T14102] __x64_sys_sendmmsg+0x53/0x60 [ 160.493378][T14102] do_syscall_64+0x4a/0x90 [ 160.494590][T14102] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.495874][T14102] RIP: 0033:0x4665d9 [ 160.496832][T14102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.500696][T14102] RSP: 002b:00007f6094af3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 160.502267][T14102] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.503826][T14102] RDX: 0000000000000002 RSI: 0000000020002840 RDI: 0000000000000003 [ 160.505699][T14102] RBP: 00007f6094af31d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.507348][T14102] R10: 000000002400487e R11: 0000000000000246 R12: 0000000000000001 [ 160.508440][T14102] R13: 00007ffeb26b180f R14: 00007f6094af3300 R15: 0000000000022000 22:46:08 executing program 5 (fault-call:5 fault-nth:4): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 160.518488][T14106] FAULT_INJECTION: forcing a failure. [ 160.518488][T14106] name failslab, interval 1, probability 0, space 0, times 0 [ 160.521961][T14106] CPU: 1 PID: 14106 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.524677][T14106] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.527476][T14106] Call Trace: [ 160.528593][T14106] dump_stack+0x137/0x19d [ 160.530222][T14106] should_fail+0x23c/0x250 [ 160.531732][T14106] __should_failslab+0x81/0x90 [ 160.533293][T14106] should_failslab+0x5/0x20 [ 160.534491][T14106] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 160.536068][T14106] ? __kmalloc_node+0x30/0x40 [ 160.537273][T14106] __kmalloc_node+0x30/0x40 [ 160.538937][T14106] kvmalloc_node+0x81/0xf0 [ 160.540386][T14106] traverse+0x9c/0x380 [ 160.541405][T14106] ? rmqueue+0x43/0xd00 [ 160.542829][T14106] seq_read_iter+0x859/0x910 [ 160.544430][T14106] kernfs_fop_read_iter+0xd9/0x320 [ 160.546255][T14106] ? selinux_file_permission+0x22e/0x530 [ 160.548133][T14106] ? iov_iter_pipe+0xc3/0xf0 [ 160.549511][T14106] generic_file_splice_read+0x22a/0x310 [ 160.551408][T14106] ? splice_shrink_spd+0x60/0x60 [ 160.553067][T14106] splice_direct_to_actor+0x2aa/0x650 [ 160.554765][T14106] ? do_splice_direct+0x170/0x170 [ 160.555827][T14106] do_splice_direct+0xf5/0x170 [ 160.557158][T14106] do_sendfile+0x773/0xda0 [ 160.558519][T14106] __x64_sys_sendfile64+0xa9/0x130 [ 160.559811][T14106] do_syscall_64+0x4a/0x90 [ 160.561371][T14106] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.563040][T14106] RIP: 0033:0x4665d9 [ 160.564397][T14106] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.567000][T14110] FAULT_INJECTION: forcing a failure. [ 160.567000][T14110] name failslab, interval 1, probability 0, space 0, times 0 [ 160.569205][T14106] RSP: 002b:00007f347a1c8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 160.569226][T14106] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.569237][T14106] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 160.569246][T14106] RBP: 00007f347a1c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.569255][T14106] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 160.569265][T14106] R13: 00007ffc0c4960ef R14: 00007f347a1c8300 R15: 0000000000022000 [ 160.583345][T14112] FAULT_INJECTION: forcing a failure. [ 160.583345][T14112] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 160.585029][T14110] CPU: 0 PID: 14110 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.591640][T14110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.594232][T14110] Call Trace: [ 160.595032][T14110] dump_stack+0x137/0x19d [ 160.596448][T14110] should_fail+0x23c/0x250 [ 160.597650][T14110] __should_failslab+0x81/0x90 [ 160.598810][T14110] ? create_local_trace_uprobe+0xa9/0x3c0 [ 160.600511][T14110] should_failslab+0x5/0x20 [ 160.601922][T14110] kmem_cache_alloc_trace+0x49/0x310 [ 160.603426][T14110] create_local_trace_uprobe+0xa9/0x3c0 [ 160.604661][T14110] perf_uprobe_init+0xbe/0x140 [ 160.605962][T14110] perf_uprobe_event_init+0xde/0x140 [ 160.607120][T14110] perf_try_init_event+0x21a/0x400 [ 160.608434][T14110] perf_event_alloc+0xa60/0x1790 [ 160.609811][T14110] __se_sys_perf_event_open+0x5c7/0x2740 [ 160.610990][T14110] ? vfs_write+0x50c/0x770 [ 160.612081][T14110] __x64_sys_perf_event_open+0x63/0x70 [ 160.613356][T14110] do_syscall_64+0x4a/0x90 [ 160.614804][T14110] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.617072][T14110] RIP: 0033:0x4665d9 [ 160.618239][T14110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.623138][T14110] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 160.625729][T14110] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.627848][T14110] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 160.629317][T14110] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.631300][T14110] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 160.633265][T14110] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 160.635433][T14112] CPU: 1 PID: 14112 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.635465][T14110] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 160.637360][T14112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.637370][T14112] Call Trace: [ 160.637375][T14112] dump_stack+0x137/0x19d [ 160.644909][T14112] should_fail+0x23c/0x250 [ 160.646297][T14112] should_fail_usercopy+0x16/0x20 [ 160.647524][T14112] _copy_from_user+0x1c/0xd0 [ 160.648704][T14112] __copy_msghdr_from_user+0x2a5/0x350 [ 160.650210][T14112] __sys_sendmmsg+0x1f0/0x4b0 [ 160.651901][T14112] ? kstrtoull+0x30f/0x350 [ 160.652809][T14112] ? kstrtouint_from_user+0x104/0x130 [ 160.654331][T14112] ? __fsnotify_parent+0x32f/0x430 [ 160.655882][T14112] ? get_pid_task+0x8b/0xc0 [ 160.657471][T14112] ? vfs_write+0x50c/0x770 [ 160.659066][T14112] ? __cond_resched+0x11/0x40 [ 160.660360][T14112] ? fput+0x2d/0x130 [ 160.661520][T14112] ? ksys_write+0x157/0x180 [ 160.663186][T14112] __x64_sys_sendmmsg+0x53/0x60 [ 160.664487][T14112] do_syscall_64+0x4a/0x90 [ 160.665981][T14112] entry_SYSCALL_64_after_hwframe+0x44/0xae 22:46:08 executing program 2 (fault-call:1 fault-nth:3): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 160.667847][T14112] RIP: 0033:0x4665d9 [ 160.669242][T14112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.673224][T14078] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 160.674877][T14112] RSP: 002b:00007f6094af3188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 160.674929][T14112] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.674937][T14112] RDX: 0000000000000002 RSI: 0000000020002840 RDI: 0000000000000003 [ 160.674946][T14112] RBP: 00007f6094af31d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.677129][T14078] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000049a2d2ee [ 160.679443][T14112] R10: 000000002400487e R11: 0000000000000246 R12: 0000000000000001 [ 160.690786][T14112] R13: 00007ffeb26b180f R14: 00007f6094af3300 R15: 0000000000022000 [ 160.691320][T14078] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 160.694422][T14078] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000049a2d2ee [ 160.697353][T14114] FAULT_INJECTION: forcing a failure. [ 160.697353][T14114] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 160.701977][T14114] CPU: 1 PID: 14114 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.704727][T14114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.707950][T14114] Call Trace: [ 160.708852][T14114] dump_stack+0x137/0x19d [ 160.710298][T14114] should_fail+0x23c/0x250 [ 160.711707][T14114] should_fail_usercopy+0x16/0x20 [ 160.713001][T14114] _copy_from_iter_full+0x148/0xa10 [ 160.714154][T14114] ? __d_add+0x3bf/0x490 [ 160.715341][T14114] ? avc_has_perm_noaudit+0x19a/0x240 [ 160.716991][T14114] raw_sendmsg+0x753/0xbd0 22:46:08 executing program 4 (fault-call:1 fault-nth:4): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 160.718272][T14114] inet_sendmsg+0x5f/0x80 [ 160.719501][T14114] ? inet_send_prepare+0x210/0x210 [ 160.720884][T14114] ____sys_sendmsg+0x360/0x4d0 [ 160.722107][T14114] ? import_iovec+0x69/0x80 [ 160.723333][T14114] __sys_sendmmsg+0x315/0x4b0 [ 160.724843][T14114] ? kstrtoull+0x30f/0x350 [ 160.726244][T14114] ? kstrtouint_from_user+0x104/0x130 [ 160.727773][T14114] ? do_anonymous_page+0x411/0x8b0 [ 160.729039][T14114] ? fsnotify_perm+0x59/0x2e0 [ 160.730330][T14114] ? __fsnotify_parent+0x32f/0x430 [ 160.732073][T14114] ? get_pid_task+0x8b/0xc0 [ 160.733261][T14114] ? vfs_write+0x50c/0x770 [ 160.734560][T14114] ? __cond_resched+0x11/0x40 [ 160.735738][T14114] ? fput+0x2d/0x130 [ 160.736657][T14114] ? ksys_write+0x157/0x180 [ 160.738081][T14114] __x64_sys_sendmmsg+0x53/0x60 [ 160.739383][T14114] do_syscall_64+0x4a/0x90 [ 160.740959][T14114] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.742473][T14114] RIP: 0033:0x4665d9 [ 160.743524][T14114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.749784][T14114] RSP: 002b:00007f784e819188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 160.752218][T14114] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.754610][T14114] RDX: 0000000000000002 RSI: 0000000020005800 RDI: 0000000000000003 [ 160.757205][T14114] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.759595][T14114] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000001 [ 160.761091][T14120] FAULT_INJECTION: forcing a failure. [ 160.761091][T14120] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 160.761699][T14114] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 [ 160.766803][T14120] CPU: 0 PID: 14120 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.769641][T14120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.772922][T14120] Call Trace: [ 160.773770][T14120] dump_stack+0x137/0x19d [ 160.775410][T14120] should_fail+0x23c/0x250 [ 160.776499][T14120] __alloc_pages+0x102/0x320 [ 160.777711][T14120] alloc_pages+0x21d/0x310 [ 160.779052][T14120] push_pipe+0x267/0x370 [ 160.780406][T14120] _copy_to_iter+0x35d/0xdd0 [ 160.781916][T14120] ? kernfs_seq_stop+0x8e/0xa0 [ 160.783337][T14120] ? __virt_addr_valid+0x15a/0x1a0 [ 160.784954][T14120] seq_read_iter+0x1dc/0x910 [ 160.786669][T14120] kernfs_fop_read_iter+0xd9/0x320 [ 160.788125][T14120] ? selinux_file_permission+0x22e/0x530 [ 160.790022][T14120] ? iov_iter_pipe+0xc3/0xf0 [ 160.791399][T14120] generic_file_splice_read+0x22a/0x310 [ 160.793018][T14120] ? splice_shrink_spd+0x60/0x60 [ 160.794875][T14120] splice_direct_to_actor+0x2aa/0x650 [ 160.796749][T14120] ? do_splice_direct+0x170/0x170 [ 160.798052][T14120] do_splice_direct+0xf5/0x170 [ 160.799069][T14120] do_sendfile+0x773/0xda0 [ 160.800147][T14120] __x64_sys_sendfile64+0xa9/0x130 [ 160.801352][T14120] do_syscall_64+0x4a/0x90 [ 160.802692][T14120] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.803837][T14120] RIP: 0033:0x4665d9 [ 160.804875][T14120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.809178][T14120] RSP: 002b:00007f347a1c8188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 160.810855][T14120] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.812488][T14120] RDX: 0000000020000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 160.814392][T14120] RBP: 00007f347a1c81d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.816122][T14120] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 22:46:08 executing program 0 (fault-call:1 fault-nth:6): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:08 executing program 5 (fault-call:5 fault-nth:5): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:08 executing program 1 (fault-call:1 fault-nth:7): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:08 executing program 2 (fault-call:1 fault-nth:4): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:08 executing program 4 (fault-call:1 fault-nth:5): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:08 executing program 3 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 160.818066][T14120] R13: 00007ffc0c4960ef R14: 00007f347a1c8300 R15: 0000000000022000 [ 160.858457][T14126] FAULT_INJECTION: forcing a failure. [ 160.858457][T14126] name failslab, interval 1, probability 0, space 0, times 0 [ 160.862685][T14126] CPU: 0 PID: 14126 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.865174][T14126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.867754][T14126] Call Trace: [ 160.868696][T14126] dump_stack+0x137/0x19d [ 160.870029][T14126] should_fail+0x23c/0x250 [ 160.871359][T14126] __should_failslab+0x81/0x90 [ 160.872787][T14126] ? create_local_trace_uprobe+0xa9/0x3c0 [ 160.874064][T14126] should_failslab+0x5/0x20 [ 160.874972][T14126] kmem_cache_alloc_trace+0x49/0x310 [ 160.876348][T14126] create_local_trace_uprobe+0xa9/0x3c0 [ 160.877501][T14126] perf_uprobe_init+0xbe/0x140 [ 160.878737][T14126] perf_uprobe_event_init+0xde/0x140 [ 160.880162][T14126] perf_try_init_event+0x21a/0x400 [ 160.881493][T14126] perf_event_alloc+0xa60/0x1790 [ 160.882734][T14126] __se_sys_perf_event_open+0x5c7/0x2740 [ 160.884209][T14126] ? vfs_write+0x50c/0x770 [ 160.885468][T14126] __x64_sys_perf_event_open+0x63/0x70 [ 160.886630][T14126] do_syscall_64+0x4a/0x90 [ 160.887772][T14126] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.889232][T14126] RIP: 0033:0x4665d9 [ 160.890002][T14126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.895079][T14126] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 160.896827][T14126] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.898943][T14126] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 160.901509][T14126] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.904115][T14126] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 160.905718][T14126] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 160.907802][T14126] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 160.910794][T14132] FAULT_INJECTION: forcing a failure. [ 160.910794][T14132] name failslab, interval 1, probability 0, space 0, times 0 [ 160.914720][T14132] CPU: 1 PID: 14132 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.917035][T14132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.920604][T14132] Call Trace: [ 160.921293][T14135] FAULT_INJECTION: forcing a failure. [ 160.921293][T14135] name failslab, interval 1, probability 0, space 0, times 0 [ 160.921535][T14132] dump_stack+0x137/0x19d [ 160.925323][T14132] should_fail+0x23c/0x250 [ 160.926352][T14132] __should_failslab+0x81/0x90 [ 160.927657][T14132] should_failslab+0x5/0x20 [ 160.929391][T14132] kmem_cache_alloc_node+0x58/0x2b0 [ 160.930559][T14132] ? __alloc_skb+0xed/0x420 [ 160.931596][T14132] __alloc_skb+0xed/0x420 [ 160.933033][T14132] __ip_append_data+0x1378/0x1db0 [ 160.934427][T14132] ? raw_send_hdrinc+0xa30/0xa30 [ 160.936115][T14132] ? raw_send_hdrinc+0xa30/0xa30 [ 160.937345][T14132] ip_append_data+0x126/0x150 [ 160.938516][T14132] raw_sendmsg+0xa6b/0xbd0 [ 160.939753][T14132] inet_sendmsg+0x5f/0x80 [ 160.940567][T14132] ? inet_send_prepare+0x210/0x210 [ 160.941839][T14132] ____sys_sendmsg+0x360/0x4d0 [ 160.943303][T14132] ? import_iovec+0x69/0x80 [ 160.944458][T14132] __sys_sendmmsg+0x315/0x4b0 [ 160.945470][T14132] ? kstrtoull+0x30f/0x350 [ 160.946400][T14132] ? kstrtouint_from_user+0x104/0x130 [ 160.947762][T14132] ? do_anonymous_page+0x411/0x8b0 [ 160.949228][T14132] ? fsnotify_perm+0x59/0x2e0 [ 160.950501][T14132] ? __fsnotify_parent+0x32f/0x430 [ 160.952015][T14132] ? get_pid_task+0x8b/0xc0 [ 160.953086][T14132] ? vfs_write+0x50c/0x770 [ 160.954352][T14132] ? __cond_resched+0x11/0x40 [ 160.955856][T14132] ? fput+0x2d/0x130 [ 160.957392][T14132] ? ksys_write+0x157/0x180 [ 160.958808][T14132] __x64_sys_sendmmsg+0x53/0x60 [ 160.959788][T14132] do_syscall_64+0x4a/0x90 [ 160.960928][T14132] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 160.962528][T14132] RIP: 0033:0x4665d9 [ 160.963444][T14132] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 160.968789][T14132] RSP: 002b:00007f784e819188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 160.971068][T14132] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 160.973389][T14132] RDX: 0000000000000002 RSI: 0000000020005800 RDI: 0000000000000003 [ 160.975906][T14132] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 [ 160.978549][T14132] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000001 [ 160.980357][T14132] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 [ 160.981945][T14135] CPU: 0 PID: 14135 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 160.984185][T14135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.986608][T14135] Call Trace: [ 160.987384][T14135] dump_stack+0x137/0x19d [ 160.988687][T14135] should_fail+0x23c/0x250 [ 160.990196][T14135] __should_failslab+0x81/0x90 [ 160.991844][T14135] ? alloc_pipe_info+0xac/0x350 [ 160.993177][T14135] should_failslab+0x5/0x20 [ 160.994627][T14135] kmem_cache_alloc_trace+0x49/0x310 [ 160.996144][T14135] alloc_pipe_info+0xac/0x350 [ 160.996898][T14135] splice_direct_to_actor+0x5f7/0x650 [ 160.998587][T14135] ? do_splice_direct+0x170/0x170 [ 160.999350][T14135] ? security_file_permission+0x87/0xa0 [ 161.000250][T14135] ? rw_verify_area+0x136/0x250 [ 161.001203][T14135] do_splice_direct+0xf5/0x170 [ 161.002076][T14135] do_sendfile+0x773/0xda0 [ 161.003435][T14135] __x64_sys_sendfile64+0xa9/0x130 [ 161.005501][T14135] do_syscall_64+0x4a/0x90 [ 161.006590][T14135] entry_SYSCALL_64_after_hwframe+0x44/0xae 22:46:08 executing program 2 (fault-call:1 fault-nth:5): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 161.008142][T14135] RIP: 0033:0x4665d9 [ 161.009330][T14135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.014571][T14135] RSP: 002b:00007f0b07b4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 161.017014][T14135] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 161.018721][T14131] FAULT_INJECTION: forcing a failure. [ 161.018721][T14131] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 161.019344][T14135] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 161.024269][T14135] RBP: 00007f0b07b4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 161.026277][T14135] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 161.028083][T14135] R13: 00007ffcd827a75f R14: 00007f0b07b4a300 R15: 0000000000022000 [ 161.029756][T14131] CPU: 1 PID: 14131 Comm: syz-executor.5 Not tainted 5.13.0-rc7-syzkaller #0 [ 161.032265][T14131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.035385][T14131] Call Trace: [ 161.036431][T14131] dump_stack+0x137/0x19d [ 161.037491][T14131] should_fail+0x23c/0x250 [ 161.038814][T14131] should_fail_usercopy+0x16/0x20 [ 161.040099][T14131] _copy_to_user+0x1c/0x90 [ 161.041484][T14131] simple_read_from_buffer+0xab/0x120 [ 161.043251][T14131] proc_fail_nth_read+0xf6/0x140 [ 161.044855][T14131] ? rw_verify_area+0x136/0x250 [ 161.045232][T14139] FAULT_INJECTION: forcing a failure. [ 161.045232][T14139] name failslab, interval 1, probability 0, space 0, times 0 [ 161.046393][T14131] ? proc_fault_inject_write+0x200/0x200 [ 161.051443][T14131] vfs_read+0x154/0x5d0 [ 161.052596][T14131] ? __fget_light+0x21b/0x260 [ 161.053633][T14131] ? __cond_resched+0x11/0x40 [ 161.054925][T14131] ksys_read+0xce/0x180 [ 161.056430][T14131] __x64_sys_read+0x3e/0x50 [ 161.057847][T14131] do_syscall_64+0x4a/0x90 [ 161.059079][T14131] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 161.060844][T14131] RIP: 0033:0x41935c [ 161.062047][T14131] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 161.066561][T14131] RSP: 002b:00007f6094af3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 161.069053][T14131] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 000000000041935c [ 161.071015][T14131] RDX: 000000000000000f RSI: 00007f6094af31e0 RDI: 0000000000000006 [ 161.072888][T14131] RBP: 00007f6094af31d0 R08: 0000000000000000 R09: 0000000000000000 [ 161.074459][T14131] R10: 000000002400487e R11: 0000000000000246 R12: 0000000000000001 [ 161.076468][T14131] R13: 00007ffeb26b180f R14: 00007f6094af3300 R15: 0000000000022000 [ 161.078108][T14139] CPU: 0 PID: 14139 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 161.080892][T14139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.083866][T14139] Call Trace: [ 161.084863][T14139] dump_stack+0x137/0x19d [ 161.085985][T14139] should_fail+0x23c/0x250 [ 161.087319][T14139] ? kzalloc+0x16/0x20 [ 161.088558][T14139] __should_failslab+0x81/0x90 [ 161.089701][T14139] should_failslab+0x5/0x20 [ 161.091071][T14139] __kmalloc+0x66/0x340 [ 161.092198][T14139] kzalloc+0x16/0x20 [ 161.093357][T14139] trace_probe_init+0x41/0x250 [ 161.094951][T14139] create_local_trace_uprobe+0xd1/0x3c0 [ 161.097038][T14139] perf_uprobe_init+0xbe/0x140 [ 161.098391][T14139] perf_uprobe_event_init+0xde/0x140 [ 161.100292][T14139] perf_try_init_event+0x21a/0x400 [ 161.102022][T14139] perf_event_alloc+0xa60/0x1790 [ 161.103671][T14139] __se_sys_perf_event_open+0x5c7/0x2740 [ 161.105560][T14139] ? vfs_write+0x50c/0x770 22:46:08 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:08 executing program 0 (fault-call:1 fault-nth:7): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 161.107145][T14139] __x64_sys_perf_event_open+0x63/0x70 [ 161.109068][T14139] do_syscall_64+0x4a/0x90 [ 161.110285][T14139] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 161.112286][T14139] RIP: 0033:0x4665d9 [ 161.113443][T14139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.119601][T14139] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 161.122044][T14139] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 161.124069][T14139] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 161.125893][T14139] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 161.127922][T14139] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 161.129779][T14139] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 161.131133][T14139] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 161.137353][T14143] FAULT_INJECTION: forcing a failure. [ 161.137353][T14143] name failslab, interval 1, probability 0, space 0, times 0 [ 161.141421][T14143] CPU: 1 PID: 14143 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 161.144467][T14143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.147644][T14143] Call Trace: [ 161.148477][T14143] dump_stack+0x137/0x19d [ 161.149808][T14143] should_fail+0x23c/0x250 [ 161.151409][T14143] __should_failslab+0x81/0x90 [ 161.152999][T14143] should_failslab+0x5/0x20 [ 161.154541][T14143] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 161.156448][T14143] ? __kmalloc_node_track_caller+0x30/0x40 [ 161.158397][T14143] ? kmem_cache_alloc_node+0x1da/0x2b0 [ 161.159258][T14145] PM: suspend entry (deep) [ 161.159761][T14143] __kmalloc_node_track_caller+0x30/0x40 [ 161.162022][T14143] ? __ip_append_data+0x1378/0x1db0 [ 161.162301][T14146] FAULT_INJECTION: forcing a failure. [ 161.162301][T14146] name failslab, interval 1, probability 0, space 0, times 0 [ 161.163384][T14143] __alloc_skb+0x187/0x420 [ 161.163409][T14143] __ip_append_data+0x1378/0x1db0 [ 161.169221][T14143] ? raw_send_hdrinc+0xa30/0xa30 [ 161.171053][T14143] ? raw_send_hdrinc+0xa30/0xa30 [ 161.172276][T14143] ip_append_data+0x126/0x150 [ 161.173070][T14143] raw_sendmsg+0xa6b/0xbd0 [ 161.173805][T14143] inet_sendmsg+0x5f/0x80 [ 161.175373][T14143] ? inet_send_prepare+0x210/0x210 [ 161.177145][T14143] ____sys_sendmsg+0x360/0x4d0 [ 161.178365][T14143] ? import_iovec+0x69/0x80 [ 161.179681][T14143] __sys_sendmmsg+0x315/0x4b0 [ 161.180861][T14143] ? kstrtoull+0x30f/0x350 [ 161.182252][T14143] ? kstrtouint_from_user+0x104/0x130 [ 161.183819][T14143] ? do_anonymous_page+0x411/0x8b0 [ 161.185455][T14143] ? fsnotify_perm+0x59/0x2e0 [ 161.186625][T14143] ? __fsnotify_parent+0x32f/0x430 [ 161.187825][T14143] ? get_pid_task+0x8b/0xc0 [ 161.188653][T14143] ? vfs_write+0x50c/0x770 [ 161.189746][T14143] ? __cond_resched+0x11/0x40 [ 161.190861][T14143] ? fput+0x2d/0x130 [ 161.191765][T14143] ? ksys_write+0x157/0x180 [ 161.192828][T14143] __x64_sys_sendmmsg+0x53/0x60 [ 161.193640][T14143] do_syscall_64+0x4a/0x90 [ 161.194823][T14143] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 161.196396][T14143] RIP: 0033:0x4665d9 [ 161.197433][T14143] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.201592][T14143] RSP: 002b:00007f784e819188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 161.202977][T14143] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 161.204891][T14143] RDX: 0000000000000002 RSI: 0000000020005800 RDI: 0000000000000003 22:46:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:09 executing program 3 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:09 executing program 1 (fault-call:1 fault-nth:8): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 161.206869][T14143] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 [ 161.209347][T14143] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000001 [ 161.210594][T14143] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 [ 161.212789][T14146] CPU: 0 PID: 14146 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 161.215125][T14146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.217726][T14146] Call Trace: [ 161.218735][T14146] dump_stack+0x137/0x19d [ 161.220212][T14146] should_fail+0x23c/0x250 [ 161.221768][T14146] ? kzalloc+0x16/0x20 [ 161.222856][T14146] __should_failslab+0x81/0x90 [ 161.223973][T14146] should_failslab+0x5/0x20 [ 161.225323][T14146] __kmalloc+0x66/0x340 [ 161.226644][T14146] kzalloc+0x16/0x20 [ 161.227702][T14146] trace_probe_init+0x41/0x250 [ 161.229020][T14146] create_local_trace_uprobe+0xd1/0x3c0 [ 161.230138][T14146] perf_uprobe_init+0xbe/0x140 [ 161.231248][T14146] perf_uprobe_event_init+0xde/0x140 [ 161.232549][T14146] perf_try_init_event+0x21a/0x400 [ 161.233982][T14146] perf_event_alloc+0xa60/0x1790 [ 161.235033][T14146] __se_sys_perf_event_open+0x5c7/0x2740 [ 161.235959][T14146] ? vfs_write+0x50c/0x770 [ 161.236942][T14146] __x64_sys_perf_event_open+0x63/0x70 [ 161.238302][T14146] do_syscall_64+0x4a/0x90 [ 161.239105][T14146] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 161.240021][T14146] RIP: 0033:0x4665d9 [ 161.240683][T14146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 161.243763][T14146] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 161.245174][T14146] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 161.246631][T14146] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 161.248150][T14146] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 161.249508][T14146] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 161.250727][T14146] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 161.252162][T14146] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 161.283232][T14145] Filesystems sync: 0.122 seconds [ 161.285189][T14145] Freezing user space processes ... (elapsed 0.010 seconds) done. [ 161.297390][T14145] OOM killer disabled. [ 161.298095][T14145] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 161.300772][T14145] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:09 executing program 2 (fault-call:1 fault-nth:6): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:09 executing program 0 (fault-call:1 fault-nth:8): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 161.333302][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 161.842508][T14145] ACPI: Preparing to enter system sleep state S3 [ 161.842604][T14145] PM: Saving platform NVS memory [ 161.842609][T14145] Disabling non-boot CPUs ... [ 161.845778][T14145] smpboot: CPU 1 is now offline [ 161.848198][T14145] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 161.848263][T14145] ACPI: Low-level resume complete [ 161.848434][T14145] PM: Restoring platform NVS memory [ 161.848444][T14145] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 161.858803][T14145] Enabling non-boot CPUs ... [ 161.858988][T14145] x86: Booting SMP configuration: [ 161.858991][T14145] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 161.859191][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 161.860113][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 161.861663][T14145] CPU1 is up [ 161.861901][T14145] ACPI: Waking up from system sleep state S3 [ 161.967859][T14145] OOM killer enabled. [ 161.968412][T14145] Restarting tasks ... [ 161.987064][T14159] FAULT_INJECTION: forcing a failure. [ 161.987064][T14159] name failslab, interval 1, probability 0, space 0, times 0 [ 161.990014][T14159] CPU: 0 PID: 14159 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 161.991535][T14159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 161.993155][T14159] Call Trace: [ 161.993844][T14159] dump_stack+0x137/0x19d [ 161.994733][T14159] should_fail+0x23c/0x250 [ 161.995573][T14159] ? trace_probe_init+0x1bd/0x250 [ 161.996463][T14159] __should_failslab+0x81/0x90 [ 161.996571][T14145] done. [ 161.997227][T14159] should_failslab+0x5/0x20 [ 161.998449][T14159] __kmalloc_track_caller+0x64/0x340 [ 161.998493][T14159] ? __kmalloc+0x23d/0x340 [ 161.998513][T14159] ? kzalloc+0x16/0x20 [ 161.998532][T14159] kstrdup+0x31/0x70 22:46:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x3, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 161.998608][T14159] trace_probe_init+0x1bd/0x250 [ 161.998624][T14159] create_local_trace_uprobe+0xd1/0x3c0 [ 161.998643][T14159] perf_uprobe_init+0xbe/0x140 [ 161.998666][T14159] perf_uprobe_event_init+0xde/0x140 [ 161.998686][T14159] perf_try_init_event+0x21a/0x400 [ 161.998706][T14159] perf_event_alloc+0xa60/0x1790 [ 161.998756][T14159] __se_sys_perf_event_open+0x5c7/0x2740 [ 161.998775][T14159] ? vfs_write+0x50c/0x770 [ 161.998846][T14159] __x64_sys_perf_event_open+0x63/0x70 [ 161.998865][T14159] do_syscall_64+0x4a/0x90 [ 161.998884][T14159] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 161.998902][T14159] RIP: 0033:0x4665d9 [ 161.998914][T14159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.017361][T14159] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 162.017383][T14159] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.017394][T14159] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 162.017407][T14159] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.017427][T14159] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 162.017439][T14159] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 162.017500][T14159] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 162.022081][T14145] PM: suspend exit [ 162.024870][T14164] FAULT_INJECTION: forcing a failure. [ 162.024870][T14164] name failslab, interval 1, probability 0, space 0, times 0 [ 162.024893][T14164] CPU: 1 PID: 14164 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.024990][T14164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.025000][T14164] Call Trace: [ 162.025009][T14164] dump_stack+0x137/0x19d [ 162.025037][T14164] should_fail+0x23c/0x250 [ 162.025056][T14164] ? trace_probe_init+0x1bd/0x250 [ 162.025086][T14164] __should_failslab+0x81/0x90 [ 162.025109][T14164] should_failslab+0x5/0x20 [ 162.025165][T14164] __kmalloc_track_caller+0x64/0x340 [ 162.025185][T14164] ? __kmalloc+0x23d/0x340 [ 162.025203][T14164] ? kzalloc+0x16/0x20 [ 162.025220][T14164] kstrdup+0x31/0x70 [ 162.025234][T14164] trace_probe_init+0x1bd/0x250 [ 162.025251][T14164] create_local_trace_uprobe+0xd1/0x3c0 [ 162.025326][T14164] perf_uprobe_init+0xbe/0x140 [ 162.025342][T14164] perf_uprobe_event_init+0xde/0x140 [ 162.025357][T14164] perf_try_init_event+0x21a/0x400 [ 162.025376][T14164] perf_event_alloc+0xa60/0x1790 [ 162.025465][T14164] __se_sys_perf_event_open+0x5c7/0x2740 [ 162.025483][T14164] ? vfs_write+0x50c/0x770 [ 162.025502][T14164] ? __schedule+0x427/0x5b0 [ 162.025519][T14164] __x64_sys_perf_event_open+0x63/0x70 [ 162.025553][T14164] do_syscall_64+0x4a/0x90 [ 162.025571][T14164] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.025593][T14164] RIP: 0033:0x4665d9 [ 162.025607][T14164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.025623][T14164] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 162.025656][T14164] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.025665][T14164] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 162.025674][T14164] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.025682][T14164] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 162.025692][T14164] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 162.025723][T14164] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 162.032624][T14160] FAULT_INJECTION: forcing a failure. [ 162.032624][T14160] name failslab, interval 1, probability 0, space 0, times 0 [ 162.032650][T14160] CPU: 0 PID: 14160 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.032669][T14160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.032679][T14160] Call Trace: [ 162.032686][T14160] dump_stack+0x137/0x19d [ 162.032710][T14160] should_fail+0x23c/0x250 [ 162.032807][T14160] ? kcalloc+0x32/0x40 [ 162.032823][T14160] __should_failslab+0x81/0x90 [ 162.032847][T14160] should_failslab+0x5/0x20 [ 162.032865][T14160] __kmalloc+0x66/0x340 [ 162.100345][T14160] ? kmem_cache_alloc_trace+0x215/0x310 [ 162.101233][T14160] ? alloc_pipe_info+0xac/0x350 22:46:09 executing program 0 (fault-call:1 fault-nth:9): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:09 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x2, 0x3) [ 162.102582][T14160] kcalloc+0x32/0x40 [ 162.103233][T14160] alloc_pipe_info+0x1be/0x350 [ 162.104589][T14160] splice_direct_to_actor+0x5f7/0x650 [ 162.105790][T14160] ? do_splice_direct+0x170/0x170 [ 162.107404][T14160] ? security_file_permission+0x87/0xa0 [ 162.108868][T14160] ? rw_verify_area+0x136/0x250 [ 162.109968][T14160] do_splice_direct+0xf5/0x170 [ 162.110870][T14160] do_sendfile+0x773/0xda0 [ 162.111719][T14160] __x64_sys_sendfile64+0xa9/0x130 [ 162.112728][T14160] do_syscall_64+0x4a/0x90 [ 162.113584][T14160] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.115177][T14160] RIP: 0033:0x4665d9 [ 162.115890][T14160] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.120644][T14160] RSP: 002b:00007f0b07b6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 162.122682][T14160] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.124527][T14160] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 162.126424][T14160] RBP: 00007f0b07b6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.128832][T14160] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 162.131051][T14160] R13: 00007ffcd827a75f R14: 00007f0b07b6b300 R15: 0000000000022000 [ 162.164740][T14168] FAULT_INJECTION: forcing a failure. [ 162.164740][T14168] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 162.168333][T14168] CPU: 1 PID: 14168 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.170673][T14168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.173575][T14168] Call Trace: [ 162.174492][T14168] dump_stack+0x137/0x19d [ 162.175804][T14168] should_fail+0x23c/0x250 [ 162.177276][T14168] should_fail_usercopy+0x16/0x20 [ 162.178707][T14168] _copy_from_user+0x1c/0xd0 [ 162.180052][T14168] __copy_msghdr_from_user+0x44/0x350 [ 162.181678][T14168] ? import_iovec+0x69/0x80 [ 162.182620][T14168] __sys_sendmmsg+0x1f0/0x4b0 [ 162.183806][T14168] ? kstrtoull+0x30f/0x350 [ 162.185159][T14168] ? kstrtouint_from_user+0x104/0x130 [ 162.186800][T14168] ? do_anonymous_page+0x411/0x8b0 [ 162.188283][T14168] ? fsnotify_perm+0x59/0x2e0 [ 162.189470][T14168] ? __fsnotify_parent+0x32f/0x430 [ 162.191052][T14168] ? get_pid_task+0x8b/0xc0 [ 162.192380][T14168] ? vfs_write+0x50c/0x770 [ 162.193915][T14168] ? __cond_resched+0x11/0x40 [ 162.195436][T14168] ? fput+0x2d/0x130 [ 162.196074][T14172] FAULT_INJECTION: forcing a failure. [ 162.196074][T14172] name failslab, interval 1, probability 0, space 0, times 0 [ 162.196663][T14168] ? ksys_write+0x157/0x180 [ 162.200636][T14168] __x64_sys_sendmmsg+0x53/0x60 [ 162.201685][T14168] do_syscall_64+0x4a/0x90 [ 162.202587][T14168] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.203863][T14168] RIP: 0033:0x4665d9 [ 162.205041][T14168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.209772][T14168] RSP: 002b:00007f784e819188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 162.211777][T14168] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 22:46:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x4, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:10 executing program 1 (fault-call:1 fault-nth:9): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:10 executing program 2 (fault-call:1 fault-nth:7): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 162.214174][T14168] RDX: 0000000000000002 RSI: 0000000020005800 RDI: 0000000000000003 [ 162.216537][T14168] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.218731][T14168] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000001 [ 162.220287][T14168] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 [ 162.222068][T14172] CPU: 0 PID: 14172 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.224332][T14172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.227021][T14172] Call Trace: [ 162.228068][T14172] dump_stack+0x137/0x19d [ 162.229447][T14172] should_fail+0x23c/0x250 [ 162.230746][T14172] ? trace_probe_init+0x1e1/0x250 [ 162.232178][T14172] __should_failslab+0x81/0x90 [ 162.233787][T14172] should_failslab+0x5/0x20 [ 162.235118][T14172] __kmalloc_track_caller+0x64/0x340 [ 162.236695][T14172] ? trace_probe_init+0x1bd/0x250 [ 162.238097][T14172] kstrdup+0x31/0x70 [ 162.239243][T14172] trace_probe_init+0x1e1/0x250 [ 162.240622][T14172] create_local_trace_uprobe+0xd1/0x3c0 [ 162.241782][T14172] perf_uprobe_init+0xbe/0x140 [ 162.242983][T14172] perf_uprobe_event_init+0xde/0x140 [ 162.244806][T14172] perf_try_init_event+0x21a/0x400 [ 162.246235][T14172] perf_event_alloc+0xa60/0x1790 [ 162.247681][T14172] __se_sys_perf_event_open+0x5c7/0x2740 [ 162.249048][T14172] ? vfs_write+0x50c/0x770 [ 162.249984][T14172] __x64_sys_perf_event_open+0x63/0x70 [ 162.251327][T14172] do_syscall_64+0x4a/0x90 [ 162.252478][T14172] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.254843][T14172] RIP: 0033:0x4665d9 [ 162.256088][T14172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.261642][T14172] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 22:46:10 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x6, 0x3) [ 162.264020][T14172] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.265966][T14172] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 162.268074][T14172] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.270183][T14176] FAULT_INJECTION: forcing a failure. [ 162.270183][T14176] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 162.270424][T14172] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 162.270444][T14172] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 162.276646][T14176] CPU: 1 PID: 14176 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.276690][T14172] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 162.279210][T14176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.283958][T14176] Call Trace: [ 162.285247][T14176] dump_stack+0x137/0x19d [ 162.286305][T14176] should_fail+0x23c/0x250 [ 162.287470][T14176] should_fail_usercopy+0x16/0x20 [ 162.289021][T14176] _copy_from_user+0x1c/0xd0 [ 162.290598][T14176] __copy_msghdr_from_user+0x2a5/0x350 [ 162.292397][T14176] __sys_sendmmsg+0x1f0/0x4b0 [ 162.293890][T14176] ? kstrtoull+0x30f/0x350 [ 162.294787][T14178] FAULT_INJECTION: forcing a failure. [ 162.294787][T14178] name failslab, interval 1, probability 0, space 0, times 0 [ 162.295334][T14176] ? kstrtouint_from_user+0x104/0x130 [ 162.295360][T14176] ? do_anonymous_page+0x411/0x8b0 [ 162.295392][T14176] ? fsnotify_perm+0x59/0x2e0 [ 162.295407][T14176] ? __fsnotify_parent+0x32f/0x430 [ 162.302326][T14176] ? get_pid_task+0x8b/0xc0 [ 162.303338][T14176] ? vfs_write+0x50c/0x770 [ 162.304492][T14176] ? __cond_resched+0x11/0x40 [ 162.305601][T14176] ? fput+0x2d/0x130 [ 162.306406][T14176] ? ksys_write+0x157/0x180 [ 162.307132][T14176] __x64_sys_sendmmsg+0x53/0x60 [ 162.308171][T14176] do_syscall_64+0x4a/0x90 [ 162.309982][T14176] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.311721][T14176] RIP: 0033:0x4665d9 22:46:10 executing program 3 (fault-call:2 fault-nth:3): perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 162.312637][T14176] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.317725][T14176] RSP: 002b:00007f784e819188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 162.320249][T14176] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.322031][T14176] RDX: 0000000000000002 RSI: 0000000020005800 RDI: 0000000000000003 [ 162.324208][T14176] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.325905][T14176] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000001 [ 162.328191][T14176] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 [ 162.329716][T14178] CPU: 0 PID: 14178 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.332884][T14178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.336391][T14178] Call Trace: [ 162.337334][T14178] dump_stack+0x137/0x19d [ 162.338684][T14178] should_fail+0x23c/0x250 [ 162.340114][T14178] ? trace_probe_init+0x1e1/0x250 [ 162.341303][T14178] __should_failslab+0x81/0x90 [ 162.342603][T14178] should_failslab+0x5/0x20 [ 162.343710][T14178] __kmalloc_track_caller+0x64/0x340 [ 162.345390][T14178] ? trace_probe_init+0x1bd/0x250 [ 162.346371][T14178] kstrdup+0x31/0x70 [ 162.347171][T14178] trace_probe_init+0x1e1/0x250 [ 162.348773][T14178] create_local_trace_uprobe+0xd1/0x3c0 [ 162.350761][T14178] perf_uprobe_init+0xbe/0x140 [ 162.352157][T14178] perf_uprobe_event_init+0xde/0x140 [ 162.353716][T14178] perf_try_init_event+0x21a/0x400 [ 162.355062][T14178] perf_event_alloc+0xa60/0x1790 [ 162.356986][T14178] __se_sys_perf_event_open+0x5c7/0x2740 [ 162.358687][T14178] ? vfs_write+0x50c/0x770 [ 162.360185][T14178] __x64_sys_perf_event_open+0x63/0x70 [ 162.361495][T14178] do_syscall_64+0x4a/0x90 [ 162.362471][T14178] entry_SYSCALL_64_after_hwframe+0x44/0xae 22:46:10 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x8, 0x3) [ 162.364363][T14178] RIP: 0033:0x4665d9 [ 162.365696][T14178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.370901][T14178] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 162.373359][T14178] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.375800][T14178] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 162.377984][T14178] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.380265][T14178] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 162.382585][T14178] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 162.384984][T14178] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 162.410870][T14186] FAULT_INJECTION: forcing a failure. [ 162.410870][T14186] name failslab, interval 1, probability 0, space 0, times 0 [ 162.414531][T14186] CPU: 1 PID: 14186 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.417373][T14186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.420059][T14186] Call Trace: [ 162.420882][T14186] dump_stack+0x137/0x19d [ 162.422087][T14186] should_fail+0x23c/0x250 [ 162.423430][T14186] __should_failslab+0x81/0x90 [ 162.424931][T14186] should_failslab+0x5/0x20 [ 162.426316][T14186] kmem_cache_alloc_node_trace+0x58/0x2e0 [ 162.427785][T14186] ? __kmalloc_node+0x30/0x40 [ 162.429182][T14186] __kmalloc_node+0x30/0x40 [ 162.430503][T14186] kvmalloc_node+0x81/0xf0 [ 162.431119][T14192] FAULT_INJECTION: forcing a failure. [ 162.431119][T14192] name failslab, interval 1, probability 0, space 0, times 0 [ 162.431635][T14186] traverse+0x9c/0x380 [ 162.435345][T14186] ? rmqueue+0x43/0xd00 [ 162.436348][T14186] seq_read_iter+0x859/0x910 [ 162.437333][T14186] kernfs_fop_read_iter+0xd9/0x320 [ 162.438594][T14186] ? selinux_file_permission+0x22e/0x530 [ 162.439923][T14186] ? iov_iter_pipe+0xc3/0xf0 [ 162.441018][T14186] generic_file_splice_read+0x22a/0x310 [ 162.442564][T14186] ? splice_shrink_spd+0x60/0x60 [ 162.443881][T14186] splice_direct_to_actor+0x2aa/0x650 [ 162.445015][T14186] ? do_splice_direct+0x170/0x170 [ 162.446122][T14186] do_splice_direct+0xf5/0x170 [ 162.447380][T14186] do_sendfile+0x773/0xda0 [ 162.448324][T14186] __x64_sys_sendfile64+0xa9/0x130 [ 162.449754][T14186] do_syscall_64+0x4a/0x90 [ 162.451028][T14186] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.452679][T14186] RIP: 0033:0x4665d9 [ 162.454079][T14186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.458832][T14186] RSP: 002b:00007f0b07b6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 162.460312][T14186] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.462479][T14186] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 162.464008][T14186] RBP: 00007f0b07b6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.465879][T14186] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 162.467719][T14186] R13: 00007ffcd827a75f R14: 00007f0b07b6b300 R15: 0000000000022000 [ 162.469875][T14192] CPU: 0 PID: 14192 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.472677][T14192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.475852][T14192] Call Trace: [ 162.476827][T14192] dump_stack+0x137/0x19d [ 162.478353][T14192] should_fail+0x23c/0x250 [ 162.479591][T14192] ? create_local_trace_uprobe+0x235/0x3c0 [ 162.481314][T14192] __should_failslab+0x81/0x90 [ 162.482665][T14192] should_failslab+0x5/0x20 [ 162.484067][T14192] __kmalloc_track_caller+0x64/0x340 [ 162.485881][T14192] ? kstrdup+0x4c/0x70 [ 162.487101][T14192] kstrdup+0x31/0x70 [ 162.488376][T14192] create_local_trace_uprobe+0x235/0x3c0 [ 162.490136][T14192] perf_uprobe_init+0xbe/0x140 [ 162.491417][T14192] perf_uprobe_event_init+0xde/0x140 [ 162.492904][T14192] perf_try_init_event+0x21a/0x400 [ 162.494768][T14192] perf_event_alloc+0xa60/0x1790 [ 162.496246][T14192] __se_sys_perf_event_open+0x5c7/0x2740 [ 162.497757][T14192] ? vfs_write+0x50c/0x770 [ 162.499380][T14192] __x64_sys_perf_event_open+0x63/0x70 [ 162.500951][T14192] do_syscall_64+0x4a/0x90 [ 162.502376][T14192] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.504293][T14192] RIP: 0033:0x4665d9 22:46:10 executing program 0 (fault-call:1 fault-nth:10): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:10 executing program 1 (fault-call:1 fault-nth:10): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:10 executing program 2 (fault-call:1 fault-nth:8): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x5, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 162.505396][T14192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.511880][T14192] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 162.514293][T14192] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.516128][T14192] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 162.517729][T14192] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.519545][T14192] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 162.520834][T14192] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 162.535076][T14196] FAULT_INJECTION: forcing a failure. [ 162.535076][T14196] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 162.539013][T14196] CPU: 0 PID: 14196 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.541877][T14196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.544855][T14196] Call Trace: [ 162.545899][T14196] dump_stack+0x137/0x19d [ 162.547366][T14196] should_fail+0x23c/0x250 [ 162.548812][T14196] should_fail_usercopy+0x16/0x20 [ 162.550261][T14196] _copy_from_user+0x1c/0xd0 [ 162.551827][T14196] iovec_from_user+0xc4/0x2d0 [ 162.553308][T14196] ? should_fail+0xd6/0x250 [ 162.554928][T14196] __import_iovec+0x49/0x270 [ 162.556275][T14196] ? __copy_msghdr_from_user+0x232/0x350 [ 162.558106][T14196] import_iovec+0x69/0x80 [ 162.559424][T14196] __sys_sendmmsg+0x2c9/0x4b0 22:46:10 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0xa, 0x3) 22:46:10 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0xb, 0x3) [ 162.561092][T14196] ? kstrtoull+0x30f/0x350 [ 162.562331][T14196] ? kstrtouint_from_user+0x104/0x130 [ 162.564181][T14196] ? do_anonymous_page+0x411/0x8b0 [ 162.565483][T14196] ? fsnotify_perm+0x59/0x2e0 [ 162.566992][T14196] ? __fsnotify_parent+0x32f/0x430 [ 162.568529][T14196] ? get_pid_task+0x8b/0xc0 [ 162.570103][T14196] ? vfs_write+0x50c/0x770 [ 162.571517][T14196] ? __cond_resched+0x11/0x40 [ 162.573056][T14196] ? fput+0x2d/0x130 [ 162.574048][T14196] ? ksys_write+0x157/0x180 [ 162.575543][T14196] __x64_sys_sendmmsg+0x53/0x60 [ 162.576985][T14196] do_syscall_64+0x4a/0x90 [ 162.578341][T14196] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.580157][T14196] RIP: 0033:0x4665d9 [ 162.581330][T14196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.586777][T14196] RSP: 002b:00007f784e819188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 162.589261][T14196] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.591415][T14196] RDX: 0000000000000002 RSI: 0000000020005800 RDI: 0000000000000003 [ 162.593759][T14196] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.596569][T14196] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000001 [ 162.598609][T14196] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 [ 162.598709][T14198] FAULT_INJECTION: forcing a failure. [ 162.598709][T14198] name failslab, interval 1, probability 0, space 0, times 0 [ 162.604847][T14198] CPU: 1 PID: 14198 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.607450][T14198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 22:46:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x6, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:10 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0xc, 0x3) 22:46:10 executing program 2 (fault-call:1 fault-nth:9): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:10 executing program 3 (fault-call:2 fault-nth:4): perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 162.610377][T14198] Call Trace: [ 162.611449][T14198] dump_stack+0x137/0x19d [ 162.612743][T14198] should_fail+0x23c/0x250 [ 162.614229][T14198] ? create_local_trace_uprobe+0x235/0x3c0 [ 162.616258][T14198] __should_failslab+0x81/0x90 [ 162.617616][T14198] should_failslab+0x5/0x20 [ 162.618938][T14198] __kmalloc_track_caller+0x64/0x340 [ 162.620634][T14198] ? kstrdup+0x4c/0x70 [ 162.621828][T14198] kstrdup+0x31/0x70 [ 162.623237][T14198] create_local_trace_uprobe+0x235/0x3c0 [ 162.625144][T14198] perf_uprobe_init+0xbe/0x140 [ 162.626481][T14198] perf_uprobe_event_init+0xde/0x140 [ 162.628161][T14198] perf_try_init_event+0x21a/0x400 [ 162.630048][T14198] perf_event_alloc+0xa60/0x1790 [ 162.631370][T14198] __se_sys_perf_event_open+0x5c7/0x2740 [ 162.633234][T14198] ? vfs_write+0x50c/0x770 [ 162.634698][T14198] __x64_sys_perf_event_open+0x63/0x70 [ 162.636769][T14198] do_syscall_64+0x4a/0x90 [ 162.637665][T14198] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.639302][T14198] RIP: 0033:0x4665d9 [ 162.640480][T14198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.646073][T14198] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 162.648364][T14198] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.650324][T14198] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 162.652429][T14198] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.654621][T14198] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 162.656830][T14198] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 162.693293][T14217] FAULT_INJECTION: forcing a failure. [ 162.693293][T14217] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 162.696958][T14217] CPU: 1 PID: 14217 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.699489][T14217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.702046][T14217] Call Trace: [ 162.702670][T14217] dump_stack+0x137/0x19d [ 162.703643][T14217] should_fail+0x23c/0x250 [ 162.705077][T14217] should_fail_usercopy+0x16/0x20 [ 162.706295][T14217] _copy_from_iter_full+0x148/0xa10 [ 162.707260][T14217] ? ip_append_data+0x126/0x150 [ 162.708380][T14217] raw_sendmsg+0x753/0xbd0 [ 162.709629][T14217] inet_sendmsg+0x5f/0x80 [ 162.710990][T14217] ? inet_send_prepare+0x210/0x210 [ 162.712250][T14217] ____sys_sendmsg+0x360/0x4d0 [ 162.713138][T14217] ? import_iovec+0x69/0x80 [ 162.713860][T14217] __sys_sendmmsg+0x315/0x4b0 [ 162.715331][T14217] ? kstrtoull+0x30f/0x350 [ 162.716565][T14217] ? kstrtouint_from_user+0x104/0x130 [ 162.717798][T14217] ? do_anonymous_page+0x411/0x8b0 [ 162.718836][T14217] ? fsnotify_perm+0x59/0x2e0 [ 162.719965][T14217] ? __fsnotify_parent+0x32f/0x430 [ 162.720819][T14217] ? get_pid_task+0x8b/0xc0 [ 162.722165][T14217] ? vfs_write+0x50c/0x770 [ 162.723340][T14217] ? __cond_resched+0x11/0x40 [ 162.724217][T14217] ? fput+0x2d/0x130 [ 162.725046][T14217] ? ksys_write+0x157/0x180 [ 162.726507][T14217] __x64_sys_sendmmsg+0x53/0x60 [ 162.727666][T14217] do_syscall_64+0x4a/0x90 [ 162.728507][T14217] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.729672][T14217] RIP: 0033:0x4665d9 [ 162.730698][T14217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.734213][T14217] RSP: 002b:00007f784e819188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 162.736120][T14217] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.737628][T14217] RDX: 0000000000000002 RSI: 0000000020005800 RDI: 0000000000000003 [ 162.739303][T14217] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.741051][T14217] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000002 22:46:10 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0xd, 0x3) 22:46:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x7, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 162.743212][T14217] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 22:46:10 executing program 0 (fault-call:1 fault-nth:11): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 162.790576][T14191] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 162.793661][T14191] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e493c662 [ 162.822131][T14225] FAULT_INJECTION: forcing a failure. [ 162.822131][T14225] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 162.826326][T14225] CPU: 0 PID: 14225 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.828820][T14225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.831436][T14225] Call Trace: [ 162.832392][T14225] dump_stack+0x137/0x19d [ 162.833969][T14225] should_fail+0x23c/0x250 [ 162.835104][T14225] __alloc_pages+0x102/0x320 [ 162.835999][T14225] alloc_pages+0x21d/0x310 [ 162.836494][T14232] FAULT_INJECTION: forcing a failure. [ 162.836494][T14232] name failslab, interval 1, probability 0, space 0, times 0 22:46:10 executing program 1 (fault-call:1 fault-nth:11): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:10 executing program 2 (fault-call:1 fault-nth:10): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x8, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:10 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0xf, 0x3) [ 162.836949][T14225] push_pipe+0x267/0x370 [ 162.840905][T14225] _copy_to_iter+0x35d/0xdd0 [ 162.841908][T14225] ? kernfs_seq_stop+0x8e/0xa0 [ 162.843525][T14225] ? __virt_addr_valid+0x15a/0x1a0 [ 162.844786][T14225] seq_read_iter+0x1dc/0x910 [ 162.845609][T14225] kernfs_fop_read_iter+0xd9/0x320 [ 162.846996][T14225] ? selinux_file_permission+0x22e/0x530 [ 162.848258][T14225] ? iov_iter_pipe+0xc3/0xf0 [ 162.849354][T14225] generic_file_splice_read+0x22a/0x310 [ 162.850722][T14225] ? splice_shrink_spd+0x60/0x60 [ 162.852143][T14225] splice_direct_to_actor+0x2aa/0x650 [ 162.853725][T14225] ? do_splice_direct+0x170/0x170 [ 162.855204][T14225] do_splice_direct+0xf5/0x170 [ 162.855975][T14225] do_sendfile+0x773/0xda0 [ 162.857003][T14225] __x64_sys_sendfile64+0xa9/0x130 [ 162.858124][T14225] do_syscall_64+0x4a/0x90 [ 162.858995][T14225] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.860093][T14225] RIP: 0033:0x4665d9 [ 162.860828][T14225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.865268][T14225] RSP: 002b:00007f0b07b6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 162.867957][T14225] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.869438][T14225] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 162.871229][T14225] RBP: 00007f0b07b6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.872827][T14225] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 162.874927][T14225] R13: 00007ffcd827a75f R14: 00007f0b07b6b300 R15: 0000000000022000 [ 162.876877][T14232] CPU: 1 PID: 14232 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.879188][T14232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.881833][T14232] Call Trace: [ 162.882714][T14232] dump_stack+0x137/0x19d [ 162.884404][T14232] should_fail+0x23c/0x250 [ 162.885766][T14232] ? traceprobe_set_print_fmt+0x45/0xa0 [ 162.887165][T14232] __should_failslab+0x81/0x90 [ 162.888722][T14232] should_failslab+0x5/0x20 22:46:10 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x10, 0x3) [ 162.889905][T14232] __kmalloc+0x66/0x340 [ 162.891129][T14232] ? __kmalloc_track_caller+0x23b/0x340 [ 162.892660][T14232] traceprobe_set_print_fmt+0x45/0xa0 [ 162.894234][T14232] create_local_trace_uprobe+0x2eb/0x3c0 [ 162.896119][T14232] perf_uprobe_init+0xbe/0x140 [ 162.897667][T14232] perf_uprobe_event_init+0xde/0x140 [ 162.899317][T14232] perf_try_init_event+0x21a/0x400 [ 162.900850][T14232] perf_event_alloc+0xa60/0x1790 [ 162.902487][T14232] __se_sys_perf_event_open+0x5c7/0x2740 [ 162.904231][T14232] ? vfs_write+0x50c/0x770 [ 162.905408][T14232] __x64_sys_perf_event_open+0x63/0x70 [ 162.906766][T14232] do_syscall_64+0x4a/0x90 [ 162.907783][T14232] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.909262][T14232] RIP: 0033:0x4665d9 [ 162.910255][T14232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.915757][T14232] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 162.918373][T14232] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.920357][T14232] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 162.922663][T14232] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.924736][T14232] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 162.926909][T14232] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:10 executing program 3 (fault-call:2 fault-nth:5): perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 162.946812][T14243] FAULT_INJECTION: forcing a failure. [ 162.946812][T14243] name failslab, interval 1, probability 0, space 0, times 0 [ 162.950647][T14243] CPU: 1 PID: 14243 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 162.953294][T14243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 162.956333][T14243] Call Trace: [ 162.957164][T14243] dump_stack+0x137/0x19d [ 162.958677][T14243] should_fail+0x23c/0x250 [ 162.960130][T14243] ? traceprobe_set_print_fmt+0x45/0xa0 [ 162.962028][T14243] __should_failslab+0x81/0x90 [ 162.963284][T14243] should_failslab+0x5/0x20 [ 162.964661][T14243] __kmalloc+0x66/0x340 [ 162.965666][T14243] ? __kmalloc_track_caller+0x23b/0x340 [ 162.967036][T14243] traceprobe_set_print_fmt+0x45/0xa0 [ 162.968704][T14243] create_local_trace_uprobe+0x2eb/0x3c0 [ 162.970467][T14243] perf_uprobe_init+0xbe/0x140 [ 162.971856][T14243] perf_uprobe_event_init+0xde/0x140 [ 162.973383][T14243] perf_try_init_event+0x21a/0x400 [ 162.974968][T14243] perf_event_alloc+0xa60/0x1790 [ 162.976310][T14243] __se_sys_perf_event_open+0x5c7/0x2740 [ 162.978188][T14243] ? vfs_write+0x50c/0x770 [ 162.979708][T14243] __x64_sys_perf_event_open+0x63/0x70 [ 162.981363][T14243] do_syscall_64+0x4a/0x90 [ 162.982737][T14243] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 162.984468][T14243] RIP: 0033:0x4665d9 [ 162.985694][T14243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 162.990116][T14243] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 162.992044][T14243] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 162.993808][T14243] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 22:46:10 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x11, 0x3) [ 162.995972][T14243] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 162.997764][T14243] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 162.999755][T14243] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 163.006343][T14244] FAULT_INJECTION: forcing a failure. [ 163.006343][T14244] name failslab, interval 1, probability 0, space 0, times 0 [ 163.009877][T14244] CPU: 1 PID: 14244 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.012411][T14244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.015643][T14244] Call Trace: [ 163.016629][T14244] dump_stack+0x137/0x19d [ 163.017665][T14244] should_fail+0x23c/0x250 [ 163.019241][T14244] ? dst_alloc+0x108/0x300 [ 163.020872][T14244] __should_failslab+0x81/0x90 [ 163.021705][T14250] FAULT_INJECTION: forcing a failure. [ 163.021705][T14250] name failslab, interval 1, probability 0, space 0, times 0 [ 163.022277][T14244] should_failslab+0x5/0x20 [ 163.027326][T14244] kmem_cache_alloc+0x46/0x2f0 [ 163.028331][T14244] dst_alloc+0x108/0x300 [ 163.029471][T14244] __mkroute_output+0x452/0xc40 [ 163.030696][T14244] ip_route_output_key_hash_rcu+0x7a8/0x800 [ 163.032006][T14244] ip_route_output_flow+0xaa/0x160 [ 163.032939][T14244] raw_sendmsg+0x79c/0xbd0 [ 163.034167][T14244] inet_sendmsg+0x5f/0x80 [ 163.035353][T14244] ? inet_send_prepare+0x210/0x210 [ 163.036364][T14244] ____sys_sendmsg+0x360/0x4d0 [ 163.037614][T14244] ? import_iovec+0x69/0x80 [ 163.039070][T14244] __sys_sendmmsg+0x315/0x4b0 [ 163.039956][T14244] ? kstrtoull+0x30f/0x350 [ 163.040992][T14244] ? kstrtouint_from_user+0x104/0x130 [ 163.042458][T14244] ? do_anonymous_page+0x411/0x8b0 [ 163.043868][T14244] ? fsnotify_perm+0x59/0x2e0 [ 163.045162][T14244] ? __fsnotify_parent+0x32f/0x430 [ 163.046610][T14244] ? get_pid_task+0x8b/0xc0 [ 163.048059][T14244] ? vfs_write+0x50c/0x770 [ 163.049261][T14244] ? __cond_resched+0x11/0x40 [ 163.050200][T14244] ? fput+0x2d/0x130 [ 163.051596][T14244] ? ksys_write+0x157/0x180 [ 163.052635][T14244] __x64_sys_sendmmsg+0x53/0x60 [ 163.054059][T14244] do_syscall_64+0x4a/0x90 [ 163.055506][T14244] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.057181][T14244] RIP: 0033:0x4665d9 [ 163.058282][T14244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.061865][T14244] RSP: 002b:00007f784e819188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 163.063586][T14244] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 163.065445][T14244] RDX: 0000000000000002 RSI: 0000000020005800 RDI: 0000000000000003 [ 163.066959][T14244] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.068989][T14244] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000002 [ 163.070552][T14244] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 [ 163.072987][T14250] CPU: 0 PID: 14250 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.075700][T14250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.078685][T14250] Call Trace: [ 163.079506][T14250] dump_stack+0x137/0x19d [ 163.080672][T14250] should_fail+0x23c/0x250 [ 163.081795][T14250] ? kmalloc_array+0x2d/0x40 [ 163.083136][T14250] __should_failslab+0x81/0x90 [ 163.084599][T14250] should_failslab+0x5/0x20 [ 163.085697][T14250] __kmalloc+0x66/0x340 [ 163.086964][T14250] ? splice_from_pipe+0xc0/0xc0 [ 163.088576][T14250] kmalloc_array+0x2d/0x40 [ 163.090029][T14250] iter_file_splice_write+0xc1/0x750 [ 163.091216][T14250] ? atime_needs_update+0x2ba/0x390 [ 163.092408][T14250] ? generic_file_splice_read+0x284/0x310 [ 163.094228][T14250] ? splice_from_pipe+0xc0/0xc0 22:46:10 executing program 1 (fault-call:1 fault-nth:12): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 163.095730][T14250] direct_splice_actor+0x80/0xa0 [ 163.097409][T14250] splice_direct_to_actor+0x345/0x650 [ 163.098791][T14250] ? do_splice_direct+0x170/0x170 [ 163.099972][T14250] do_splice_direct+0xf5/0x170 [ 163.101394][T14250] do_sendfile+0x773/0xda0 [ 163.102899][T14250] __x64_sys_sendfile64+0xa9/0x130 [ 163.104450][T14250] do_syscall_64+0x4a/0x90 [ 163.105665][T14250] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.107045][T14250] RIP: 0033:0x4665d9 [ 163.108098][T14250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.113396][T14250] RSP: 002b:00007f0b07b6b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 163.115942][T14250] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 163.118266][T14250] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 163.120354][T14250] RBP: 00007f0b07b6b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.122442][T14250] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 163.124784][T14250] R13: 00007ffcd827a75f R14: 00007f0b07b6b300 R15: 0000000000022000 [ 163.142014][T14259] FAULT_INJECTION: forcing a failure. [ 163.142014][T14259] name fail_page_alloc, interval 1, probability 0, space 0, times 0 22:46:10 executing program 2 (fault-call:1 fault-nth:11): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0xe, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 163.146607][T14259] CPU: 0 PID: 14259 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.149787][T14259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.153254][T14259] Call Trace: [ 163.154199][T14259] dump_stack+0x137/0x19d [ 163.155573][T14259] should_fail+0x23c/0x250 [ 163.157041][T14259] __alloc_pages+0x102/0x320 [ 163.158344][T14259] probe_event_enable+0x421/0x7d0 [ 163.159788][T14259] ? __uprobe_trace_func+0x430/0x430 [ 163.161567][T14259] trace_uprobe_register+0x88/0x410 [ 163.163311][T14259] perf_trace_event_init+0x34e/0x790 [ 163.165315][T14259] perf_uprobe_init+0xf5/0x140 [ 163.166747][T14259] perf_uprobe_event_init+0xde/0x140 [ 163.168041][T14259] perf_try_init_event+0x21a/0x400 [ 163.169666][T14259] perf_event_alloc+0xa60/0x1790 [ 163.170820][T14259] __se_sys_perf_event_open+0x5c7/0x2740 [ 163.172483][T14259] ? vfs_write+0x50c/0x770 [ 163.173903][T14259] __x64_sys_perf_event_open+0x63/0x70 [ 163.175555][T14259] do_syscall_64+0x4a/0x90 [ 163.176957][T14259] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.178855][T14259] RIP: 0033:0x4665d9 [ 163.180083][T14259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.186089][T14259] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 163.188503][T14259] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 163.190614][T14259] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 163.192879][T14259] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.194916][T14259] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 22:46:11 executing program 0 (fault-call:1 fault-nth:12): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:11 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x13, 0x3) [ 163.197348][T14259] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 163.205364][T14263] FAULT_INJECTION: forcing a failure. [ 163.205364][T14263] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 163.209587][T14263] CPU: 0 PID: 14263 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.212548][T14263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.215379][T14263] Call Trace: [ 163.216470][T14263] dump_stack+0x137/0x19d [ 163.217947][T14263] should_fail+0x23c/0x250 [ 163.220110][T14263] __alloc_pages+0x102/0x320 [ 163.220982][T14263] alloc_pages+0x21d/0x310 [ 163.221812][T14263] skb_page_frag_refill+0x9a/0x1b0 [ 163.222813][T14263] sk_page_frag_refill+0x31/0x120 [ 163.223692][T14263] __ip_append_data+0xbb9/0x1db0 [ 163.224707][T14263] ? raw_send_hdrinc+0xa30/0xa30 [ 163.225562][T14263] ? raw_send_hdrinc+0xa30/0xa30 [ 163.226664][T14263] ip_append_data+0x126/0x150 [ 163.227780][T14263] raw_sendmsg+0xa6b/0xbd0 [ 163.228739][T14263] inet_sendmsg+0x5f/0x80 [ 163.229438][T14263] ? inet_send_prepare+0x210/0x210 [ 163.230334][T14263] ____sys_sendmsg+0x360/0x4d0 [ 163.231291][T14263] ? import_iovec+0x69/0x80 [ 163.232102][T14263] __sys_sendmmsg+0x315/0x4b0 [ 163.233470][T14263] ? kstrtoull+0x30f/0x350 [ 163.234379][T14263] ? kstrtouint_from_user+0x104/0x130 [ 163.235513][T14263] ? do_anonymous_page+0x411/0x8b0 [ 163.236426][T14263] ? fsnotify_perm+0x59/0x2e0 [ 163.237325][T14263] ? __fsnotify_parent+0x32f/0x430 [ 163.238359][T14263] ? get_pid_task+0x8b/0xc0 [ 163.239232][T14263] ? vfs_write+0x50c/0x770 [ 163.239987][T14263] ? __cond_resched+0x11/0x40 [ 163.240725][T14263] ? fput+0x2d/0x130 [ 163.241618][T14263] ? ksys_write+0x157/0x180 [ 163.242360][T14263] __x64_sys_sendmmsg+0x53/0x60 [ 163.243356][T14263] do_syscall_64+0x4a/0x90 [ 163.244138][T14263] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.245208][T14263] RIP: 0033:0x4665d9 22:46:11 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x14, 0x3) [ 163.245892][T14263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.249494][T14263] RSP: 002b:00007f784e819188 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 163.250905][T14263] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 163.252490][T14263] RDX: 0000000000000002 RSI: 0000000020005800 RDI: 0000000000000003 [ 163.253792][T14263] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.255249][T14263] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000002 [ 163.256745][T14263] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 [ 163.267255][T14273] FAULT_INJECTION: forcing a failure. [ 163.267255][T14273] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 163.269733][T14273] CPU: 0 PID: 14273 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.271677][T14273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.273992][T14273] Call Trace: [ 163.274576][T14273] dump_stack+0x137/0x19d [ 163.275595][T14273] should_fail+0x23c/0x250 [ 163.276440][T14273] __alloc_pages+0x102/0x320 [ 163.277305][T14273] probe_event_enable+0x421/0x7d0 [ 163.278466][T14273] ? __uprobe_trace_func+0x430/0x430 [ 163.279358][T14273] trace_uprobe_register+0x88/0x410 [ 163.280608][T14273] perf_trace_event_init+0x34e/0x790 [ 163.281948][T14273] perf_uprobe_init+0xf5/0x140 [ 163.282668][T14273] perf_uprobe_event_init+0xde/0x140 [ 163.283490][T14273] perf_try_init_event+0x21a/0x400 [ 163.284395][T14273] perf_event_alloc+0xa60/0x1790 [ 163.285265][T14273] __se_sys_perf_event_open+0x5c7/0x2740 [ 163.286296][T14273] ? vfs_write+0x50c/0x770 [ 163.287073][T14273] __x64_sys_perf_event_open+0x63/0x70 [ 163.288256][T14273] do_syscall_64+0x4a/0x90 [ 163.289012][T14273] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.290152][T14273] RIP: 0033:0x4665d9 [ 163.290978][T14273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.294553][T14273] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 22:46:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:11 executing program 2 (fault-call:1 fault-nth:12): r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:11 executing program 1 (fault-call:1 fault-nth:13): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 163.296062][T14273] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 163.297686][T14273] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 163.298996][T14273] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.300173][T14273] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 163.301415][T14273] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 163.345934][T14287] FAULT_INJECTION: forcing a failure. [ 163.345934][T14287] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 163.348693][T14287] CPU: 0 PID: 14287 Comm: syz-executor.2 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.350139][T14287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.352242][T14287] Call Trace: [ 163.352788][T14287] dump_stack+0x137/0x19d [ 163.353512][T14287] should_fail+0x23c/0x250 [ 163.354332][T14287] should_fail_usercopy+0x16/0x20 [ 163.355183][T14287] _copy_to_user+0x1c/0x90 [ 163.355891][T14287] simple_read_from_buffer+0xab/0x120 [ 163.356819][T14287] proc_fail_nth_read+0xf6/0x140 [ 163.357884][T14287] ? rw_verify_area+0x136/0x250 [ 163.358965][T14287] ? proc_fault_inject_write+0x200/0x200 [ 163.360174][T14287] vfs_read+0x154/0x5d0 [ 163.361002][T14287] ? __fget_light+0x21b/0x260 [ 163.362261][T14287] ? __cond_resched+0x11/0x40 [ 163.363166][T14287] ksys_read+0xce/0x180 [ 163.364051][T14287] __x64_sys_read+0x3e/0x50 [ 163.365304][T14287] do_syscall_64+0x4a/0x90 [ 163.366143][T14287] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.367248][T14287] RIP: 0033:0x41935c [ 163.368435][T14287] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 163.373825][T14287] RSP: 002b:00007f784e819170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 163.375274][T14287] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 000000000041935c [ 163.376555][T14287] RDX: 000000000000000f RSI: 00007f784e8191e0 RDI: 0000000000000004 [ 163.377940][T14287] RBP: 00007f784e8191d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.379409][T14287] R10: 0000000000008dc0 R11: 0000000000000246 R12: 0000000000000002 [ 163.380688][T14287] R13: 00007ffdaed8425f R14: 00007f784e819300 R15: 0000000000022000 [ 163.384667][T14286] FAULT_INJECTION: forcing a failure. [ 163.384667][T14286] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 163.387052][T14286] CPU: 0 PID: 14286 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.388504][T14286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.390373][T14286] Call Trace: [ 163.390969][T14286] dump_stack+0x137/0x19d [ 163.391878][T14286] should_fail+0x23c/0x250 [ 163.393007][T14286] __alloc_pages+0x102/0x320 [ 163.394457][T14286] probe_event_enable+0x421/0x7d0 22:46:11 executing program 3 (fault-call:2 fault-nth:6): perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:11 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x15, 0x3) 22:46:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x2, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:11 executing program 0 (fault-call:1 fault-nth:13): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:11 executing program 1 (fault-call:1 fault-nth:14): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 163.395397][T14286] ? __uprobe_trace_func+0x430/0x430 [ 163.396638][T14286] trace_uprobe_register+0x88/0x410 [ 163.397515][T14286] perf_trace_event_init+0x34e/0x790 [ 163.398455][T14286] perf_uprobe_init+0xf5/0x140 [ 163.399349][T14286] perf_uprobe_event_init+0xde/0x140 [ 163.400421][T14286] perf_try_init_event+0x21a/0x400 [ 163.401259][T14286] perf_event_alloc+0xa60/0x1790 [ 163.402061][T14286] __se_sys_perf_event_open+0x5c7/0x2740 [ 163.402877][T14286] ? vfs_write+0x50c/0x770 [ 163.403752][T14286] __x64_sys_perf_event_open+0x63/0x70 [ 163.404596][T14286] do_syscall_64+0x4a/0x90 [ 163.405465][T14286] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.406346][T14286] RIP: 0033:0x4665d9 [ 163.406980][T14286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.409970][T14286] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 163.411770][T14286] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 163.413027][T14286] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 163.414471][T14286] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.415943][T14286] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 163.417212][T14286] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:11 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x16, 0x3) 22:46:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x3, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 163.464304][T14301] FAULT_INJECTION: forcing a failure. [ 163.464304][T14301] name failslab, interval 1, probability 0, space 0, times 0 [ 163.467036][T14301] CPU: 0 PID: 14301 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.468563][T14301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.470248][T14301] Call Trace: [ 163.470937][T14301] dump_stack+0x137/0x19d [ 163.471659][T14301] should_fail+0x23c/0x250 [ 163.472475][T14301] __should_failslab+0x81/0x90 [ 163.473336][T14301] ? __uprobe_register+0xf8/0x8a0 [ 163.474327][T14301] should_failslab+0x5/0x20 [ 163.475598][T14301] kmem_cache_alloc_trace+0x49/0x310 [ 163.476555][T14301] ? get_page_from_freelist+0x53e/0x800 [ 163.477475][T14301] __uprobe_register+0xf8/0x8a0 [ 163.478361][T14301] ? __alloc_pages+0x194/0x320 [ 163.479097][T14301] uprobe_register_refctr+0x29/0x40 [ 163.479897][T14301] probe_event_enable+0x2be/0x7d0 [ 163.480720][T14301] ? __uprobe_trace_func+0x430/0x430 [ 163.481549][T14301] trace_uprobe_register+0x88/0x410 [ 163.482354][T14301] perf_trace_event_init+0x34e/0x790 [ 163.483363][T14301] perf_uprobe_init+0xf5/0x140 [ 163.484173][T14301] perf_uprobe_event_init+0xde/0x140 [ 163.485033][T14301] perf_try_init_event+0x21a/0x400 [ 163.485998][T14301] perf_event_alloc+0xa60/0x1790 [ 163.486784][T14301] __se_sys_perf_event_open+0x5c7/0x2740 [ 163.487681][T14301] ? vfs_write+0x50c/0x770 [ 163.488359][T14301] __x64_sys_perf_event_open+0x63/0x70 [ 163.489237][T14301] do_syscall_64+0x4a/0x90 [ 163.490041][T14301] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.491237][T14301] RIP: 0033:0x4665d9 [ 163.491892][T14301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.495292][T14301] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 163.496734][T14301] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 163.498809][T14301] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 163.500194][T14301] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.501629][T14301] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 163.502986][T14301] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x3, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:11 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x17, 0x3) 22:46:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x4, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 163.528331][T14298] FAULT_INJECTION: forcing a failure. [ 163.528331][T14298] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 163.531509][T14298] CPU: 0 PID: 14298 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.533287][T14298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.535648][T14298] Call Trace: [ 163.536545][T14298] dump_stack+0x137/0x19d [ 163.537417][T14298] should_fail+0x23c/0x250 [ 163.538262][T14298] __alloc_pages+0x102/0x320 [ 163.539135][T14298] probe_event_enable+0x421/0x7d0 [ 163.540012][T14298] ? __uprobe_trace_func+0x430/0x430 [ 163.541337][T14298] trace_uprobe_register+0x88/0x410 [ 163.542353][T14298] perf_trace_event_init+0x34e/0x790 [ 163.543165][T14298] perf_uprobe_init+0xf5/0x140 [ 163.543995][T14298] perf_uprobe_event_init+0xde/0x140 [ 163.544825][T14298] perf_try_init_event+0x21a/0x400 [ 163.545661][T14298] perf_event_alloc+0xa60/0x1790 [ 163.546750][T14298] __se_sys_perf_event_open+0x5c7/0x2740 [ 163.547627][T14298] ? vfs_write+0x50c/0x770 [ 163.548632][T14298] __x64_sys_perf_event_open+0x63/0x70 [ 163.549686][T14298] do_syscall_64+0x4a/0x90 [ 163.550472][T14298] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.551443][T14298] RIP: 0033:0x4665d9 [ 163.552074][T14298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.556015][T14298] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 163.557299][T14298] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 163.558795][T14298] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 163.560169][T14298] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.561648][T14298] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 163.563434][T14298] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 163.577621][T14324] FAULT_INJECTION: forcing a failure. [ 163.577621][T14324] name failslab, interval 1, probability 0, space 0, times 0 [ 163.581154][T14324] CPU: 1 PID: 14324 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.581724][T14326] raw_sendmsg: syz-executor.2 forgot to set AF_INET. Fix it! [ 163.583907][T14324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.583920][T14324] Call Trace: [ 163.583927][T14324] dump_stack+0x137/0x19d [ 163.590690][T14324] should_fail+0x23c/0x250 [ 163.592093][T14324] ? kernfs_fop_write_iter+0xf0/0x2d0 [ 163.593423][T14324] __should_failslab+0x81/0x90 [ 163.594908][T14324] should_failslab+0x5/0x20 [ 163.596537][T14324] __kmalloc+0x66/0x340 [ 163.597713][T14324] ? avc_policy_seqno+0x22/0x30 [ 163.599181][T14324] kernfs_fop_write_iter+0xf0/0x2d0 [ 163.600726][T14324] do_iter_readv_writev+0x2cb/0x360 [ 163.602159][T14324] do_iter_write+0x112/0x4c0 [ 163.603657][T14324] ? kmalloc_array+0x2d/0x40 [ 163.605282][T14324] vfs_iter_write+0x4c/0x70 [ 163.606781][T14324] iter_file_splice_write+0x40a/0x750 [ 163.608086][T14324] ? splice_from_pipe+0xc0/0xc0 [ 163.609214][T14324] direct_splice_actor+0x80/0xa0 [ 163.610928][T14324] splice_direct_to_actor+0x345/0x650 [ 163.612425][T14324] ? do_splice_direct+0x170/0x170 [ 163.613632][T14324] do_splice_direct+0xf5/0x170 [ 163.615386][T14324] do_sendfile+0x773/0xda0 [ 163.616599][T14324] __x64_sys_sendfile64+0xa9/0x130 [ 163.617796][T14324] do_syscall_64+0x4a/0x90 [ 163.619201][T14324] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.620626][T14324] RIP: 0033:0x4665d9 [ 163.621830][T14324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:46:11 executing program 1 (fault-call:1 fault-nth:15): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 163.627226][T14324] RSP: 002b:00007f0b07b4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 163.628915][T14324] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 163.630647][T14324] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 163.632254][T14324] RBP: 00007f0b07b4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.634462][T14324] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 163.636494][T14324] R13: 00007ffcd827a75f R14: 00007f0b07b4a300 R15: 0000000000022000 [ 163.666666][T14329] FAULT_INJECTION: forcing a failure. [ 163.666666][T14329] name failslab, interval 1, probability 0, space 0, times 0 [ 163.670329][T14329] CPU: 0 PID: 14329 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.673385][T14329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.675596][T14329] Call Trace: [ 163.676107][T14329] dump_stack+0x137/0x19d [ 163.676781][T14329] should_fail+0x23c/0x250 22:46:11 executing program 3 (fault-call:2 fault-nth:7): perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x5, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:11 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x18, 0x3) 22:46:11 executing program 0 (fault-call:1 fault-nth:14): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x5, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x8, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x6, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 163.678010][T14329] __should_failslab+0x81/0x90 [ 163.678980][T14329] ? register_for_each_vma+0x372/0x890 [ 163.680211][T14329] should_failslab+0x5/0x20 [ 163.681080][T14329] kmem_cache_alloc_trace+0x49/0x310 [ 163.682036][T14329] ? percpu_down_write+0x1ed/0x220 [ 163.683017][T14329] register_for_each_vma+0x372/0x890 [ 163.683882][T14329] __uprobe_register+0x3f4/0x8a0 [ 163.684884][T14329] uprobe_register_refctr+0x29/0x40 [ 163.686496][T14329] probe_event_enable+0x2be/0x7d0 [ 163.687904][T14329] ? __uprobe_trace_func+0x430/0x430 [ 163.689521][T14329] trace_uprobe_register+0x88/0x410 [ 163.691069][T14329] perf_trace_event_init+0x34e/0x790 [ 163.692812][T14329] perf_uprobe_init+0xf5/0x140 [ 163.694404][T14329] perf_uprobe_event_init+0xde/0x140 [ 163.695793][T14329] perf_try_init_event+0x21a/0x400 [ 163.696944][T14329] perf_event_alloc+0xa60/0x1790 [ 163.697915][T14329] __se_sys_perf_event_open+0x5c7/0x2740 [ 163.699001][T14329] ? vfs_write+0x50c/0x770 [ 163.699821][T14329] __x64_sys_perf_event_open+0x63/0x70 [ 163.700801][T14329] do_syscall_64+0x4a/0x90 [ 163.701667][T14329] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.702867][T14329] RIP: 0033:0x4665d9 [ 163.703654][T14329] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.707019][T14329] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 163.708647][T14329] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 163.710080][T14329] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 163.712251][T14329] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.713841][T14329] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 163.715376][T14329] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:11 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x5e, 0x3) [ 163.787779][T14327] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 163.789369][T14327] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000008b250cff [ 163.810086][T14341] FAULT_INJECTION: forcing a failure. [ 163.810086][T14341] name failslab, interval 1, probability 0, space 0, times 0 [ 163.813980][T14341] CPU: 1 PID: 14341 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.816408][T14341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.819201][T14341] Call Trace: [ 163.820159][T14341] dump_stack+0x137/0x19d [ 163.821318][T14341] should_fail+0x23c/0x250 [ 163.822758][T14352] PM: suspend entry (deep) [ 163.822923][T14341] __should_failslab+0x81/0x90 [ 163.822950][T14341] ? __uprobe_register+0xf8/0x8a0 [ 163.826887][T14341] should_failslab+0x5/0x20 [ 163.828053][T14341] kmem_cache_alloc_trace+0x49/0x310 [ 163.829759][T14341] ? get_page_from_freelist+0x53e/0x800 [ 163.831512][T14341] __uprobe_register+0xf8/0x8a0 [ 163.833233][T14341] ? __alloc_pages+0x194/0x320 [ 163.834454][T14341] uprobe_register_refctr+0x29/0x40 [ 163.835871][T14341] probe_event_enable+0x2be/0x7d0 [ 163.837184][T14341] ? __uprobe_trace_func+0x430/0x430 [ 163.838849][T14341] trace_uprobe_register+0x88/0x410 [ 163.840412][T14341] perf_trace_event_init+0x34e/0x790 [ 163.841572][T14341] perf_uprobe_init+0xf5/0x140 [ 163.843016][T14341] perf_uprobe_event_init+0xde/0x140 [ 163.844651][T14341] perf_try_init_event+0x21a/0x400 [ 163.846206][T14341] perf_event_alloc+0xa60/0x1790 [ 163.847822][T14341] __se_sys_perf_event_open+0x5c7/0x2740 [ 163.849667][T14341] ? vfs_write+0x50c/0x770 [ 163.850795][T14341] __x64_sys_perf_event_open+0x63/0x70 [ 163.852638][T14341] do_syscall_64+0x4a/0x90 [ 163.854105][T14341] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.855495][T14341] RIP: 0033:0x4665d9 22:46:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0xffe9, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:11 executing program 1 (fault-call:1 fault-nth:16): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x7, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 163.856444][T14341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.861855][T14341] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 163.864482][T14341] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 163.866013][T14341] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 163.868380][T14341] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.870698][T14341] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 163.872475][T14341] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 163.895819][T14362] FAULT_INJECTION: forcing a failure. [ 163.895819][T14362] name failslab, interval 1, probability 0, space 0, times 0 [ 163.899544][T14362] CPU: 1 PID: 14362 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.902028][T14362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.904843][T14362] Call Trace: [ 163.905593][T14362] dump_stack+0x137/0x19d [ 163.906880][T14362] should_fail+0x23c/0x250 [ 163.908022][T14362] __should_failslab+0x81/0x90 [ 163.909240][T14362] ? register_for_each_vma+0x372/0x890 [ 163.910431][T14362] should_failslab+0x5/0x20 [ 163.911530][T14362] kmem_cache_alloc_trace+0x49/0x310 [ 163.913255][T14362] ? register_for_each_vma+0x372/0x890 [ 163.914705][T14362] ? vma_interval_tree_iter_next+0x24c/0x280 [ 163.916347][T14362] register_for_each_vma+0x372/0x890 [ 163.917621][T14362] __uprobe_register+0x3f4/0x8a0 [ 163.918009][T14352] FAULT_INJECTION: forcing a failure. [ 163.918009][T14352] name failslab, interval 1, probability 0, space 0, times 0 [ 163.918585][T14362] uprobe_register_refctr+0x29/0x40 [ 163.922800][T14362] probe_event_enable+0x2be/0x7d0 [ 163.923894][T14362] ? __uprobe_trace_func+0x430/0x430 [ 163.925410][T14362] trace_uprobe_register+0x88/0x410 [ 163.926564][T14362] perf_trace_event_init+0x34e/0x790 [ 163.927698][T14362] perf_uprobe_init+0xf5/0x140 [ 163.928740][T14362] perf_uprobe_event_init+0xde/0x140 [ 163.929825][T14362] perf_try_init_event+0x21a/0x400 [ 163.931112][T14362] perf_event_alloc+0xa60/0x1790 [ 163.932275][T14362] __se_sys_perf_event_open+0x5c7/0x2740 [ 163.933539][T14362] ? vfs_write+0x50c/0x770 [ 163.934401][T14362] __x64_sys_perf_event_open+0x63/0x70 [ 163.935795][T14362] do_syscall_64+0x4a/0x90 [ 163.937028][T14362] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 163.938251][T14362] RIP: 0033:0x4665d9 [ 163.939086][T14362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 163.942865][T14362] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 163.944938][T14362] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 163.946608][T14362] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 163.948520][T14362] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 163.950248][T14362] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 163.952334][T14362] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 163.954175][T14352] CPU: 0 PID: 14352 Comm: syz-executor.3 Not tainted 5.13.0-rc7-syzkaller #0 [ 163.956759][T14352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 163.959925][T14352] Call Trace: [ 163.961123][T14352] dump_stack+0x137/0x19d [ 163.962526][T14352] should_fail+0x23c/0x250 [ 163.963285][T14352] __should_failslab+0x81/0x90 [ 163.964354][T14352] should_failslab+0x5/0x20 [ 163.965345][T14352] kmem_cache_alloc_node+0x58/0x2b0 [ 163.966432][T14352] ? create_task_io_context+0x36/0x210 [ 163.967372][T14352] create_task_io_context+0x36/0x210 [ 163.968407][T14352] submit_bio_checks+0x778/0x800 [ 163.969405][T14352] ? lru_lazyfree_fn+0x645/0x6f0 [ 163.970282][T14352] ? mem_cgroup_uncharge_list+0x36/0xa0 [ 163.971314][T14352] submit_bio_noacct+0x33/0x7e0 [ 163.972326][T14352] ? invalidate_bh_lrus_cpu+0xce/0xe0 [ 163.973512][T14352] submit_bio+0x16d/0x2b0 [ 163.974184][T14352] ? _raw_spin_unlock_irqrestore+0x27/0x40 [ 163.975268][T14352] ? flush_workqueue_prep_pwqs+0x294/0x2c0 [ 163.976463][T14352] submit_bio_wait+0x86/0xc0 [ 163.977414][T14352] blkdev_issue_flush+0x6c/0x90 [ 163.978175][T14352] ? submit_bio_wait+0xc0/0xc0 [ 163.979143][T14352] ext4_sync_fs+0x240/0x310 [ 163.979939][T14352] ? ext4_put_super+0x8e0/0x8e0 [ 163.980684][T14352] sync_fs_one_sb+0x94/0xc0 [ 163.981479][T14352] iterate_supers+0x137/0x1f0 [ 163.982397][T14352] ? sync_inodes_one_sb+0x50/0x50 [ 163.983492][T14352] ? state_show+0x120/0x120 [ 163.984352][T14352] ksys_sync+0x77/0xe0 [ 163.985196][T14352] ksys_sync_helper+0x13/0xa0 [ 163.986507][T14352] enter_state+0x153/0x530 [ 163.987189][T14352] pm_suspend+0x4b/0x130 [ 163.987967][T14352] state_store+0x1f2/0x210 [ 163.988973][T14352] kobj_attr_store+0x40/0x60 [ 163.989861][T14352] ? kobj_attr_show+0x50/0x50 [ 163.990691][T14352] sysfs_kf_write+0xa6/0xc0 [ 163.991573][T14352] ? sysfs_kf_read+0x140/0x140 [ 163.992562][T14352] kernfs_fop_write_iter+0x1d3/0x2d0 [ 163.993631][T14352] do_iter_readv_writev+0x2cb/0x360 [ 163.994610][T14352] do_iter_write+0x112/0x4c0 [ 163.995438][T14352] ? kmalloc_array+0x2d/0x40 [ 163.996309][T14352] vfs_iter_write+0x4c/0x70 [ 163.997220][T14352] iter_file_splice_write+0x40a/0x750 [ 163.998173][T14352] ? splice_from_pipe+0xc0/0xc0 [ 163.999301][T14352] direct_splice_actor+0x80/0xa0 [ 164.000222][T14352] splice_direct_to_actor+0x345/0x650 [ 164.001121][T14352] ? do_splice_direct+0x170/0x170 [ 164.002139][T14352] do_splice_direct+0xf5/0x170 [ 164.003105][T14352] do_sendfile+0x773/0xda0 [ 164.004140][T14352] __x64_sys_sendfile64+0xa9/0x130 [ 164.005242][T14352] do_syscall_64+0x4a/0x90 [ 164.005988][T14352] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 164.006834][T14352] RIP: 0033:0x4665d9 22:46:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0xffeb, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 164.007605][T14352] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 164.010916][T14352] RSP: 002b:00007f0b07b4a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 164.012523][T14352] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 164.013980][T14352] RDX: 0000000020000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 164.015397][T14352] RBP: 00007f0b07b4a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 164.017448][T14352] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 164.019338][T14352] R13: 00007ffcd827a75f R14: 00007f0b07b4a300 R15: 0000000000022000 [ 164.033644][T14352] Filesystems sync: 0.209 seconds [ 164.037935][T14352] Freezing user space processes ... (elapsed 0.014 seconds) done. [ 164.054875][T14352] OOM killer disabled. [ 164.055464][T14352] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 164.058239][T14352] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:12 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x8, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:12 executing program 0 (fault-call:1 fault-nth:15): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:12 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x1ff9, 0x3) 22:46:12 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 164.104623][T13514] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 164.594312][T14352] ACPI: Preparing to enter system sleep state S3 [ 164.594452][T14352] PM: Saving platform NVS memory [ 164.594458][T14352] Disabling non-boot CPUs ... [ 164.597588][T14352] smpboot: CPU 1 is now offline [ 164.600220][T14352] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 164.600282][T14352] ACPI: Low-level resume complete [ 164.600411][T14352] PM: Restoring platform NVS memory [ 164.600419][T14352] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 164.611305][T14352] Enabling non-boot CPUs ... [ 164.611449][T14352] x86: Booting SMP configuration: [ 164.611452][T14352] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 164.611625][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 164.612631][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 164.614257][T14352] CPU1 is up [ 164.614539][T14352] ACPI: Waking up from system sleep state S3 [ 164.716582][T14352] OOM killer enabled. [ 164.717292][T14352] Restarting tasks ... [ 164.723177][ T1034] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 164.726820][ T1034] block loop4: uevent: failed to send synthetic uevent [ 164.729923][T14352] done. [ 164.731376][T14352] PM: suspend exit 22:46:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xa, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 164.791612][T14377] FAULT_INJECTION: forcing a failure. [ 164.791612][T14377] name failslab, interval 1, probability 0, space 0, times 0 [ 164.796151][T14377] CPU: 0 PID: 14377 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 164.798476][T14377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 164.801227][T14377] Call Trace: [ 164.802140][T14377] dump_stack+0x137/0x19d [ 164.803473][T14377] should_fail+0x23c/0x250 [ 164.804913][T14377] __should_failslab+0x81/0x90 [ 164.806299][T14377] ? register_for_each_vma+0x372/0x890 [ 164.807821][T14377] should_failslab+0x5/0x20 [ 164.809184][T14377] kmem_cache_alloc_trace+0x49/0x310 [ 164.810567][T14377] ? percpu_down_write+0x1ed/0x220 [ 164.811874][T14377] register_for_each_vma+0x372/0x890 [ 164.813320][T14377] __uprobe_register+0x3f4/0x8a0 [ 164.814798][T14377] uprobe_register_refctr+0x29/0x40 [ 164.816236][T14377] probe_event_enable+0x2be/0x7d0 [ 164.817809][T14377] ? __uprobe_trace_func+0x430/0x430 [ 164.819423][T14377] trace_uprobe_register+0x88/0x410 [ 164.820758][T14377] perf_trace_event_init+0x34e/0x790 [ 164.822119][T14377] perf_uprobe_init+0xf5/0x140 [ 164.823232][T14377] perf_uprobe_event_init+0xde/0x140 [ 164.824829][T14377] perf_try_init_event+0x21a/0x400 [ 164.826493][T14377] perf_event_alloc+0xa60/0x1790 [ 164.828047][T14377] __se_sys_perf_event_open+0x5c7/0x2740 [ 164.829487][T14377] ? vfs_write+0x50c/0x770 [ 164.830794][T14377] __x64_sys_perf_event_open+0x63/0x70 [ 164.832443][T14377] do_syscall_64+0x4a/0x90 [ 164.833930][T14377] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 164.835437][T14377] RIP: 0033:0x4665d9 22:46:12 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x2, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:12 executing program 1 (fault-call:1 fault-nth:17): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:12 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x2000, 0x3) [ 164.836478][T14377] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 164.842325][T14377] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 164.844990][T14377] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 164.847564][T14377] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 164.849832][T14377] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 164.852296][T14377] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 164.854865][T14377] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 164.862573][T14386] PM: suspend entry (deep) [ 164.884539][T14386] Filesystems sync: 0.020 seconds [ 164.886795][T14386] Freezing user space processes ... (elapsed 0.027 seconds) done. [ 164.916449][T14386] OOM killer disabled. [ 164.917157][T14386] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 164.919578][T14386] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:13 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x4, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:13 executing program 0 (fault-call:1 fault-nth:16): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 165.346519][ T1776] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 165.844850][T14386] ACPI: Preparing to enter system sleep state S3 [ 165.844934][T14386] PM: Saving platform NVS memory [ 165.844940][T14386] Disabling non-boot CPUs ... [ 165.848259][T14386] smpboot: CPU 1 is now offline [ 165.850958][T14386] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 165.851024][T14386] ACPI: Low-level resume complete [ 165.851158][T14386] PM: Restoring platform NVS memory [ 165.851169][T14386] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 165.862401][T14386] Enabling non-boot CPUs ... [ 165.862565][T14386] x86: Booting SMP configuration: [ 165.862568][T14386] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 165.862790][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 165.863731][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 165.865106][T14386] CPU1 is up [ 165.865389][T14386] ACPI: Waking up from system sleep state S3 [ 165.961152][T14386] OOM killer enabled. [ 165.962063][T14386] Restarting tasks ... [ 165.981421][T14400] FAULT_INJECTION: forcing a failure. [ 165.981421][T14400] name failslab, interval 1, probability 0, space 0, times 0 [ 165.984768][T14400] CPU: 0 PID: 14400 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 165.986864][T14400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 165.989508][T14400] Call Trace: [ 165.990381][T14400] dump_stack+0x137/0x19d [ 165.991715][T14400] should_fail+0x23c/0x250 [ 165.992747][T14400] __should_failslab+0x81/0x90 [ 165.993392][T14386] done. 22:46:13 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0xffffffffffffffff, 0x3) [ 165.993924][T14400] ? register_for_each_vma+0x372/0x890 [ 165.996278][T14400] should_failslab+0x5/0x20 [ 165.997565][T14400] kmem_cache_alloc_trace+0x49/0x310 [ 165.998725][T14400] ? register_for_each_vma+0x372/0x890 [ 165.998749][T14400] ? vma_interval_tree_iter_next+0x263/0x280 [ 165.998814][T14400] register_for_each_vma+0x372/0x890 [ 165.998909][T14400] __uprobe_register+0x3f4/0x8a0 [ 165.998927][T14400] uprobe_register_refctr+0x29/0x40 [ 165.999023][T14400] probe_event_enable+0x2be/0x7d0 [ 165.999041][T14400] ? __uprobe_trace_func+0x430/0x430 [ 165.999057][T14400] trace_uprobe_register+0x88/0x410 [ 165.999075][T14400] perf_trace_event_init+0x34e/0x790 [ 165.999115][T14400] perf_uprobe_init+0xf5/0x140 [ 165.999135][T14400] perf_uprobe_event_init+0xde/0x140 [ 165.999180][T14400] perf_try_init_event+0x21a/0x400 [ 165.999244][T14400] perf_event_alloc+0xa60/0x1790 [ 165.999258][T14400] __se_sys_perf_event_open+0x5c7/0x2740 [ 165.999314][T14400] ? vfs_write+0x50c/0x770 [ 165.999330][T14400] __x64_sys_perf_event_open+0x63/0x70 [ 165.999347][T14400] do_syscall_64+0x4a/0x90 [ 166.026059][T14400] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.026097][T14400] RIP: 0033:0x4665d9 [ 166.026118][T14400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:46:13 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x2, 0x3) 22:46:13 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x8, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x10, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:13 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x2) [ 166.026132][T14400] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 166.026150][T14400] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 166.026191][T14400] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 166.026203][T14400] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 166.026215][T14400] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 166.026227][T14400] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 166.029931][T14386] PM: suspend exit [ 166.117975][T14410] FAULT_INJECTION: forcing a failure. [ 166.117975][T14410] name failslab, interval 1, probability 0, space 0, times 0 [ 166.121453][T14410] CPU: 0 PID: 14410 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 166.124448][T14410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.127442][T14410] Call Trace: [ 166.128316][T14410] dump_stack+0x137/0x19d [ 166.129937][T14410] should_fail+0x23c/0x250 [ 166.131324][T14410] __should_failslab+0x81/0x90 [ 166.132907][T14410] ? register_for_each_vma+0x372/0x890 [ 166.134463][T14410] should_failslab+0x5/0x20 [ 166.135620][T14410] kmem_cache_alloc_trace+0x49/0x310 [ 166.137421][T14410] ? register_for_each_vma+0x372/0x890 [ 166.138810][T14410] ? vma_interval_tree_iter_next+0x24c/0x280 [ 166.140464][T14410] register_for_each_vma+0x372/0x890 [ 166.141835][T14410] __uprobe_register+0x3f4/0x8a0 [ 166.143183][T14410] uprobe_register_refctr+0x29/0x40 [ 166.144742][T14410] probe_event_enable+0x2be/0x7d0 [ 166.146023][T14410] ? __uprobe_trace_func+0x430/0x430 [ 166.147460][T14410] trace_uprobe_register+0x88/0x410 [ 166.149059][T14410] perf_trace_event_init+0x34e/0x790 [ 166.150640][T14410] perf_uprobe_init+0xf5/0x140 [ 166.151869][T14410] perf_uprobe_event_init+0xde/0x140 [ 166.153646][T14410] perf_try_init_event+0x21a/0x400 [ 166.155305][T14410] perf_event_alloc+0xa60/0x1790 [ 166.156819][T14410] __se_sys_perf_event_open+0x5c7/0x2740 [ 166.158583][T14410] ? vfs_write+0x50c/0x770 [ 166.160019][T14410] __x64_sys_perf_event_open+0x63/0x70 [ 166.161241][T14410] do_syscall_64+0x4a/0x90 [ 166.162434][T14410] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.164339][T14410] RIP: 0033:0x4665d9 22:46:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x60, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:13 executing program 1 (fault-call:1 fault-nth:18): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:13 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x11, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:14 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x4) 22:46:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x60, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xe0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 166.165425][T14410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.171234][T14410] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 166.174306][T14410] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 166.175982][T14410] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 166.177584][T14410] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 166.179173][T14410] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 166.180984][T14410] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 166.226439][T14408] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 166.228279][T14408] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e5cb1ee4 [ 166.258231][T14431] FAULT_INJECTION: forcing a failure. [ 166.258231][T14431] name failslab, interval 1, probability 0, space 0, times 0 [ 166.261515][T14431] CPU: 0 PID: 14431 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 166.264149][T14431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.267264][T14431] Call Trace: [ 166.268442][T14431] dump_stack+0x137/0x19d [ 166.269651][T14431] should_fail+0x23c/0x250 [ 166.270899][T14431] __should_failslab+0x81/0x90 [ 166.272087][T14431] ? register_for_each_vma+0x372/0x890 [ 166.273026][T14431] should_failslab+0x5/0x20 [ 166.274264][T14431] kmem_cache_alloc_trace+0x49/0x310 [ 166.275989][T14431] ? register_for_each_vma+0x372/0x890 [ 166.277431][T14431] ? vma_interval_tree_iter_next+0x24c/0x280 [ 166.278693][T14431] register_for_each_vma+0x372/0x890 [ 166.279777][T14431] __uprobe_register+0x3f4/0x8a0 [ 166.281042][T14431] uprobe_register_refctr+0x29/0x40 [ 166.282001][T14431] probe_event_enable+0x2be/0x7d0 [ 166.283323][T14431] ? __uprobe_trace_func+0x430/0x430 [ 166.284449][T14431] trace_uprobe_register+0x88/0x410 [ 166.285746][T14431] perf_trace_event_init+0x34e/0x790 [ 166.286836][T14431] perf_uprobe_init+0xf5/0x140 [ 166.287932][T14431] perf_uprobe_event_init+0xde/0x140 [ 166.289117][T14431] perf_try_init_event+0x21a/0x400 [ 166.290273][T14431] perf_event_alloc+0xa60/0x1790 [ 166.291699][T14431] __se_sys_perf_event_open+0x5c7/0x2740 [ 166.293676][T14431] ? vfs_write+0x50c/0x770 [ 166.294777][T14431] __x64_sys_perf_event_open+0x63/0x70 [ 166.296284][T14431] do_syscall_64+0x4a/0x90 [ 166.297831][T14431] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.299572][T14431] RIP: 0033:0x4665d9 [ 166.300900][T14431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.305166][T14431] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 22:46:14 executing program 0 (fault-call:1 fault-nth:17): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:14 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x5) 22:46:14 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x6, 0x3) 22:46:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0xe0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xfc, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 166.306729][T14431] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 166.308655][T14431] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 166.310074][T14431] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 166.311850][T14431] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 166.313668][T14431] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x1100, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x1fc, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 166.396737][T14429] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 166.399194][T14429] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000008d57e719 [ 166.419643][T14453] FAULT_INJECTION: forcing a failure. [ 166.419643][T14453] name failslab, interval 1, probability 0, space 0, times 0 [ 166.423355][T14453] CPU: 0 PID: 14453 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 166.425741][T14453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.428721][T14453] Call Trace: [ 166.429584][T14453] dump_stack+0x137/0x19d [ 166.431087][T14453] should_fail+0x23c/0x250 [ 166.432534][T14453] __should_failslab+0x81/0x90 [ 166.434325][T14453] ? register_for_each_vma+0x372/0x890 [ 166.436280][T14453] should_failslab+0x5/0x20 [ 166.437617][T14453] kmem_cache_alloc_trace+0x49/0x310 [ 166.439139][T14453] ? register_for_each_vma+0x372/0x890 [ 166.440964][T14453] ? vma_interval_tree_iter_next+0x263/0x280 [ 166.442939][T14453] register_for_each_vma+0x372/0x890 [ 166.443859][T14453] __uprobe_register+0x3f4/0x8a0 [ 166.445338][T14453] uprobe_register_refctr+0x29/0x40 [ 166.447040][T14453] probe_event_enable+0x2be/0x7d0 [ 166.448688][T14453] ? __uprobe_trace_func+0x430/0x430 [ 166.450147][T14453] trace_uprobe_register+0x88/0x410 [ 166.451661][T14453] perf_trace_event_init+0x34e/0x790 [ 166.453210][T14453] perf_uprobe_init+0xf5/0x140 [ 166.455004][T14453] perf_uprobe_event_init+0xde/0x140 [ 166.456665][T14453] perf_try_init_event+0x21a/0x400 [ 166.458670][T14453] perf_event_alloc+0xa60/0x1790 [ 166.460135][T14453] __se_sys_perf_event_open+0x5c7/0x2740 [ 166.461467][T14453] ? vfs_write+0x50c/0x770 [ 166.462804][T14453] __x64_sys_perf_event_open+0x63/0x70 [ 166.464464][T14453] do_syscall_64+0x4a/0x90 [ 166.466050][T14453] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.468015][T14453] RIP: 0033:0x4665d9 22:46:14 executing program 1 (fault-call:1 fault-nth:19): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:14 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x6) 22:46:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x6000, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x300, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 166.469402][T14453] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.475517][T14453] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 166.477523][T14453] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 166.479449][T14453] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 166.480981][T14453] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 166.482969][T14453] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 166.484941][T14453] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:14 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x8, 0x3) [ 166.561115][T14478] FAULT_INJECTION: forcing a failure. [ 166.561115][T14478] name failslab, interval 1, probability 0, space 0, times 0 [ 166.564961][T14478] CPU: 1 PID: 14478 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 166.567944][T14478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.571339][T14478] Call Trace: [ 166.572013][T14478] dump_stack+0x137/0x19d [ 166.573508][T14478] should_fail+0x23c/0x250 [ 166.574513][T14478] __should_failslab+0x81/0x90 [ 166.576084][T14478] ? register_for_each_vma+0x372/0x890 [ 166.577483][T14478] should_failslab+0x5/0x20 [ 166.578945][T14478] kmem_cache_alloc_trace+0x49/0x310 [ 166.580845][T14478] ? register_for_each_vma+0x372/0x890 [ 166.582561][T14478] ? vma_interval_tree_iter_next+0x263/0x280 [ 166.584555][T14478] register_for_each_vma+0x372/0x890 [ 166.586035][T14478] __uprobe_register+0x3f4/0x8a0 [ 166.586779][T14478] uprobe_register_refctr+0x29/0x40 [ 166.587877][T14478] probe_event_enable+0x2be/0x7d0 [ 166.588759][T14478] ? __uprobe_trace_func+0x430/0x430 [ 166.589739][T14478] trace_uprobe_register+0x88/0x410 [ 166.590640][T14478] perf_trace_event_init+0x34e/0x790 [ 166.591643][T14478] perf_uprobe_init+0xf5/0x140 [ 166.592294][T14478] perf_uprobe_event_init+0xde/0x140 [ 166.593125][T14478] perf_try_init_event+0x21a/0x400 [ 166.594063][T14478] perf_event_alloc+0xa60/0x1790 [ 166.594950][T14478] __se_sys_perf_event_open+0x5c7/0x2740 [ 166.595872][T14478] ? vfs_write+0x50c/0x770 [ 166.596600][T14478] __x64_sys_perf_event_open+0x63/0x70 [ 166.597625][T14478] do_syscall_64+0x4a/0x90 [ 166.598672][T14478] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.599738][T14478] RIP: 0033:0x4665d9 [ 166.600429][T14478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.603866][T14478] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 166.605383][T14478] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 166.606714][T14478] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 166.608145][T14478] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 22:46:14 executing program 0 (fault-call:1 fault-nth:18): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:14 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x7) 22:46:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x500, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0xe000, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 166.609831][T14478] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 166.611689][T14478] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 166.665462][T14494] FAULT_INJECTION: forcing a failure. [ 166.665462][T14494] name failslab, interval 1, probability 0, space 0, times 0 [ 166.669832][T14494] CPU: 0 PID: 14494 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 166.673011][T14494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.675909][T14494] Call Trace: [ 166.676861][T14494] dump_stack+0x137/0x19d [ 166.677963][T14494] should_fail+0x23c/0x250 [ 166.679401][T14494] __should_failslab+0x81/0x90 [ 166.681096][T14494] ? register_for_each_vma+0x372/0x890 [ 166.682946][T14494] should_failslab+0x5/0x20 [ 166.684389][T14494] kmem_cache_alloc_trace+0x49/0x310 [ 166.686028][T14494] ? register_for_each_vma+0x372/0x890 [ 166.687725][T14494] ? vma_interval_tree_iter_next+0x24c/0x280 [ 166.689725][T14494] register_for_each_vma+0x372/0x890 [ 166.691548][T14494] __uprobe_register+0x3f4/0x8a0 [ 166.693072][T14494] uprobe_register_refctr+0x29/0x40 [ 166.694829][T14494] probe_event_enable+0x2be/0x7d0 [ 166.696458][T14494] ? __uprobe_trace_func+0x430/0x430 [ 166.698199][T14494] trace_uprobe_register+0x88/0x410 [ 166.699680][T14494] perf_trace_event_init+0x34e/0x790 [ 166.701075][T14494] perf_uprobe_init+0xf5/0x140 [ 166.702590][T14494] perf_uprobe_event_init+0xde/0x140 [ 166.704182][T14494] perf_try_init_event+0x21a/0x400 [ 166.705526][T14494] perf_event_alloc+0xa60/0x1790 [ 166.706800][T14494] __se_sys_perf_event_open+0x5c7/0x2740 [ 166.708172][T14494] ? vfs_write+0x50c/0x770 [ 166.708998][T14494] __x64_sys_perf_event_open+0x63/0x70 [ 166.710154][T14494] do_syscall_64+0x4a/0x90 [ 166.711352][T14494] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.713088][T14494] RIP: 0033:0x4665d9 22:46:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0xffff, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:14 executing program 1 (fault-call:1 fault-nth:20): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:14 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x8) 22:46:14 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x9, 0x3) 22:46:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x600, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 166.714400][T14494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.719404][T14494] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 166.721654][T14494] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 166.723471][T14494] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 166.725525][T14494] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 166.727654][T14494] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 166.729627][T14494] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x20000010, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:14 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x9) [ 166.759659][T14484] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 166.762434][T14484] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e15d8b5d [ 166.806092][T14505] FAULT_INJECTION: forcing a failure. [ 166.806092][T14505] name failslab, interval 1, probability 0, space 0, times 0 [ 166.810488][T14505] CPU: 1 PID: 14505 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 166.813113][T14505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.815537][T14505] Call Trace: [ 166.816740][T14505] dump_stack+0x137/0x19d [ 166.818160][T14505] should_fail+0x23c/0x250 [ 166.819595][T14505] __should_failslab+0x81/0x90 [ 166.821187][T14505] ? register_for_each_vma+0x372/0x890 [ 166.822963][T14505] should_failslab+0x5/0x20 [ 166.824704][T14505] kmem_cache_alloc_trace+0x49/0x310 [ 166.826397][T14505] ? register_for_each_vma+0x372/0x890 [ 166.828260][T14505] ? vma_interval_tree_iter_next+0x24c/0x280 [ 166.829840][T14505] register_for_each_vma+0x372/0x890 [ 166.831322][T14505] __uprobe_register+0x3f4/0x8a0 [ 166.833133][T14505] uprobe_register_refctr+0x29/0x40 [ 166.835102][T14505] probe_event_enable+0x2be/0x7d0 [ 166.836819][T14505] ? __uprobe_trace_func+0x430/0x430 [ 166.838317][T14505] trace_uprobe_register+0x88/0x410 [ 166.840163][T14505] perf_trace_event_init+0x34e/0x790 [ 166.841872][T14505] perf_uprobe_init+0xf5/0x140 [ 166.843304][T14505] perf_uprobe_event_init+0xde/0x140 [ 166.845670][T14505] perf_try_init_event+0x21a/0x400 [ 166.847051][T14505] perf_event_alloc+0xa60/0x1790 [ 166.848040][T14505] __se_sys_perf_event_open+0x5c7/0x2740 [ 166.849054][T14505] ? vfs_write+0x50c/0x770 [ 166.849846][T14505] __x64_sys_perf_event_open+0x63/0x70 [ 166.851062][T14505] do_syscall_64+0x4a/0x90 [ 166.852156][T14505] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 166.853507][T14505] RIP: 0033:0x4665d9 22:46:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x20000290, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:14 executing program 0 (fault-call:1 fault-nth:19): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:14 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xa) 22:46:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x700, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:14 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0xb, 0x3) [ 166.854443][T14505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 166.858345][T14505] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 166.859801][T14505] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 166.861419][T14505] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 166.863152][T14505] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 166.864545][T14505] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 166.866418][T14505] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x20000310, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 166.937891][T14502] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 166.940231][T14502] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000058ebfd18 [ 166.964009][T14529] FAULT_INJECTION: forcing a failure. [ 166.964009][T14529] name failslab, interval 1, probability 0, space 0, times 0 [ 166.967710][T14529] CPU: 1 PID: 14529 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 166.970064][T14529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 166.973338][T14529] Call Trace: [ 166.974470][T14529] dump_stack+0x137/0x19d [ 166.975583][T14529] should_fail+0x23c/0x250 [ 166.976926][T14529] __should_failslab+0x81/0x90 [ 166.978633][T14529] ? register_for_each_vma+0x372/0x890 [ 166.980218][T14529] should_failslab+0x5/0x20 [ 166.981674][T14529] kmem_cache_alloc_trace+0x49/0x310 [ 166.982986][T14529] ? register_for_each_vma+0x372/0x890 [ 166.984736][T14529] ? vma_interval_tree_iter_next+0x24c/0x280 [ 166.986333][T14529] register_for_each_vma+0x372/0x890 22:46:14 executing program 1 (fault-call:1 fault-nth:21): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xa00, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:14 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xb) 22:46:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x20000590, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 166.987682][T14529] __uprobe_register+0x3f4/0x8a0 [ 166.989095][T14529] uprobe_register_refctr+0x29/0x40 [ 166.990799][T14529] probe_event_enable+0x2be/0x7d0 [ 166.992405][T14529] ? __uprobe_trace_func+0x430/0x430 [ 166.993327][T14529] trace_uprobe_register+0x88/0x410 [ 166.994558][T14529] perf_trace_event_init+0x34e/0x790 [ 166.995702][T14529] perf_uprobe_init+0xf5/0x140 [ 166.996484][T14529] perf_uprobe_event_init+0xde/0x140 [ 166.997550][T14529] perf_try_init_event+0x21a/0x400 [ 166.998868][T14529] perf_event_alloc+0xa60/0x1790 [ 167.000035][T14529] __se_sys_perf_event_open+0x5c7/0x2740 [ 167.001061][T14529] ? vfs_write+0x50c/0x770 [ 167.001972][T14529] __x64_sys_perf_event_open+0x63/0x70 [ 167.003569][T14529] do_syscall_64+0x4a/0x90 [ 167.004983][T14529] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.006570][T14529] RIP: 0033:0x4665d9 [ 167.007282][T14529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.011938][T14529] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 167.013553][T14529] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 167.015176][T14529] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 167.017352][T14529] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 167.019086][T14529] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 167.021668][T14529] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 167.062183][T14545] FAULT_INJECTION: forcing a failure. [ 167.062183][T14545] name failslab, interval 1, probability 0, space 0, times 0 [ 167.066495][T14545] CPU: 0 PID: 14545 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 167.069547][T14545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.072783][T14545] Call Trace: [ 167.073981][T14545] dump_stack+0x137/0x19d [ 167.075388][T14545] should_fail+0x23c/0x250 [ 167.077197][T14545] __should_failslab+0x81/0x90 [ 167.078812][T14545] ? register_for_each_vma+0x372/0x890 [ 167.080638][T14545] should_failslab+0x5/0x20 [ 167.081987][T14545] kmem_cache_alloc_trace+0x49/0x310 [ 167.083764][T14545] ? register_for_each_vma+0x372/0x890 [ 167.085227][T14545] ? vma_interval_tree_iter_next+0x263/0x280 [ 167.086817][T14545] register_for_each_vma+0x372/0x890 [ 167.088101][T14545] __uprobe_register+0x3f4/0x8a0 [ 167.089732][T14545] uprobe_register_refctr+0x29/0x40 [ 167.091489][T14545] probe_event_enable+0x2be/0x7d0 [ 167.093270][T14545] ? __uprobe_trace_func+0x430/0x430 [ 167.095153][T14545] trace_uprobe_register+0x88/0x410 [ 167.096776][T14545] perf_trace_event_init+0x34e/0x790 [ 167.097732][T14545] perf_uprobe_init+0xf5/0x140 [ 167.098589][T14545] perf_uprobe_event_init+0xde/0x140 [ 167.099577][T14545] perf_try_init_event+0x21a/0x400 [ 167.100736][T14545] perf_event_alloc+0xa60/0x1790 [ 167.101817][T14545] __se_sys_perf_event_open+0x5c7/0x2740 [ 167.103412][T14545] ? vfs_write+0x50c/0x770 [ 167.104837][T14545] __x64_sys_perf_event_open+0x63/0x70 [ 167.106088][T14545] do_syscall_64+0x4a/0x90 [ 167.107030][T14545] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.108228][T14545] RIP: 0033:0x4665d9 22:46:14 executing program 0 (fault-call:1 fault-nth:20): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:14 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0xc, 0x3) 22:46:14 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xc) 22:46:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x3}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x3f00, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 167.109056][T14545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.112780][T14545] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 167.114644][T14545] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 167.116067][T14545] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 167.118042][T14545] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 167.119893][T14545] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 167.122151][T14545] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 167.150135][T14542] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 167.151966][T14542] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003f010896 [ 167.199887][T14558] FAULT_INJECTION: forcing a failure. [ 167.199887][T14558] name failslab, interval 1, probability 0, space 0, times 0 [ 167.203654][T14558] CPU: 0 PID: 14558 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 167.205242][T14558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.208192][T14558] Call Trace: [ 167.208800][T14558] dump_stack+0x137/0x19d [ 167.209887][T14558] should_fail+0x23c/0x250 [ 167.211408][T14558] __should_failslab+0x81/0x90 [ 167.212561][T14558] ? register_for_each_vma+0x372/0x890 [ 167.214004][T14558] should_failslab+0x5/0x20 [ 167.215228][T14558] kmem_cache_alloc_trace+0x49/0x310 [ 167.216451][T14558] ? register_for_each_vma+0x372/0x890 [ 167.217802][T14558] ? vma_interval_tree_iter_next+0x263/0x280 [ 167.219120][T14558] register_for_each_vma+0x372/0x890 [ 167.220872][T14558] __uprobe_register+0x3f4/0x8a0 [ 167.222437][T14558] uprobe_register_refctr+0x29/0x40 [ 167.223906][T14558] probe_event_enable+0x2be/0x7d0 [ 167.225473][T14558] ? __uprobe_trace_func+0x430/0x430 [ 167.227072][T14558] trace_uprobe_register+0x88/0x410 [ 167.229080][T14558] perf_trace_event_init+0x34e/0x790 [ 167.230639][T14558] perf_uprobe_init+0xf5/0x140 [ 167.232155][T14558] perf_uprobe_event_init+0xde/0x140 [ 167.234023][T14558] perf_try_init_event+0x21a/0x400 [ 167.235970][T14558] perf_event_alloc+0xa60/0x1790 [ 167.237389][T14558] __se_sys_perf_event_open+0x5c7/0x2740 [ 167.238516][T14558] ? vfs_write+0x50c/0x770 [ 167.239463][T14558] __x64_sys_perf_event_open+0x63/0x70 [ 167.240383][T14558] do_syscall_64+0x4a/0x90 [ 167.241432][T14558] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.242761][T14558] RIP: 0033:0x4665d9 [ 167.243725][T14558] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.247652][T14558] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 22:46:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xd) 22:46:15 executing program 1 (fault-call:1 fault-nth:22): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x5}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x4000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xe) [ 167.249280][T14558] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 167.251177][T14558] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 167.252622][T14558] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 167.254178][T14558] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 167.255767][T14558] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x8}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 167.325657][T14570] FAULT_INJECTION: forcing a failure. [ 167.325657][T14570] name failslab, interval 1, probability 0, space 0, times 0 [ 167.329573][T14570] CPU: 0 PID: 14570 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 167.331897][T14570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.335036][T14570] Call Trace: [ 167.336085][T14570] dump_stack+0x137/0x19d [ 167.337627][T14570] should_fail+0x23c/0x250 [ 167.338940][T14570] __should_failslab+0x81/0x90 [ 167.340105][T14570] ? register_for_each_vma+0x372/0x890 [ 167.341722][T14570] should_failslab+0x5/0x20 [ 167.343063][T14570] kmem_cache_alloc_trace+0x49/0x310 [ 167.344803][T14570] ? register_for_each_vma+0x372/0x890 [ 167.346556][T14570] ? vma_interval_tree_iter_next+0x24c/0x280 [ 167.348174][T14570] register_for_each_vma+0x372/0x890 [ 167.349717][T14570] __uprobe_register+0x3f4/0x8a0 [ 167.350734][T14570] uprobe_register_refctr+0x29/0x40 [ 167.351706][T14570] probe_event_enable+0x2be/0x7d0 [ 167.352690][T14570] ? __uprobe_trace_func+0x430/0x430 [ 167.353955][T14570] trace_uprobe_register+0x88/0x410 [ 167.355153][T14570] perf_trace_event_init+0x34e/0x790 [ 167.356167][T14570] perf_uprobe_init+0xf5/0x140 [ 167.357409][T14570] perf_uprobe_event_init+0xde/0x140 [ 167.358611][T14570] perf_try_init_event+0x21a/0x400 [ 167.359870][T14570] perf_event_alloc+0xa60/0x1790 [ 167.361303][T14570] __se_sys_perf_event_open+0x5c7/0x2740 [ 167.363090][T14570] ? vfs_write+0x50c/0x770 [ 167.364510][T14570] __x64_sys_perf_event_open+0x63/0x70 [ 167.366136][T14570] do_syscall_64+0x4a/0x90 [ 167.367423][T14570] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.369133][T14570] RIP: 0033:0x4665d9 22:46:15 executing program 0 (fault-call:1 fault-nth:21): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xf) [ 167.370353][T14570] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.376053][T14570] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 167.378601][T14570] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 167.380733][T14570] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 167.382883][T14570] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 167.385133][T14570] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 167.386541][T14570] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:15 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0xd, 0x3) 22:46:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x6000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0xffe9}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x10) [ 167.444598][T14589] FAULT_INJECTION: forcing a failure. [ 167.444598][T14589] name failslab, interval 1, probability 0, space 0, times 0 [ 167.448138][T14589] CPU: 0 PID: 14589 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 167.450609][T14589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.453025][T14589] Call Trace: [ 167.453581][T14589] dump_stack+0x137/0x19d [ 167.454895][T14589] should_fail+0x23c/0x250 [ 167.455806][T14589] __should_failslab+0x81/0x90 [ 167.456724][T14589] ? register_for_each_vma+0x372/0x890 [ 167.457647][T14589] should_failslab+0x5/0x20 [ 167.458629][T14589] kmem_cache_alloc_trace+0x49/0x310 [ 167.460196][T14589] ? register_for_each_vma+0x372/0x890 [ 167.461984][T14589] ? vma_interval_tree_iter_next+0x24c/0x280 [ 167.463639][T14589] register_for_each_vma+0x372/0x890 [ 167.465295][T14589] __uprobe_register+0x3f4/0x8a0 [ 167.466740][T14589] uprobe_register_refctr+0x29/0x40 [ 167.468021][T14589] probe_event_enable+0x2be/0x7d0 [ 167.469515][T14589] ? __uprobe_trace_func+0x430/0x430 [ 167.471106][T14589] trace_uprobe_register+0x88/0x410 [ 167.472969][T14589] perf_trace_event_init+0x34e/0x790 [ 167.474566][T14589] perf_uprobe_init+0xf5/0x140 [ 167.475967][T14589] perf_uprobe_event_init+0xde/0x140 [ 167.477815][T14589] perf_try_init_event+0x21a/0x400 [ 167.479447][T14589] perf_event_alloc+0xa60/0x1790 [ 167.481221][T14589] __se_sys_perf_event_open+0x5c7/0x2740 [ 167.482784][T14589] ? vfs_write+0x50c/0x770 [ 167.484079][T14589] __x64_sys_perf_event_open+0x63/0x70 [ 167.485556][T14589] do_syscall_64+0x4a/0x90 [ 167.486634][T14589] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.487700][T14589] RIP: 0033:0x4665d9 [ 167.488350][T14589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.491719][T14589] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 22:46:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x80fe, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:15 executing program 1 (fault-call:1 fault-nth:23): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0xffeb}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x11) [ 167.493624][T14589] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 167.495033][T14589] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 167.496327][T14589] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 167.497923][T14589] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 167.499333][T14589] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 167.545100][T14586] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 167.547265][T14586] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e15d8b5d [ 167.581926][T14609] FAULT_INJECTION: forcing a failure. [ 167.581926][T14609] name failslab, interval 1, probability 0, space 0, times 0 [ 167.585839][T14609] CPU: 1 PID: 14609 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 167.588503][T14609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.591951][T14609] Call Trace: [ 167.592973][T14609] dump_stack+0x137/0x19d [ 167.594696][T14609] should_fail+0x23c/0x250 [ 167.596351][T14609] __should_failslab+0x81/0x90 [ 167.597963][T14609] ? register_for_each_vma+0x372/0x890 [ 167.599904][T14609] should_failslab+0x5/0x20 [ 167.601430][T14609] kmem_cache_alloc_trace+0x49/0x310 [ 167.602837][T14609] ? register_for_each_vma+0x372/0x890 [ 167.604506][T14609] ? vma_interval_tree_iter_next+0x263/0x280 [ 167.606373][T14609] register_for_each_vma+0x372/0x890 [ 167.608216][T14609] __uprobe_register+0x3f4/0x8a0 [ 167.610040][T14609] uprobe_register_refctr+0x29/0x40 [ 167.611658][T14609] probe_event_enable+0x2be/0x7d0 [ 167.613251][T14609] ? __uprobe_trace_func+0x430/0x430 [ 167.614923][T14609] trace_uprobe_register+0x88/0x410 [ 167.616533][T14609] perf_trace_event_init+0x34e/0x790 [ 167.618185][T14609] perf_uprobe_init+0xf5/0x140 [ 167.619708][T14609] perf_uprobe_event_init+0xde/0x140 [ 167.620857][T14609] perf_try_init_event+0x21a/0x400 [ 167.621936][T14609] perf_event_alloc+0xa60/0x1790 [ 167.623402][T14609] __se_sys_perf_event_open+0x5c7/0x2740 [ 167.625067][T14609] ? vfs_write+0x50c/0x770 [ 167.626139][T14609] __x64_sys_perf_event_open+0x63/0x70 [ 167.627223][T14609] do_syscall_64+0x4a/0x90 [ 167.627917][T14609] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.629820][T14609] RIP: 0033:0x4665d9 22:46:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x20000042}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:15 executing program 0 (fault-call:1 fault-nth:22): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xe000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x12) 22:46:15 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0xf, 0x3) [ 167.630746][T14609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.635936][T14609] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 167.637620][T14609] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 167.639310][T14609] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 167.641022][T14609] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 167.642521][T14609] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 167.644228][T14609] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x13) [ 167.719894][T14630] FAULT_INJECTION: forcing a failure. [ 167.719894][T14630] name failslab, interval 1, probability 0, space 0, times 0 [ 167.723012][T14630] CPU: 0 PID: 14630 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 167.726235][T14630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.729240][T14630] Call Trace: [ 167.730444][T14630] dump_stack+0x137/0x19d [ 167.731925][T14630] should_fail+0x23c/0x250 [ 167.733354][T14630] __should_failslab+0x81/0x90 [ 167.734910][T14630] ? register_for_each_vma+0x372/0x890 [ 167.736598][T14630] should_failslab+0x5/0x20 [ 167.737803][T14630] kmem_cache_alloc_trace+0x49/0x310 [ 167.739543][T14630] ? register_for_each_vma+0x372/0x890 [ 167.741017][T14630] ? vma_interval_tree_iter_next+0x263/0x280 [ 167.742906][T14630] register_for_each_vma+0x372/0x890 [ 167.744609][T14630] __uprobe_register+0x3f4/0x8a0 [ 167.745900][T14630] uprobe_register_refctr+0x29/0x40 [ 167.746710][T14630] probe_event_enable+0x2be/0x7d0 [ 167.747926][T14630] ? __uprobe_trace_func+0x430/0x430 [ 167.748884][T14630] trace_uprobe_register+0x88/0x410 [ 167.749965][T14630] perf_trace_event_init+0x34e/0x790 [ 167.750941][T14630] perf_uprobe_init+0xf5/0x140 [ 167.751809][T14630] perf_uprobe_event_init+0xde/0x140 [ 167.753287][T14630] perf_try_init_event+0x21a/0x400 [ 167.754225][T14630] perf_event_alloc+0xa60/0x1790 [ 167.755609][T14630] __se_sys_perf_event_open+0x5c7/0x2740 [ 167.756729][T14630] ? vfs_write+0x50c/0x770 [ 167.757417][T14630] __x64_sys_perf_event_open+0x63/0x70 [ 167.758422][T14630] do_syscall_64+0x4a/0x90 [ 167.759768][T14630] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.761552][T14630] RIP: 0033:0x4665d9 [ 167.762214][T14630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 167.766906][T14630] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 22:46:15 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x10, 0x3) 22:46:15 executing program 1 (fault-call:1 fault-nth:24): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x20000082}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x14) [ 167.768752][T14630] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 167.770727][T14630] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 167.772087][T14630] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 167.773809][T14630] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 167.775947][T14630] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xfc00, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x7ffff000}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:15 executing program 0 (fault-call:1 fault-nth:23): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 167.857614][T14641] FAULT_INJECTION: forcing a failure. [ 167.857614][T14641] name failslab, interval 1, probability 0, space 0, times 0 [ 167.861582][T14641] CPU: 1 PID: 14641 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 167.864345][T14641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 167.867395][T14641] Call Trace: [ 167.868598][T14641] dump_stack+0x137/0x19d [ 167.869988][T14641] should_fail+0x23c/0x250 [ 167.871422][T14641] __should_failslab+0x81/0x90 [ 167.872931][T14641] ? register_for_each_vma+0x372/0x890 [ 167.874885][T14641] should_failslab+0x5/0x20 [ 167.875968][T14641] kmem_cache_alloc_trace+0x49/0x310 [ 167.877448][T14641] ? register_for_each_vma+0x372/0x890 [ 167.879294][T14641] ? vma_interval_tree_iter_next+0x263/0x280 [ 167.881388][T14641] register_for_each_vma+0x372/0x890 [ 167.883219][T14641] __uprobe_register+0x3f4/0x8a0 [ 167.885548][T14641] uprobe_register_refctr+0x29/0x40 [ 167.887233][T14641] probe_event_enable+0x2be/0x7d0 [ 167.888661][T14641] ? __uprobe_trace_func+0x430/0x430 [ 167.890170][T14641] trace_uprobe_register+0x88/0x410 [ 167.891462][T14641] perf_trace_event_init+0x34e/0x790 [ 167.893190][T14641] perf_uprobe_init+0xf5/0x140 [ 167.894840][T14641] perf_uprobe_event_init+0xde/0x140 [ 167.895844][T14641] perf_try_init_event+0x21a/0x400 [ 167.896598][T14641] perf_event_alloc+0xa60/0x1790 [ 167.897698][T14641] __se_sys_perf_event_open+0x5c7/0x2740 [ 167.898804][T14641] ? vfs_write+0x50c/0x770 [ 167.899677][T14641] __x64_sys_perf_event_open+0x63/0x70 [ 167.900593][T14641] do_syscall_64+0x4a/0x90 [ 167.901390][T14641] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 167.902571][T14641] RIP: 0033:0x4665d9 [ 167.903341][T14641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:46:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0xfffffdef}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xfc01, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x15) 22:46:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xfe80, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 167.907250][T14641] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 167.908998][T14641] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 167.910561][T14641] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 167.912334][T14641] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 167.913877][T14641] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 167.915358][T14641] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x2}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 167.991276][T14639] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 167.993047][T14639] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003f010896 [ 168.013359][T14666] FAULT_INJECTION: forcing a failure. [ 168.013359][T14666] name failslab, interval 1, probability 0, space 0, times 0 [ 168.017201][T14666] CPU: 1 PID: 14666 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 168.020048][T14666] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.022868][T14666] Call Trace: [ 168.023896][T14666] dump_stack+0x137/0x19d [ 168.025188][T14666] should_fail+0x23c/0x250 [ 168.026629][T14666] __should_failslab+0x81/0x90 [ 168.027967][T14666] ? register_for_each_vma+0x372/0x890 [ 168.029816][T14666] should_failslab+0x5/0x20 [ 168.031248][T14666] kmem_cache_alloc_trace+0x49/0x310 [ 168.032720][T14666] ? register_for_each_vma+0x372/0x890 [ 168.034589][T14666] ? vma_interval_tree_iter_next+0x24c/0x280 [ 168.036375][T14666] register_for_each_vma+0x372/0x890 [ 168.037899][T14666] __uprobe_register+0x3f4/0x8a0 [ 168.039426][T14666] uprobe_register_refctr+0x29/0x40 [ 168.040713][T14666] probe_event_enable+0x2be/0x7d0 [ 168.041792][T14666] ? __uprobe_trace_func+0x430/0x430 [ 168.042790][T14666] trace_uprobe_register+0x88/0x410 [ 168.043958][T14666] perf_trace_event_init+0x34e/0x790 [ 168.044958][T14666] perf_uprobe_init+0xf5/0x140 [ 168.045801][T14666] perf_uprobe_event_init+0xde/0x140 [ 168.047051][T14666] perf_try_init_event+0x21a/0x400 [ 168.048294][T14666] perf_event_alloc+0xa60/0x1790 [ 168.049510][T14666] __se_sys_perf_event_open+0x5c7/0x2740 [ 168.050831][T14666] ? vfs_write+0x50c/0x770 [ 168.051949][T14666] __x64_sys_perf_event_open+0x63/0x70 [ 168.053029][T14666] do_syscall_64+0x4a/0x90 [ 168.054028][T14666] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.056307][T14666] RIP: 0033:0x4665d9 [ 168.057121][T14666] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:46:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x16) 22:46:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x3}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:15 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x11, 0x3) 22:46:15 executing program 1 (fault-call:1 fault-nth:25): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xff00, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 168.061856][T14666] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 168.063777][T14666] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 168.065649][T14666] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 168.067217][T14666] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 168.069813][T14666] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 168.071841][T14666] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 168.136410][T14685] FAULT_INJECTION: forcing a failure. [ 168.136410][T14685] name failslab, interval 1, probability 0, space 0, times 0 [ 168.140371][T14685] CPU: 1 PID: 14685 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 168.143472][T14685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.146641][T14685] Call Trace: [ 168.147507][T14685] dump_stack+0x137/0x19d [ 168.149094][T14685] should_fail+0x23c/0x250 [ 168.150625][T14685] __should_failslab+0x81/0x90 [ 168.152392][T14685] ? register_for_each_vma+0x372/0x890 [ 168.154506][T14685] should_failslab+0x5/0x20 [ 168.155517][T14685] kmem_cache_alloc_trace+0x49/0x310 [ 168.157251][T14685] ? register_for_each_vma+0x372/0x890 [ 168.158658][T14685] ? vma_interval_tree_iter_next+0x263/0x280 [ 168.160845][T14685] register_for_each_vma+0x372/0x890 [ 168.162426][T14685] __uprobe_register+0x3f4/0x8a0 [ 168.163852][T14685] uprobe_register_refctr+0x29/0x40 [ 168.165784][T14685] probe_event_enable+0x2be/0x7d0 [ 168.167057][T14685] ? __uprobe_trace_func+0x430/0x430 [ 168.167999][T14685] trace_uprobe_register+0x88/0x410 [ 168.169000][T14685] perf_trace_event_init+0x34e/0x790 [ 168.169820][T14685] perf_uprobe_init+0xf5/0x140 [ 168.171129][T14685] perf_uprobe_event_init+0xde/0x140 [ 168.172580][T14685] perf_try_init_event+0x21a/0x400 [ 168.173801][T14685] perf_event_alloc+0xa60/0x1790 [ 168.175106][T14685] __se_sys_perf_event_open+0x5c7/0x2740 [ 168.176159][T14685] ? vfs_write+0x50c/0x770 [ 168.176975][T14685] __x64_sys_perf_event_open+0x63/0x70 [ 168.178165][T14685] do_syscall_64+0x4a/0x90 [ 168.179010][T14685] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.180325][T14685] RIP: 0033:0x4665d9 [ 168.181015][T14685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.184550][T14685] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 22:46:15 executing program 0 (fault-call:1 fault-nth:24): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x5}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x17) 22:46:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x40000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 168.185967][T14685] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 168.187510][T14685] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 168.188942][T14685] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 168.190338][T14685] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 168.191735][T14685] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:16 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x13, 0x3) 22:46:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x100000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:16 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x18) 22:46:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x8}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 168.285925][T14701] FAULT_INJECTION: forcing a failure. [ 168.285925][T14701] name failslab, interval 1, probability 0, space 0, times 0 [ 168.289363][T14701] CPU: 1 PID: 14701 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 168.291549][T14701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.294966][T14701] Call Trace: [ 168.296202][T14701] dump_stack+0x137/0x19d [ 168.297813][T14701] should_fail+0x23c/0x250 [ 168.299325][T14701] __should_failslab+0x81/0x90 [ 168.300839][T14701] ? register_for_each_vma+0x372/0x890 [ 168.303047][T14701] should_failslab+0x5/0x20 [ 168.304490][T14701] kmem_cache_alloc_trace+0x49/0x310 [ 168.305850][T14701] ? register_for_each_vma+0x372/0x890 [ 168.307961][T14701] ? vma_interval_tree_iter_next+0x263/0x280 [ 168.309867][T14701] register_for_each_vma+0x372/0x890 [ 168.311759][T14701] __uprobe_register+0x3f4/0x8a0 [ 168.313212][T14701] uprobe_register_refctr+0x29/0x40 [ 168.314651][T14701] probe_event_enable+0x2be/0x7d0 [ 168.316132][T14701] ? __uprobe_trace_func+0x430/0x430 [ 168.317771][T14701] trace_uprobe_register+0x88/0x410 [ 168.319761][T14701] perf_trace_event_init+0x34e/0x790 [ 168.321147][T14701] perf_uprobe_init+0xf5/0x140 [ 168.322640][T14701] perf_uprobe_event_init+0xde/0x140 [ 168.324245][T14701] perf_try_init_event+0x21a/0x400 [ 168.325702][T14701] perf_event_alloc+0xa60/0x1790 [ 168.327194][T14701] __se_sys_perf_event_open+0x5c7/0x2740 [ 168.328953][T14701] ? vfs_write+0x50c/0x770 [ 168.330179][T14701] __x64_sys_perf_event_open+0x63/0x70 [ 168.331920][T14701] do_syscall_64+0x4a/0x90 [ 168.333384][T14701] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.334886][T14701] RIP: 0033:0x4665d9 22:46:16 executing program 1 (fault-call:1 fault-nth:26): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x300}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:16 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x19) 22:46:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x1000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 168.335998][T14701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.340517][T14701] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 168.342119][T14701] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 168.344656][T14701] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 168.346162][T14701] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 168.347566][T14701] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 168.350101][T14701] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 168.410626][T14726] FAULT_INJECTION: forcing a failure. [ 168.410626][T14726] name failslab, interval 1, probability 0, space 0, times 0 [ 168.415284][T14726] CPU: 0 PID: 14726 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 168.418119][T14726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.421631][T14726] Call Trace: [ 168.422431][T14726] dump_stack+0x137/0x19d [ 168.423984][T14726] should_fail+0x23c/0x250 [ 168.425248][T14726] __should_failslab+0x81/0x90 [ 168.426769][T14726] ? register_for_each_vma+0x372/0x890 [ 168.428628][T14726] should_failslab+0x5/0x20 [ 168.430216][T14726] kmem_cache_alloc_trace+0x49/0x310 [ 168.431601][T14726] ? register_for_each_vma+0x372/0x890 [ 168.433021][T14726] ? vma_interval_tree_iter_next+0x263/0x280 [ 168.435026][T14726] register_for_each_vma+0x372/0x890 [ 168.436266][T14726] __uprobe_register+0x3f4/0x8a0 [ 168.437801][T14726] uprobe_register_refctr+0x29/0x40 [ 168.439054][T14726] probe_event_enable+0x2be/0x7d0 [ 168.440406][T14726] ? __uprobe_trace_func+0x430/0x430 [ 168.441685][T14726] trace_uprobe_register+0x88/0x410 [ 168.442554][T14726] perf_trace_event_init+0x34e/0x790 [ 168.443493][T14726] perf_uprobe_init+0xf5/0x140 [ 168.444329][T14726] perf_uprobe_event_init+0xde/0x140 [ 168.445435][T14726] perf_try_init_event+0x21a/0x400 [ 168.446563][T14726] perf_event_alloc+0xa60/0x1790 [ 168.447562][T14726] __se_sys_perf_event_open+0x5c7/0x2740 [ 168.448878][T14726] ? vfs_write+0x50c/0x770 [ 168.450331][T14726] __x64_sys_perf_event_open+0x63/0x70 [ 168.451635][T14726] do_syscall_64+0x4a/0x90 [ 168.452426][T14726] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.453551][T14726] RIP: 0033:0x4665d9 [ 168.454282][T14726] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:46:16 executing program 0 (fault-call:1 fault-nth:25): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x68000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:16 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1a) 22:46:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x2000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 168.458914][T14726] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 168.461138][T14726] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 168.462631][T14726] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 168.464219][T14726] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 168.465579][T14726] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 168.467247][T14726] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 168.553476][T14737] FAULT_INJECTION: forcing a failure. [ 168.553476][T14737] name failslab, interval 1, probability 0, space 0, times 0 [ 168.557299][T14737] CPU: 0 PID: 14737 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 168.559651][T14737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.562474][T14737] Call Trace: [ 168.563501][T14737] dump_stack+0x137/0x19d [ 168.565147][T14737] should_fail+0x23c/0x250 [ 168.565891][T14737] __should_failslab+0x81/0x90 [ 168.566775][T14737] ? register_for_each_vma+0x372/0x890 [ 168.567989][T14737] should_failslab+0x5/0x20 [ 168.568800][T14737] kmem_cache_alloc_trace+0x49/0x310 [ 168.570019][T14737] ? register_for_each_vma+0x372/0x890 [ 168.570967][T14737] ? vma_interval_tree_iter_next+0x24c/0x280 [ 168.572749][T14737] register_for_each_vma+0x372/0x890 [ 168.573998][T14737] __uprobe_register+0x3f4/0x8a0 [ 168.574881][T14737] uprobe_register_refctr+0x29/0x40 [ 168.576054][T14737] probe_event_enable+0x2be/0x7d0 [ 168.576856][T14737] ? __uprobe_trace_func+0x430/0x430 [ 168.577818][T14737] trace_uprobe_register+0x88/0x410 [ 168.578939][T14737] perf_trace_event_init+0x34e/0x790 [ 168.580019][T14737] perf_uprobe_init+0xf5/0x140 [ 168.580920][T14737] perf_uprobe_event_init+0xde/0x140 [ 168.581965][T14737] perf_try_init_event+0x21a/0x400 [ 168.583042][T14737] perf_event_alloc+0xa60/0x1790 [ 168.583892][T14737] __se_sys_perf_event_open+0x5c7/0x2740 [ 168.585003][T14737] ? vfs_write+0x50c/0x770 [ 168.585904][T14737] __x64_sys_perf_event_open+0x63/0x70 [ 168.587037][T14737] do_syscall_64+0x4a/0x90 [ 168.587968][T14737] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.589135][T14737] RIP: 0033:0x4665d9 [ 168.589930][T14737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.593855][T14737] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 168.595469][T14737] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 168.597121][T14737] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 168.598917][T14737] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 168.600433][T14737] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 22:46:16 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x14, 0x3) 22:46:16 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1b) 22:46:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x2}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:16 executing program 1 (fault-call:1 fault-nth:27): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x3000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 168.602046][T14737] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x4}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:16 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1c) [ 168.690261][T14757] FAULT_INJECTION: forcing a failure. [ 168.690261][T14757] name failslab, interval 1, probability 0, space 0, times 0 [ 168.694352][T14757] CPU: 0 PID: 14757 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 168.696797][T14757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.700029][T14757] Call Trace: [ 168.700957][T14757] dump_stack+0x137/0x19d [ 168.702231][T14757] should_fail+0x23c/0x250 [ 168.703159][T14757] __should_failslab+0x81/0x90 [ 168.703976][T14757] ? register_for_each_vma+0x372/0x890 [ 168.704795][T14757] should_failslab+0x5/0x20 [ 168.706206][T14757] kmem_cache_alloc_trace+0x49/0x310 [ 168.708200][T14757] ? register_for_each_vma+0x372/0x890 [ 168.710186][T14757] ? vma_interval_tree_iter_next+0x24c/0x280 [ 168.712197][T14757] register_for_each_vma+0x372/0x890 [ 168.713845][T14757] __uprobe_register+0x3f4/0x8a0 [ 168.715495][T14757] uprobe_register_refctr+0x29/0x40 [ 168.717282][T14757] probe_event_enable+0x2be/0x7d0 [ 168.719049][T14757] ? __uprobe_trace_func+0x430/0x430 [ 168.720936][T14757] trace_uprobe_register+0x88/0x410 [ 168.722478][T14757] perf_trace_event_init+0x34e/0x790 [ 168.724005][T14757] perf_uprobe_init+0xf5/0x140 [ 168.725474][T14757] perf_uprobe_event_init+0xde/0x140 [ 168.726740][T14757] perf_try_init_event+0x21a/0x400 [ 168.727807][T14757] perf_event_alloc+0xa60/0x1790 [ 168.728982][T14757] __se_sys_perf_event_open+0x5c7/0x2740 [ 168.730202][T14757] ? vfs_write+0x50c/0x770 [ 168.730980][T14757] __x64_sys_perf_event_open+0x63/0x70 [ 168.732481][T14757] do_syscall_64+0x4a/0x90 [ 168.733615][T14757] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.735159][T14757] RIP: 0033:0x4665d9 22:46:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x4000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:16 executing program 0 (fault-call:1 fault-nth:26): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:16 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1d) 22:46:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x8}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 168.735842][T14757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.740882][T14757] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 168.742552][T14757] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 168.744112][T14757] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 168.745708][T14757] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 168.747771][T14757] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 168.749609][T14757] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:16 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x15, 0x3) [ 168.814539][T14776] FAULT_INJECTION: forcing a failure. [ 168.814539][T14776] name failslab, interval 1, probability 0, space 0, times 0 [ 168.819265][T14776] CPU: 0 PID: 14776 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 168.822199][T14776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.825357][T14776] Call Trace: [ 168.826383][T14776] dump_stack+0x137/0x19d [ 168.827638][T14776] should_fail+0x23c/0x250 [ 168.828961][T14776] __should_failslab+0x81/0x90 [ 168.830147][T14776] ? register_for_each_vma+0x372/0x890 [ 168.831720][T14776] should_failslab+0x5/0x20 [ 168.833031][T14776] kmem_cache_alloc_trace+0x49/0x310 [ 168.834794][T14776] ? register_for_each_vma+0x372/0x890 [ 168.836339][T14776] ? vma_interval_tree_iter_next+0x263/0x280 [ 168.838403][T14776] register_for_each_vma+0x372/0x890 [ 168.840040][T14776] __uprobe_register+0x3f4/0x8a0 [ 168.841474][T14776] uprobe_register_refctr+0x29/0x40 [ 168.842516][T14776] probe_event_enable+0x2be/0x7d0 [ 168.843606][T14776] ? __uprobe_trace_func+0x430/0x430 [ 168.845126][T14776] trace_uprobe_register+0x88/0x410 [ 168.846153][T14776] perf_trace_event_init+0x34e/0x790 [ 168.847267][T14776] perf_uprobe_init+0xf5/0x140 [ 168.848841][T14776] perf_uprobe_event_init+0xde/0x140 [ 168.850192][T14776] perf_try_init_event+0x21a/0x400 [ 168.851521][T14776] perf_event_alloc+0xa60/0x1790 [ 168.852984][T14776] __se_sys_perf_event_open+0x5c7/0x2740 [ 168.854110][T14776] ? vfs_write+0x50c/0x770 [ 168.855386][T14776] __x64_sys_perf_event_open+0x63/0x70 [ 168.856536][T14776] do_syscall_64+0x4a/0x90 [ 168.857567][T14776] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.858762][T14776] RIP: 0033:0x4665d9 22:46:16 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1fe1) 22:46:16 executing program 1 (fault-call:1 fault-nth:28): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x11}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x5000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 168.859893][T14776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 168.864797][T14776] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 168.866823][T14776] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 168.868546][T14776] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 168.870658][T14776] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 168.872219][T14776] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 168.873713][T14776] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:16 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1fe4) 22:46:16 executing program 0 (fault-call:1 fault-nth:27): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 168.947305][T14794] FAULT_INJECTION: forcing a failure. [ 168.947305][T14794] name failslab, interval 1, probability 0, space 0, times 0 [ 168.951248][T14794] CPU: 1 PID: 14794 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 168.953708][T14794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.957110][T14794] Call Trace: [ 168.957956][T14794] dump_stack+0x137/0x19d [ 168.959083][T14794] should_fail+0x23c/0x250 [ 168.960224][T14794] __should_failslab+0x81/0x90 [ 168.961742][T14794] ? register_for_each_vma+0x372/0x890 [ 168.963873][T14794] should_failslab+0x5/0x20 [ 168.965299][T14794] kmem_cache_alloc_trace+0x49/0x310 [ 168.966969][T14794] ? register_for_each_vma+0x372/0x890 [ 168.968877][T14794] ? vma_interval_tree_iter_next+0x24c/0x280 [ 168.970792][T14794] register_for_each_vma+0x372/0x890 [ 168.972397][T14794] __uprobe_register+0x3f4/0x8a0 [ 168.974263][T14794] uprobe_register_refctr+0x29/0x40 [ 168.975973][T14794] probe_event_enable+0x2be/0x7d0 [ 168.977435][T14794] ? __uprobe_trace_func+0x430/0x430 [ 168.979354][T14794] trace_uprobe_register+0x88/0x410 [ 168.981028][T14794] perf_trace_event_init+0x34e/0x790 [ 168.982354][T14794] perf_uprobe_init+0xf5/0x140 [ 168.983391][T14794] perf_uprobe_event_init+0xde/0x140 [ 168.984787][T14794] perf_try_init_event+0x21a/0x400 [ 168.985685][T14794] perf_event_alloc+0xa60/0x1790 [ 168.986512][T14794] __se_sys_perf_event_open+0x5c7/0x2740 [ 168.987716][T14794] ? vfs_write+0x50c/0x770 [ 168.988598][T14794] __x64_sys_perf_event_open+0x63/0x70 [ 168.989740][T14794] do_syscall_64+0x4a/0x90 [ 168.990548][T14794] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 168.991979][T14794] RIP: 0033:0x4665d9 [ 168.992554][T14794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 22:46:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x6000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:16 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x16, 0x3) 22:46:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x60}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:16 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1fe7) 22:46:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x7000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0xe0}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 168.996435][T14794] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 168.997935][T14794] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 168.999487][T14794] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 169.001121][T14794] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 169.002583][T14794] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 169.003865][T14794] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:16 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1fea) [ 169.097861][T14811] FAULT_INJECTION: forcing a failure. [ 169.097861][T14811] name failslab, interval 1, probability 0, space 0, times 0 [ 169.101519][T14811] CPU: 1 PID: 14811 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 169.104159][T14811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.106875][T14811] Call Trace: [ 169.107670][T14811] dump_stack+0x137/0x19d [ 169.108693][T14811] should_fail+0x23c/0x250 [ 169.109699][T14811] __should_failslab+0x81/0x90 [ 169.111200][T14811] ? register_for_each_vma+0x372/0x890 [ 169.112547][T14811] should_failslab+0x5/0x20 [ 169.113261][T14811] kmem_cache_alloc_trace+0x49/0x310 [ 169.114193][T14811] ? register_for_each_vma+0x372/0x890 [ 169.115944][T14811] ? vma_interval_tree_iter_next+0x263/0x280 [ 169.117737][T14811] register_for_each_vma+0x372/0x890 [ 169.119176][T14811] __uprobe_register+0x3f4/0x8a0 [ 169.120714][T14811] uprobe_register_refctr+0x29/0x40 [ 169.122082][T14811] probe_event_enable+0x2be/0x7d0 [ 169.123670][T14811] ? __uprobe_trace_func+0x430/0x430 [ 169.125456][T14811] trace_uprobe_register+0x88/0x410 [ 169.127053][T14811] perf_trace_event_init+0x34e/0x790 [ 169.128705][T14811] perf_uprobe_init+0xf5/0x140 [ 169.130256][T14811] perf_uprobe_event_init+0xde/0x140 [ 169.132204][T14811] perf_try_init_event+0x21a/0x400 [ 169.134169][T14811] perf_event_alloc+0xa60/0x1790 [ 169.135684][T14811] __se_sys_perf_event_open+0x5c7/0x2740 [ 169.136572][T14811] ? vfs_write+0x50c/0x770 [ 169.137424][T14811] __x64_sys_perf_event_open+0x63/0x70 [ 169.138330][T14811] do_syscall_64+0x4a/0x90 [ 169.139110][T14811] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.140178][T14811] RIP: 0033:0x4665d9 [ 169.140858][T14811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.143896][T14811] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 169.145326][T14811] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 169.146527][T14811] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 22:46:16 executing program 1 (fault-call:1 fault-nth:29): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x1100}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:16 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1fed) 22:46:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x8000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 169.147878][T14811] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 169.149316][T14811] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 169.151144][T14811] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:17 executing program 0 (fault-call:1 fault-nth:28): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x6000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 169.196939][T14831] FAULT_INJECTION: forcing a failure. [ 169.196939][T14831] name failslab, interval 1, probability 0, space 0, times 0 [ 169.200074][T14831] CPU: 1 PID: 14831 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 169.201508][T14831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.203221][T14831] Call Trace: [ 169.203798][T14831] dump_stack+0x137/0x19d [ 169.204545][T14831] should_fail+0x23c/0x250 [ 169.205247][T14831] __should_failslab+0x81/0x90 [ 169.206023][T14831] ? register_for_each_vma+0x372/0x890 [ 169.206873][T14831] should_failslab+0x5/0x20 [ 169.207730][T14831] kmem_cache_alloc_trace+0x49/0x310 [ 169.208725][T14831] ? register_for_each_vma+0x372/0x890 [ 169.209814][T14831] ? vma_interval_tree_iter_next+0x263/0x280 [ 169.211238][T14831] register_for_each_vma+0x372/0x890 [ 169.212392][T14831] __uprobe_register+0x3f4/0x8a0 [ 169.213500][T14831] uprobe_register_refctr+0x29/0x40 [ 169.215319][T14831] probe_event_enable+0x2be/0x7d0 [ 169.216107][T14831] ? __uprobe_trace_func+0x430/0x430 [ 169.217112][T14831] trace_uprobe_register+0x88/0x410 [ 169.217979][T14831] perf_trace_event_init+0x34e/0x790 [ 169.218999][T14831] perf_uprobe_init+0xf5/0x140 [ 169.219837][T14831] perf_uprobe_event_init+0xde/0x140 [ 169.220833][T14831] perf_try_init_event+0x21a/0x400 [ 169.221622][T14831] perf_event_alloc+0xa60/0x1790 [ 169.222640][T14831] __se_sys_perf_event_open+0x5c7/0x2740 [ 169.223508][T14831] ? vfs_write+0x50c/0x770 [ 169.224506][T14831] __x64_sys_perf_event_open+0x63/0x70 [ 169.225510][T14831] do_syscall_64+0x4a/0x90 [ 169.226378][T14831] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.227661][T14831] RIP: 0033:0x4665d9 [ 169.228559][T14831] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.232016][T14831] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 169.233560][T14831] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 169.234750][T14831] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 169.236086][T14831] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 169.237299][T14831] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 169.238864][T14831] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:17 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x17, 0x3) 22:46:17 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1ffc) 22:46:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xa000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:17 executing program 1 (fault-call:1 fault-nth:30): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:17 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x2000) 22:46:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0xe000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 169.315015][T14849] FAULT_INJECTION: forcing a failure. [ 169.315015][T14849] name failslab, interval 1, probability 0, space 0, times 0 [ 169.317540][T14849] CPU: 0 PID: 14849 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 169.319212][T14849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.321126][T14849] Call Trace: [ 169.321755][T14849] dump_stack+0x137/0x19d [ 169.323006][T14849] should_fail+0x23c/0x250 [ 169.324698][T14849] __should_failslab+0x81/0x90 [ 169.325930][T14849] ? register_for_each_vma+0x372/0x890 [ 169.327071][T14849] should_failslab+0x5/0x20 [ 169.327872][T14849] kmem_cache_alloc_trace+0x49/0x310 [ 169.328890][T14849] ? register_for_each_vma+0x372/0x890 [ 169.329805][T14849] ? vma_interval_tree_iter_next+0x263/0x280 [ 169.331267][T14849] register_for_each_vma+0x372/0x890 [ 169.332308][T14849] __uprobe_register+0x3f4/0x8a0 [ 169.333163][T14849] uprobe_register_refctr+0x29/0x40 [ 169.334325][T14849] probe_event_enable+0x2be/0x7d0 [ 169.335338][T14849] ? __uprobe_trace_func+0x430/0x430 [ 169.336276][T14849] trace_uprobe_register+0x88/0x410 [ 169.337187][T14849] perf_trace_event_init+0x34e/0x790 [ 169.338171][T14849] perf_uprobe_init+0xf5/0x140 [ 169.339024][T14849] perf_uprobe_event_init+0xde/0x140 [ 169.339959][T14849] perf_try_init_event+0x21a/0x400 [ 169.340925][T14849] perf_event_alloc+0xa60/0x1790 [ 169.341826][T14849] __se_sys_perf_event_open+0x5c7/0x2740 [ 169.343066][T14849] ? vfs_write+0x50c/0x770 [ 169.343927][T14849] __x64_sys_perf_event_open+0x63/0x70 [ 169.345015][T14849] do_syscall_64+0x4a/0x90 [ 169.345803][T14849] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.346799][T14849] RIP: 0033:0x4665d9 [ 169.347479][T14849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.350705][T14849] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 169.352466][T14849] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 169.354423][T14849] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 169.355660][T14849] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 169.356889][T14849] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 169.358119][T14849] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x10000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:17 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x18, 0x3) 22:46:17 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x4000) 22:46:17 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x4001) 22:46:17 executing program 0 (fault-call:1 fault-nth:29): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x10000120, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x1000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x20010010, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 169.463420][T14863] FAULT_INJECTION: forcing a failure. [ 169.463420][T14863] name failslab, interval 1, probability 0, space 0, times 0 [ 169.465889][T14863] CPU: 0 PID: 14863 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 169.467550][T14863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.469055][T14863] Call Trace: [ 169.469686][T14863] dump_stack+0x137/0x19d [ 169.470618][T14863] should_fail+0x23c/0x250 [ 169.472064][T14863] __should_failslab+0x81/0x90 [ 169.473063][T14863] ? register_for_each_vma+0x372/0x890 [ 169.473922][T14863] should_failslab+0x5/0x20 [ 169.474835][T14863] kmem_cache_alloc_trace+0x49/0x310 [ 169.475626][T14863] ? register_for_each_vma+0x372/0x890 [ 169.476589][T14863] ? vma_interval_tree_iter_next+0x263/0x280 [ 169.477652][T14863] register_for_each_vma+0x372/0x890 [ 169.478676][T14863] __uprobe_register+0x3f4/0x8a0 [ 169.479601][T14863] uprobe_register_refctr+0x29/0x40 [ 169.480488][T14863] probe_event_enable+0x2be/0x7d0 [ 169.481430][T14863] ? __uprobe_trace_func+0x430/0x430 [ 169.482251][T14863] trace_uprobe_register+0x88/0x410 [ 169.483189][T14863] perf_trace_event_init+0x34e/0x790 [ 169.484363][T14863] perf_uprobe_init+0xf5/0x140 [ 169.485150][T14863] perf_uprobe_event_init+0xde/0x140 [ 169.486077][T14863] perf_try_init_event+0x21a/0x400 [ 169.486909][T14863] perf_event_alloc+0xa60/0x1790 [ 169.487765][T14863] __se_sys_perf_event_open+0x5c7/0x2740 [ 169.489074][T14863] ? vfs_write+0x50c/0x770 [ 169.490121][T14863] __x64_sys_perf_event_open+0x63/0x70 [ 169.491026][T14863] do_syscall_64+0x4a/0x90 [ 169.491892][T14863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.493101][T14863] RIP: 0033:0x4665d9 [ 169.493848][T14863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.496923][T14863] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 169.498370][T14863] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 169.499592][T14863] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 169.501091][T14863] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 169.502749][T14863] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 169.504035][T14863] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:17 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x4002) 22:46:17 executing program 1 (fault-call:1 fault-nth:31): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x2000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:17 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x8002) 22:46:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x3f000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 169.578851][T14885] FAULT_INJECTION: forcing a failure. [ 169.578851][T14885] name failslab, interval 1, probability 0, space 0, times 0 [ 169.581641][T14885] CPU: 0 PID: 14885 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 169.583080][T14885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.585110][T14885] Call Trace: [ 169.585818][T14885] dump_stack+0x137/0x19d [ 169.586594][T14885] should_fail+0x23c/0x250 [ 169.587354][T14885] __should_failslab+0x81/0x90 [ 169.588203][T14885] ? register_for_each_vma+0x372/0x890 [ 169.589176][T14885] should_failslab+0x5/0x20 [ 169.589996][T14885] kmem_cache_alloc_trace+0x49/0x310 [ 169.590834][T14885] ? register_for_each_vma+0x372/0x890 [ 169.591842][T14885] ? vma_interval_tree_iter_next+0x263/0x280 [ 169.592894][T14885] register_for_each_vma+0x372/0x890 [ 169.593693][T14885] __uprobe_register+0x3f4/0x8a0 [ 169.594811][T14885] uprobe_register_refctr+0x29/0x40 [ 169.595698][T14885] probe_event_enable+0x2be/0x7d0 [ 169.596820][T14885] ? __uprobe_trace_func+0x430/0x430 [ 169.597808][T14885] trace_uprobe_register+0x88/0x410 [ 169.599133][T14885] perf_trace_event_init+0x34e/0x790 [ 169.599945][T14885] perf_uprobe_init+0xf5/0x140 [ 169.600831][T14885] perf_uprobe_event_init+0xde/0x140 [ 169.602057][T14885] perf_try_init_event+0x21a/0x400 [ 169.603088][T14885] perf_event_alloc+0xa60/0x1790 [ 169.603863][T14885] __se_sys_perf_event_open+0x5c7/0x2740 [ 169.604684][T14885] ? vfs_write+0x50c/0x770 [ 169.605779][T14885] __x64_sys_perf_event_open+0x63/0x70 [ 169.606827][T14885] do_syscall_64+0x4a/0x90 [ 169.607655][T14885] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.608613][T14885] RIP: 0033:0x4665d9 [ 169.609273][T14885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.612491][T14885] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 169.613785][T14885] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 169.615008][T14885] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 169.616561][T14885] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 169.617943][T14885] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 169.619366][T14885] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:17 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x5e, 0x3) 22:46:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x4000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:17 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xc000) 22:46:17 executing program 0 (fault-call:1 fault-nth:30): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x8000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 169.650091][T14898] FAULT_INJECTION: forcing a failure. [ 169.650091][T14898] name failslab, interval 1, probability 0, space 0, times 0 [ 169.652552][T14898] CPU: 0 PID: 14898 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 169.654590][T14898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.656106][T14898] Call Trace: [ 169.656709][T14898] dump_stack+0x137/0x19d [ 169.657423][T14898] should_fail+0x23c/0x250 [ 169.658196][T14898] __should_failslab+0x81/0x90 [ 169.659023][T14898] ? register_for_each_vma+0x372/0x890 [ 169.659872][T14898] should_failslab+0x5/0x20 [ 169.660783][T14898] kmem_cache_alloc_trace+0x49/0x310 [ 169.661766][T14898] ? register_for_each_vma+0x372/0x890 [ 169.662650][T14898] ? vma_interval_tree_iter_next+0x263/0x280 [ 169.663775][T14898] register_for_each_vma+0x372/0x890 [ 169.664737][T14898] __uprobe_register+0x3f4/0x8a0 [ 169.665931][T14898] uprobe_register_refctr+0x29/0x40 [ 169.667104][T14898] probe_event_enable+0x2be/0x7d0 [ 169.668296][T14898] ? __uprobe_trace_func+0x430/0x430 [ 169.669299][T14898] trace_uprobe_register+0x88/0x410 [ 169.670122][T14898] perf_trace_event_init+0x34e/0x790 [ 169.671013][T14898] perf_uprobe_init+0xf5/0x140 [ 169.671832][T14898] perf_uprobe_event_init+0xde/0x140 [ 169.672780][T14898] perf_try_init_event+0x21a/0x400 [ 169.673693][T14898] perf_event_alloc+0xa60/0x1790 [ 169.674743][T14898] __se_sys_perf_event_open+0x5c7/0x2740 [ 169.676074][T14898] ? vfs_write+0x50c/0x770 [ 169.676814][T14898] __x64_sys_perf_event_open+0x63/0x70 [ 169.677679][T14898] do_syscall_64+0x4a/0x90 [ 169.678468][T14898] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.679457][T14898] RIP: 0033:0x4665d9 [ 169.680295][T14898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.684049][T14898] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 169.685537][T14898] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 169.686724][T14898] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 169.687916][T14898] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 169.689073][T14898] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 169.690575][T14898] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x40000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:17 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xc001) 22:46:17 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xc002) 22:46:17 executing program 1 (fault-call:1 fault-nth:32): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x60000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x11000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:17 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x1ff9, 0x3) [ 169.799320][T14926] FAULT_INJECTION: forcing a failure. [ 169.799320][T14926] name failslab, interval 1, probability 0, space 0, times 0 [ 169.802080][T14926] CPU: 0 PID: 14926 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 169.803444][T14926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.805216][T14926] Call Trace: [ 169.805797][T14926] dump_stack+0x137/0x19d [ 169.806507][T14926] should_fail+0x23c/0x250 [ 169.807255][T14926] __should_failslab+0x81/0x90 [ 169.808027][T14926] ? register_for_each_vma+0x372/0x890 [ 169.808881][T14926] should_failslab+0x5/0x20 [ 169.809693][T14926] kmem_cache_alloc_trace+0x49/0x310 [ 169.810559][T14926] ? register_for_each_vma+0x372/0x890 [ 169.811659][T14926] ? vma_interval_tree_iter_next+0x263/0x280 [ 169.812600][T14926] register_for_each_vma+0x372/0x890 [ 169.813578][T14926] __uprobe_register+0x3f4/0x8a0 [ 169.814439][T14926] uprobe_register_refctr+0x29/0x40 [ 169.815433][T14926] probe_event_enable+0x2be/0x7d0 [ 169.816199][T14926] ? __uprobe_trace_func+0x430/0x430 [ 169.817041][T14926] trace_uprobe_register+0x88/0x410 [ 169.817964][T14926] perf_trace_event_init+0x34e/0x790 [ 169.818743][T14926] perf_uprobe_init+0xf5/0x140 [ 169.819610][T14926] perf_uprobe_event_init+0xde/0x140 [ 169.820513][T14926] perf_try_init_event+0x21a/0x400 [ 169.821331][T14926] perf_event_alloc+0xa60/0x1790 [ 169.822195][T14926] __se_sys_perf_event_open+0x5c7/0x2740 [ 169.823094][T14926] ? vfs_write+0x50c/0x770 [ 169.824180][T14926] __x64_sys_perf_event_open+0x63/0x70 [ 169.825418][T14926] do_syscall_64+0x4a/0x90 [ 169.826139][T14926] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.827181][T14926] RIP: 0033:0x4665d9 [ 169.827967][T14926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.830998][T14926] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 169.832540][T14926] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 169.834005][T14926] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 169.835327][T14926] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 169.836622][T14926] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 169.837821][T14926] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x7ffffff7, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:17 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x7feff) 22:46:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x60000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:17 executing program 0 (fault-call:1 fault-nth:31): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0xe0000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:17 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x7ff00) 22:46:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x97ffffff, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0xfeffffff}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 169.914538][T14942] FAULT_INJECTION: forcing a failure. [ 169.914538][T14942] name failslab, interval 1, probability 0, space 0, times 0 [ 169.917124][T14942] CPU: 0 PID: 14942 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 169.918583][T14942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 169.920276][T14942] Call Trace: [ 169.920916][T14942] dump_stack+0x137/0x19d [ 169.921590][T14942] should_fail+0x23c/0x250 [ 169.922261][T14942] __should_failslab+0x81/0x90 [ 169.923087][T14942] ? register_for_each_vma+0x372/0x890 [ 169.923976][T14942] should_failslab+0x5/0x20 [ 169.924723][T14942] kmem_cache_alloc_trace+0x49/0x310 [ 169.925916][T14942] ? register_for_each_vma+0x372/0x890 [ 169.926854][T14942] ? vma_interval_tree_iter_next+0x24c/0x280 [ 169.928164][T14942] register_for_each_vma+0x372/0x890 [ 169.929280][T14942] __uprobe_register+0x3f4/0x8a0 [ 169.930188][T14942] uprobe_register_refctr+0x29/0x40 [ 169.931016][T14942] probe_event_enable+0x2be/0x7d0 [ 169.932238][T14942] ? __uprobe_trace_func+0x430/0x430 [ 169.933105][T14942] trace_uprobe_register+0x88/0x410 [ 169.934077][T14942] perf_trace_event_init+0x34e/0x790 [ 169.934932][T14942] perf_uprobe_init+0xf5/0x140 [ 169.935849][T14942] perf_uprobe_event_init+0xde/0x140 [ 169.936838][T14942] perf_try_init_event+0x21a/0x400 [ 169.937666][T14942] perf_event_alloc+0xa60/0x1790 [ 169.938520][T14942] __se_sys_perf_event_open+0x5c7/0x2740 [ 169.939576][T14942] ? vfs_write+0x50c/0x770 [ 169.940452][T14942] __x64_sys_perf_event_open+0x63/0x70 [ 169.941404][T14942] do_syscall_64+0x4a/0x90 [ 169.942092][T14942] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 169.943139][T14942] RIP: 0033:0x4665d9 [ 169.943893][T14942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 169.947319][T14942] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 169.949011][T14942] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 169.950435][T14942] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 169.951922][T14942] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 169.953256][T14942] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 169.954801][T14942] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 170.012004][T14942] ref_ctr going negative. vaddr: 0x20000004, curr val: -105, delta: 1 [ 170.013455][T14942] ref_ctr increment failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000a697ea26 22:46:17 executing program 1 (fault-call:1 fault-nth:33): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xe0000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:17 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x7ffff000) [ 170.043838][T14959] FAULT_INJECTION: forcing a failure. [ 170.043838][T14959] name failslab, interval 1, probability 0, space 0, times 0 [ 170.046686][T14959] CPU: 0 PID: 14959 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 170.048148][T14959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.049695][T14959] Call Trace: [ 170.050441][T14959] dump_stack+0x137/0x19d [ 170.051913][T14959] should_fail+0x23c/0x250 [ 170.052779][T14959] __should_failslab+0x81/0x90 [ 170.053588][T14959] ? register_for_each_vma+0x372/0x890 [ 170.054516][T14959] should_failslab+0x5/0x20 [ 170.055275][T14959] kmem_cache_alloc_trace+0x49/0x310 [ 170.056157][T14959] ? register_for_each_vma+0x372/0x890 [ 170.057149][T14959] ? vma_interval_tree_iter_next+0x263/0x280 [ 170.058164][T14959] register_for_each_vma+0x372/0x890 [ 170.059098][T14959] __uprobe_register+0x3f4/0x8a0 [ 170.060034][T14959] uprobe_register_refctr+0x29/0x40 [ 170.060915][T14959] probe_event_enable+0x2be/0x7d0 [ 170.061684][T14959] ? __uprobe_trace_func+0x430/0x430 [ 170.062524][T14959] trace_uprobe_register+0x88/0x410 [ 170.063382][T14959] perf_trace_event_init+0x34e/0x790 [ 170.064239][T14959] perf_uprobe_init+0xf5/0x140 [ 170.065011][T14959] perf_uprobe_event_init+0xde/0x140 [ 170.065867][T14959] perf_try_init_event+0x21a/0x400 [ 170.066670][T14959] perf_event_alloc+0xa60/0x1790 [ 170.067452][T14959] __se_sys_perf_event_open+0x5c7/0x2740 [ 170.068495][T14959] ? vfs_write+0x50c/0x770 [ 170.069422][T14959] __x64_sys_perf_event_open+0x63/0x70 [ 170.070369][T14959] do_syscall_64+0x4a/0x90 [ 170.071119][T14959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 170.072155][T14959] RIP: 0033:0x4665d9 [ 170.072920][T14959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.076430][T14959] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 170.078849][T14959] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 170.080065][T14959] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 170.081337][T14959] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 170.082620][T14959] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 170.084099][T14959] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 170.108678][T14977] FAULT_INJECTION: forcing a failure. [ 170.108678][T14977] name failslab, interval 1, probability 0, space 0, times 0 [ 170.111566][T14977] CPU: 1 PID: 14977 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 170.113267][T14977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.114798][T14977] Call Trace: [ 170.115479][T14977] dump_stack+0x137/0x19d [ 170.116689][T14977] should_fail+0x23c/0x250 [ 170.117841][T14977] __should_failslab+0x81/0x90 [ 170.118995][T14977] ? register_for_each_vma+0x372/0x890 [ 170.120017][T14977] should_failslab+0x5/0x20 [ 170.120766][T14977] kmem_cache_alloc_trace+0x49/0x310 [ 170.121746][T14977] ? register_for_each_vma+0x372/0x890 [ 170.122802][T14977] ? vma_interval_tree_iter_next+0x263/0x280 [ 170.124044][T14977] register_for_each_vma+0x372/0x890 [ 170.124914][T14977] __uprobe_register+0x3f4/0x8a0 [ 170.125854][T14977] uprobe_register_refctr+0x29/0x40 [ 170.126709][T14977] probe_event_enable+0x2be/0x7d0 [ 170.127612][T14977] ? __uprobe_trace_func+0x430/0x430 [ 170.128455][T14977] trace_uprobe_register+0x88/0x410 [ 170.129465][T14977] perf_trace_event_init+0x34e/0x790 [ 170.130328][T14977] perf_uprobe_init+0xf5/0x140 [ 170.131105][T14977] perf_uprobe_event_init+0xde/0x140 [ 170.132042][T14977] perf_try_init_event+0x21a/0x400 [ 170.133065][T14977] perf_event_alloc+0xa60/0x1790 [ 170.134140][T14977] __se_sys_perf_event_open+0x5c7/0x2740 [ 170.135169][T14977] ? vfs_write+0x50c/0x770 [ 170.135910][T14977] __x64_sys_perf_event_open+0x63/0x70 [ 170.137032][T14977] do_syscall_64+0x4a/0x90 [ 170.137831][T14977] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 170.138940][T14977] RIP: 0033:0x4665d9 [ 170.139565][T14977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.142574][T14977] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 170.144152][T14977] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 170.145337][T14977] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 170.146761][T14977] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 170.148004][T14977] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 170.149424][T14977] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:18 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x2000, 0x3) 22:46:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0xffffff7f}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:18 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x7ffffffffffff) 22:46:18 executing program 1 (fault-call:1 fault-nth:34): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:18 executing program 0 (fault-call:1 fault-nth:32): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xe0ffffff, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:18 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xffffffffffffffff) 22:46:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0xfffffffe}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 170.245319][T14994] FAULT_INJECTION: forcing a failure. [ 170.245319][T14994] name failslab, interval 1, probability 0, space 0, times 0 [ 170.247706][T14994] CPU: 1 PID: 14994 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 170.249169][T14994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.250885][T14994] Call Trace: [ 170.251465][T14994] dump_stack+0x137/0x19d [ 170.252157][T14994] should_fail+0x23c/0x250 [ 170.252944][T14994] __should_failslab+0x81/0x90 [ 170.253853][T14994] ? register_for_each_vma+0x372/0x890 [ 170.254762][T14994] should_failslab+0x5/0x20 [ 170.255499][T14994] kmem_cache_alloc_trace+0x49/0x310 [ 170.256240][T14994] ? register_for_each_vma+0x372/0x890 [ 170.257568][T14994] ? vma_interval_tree_iter_next+0x24c/0x280 [ 170.258564][T14994] register_for_each_vma+0x372/0x890 [ 170.259715][T14994] __uprobe_register+0x3f4/0x8a0 [ 170.260629][T14994] uprobe_register_refctr+0x29/0x40 [ 170.261864][T14994] probe_event_enable+0x2be/0x7d0 [ 170.262856][T14994] ? __uprobe_trace_func+0x430/0x430 [ 170.264296][T14994] trace_uprobe_register+0x88/0x410 [ 170.265451][T14994] perf_trace_event_init+0x34e/0x790 [ 170.266266][T14994] perf_uprobe_init+0xf5/0x140 [ 170.267209][T14994] perf_uprobe_event_init+0xde/0x140 [ 170.268198][T14994] perf_try_init_event+0x21a/0x400 [ 170.269190][T14994] perf_event_alloc+0xa60/0x1790 [ 170.269928][T14994] __se_sys_perf_event_open+0x5c7/0x2740 [ 170.270893][T14994] ? vfs_write+0x50c/0x770 [ 170.271622][T14994] __x64_sys_perf_event_open+0x63/0x70 [ 170.272424][T14994] do_syscall_64+0x4a/0x90 [ 170.273034][T14994] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 170.274082][T14994] RIP: 0033:0x4665d9 [ 170.274621][T14994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.277525][T14994] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 170.278852][T14994] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 170.280060][T14994] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 170.281432][T14994] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 170.282712][T14994] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 170.284346][T14994] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x100000000000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xeffdffff, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000580)={@ipv4={""/10, ""/2, @empty}}, &(0x7f00000005c0)=0x14) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) [ 170.303566][T14998] FAULT_INJECTION: forcing a failure. [ 170.303566][T14998] name failslab, interval 1, probability 0, space 0, times 0 [ 170.305975][T14998] CPU: 0 PID: 14998 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 170.307630][T14998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.309625][T14998] Call Trace: [ 170.310253][T14998] dump_stack+0x137/0x19d [ 170.311239][T14998] should_fail+0x23c/0x250 [ 170.311968][T14998] __should_failslab+0x81/0x90 [ 170.312969][T14998] ? register_for_each_vma+0x372/0x890 [ 170.314138][T14998] should_failslab+0x5/0x20 [ 170.315025][T14998] kmem_cache_alloc_trace+0x49/0x310 [ 170.316347][T14998] ? register_for_each_vma+0x372/0x890 [ 170.317336][T14998] ? vma_interval_tree_iter_next+0x263/0x280 [ 170.318525][T14998] register_for_each_vma+0x372/0x890 [ 170.319498][T14998] __uprobe_register+0x3f4/0x8a0 [ 170.320581][T14998] uprobe_register_refctr+0x29/0x40 [ 170.321399][T14998] probe_event_enable+0x2be/0x7d0 [ 170.322761][T14998] ? __uprobe_trace_func+0x430/0x430 [ 170.323994][T14998] trace_uprobe_register+0x88/0x410 [ 170.324892][T14998] perf_trace_event_init+0x34e/0x790 [ 170.325934][T14998] perf_uprobe_init+0xf5/0x140 [ 170.326892][T14998] perf_uprobe_event_init+0xde/0x140 [ 170.327760][T14998] perf_try_init_event+0x21a/0x400 [ 170.328712][T14998] perf_event_alloc+0xa60/0x1790 [ 170.329756][T14998] __se_sys_perf_event_open+0x5c7/0x2740 [ 170.331007][T14998] ? vfs_write+0x50c/0x770 [ 170.332020][T14998] __x64_sys_perf_event_open+0x63/0x70 [ 170.332826][T14998] do_syscall_64+0x4a/0x90 [ 170.333614][T14998] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 170.334664][T14998] RIP: 0033:0x4665d9 [ 170.335477][T14998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 170.338796][T14998] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 170.340161][T14998] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 170.341525][T14998] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 170.342890][T14998] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 170.344277][T14998] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 170.345625][T14998] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:18 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0xffffffffffffffff, 0x3) 22:46:18 executing program 1 (fault-call:1 fault-nth:35): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x200000000000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 170.413471][T15017] PM: suspend entry (deep) [ 170.432657][T15017] Filesystems sync: 0.018 seconds [ 170.434391][T15017] Freezing user space processes ... (elapsed 0.014 seconds) done. [ 170.450787][T15017] OOM killer disabled. [ 170.451531][T15017] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 170.454196][T15017] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xf7ffff7f, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 170.490780][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 170.991140][T15017] ACPI: Preparing to enter system sleep state S3 [ 170.991272][T15017] PM: Saving platform NVS memory [ 170.991276][T15017] Disabling non-boot CPUs ... [ 170.994425][T15017] smpboot: CPU 1 is now offline [ 171.000089][T15017] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 171.000203][T15017] ACPI: Low-level resume complete [ 171.000359][T15017] PM: Restoring platform NVS memory [ 171.000385][T15017] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 171.012266][T15017] Enabling non-boot CPUs ... [ 171.012425][T15017] x86: Booting SMP configuration: [ 171.012429][T15017] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 171.012631][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 171.013656][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 171.015131][T15017] CPU1 is up [ 171.015428][T15017] ACPI: Waking up from system sleep state S3 [ 171.122056][T15017] OOM killer enabled. [ 171.122638][T15017] Restarting tasks ... done. [ 171.139068][T15024] FAULT_INJECTION: forcing a failure. [ 171.139068][T15024] name failslab, interval 1, probability 0, space 0, times 0 [ 171.141495][T15024] CPU: 1 PID: 15024 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 171.142968][T15024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.144822][T15024] Call Trace: [ 171.145386][T15024] dump_stack+0x137/0x19d [ 171.146183][T15017] PM: suspend exit [ 171.146601][T15024] should_fail+0x23c/0x250 [ 171.146623][T15024] __should_failslab+0x81/0x90 [ 171.146645][T15024] ? register_for_each_vma+0x372/0x890 [ 171.146669][T15024] should_failslab+0x5/0x20 [ 171.146682][T15024] kmem_cache_alloc_trace+0x49/0x310 [ 171.152392][T15024] ? register_for_each_vma+0x372/0x890 [ 171.153535][T15024] ? vma_interval_tree_iter_next+0x24c/0x280 [ 171.155026][T15024] register_for_each_vma+0x372/0x890 22:46:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x400000000000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:18 executing program 0 (fault-call:1 fault-nth:33): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:18 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = dup(r0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf, 0x100010, r1, 0x6cc42000) 22:46:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xfc000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x800000000000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 171.155994][T15024] __uprobe_register+0x3f4/0x8a0 [ 171.156874][T15024] uprobe_register_refctr+0x29/0x40 [ 171.157792][T15024] probe_event_enable+0x2be/0x7d0 [ 171.158578][T15024] ? __uprobe_trace_func+0x430/0x430 [ 171.159431][T15024] trace_uprobe_register+0x88/0x410 [ 171.160288][T15024] perf_trace_event_init+0x34e/0x790 [ 171.161278][T15024] perf_uprobe_init+0xf5/0x140 [ 171.162198][T15024] perf_uprobe_event_init+0xde/0x140 [ 171.163106][T15024] perf_try_init_event+0x21a/0x400 [ 171.163938][T15024] perf_event_alloc+0xa60/0x1790 [ 171.164846][T15024] __se_sys_perf_event_open+0x5c7/0x2740 [ 171.165834][T15024] ? vfs_write+0x50c/0x770 [ 171.166976][T15024] __x64_sys_perf_event_open+0x63/0x70 [ 171.168040][T15024] do_syscall_64+0x4a/0x90 [ 171.168883][T15024] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 171.169920][T15024] RIP: 0033:0x4665d9 [ 171.170644][T15024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 171.174003][T15024] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 171.175397][T15024] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 171.176660][T15024] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 171.177890][T15024] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 171.179044][T15024] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 171.180487][T15024] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 171.200477][T15024] ref_ctr going negative. vaddr: 0x20000004, curr val: -9, delta: 1 [ 171.201899][T15024] ref_ctr increment failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000012acec26 [ 171.222846][T15041] PM: suspend entry (deep) [ 171.234034][T15041] Filesystems sync: 0.010 seconds [ 171.235789][T15041] Freezing user space processes ... [ 171.250217][T15038] FAULT_INJECTION: forcing a failure. [ 171.250217][T15038] name failslab, interval 1, probability 0, space 0, times 0 [ 171.254186][T15038] CPU: 0 PID: 15038 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 171.255550][T15038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.257531][T15038] Call Trace: [ 171.258166][T15038] dump_stack+0x137/0x19d [ 171.258870][T15038] should_fail+0x23c/0x250 [ 171.259800][T15038] __should_failslab+0x81/0x90 [ 171.260481][T15038] ? register_for_each_vma+0x372/0x890 [ 171.261302][T15038] should_failslab+0x5/0x20 [ 171.262108][T15038] kmem_cache_alloc_trace+0x49/0x310 [ 171.263413][T15038] ? register_for_each_vma+0x372/0x890 [ 171.264422][T15038] ? vma_interval_tree_iter_next+0x263/0x280 [ 171.265415][T15038] register_for_each_vma+0x372/0x890 [ 171.266475][T15038] __uprobe_register+0x3f4/0x8a0 [ 171.267370][T15038] uprobe_register_refctr+0x29/0x40 [ 171.268163][T15038] probe_event_enable+0x2be/0x7d0 [ 171.268979][T15038] ? __uprobe_trace_func+0x430/0x430 [ 171.269899][T15038] trace_uprobe_register+0x88/0x410 [ 171.270860][T15038] perf_trace_event_init+0x34e/0x790 [ 171.271713][T15038] perf_uprobe_init+0xf5/0x140 [ 171.272506][T15038] perf_uprobe_event_init+0xde/0x140 [ 171.273917][T15038] perf_try_init_event+0x21a/0x400 [ 171.274681][T15038] perf_event_alloc+0xa60/0x1790 [ 171.275652][T15038] __se_sys_perf_event_open+0x5c7/0x2740 [ 171.276671][T15038] ? vfs_write+0x50c/0x770 [ 171.277328][T15038] __x64_sys_perf_event_open+0x63/0x70 [ 171.278516][T15038] do_syscall_64+0x4a/0x90 [ 171.279257][T15038] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 171.280540][T15038] RIP: 0033:0x4665d9 [ 171.281271][T15038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 171.284690][T15038] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 171.286182][T15038] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 171.287505][T15038] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 171.288731][T15038] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 171.290182][T15038] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 171.293030][T15038] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 171.302414][T15041] (elapsed 0.066 seconds) done. [ 171.303325][T15041] OOM killer disabled. [ 171.303982][T15041] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 171.307136][T15041] printk: Suspending console(s) (use no_console_suspend to debug) [ 171.554242][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 172.058625][T15041] ACPI: Preparing to enter system sleep state S3 [ 172.058723][T15041] PM: Saving platform NVS memory [ 172.058728][T15041] Disabling non-boot CPUs ... [ 172.061143][T15041] smpboot: CPU 1 is now offline [ 172.063562][T15041] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 172.063633][T15041] ACPI: Low-level resume complete [ 172.063709][T15041] PM: Restoring platform NVS memory [ 172.063718][T15041] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 172.073970][T15041] Enabling non-boot CPUs ... [ 172.074168][T15041] x86: Booting SMP configuration: [ 172.074172][T15041] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 172.074405][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 172.075518][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 172.077079][T15041] CPU1 is up [ 172.077204][T15041] ACPI: Waking up from system sleep state S3 [ 172.116170][T15046] hwrng: no data available [ 172.169226][T15041] OOM killer enabled. 22:46:20 executing program 1 (fault-call:1 fault-nth:36): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:20 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x2) [ 172.169856][T15041] Restarting tasks ... done. [ 172.214506][T15041] PM: suspend exit 22:46:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xfc010000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:20 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r1, r0, &(0x7f0000000000)=0x7, 0x100000000003) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f00000001c0)={{0x6e, 0x9d}, 'port0\x00', 0x20, 0x41004, 0x200, 0xffffff81, 0x7, 0x80000001, 0xd290, 0x0, 0x2, 0x4}) accept$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @remote}}, &(0x7f00000000c0)=0x1c) 22:46:20 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x1100000000000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:20 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x4) [ 172.281389][T15059] FAULT_INJECTION: forcing a failure. [ 172.281389][T15059] name failslab, interval 1, probability 0, space 0, times 0 [ 172.283668][T15059] CPU: 1 PID: 15059 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 172.285201][T15059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.286852][T15059] Call Trace: [ 172.287559][T15059] dump_stack+0x137/0x19d [ 172.288525][T15059] should_fail+0x23c/0x250 [ 172.289484][T15059] __should_failslab+0x81/0x90 [ 172.290313][T15059] ? register_for_each_vma+0x372/0x890 [ 172.291315][T15059] should_failslab+0x5/0x20 [ 172.292115][T15059] kmem_cache_alloc_trace+0x49/0x310 [ 172.293109][T15059] ? register_for_each_vma+0x372/0x890 [ 172.294348][T15059] ? vma_interval_tree_iter_next+0x263/0x280 [ 172.295473][T15059] register_for_each_vma+0x372/0x890 [ 172.296461][T15059] __uprobe_register+0x3f4/0x8a0 [ 172.297257][T15059] uprobe_register_refctr+0x29/0x40 [ 172.298554][T15059] probe_event_enable+0x2be/0x7d0 [ 172.299600][T15059] ? __uprobe_trace_func+0x430/0x430 [ 172.300813][T15059] trace_uprobe_register+0x88/0x410 [ 172.301878][T15059] perf_trace_event_init+0x34e/0x790 [ 172.303090][T15059] perf_uprobe_init+0xf5/0x140 [ 172.303962][T15059] perf_uprobe_event_init+0xde/0x140 [ 172.305022][T15059] perf_try_init_event+0x21a/0x400 [ 172.305887][T15059] perf_event_alloc+0xa60/0x1790 [ 172.306757][T15059] __se_sys_perf_event_open+0x5c7/0x2740 [ 172.307855][T15059] ? vfs_write+0x50c/0x770 [ 172.308845][T15059] __x64_sys_perf_event_open+0x63/0x70 [ 172.309671][T15059] do_syscall_64+0x4a/0x90 [ 172.310424][T15059] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 172.311894][T15059] RIP: 0033:0x4665d9 [ 172.312659][T15059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 172.316484][T15059] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 172.317937][T15059] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 172.319467][T15059] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 172.320820][T15059] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 22:46:20 executing program 0 (fault-call:1 fault-nth:34): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:20 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x42, 0xac) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) r2 = syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f0000000280)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="4971556d72fb702cac02491e53a55c1f0734955cc3db405e8ee9595ef5990a9936cbf8eeacf3a1880cd66b5eabe1ab9ba87993b73f1a5c2220c440a241a40dfac6e61f1cc24b6e021ccdb7edf9dd0f8707a08dfc819d56a914d664401aa6f8c0a7872a94b2d61672210f7a1ff9008204cfe6d10b6c38c73b9f50171c5bf3f41e416d368f76a7d8ea1e236917173a1183c2e812dbc90ecc6648fa86f00453dfc4310f", 0xa2, 0xd5}], 0x80, &(0x7f00000003c0)=ANY=[@ANYBLOB="6a71666d743d76667376312c636f6e746578743d756e636f6e666965645f752c646f6e745f686173682c7063723d30303030303030303001000000010000003035362c7569643c00", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pwrite64(r2, &(0x7f0000000440)="48434f41e5f366102087e7d4ff17a53b077fe32e", 0x14, 0x13) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f00000001c0)={{0x9, 0x7f}, 0x1, 0x7f, 0x7, {0x80}, 0x3, 0x8000}) r3 = syz_open_dev$loop(&(0x7f0000000000), 0x4, 0x82000) tee(r3, r0, 0x6, 0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r0, r1, &(0x7f0000000040)=0x4ca, 0x0) 22:46:20 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x6000000000000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:20 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0xe000000000000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xfe800000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 172.324262][T15059] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 172.332430][T15059] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 172.385802][T15082] loop4: detected capacity change from 0 to 264192 [ 172.393811][T15082] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 172.415757][T15078] FAULT_INJECTION: forcing a failure. [ 172.415757][T15078] name failslab, interval 1, probability 0, space 0, times 0 [ 172.428522][T15078] CPU: 1 PID: 15078 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 172.437291][T15078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.447490][T15078] Call Trace: [ 172.450763][T15078] dump_stack+0x137/0x19d [ 172.455118][T15078] should_fail+0x23c/0x250 [ 172.459526][T15078] __should_failslab+0x81/0x90 [ 172.464341][T15078] ? register_for_each_vma+0x372/0x890 [ 172.469838][T15078] should_failslab+0x5/0x20 [ 172.474326][T15078] kmem_cache_alloc_trace+0x49/0x310 [ 172.479690][T15078] ? register_for_each_vma+0x372/0x890 [ 172.485145][T15078] ? vma_interval_tree_iter_next+0x24c/0x280 [ 172.491207][T15078] register_for_each_vma+0x372/0x890 [ 172.496490][T15078] __uprobe_register+0x3f4/0x8a0 [ 172.501417][T15078] uprobe_register_refctr+0x29/0x40 [ 172.506687][T15078] probe_event_enable+0x2be/0x7d0 [ 172.511696][T15078] ? __uprobe_trace_func+0x430/0x430 [ 172.516964][T15078] trace_uprobe_register+0x88/0x410 [ 172.522199][T15078] perf_trace_event_init+0x34e/0x790 [ 172.527523][T15078] perf_uprobe_init+0xf5/0x140 [ 172.532280][T15078] perf_uprobe_event_init+0xde/0x140 [ 172.537580][T15078] perf_try_init_event+0x21a/0x400 [ 172.542695][T15078] perf_event_alloc+0xa60/0x1790 [ 172.547672][T15078] __se_sys_perf_event_open+0x5c7/0x2740 [ 172.553299][T15078] ? vfs_write+0x50c/0x770 [ 172.557720][T15078] __x64_sys_perf_event_open+0x63/0x70 [ 172.563255][T15078] do_syscall_64+0x4a/0x90 [ 172.567741][T15078] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 172.573737][T15078] RIP: 0033:0x4665d9 [ 172.577619][T15078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 172.597459][T15078] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 172.606097][T15078] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 172.614054][T15078] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 172.622003][T15078] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 22:46:20 executing program 1 (fault-call:1 fault-nth:37): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:20 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0xfeffffff00000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xfe80ffff, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 172.629953][T15078] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 172.637915][T15078] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 172.667046][T15093] loop4: detected capacity change from 0 to 264192 22:46:20 executing program 0 (fault-call:1 fault-nth:35): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:20 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0xffffff7f00000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:20 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x5) [ 172.716970][T15093] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 172.734884][T15105] FAULT_INJECTION: forcing a failure. [ 172.734884][T15105] name failslab, interval 1, probability 0, space 0, times 0 [ 172.747610][T15105] CPU: 0 PID: 15105 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 172.756373][T15105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 172.766521][T15105] Call Trace: [ 172.769805][T15105] dump_stack+0x137/0x19d [ 172.774169][T15105] should_fail+0x23c/0x250 [ 172.778680][T15105] __should_failslab+0x81/0x90 [ 172.783559][T15105] ? register_for_each_vma+0x372/0x890 [ 172.789028][T15105] should_failslab+0x5/0x20 [ 172.793518][T15105] kmem_cache_alloc_trace+0x49/0x310 [ 172.798907][T15105] ? register_for_each_vma+0x372/0x890 [ 172.804582][T15105] ? vma_interval_tree_iter_next+0x24c/0x280 [ 172.810627][T15105] register_for_each_vma+0x372/0x890 [ 172.815960][T15105] __uprobe_register+0x3f4/0x8a0 [ 172.820886][T15105] uprobe_register_refctr+0x29/0x40 [ 172.826111][T15105] probe_event_enable+0x2be/0x7d0 [ 172.831128][T15105] ? __uprobe_trace_func+0x430/0x430 [ 172.836520][T15105] trace_uprobe_register+0x88/0x410 [ 172.841773][T15105] perf_trace_event_init+0x34e/0x790 [ 172.847045][T15105] perf_uprobe_init+0xf5/0x140 [ 172.851789][T15105] perf_uprobe_event_init+0xde/0x140 [ 172.857308][T15105] perf_try_init_event+0x21a/0x400 [ 172.862416][T15105] perf_event_alloc+0xa60/0x1790 [ 172.867346][T15105] __se_sys_perf_event_open+0x5c7/0x2740 [ 172.872967][T15105] ? vfs_write+0x50c/0x770 [ 172.877420][T15105] __x64_sys_perf_event_open+0x63/0x70 [ 172.883012][T15105] do_syscall_64+0x4a/0x90 [ 172.887468][T15105] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 172.893347][T15105] RIP: 0033:0x4665d9 [ 172.897226][T15105] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 172.916836][T15105] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 172.925432][T15105] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 172.933411][T15105] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 172.941490][T15105] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 172.949558][T15105] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 172.957522][T15105] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:20 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xfec0ffff, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 172.974432][T15107] FAULT_INJECTION: forcing a failure. [ 172.974432][T15107] name failslab, interval 1, probability 0, space 0, times 0 [ 172.987084][T15107] CPU: 0 PID: 15107 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 172.995868][T15107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.005936][T15107] Call Trace: [ 173.009218][T15107] dump_stack+0x137/0x19d [ 173.013576][T15107] should_fail+0x23c/0x250 [ 173.018045][T15107] __should_failslab+0x81/0x90 [ 173.022912][T15107] ? register_for_each_vma+0x372/0x890 [ 173.028381][T15107] should_failslab+0x5/0x20 [ 173.032871][T15107] kmem_cache_alloc_trace+0x49/0x310 [ 173.038238][T15107] ? register_for_each_vma+0x372/0x890 [ 173.043759][T15107] ? vma_interval_tree_iter_next+0x24c/0x280 [ 173.049743][T15107] register_for_each_vma+0x372/0x890 [ 173.055058][T15107] __uprobe_register+0x3f4/0x8a0 [ 173.060125][T15107] uprobe_register_refctr+0x29/0x40 [ 173.065311][T15107] probe_event_enable+0x2be/0x7d0 [ 173.070325][T15107] ? __uprobe_trace_func+0x430/0x430 [ 173.075594][T15107] trace_uprobe_register+0x88/0x410 [ 173.080830][T15107] perf_trace_event_init+0x34e/0x790 [ 173.086108][T15107] perf_uprobe_init+0xf5/0x140 [ 173.090854][T15107] perf_uprobe_event_init+0xde/0x140 [ 173.096137][T15107] perf_try_init_event+0x21a/0x400 [ 173.101232][T15107] perf_event_alloc+0xa60/0x1790 [ 173.106189][T15107] __se_sys_perf_event_open+0x5c7/0x2740 [ 173.111861][T15107] ? vfs_write+0x50c/0x770 [ 173.116341][T15107] __x64_sys_perf_event_open+0x63/0x70 [ 173.121785][T15107] do_syscall_64+0x4a/0x90 [ 173.126267][T15107] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 173.132157][T15107] RIP: 0033:0x4665d9 [ 173.136043][T15107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 173.155767][T15107] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 173.164207][T15107] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 22:46:21 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) preadv(r0, &(0x7f0000001440)=[{&(0x7f00000001c0)}, {&(0x7f0000000200)=""/215, 0xd7}, {&(0x7f0000000300)=""/3, 0x3}, {&(0x7f0000000340)=""/202, 0xca}, {&(0x7f0000000440)=""/4096, 0x1000}], 0x5, 0x80000001, 0x9) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) r3 = dup3(r2, r1, 0x0) write$P9_RREMOVE(r3, &(0x7f0000001740)={0x7, 0x7b, 0x2}, 0x7) recvmmsg(0xffffffffffffffff, &(0x7f00000016c0)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000014c0)=""/213, 0xd5}], 0x1, &(0x7f0000000140)=""/121, 0x79}, 0xabf7}], 0x1, 0x40000000, &(0x7f0000001700)={0x0, 0x3938700}) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000015c0)={{{@in=@multicast2}}, {{@in6=@local}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:21 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xff000000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 173.172184][T15107] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 173.180223][T15107] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 173.188180][T15107] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 173.196140][T15107] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:21 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0xffffffff00000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:21 executing program 1 (fault-call:1 fault-nth:38): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 173.257336][T15123] PM: suspend entry (deep) [ 173.265752][T15106] ref_ctr going negative. vaddr: 0x20000004, curr val: -16130, delta: -1 [ 173.270863][T15123] Filesystems sync: 0.009 seconds [ 173.274343][T15106] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000de64637d [ 173.291173][T15123] Freezing user space processes ... (elapsed 0.021 seconds) done. [ 173.320950][T15123] OOM killer disabled. [ 173.324994][T15123] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 173.334746][T15123] printk: Suspending console(s) (use no_console_suspend to debug) [ 173.376795][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 182.250047][T15123] ACPI: Preparing to enter system sleep state S3 [ 182.250246][T15123] PM: Saving platform NVS memory [ 182.250251][T15123] Disabling non-boot CPUs ... [ 182.253765][T15123] smpboot: CPU 1 is now offline [ 182.256080][T15123] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 182.256142][T15123] ACPI: Low-level resume complete [ 182.256272][T15123] PM: Restoring platform NVS memory [ 182.256281][T15123] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 182.271931][T15123] Enabling non-boot CPUs ... [ 182.272091][T15123] x86: Booting SMP configuration: [ 182.272095][T15123] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 182.272278][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 182.273399][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 182.274781][T15123] CPU1 is up [ 182.275036][T15123] ACPI: Waking up from system sleep state S3 [ 182.379477][T15123] OOM killer enabled. [ 182.380320][T15123] Restarting tasks ... done. [ 182.405325][T15123] PM: suspend exit [ 182.406904][T15135] FAULT_INJECTION: forcing a failure. [ 182.406904][T15135] name failslab, interval 1, probability 0, space 0, times 0 [ 182.410995][T15135] CPU: 1 PID: 15135 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 182.413610][T15135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.416872][T15135] Call Trace: [ 182.417763][T15135] dump_stack+0x137/0x19d [ 182.419126][T15135] should_fail+0x23c/0x250 [ 182.420318][T15135] __should_failslab+0x81/0x90 [ 182.421816][T15135] ? register_for_each_vma+0x372/0x890 [ 182.423552][T15135] should_failslab+0x5/0x20 [ 182.424921][T15135] kmem_cache_alloc_trace+0x49/0x310 [ 182.426161][T15135] ? register_for_each_vma+0x372/0x890 [ 182.427610][T15135] ? vma_interval_tree_iter_next+0x263/0x280 [ 182.428943][T15135] register_for_each_vma+0x372/0x890 [ 182.430216][T15135] __uprobe_register+0x3f4/0x8a0 [ 182.431886][T15135] uprobe_register_refctr+0x29/0x40 [ 182.433336][T15135] probe_event_enable+0x2be/0x7d0 [ 182.434738][T15135] ? __uprobe_trace_func+0x430/0x430 [ 182.436452][T15135] trace_uprobe_register+0x88/0x410 [ 182.437943][T15135] perf_trace_event_init+0x34e/0x790 [ 182.439754][T15135] perf_uprobe_init+0xf5/0x140 [ 182.440902][T15135] perf_uprobe_event_init+0xde/0x140 [ 182.442418][T15135] perf_try_init_event+0x21a/0x400 [ 182.443783][T15135] perf_event_alloc+0xa60/0x1790 [ 182.445404][T15135] __se_sys_perf_event_open+0x5c7/0x2740 [ 182.447445][T15135] ? vfs_write+0x50c/0x770 [ 182.448681][T15135] __x64_sys_perf_event_open+0x63/0x70 [ 182.449942][T15135] do_syscall_64+0x4a/0x90 [ 182.450901][T15135] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.452191][T15135] RIP: 0033:0x4665d9 [ 182.453104][T15135] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.457286][T15135] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 182.458668][T15135] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 22:46:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xffff0000, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:30 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x6) 22:46:30 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0xffffffffffffffff}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:30 executing program 0 (fault-call:1 fault-nth:36): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:30 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x400002, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendfile(r1, r0, &(0x7f0000000040)=0xffffffff, 0x3) [ 182.460422][T15135] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 182.461912][T15135] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 182.463752][T15135] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 182.465521][T15135] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 182.534270][T15151] FAULT_INJECTION: forcing a failure. [ 182.534270][T15151] name failslab, interval 1, probability 0, space 0, times 0 [ 182.538194][T15151] CPU: 0 PID: 15151 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 182.540580][T15151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.543502][T15151] Call Trace: [ 182.544294][T15151] dump_stack+0x137/0x19d [ 182.545679][T15151] should_fail+0x23c/0x250 [ 182.547004][T15151] __should_failslab+0x81/0x90 [ 182.548642][T15151] ? register_for_each_vma+0x372/0x890 [ 182.550497][T15151] should_failslab+0x5/0x20 [ 182.551551][T15151] kmem_cache_alloc_trace+0x49/0x310 [ 182.552846][T15151] ? register_for_each_vma+0x372/0x890 [ 182.554556][T15151] ? vma_interval_tree_iter_next+0x263/0x280 [ 182.556060][T15151] register_for_each_vma+0x372/0x890 [ 182.557599][T15151] __uprobe_register+0x3f4/0x8a0 [ 182.559050][T15151] uprobe_register_refctr+0x29/0x40 [ 182.560292][T15151] probe_event_enable+0x2be/0x7d0 [ 182.561660][T15151] ? __uprobe_trace_func+0x430/0x430 [ 182.563182][T15151] trace_uprobe_register+0x88/0x410 [ 182.564912][T15151] perf_trace_event_init+0x34e/0x790 [ 182.566493][T15151] perf_uprobe_init+0xf5/0x140 [ 182.567855][T15151] perf_uprobe_event_init+0xde/0x140 [ 182.569356][T15151] perf_try_init_event+0x21a/0x400 [ 182.570767][T15151] perf_event_alloc+0xa60/0x1790 [ 182.572298][T15151] __se_sys_perf_event_open+0x5c7/0x2740 [ 182.573873][T15151] ? vfs_write+0x50c/0x770 [ 182.574961][T15151] __x64_sys_perf_event_open+0x63/0x70 [ 182.576074][T15151] do_syscall_64+0x4a/0x90 [ 182.577310][T15151] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.579301][T15151] RIP: 0033:0x4665d9 22:46:30 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x7) 22:46:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xffff80fe, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:30 executing program 1 (fault-call:1 fault-nth:39): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:30 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:30 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cgroup.max.depth\x00', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000000c0)={{0xa, 0x4e20, 0x6, @private1={0xfc, 0x1, '\x00', 0x1}, 0x3}, {0xa, 0x4e22, 0x0, @remote, 0x7}, 0x8, [0x3, 0x100f, 0x2, 0xfff, 0x0, 0x9, 0x81, 0x8]}, 0x5c) r1 = signalfd4(r0, &(0x7f0000000140)={[0x1f]}, 0x8, 0x0) getsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000180)=""/185, &(0x7f0000000240)=0xb9) [ 182.580598][T15151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.584890][T15151] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 182.586391][T15151] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 182.587868][T15151] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 182.589156][T15151] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 182.590464][T15151] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 182.591954][T15151] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xffffc0fe, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 182.651873][T15170] PM: suspend entry (deep) [ 182.652790][T15144] ref_ctr going negative. vaddr: 0x20000004, curr val: -1, delta: -1 [ 182.654852][T15144] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000038dcd40b [ 182.662885][T15170] Filesystems sync: 0.009 seconds [ 182.665509][T15170] Freezing user space processes ... [ 182.680536][T15169] FAULT_INJECTION: forcing a failure. [ 182.680536][T15169] name failslab, interval 1, probability 0, space 0, times 0 [ 182.683821][T15169] CPU: 1 PID: 15169 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 182.685345][T15169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 182.686963][T15169] Call Trace: [ 182.687529][T15169] dump_stack+0x137/0x19d [ 182.688245][T15169] should_fail+0x23c/0x250 [ 182.689107][T15169] __should_failslab+0x81/0x90 [ 182.689839][T15169] ? register_for_each_vma+0x372/0x890 [ 182.690660][T15169] should_failslab+0x5/0x20 [ 182.691381][T15169] kmem_cache_alloc_trace+0x49/0x310 [ 182.692146][T15169] ? register_for_each_vma+0x372/0x890 [ 182.692995][T15169] ? vma_interval_tree_iter_next+0x263/0x280 [ 182.694038][T15169] register_for_each_vma+0x372/0x890 [ 182.695039][T15169] __uprobe_register+0x3f4/0x8a0 [ 182.695850][T15169] uprobe_register_refctr+0x29/0x40 [ 182.696859][T15169] probe_event_enable+0x2be/0x7d0 [ 182.697715][T15169] ? __uprobe_trace_func+0x430/0x430 [ 182.698674][T15169] trace_uprobe_register+0x88/0x410 [ 182.699594][T15169] perf_trace_event_init+0x34e/0x790 [ 182.700574][T15169] perf_uprobe_init+0xf5/0x140 [ 182.701354][T15169] perf_uprobe_event_init+0xde/0x140 [ 182.702223][T15169] perf_try_init_event+0x21a/0x400 [ 182.703198][T15169] perf_event_alloc+0xa60/0x1790 [ 182.704023][T15169] __se_sys_perf_event_open+0x5c7/0x2740 [ 182.704955][T15169] ? vfs_write+0x50c/0x770 [ 182.705766][T15169] __x64_sys_perf_event_open+0x63/0x70 [ 182.706693][T15169] do_syscall_64+0x4a/0x90 [ 182.707554][T15169] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 182.708469][T15169] RIP: 0033:0x4665d9 [ 182.709082][T15169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 182.712150][T15169] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 182.713683][T15169] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 182.715199][T15169] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 182.716604][T15169] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 182.718095][T15169] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 182.719680][T15169] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 182.727511][T15170] (elapsed 0.061 seconds) done. [ 182.728434][T15170] OOM killer disabled. [ 182.729212][T15170] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 182.732284][T15170] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x2}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:31 executing program 0 (fault-call:1 fault-nth:37): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 182.997522][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 183.490492][T15170] ACPI: Preparing to enter system sleep state S3 [ 183.490610][T15170] PM: Saving platform NVS memory [ 183.490615][T15170] Disabling non-boot CPUs ... [ 183.493691][T15170] smpboot: CPU 1 is now offline [ 183.496363][T15170] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 183.496434][T15170] ACPI: Low-level resume complete [ 183.496563][T15170] PM: Restoring platform NVS memory [ 183.496572][T15170] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 183.506352][T15170] Enabling non-boot CPUs ... [ 183.506491][T15170] x86: Booting SMP configuration: [ 183.506495][T15170] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 183.506692][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 183.507594][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 183.508943][T15170] CPU1 is up [ 183.509189][T15170] ACPI: Waking up from system sleep state S3 [ 183.597557][T15170] OOM killer enabled. [ 183.598224][T15170] Restarting tasks ... [ 183.601082][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 183.604304][ T1034] block loop5: uevent: failed to send synthetic uevent [ 183.610844][T15170] done. [ 183.613346][T15170] PM: suspend exit [ 183.617749][T15174] PM: suspend entry (deep) [ 183.634913][T15174] Filesystems sync: 0.015 seconds [ 183.637314][T15174] Freezing user space processes ... (elapsed 0.016 seconds) done. [ 183.655200][T15174] OOM killer disabled. [ 183.656196][T15174] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 183.659485][T15174] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xfffffdef, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 183.798944][ T1495] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 184.303987][T15174] ACPI: Preparing to enter system sleep state S3 [ 184.304100][T15174] PM: Saving platform NVS memory [ 184.304105][T15174] Disabling non-boot CPUs ... [ 184.306331][T15174] smpboot: CPU 1 is now offline [ 184.308820][T15174] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 184.308880][T15174] ACPI: Low-level resume complete [ 184.308957][T15174] PM: Restoring platform NVS memory [ 184.308966][T15174] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 184.319488][T15174] Enabling non-boot CPUs ... [ 184.319635][T15174] x86: Booting SMP configuration: [ 184.319663][T15174] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 184.319839][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 184.321000][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 184.322523][T15174] CPU1 is up [ 184.322916][T15174] ACPI: Waking up from system sleep state S3 [ 184.419872][T15174] OOM killer enabled. 22:46:32 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x8) [ 184.420975][T15174] Restarting tasks ... [ 184.442093][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 184.445611][ T1034] block loop5: uevent: failed to send synthetic uevent [ 184.455472][T15174] done. [ 184.457148][T15174] PM: suspend exit [ 184.458852][T15185] FAULT_INJECTION: forcing a failure. [ 184.458852][T15185] name failslab, interval 1, probability 0, space 0, times 0 [ 184.462197][T15185] CPU: 1 PID: 15185 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 184.464739][T15185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.467938][T15185] Call Trace: [ 184.468989][T15185] dump_stack+0x137/0x19d [ 184.470217][T15185] should_fail+0x23c/0x250 [ 184.471595][T15185] __should_failslab+0x81/0x90 [ 184.473014][T15185] ? register_for_each_vma+0x372/0x890 [ 184.474603][T15185] should_failslab+0x5/0x20 [ 184.476242][T15185] kmem_cache_alloc_trace+0x49/0x310 [ 184.477848][T15185] ? register_for_each_vma+0x372/0x890 [ 184.479777][T15185] ? vma_interval_tree_iter_next+0x24c/0x280 [ 184.481704][T15185] register_for_each_vma+0x372/0x890 [ 184.483161][T15185] __uprobe_register+0x3f4/0x8a0 [ 184.484575][T15185] uprobe_register_refctr+0x29/0x40 [ 184.485955][T15185] probe_event_enable+0x2be/0x7d0 [ 184.487522][T15185] ? __uprobe_trace_func+0x430/0x430 [ 184.489315][T15185] trace_uprobe_register+0x88/0x410 22:46:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x4}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xffffff7f, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:32 executing program 1 (fault-call:1 fault-nth:40): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:32 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000040)) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) mmap(&(0x7f0000696000/0x4000)=nil, 0x4000, 0x6, 0x810, r0, 0xcea2d000) 22:46:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xffffff97, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 184.490956][T15185] perf_trace_event_init+0x34e/0x790 [ 184.492475][T15185] perf_uprobe_init+0xf5/0x140 [ 184.493918][T15185] perf_uprobe_event_init+0xde/0x140 [ 184.495267][T15185] perf_try_init_event+0x21a/0x400 [ 184.496858][T15185] perf_event_alloc+0xa60/0x1790 [ 184.498077][T15185] __se_sys_perf_event_open+0x5c7/0x2740 [ 184.499762][T15185] ? vfs_write+0x50c/0x770 [ 184.501123][T15185] __x64_sys_perf_event_open+0x63/0x70 [ 184.502476][T15185] do_syscall_64+0x4a/0x90 [ 184.503806][T15185] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.505721][T15185] RIP: 0033:0x4665d9 [ 184.506868][T15185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.510660][T15185] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 184.511992][T15185] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 184.513316][T15185] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 184.515540][T15185] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 184.517949][T15185] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 184.519655][T15185] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x8}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:32 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f00000000c0)='/sys/module/snd_seq_dummy', 0x42, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) ioctl(r1, 0x40, &(0x7f0000000080)="04a0499c152e10d31f2f6dfa8ed99ac204") openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x2400, 0x0) [ 184.584326][T15179] ref_ctr going negative. vaddr: 0x20000004, curr val: -1, delta: -1 [ 184.586793][T15179] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000008b250cff [ 184.624266][T15204] FAULT_INJECTION: forcing a failure. [ 184.624266][T15204] name failslab, interval 1, probability 0, space 0, times 0 [ 184.628038][T15204] CPU: 0 PID: 15204 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 184.630999][T15204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.633808][T15204] Call Trace: [ 184.634928][T15204] dump_stack+0x137/0x19d [ 184.636436][T15204] should_fail+0x23c/0x250 [ 184.637823][T15204] __should_failslab+0x81/0x90 [ 184.639135][T15204] ? register_for_each_vma+0x372/0x890 [ 184.640938][T15204] should_failslab+0x5/0x20 [ 184.642281][T15204] kmem_cache_alloc_trace+0x49/0x310 [ 184.643942][T15204] ? register_for_each_vma+0x372/0x890 [ 184.645395][T15204] ? vma_interval_tree_iter_next+0x263/0x280 [ 184.647331][T15204] register_for_each_vma+0x372/0x890 [ 184.648795][T15204] __uprobe_register+0x3f4/0x8a0 [ 184.650144][T15204] uprobe_register_refctr+0x29/0x40 [ 184.651767][T15204] probe_event_enable+0x2be/0x7d0 [ 184.652990][T15204] ? __uprobe_trace_func+0x430/0x430 [ 184.654218][T15204] trace_uprobe_register+0x88/0x410 [ 184.655928][T15204] perf_trace_event_init+0x34e/0x790 [ 184.657102][T15204] perf_uprobe_init+0xf5/0x140 [ 184.658645][T15204] perf_uprobe_event_init+0xde/0x140 [ 184.659951][T15204] perf_try_init_event+0x21a/0x400 [ 184.661446][T15204] perf_event_alloc+0xa60/0x1790 [ 184.662763][T15204] __se_sys_perf_event_open+0x5c7/0x2740 [ 184.664389][T15204] ? vfs_write+0x50c/0x770 [ 184.665661][T15204] __x64_sys_perf_event_open+0x63/0x70 [ 184.667409][T15204] do_syscall_64+0x4a/0x90 [ 184.669037][T15204] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.670684][T15204] RIP: 0033:0x4665d9 [ 184.671864][T15204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.677462][T15204] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 184.679921][T15204] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 22:46:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x11}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:32 executing program 0 (fault-call:1 fault-nth:38): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:32 executing program 4: openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x1f, 0x50b101) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) r1 = syz_open_dev$vcsa(&(0x7f00000001c0), 0x62, 0x840c1) sendfile(r0, r1, &(0x7f0000000000)=0x6ac, 0x7fffffff) r2 = syz_open_dev$sg(&(0x7f0000000200), 0xffffffff80000000, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000240)=0x80000000) 22:46:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0xffffffe0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 184.682143][T15204] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 184.684628][T15204] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 184.687035][T15204] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 184.688614][T15204] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 184.727863][T15227] FAULT_INJECTION: forcing a failure. [ 184.727863][T15227] name failslab, interval 1, probability 0, space 0, times 0 [ 184.731554][T15227] CPU: 1 PID: 15227 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 184.734438][T15227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.737102][T15227] Call Trace: [ 184.738272][T15227] dump_stack+0x137/0x19d [ 184.739586][T15227] should_fail+0x23c/0x250 [ 184.740716][T15227] __should_failslab+0x81/0x90 [ 184.742368][T15227] ? register_for_each_vma+0x372/0x890 [ 184.744337][T15227] should_failslab+0x5/0x20 [ 184.745853][T15227] kmem_cache_alloc_trace+0x49/0x310 [ 184.747487][T15227] ? register_for_each_vma+0x372/0x890 [ 184.748863][T15227] ? vma_interval_tree_iter_next+0x24c/0x280 [ 184.750708][T15227] register_for_each_vma+0x372/0x890 [ 184.752505][T15227] __uprobe_register+0x3f4/0x8a0 [ 184.754028][T15227] uprobe_register_refctr+0x29/0x40 [ 184.755396][T15227] probe_event_enable+0x2be/0x7d0 [ 184.757013][T15227] ? __uprobe_trace_func+0x430/0x430 [ 184.758440][T15227] trace_uprobe_register+0x88/0x410 [ 184.760161][T15227] perf_trace_event_init+0x34e/0x790 [ 184.761734][T15227] perf_uprobe_init+0xf5/0x140 [ 184.763039][T15227] perf_uprobe_event_init+0xde/0x140 [ 184.764775][T15227] perf_try_init_event+0x21a/0x400 [ 184.766100][T15227] perf_event_alloc+0xa60/0x1790 [ 184.767629][T15227] __se_sys_perf_event_open+0x5c7/0x2740 [ 184.769030][T15227] ? vfs_write+0x50c/0x770 [ 184.770168][T15227] __x64_sys_perf_event_open+0x63/0x70 [ 184.771622][T15227] do_syscall_64+0x4a/0x90 [ 184.773262][T15227] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.775230][T15227] RIP: 0033:0x4665d9 22:46:32 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x9) 22:46:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x60}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:32 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r1, r0, &(0x7f0000000000)=0x80000000006, 0x3) [ 184.776545][T15227] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.780593][T15227] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 184.781985][T15227] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 184.783470][T15227] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 184.785025][T15227] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 184.786367][T15227] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 184.787834][T15227] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:32 executing program 1 (fault-call:1 fault-nth:41): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0xe0}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x10}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:32 executing program 0 (fault-call:1 fault-nth:39): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:32 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) fcntl$setpipe(r1, 0x407, 0x1f) r2 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000140)="a80bc2713ca83cf705694804ff9c0568afdc2b4dc155885ff235e67b7e344dba1d72a7010831d4c43c47784e2e53d67df21dacb4a4c815c38ba6aa8cfcd44573718dbca66b0d3ec3eac06701283cd6d2b2f3", 0x52, 0x3}, {&(0x7f00000001c0)="68e8271af3721c8e13524514ad22d8adabd0af888f3cd61ed514ea84a57918eb93cdafe87c0b9099ed582192dee9f69b9f1d4116df979472ddc8dbf152a78f2be3aecedf06d3c83e0d066d33daa9871887e7d12119b01e56fb6ffbfd6d4a3637924b313b692dacc24984994dc4122c", 0x6f, 0x851}, {&(0x7f0000000240)="59c708217ee308ce086c0d517662495a19c571847eddc23ec988657908ca75c47aab365d1f837b7f104a9d7f7243caf7a75d33016d50036ce1e6dc60368512608b92d70ffcac53ceb0d758cfbd798053e98a0c105a", 0x55, 0x48aa}], 0x20a0000, &(0x7f0000000340)={[{@fat=@errors_remount}, {@dots}, {@nodots}, {@fat=@errors_remount}, {@fat=@nfs_nostale_ro}, {@nodots}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@fowner_gt}, {@uid_lt={'uid<', 0xee00}}]}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000400)={0x1, 0xadf2, 0x5, 0x1, 0x7, [{0x1, 0xfffffffffffffff9, 0x5c880000000000, '\x00', 0x104}, {0xffff, 0xfff, 0x100000000}, {0xfffffffffffffff7, 0x10001, 0x8, '\x00', 0x800}, {0x8001, 0x6, 0x1d7, '\x00', 0x402}, {0x81, 0x2d, 0xffff, '\x00', 0x401}, {0xffffffffffff2fca, 0x9, 0x1, '\x00', 0x780}, {0x24e, 0xe52, 0xd84d, '\x00', 0x2000}]}) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:32 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xa) 22:46:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x1100}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 184.902453][T15256] FAULT_INJECTION: forcing a failure. [ 184.902453][T15256] name failslab, interval 1, probability 0, space 0, times 0 [ 184.906766][T15256] CPU: 0 PID: 15256 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 184.909190][T15256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.912377][T15256] Call Trace: [ 184.912933][T15256] dump_stack+0x137/0x19d [ 184.913729][T15256] should_fail+0x23c/0x250 [ 184.914284][T15255] loop4: detected capacity change from 0 to 72 [ 184.914427][T15256] __should_failslab+0x81/0x90 [ 184.914454][T15256] ? register_for_each_vma+0x372/0x890 [ 184.914476][T15256] should_failslab+0x5/0x20 [ 184.917948][T15256] kmem_cache_alloc_trace+0x49/0x310 [ 184.918746][T15256] ? register_for_each_vma+0x372/0x890 [ 184.919572][T15256] ? vma_interval_tree_iter_next+0x263/0x280 [ 184.920515][T15256] register_for_each_vma+0x372/0x890 [ 184.921428][T15256] __uprobe_register+0x3f4/0x8a0 [ 184.922222][T15256] uprobe_register_refctr+0x29/0x40 [ 184.923225][T15256] probe_event_enable+0x2be/0x7d0 [ 184.924145][T15256] ? __uprobe_trace_func+0x430/0x430 [ 184.925009][T15256] trace_uprobe_register+0x88/0x410 [ 184.925913][T15256] perf_trace_event_init+0x34e/0x790 [ 184.927353][T15256] perf_uprobe_init+0xf5/0x140 [ 184.928165][T15256] perf_uprobe_event_init+0xde/0x140 [ 184.929180][T15256] perf_try_init_event+0x21a/0x400 [ 184.930436][T15256] perf_event_alloc+0xa60/0x1790 [ 184.931242][T15256] __se_sys_perf_event_open+0x5c7/0x2740 [ 184.932265][T15256] ? vfs_write+0x50c/0x770 [ 184.933139][T15256] __x64_sys_perf_event_open+0x63/0x70 [ 184.933980][T15256] do_syscall_64+0x4a/0x90 [ 184.934812][T15256] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.935779][T15256] RIP: 0033:0x4665d9 [ 184.936433][T15256] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 184.939676][T15256] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 184.940936][T15256] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 184.942137][T15256] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 184.943413][T15256] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 184.944565][T15256] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 184.946108][T15256] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x2}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 184.970955][T15259] FAULT_INJECTION: forcing a failure. [ 184.970955][T15259] name failslab, interval 1, probability 0, space 0, times 0 [ 184.973469][T15259] CPU: 0 PID: 15259 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 184.975186][T15259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.976853][T15259] Call Trace: [ 184.977406][T15259] dump_stack+0x137/0x19d [ 184.978170][T15259] should_fail+0x23c/0x250 [ 184.978869][T15259] __should_failslab+0x81/0x90 [ 184.979535][T15259] ? register_for_each_vma+0x372/0x890 [ 184.980754][T15259] should_failslab+0x5/0x20 [ 184.981696][T15259] kmem_cache_alloc_trace+0x49/0x310 [ 184.982543][T15259] ? register_for_each_vma+0x372/0x890 [ 184.983570][T15259] ? vma_interval_tree_iter_next+0x263/0x280 [ 184.984774][T15259] register_for_each_vma+0x372/0x890 [ 184.985653][T15259] __uprobe_register+0x3f4/0x8a0 [ 184.986562][T15259] uprobe_register_refctr+0x29/0x40 [ 184.987358][T15259] probe_event_enable+0x2be/0x7d0 [ 184.988200][T15259] ? __uprobe_trace_func+0x430/0x430 [ 184.989158][T15259] trace_uprobe_register+0x88/0x410 [ 184.989941][T15259] perf_trace_event_init+0x34e/0x790 [ 184.990763][T15259] perf_uprobe_init+0xf5/0x140 [ 184.991569][T15259] perf_uprobe_event_init+0xde/0x140 [ 184.992398][T15259] perf_try_init_event+0x21a/0x400 [ 184.993283][T15259] perf_event_alloc+0xa60/0x1790 [ 184.994082][T15259] __se_sys_perf_event_open+0x5c7/0x2740 [ 184.994908][T15259] ? vfs_write+0x50c/0x770 [ 184.995647][T15259] __x64_sys_perf_event_open+0x63/0x70 [ 184.997108][T15259] do_syscall_64+0x4a/0x90 [ 184.997810][T15259] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 184.998679][T15259] RIP: 0033:0x4665d9 [ 184.999661][T15259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.002453][T15259] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 185.004009][T15259] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 185.005412][T15259] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 185.007080][T15259] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 185.008375][T15259] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 185.009729][T15259] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 185.012118][T15270] PM: suspend entry (deep) [ 185.040601][T15270] Filesystems sync: 0.027 seconds [ 185.042449][T15270] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 185.059301][T15270] OOM killer disabled. [ 185.059942][T15270] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 185.062409][T15270] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:33 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xb) 22:46:33 executing program 0 (fault-call:1 fault-nth:40): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 185.120938][T13419] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 185.610315][T15270] ACPI: Preparing to enter system sleep state S3 [ 185.610387][T15270] PM: Saving platform NVS memory [ 185.610391][T15270] Disabling non-boot CPUs ... [ 185.613337][T15270] smpboot: CPU 1 is now offline [ 185.616160][T15270] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 185.616355][T15270] ACPI: Low-level resume complete [ 185.616439][T15270] PM: Restoring platform NVS memory [ 185.616447][T15270] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 185.627175][T15270] Enabling non-boot CPUs ... [ 185.627444][T15270] x86: Booting SMP configuration: [ 185.627447][T15270] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 185.627619][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 185.628692][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 185.630223][T15270] CPU1 is up [ 185.630465][T15270] ACPI: Waking up from system sleep state S3 [ 185.670777][T15277] hwrng: no data available [ 185.730268][T15270] OOM killer enabled. 22:46:33 executing program 1 (fault-call:1 fault-nth:42): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x6000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 185.731108][T15270] Restarting tasks ... [ 185.768625][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 185.770193][T15270] done. [ 185.772569][ T1034] block loop3: uevent: failed to send synthetic uevent [ 185.784432][T15270] PM: suspend exit [ 185.789143][T15287] FAULT_INJECTION: forcing a failure. [ 185.789143][T15287] name failslab, interval 1, probability 0, space 0, times 0 [ 185.793080][T15287] CPU: 1 PID: 15287 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 185.795867][T15287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.798999][T15287] Call Trace: [ 185.801647][T15287] dump_stack+0x137/0x19d [ 185.802772][T15287] should_fail+0x23c/0x250 [ 185.804696][T15287] __should_failslab+0x81/0x90 [ 185.806094][T15287] ? register_for_each_vma+0x372/0x890 [ 185.807493][T15287] should_failslab+0x5/0x20 [ 185.808673][T15287] kmem_cache_alloc_trace+0x49/0x310 [ 185.810443][T15287] ? register_for_each_vma+0x372/0x890 [ 185.811828][T15287] ? vma_interval_tree_iter_next+0x263/0x280 [ 185.813333][T15287] register_for_each_vma+0x372/0x890 [ 185.814646][T15287] __uprobe_register+0x3f4/0x8a0 [ 185.815660][T15287] uprobe_register_refctr+0x29/0x40 [ 185.817100][T15287] probe_event_enable+0x2be/0x7d0 22:46:33 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xc) 22:46:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x3}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:33 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000006c0)='cgroup.clone_children\x00', 0x2, 0x0) r4 = dup3(r3, r1, 0x0) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)="01", 0x1}], 0x2) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000340)={&(0x7f0000000540)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x9, 0x0, 0x8}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004092}, 0x10000005) sendfile(r2, r0, &(0x7f0000000240)=0x7, 0x3) write$P9_RREADLINK(r4, &(0x7f0000000c80)=ANY=[@ANYBLOB="100000080000000000000066696c6530d080c2d301c99fd68134732c79959a47c23bfea4fbe1665cfd21cece6e44a11348d729c5fa07c2f35c8d2261f5f7b879e702b572990340bdb32dbde59359b3e9b92458e6e4a2ac80932fdfddd344b64eb7dc6eec85b87d8053e286303f0e1ff3154b47e17b50a8444f13a36f2737f2b86144725c9eb5d1826185da7bacdf904b"], 0x10) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000300), r0) write$binfmt_elf64(r4, &(0x7f0000000d40)={{0x7f, 0x45, 0x4c, 0x46, 0x20, 0x1, 0x3, 0xdd, 0x1, 0x2, 0x6, 0x8, 0x214, 0x40, 0x114, 0x6, 0x81, 0x38, 0x1, 0x3f, 0x2, 0x80}, [{0x2, 0x20, 0x200, 0x2, 0xff, 0x9, 0x0, 0x9}], "611d0888b16f9257f36380e103a25ce383078e4fe0a0296ab3a2d53d2d9d177b5363d47f7e05509f9717fb6524cb0b2e6525152282454ef0941450d9b5d533d2d9d8a827457542c32f24", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x7c2) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000380)={'ip6gre0\x00', &(0x7f0000000480)={'sit0\x00', 0x0, 0x29, 0x6, 0x6, 0x0, 0x1, @empty, @private2, 0xfa5f35f09aa2362f, 0x20, 0x1ff}}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000680)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000500)={&(0x7f0000000c00)={0x58, r5, 0x100, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r6}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x4004000) r7 = syz_open_dev$vcsn(&(0x7f0000000600), 0x10000800, 0x503941) write$P9_RRENAMEAT(r0, &(0x7f00000000c0)={0x7, 0x4b, 0x2}, 0x7) write$binfmt_elf64(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x448) openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) sendmsg$IPSET_CMD_GET_BYNAME(r7, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0xe, 0x6, 0x5, 0x0, 0x0, {0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x94}, 0x40004) 22:46:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0xe000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 185.818264][T15287] ? __uprobe_trace_func+0x430/0x430 [ 185.819792][T15287] trace_uprobe_register+0x88/0x410 [ 185.821318][T15287] perf_trace_event_init+0x34e/0x790 [ 185.822787][T15287] perf_uprobe_init+0xf5/0x140 [ 185.824097][T15287] perf_uprobe_event_init+0xde/0x140 [ 185.825987][T15287] perf_try_init_event+0x21a/0x400 [ 185.827541][T15287] perf_event_alloc+0xa60/0x1790 [ 185.829128][T15287] __se_sys_perf_event_open+0x5c7/0x2740 [ 185.830718][T15287] ? vfs_write+0x50c/0x770 [ 185.831717][T15287] __x64_sys_perf_event_open+0x63/0x70 [ 185.832955][T15287] do_syscall_64+0x4a/0x90 [ 185.833912][T15287] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 185.835255][T15287] RIP: 0033:0x4665d9 [ 185.836031][T15287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.839368][T15287] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 185.841305][T15287] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 185.843057][T15287] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 185.845470][T15287] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 185.847407][T15287] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 185.849560][T15287] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 185.883232][T15289] FAULT_INJECTION: forcing a failure. [ 185.883232][T15289] name failslab, interval 1, probability 0, space 0, times 0 [ 185.886625][T15289] CPU: 0 PID: 15289 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 185.889341][T15289] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.892353][T15289] Call Trace: [ 185.893462][T15289] dump_stack+0x137/0x19d [ 185.894990][T15289] should_fail+0x23c/0x250 [ 185.896318][T15289] __should_failslab+0x81/0x90 [ 185.897701][T15289] ? register_for_each_vma+0x372/0x890 [ 185.899319][T15289] should_failslab+0x5/0x20 [ 185.900780][T15289] kmem_cache_alloc_trace+0x49/0x310 [ 185.902311][T15289] ? register_for_each_vma+0x372/0x890 [ 185.904053][T15289] ? vma_interval_tree_iter_next+0x24c/0x280 [ 185.905830][T15289] register_for_each_vma+0x372/0x890 [ 185.907595][T15289] __uprobe_register+0x3f4/0x8a0 [ 185.908697][T15289] uprobe_register_refctr+0x29/0x40 [ 185.910372][T15289] probe_event_enable+0x2be/0x7d0 [ 185.912076][T15289] ? __uprobe_trace_func+0x430/0x430 [ 185.913776][T15289] trace_uprobe_register+0x88/0x410 [ 185.915416][T15289] perf_trace_event_init+0x34e/0x790 [ 185.916696][T15289] perf_uprobe_init+0xf5/0x140 [ 185.918223][T15289] perf_uprobe_event_init+0xde/0x140 [ 185.919972][T15289] perf_try_init_event+0x21a/0x400 [ 185.921467][T15289] perf_event_alloc+0xa60/0x1790 [ 185.922983][T15289] __se_sys_perf_event_open+0x5c7/0x2740 [ 185.924262][T15289] ? vfs_write+0x50c/0x770 [ 185.925662][T15289] __x64_sys_perf_event_open+0x63/0x70 [ 185.927100][T15289] do_syscall_64+0x4a/0x90 [ 185.928500][T15289] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 185.930036][T15289] RIP: 0033:0x4665d9 22:46:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x1000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:33 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x2}, 0x4) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) sendfile(r1, r2, &(0x7f0000000100)=0xe5, 0x8001) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="050000000000000000000f00000008000300", @ANYRES32, @ANYBLOB="28000e0008"], 0x74}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x80, r5, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}]}, 0x80}, 0x1, 0x0, 0x0, 0x40840}, 0x4000) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 185.931437][T15289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 185.937593][T15289] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 185.940492][T15289] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 185.942819][T15289] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 185.945300][T15289] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 185.947108][T15289] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 185.949267][T15289] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x4}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x2000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:33 executing program 0 (fault-call:1 fault-nth:41): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 185.982857][T15311] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.4'. [ 185.985351][T15311] PM: suspend entry (deep) [ 185.986223][T15286] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 185.987646][T15286] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000055ed11da [ 186.005288][T15311] Filesystems sync: 0.018 seconds [ 186.007370][T15311] Freezing user space processes ... [ 186.028611][T15286] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 186.031389][T15286] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000055ed11da [ 186.037833][T15311] (elapsed 0.030 seconds) done. [ 186.038773][T15311] OOM killer disabled. [ 186.039403][T15311] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 186.042356][T15311] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:43 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x1b1) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 186.123437][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 195.744522][T15311] ACPI: Preparing to enter system sleep state S3 [ 195.744610][T15311] PM: Saving platform NVS memory [ 195.744615][T15311] Disabling non-boot CPUs ... [ 195.747738][T15311] smpboot: CPU 1 is now offline [ 195.750184][T15311] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 195.750249][T15311] ACPI: Low-level resume complete [ 195.750332][T15311] PM: Restoring platform NVS memory [ 195.750341][T15311] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 195.760593][T15311] Enabling non-boot CPUs ... [ 195.760791][T15311] x86: Booting SMP configuration: [ 195.760836][T15311] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 195.761009][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 195.761977][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 195.763721][T15311] CPU1 is up [ 195.764112][T15311] ACPI: Waking up from system sleep state S3 [ 195.880583][T15311] OOM killer enabled. [ 195.881239][T15311] Restarting tasks ... done. [ 195.889045][T15311] PM: suspend exit [ 195.912354][T15319] FAULT_INJECTION: forcing a failure. [ 195.912354][T15319] name failslab, interval 1, probability 0, space 0, times 0 [ 195.916906][T15319] CPU: 0 PID: 15319 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 195.919070][T15319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.921309][T15319] Call Trace: [ 195.922418][T15319] dump_stack+0x137/0x19d [ 195.923430][T15319] should_fail+0x23c/0x250 [ 195.924737][T15319] __should_failslab+0x81/0x90 [ 195.925982][T15319] ? register_for_each_vma+0x372/0x890 [ 195.927502][T15319] should_failslab+0x5/0x20 [ 195.928753][T15319] kmem_cache_alloc_trace+0x49/0x310 [ 195.930562][T15319] ? register_for_each_vma+0x372/0x890 [ 195.932065][T15319] ? vma_interval_tree_iter_next+0x24c/0x280 [ 195.933827][T15319] register_for_each_vma+0x372/0x890 [ 195.935504][T15319] __uprobe_register+0x3f4/0x8a0 [ 195.936777][T15319] uprobe_register_refctr+0x29/0x40 [ 195.938527][T15319] probe_event_enable+0x2be/0x7d0 [ 195.940000][T15319] ? __uprobe_trace_func+0x430/0x430 [ 195.941527][T15319] trace_uprobe_register+0x88/0x410 [ 195.942885][T15319] perf_trace_event_init+0x34e/0x790 [ 195.944524][T15319] perf_uprobe_init+0xf5/0x140 [ 195.945779][T15319] perf_uprobe_event_init+0xde/0x140 [ 195.947353][T15319] perf_try_init_event+0x21a/0x400 [ 195.948913][T15319] perf_event_alloc+0xa60/0x1790 [ 195.950504][T15319] __se_sys_perf_event_open+0x5c7/0x2740 [ 195.952256][T15319] ? vfs_write+0x50c/0x770 [ 195.953714][T15319] __x64_sys_perf_event_open+0x63/0x70 [ 195.955405][T15319] do_syscall_64+0x4a/0x90 [ 195.956740][T15319] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 195.958507][T15319] RIP: 0033:0x4665d9 22:46:43 executing program 1 (fault-call:1 fault-nth:43): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:43 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xd) 22:46:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x5}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:43 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x4000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 195.959512][T15319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 195.964027][T15319] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 195.966205][T15319] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 195.968147][T15319] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 195.969753][T15319] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 195.971149][T15319] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 195.973039][T15319] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 195.993700][T15330] PM: suspend entry (deep) [ 196.009623][T15330] Filesystems sync: 0.014 seconds [ 196.011641][T15330] Freezing user space processes ... (elapsed 0.008 seconds) done. [ 196.022201][T15330] OOM killer disabled. [ 196.023117][T15330] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 196.026498][T15330] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:45 executing program 0 (fault-call:1 fault-nth:42): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 196.097315][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 196.592266][T15330] ACPI: Preparing to enter system sleep state S3 [ 196.592345][T15330] PM: Saving platform NVS memory [ 196.592350][T15330] Disabling non-boot CPUs ... [ 196.594741][T15330] smpboot: CPU 1 is now offline [ 196.597350][T15330] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 196.597425][T15330] ACPI: Low-level resume complete [ 196.597507][T15330] PM: Restoring platform NVS memory [ 196.597517][T15330] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 196.607558][T15330] Enabling non-boot CPUs ... [ 196.607775][T15330] x86: Booting SMP configuration: [ 196.607779][T15330] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 196.607953][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 196.609056][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 196.610482][T15330] CPU1 is up [ 196.610701][T15330] ACPI: Waking up from system sleep state S3 [ 197.508117][T15330] OOM killer enabled. [ 197.508838][T15330] Restarting tasks ... [ 197.520099][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 197.524153][ T1034] block loop5: uevent: failed to send synthetic uevent [ 197.532844][T15337] FAULT_INJECTION: forcing a failure. [ 197.532844][T15337] name failslab, interval 1, probability 0, space 0, times 0 [ 197.536901][T15337] CPU: 0 PID: 15337 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 197.538612][T15337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.540528][T15337] Call Trace: 22:46:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x8000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:45 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xe) [ 197.541112][T15337] dump_stack+0x137/0x19d [ 197.541956][T15337] should_fail+0x23c/0x250 [ 197.542698][T15337] __should_failslab+0x81/0x90 [ 197.543390][T15337] ? register_for_each_vma+0x372/0x890 [ 197.544898][T15337] should_failslab+0x5/0x20 [ 197.545855][T15337] kmem_cache_alloc_trace+0x49/0x310 [ 197.546665][T15337] ? register_for_each_vma+0x372/0x890 [ 197.547493][T15337] ? vma_interval_tree_iter_next+0x263/0x280 [ 197.548629][T15337] register_for_each_vma+0x372/0x890 [ 197.549703][T15337] __uprobe_register+0x3f4/0x8a0 [ 197.550805][T15337] uprobe_register_refctr+0x29/0x40 [ 197.551876][T15337] probe_event_enable+0x2be/0x7d0 [ 197.552796][T15337] ? __uprobe_trace_func+0x430/0x430 [ 197.553809][T15337] trace_uprobe_register+0x88/0x410 [ 197.554739][T15337] perf_trace_event_init+0x34e/0x790 [ 197.555886][T15337] perf_uprobe_init+0xf5/0x140 [ 197.556704][T15337] perf_uprobe_event_init+0xde/0x140 [ 197.557739][T15337] perf_try_init_event+0x21a/0x400 [ 197.558869][T15337] perf_event_alloc+0xa60/0x1790 [ 197.559637][T15337] __se_sys_perf_event_open+0x5c7/0x2740 [ 197.561010][T15337] ? vfs_write+0x50c/0x770 [ 197.561808][T15337] __x64_sys_perf_event_open+0x63/0x70 [ 197.562963][T15337] do_syscall_64+0x4a/0x90 [ 197.563998][T15337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 197.564997][T15337] RIP: 0033:0x4665d9 [ 197.565861][T15337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 197.569536][T15337] RSP: 002b:00007f059dd68188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 197.571088][T15337] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 197.572509][T15337] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 197.573826][T15337] RBP: 00007f059dd681d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.575227][T15337] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 197.576793][T15337] R13: 00007ffe1f4edd0f R14: 00007f059dd68300 R15: 0000000000022000 [ 197.581057][T15330] done. [ 197.584624][T15330] PM: suspend exit [ 197.608866][T15342] FAULT_INJECTION: forcing a failure. [ 197.608866][T15342] name failslab, interval 1, probability 0, space 0, times 0 [ 197.612692][T15342] CPU: 1 PID: 15342 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 197.615575][T15342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.618517][T15342] Call Trace: [ 197.619511][T15342] dump_stack+0x137/0x19d [ 197.621035][T15342] should_fail+0x23c/0x250 [ 197.622358][T15342] __should_failslab+0x81/0x90 [ 197.623667][T15342] ? register_for_each_vma+0x372/0x890 [ 197.625429][T15342] should_failslab+0x5/0x20 [ 197.626694][T15342] kmem_cache_alloc_trace+0x49/0x310 [ 197.628196][T15342] ? register_for_each_vma+0x372/0x890 [ 197.630009][T15342] ? vma_interval_tree_iter_next+0x263/0x280 [ 197.631821][T15342] register_for_each_vma+0x372/0x890 [ 197.633398][T15342] __uprobe_register+0x3f4/0x8a0 [ 197.635330][T15342] uprobe_register_refctr+0x29/0x40 [ 197.636581][T15342] probe_event_enable+0x2be/0x7d0 [ 197.637812][T15342] ? __uprobe_trace_func+0x430/0x430 [ 197.638960][T15342] trace_uprobe_register+0x88/0x410 [ 197.640169][T15342] perf_trace_event_init+0x34e/0x790 [ 197.641196][T15342] perf_uprobe_init+0xf5/0x140 [ 197.642461][T15342] perf_uprobe_event_init+0xde/0x140 [ 197.643696][T15342] perf_try_init_event+0x21a/0x400 [ 197.644770][T15342] perf_event_alloc+0xa60/0x1790 [ 197.645903][T15342] __se_sys_perf_event_open+0x5c7/0x2740 [ 197.646965][T15342] ? vfs_write+0x50c/0x770 [ 197.647868][T15342] __x64_sys_perf_event_open+0x63/0x70 [ 197.648972][T15342] do_syscall_64+0x4a/0x90 [ 197.650093][T15342] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 197.651249][T15342] RIP: 0033:0x4665d9 [ 197.652044][T15342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 197.655603][T15342] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 22:46:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x11000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x6}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:45 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x2000, 0x174, 0xb}, 0x18) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r1, r2, &(0x7f0000000100)=0x3, 0x4) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 22:46:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x7}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:45 executing program 1 (fault-call:1 fault-nth:44): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 197.657481][T15342] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 197.659617][T15342] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 197.661596][T15342] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 197.663079][T15342] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 197.664833][T15342] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0x60000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 197.722738][T15341] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 197.724960][T15341] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000055ed11da [ 197.728555][T15361] PM: suspend entry (deep) [ 197.737512][T15361] Filesystems sync: 0.008 seconds [ 197.740041][T15361] Freezing user space processes ... (elapsed 0.011 seconds) done. [ 197.752554][T15361] OOM killer disabled. [ 197.753485][T15361] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 197.756323][T15361] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:46 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xf) [ 198.189391][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 198.688808][T15361] ACPI: Preparing to enter system sleep state S3 [ 198.688962][T15361] PM: Saving platform NVS memory [ 198.688967][T15361] Disabling non-boot CPUs ... [ 198.692211][T15361] smpboot: CPU 1 is now offline [ 198.694615][T15361] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 198.694714][T15361] ACPI: Low-level resume complete [ 198.694791][T15361] PM: Restoring platform NVS memory [ 198.694800][T15361] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 198.705236][T15361] Enabling non-boot CPUs ... [ 198.705391][T15361] x86: Booting SMP configuration: [ 198.705395][T15361] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 198.705599][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 198.706709][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 198.708186][T15361] CPU1 is up [ 198.708455][T15361] ACPI: Waking up from system sleep state S3 [ 198.814532][T15361] OOM killer enabled. [ 198.815201][T15361] Restarting tasks ... done. [ 198.835302][T15361] PM: suspend exit 22:46:46 executing program 0 (fault-call:1 fault-nth:43): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 198.850772][T15367] PM: suspend entry (deep) [ 198.855588][T15370] FAULT_INJECTION: forcing a failure. [ 198.855588][T15370] name failslab, interval 1, probability 0, space 0, times 0 [ 198.860022][T15370] CPU: 0 PID: 15370 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 198.862393][T15370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.865365][T15370] Call Trace: [ 198.866266][T15370] dump_stack+0x137/0x19d [ 198.867334][T15370] should_fail+0x23c/0x250 [ 198.868387][T15370] __should_failslab+0x81/0x90 [ 198.869523][T15370] ? register_for_each_vma+0x372/0x890 [ 198.871155][T15370] should_failslab+0x5/0x20 [ 198.872650][T15370] kmem_cache_alloc_trace+0x49/0x310 [ 198.874542][T15370] ? register_for_each_vma+0x372/0x890 [ 198.876266][T15370] ? vma_interval_tree_iter_next+0x263/0x280 [ 198.878347][T15370] register_for_each_vma+0x372/0x890 [ 198.880395][T15370] __uprobe_register+0x3f4/0x8a0 [ 198.881954][T15370] uprobe_register_refctr+0x29/0x40 [ 198.883651][T15370] probe_event_enable+0x2be/0x7d0 [ 198.885233][T15370] ? __uprobe_trace_func+0x430/0x430 [ 198.886867][T15370] trace_uprobe_register+0x88/0x410 [ 198.888421][T15370] perf_trace_event_init+0x34e/0x790 [ 198.890017][T15370] perf_uprobe_init+0xf5/0x140 [ 198.891288][T15370] perf_uprobe_event_init+0xde/0x140 [ 198.893159][T15370] perf_try_init_event+0x21a/0x400 [ 198.895042][T15370] perf_event_alloc+0xa60/0x1790 [ 198.896736][T15370] __se_sys_perf_event_open+0x5c7/0x2740 [ 198.898582][T15370] ? vfs_write+0x50c/0x770 22:46:46 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0xe0000000}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x8}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 198.900210][T15370] __x64_sys_perf_event_open+0x63/0x70 [ 198.902176][T15370] do_syscall_64+0x4a/0x90 [ 198.903768][T15370] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 198.904137][T15367] Filesystems sync: 0.051 seconds [ 198.905146][T15370] RIP: 0033:0x4665d9 [ 198.905163][T15370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 198.914234][T15370] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 198.914270][T15370] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 198.914292][T15370] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 198.914306][T15370] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 198.914316][T15370] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 198.914330][T15370] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 198.930787][T15367] Freezing user space processes ... (elapsed 0.009 seconds) done. [ 198.942582][T15367] OOM killer disabled. [ 198.943431][T15367] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 198.946555][T15367] printk: Suspending console(s) (use no_console_suspend to debug) [ 199.041942][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 199.538365][T15367] ACPI: Preparing to enter system sleep state S3 [ 199.538453][T15367] PM: Saving platform NVS memory [ 199.538458][T15367] Disabling non-boot CPUs ... [ 199.541133][T15367] smpboot: CPU 1 is now offline [ 199.543785][T15367] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 199.543850][T15367] ACPI: Low-level resume complete [ 199.543929][T15367] PM: Restoring platform NVS memory [ 199.543938][T15367] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 199.554461][T15367] Enabling non-boot CPUs ... [ 199.554610][T15367] x86: Booting SMP configuration: [ 199.554613][T15367] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 199.554810][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 199.555911][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 199.557304][T15367] CPU1 is up [ 199.557586][T15367] ACPI: Waking up from system sleep state S3 [ 200.453564][T15367] OOM killer enabled. [ 200.454147][T15367] Restarting tasks ... [ 200.457679][T15384] FAULT_INJECTION: forcing a failure. [ 200.457679][T15384] name failslab, interval 1, probability 0, space 0, times 0 [ 200.463180][T15384] CPU: 1 PID: 15384 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 200.465495][T15384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.467994][T15384] Call Trace: [ 200.468827][T15384] dump_stack+0x137/0x19d [ 200.469835][T15384] should_fail+0x23c/0x250 [ 200.471174][T15384] __should_failslab+0x81/0x90 [ 200.472577][T15384] ? register_for_each_vma+0x372/0x890 [ 200.473957][T15384] should_failslab+0x5/0x20 [ 200.475148][T15384] kmem_cache_alloc_trace+0x49/0x310 [ 200.476383][T15384] ? register_for_each_vma+0x372/0x890 [ 200.477783][T15384] ? vma_interval_tree_iter_next+0x263/0x280 [ 200.479251][T15384] register_for_each_vma+0x372/0x890 [ 200.480671][T15384] __uprobe_register+0x3f4/0x8a0 [ 200.481944][T15384] uprobe_register_refctr+0x29/0x40 [ 200.483060][T15384] probe_event_enable+0x2be/0x7d0 [ 200.484217][T15384] ? __uprobe_trace_func+0x430/0x430 [ 200.485867][T15384] trace_uprobe_register+0x88/0x410 22:46:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0xa}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:48 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0xfeffffff}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:48 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) write$sndseq(r0, &(0x7f00000000c0)=[{0xc1, 0x1, 0x1b, 0x77, @tick=0x20, {0x5, 0x2}, {0x5, 0x9}, @queue={0x2, {0xff, 0x8001}}}, {0xc0, 0x0, 0x80, 0x1, @time={0x81, 0x3f}, {0x4f, 0x3}, {0x2, 0x5}, @raw32={[0x6, 0x7f, 0x1]}}, {0x1, 0x1f, 0x0, 0x1f, @time={0x8, 0x21}, {0x8, 0x6}, {0x33, 0x7f}, @result={0x77, 0x70000000}}], 0x54) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x4, 0x2) [ 200.486844][T15384] perf_trace_event_init+0x34e/0x790 [ 200.488300][T15384] perf_uprobe_init+0xf5/0x140 [ 200.489319][T15384] perf_uprobe_event_init+0xde/0x140 [ 200.490539][T15384] perf_try_init_event+0x21a/0x400 [ 200.491832][T15384] perf_event_alloc+0xa60/0x1790 [ 200.492869][T15384] __se_sys_perf_event_open+0x5c7/0x2740 [ 200.494397][T15384] ? vfs_write+0x50c/0x770 [ 200.495425][T15384] __x64_sys_perf_event_open+0x63/0x70 [ 200.496541][T15384] do_syscall_64+0x4a/0x90 [ 200.497387][T15384] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 200.498996][T15384] RIP: 0033:0x4665d9 [ 200.500098][T15384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 200.504073][T15384] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 200.506043][T15384] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 200.507488][T15384] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 200.508830][T15384] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 200.510483][T15384] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 200.512768][T15384] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 200.520368][T15367] done. [ 200.525828][T15367] PM: suspend exit 22:46:48 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x10) 22:46:48 executing program 1 (fault-call:1 fault-nth:45): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x10}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:48 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0xffffff7f}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 200.586204][T15399] PM: suspend entry (deep) [ 200.600591][T15399] Filesystems sync: 0.012 seconds [ 200.602876][T15399] Freezing user space processes ... (elapsed 0.021 seconds) done. [ 200.626549][T15399] OOM killer disabled. [ 200.627313][T15399] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 200.630023][T15399] printk: Suspending console(s) (use no_console_suspend to debug) [ 200.694536][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 201.192710][T15399] ACPI: Preparing to enter system sleep state S3 [ 201.192780][T15399] PM: Saving platform NVS memory [ 201.192784][T15399] Disabling non-boot CPUs ... [ 201.196376][T15399] smpboot: CPU 1 is now offline [ 201.199050][T15399] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 201.199116][T15399] ACPI: Low-level resume complete [ 201.199246][T15399] PM: Restoring platform NVS memory [ 201.199256][T15399] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 201.210219][T15399] Enabling non-boot CPUs ... [ 201.210398][T15399] x86: Booting SMP configuration: [ 201.210401][T15399] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 201.210606][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 201.211556][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 201.213117][T15399] CPU1 is up [ 201.213291][T15399] ACPI: Waking up from system sleep state S3 [ 201.426051][T15399] OOM killer enabled. [ 201.426971][T15399] Restarting tasks ... [ 201.431612][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 201.434759][ T1034] block loop3: uevent: failed to send synthetic uevent [ 201.436812][T15406] FAULT_INJECTION: forcing a failure. [ 201.436812][T15406] name failslab, interval 1, probability 0, space 0, times 0 [ 201.439882][T15406] CPU: 1 PID: 15406 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 201.441995][T15406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.445084][T15406] Call Trace: [ 201.446018][T15406] dump_stack+0x137/0x19d [ 201.447451][T15406] should_fail+0x23c/0x250 [ 201.448757][T15406] __should_failslab+0x81/0x90 [ 201.450288][T15406] ? register_for_each_vma+0x372/0x890 [ 201.452651][T15406] should_failslab+0x5/0x20 [ 201.454400][T15406] kmem_cache_alloc_trace+0x49/0x310 [ 201.456113][T15406] ? register_for_each_vma+0x372/0x890 [ 201.457264][T15406] ? vma_interval_tree_iter_next+0x263/0x280 22:46:49 executing program 0 (fault-call:1 fault-nth:44): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0xfffffffe}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 201.459299][T15406] register_for_each_vma+0x372/0x890 [ 201.460825][T15406] __uprobe_register+0x3f4/0x8a0 [ 201.462436][T15406] uprobe_register_refctr+0x29/0x40 [ 201.463876][T15406] probe_event_enable+0x2be/0x7d0 [ 201.465551][T15406] ? __uprobe_trace_func+0x430/0x430 [ 201.467194][T15406] trace_uprobe_register+0x88/0x410 [ 201.468730][T15406] perf_trace_event_init+0x34e/0x790 [ 201.469933][T15406] perf_uprobe_init+0xf5/0x140 [ 201.471632][T15406] perf_uprobe_event_init+0xde/0x140 [ 201.472914][T15406] perf_try_init_event+0x21a/0x400 [ 201.474652][T15406] perf_event_alloc+0xa60/0x1790 [ 201.476119][T15406] __se_sys_perf_event_open+0x5c7/0x2740 [ 201.477656][T15406] ? vfs_write+0x50c/0x770 [ 201.478678][T15399] done. [ 201.478823][T15406] __x64_sys_perf_event_open+0x63/0x70 [ 201.480752][T15406] do_syscall_64+0x4a/0x90 [ 201.480776][T15406] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 201.480820][T15406] RIP: 0033:0x4665d9 [ 201.480835][T15406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 201.480850][T15406] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 22:46:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x60}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:49 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x11) 22:46:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1, 0x0, 0x0, 0xffffffff}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 201.480865][T15406] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 201.480874][T15406] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 201.480882][T15406] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.480898][T15406] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 201.480909][T15406] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 201.532969][T15420] FAULT_INJECTION: forcing a failure. [ 201.532969][T15420] name failslab, interval 1, probability 0, space 0, times 0 22:46:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0xe0}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:49 executing program 1 (fault-call:1 fault-nth:46): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 201.532994][T15420] CPU: 0 PID: 15420 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 201.533057][T15420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.533066][T15420] Call Trace: [ 201.533073][T15420] dump_stack+0x137/0x19d [ 201.533098][T15420] should_fail+0x23c/0x250 [ 201.533114][T15420] __should_failslab+0x81/0x90 [ 201.533211][T15420] ? register_for_each_vma+0x372/0x890 [ 201.533235][T15420] should_failslab+0x5/0x20 [ 201.533250][T15420] kmem_cache_alloc_trace+0x49/0x310 [ 201.533270][T15420] ? register_for_each_vma+0x372/0x890 [ 201.533290][T15420] ? vma_interval_tree_iter_next+0x263/0x280 [ 201.533367][T15420] register_for_each_vma+0x372/0x890 [ 201.533390][T15420] __uprobe_register+0x3f4/0x8a0 [ 201.533410][T15420] uprobe_register_refctr+0x29/0x40 [ 201.533430][T15420] probe_event_enable+0x2be/0x7d0 [ 201.533510][T15420] ? __uprobe_trace_func+0x430/0x430 [ 201.533585][T15420] trace_uprobe_register+0x88/0x410 [ 201.533604][T15420] perf_trace_event_init+0x34e/0x790 [ 201.533622][T15420] perf_uprobe_init+0xf5/0x140 [ 201.533639][T15420] perf_uprobe_event_init+0xde/0x140 [ 201.533658][T15420] perf_try_init_event+0x21a/0x400 [ 201.533744][T15420] perf_event_alloc+0xa60/0x1790 [ 201.533762][T15420] __se_sys_perf_event_open+0x5c7/0x2740 [ 201.533854][T15420] ? vfs_write+0x50c/0x770 [ 201.533870][T15420] __x64_sys_perf_event_open+0x63/0x70 [ 201.533935][T15420] do_syscall_64+0x4a/0x90 [ 201.533978][T15420] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 201.534017][T15420] RIP: 0033:0x4665d9 [ 201.534032][T15420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 201.534048][T15420] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 201.534063][T15420] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 201.534072][T15420] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 201.534081][T15420] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.534089][T15420] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 201.534098][T15420] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 201.588011][T15418] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 201.588323][T15399] PM: suspend exit [ 201.589634][T15418] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e5cb1ee4 [ 201.660175][T15437] FAULT_INJECTION: forcing a failure. [ 201.660175][T15437] name failslab, interval 1, probability 0, space 0, times 0 [ 201.663460][T15437] CPU: 1 PID: 15437 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 22:46:49 executing program 0 (fault-call:1 fault-nth:45): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0xfc}}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:49 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x12) 22:46:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:49 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x1000, 0x30001) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000200)={0x2, 0x9, 0x0, 'queue1\x00', 0x80000001}) dup3(r0, r1, 0x0) r3 = syz_io_uring_complete(0x0) write$sndseq(r3, &(0x7f0000000300)=[{0x2, 0x9, 0x6c, 0x0, @tick=0x1, {0x4, 0xfd}, {0x4, 0x4}, @control={0x5, 0x8, 0x4}}, {0x0, 0x20, 0x7, 0x81, @time={0x1, 0x81}, {0x1, 0x4}, {0x0, 0xfd}, @raw32={[0x263, 0x4, 0x2]}}, {0x20, 0x3f, 0x22, 0x1, @tick=0x3, {0x8, 0x2}, {0x1, 0x2}, @raw8={"c4dcc101dfe6503659025519"}}, {0x7, 0x6, 0x9, 0x5, @tick=0x7fff, {0x2, 0x8}, {0xff, 0xb9}, @quote={{0x54, 0x4}, 0xb7cb, &(0x7f00000002c0)={0x8, 0x20, 0x40, 0x4, @tick=0xfff, {0x0, 0x1}, {0x8, 0x1}, @control={0xdf, 0x2, 0x10001}}}}], 0x70) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000040)=r0, 0x1) [ 201.666205][T15437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.669198][T15437] Call Trace: [ 201.670231][T15437] dump_stack+0x137/0x19d [ 201.671451][T15437] should_fail+0x23c/0x250 [ 201.673352][T15437] __should_failslab+0x81/0x90 [ 201.674721][T15437] ? register_for_each_vma+0x372/0x890 [ 201.676481][T15437] should_failslab+0x5/0x20 [ 201.677814][T15437] kmem_cache_alloc_trace+0x49/0x310 [ 201.678660][T15437] ? register_for_each_vma+0x372/0x890 [ 201.679730][T15437] ? vma_interval_tree_iter_next+0x263/0x280 [ 201.680840][T15437] register_for_each_vma+0x372/0x890 [ 201.681982][T15437] __uprobe_register+0x3f4/0x8a0 [ 201.683002][T15437] uprobe_register_refctr+0x29/0x40 [ 201.684064][T15437] probe_event_enable+0x2be/0x7d0 [ 201.685192][T15437] ? __uprobe_trace_func+0x430/0x430 [ 201.686137][T15437] trace_uprobe_register+0x88/0x410 [ 201.686995][T15437] perf_trace_event_init+0x34e/0x790 [ 201.687994][T15437] perf_uprobe_init+0xf5/0x140 [ 201.688994][T15437] perf_uprobe_event_init+0xde/0x140 [ 201.690050][T15437] perf_try_init_event+0x21a/0x400 [ 201.691282][T15437] perf_event_alloc+0xa60/0x1790 [ 201.692010][T15437] __se_sys_perf_event_open+0x5c7/0x2740 [ 201.692928][T15437] ? vfs_write+0x50c/0x770 [ 201.693650][T15437] __x64_sys_perf_event_open+0x63/0x70 [ 201.694575][T15437] do_syscall_64+0x4a/0x90 [ 201.695224][T15437] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 201.696087][T15437] RIP: 0033:0x4665d9 [ 201.696674][T15437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 201.699722][T15437] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 201.700950][T15437] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 201.702097][T15437] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 201.704146][T15437] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.705518][T15437] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 201.706975][T15437] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x2}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 201.762563][T15435] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 201.765328][T15435] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000033226345 [ 201.767190][T15454] PM: suspend entry (deep) [ 201.775058][T15454] Filesystems sync: 0.006 seconds [ 201.776555][T15454] Freezing user space processes ... [ 201.788009][T15445] FAULT_INJECTION: forcing a failure. [ 201.788009][T15445] name failslab, interval 1, probability 0, space 0, times 0 [ 201.791043][T15445] CPU: 0 PID: 15445 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 201.792572][T15445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.794577][T15445] Call Trace: [ 201.795122][T15445] dump_stack+0x137/0x19d [ 201.796248][T15445] should_fail+0x23c/0x250 [ 201.797130][T15445] __should_failslab+0x81/0x90 [ 201.797971][T15445] ? register_for_each_vma+0x372/0x890 [ 201.799114][T15445] should_failslab+0x5/0x20 [ 201.799980][T15445] kmem_cache_alloc_trace+0x49/0x310 [ 201.801248][T15445] ? register_for_each_vma+0x372/0x890 [ 201.802563][T15445] ? vma_interval_tree_iter_next+0x263/0x280 [ 201.804046][T15445] register_for_each_vma+0x372/0x890 [ 201.805046][T15445] __uprobe_register+0x3f4/0x8a0 [ 201.805943][T15445] uprobe_register_refctr+0x29/0x40 [ 201.807322][T15445] probe_event_enable+0x2be/0x7d0 [ 201.808176][T15445] ? __uprobe_trace_func+0x430/0x430 [ 201.809020][T15445] trace_uprobe_register+0x88/0x410 [ 201.809852][T15445] perf_trace_event_init+0x34e/0x790 [ 201.810678][T15445] perf_uprobe_init+0xf5/0x140 [ 201.811986][T15445] perf_uprobe_event_init+0xde/0x140 [ 201.812704][T15445] perf_try_init_event+0x21a/0x400 [ 201.813495][T15445] perf_event_alloc+0xa60/0x1790 [ 201.814517][T15445] __se_sys_perf_event_open+0x5c7/0x2740 [ 201.815335][T15445] ? vfs_write+0x50c/0x770 [ 201.816001][T15445] __x64_sys_perf_event_open+0x63/0x70 [ 201.816847][T15445] do_syscall_64+0x4a/0x90 [ 201.817687][T15445] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 201.818515][T15445] RIP: 0033:0x4665d9 [ 201.819120][T15445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 201.821862][T15445] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 201.823016][T15445] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 201.824402][T15445] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 201.825583][T15445] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 201.826902][T15445] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 201.828441][T15445] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 201.835500][T15454] (elapsed 0.058 seconds) done. [ 201.836356][T15454] OOM killer disabled. [ 201.836961][T15454] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 201.840389][T15454] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:50 executing program 1 (fault-call:1 fault-nth:47): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 202.107429][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 202.613802][T15454] ACPI: Preparing to enter system sleep state S3 [ 202.613937][T15454] PM: Saving platform NVS memory [ 202.613941][T15454] Disabling non-boot CPUs ... [ 202.617145][T15454] smpboot: CPU 1 is now offline [ 202.619732][T15454] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 202.619798][T15454] ACPI: Low-level resume complete [ 202.619879][T15454] PM: Restoring platform NVS memory [ 202.619888][T15454] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 202.629742][T15454] Enabling non-boot CPUs ... [ 202.629978][T15454] x86: Booting SMP configuration: [ 202.629982][T15454] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 202.630159][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 202.631204][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 202.632686][T15454] CPU1 is up [ 202.632966][T15454] ACPI: Waking up from system sleep state S3 [ 202.729619][T15454] OOM killer enabled. [ 202.730272][T15454] Restarting tasks ... done. [ 202.745974][T15454] PM: suspend exit 22:46:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x2}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 202.768010][T15454] PM: suspend entry (deep) [ 202.776166][T15454] Filesystems sync: 0.007 seconds [ 202.781779][T15454] Freezing user space processes ... [ 202.784640][T15442] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 202.787532][T15442] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000d8435515 [ 202.814878][T15454] (elapsed 0.033 seconds) done. [ 202.816037][T15454] OOM killer disabled. [ 202.816613][T15454] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 202.819125][T15454] printk: Suspending console(s) (use no_console_suspend to debug) [ 203.018642][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 203.118523][ T7] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 203.527495][T15454] ACPI: Preparing to enter system sleep state S3 [ 203.527617][T15454] PM: Saving platform NVS memory [ 203.527621][T15454] Disabling non-boot CPUs ... [ 203.530045][T15454] smpboot: CPU 1 is now offline [ 203.532860][T15454] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 203.532927][T15454] ACPI: Low-level resume complete [ 203.533016][T15454] PM: Restoring platform NVS memory [ 203.533086][T15454] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 203.544223][T15454] Enabling non-boot CPUs ... [ 203.544433][T15454] x86: Booting SMP configuration: [ 203.544436][T15454] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 203.544680][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 203.545662][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 203.546994][T15454] CPU1 is up [ 203.547325][T15454] ACPI: Waking up from system sleep state S3 [ 203.654448][T15454] OOM killer enabled. [ 203.655185][T15454] Restarting tasks ... [ 203.662484][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 203.666119][ T1034] block loop5: uevent: failed to send synthetic uevent [ 203.668381][T15470] FAULT_INJECTION: forcing a failure. [ 203.668381][T15470] name failslab, interval 1, probability 0, space 0, times 0 [ 203.672270][T15470] CPU: 0 PID: 15470 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 203.674824][T15470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.677268][T15470] Call Trace: [ 203.678113][T15470] dump_stack+0x137/0x19d [ 203.679436][T15470] should_fail+0x23c/0x250 [ 203.680474][T15470] __should_failslab+0x81/0x90 [ 203.681864][T15470] ? register_for_each_vma+0x372/0x890 [ 203.683037][T15470] should_failslab+0x5/0x20 [ 203.684393][T15470] kmem_cache_alloc_trace+0x49/0x310 22:46:51 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x4}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:51 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x13) 22:46:51 executing program 0 (fault-call:1 fault-nth:46): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x3}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 203.685772][T15470] ? register_for_each_vma+0x372/0x890 [ 203.687179][T15470] ? vma_interval_tree_iter_next+0x24c/0x280 [ 203.688558][T15470] register_for_each_vma+0x372/0x890 [ 203.689876][T15470] __uprobe_register+0x3f4/0x8a0 [ 203.691001][T15470] uprobe_register_refctr+0x29/0x40 [ 203.691984][T15470] probe_event_enable+0x2be/0x7d0 [ 203.693516][T15470] ? __uprobe_trace_func+0x430/0x430 [ 203.694930][T15470] trace_uprobe_register+0x88/0x410 [ 203.696017][T15470] perf_trace_event_init+0x34e/0x790 [ 203.697641][T15470] perf_uprobe_init+0xf5/0x140 [ 203.698421][T15470] perf_uprobe_event_init+0xde/0x140 [ 203.699893][T15470] perf_try_init_event+0x21a/0x400 [ 203.701476][T15470] perf_event_alloc+0xa60/0x1790 [ 203.702395][T15470] __se_sys_perf_event_open+0x5c7/0x2740 [ 203.704345][T15470] ? vfs_write+0x50c/0x770 [ 203.705970][T15470] __x64_sys_perf_event_open+0x63/0x70 [ 203.707508][T15470] do_syscall_64+0x4a/0x90 [ 203.708804][T15470] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 203.710378][T15470] RIP: 0033:0x4665d9 [ 203.711523][T15470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 203.716236][T15470] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 203.718103][T15470] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 203.720038][T15470] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 203.722216][T15470] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.724437][T15470] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 203.726545][T15470] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 203.732609][T15454] done. [ 203.733576][T15454] PM: suspend exit 22:46:51 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/tracing', 0x8002, 0x21) r1 = signalfd4(r0, &(0x7f0000000140)={[0x786]}, 0x8, 0x80800) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r1, 0x89fa, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000280)={'ip6gre0\x00', r2, 0x0, 0x6, 0x6, 0x4, 0x1, @dev={0xfe, 0x80, '\x00', 0x16}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xf2c7fd2f7cf09325, 0xf800, 0x9b, 0x4}}) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:46:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x4}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:51 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0xfffffffffffffffb, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@mcast1, 0x0}, &(0x7f0000000140)=0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xdc, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xc57b23ae56aa70f}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x40004}, 0x60008880) r3 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r3, r3, &(0x7f0000000000)=0x7, 0x3) 22:46:51 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x8}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:51 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x11}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 203.844637][T15486] FAULT_INJECTION: forcing a failure. [ 203.844637][T15486] name failslab, interval 1, probability 0, space 0, times 0 [ 203.848413][T15486] CPU: 1 PID: 15486 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 203.850938][T15486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.853959][T15486] Call Trace: [ 203.854623][T15486] dump_stack+0x137/0x19d [ 203.856069][T15486] should_fail+0x23c/0x250 [ 203.857420][T15486] __should_failslab+0x81/0x90 [ 203.858867][T15486] ? register_for_each_vma+0x372/0x890 [ 203.860693][T15486] should_failslab+0x5/0x20 [ 203.861588][T15486] kmem_cache_alloc_trace+0x49/0x310 [ 203.862916][T15486] ? register_for_each_vma+0x372/0x890 [ 203.864590][T15486] ? vma_interval_tree_iter_next+0x24c/0x280 [ 203.866204][T15486] register_for_each_vma+0x372/0x890 [ 203.867829][T15498] PM: suspend entry (deep) [ 203.867858][T15486] __uprobe_register+0x3f4/0x8a0 [ 203.869889][T15486] uprobe_register_refctr+0x29/0x40 [ 203.871148][T15486] probe_event_enable+0x2be/0x7d0 [ 203.872839][T15486] ? __uprobe_trace_func+0x430/0x430 [ 203.873906][T15486] trace_uprobe_register+0x88/0x410 [ 203.874933][T15486] perf_trace_event_init+0x34e/0x790 [ 203.876201][T15486] perf_uprobe_init+0xf5/0x140 [ 203.877149][T15486] perf_uprobe_event_init+0xde/0x140 [ 203.878383][T15486] perf_try_init_event+0x21a/0x400 [ 203.879329][T15486] perf_event_alloc+0xa60/0x1790 [ 203.880498][T15486] __se_sys_perf_event_open+0x5c7/0x2740 [ 203.881755][T15486] ? vfs_write+0x50c/0x770 [ 203.882703][T15486] __x64_sys_perf_event_open+0x63/0x70 [ 203.883875][T15486] do_syscall_64+0x4a/0x90 [ 203.884729][T15486] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 203.885969][T15486] RIP: 0033:0x4665d9 [ 203.886953][T15486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 203.891383][T15486] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 22:46:51 executing program 1 (fault-call:1 fault-nth:48): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x5}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:51 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x14) [ 203.892971][T15486] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 203.895051][T15486] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 203.896931][T15486] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 203.898736][T15486] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 203.900198][T15486] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 203.921555][T15498] Filesystems sync: 0.052 seconds [ 203.923730][T15498] Freezing user space processes ... (elapsed 0.017 seconds) done. [ 203.943056][T15498] OOM killer disabled. [ 203.943662][T15498] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 203.946625][T15498] printk: Suspending console(s) (use no_console_suspend to debug) [ 204.051623][T13514] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 204.548926][T15498] ACPI: Preparing to enter system sleep state S3 [ 204.549000][T15498] PM: Saving platform NVS memory [ 204.549005][T15498] Disabling non-boot CPUs ... [ 204.552475][T15498] smpboot: CPU 1 is now offline [ 204.555260][T15498] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 204.555321][T15498] ACPI: Low-level resume complete [ 204.555484][T15498] PM: Restoring platform NVS memory [ 204.555493][T15498] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 204.565900][T15498] Enabling non-boot CPUs ... [ 204.566217][T15498] x86: Booting SMP configuration: [ 204.566221][T15498] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 204.566393][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 204.567347][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 204.568857][T15498] CPU1 is up [ 204.569206][T15498] ACPI: Waking up from system sleep state S3 [ 204.669759][T15498] OOM killer enabled. [ 204.670341][T15498] Restarting tasks ... [ 204.679688][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 204.682652][ T1034] block loop5: uevent: failed to send synthetic uevent 22:46:52 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x60}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x6}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 204.701879][T15498] done. [ 204.705688][T15498] PM: suspend exit 22:46:52 executing program 0 (fault-call:1 fault-nth:47): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:52 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r1, r0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) r4 = fsmount(r0, 0x0, 0xf7) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r5, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) preadv(r5, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/219, 0xdb}, {&(0x7f0000000400)=""/27, 0x1b}, {&(0x7f0000000440)=""/147, 0x93}, {&(0x7f0000000500)=""/25, 0x19}, {&(0x7f0000000540)=""/47, 0x2f}, {&(0x7f0000000580)=""/215, 0xd7}, {&(0x7f0000000680)=""/53, 0x35}, {&(0x7f00000006c0)=""/163, 0xa3}, {&(0x7f0000000780)=""/24, 0x18}], 0x9, 0x6, 0x3ff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r2, 0x8, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x731, 0x50}}}}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x56}]}, 0x30}, 0x1, 0x0, 0x0, 0x4040000}, 0xc084) openat(0xffffffffffffffff, &(0x7f0000000880)='./file0/file0\x00', 0x20000, 0x42) r6 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x110) sendfile(r6, r6, &(0x7f0000000000)=0x7, 0x3) fsetxattr$security_evm(r6, &(0x7f0000000040), &(0x7f00000000c0)=@sha1={0x1, "565c65565c598b4f95ee140e15e218fc05fff30a"}, 0x15, 0x3) 22:46:52 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0xe0}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 204.736481][T15510] FAULT_INJECTION: forcing a failure. [ 204.736481][T15510] name failslab, interval 1, probability 0, space 0, times 0 [ 204.739954][T15510] CPU: 0 PID: 15510 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 204.742993][T15510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.746141][T15510] Call Trace: [ 204.747362][T15510] dump_stack+0x137/0x19d [ 204.748502][T15510] should_fail+0x23c/0x250 [ 204.749900][T15510] __should_failslab+0x81/0x90 [ 204.751000][T15510] ? register_for_each_vma+0x372/0x890 [ 204.752656][T15510] should_failslab+0x5/0x20 [ 204.753829][T15510] kmem_cache_alloc_trace+0x49/0x310 [ 204.755444][T15510] ? register_for_each_vma+0x372/0x890 [ 204.757061][T15510] ? vma_interval_tree_iter_next+0x263/0x280 [ 204.758540][T15510] register_for_each_vma+0x372/0x890 [ 204.760198][T15510] __uprobe_register+0x3f4/0x8a0 [ 204.761830][T15510] uprobe_register_refctr+0x29/0x40 [ 204.763564][T15510] probe_event_enable+0x2be/0x7d0 [ 204.765226][T15510] ? __uprobe_trace_func+0x430/0x430 [ 204.766858][T15510] trace_uprobe_register+0x88/0x410 [ 204.768521][T15510] perf_trace_event_init+0x34e/0x790 [ 204.770321][T15510] perf_uprobe_init+0xf5/0x140 [ 204.771681][T15510] perf_uprobe_event_init+0xde/0x140 [ 204.773019][T15510] perf_try_init_event+0x21a/0x400 [ 204.774866][T15510] perf_event_alloc+0xa60/0x1790 [ 204.775766][T15510] __se_sys_perf_event_open+0x5c7/0x2740 [ 204.776671][T15510] ? vfs_write+0x50c/0x770 [ 204.777486][T15510] __x64_sys_perf_event_open+0x63/0x70 [ 204.778505][T15510] do_syscall_64+0x4a/0x90 [ 204.779631][T15510] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 204.780535][T15510] RIP: 0033:0x4665d9 [ 204.781263][T15510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 204.784703][T15510] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a 22:46:52 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x15) 22:46:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x7}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 204.786450][T15510] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 204.787820][T15510] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 204.789482][T15510] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 204.791342][T15510] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 204.792989][T15510] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 204.836043][T15528] PM: suspend entry (deep) [ 204.850025][T15528] Filesystems sync: 0.012 seconds [ 204.852507][T15528] Freezing user space processes ... (elapsed 0.013 seconds) done. [ 204.867661][T15528] OOM killer disabled. [ 204.868404][T15528] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 204.871235][T15528] printk: Suspending console(s) (use no_console_suspend to debug) [ 205.096566][T13514] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 205.585935][T15528] ACPI: Preparing to enter system sleep state S3 [ 205.586066][T15528] PM: Saving platform NVS memory [ 205.586071][T15528] Disabling non-boot CPUs ... [ 205.588425][T15528] smpboot: CPU 1 is now offline [ 205.591037][T15528] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 205.591100][T15528] ACPI: Low-level resume complete [ 205.591184][T15528] PM: Restoring platform NVS memory [ 205.591193][T15528] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 205.601520][T15528] Enabling non-boot CPUs ... [ 205.601799][T15528] x86: Booting SMP configuration: [ 205.601802][T15528] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 205.601999][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 205.603074][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 205.604460][T15528] CPU1 is up [ 205.604749][T15528] ACPI: Waking up from system sleep state S3 [ 205.701670][T15528] OOM killer enabled. [ 205.702234][T15528] Restarting tasks ... [ 205.707295][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 205.709593][ T1034] block loop3: uevent: failed to send synthetic uevent [ 205.721136][T15528] done. [ 205.722749][T15528] PM: suspend exit [ 205.728059][T15538] FAULT_INJECTION: forcing a failure. [ 205.728059][T15538] name failslab, interval 1, probability 0, space 0, times 0 [ 205.730696][T15538] CPU: 0 PID: 15538 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 205.732242][T15538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.733927][T15538] Call Trace: [ 205.734459][T15538] dump_stack+0x137/0x19d [ 205.735217][T15538] should_fail+0x23c/0x250 [ 205.736017][T15538] __should_failslab+0x81/0x90 22:46:53 executing program 1 (fault-call:1 fault-nth:49): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:53 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x1100}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:53 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x8}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 205.736914][T15538] ? register_for_each_vma+0x372/0x890 [ 205.738076][T15538] should_failslab+0x5/0x20 [ 205.739305][T15538] kmem_cache_alloc_trace+0x49/0x310 [ 205.740296][T15538] ? register_for_each_vma+0x372/0x890 [ 205.741215][T15538] ? vma_interval_tree_iter_next+0x263/0x280 [ 205.742545][T15538] register_for_each_vma+0x372/0x890 [ 205.743420][T15538] __uprobe_register+0x3f4/0x8a0 [ 205.744312][T15538] uprobe_register_refctr+0x29/0x40 [ 205.745161][T15538] probe_event_enable+0x2be/0x7d0 [ 205.746181][T15538] ? __uprobe_trace_func+0x430/0x430 [ 205.747403][T15538] trace_uprobe_register+0x88/0x410 [ 205.747461][T15539] PM: suspend entry (deep) [ 205.748498][T15538] perf_trace_event_init+0x34e/0x790 [ 205.750083][T15538] perf_uprobe_init+0xf5/0x140 [ 205.751012][T15538] perf_uprobe_event_init+0xde/0x140 [ 205.751800][T15538] perf_try_init_event+0x21a/0x400 [ 205.752600][T15538] perf_event_alloc+0xa60/0x1790 [ 205.753432][T15538] __se_sys_perf_event_open+0x5c7/0x2740 [ 205.754315][T15538] ? vfs_write+0x50c/0x770 [ 205.755020][T15538] __x64_sys_perf_event_open+0x63/0x70 [ 205.755968][T15538] do_syscall_64+0x4a/0x90 [ 205.756616][T15538] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 205.757471][T15538] RIP: 0033:0x4665d9 [ 205.758098][T15538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 205.761065][T15538] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 205.762480][T15538] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 205.763807][T15538] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 205.765256][T15538] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 205.766441][T15538] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 205.767700][T15538] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 205.790885][T15539] Filesystems sync: 0.041 seconds [ 205.795117][T15539] Freezing user space processes ... [ 205.806266][T15527] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 205.808843][T15527] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000012acec26 [ 205.816545][T15527] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 205.817993][T15527] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000012acec26 [ 205.828203][T15539] (elapsed 0.033 seconds) done. [ 205.829293][T15539] OOM killer disabled. [ 205.830019][T15539] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 205.832707][T15539] printk: Suspending console(s) (use no_console_suspend to debug) 22:46:54 executing program 0 (fault-call:1 fault-nth:48): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 205.908854][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 206.078778][T13470] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 206.419253][T15539] ACPI: Preparing to enter system sleep state S3 [ 206.419384][T15539] PM: Saving platform NVS memory [ 206.419389][T15539] Disabling non-boot CPUs ... [ 206.422714][T15539] smpboot: CPU 1 is now offline [ 206.425051][T15539] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 206.425117][T15539] ACPI: Low-level resume complete [ 206.425196][T15539] PM: Restoring platform NVS memory [ 206.425205][T15539] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 206.435465][T15539] Enabling non-boot CPUs ... [ 206.435674][T15539] x86: Booting SMP configuration: [ 206.435678][T15539] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 206.435899][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 206.437011][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 206.438318][T15539] CPU1 is up [ 206.438604][T15539] ACPI: Waking up from system sleep state S3 [ 206.480890][T15550] hwrng: no data available [ 206.545295][T15539] OOM killer enabled. [ 206.546002][T15539] Restarting tasks ... [ 206.564385][T15545] FAULT_INJECTION: forcing a failure. [ 206.564385][T15545] name failslab, interval 1, probability 0, space 0, times 0 [ 206.567383][T15545] CPU: 0 PID: 15545 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 206.569145][T15545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.570877][T15545] Call Trace: [ 206.571419][T15545] dump_stack+0x137/0x19d [ 206.572144][T15545] should_fail+0x23c/0x250 [ 206.573077][T15545] __should_failslab+0x81/0x90 [ 206.573893][T15545] ? register_for_each_vma+0x372/0x890 [ 206.574795][T15545] should_failslab+0x5/0x20 [ 206.575734][T15545] kmem_cache_alloc_trace+0x49/0x310 [ 206.575773][T15539] done. 22:46:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xa}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:54 executing program 4: keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000040)={0x0, 0xaf, 0xff}, &(0x7f00000000c0)={'enc=', 'raw', ' hash=', {'tgr160-generic\x00'}}, &(0x7f0000000140)="132ee867ae52f66374e878d156d67d6ecc8c5f43884897137ecc4e240ed4f320c0d26650da32cff8cd99557f3a391101934c72e96f67db333c48a71f9c285c1a9ff4d8ae317b1d2b69132b83f360e200421c162beace71c62c130d0c0c74176ca0866d641479b18729cb2130e90539512a1c86fb82aeeb26530aa7a2f5ff4f8a5a9de15aced69171875e3467bbcaa439cd0e6b8caa6c9512620fd56a7eccf2414af8a4e7e03d2a20a14983abc9315c", &(0x7f0000000200)="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") openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) [ 206.576760][T15545] ? register_for_each_vma+0x372/0x890 [ 206.578190][T15545] ? vma_interval_tree_iter_next+0x263/0x280 [ 206.578217][T15545] register_for_each_vma+0x372/0x890 [ 206.578302][T15545] __uprobe_register+0x3f4/0x8a0 [ 206.578391][T15545] uprobe_register_refctr+0x29/0x40 [ 206.578462][T15545] probe_event_enable+0x2be/0x7d0 [ 206.578483][T15545] ? __uprobe_trace_func+0x430/0x430 [ 206.578504][T15545] trace_uprobe_register+0x88/0x410 [ 206.578525][T15545] perf_trace_event_init+0x34e/0x790 [ 206.578545][T15545] perf_uprobe_init+0xf5/0x140 [ 206.578579][T15545] perf_uprobe_event_init+0xde/0x140 [ 206.578598][T15545] perf_try_init_event+0x21a/0x400 [ 206.578618][T15545] perf_event_alloc+0xa60/0x1790 [ 206.578636][T15545] __se_sys_perf_event_open+0x5c7/0x2740 [ 206.578683][T15545] ? vfs_write+0x50c/0x770 [ 206.578709][T15545] __x64_sys_perf_event_open+0x63/0x70 [ 206.580017][T15539] PM: suspend exit [ 206.580790][T15545] do_syscall_64+0x4a/0x90 [ 206.580816][T15545] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 206.594832][T15545] RIP: 0033:0x4665d9 [ 206.595497][T15545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 206.598538][T15545] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 206.599927][T15545] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 206.601411][T15545] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 206.602575][T15545] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 206.604390][T15545] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 206.605920][T15545] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 22:46:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x10}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:46:54 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x6000}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:46:54 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x16) [ 206.662841][T15542] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 206.664444][T15542] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000a697ea26 22:46:54 executing program 1 (fault-call:1 fault-nth:50): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:46:54 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x50, r0, 0xbad5e000) dup3(r1, r0, 0x80000) 22:46:54 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0xe000}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 206.694257][T15556] FAULT_INJECTION: forcing a failure. [ 206.694257][T15556] name failslab, interval 1, probability 0, space 0, times 0 [ 206.696661][T15556] CPU: 0 PID: 15556 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 206.698446][T15556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.700117][T15556] Call Trace: [ 206.700660][T15556] dump_stack+0x137/0x19d [ 206.701393][T15556] should_fail+0x23c/0x250 [ 206.702156][T15556] __should_failslab+0x81/0x90 [ 206.702971][T15556] ? register_for_each_vma+0x372/0x890 [ 206.703957][T15556] should_failslab+0x5/0x20 [ 206.704645][T15556] kmem_cache_alloc_trace+0x49/0x310 [ 206.705582][T15556] ? register_for_each_vma+0x372/0x890 [ 206.706746][T15556] ? vma_interval_tree_iter_next+0x24c/0x280 [ 206.707920][T15556] register_for_each_vma+0x372/0x890 [ 206.708989][T15556] __uprobe_register+0x3f4/0x8a0 [ 206.709855][T15556] uprobe_register_refctr+0x29/0x40 [ 206.710809][T15556] probe_event_enable+0x2be/0x7d0 [ 206.711870][T15556] ? __uprobe_trace_func+0x430/0x430 [ 206.712931][T15556] trace_uprobe_register+0x88/0x410 [ 206.713890][T15556] perf_trace_event_init+0x34e/0x790 [ 206.714958][T15556] perf_uprobe_init+0xf5/0x140 [ 206.715690][T15556] perf_uprobe_event_init+0xde/0x140 [ 206.716551][T15556] perf_try_init_event+0x21a/0x400 [ 206.717336][T15556] perf_event_alloc+0xa60/0x1790 [ 206.718134][T15556] __se_sys_perf_event_open+0x5c7/0x2740 [ 206.719158][T15556] ? vfs_write+0x50c/0x770 [ 206.719776][T15556] __x64_sys_perf_event_open+0x63/0x70 [ 206.720801][T15556] do_syscall_64+0x4a/0x90 [ 206.721598][T15556] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 206.722752][T15556] RIP: 0033:0x4665d9 [ 206.723375][T15556] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 206.726772][T15556] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 206.728170][T15556] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 206.729385][T15556] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 206.730590][T15556] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 206.731836][T15556] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 206.733205][T15556] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 22:46:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x60}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 206.785298][T15584] PM: suspend entry (deep) [ 206.792834][T15584] Filesystems sync: 0.006 seconds [ 206.794502][T15584] Freezing user space processes ... [ 206.805115][T15585] FAULT_INJECTION: forcing a failure. [ 206.805115][T15585] name failslab, interval 1, probability 0, space 0, times 0 [ 206.808307][T15585] CPU: 1 PID: 15585 Comm: syz-executor.1 Not tainted 5.13.0-rc7-syzkaller #0 [ 206.809669][T15585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.811193][T15585] Call Trace: [ 206.811648][T15585] dump_stack+0x137/0x19d [ 206.812509][T15585] should_fail+0x23c/0x250 [ 206.813260][T15585] __should_failslab+0x81/0x90 [ 206.813983][T15585] ? register_for_each_vma+0x372/0x890 [ 206.814804][T15585] should_failslab+0x5/0x20 [ 206.815480][T15585] kmem_cache_alloc_trace+0x49/0x310 [ 206.816260][T15585] ? register_for_each_vma+0x372/0x890 [ 206.817100][T15585] ? vma_interval_tree_iter_next+0x24c/0x280 [ 206.818044][T15585] register_for_each_vma+0x372/0x890 [ 206.818948][T15585] __uprobe_register+0x3f4/0x8a0 [ 206.819933][T15585] uprobe_register_refctr+0x29/0x40 [ 206.820986][T15585] probe_event_enable+0x2be/0x7d0 [ 206.822088][T15585] ? __uprobe_trace_func+0x430/0x430 [ 206.823180][T15585] trace_uprobe_register+0x88/0x410 [ 206.824002][T15585] perf_trace_event_init+0x34e/0x790 [ 206.824825][T15585] perf_uprobe_init+0xf5/0x140 [ 206.825918][T15585] perf_uprobe_event_init+0xde/0x140 [ 206.827098][T15585] perf_try_init_event+0x21a/0x400 [ 206.827935][T15585] perf_event_alloc+0xa60/0x1790 [ 206.828835][T15585] __se_sys_perf_event_open+0x5c7/0x2740 [ 206.829789][T15585] ? vfs_write+0x50c/0x770 [ 206.830405][T15585] __x64_sys_perf_event_open+0x63/0x70 [ 206.831444][T15585] do_syscall_64+0x4a/0x90 [ 206.832138][T15585] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 206.833257][T15585] RIP: 0033:0x4665d9 [ 206.833996][T15585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 206.837063][T15585] RSP: 002b:00007f059dd89188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 206.838274][T15585] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 206.839412][T15585] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 206.840515][T15585] RBP: 00007f059dd891d0 R08: 0000000000000000 R09: 0000000000000000 [ 206.842066][T15585] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 206.843393][T15585] R13: 00007ffe1f4edd0f R14: 00007f059dd89300 R15: 0000000000022000 [ 206.850750][T15584] (elapsed 0.056 seconds) done. [ 206.851838][T15584] OOM killer disabled. [ 206.852589][T15584] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 206.855066][T15584] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:04 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x1000000}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 207.200809][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 216.993276][T15584] ACPI: Preparing to enter system sleep state S3 [ 216.993368][T15584] PM: Saving platform NVS memory [ 216.993372][T15584] Disabling non-boot CPUs ... [ 216.996577][T15584] smpboot: CPU 1 is now offline [ 216.998905][T15584] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 216.998988][T15584] ACPI: Low-level resume complete [ 216.999074][T15584] PM: Restoring platform NVS memory [ 216.999083][T15584] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 217.009905][T15584] Enabling non-boot CPUs ... [ 217.010049][T15584] x86: Booting SMP configuration: [ 217.010052][T15584] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 217.010226][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 217.011323][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 217.012779][T15584] CPU1 is up [ 217.013013][T15584] ACPI: Waking up from system sleep state S3 [ 217.116577][T15584] OOM killer enabled. 22:47:04 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x17) 22:47:04 executing program 0 (fault-call:1 fault-nth:49): openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xe0}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:04 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x2000000}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:04 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0x57, 0x1) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000001, 0x50, r1, 0x63d3a000) [ 217.117232][T15584] Restarting tasks ... done. [ 217.145158][T15584] PM: suspend exit 22:47:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 217.188055][T15585] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 217.189805][T15585] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003be7d257 22:47:05 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x4000000}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 217.225673][T15608] FAULT_INJECTION: forcing a failure. [ 217.225673][T15608] name failslab, interval 1, probability 0, space 0, times 0 [ 217.229841][T15608] CPU: 1 PID: 15608 Comm: syz-executor.0 Not tainted 5.13.0-rc7-syzkaller #0 [ 217.232364][T15608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.235597][T15608] Call Trace: [ 217.236717][T15608] dump_stack+0x137/0x19d [ 217.238012][T15608] should_fail+0x23c/0x250 [ 217.239422][T15608] __should_failslab+0x81/0x90 [ 217.240783][T15608] ? register_for_each_vma+0x372/0x890 [ 217.242187][T15608] should_failslab+0x5/0x20 [ 217.243735][T15608] kmem_cache_alloc_trace+0x49/0x310 [ 217.245260][T15608] ? register_for_each_vma+0x372/0x890 [ 217.246952][T15608] ? vma_interval_tree_iter_next+0x24c/0x280 [ 217.248659][T15608] register_for_each_vma+0x372/0x890 [ 217.250325][T15608] __uprobe_register+0x3f4/0x8a0 [ 217.251693][T15608] uprobe_register_refctr+0x29/0x40 [ 217.253453][T15608] probe_event_enable+0x2be/0x7d0 [ 217.255309][T15608] ? __uprobe_trace_func+0x430/0x430 [ 217.255472][T15612] PM: suspend entry (deep) [ 217.256933][T15608] trace_uprobe_register+0x88/0x410 [ 217.259819][T15608] perf_trace_event_init+0x34e/0x790 [ 217.261087][T15608] perf_uprobe_init+0xf5/0x140 [ 217.262191][T15608] perf_uprobe_event_init+0xde/0x140 [ 217.263478][T15608] perf_try_init_event+0x21a/0x400 [ 217.264752][T15608] perf_event_alloc+0xa60/0x1790 [ 217.265879][T15608] __se_sys_perf_event_open+0x5c7/0x2740 [ 217.267504][T15608] ? vfs_write+0x50c/0x770 [ 217.268410][T15608] __x64_sys_perf_event_open+0x63/0x70 [ 217.269342][T15608] do_syscall_64+0x4a/0x90 [ 217.270507][T15608] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 217.271570][T15608] RIP: 0033:0x4665d9 22:47:05 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x18) 22:47:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xfc}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 217.272189][T15608] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 217.276933][T15608] RSP: 002b:00007f01ec569188 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 217.278912][T15608] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 217.280657][T15608] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000480 [ 217.282560][T15608] RBP: 00007f01ec5691d0 R08: 0000000000000000 R09: 0000000000000000 [ 217.284928][T15608] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 217.286930][T15608] R13: 00007fff07e2807f R14: 00007f01ec569300 R15: 0000000000022000 [ 217.307319][T15612] Filesystems sync: 0.049 seconds [ 217.309544][T15612] Freezing user space processes ... (elapsed 0.022 seconds) done. [ 217.333746][T15612] OOM killer disabled. [ 217.334495][T15612] Freezing remaining freezable tasks ... (elapsed 0.000 seconds) done. [ 217.336741][T15612] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x1fc}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x8000000}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 217.545561][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 218.042523][T15612] ACPI: Preparing to enter system sleep state S3 [ 218.042634][T15612] PM: Saving platform NVS memory [ 218.042639][T15612] Disabling non-boot CPUs ... [ 218.045931][T15612] smpboot: CPU 1 is now offline [ 218.048634][T15612] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 218.048695][T15612] ACPI: Low-level resume complete [ 218.048776][T15612] PM: Restoring platform NVS memory [ 218.048785][T15612] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 218.059219][T15612] Enabling non-boot CPUs ... [ 218.059385][T15612] x86: Booting SMP configuration: [ 218.059388][T15612] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 218.059589][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 218.060417][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 218.061989][T15612] CPU1 is up [ 218.062236][T15612] ACPI: Waking up from system sleep state S3 [ 218.177477][T15612] OOM killer enabled. [ 218.178454][T15612] Restarting tasks ... [ 218.184980][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 218.187777][ T1034] block loop5: uevent: failed to send synthetic uevent [ 218.205201][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 218.207908][ T1034] block loop3: uevent: failed to send synthetic uevent 22:47:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 218.214665][T15612] done. [ 218.218106][T15612] PM: suspend exit [ 218.232624][T15612] PM: suspend entry (deep) [ 218.241655][T15612] Filesystems sync: 0.007 seconds [ 218.243988][T15612] Freezing user space processes ... [ 218.249485][T15607] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 218.252269][T15607] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e5cb1ee4 [ 218.277112][T15612] (elapsed 0.033 seconds) done. [ 218.278437][T15612] OOM killer disabled. [ 218.279306][T15612] Freezing remaining freezable tasks ... (elapsed 0.003 seconds) done. [ 218.284501][T15612] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x300}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 218.387828][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 218.893173][T15612] ACPI: Preparing to enter system sleep state S3 [ 218.893274][T15612] PM: Saving platform NVS memory [ 218.893278][T15612] Disabling non-boot CPUs ... [ 218.895633][T15612] smpboot: CPU 1 is now offline [ 218.898171][T15612] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 218.898236][T15612] ACPI: Low-level resume complete [ 218.898388][T15612] PM: Restoring platform NVS memory [ 218.898397][T15612] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 218.909205][T15612] Enabling non-boot CPUs ... [ 218.909393][T15612] x86: Booting SMP configuration: [ 218.909398][T15612] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 218.909586][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 218.910729][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 218.912284][T15612] CPU1 is up [ 218.912627][T15612] ACPI: Waking up from system sleep state S3 [ 219.809333][T15612] OOM killer enabled. 22:47:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x11000000}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x500}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:07 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/resume_offset', 0x26e040, 0x17) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:47:07 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x19) [ 219.810081][T15612] Restarting tasks ... done. [ 219.846596][T15612] PM: suspend exit 22:47:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0x60000000}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:07 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3, 0x100010, r1, 0x7fed7000) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r4 = dup3(r3, r0, 0x0) r5 = accept$inet6(r4, &(0x7f00000001c0), 0xfffffffffffffffe) r6 = syz_open_dev$loop(&(0x7f0000000200), 0x9, 0x0) sendfile(r5, r6, &(0x7f0000000000)=0xe1a, 0x9) 22:47:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x600}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 219.961182][T15628] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 219.962963][T15628] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e15d8b5d 22:47:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:07 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1a) 22:47:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0xe0000000}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x700}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:07 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r2, r1, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) io_uring_setup(0xddc, &(0x7f00000000c0)={0x0, 0x9b07, 0x20, 0x2, 0x1fe, 0x0, r1}) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:47:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xa00}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:07 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1b) [ 220.119796][T15691] PM: suspend entry (deep) [ 220.130448][T15691] Filesystems sync: 0.009 seconds [ 220.134050][T15691] Freezing user space processes ... (elapsed 0.003 seconds) done. [ 220.139262][T15691] OOM killer disabled. [ 220.140310][T15691] Freezing remaining freezable tasks ... (elapsed 0.000 seconds) done. [ 220.142719][T15691] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0xfeffffff}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x3f00}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 220.471476][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 220.959130][T15691] ACPI: Preparing to enter system sleep state S3 [ 220.959202][T15691] PM: Saving platform NVS memory [ 220.959206][T15691] Disabling non-boot CPUs ... [ 220.962430][T15691] smpboot: CPU 1 is now offline [ 220.965053][T15691] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 220.965115][T15691] ACPI: Low-level resume complete [ 220.965206][T15691] PM: Restoring platform NVS memory [ 220.965215][T15691] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 220.975385][T15691] Enabling non-boot CPUs ... [ 220.975661][T15691] x86: Booting SMP configuration: [ 220.975666][T15691] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 220.975893][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 220.976789][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 220.978128][T15691] CPU1 is up [ 220.978418][T15691] ACPI: Waking up from system sleep state S3 [ 221.088388][T15691] OOM killer enabled. [ 221.089222][T15691] Restarting tasks ... done. [ 221.105119][T15691] PM: suspend exit [ 221.111497][T15693] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 221.112080][T15708] PM: suspend entry (deep) [ 221.113793][T15693] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000008e3ff0d3 [ 221.126007][T15708] Filesystems sync: 0.006 seconds [ 221.128464][T15708] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 221.145512][T15708] OOM killer disabled. [ 221.146457][T15708] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 221.149498][T15708] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x20000500, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:09 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0xffffff7f}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:09 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1c) 22:47:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0xf, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 221.303579][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 221.790724][ T1012] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 221.807639][T15708] ACPI: Preparing to enter system sleep state S3 [ 221.807749][T15708] PM: Saving platform NVS memory [ 221.807753][T15708] Disabling non-boot CPUs ... [ 221.811484][T15708] smpboot: CPU 1 is now offline [ 221.813753][T15708] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 221.813816][T15708] ACPI: Low-level resume complete [ 221.813903][T15708] PM: Restoring platform NVS memory [ 221.813913][T15708] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 221.824377][T15708] Enabling non-boot CPUs ... [ 221.824577][T15708] x86: Booting SMP configuration: [ 221.824581][T15708] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 221.824775][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 221.825855][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 221.827213][T15708] CPU1 is up [ 221.827513][T15708] ACPI: Waking up from system sleep state S3 [ 222.052833][T15708] OOM killer enabled. [ 222.053690][T15708] Restarting tasks ... [ 222.063948][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 222.066272][ T1034] block loop5: uevent: failed to send synthetic uevent [ 222.070866][T15708] done. [ 222.081669][T15708] PM: suspend exit 22:47:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x4000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1fe, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:09 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1d) 22:47:09 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0xfffffffe}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x6000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:10 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}, 0xffffffff}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x80fe}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x1fe, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:10 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x3, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:10 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1fd5) 22:47:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xe000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xfc00}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:10 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x5, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:10 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r1, r0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000001440)={0x20, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wg1\x00', 0x0}) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) r7 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r7, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x11, 0x806, r6, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x5b, 0xd9d, 0x1, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7, 0x80, 0x0, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000240)={'syztnl1\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x4, 0x80, 0x1f, 0x9, 0x1, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast2, 0x1, 0x8000, 0x76, 0x19a3}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f00000003c0)={'syztnl0\x00', &(0x7f0000000340)={'ip6tnl0\x00', 0x0, 0x4, 0x0, 0x3f, 0x7fff, 0x41, @ipv4={'\x00', '\xff\xff', @local}, @private2={0xfc, 0x2, '\x00', 0x1}, 0x11, 0x0, 0x9, 0x4c48}}) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f00000004c0)={'syztnl0\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x2f, 0x3, 0x0, 0xfb, 0x60, @loopback, @remote, 0x80, 0x720, 0x8, 0x9}}) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000640)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xf8, r3, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [@HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xf8}}, 0x4040) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000680)={&(0x7f0000000400)={0x30, 0x0, 0x800, 0x70bd28, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x6d}, @val={0x8}, @val={0xc, 0x99, {0x9, 0x5}}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x24000000}, 0x20004800) r12 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r12, r12, &(0x7f0000000000)=0x7, 0x3) 22:47:10 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x8, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x3, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xfc01}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 222.388714][T15751] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 222.390421][T15751] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003354bcb1 [ 222.435299][T15779] PM: suspend entry (deep) [ 222.439685][T15762] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 222.442189][T15762] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000ca5a75dd [ 222.442722][T15779] Filesystems sync: 0.005 seconds [ 222.447198][T15779] Freezing user space processes ... (elapsed 0.028 seconds) done. [ 222.477263][T15779] OOM killer disabled. [ 222.477912][T15779] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 222.480967][T15779] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:10 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1fd8) 22:47:10 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0xffe9, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x20000500, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xfe80}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 222.515533][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 223.019263][T15779] ACPI: Preparing to enter system sleep state S3 [ 223.019336][T15779] PM: Saving platform NVS memory [ 223.019351][T15779] Disabling non-boot CPUs ... [ 223.022627][T15779] smpboot: CPU 1 is now offline [ 223.025254][T15779] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 223.025317][T15779] ACPI: Low-level resume complete [ 223.025398][T15779] PM: Restoring platform NVS memory [ 223.025408][T15779] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 223.035706][T15779] Enabling non-boot CPUs ... [ 223.035912][T15779] x86: Booting SMP configuration: [ 223.035916][T15779] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 223.036108][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 223.037080][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 223.038596][T15779] CPU1 is up [ 223.038888][T15779] ACPI: Waking up from system sleep state S3 [ 223.148378][T15779] OOM killer enabled. [ 223.149389][T15779] Restarting tasks ... done. [ 223.176168][T15779] PM: suspend exit [ 223.193036][T15779] PM: suspend entry (deep) [ 223.201362][T15779] Filesystems sync: 0.006 seconds [ 223.203147][T15779] Freezing user space processes ... (elapsed 0.024 seconds) done. [ 223.229042][T15779] OOM killer disabled. [ 223.229789][T15779] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 223.232394][T15779] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:12 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0xffeb, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xff00}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 223.337400][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 223.833413][T15779] ACPI: Preparing to enter system sleep state S3 [ 223.833493][T15779] PM: Saving platform NVS memory [ 223.833497][T15779] Disabling non-boot CPUs ... [ 223.836218][T15779] smpboot: CPU 1 is now offline [ 223.838802][T15779] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 223.838962][T15779] ACPI: Low-level resume complete [ 223.839106][T15779] PM: Restoring platform NVS memory [ 223.839116][T15779] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 223.848888][T15779] Enabling non-boot CPUs ... [ 223.849107][T15779] x86: Booting SMP configuration: [ 223.849111][T15779] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 223.849280][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 223.850430][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 223.852039][T15779] CPU1 is up [ 223.852181][T15779] ACPI: Waking up from system sleep state S3 [ 224.762021][T15779] OOM killer enabled. [ 224.763005][T15779] Restarting tasks ... done. [ 224.784811][T15779] PM: suspend exit 22:47:12 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) fcntl$setpipe(r0, 0x407, 0x7d0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 224.807535][T15782] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 224.810085][T15782] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000008eda44db [ 224.850646][T15817] PM: suspend entry (deep) [ 224.861957][T15817] Filesystems sync: 0.009 seconds [ 224.864207][T15817] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 224.881251][T15817] OOM killer disabled. [ 224.882323][T15817] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 224.885200][T15817] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:13 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 224.999765][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 225.489203][T12851] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 225.506630][T15817] ACPI: Preparing to enter system sleep state S3 [ 225.506768][T15817] PM: Saving platform NVS memory [ 225.506772][T15817] Disabling non-boot CPUs ... [ 225.509870][T15817] smpboot: CPU 1 is now offline [ 225.512247][T15817] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 225.512341][T15817] ACPI: Low-level resume complete [ 225.512421][T15817] PM: Restoring platform NVS memory [ 225.512430][T15817] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 225.522815][T15817] Enabling non-boot CPUs ... [ 225.523081][T15817] x86: Booting SMP configuration: [ 225.523084][T15817] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 225.523257][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 225.524368][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 225.525796][T15817] CPU1 is up [ 225.526081][T15817] ACPI: Waking up from system sleep state S3 [ 225.961681][T15817] OOM killer enabled. [ 225.962341][T15817] Restarting tasks ... [ 225.963289][ T1034] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 225.966386][ T1034] block loop4: uevent: failed to send synthetic uevent 22:47:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x40000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 225.986158][T15817] done. [ 225.987895][T15817] PM: suspend exit [ 225.995766][T15824] PM: suspend entry (deep) [ 226.007840][T15824] Filesystems sync: 0.010 seconds [ 226.010079][T15824] Freezing user space processes ... [ 226.011569][T15815] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 226.015819][T15815] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003354bcb1 [ 226.040237][T15824] (elapsed 0.030 seconds) done. [ 226.041283][T15824] OOM killer disabled. [ 226.042274][T15824] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 226.045333][T15824] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:15 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1fdb) 22:47:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x2, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 226.201993][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 226.706793][T15824] ACPI: Preparing to enter system sleep state S3 [ 226.706868][T15824] PM: Saving platform NVS memory [ 226.706872][T15824] Disabling non-boot CPUs ... [ 226.710031][T15824] smpboot: CPU 1 is now offline [ 226.712671][T15824] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 226.712740][T15824] ACPI: Low-level resume complete [ 226.712888][T15824] PM: Restoring platform NVS memory [ 226.712897][T15824] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 226.722971][T15824] Enabling non-boot CPUs ... [ 226.723240][T15824] x86: Booting SMP configuration: [ 226.723244][T15824] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 226.723448][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 226.724384][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 226.726067][T15824] CPU1 is up [ 226.726319][T15824] ACPI: Waking up from system sleep state S3 [ 227.626015][T15824] OOM killer enabled. [ 227.626738][T15824] Restarting tasks ... [ 227.639580][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 227.643176][ T1034] block loop5: uevent: failed to send synthetic uevent 22:47:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x2, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x4, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x100000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/class/tty', 0x2, 0x115) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000a00)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000b00)=':%${%&*\x00') fallocate(r1, 0x1, 0x5, 0xf90) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000a80)={{r2, r3+10000000}, {r4, r5+10000000}}, &(0x7f0000000ac0)) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"/2354], 0x93f) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) ftruncate(r6, 0x3) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 227.656799][T15824] done. [ 227.659470][T15824] PM: suspend exit 22:47:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x8, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 227.712688][T15827] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 227.714286][T15827] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000df377ce4 22:47:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x1000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x42, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5, 0x111200) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f00000001c0)=""/31) sendfile(r2, r2, &(0x7f0000000040)=0x4, 0x3) [ 227.777789][T15834] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 227.779913][T15834] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b6a97475 22:47:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x3, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x2000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:15 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1fde) 22:47:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x11, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x3000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/bus/mipi-dsi', 0x2, 0x28) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:47:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x4, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x60, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 227.876065][T15856] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 227.877679][T15856] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000f10bc4ab 22:47:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x4000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 227.948834][T15856] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 227.950475][T15856] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000001b22d06c 22:47:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x6, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:15 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) preadv2(r1, &(0x7f0000001500)=[{&(0x7f00000000c0)=""/126, 0x7e}, {&(0x7f0000000140)=""/240, 0xf0}, {&(0x7f0000000240)=""/238, 0xee}, {&(0x7f0000000040)=""/25, 0x19}, {&(0x7f0000000340)=""/56, 0x38}, {&(0x7f0000000380)=""/13, 0xd}, {&(0x7f00000003c0)=""/214, 0xd6}, {&(0x7f00000004c0)=""/51, 0x33}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x9, 0x5, 0x6e76, 0x0) 22:47:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x5000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:15 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1fe1) 22:47:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0xe0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 228.017223][T15888] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 228.018687][T15888] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000d2aeef7f [ 228.038788][T15900] PM: suspend entry (deep) [ 228.054232][T15900] Filesystems sync: 0.013 seconds [ 228.056558][T15900] Freezing user space processes ... (elapsed 0.004 seconds) done. [ 228.062951][T15900] OOM killer disabled. [ 228.063831][T15900] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 228.066419][T15900] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x1100, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x5, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 228.105466][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 228.607316][T15900] ACPI: Preparing to enter system sleep state S3 [ 228.607458][T15900] PM: Saving platform NVS memory [ 228.607463][T15900] Disabling non-boot CPUs ... [ 228.610605][T15900] smpboot: CPU 1 is now offline [ 228.613415][T15900] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 228.613478][T15900] ACPI: Low-level resume complete [ 228.613560][T15900] PM: Restoring platform NVS memory [ 228.613571][T15900] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 228.623506][T15900] Enabling non-boot CPUs ... [ 228.623648][T15900] x86: Booting SMP configuration: [ 228.623651][T15900] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 228.623855][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 228.624841][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 228.626298][T15900] CPU1 is up [ 228.626571][T15900] ACPI: Waking up from system sleep state S3 [ 228.736075][T15900] OOM killer enabled. [ 228.736697][T15900] Restarting tasks ... done. [ 228.757759][T15900] PM: suspend exit 22:47:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x6000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 228.774127][T15900] PM: suspend entry (deep) [ 228.785284][T15900] Filesystems sync: 0.009 seconds [ 228.788155][T15900] Freezing user space processes ... [ 228.791230][T15897] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 228.793802][T15897] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000008a77acc [ 228.826321][T15900] (elapsed 0.038 seconds) done. [ 228.827142][T15900] OOM killer disabled. [ 228.828096][T15900] Freezing remaining freezable tasks ... (elapsed 0.003 seconds) done. [ 228.832947][T15900] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:18 executing program 4: openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) 22:47:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x6000, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x7000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 228.927619][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 229.441839][T15900] ACPI: Preparing to enter system sleep state S3 [ 229.441931][T15900] PM: Saving platform NVS memory [ 229.441935][T15900] Disabling non-boot CPUs ... [ 229.444546][T15900] smpboot: CPU 1 is now offline [ 229.447336][T15900] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 229.447398][T15900] ACPI: Low-level resume complete [ 229.447482][T15900] PM: Restoring platform NVS memory [ 229.447491][T15900] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 229.457287][T15900] Enabling non-boot CPUs ... [ 229.457468][T15900] x86: Booting SMP configuration: [ 229.457472][T15900] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 229.457714][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 229.458712][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 229.460175][T15900] CPU1 is up [ 229.460422][T15900] ACPI: Waking up from system sleep state S3 [ 230.337571][T15900] OOM killer enabled. [ 230.338253][T15900] Restarting tasks ... done. [ 230.360901][T15900] PM: suspend exit 22:47:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x6, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:18 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1fe9) 22:47:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0xe000, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:18 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000040)={0xfffffffffffff801, 0x7ff, 0x509c}) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:47:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x8000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xa000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0xffff, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 230.519949][T15956] PM: suspend entry (deep) [ 230.532154][T15956] Filesystems sync: 0.011 seconds [ 230.537212][T15956] Freezing user space processes ... [ 230.547638][T15932] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 230.550101][T15932] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000020f3f826 [ 230.576026][T15956] (elapsed 0.038 seconds) done. [ 230.577430][T15956] OOM killer disabled. [ 230.578150][T15956] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 230.581642][T15956] printk: Suspending console(s) (use no_console_suspend to debug) [ 230.999756][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 231.502828][T15956] ACPI: Preparing to enter system sleep state S3 [ 231.503016][T15956] PM: Saving platform NVS memory [ 231.503021][T15956] Disabling non-boot CPUs ... [ 231.506088][T15956] smpboot: CPU 1 is now offline [ 231.508620][T15956] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 231.508680][T15956] ACPI: Low-level resume complete [ 231.508765][T15956] PM: Restoring platform NVS memory [ 231.508774][T15956] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 231.518223][T15956] Enabling non-boot CPUs ... [ 231.518367][T15956] x86: Booting SMP configuration: [ 231.518376][T15956] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 231.518574][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 231.519715][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 231.521138][T15956] CPU1 is up [ 231.521386][T15956] ACPI: Waking up from system sleep state S3 [ 231.567166][T15965] hwrng: no data available [ 231.625055][T15956] OOM killer enabled. [ 231.625829][T15956] Restarting tasks ... [ 231.627950][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 231.631117][ T1034] block loop5: uevent: failed to send synthetic uevent [ 231.655130][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent 22:47:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x8, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:19 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1ff2) [ 231.656979][ T1034] block loop3: uevent: failed to send synthetic uevent [ 231.659804][T15956] done. 22:47:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x10000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 231.681075][T15956] PM: suspend exit 22:47:19 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/power/suspend_stats', 0x1a8c2, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x82) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309) r2 = accept4$inet6(r0, 0x0, &(0x7f0000000000), 0x81800) sendfile(r0, r2, &(0x7f0000000080)=0x5, 0x8) 22:47:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x10000120}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:19 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), r0) sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000580)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000540)={&(0x7f0000000140)={0x3e8, r2, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xd8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc0a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x60, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x101}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @private=0xa010102}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_MEDIA={0x94, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffe0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffe}]}]}, @TIPC_NLA_BEARER={0xb4, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0xff}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'macvlan0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'macvtap0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_SOCK={0x74, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1cd}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xfe1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3f}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK={0xe0, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5aec}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}]}, 0x3e8}, 0x1, 0x0, 0x0, 0x800}, 0x4810) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 231.702374][T15963] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 231.704931][T15963] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000001b22d06c 22:47:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x8, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:19 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x2}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:19 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x20010010}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 231.801355][T16000] PM: suspend entry (deep) [ 231.813113][T16000] Filesystems sync: 0.010 seconds [ 231.817086][T16000] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 231.826067][T16000] OOM killer disabled. [ 231.826767][T16000] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 231.829357][T16000] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:30 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x4}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x3f000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 232.020715][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 242.107909][T16000] ACPI: Preparing to enter system sleep state S3 [ 242.108051][T16000] PM: Saving platform NVS memory [ 242.108055][T16000] Disabling non-boot CPUs ... [ 242.111251][T16000] smpboot: CPU 1 is now offline [ 242.113648][T16000] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 242.113709][T16000] ACPI: Low-level resume complete [ 242.113787][T16000] PM: Restoring platform NVS memory [ 242.113796][T16000] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 242.124981][T16000] Enabling non-boot CPUs ... [ 242.125204][T16000] x86: Booting SMP configuration: [ 242.125207][T16000] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 242.125386][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 242.126384][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 242.127803][T16000] CPU1 is up [ 242.128152][T16000] ACPI: Waking up from system sleep state S3 [ 242.250044][T16000] OOM killer enabled. 22:47:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x9, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:30 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x1ffc) 22:47:30 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) recvfrom$inet(r0, &(0x7f00000001c0)=""/211, 0xd3, 0x180, 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) 22:47:30 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x8}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x40000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 242.251325][T16000] Restarting tasks ... done. [ 242.300661][T16000] PM: suspend exit 22:47:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x9, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:30 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x60000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:30 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x11}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 242.348698][T15999] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 242.351552][T15999] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e21fef31 [ 242.382708][T16025] PM: suspend entry (deep) [ 242.389011][T16025] Filesystems sync: 0.004 seconds [ 242.391435][T16025] Freezing user space processes ... [ 242.409271][T16011] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 242.413167][T16011] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000008b250cff [ 242.438170][T16025] (elapsed 0.046 seconds) done. [ 242.439876][T16025] OOM killer disabled. [ 242.441156][T16025] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 242.445139][T16025] printk: Suspending console(s) (use no_console_suspend to debug) [ 242.851109][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 243.357596][T16025] ACPI: Preparing to enter system sleep state S3 [ 243.357689][T16025] PM: Saving platform NVS memory [ 243.357694][T16025] Disabling non-boot CPUs ... [ 243.360886][T16025] smpboot: CPU 1 is now offline [ 243.363511][T16025] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 243.363579][T16025] ACPI: Low-level resume complete [ 243.363659][T16025] PM: Restoring platform NVS memory [ 243.363669][T16025] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 243.374238][T16025] Enabling non-boot CPUs ... [ 243.374404][T16025] x86: Booting SMP configuration: [ 243.374407][T16025] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 243.374616][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 243.375717][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 243.377175][T16025] CPU1 is up [ 243.377550][T16025] ACPI: Waking up from system sleep state S3 [ 243.496632][T16025] OOM killer enabled. [ 243.497878][T16025] Restarting tasks ... [ 243.502143][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 243.506371][ T1034] block loop5: uevent: failed to send synthetic uevent [ 243.506973][T16025] done. [ 243.518304][T16025] PM: suspend exit 22:47:31 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x2000) 22:47:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x60}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0xa, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x7ffffff7}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 243.526853][T16025] PM: suspend entry (deep) [ 243.546769][T16025] Filesystems sync: 0.018 seconds [ 243.549184][T16025] Freezing user space processes ... (elapsed 0.023 seconds) done. [ 243.575534][T16025] OOM killer disabled. [ 243.576483][T16025] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 243.580433][T16025] printk: Suspending console(s) (use no_console_suspend to debug) [ 243.693823][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 244.208463][T16025] ACPI: Preparing to enter system sleep state S3 [ 244.208539][T16025] PM: Saving platform NVS memory [ 244.208544][T16025] Disabling non-boot CPUs ... [ 244.210885][T16025] smpboot: CPU 1 is now offline [ 244.213551][T16025] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 244.213670][T16025] ACPI: Low-level resume complete [ 244.213755][T16025] PM: Restoring platform NVS memory [ 244.213764][T16025] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 244.225804][T16025] Enabling non-boot CPUs ... [ 244.226007][T16025] x86: Booting SMP configuration: [ 244.226011][T16025] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 244.226208][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 244.227257][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 244.228781][T16025] CPU1 is up [ 244.229157][T16025] ACPI: Waking up from system sleep state S3 [ 244.349902][T16025] OOM killer enabled. [ 244.351112][T16025] Restarting tasks ... [ 244.358777][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 244.362613][ T1034] block loop3: uevent: failed to send synthetic uevent 22:47:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0xe0}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 244.376222][T16025] done. [ 244.379924][T16025] PM: suspend exit 22:47:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0x97ffffff}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x1100}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0xa, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0xb, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:32 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x4000) 22:47:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xe0000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0xb, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xe0ffffff}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x6000}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:32 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x4001) 22:47:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0xe000}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xeffdffff}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x1000000}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0xc, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xf7ffff7f}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:32 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x4002) 22:47:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x2000000}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x4000000}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0xd, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xfc000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 244.800422][T16101] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 244.803433][T16101] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000008b250cff 22:47:32 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x8002) 22:47:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0xd, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xfc010000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x8000000}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xfe800000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x11000000}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:32 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xc000) 22:47:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0xe, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xfe80ffff}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0xe, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:32 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0x60000000}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xfec0ffff}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:32 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = io_uring_setup(0x415f, &(0x7f00000000c0)={0x0, 0x7c9, 0x1, 0x0, 0x3b2}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001640)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000000400)={{}, 0x0, 0x8, @inherit={0x88, &(0x7f0000001440)=ANY=[@ANYRES16=r4, @ANYRES16, @ANYRES64]}, @devid}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f00000018c0)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0}}) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r7 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r7, &(0x7f0000000040)='system_u:object_r:printer_device_t:s0\x00', 0x26) sendmsg$NLBL_CIPSOV4_C_REMOVE(r6, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000001840)=ANY=[@ANYRES32=r5, @ANYRES32=r4, @ANYRESHEX=r7, @ANYRES16, @ANYRES32, @ANYRES16=r1, @ANYRES32=r3], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x4040025) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000140)={{r1}, {@val={r5}, @actul_num={@void, 0xe70, 0x70}}}) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$system_posix_acl(r8, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080), 0x24, 0x0) r9 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000280)={"1cb4a5d316fd6197a6d9491db11b033b", r4, 0x0, {0x400, 0x4}, {0x80000000}, 0x0, [0x81, 0x5, 0xe80, 0x7, 0x9, 0x400, 0x0, 0x7c, 0x9e2, 0x200, 0x9, 0x3ff, 0x5, 0x2, 0x1, 0x10001]}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r9, 0x50009418, &(0x7f0000001cc0)={{r8}, r10, 0x8, @inherit={0x98, &(0x7f0000001480)=ANY=[@ANYBLOB="00000000000000000a000000000000006800000000000000e0059bc5c4aa000005000000000000000000200001000000bcde67570000000069745e140000000007000000000000000300000000000000090000000000000006000000000000000900000000000000ff0300000000000000040000000000007f000000000000000535e3345b00593258dda03805cd00000000000000d12200"]}, @devid=r5}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, &(0x7f0000000140)={{}, 0x0, 0x1c, @inherit={0x68, &(0x7f00000000c0)={0x1, 0x4, 0x10000, 0x9, {0x1, 0xfffffffffffffffd, 0x80000001, 0x9, 0x6}, [0x0, 0x6, 0x9, 0x100000000]}}, @devid=r5}) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:47:32 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xc001) 22:47:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0xe0000000}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0xfeffffff}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xff000000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x10, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 245.257014][T16170] device lo entered promiscuous mode [ 245.260232][T16170] Y­4`Ò˜: renamed from lo [ 245.273606][T16170] PM: suspend entry (deep) [ 245.282140][T16170] Filesystems sync: 0.006 seconds [ 245.285451][T16170] Freezing user space processes ... (elapsed 0.010 seconds) done. [ 245.298554][T16170] OOM killer disabled. [ 245.300168][T16170] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 245.304635][T16170] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0xffffff7f}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xffff0000}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x10, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 245.359104][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 245.864788][T16170] ACPI: Preparing to enter system sleep state S3 [ 245.864869][T16170] PM: Saving platform NVS memory [ 245.864873][T16170] Disabling non-boot CPUs ... [ 245.868248][T16170] smpboot: CPU 1 is now offline [ 245.871089][T16170] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 245.871182][T16170] ACPI: Low-level resume complete [ 245.871269][T16170] PM: Restoring platform NVS memory [ 245.871279][T16170] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 245.882899][T16170] Enabling non-boot CPUs ... [ 245.883058][T16170] x86: Booting SMP configuration: [ 245.883062][T16170] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 245.883260][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 245.884242][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 245.885605][T16170] CPU1 is up [ 245.885798][T16170] ACPI: Waking up from system sleep state S3 [ 246.013969][T16170] OOM killer enabled. [ 246.015392][T16170] Restarting tasks ... done. [ 246.021129][T16170] PM: suspend exit 22:47:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0xfffffffe}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:33 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xc002) 22:47:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xffff80fe}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:33 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) [ 246.088013][T16179] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 246.091083][T16179] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e15d8b5d 22:47:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private=0xffffffff}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x11, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xffffc0fe}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:33 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x116b87, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x981b, 0x3) 22:47:34 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x20000010, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xfffffdef}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 246.171291][T16199] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 246.174442][T16199] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000024431770 22:47:34 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) fcntl$setstatus(r0, 0x4, 0x800) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r0, r1, &(0x7f0000000000)=0x7, 0x3) 22:47:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x11, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:34 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x20000290, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 246.241956][T16199] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 246.244940][T16199] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000f10bc4ab 22:47:34 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x7ffff000) 22:47:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xffffff7f}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:34 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0xa242, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) preadv(0xffffffffffffffff, &(0x7f0000003ac0)=[{&(0x7f0000000900)=""/4096, 0x1000}, {&(0x7f0000001900)=""/178, 0xb2}, {&(0x7f00000019c0)=""/239, 0xef}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002ac0)=""/4096, 0x1000}], 0x5, 0x5, 0x800) r2 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x9]}, 0x8) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000003b40)={{0x22, 0xfe}, 'port0\x00', 0xe4, 0x8, 0x0, 0x0, 0x0, 0xfffffffd, 0xfffffffc}) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000100)={{0x2, 0x9}, 'port0\x00', 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}) close_range(r3, r0, 0x2) io_setup(0xfffffff8, &(0x7f0000000280)=0x0) r5 = open(&(0x7f0000000700)='./file0\x00', 0x212900, 0x8a8b2207c240f8b) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r5, 0xc08c5335, &(0x7f0000000740)={0x1f, 0xd2, 0x0, 'queue0\x00', 0x1}) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00', 0x0, 0x0, 0x8000000}) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/timer_list\x00', 0x0, 0x0) r8 = signalfd4(r1, &(0x7f0000000580)={[0xff]}, 0x8, 0x0) io_submit(r4, 0x3, &(0x7f00000006c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0xfffd, r6, &(0x7f0000000380)="3ad19fb5ead37d5c32d6242017c2e7670144a7a3f49dd619bc5974067a77e7459efe6301b4b7053e2ab5f0fe92842aa132bcdc99e5150ab10843f2727e9844dc359f19b3664425369c659f6a41b632b2395a687cc0abe4e649c23e9592de48b6dad681e76c6038c0ab5fd9ad181eacb9eca645f03e38101b6b5876b99b8cc5220a3bed61a891ae1fba96c157c8c1919d74c757b660335375dd", 0x99, 0x7, 0x0, 0x2}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x6, 0xbef, r7, &(0x7f0000000440)="e18fa5248b57c359593125bff51f9a62115c72b28714b4b1a4e5c2916f6a1f74f4a7891b98fbac4a1b688e591a0b0969098de6c69fde1f8d5876b1a268d636a24a89da4adb97d1928ad327ee48d66e54c85db8fc08dc93b21e0c7af752dd58a9c9b9db0c337ebd9e4db63a2d37f894f701101224737c77a92580c19268a484d6baf668e10d3c6abe8a74f0dcbf3a4bbe8f252d312884aad911a50781b57fd305042a6fbc4823ff8a01097111975a973250e1c42468a46366d7ddd5b907d1cfb2f143a4be4cd1ae7165", 0xc9, 0x9, 0x0, 0x2, r2}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x2, 0x1000, r8, &(0x7f00000005c0)="366812c6d1f04d02591b5778fe88a22e5e2b5e5b3983ae08062f4cb99a57e9fa774ddc85a9a9698c5470e1d3b026135315afdf991f234b34f6ab5451090de2b0cef186d1e397287830088f13b0e21366b88d8cd7ade26fcedc86dd75b4e6759b3076e6ec048d2f251ad0906217a674f75ce2a68da4ba82a24bedf1fab5283f7dbef2e8d40fbaf3b78994205a9024c76cf9235fc4e52364b38ba4f31cc711d6bd8ccba27e9ee08acdf0", 0xa9, 0x2, 0x0, 0x1, r2}]) getsockname(r0, &(0x7f00000001c0)=@generic, &(0x7f00000008c0)=0x80) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000800)) sendfile(r3, r0, &(0x7f0000000240)=0x7, 0x3) 22:47:34 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x20000310, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x12, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xffffff97}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:34 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r1, r0, &(0x7f0000000000)=0x9, 0x3) [ 246.396183][T16235] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 246.399048][T16235] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000008eda44db 22:47:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev, 0xffffffe0}, 0x1c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x12, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:34 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r1, r0, &(0x7f0000000280)=0x1, 0x7) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f00000001c0)={{0x80, 0x8}, 'port1\x00', 0xc4, 0x40000, 0x2, 0x3, 0x3, 0x10001, 0x4, 0x0, 0x4, 0x4}) 22:47:34 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x20000590, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:47:34 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x3}], 0x1}}], 0x2, 0x8dc0) 22:47:34 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0xffffffffffffffff) 22:47:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x2, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x13, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.473821][T16256] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 246.476925][T16256] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000058ebfd18 22:47:34 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/bus/pci_express', 0x0, 0x84) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:47:34 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x5}], 0x1}}], 0x2, 0x8dc0) 22:47:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x10, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:34 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x101002, 0x140) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = fcntl$dupfd(r2, 0x0, r2) fcntl$lock(r3, 0x7, &(0x7f0000000000)={0x0, 0x2, 0x963, 0xfffffffffffffff8, 0xffffffffffffffff}) r4 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r4, r1, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000040)='veth1_to_team\x00') sendfile(r0, r0, &(0x7f0000000000)=0x9, 0x3) [ 246.601379][T16271] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 246.603731][T16271] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000018a68571 22:47:34 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) r2 = dup3(r1, r0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000100), 0x9, 0x228241) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f0000000140)='-:%\x00', 0x0, r2) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000001c0)='7', 0x1}, {&(0x7f0000000180)="e5005467d1695c7d1874f6dcffc597c25b5464865942ded0eed54269287dcc0b79b901adc4edf876356f9901fcbf7f2ac65954f4141c7e4f6863bc01e553"}, {&(0x7f0000000400)="3397b13694a9c3984c82c44571574abf8dbc746942254d83b17c837fd202e36b28d62cc158a3cc075640f236b6831619a227b57f992927877f4540647fc784a3c203c59262b5dfc2489bd149fb8bec74fa3057e06f9b22c8c269e96e5bfc6ce43a7d7aad18042db7c56e3bc516fbd390de9be5a50ce567e403416780c2144f1f63ddb2459fb2f0b54a11ee9a7f80dc94d791579cd3d7f0e545d563de27eda2558fc6aeba2fdb027179d880791d29f6340e00cb5b025896e93d9c129b44ee171ecbef3f08ec3d5fbff49a04291909051017f06144d31119c6e6a3d38ac9f6a694e2053d7fcce388f16a0091fdd4e9698faa64779ce381c4b8290bf6823b4acad0c453d3b430319141f7439d960950cf885b2d73f83db72b700750cba0aa51c4308883d8cd55fd30f49ddd1df785f1155e90d57a6888564e571cdd71a6c24e2c02f2d1c2435e46d08426a928e1c63f4696a2cd7f3a7e67b45551f9fefef568ba33241ccca283481f740e2f027b9b3be5046dbb31804d550f909f8a813ca928fe1361dbc1f737a7de63bb442567c0d82e9fc8ec71211fdd21fbf0d41d3dd47546da598d3b36fd4f2ee37ec6419969e3aab8e647a356a16dc372c8b4622ca53b3c9a2e42a0f4d499dfeafb8cdf26cfb178d713ff09a4b6b820665a268348d5cedf5b2c9bfbb4b0f54e1899283d63c9421ea202833366a7727dad0c77b918dc8d22f49a33a4ddb0267af520d76c3f388970d4a9a4f3feb74ff0e4e9889277514736cfdcc2fedd54bad09f67e45090376cac19950edc1aab26eb053707069bc3906bce5f3e9a6761ff8cbdf01dda3026ed148657e7e5dfc1aeae3340278f7bca24de792e530413e4420001d7153e6f55402748ef99850fc7d1ccd1f091aed47d7ea70dda997c8a231a5d66d192c138bfc041a03a175a5a205f2f5ea9fca9a52e447bf1a38d7ed3d7ff9f6a97c11d18c8c0e9410bb16eaad11f17f14d68359d96d6c8e43561f4bc5acf2489e1037a782778cc1b3513e8acd93b7de32b630ca23b1ed0dbb4c544a957a76e6b7748c103c8b263b6ed8438cf8ca1da93edfd0765506c98ad69b13e6241a9e4f6858cf0d741d2c230f4668fa7354710b8913272b02d4fa83bc3e9ade03c160fe47fedb2ab8156584dc03e07d1ee6e80b7433a6e1987dd008f1ed28ea9fd34175506c805db852c201533d7db7ee825b8b6c9e7a0157bf1bdd8da2a9b161053efa676ddbd99cc99ac3aa6a24c41cb10b20851a2b6e9c01a71b0cbc766db0cf8c669af0e8833c693dc38e3550205e07171794442398486ebc23471fd5bb9a1f1e35507d1dd70e474db1dbe22c8fd3b8c54f06396c0138082f40e5dd754f2f3f19325204fe3d1d87bda359f67e14212695fc413634024a1258b2ef6f70b2054b79f392751cacc7a69be98c826e7648678a35e3f958595780f8dbc4428ba361ebb8458592f977048fa257ff40d07dfd0041cadabe7b996137e6cf072945a634015310c4471594261a626bb3acc8d63985c7c690b0236887a60b284e9bbf3b7c73c861ae0819e385ca68003125238351b7ae124cdbfe0e168a720bb49d7b48ba4621ad88d3526d89febc5677dcd2952650038d82f09550fe0026989fda57fa0fb9baf1aeca133ee556d3406bfa8e11101f7fdfd71b5aa4bc431613c767dbd63046c2f62971e735f719b72191c57dc1d674f24247c974da794c3ed0971c236ac3f3c8d2c06a2051653a8cae3a7e2e61bc3bfc384b7cf24614f8089b5ce1cf1055c6fd03156d59bffe4e3c6c64651522b7f83164935d1f6f910f55a612546fabf6425e23a1f5dae4e566250986eb2d38c5536acd1c18fcc2d4711df5ae0e9c961aef58dfdb02560e10fe099a2035b41339fbdf85d6f501395603282db817f76e50b06c8f4b2cc05fe3add179f09228b7f59a1cf7418e7e6efa5f453e9b451b57adfff7167b1bd9622b42ad71522d87eead3b41aac0b00e65428472789502aad656975e5b7c6e1b5d76639502ac704776d0f7c53f3545bbabbcb55fc53d94d51df46194d03c676902f78e546941351fca589bc22f8493734ee502f744c44b76ded7157f69b023a30194141fd94abbd0401bcf244dfcebd8cc630c45996ab0ebef214892972933f03eaf52cb86d0ad021d177cee914738f5922eaa71737c4a10af31d62d81d1a1241db6deb131984ed44364bb81646d0df702fd04b71ad6fc2a4c67ee95ccd21a560a5a921467fc2c22bdbcb0eb9a160f04902069a0e8f9a0e7b96eb3ff620af3a1c8dfe1fca4a0268e4fc5eae64088938627e0dc79a5bc8c358a93addfa29a4af582feaca7448f6bc30867efbac1c4f6a54aaa0211a4aa97c3cbfff04c15f1d644248fb4e036256de8e46c2e6dff0bafd69303719be3ae5babc3eaa96963374f39317614c590fa612826d5a273e1ac3a658f9d798a18f6cc8dda008a495b02e7010d4da1697f1196d0ad3eea92f25a5584a111cabcafa392b5eff9d6c0c318002abe13465cb183e8d20c0ea11869b283d8bc71c56682eeac734263ea6308032e7efcbbd5cc1348fa1be7243428755b568bad69e5bf584dcbb9a8472d8e41ce9d6f5c4d79b2e199056de6886426e139c4506b02633d6149bb3c8884b9b3f1076fbf02ee5cd6154e1ec3afa1901882cf1a5332d835981f091fc27482240e884653886b9e15e60090d9b50aedfe7afbbb971dd9f40c9255531bf1ddf7b0cf85d41b04c638a39c41ea5ebb0db7df86230af30f9a37a7d2a84e2ccc4994c8ada91bdbffba30e4eb8c75c713a15df7a0aae1b5ae2380bb5350d605b8c616ccb8ff0d85ac80c24aeadc368ebb2b0552350a0b014c4381c019fe81cc7d37448d461f6075a2fb04a6cd592feb0996d7cf15f618c3bbe773730b8a5658f6c66da38154c12b96d03ad63eb7c80e66dbde3609f79b867d53ffb31a905ecfc8e2fc93add8990e581fc179befa141e0bd5677b7b7b3d9759d26883131da274f49f2f1b0b401529f30fcdcdea0e1e5bd853f5634b0b3a0d01edad6fd0525f6ebe0575df21fa33f3280a119967205ded63273013887b864d6675704530bd0ccb262cf973cb4d1601a1786c08649e7175d9be9ee35ae594e8bb252fe99c95e2d21819b1a7418116bccbef8c245c82cecc6c82247b19364ca203e096ba8a9818bb41a74f3daa4af5e738acc0280fe2cca90e10b5d19e7de5b2d04692d3ff95740a4abb2b516826e05f25cc0871f64f5c7aa0d955a28c51bf3708a66c908a7bb4cbaef43031224d45520521fc3903f5eb7e8fdc68e1853d8f36ab2449b4ff258455e8776627810cee9c93baf559323c373f7cf7dd8f95f83e1daf79ea7e29529cca0e05bc284e938b68557d18b54497068480f3404784bdd3fde674c53450d8aa819e4c4e686b5e29a8f9bdb37973194c6b45d2399e448d50bf9091efc0f1b4ec0785aa54ce655718e5a9a3ef2336c9c26aa1ae911064f511667ca3db9979be59be0e6e6852e4524553eba97205feeaa4b671b9b9da3a009b79ef9415244355a28140fea632f36f99c50da2067cbb2b71cdb62fa5ca3965d203b13ca9527d530ece8705d175677288fa7908fa3f15d9f43f08028aa1847329fff96d73eb1a346c18b435a2035ba82dbef1498b582d0032c86cfcebd0ec13f2f37595ed5f89e9fba434a6a921d092c33bc76d7f349135b44f70fdd9ab318c1e3ae0157b1f57b3f8a466b18513aef66dd118a410b7c7494d9660d5c4c22e5767474fc8e0144f9af00d5aee96c1ac55d96ace115af3ec18e7116d7c72486006d4a70ce970de09d1d9155e3275d776ed8ba8cf621baebb05d2f7ecfd15d039a2fe72b802370240e94eb709d0b99c507a2f14663a71b597881a2211f3c1b35e2e5f5731990952585e4962bbf788dbd46df3c383f12d8c44914305b871123ebe89acf03a7df73739b7e697faafa361074f67838c1d451df0fed8e87d15e92c5afc6b441fa8e286c508bc0c48b9b9cc229b2fe5ef7591c06de900d8aae8b0bb49984a319f87f415f035bb746fbc2a962bd1fb3b9035bdfd42468309b4ea88379fc64593725a416eda053ffefaac4f31d211db43f6e897616ea43ea98dcc5401655e3d76878544ab237c14ec8a9106f70f73a96c794bf1f41a3b197fd9c3d02c0f3b9c849f07d64a29706ecf98d393f3554ea368520242a31a3111460d2bc20bdfa4fb2b12a9d034f157dfd0fd99155463c50b43efd0c78b99476dcfaa4a284e5a347805892b7ec29e4219a87e506c3d0187c74914f5128c6b94b98f34f595cd59251d945573c22f3130a8d8b01d4f7785c77f56a429a13df0fc2298368bc0086628a5e42757b6bedc4aacd746e578dd8ea04046ed91aee16179bf3dc5f293e3dcce150f89f4a9d516107a41d7511bb41ad36d47e39604bf41620361a4157653fbfde5ac7849983b4041050a1f866fefba28b0be9c6c896748ce343801754dd3b4fc11c4a16ad3b1a5caccf2ef2fdfafb9931d3eb012dd61ab563481e97671e30b02672ef2569b8bee05df4e2672e5b0bec26753e20e4c677fddbfefbd627ec57f7379838ddd119a6702e58807924f71024d8613df3361978e3eee30a6b25b43bbcb1c4b0cdfe517268944b8be411bc494239f3626e42f6aeb75638714e0a8cc43e62ed43285c32c6e44aa17c1aacd1caae4cdecf661127d25042895c5c5ed891a843a3768eb2bf2173fa32c68f0282082853d1c2ea91d5e46e67cbedb1898c6fbddf771eff6e3f73fbadc6b254ede6841c0819900b770fe76691622c2e99fca3dc7d3a7c5dacd3e672809fe1157868d93638161c9bd57892a2929822ff8b2cadc156cd0578ef35e6ff4da8cf1bb41707ed4e1f14a432b419aa6a367db9feb1947f3c4bcc6a438dd9756daa43e040c9dc5064e0754b053edd2611f9438aeaa7586f465d9be337d167cafdcaa8c0ca450e75ab7707c153e704e95bc63445ba3a4cf3fb41d9913ee8513932b78d1bdb96ab7653785870ed3ff4230092e7c8e6d1af020a83e4dfd3e48db5a44fc5ab8d40e1ae75e80d68528ed6d7f9ab73393b6acc1a60fe096d6a613c504d5262eeb2a514e25c82a082066c549750f4d76814e7254fa8ac6379d7baba0508eeb0f3755aa4eb3270c6702835f9bf94a1150cb1c378d5f64e70cc2d6a22f2f31d63002612591ad1e87d16708ce2a99b04089e15feca64947b8b9807c23d3d700706798c6316b1c6c5a61f66054c82f22a08f859f1e3e83e46bf5e418415204e88ac8f74405ecb54bb852cb637a4faac88ec9a468089baab2c640fceb942ee77b2f2a988e649e47a3024647aab5e4b0e7de2fd9d0595cf91f68eb5fd6d44b0b989b93240b5d37ec7e6420767599db581504ff5390c47d1e8429ec228ab205117e2f91523f1bed57849a4c8a64ae269b3a026ed97e5371947aec5de82f9fe0430792597304b8ea57c9df23f87e2452b3458be87a2ee61c5a60d509ed479d4e8e3dbd8e8255e2a5f430a1aa66f8572103e7a3cbb80399807d8769923a2ee19436011bcc2dd7c71c5b3c6b582f400bb657b4f79c2d8b8ba9dbd487630d59100dddb62940a201e261e3557651d6dec30a4095db89005fb21f629e5c5145fd901fa49a57ef6dfdd0dec01cf51376d28eba7837bb6458b181ddc06d01832009ca9249a8e9d640320b6c1d1c7c73a88615cd5869ab27dd536a7a0b180a8139a60aaacf3dd999615a4f2e3efa69ac1691617afe73643b7e3d53510c99351859441cf0b5fc43190bf155cabb25e8da30005d2324a5b6de4bc7b610433142ddb9a0d15e034"}, {&(0x7f00000002c0)="32a55ae3904f7018c686e25acb65bfe0d27d3f89e6552e3127d81b77e3c273991e4d64b43eff7d3ddec89cd57bcaa4bfbad46034e228eaed8afd3a16600325cafb61e70eefe5dfecb178c613efd44af72daa97d2c4bc331fe3315009b7dd3e2c67ed9a171f5eca7d9c292950d1b2cba8f1456dcfcb99d13cd727f23992ba512deaaae75367f055ed495898959b5eb12fb958b3043b729b7ea2901bdec4e77cdd57e433eec483e789bee3464528a22cb363ce854b3c5d60cffcc59fccdc8d133fe0ece86d6657a00e19e6e39dd6fcd6f287f98d312aae04dc467e37663794c5b8f742a189cb4ebf07bd383b7b934c5f78"}], 0x57b98c9f33e181ab) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x60040, 0x0) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) openat$bsg(0xffffffffffffff9c, &(0x7f00000003c0), 0x40, 0x0) 22:47:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x27, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:34 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r3, r2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xf8, 0x1, 0x9, 0x4, 0x0, 0x0, 0x400, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000001c0), 0x8}, 0xa044, 0x6800000000, 0x80000001, 0x1, 0x7ff, 0x5, 0x7, 0x0, 0xa0e8, 0x0, 0xffff}, r1, 0x8, r2, 0xb) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000140)={0x4, 0x80, 0x4, 0x20, 0x0, 0x6, 0x0, 0x100000000, 0x680, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x247c, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x4000, 0x7fffffff, 0x80000000, 0x4, 0x2, 0xff92, 0x8, 0x0, 0x4, 0x0, 0x9}, 0xffffffffffffffff, 0x2, r0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x6, 0x8, 0x6, 0x0, 0x8001, 0xca08, 0x9, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x100, 0x2, @perf_config_ext={0xfff, 0x677}, 0x1024, 0x5, 0x3, 0x3, 0x3, 0x3, 0x2, 0x0, 0x0, 0x0, 0x1}, r1, 0x4, r4, 0x0) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) 22:47:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x18, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:34 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x8}], 0x1}}], 0x2, 0x8dc0) 22:47:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x27, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.687801][T16290] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 246.690146][T16290] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000f10bc4ab 22:47:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1b, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:34 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0xffe9}], 0x1}}], 0x2, 0x8dc0) [ 246.783232][T16314] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 246.785981][T16314] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000033226345 22:47:34 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x42002, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x3, 0x28, &(0x7f0000000040)="215ee2dba3155f2dd40ff279efcc00499961a93d9de24cef75dddf28548bb910752434cdb0f49730", 0x0, 0x1}, {0x1db, 0x50, &(0x7f00000000c0)="63b221fb621814d3a47cd7685f475938dafd2e410420c033aaea7483c29b7ffab6012e460a6897747a208185a5d102bfcd99f93331c3f372925902d5678e02ad8a59bb9a3d05554ecb48c13c17b40707", 0x0, 0x1}]}) 22:47:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x48, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x2000001c, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x48, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 246.878766][T16341] PM: suspend entry (deep) [ 246.889021][T16341] Filesystems sync: 0.009 seconds [ 246.892172][T16341] Freezing user space processes ... (elapsed 0.003 seconds) done. [ 246.896938][T16341] OOM killer disabled. [ 246.897736][T16341] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 246.900414][T16341] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0xffeb}], 0x1}}], 0x2, 0x8dc0) 22:47:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x20000bdc, 0x0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 246.922635][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 247.440388][T16341] ACPI: Preparing to enter system sleep state S3 [ 247.440478][T16341] PM: Saving platform NVS memory [ 247.440483][T16341] Disabling non-boot CPUs ... [ 247.443759][T16341] smpboot: CPU 1 is now offline [ 247.446387][T16341] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 247.446452][T16341] ACPI: Low-level resume complete [ 247.446556][T16341] PM: Restoring platform NVS memory [ 247.446565][T16341] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 247.457667][T16341] Enabling non-boot CPUs ... [ 247.457868][T16341] x86: Booting SMP configuration: [ 247.457872][T16341] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 247.458117][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 247.459175][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 247.460581][T16341] CPU1 is up [ 247.460831][T16341] ACPI: Waking up from system sleep state S3 [ 247.559144][T16341] OOM killer enabled. [ 247.559797][T16341] Restarting tasks ... [ 247.564668][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 247.566683][ T1034] block loop5: uevent: failed to send synthetic uevent 22:47:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x20000042}], 0x1}}], 0x2, 0x8dc0) 22:47:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x2}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 247.586495][T16341] done. [ 247.588321][T16341] PM: suspend exit [ 247.595627][T16340] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 247.596946][T16340] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000f805926a 22:47:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x4c, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:35 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x20000082}], 0x1}}], 0x2, 0x8dc0) [ 247.668713][T16346] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 247.670192][T16346] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000033226345 [ 247.688042][T16364] PM: suspend entry (deep) [ 247.694911][T16364] Filesystems sync: 0.006 seconds [ 247.696805][T16364] Freezing user space processes ... (elapsed 0.010 seconds) done. [ 247.708072][T16364] OOM killer disabled. [ 247.708737][T16364] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 247.712195][T16364] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x4c, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 247.975125][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 248.464555][T16364] ACPI: Preparing to enter system sleep state S3 [ 248.464671][T16364] PM: Saving platform NVS memory [ 248.464675][T16364] Disabling non-boot CPUs ... [ 248.466978][T16364] smpboot: CPU 1 is now offline [ 248.469530][T16364] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 248.469594][T16364] ACPI: Low-level resume complete [ 248.469677][T16364] PM: Restoring platform NVS memory [ 248.469687][T16364] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 248.480290][T16364] Enabling non-boot CPUs ... [ 248.480543][T16364] x86: Booting SMP configuration: [ 248.480548][T16364] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 248.480723][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 248.481853][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 248.483303][T16364] CPU1 is up [ 248.483480][T16364] ACPI: Waking up from system sleep state S3 [ 248.583030][T16364] OOM killer enabled. 22:47:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x3}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:36 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r2, r1, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) open(&(0x7f0000000140)='./file0\x00', 0x2000, 0x4) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x2, 0x20, 0x2, 0x3b, 0x0, 0x5, 0x20040, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0xc}, 0x48000, 0xa38d, 0x800, 0x3, 0x5da88807, 0x0, 0xfffe, 0x0, 0xdb, 0x0, 0x80}, 0xffffffffffffffff, 0x10, r0, 0x2) r3 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r3, r3, &(0x7f0000000000)=0x7, 0x3) 22:47:36 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x7ffff000}], 0x1}}], 0x2, 0x8dc0) 22:47:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x4}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 248.583711][T16364] Restarting tasks ... [ 248.632785][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 248.636329][ T1034] block loop5: uevent: failed to send synthetic uevent [ 248.644078][T16364] done. [ 248.647394][T16364] PM: suspend exit 22:47:36 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0xfffffdef}], 0x1}}], 0x2, 0x8dc0) 22:47:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x5}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 248.719599][T16374] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 248.722155][T16374] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000f805926a [ 248.755991][T16386] PM: suspend entry (deep) [ 248.762963][T16386] Filesystems sync: 0.005 seconds [ 248.764783][T16386] Freezing user space processes ... (elapsed 0.005 seconds) done. [ 248.771424][T16386] OOM killer disabled. [ 248.772199][T16386] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 248.775278][T16386] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x68, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:37 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x2}}], 0x2, 0x8dc0) 22:47:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x6}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 249.007630][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 249.522841][T16386] ACPI: Preparing to enter system sleep state S3 [ 249.522933][T16386] PM: Saving platform NVS memory [ 249.522938][T16386] Disabling non-boot CPUs ... [ 249.526258][T16386] smpboot: CPU 1 is now offline [ 249.528971][T16386] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 249.529035][T16386] ACPI: Low-level resume complete [ 249.529115][T16386] PM: Restoring platform NVS memory [ 249.529124][T16386] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 249.540810][T16386] Enabling non-boot CPUs ... [ 249.541001][T16386] x86: Booting SMP configuration: [ 249.541005][T16386] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 249.541218][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 249.542256][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 249.544022][T16386] CPU1 is up [ 249.544272][T16386] ACPI: Waking up from system sleep state S3 [ 249.661249][T16386] OOM killer enabled. [ 249.662010][T16386] Restarting tasks ... done. [ 249.682491][T16386] PM: suspend exit 22:47:37 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x3}}], 0x2, 0x8dc0) 22:47:37 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x68, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 249.721283][T16374] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 249.723956][T16374] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000001b22d06c 22:47:37 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000440)={0xc, @time={0x4, 0x80000001}, 0x3, {0x5, 0x4}, 0x0, 0x1, 0xf7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) write$P9_RSTAT(r0, &(0x7f00000003c0)={0x56, 0x7d, 0x2, {0x0, 0x4f, 0x2, 0x1, {0x10, 0x0, 0x7}, 0x80040000, 0xdf, 0x90, 0x400, 0xa, 'xcbc(aes)\x00', 0x7, '{/(:-\\#', 0x1, '-', 0xa, 'xcbc(aes)\x00'}}, 0x56) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x3f, 0xff, 0xc9, 0x7, 0x0, 0x5, 0x40500, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x3ff, 0x80}, 0x8, 0x6, 0x9, 0x1, 0x8, 0xa3, 0xd3, 0x0, 0x7f, 0x0, 0x1}, 0x0, 0x5, r0, 0x1) socketpair(0x29, 0x4, 0x3ff, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$nl_xfrm(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=@delsa={0x11c, 0x11, 0x100, 0x70bd26, 0x25dfdbfb, {@in6=@empty, 0x4d6, 0x2, 0xff}, [@encap={0x1c, 0x4, {0xffffffffffffffff, 0x4e21, 0x4e22, @in6=@private0}}, @offload={0xc, 0x1c, {0x0, 0x2}}, @offload={0xc}, @replay_val={0x10, 0xa, {0x70bd26, 0x70bd29, 0x7}}, @srcaddr={0x14, 0xd, @in=@multicast1}, @user_kmaddress={0x2c, 0x13, {@in6=@mcast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x2}}, @algo_auth_trunc={0x6e, 0x14, {{'xcbc(aes)\x00'}, 0x110, 0x180, "bb5abeee077b429e33fa572679ab0df4711305fb63425dbbd1982dbd9bab8cdec55a"}}]}, 0x11c}, 0x1, 0x0, 0x0, 0x24004054}, 0x20040000) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000480)='/sys/kernel/kexec_crash_size', 0x145801, 0x100) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r4, 0x40505331, &(0x7f00000004c0)={{0x0, 0x1}, {0xe6, 0x4}, 0x9, 0x2, 0x7}) 22:47:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x7}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:37 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x208002, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r1) r3 = socket$inet6(0xa, 0x3, 0x9) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x3a, 0x41, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x0, r5}) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x50, r2, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@GTPA_VERSION={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_TID={0xc}, @GTPA_LINK={0x8, 0x1, r5}, @GTPA_I_TEI={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x44000}, 0x51) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14040000070000000000000081823d0000000000000000f7b595f4", @ANYRES16=r2, @ANYBLOB="442a63bf5010b00fdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0xd0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000800), 0xc, &(0x7f0000000880)={&(0x7f0000000840)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="040226bd7000fddadf25011800170800040064010101"], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x24014001) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x300, 0x70bd2b, 0x25dfdbfc, {}, [@GTPA_I_TEI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x800) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18800802}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000225bd7000fedbdf2501fd00000c00030000000000000000ff08000500ac1414bb0c00030069ad77e8fa64249d946b6f6dc01405010000000000000008000900040000000c00030001000000000000000c0003000100000000000000080008000100000008000400ffffffff08000500ac1414aa8cce33ac53653493e4b27f1137c4b298a03e9e4e790e1d03b6ed0c828894d9754d9fc8f0328116aa4f63911921d385899a93874a9f27"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x888d0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r2, 0x20, 0x70bd2a, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_LINK={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_NET_NS_FD={0x8}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_MS_ADDRESS={0x8, 0x5, @loopback}, @GTPA_FLOW={0x6, 0x6, 0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x9e744df16b9ceebc) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f08ee02a1fc3344c", @ANYRES16=r2, @ANYBLOB="00042dbd7000ffdbdf25000000000c0003000200000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x28004}, 0x20008040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x100, 0x70bd27, 0x3ff, {}, [@GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_FLOW={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r2, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@GTPA_I_TEI={0x8, 0x8, 0x1}, @GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_LINK={0x8}, @GTPA_I_TEI={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x2000000) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000040)=0x1) [ 249.809652][T16400] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 249.811518][T16400] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000ab65124b [ 249.841880][T16414] PM: suspend entry (deep) [ 249.854597][T16414] Filesystems sync: 0.011 seconds [ 249.861814][T16414] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 249.864905][T16414] OOM killer disabled. [ 249.865567][T16414] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 249.868620][T16414] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x8}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:38 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x5}}], 0x2, 0x8dc0) [ 250.262642][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 250.787122][T16414] ACPI: Preparing to enter system sleep state S3 [ 250.787198][T16414] PM: Saving platform NVS memory [ 250.787202][T16414] Disabling non-boot CPUs ... [ 250.790213][T16414] smpboot: CPU 1 is now offline [ 250.793043][T16414] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 250.793124][T16414] ACPI: Low-level resume complete [ 250.793205][T16414] PM: Restoring platform NVS memory [ 250.793214][T16414] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 250.803621][T16414] Enabling non-boot CPUs ... [ 250.803764][T16414] x86: Booting SMP configuration: [ 250.803768][T16414] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 250.803937][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 250.805034][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 250.806501][T16414] CPU1 is up [ 250.806841][T16414] ACPI: Waking up from system sleep state S3 [ 250.910920][T16414] OOM killer enabled. [ 250.911732][T16414] Restarting tasks ... done. [ 250.919400][T16414] PM: suspend exit 22:47:38 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 22:47:38 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x8}}], 0x2, 0x8dc0) [ 250.993087][T16427] PM: suspend entry (deep) [ 251.001186][T16427] Filesystems sync: 0.006 seconds [ 251.003285][T16427] Freezing user space processes ... (elapsed 0.037 seconds) done. [ 251.042734][T16427] OOM killer disabled. [ 251.043662][T16427] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 251.046757][T16427] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xa}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:39 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x300}}], 0x2, 0x8dc0) 22:47:39 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 251.194326][ T1776] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 251.669003][T12851] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 251.687351][T16427] ACPI: Preparing to enter system sleep state S3 [ 251.687452][T16427] PM: Saving platform NVS memory [ 251.687457][T16427] Disabling non-boot CPUs ... [ 251.689899][T16427] smpboot: CPU 1 is now offline [ 251.692383][T16427] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 251.692467][T16427] ACPI: Low-level resume complete [ 251.692545][T16427] PM: Restoring platform NVS memory [ 251.692553][T16427] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 251.702738][T16427] Enabling non-boot CPUs ... [ 251.703000][T16427] x86: Booting SMP configuration: [ 251.703004][T16427] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 251.703221][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 251.704463][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 251.705931][T16427] CPU1 is up [ 251.706184][T16427] ACPI: Waking up from system sleep state S3 [ 252.136961][T16427] OOM killer enabled. [ 252.137735][T16427] Restarting tasks ... done. [ 252.165494][T16427] PM: suspend exit 22:47:40 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x4002, 0x48) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r0, r1, &(0x7f0000000040)=0x101, 0x80) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000100)={{0x40, 0x8}, 'port0\x00'}) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000)=0x4, 0x3) 22:47:40 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x8, 0x7f, 0x2, 0x3, 0x0, 0x0, 0x800, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x737e, 0x1, @perf_config_ext={0xfffffffffffffffd, 0x5}, 0x400, 0x38, 0x25e, 0x5, 0x7df, 0xcd, 0x8000, 0x0, 0xb1a6bf8, 0x0, 0x7ff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r2 = fcntl$getown(r0, 0x9) r3 = creat(&(0x7f0000000280)='./file0\x00', 0xd) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x6, 0x4, 0x28, 0xc9, 0x0, 0x2, 0x80, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xab, 0x0, @perf_bp={&(0x7f00000001c0), 0x5}, 0x10010, 0xffffffffffff1d72, 0xdc, 0x73f771215a80b525, 0xfffffffffffffff7, 0x1ff, 0x7, 0x0, 0x5, 0x0, 0x1}, r2, 0xa, r3, 0x9) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x20, 0x0, 0x5, 0x7f, 0x0, 0xcf, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1f, 0x0, @perf_bp={&(0x7f0000000040)}, 0x10000, 0x111, 0x10000, 0x7, 0x1, 0x4, 0x6bc3, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x5, r1, 0x8) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 22:47:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x74, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 252.213704][T16435] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 252.216157][T16435] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000d2aeef7f 22:47:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xb}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:40 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x68000}}], 0x2, 0x8dc0) [ 252.306094][T16479] PM: suspend entry (deep) [ 252.315396][T16479] Filesystems sync: 0.008 seconds [ 252.327283][T16479] Freezing user space processes ... (elapsed 0.024 seconds) done. [ 252.353377][T16479] OOM killer disabled. [ 252.354194][T16479] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 252.357019][T16479] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:41 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000000c0)) [ 252.796380][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 253.293595][T16479] ACPI: Preparing to enter system sleep state S3 [ 253.293715][T16479] PM: Saving platform NVS memory [ 253.293720][T16479] Disabling non-boot CPUs ... [ 253.297266][T16479] smpboot: CPU 1 is now offline [ 253.299966][T16479] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 253.300028][T16479] ACPI: Low-level resume complete [ 253.300125][T16479] PM: Restoring platform NVS memory [ 253.300134][T16479] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 253.310924][T16479] Enabling non-boot CPUs ... [ 253.311111][T16479] x86: Booting SMP configuration: [ 253.311116][T16479] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 253.311302][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 253.312515][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 253.313913][T16479] CPU1 is up [ 253.314157][T16479] ACPI: Waking up from system sleep state S3 [ 253.419022][T16479] OOM killer enabled. 22:47:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x74, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 253.419906][T16479] Restarting tasks ... done. [ 253.452572][T16479] PM: suspend exit [ 253.467217][T16491] PM: suspend entry (deep) [ 253.484300][T16479] PM: suspend entry (deep) [ 253.485769][T16479] PM: suspend exit [ 253.487071][T16491] Filesystems sync: 0.018 seconds [ 253.492828][T16491] Freezing user space processes ... (elapsed 0.014 seconds) done. [ 253.509411][T16491] OOM killer disabled. [ 253.510107][T16491] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 253.513026][T16491] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:42 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) r2 = socket(0x2b, 0x80000, 0x80) poll(&(0x7f0000000040)=[{r0, 0x8403}, {r2, 0x4003}, {r0, 0x100}, {r0, 0x2}], 0x4, 0x401) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x1000) 22:47:42 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x2}}], 0x2, 0x8dc0) 22:47:42 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x10}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 253.608799][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 253.788802][T12851] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 254.108133][T16491] ACPI: Preparing to enter system sleep state S3 [ 254.108201][T16491] PM: Saving platform NVS memory [ 254.108205][T16491] Disabling non-boot CPUs ... [ 254.110634][T16491] smpboot: CPU 1 is now offline [ 254.113022][T16491] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 254.113085][T16491] ACPI: Low-level resume complete [ 254.113165][T16491] PM: Restoring platform NVS memory [ 254.113174][T16491] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 254.124278][T16491] Enabling non-boot CPUs ... [ 254.124656][T16491] x86: Booting SMP configuration: [ 254.124659][T16491] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 254.124934][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 254.126002][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 254.127340][T16491] CPU1 is up [ 254.127628][T16491] ACPI: Waking up from system sleep state S3 [ 254.241895][T16491] OOM killer enabled. 22:47:42 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000140)={0x5, 0x10000, 0x5, 0x7, 0x8, 0x8}) r1 = accept4$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000040)=0x6e, 0x0) sendfile(r0, r1, &(0x7f0000000000)=0x7, 0x2) [ 254.242941][T16491] Restarting tasks ... done. [ 254.275376][T16491] PM: suspend exit 22:47:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0xff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 254.316819][T16504] PM: suspend entry (deep) [ 254.325766][T16504] Filesystems sync: 0.007 seconds [ 254.328264][T16504] Freezing user space processes ... (elapsed 0.021 seconds) done. [ 254.350987][T16504] OOM killer disabled. [ 254.352208][T16504] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 254.355481][T16504] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x60}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 254.541599][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 255.021704][T12851] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 255.038192][T16504] ACPI: Preparing to enter system sleep state S3 [ 255.038275][T16504] PM: Saving platform NVS memory [ 255.038280][T16504] Disabling non-boot CPUs ... [ 255.041758][T16504] smpboot: CPU 1 is now offline [ 255.044481][T16504] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 255.044546][T16504] ACPI: Low-level resume complete [ 255.044621][T16504] PM: Restoring platform NVS memory [ 255.044630][T16504] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 255.055244][T16504] Enabling non-boot CPUs ... [ 255.055515][T16504] x86: Booting SMP configuration: [ 255.055518][T16504] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 255.055679][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 255.056584][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 255.058160][T16504] CPU1 is up [ 255.058515][T16504] ACPI: Waking up from system sleep state S3 [ 255.484452][T16504] OOM killer enabled. [ 255.485221][T16504] Restarting tasks ... [ 255.493215][ T1034] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 255.496525][ T1034] block loop4: uevent: failed to send synthetic uevent 22:47:43 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/module/firmware_class', 0x0, 0x40) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f00000000c0)={0x20, 0x0, [0xfffffffffffffffc, 0x7, 0x9, 0x401], &(0x7f0000000040)}) 22:47:43 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x4}}], 0x2, 0x8dc0) [ 255.536623][T16504] done. [ 255.540121][T16504] PM: suspend exit 22:47:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0xff, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xe0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:43 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) fallocate(r0, 0x2a, 0x2, 0x2) 22:47:43 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000780)={0x10600000, &(0x7f0000000340), &(0x7f0000000380)=0x0, &(0x7f0000000400), {0x1f}, &(0x7f0000000440)=""/98, 0x62, &(0x7f0000000680)=""/246, &(0x7f00000004c0)=[0x0], 0x1}, 0x58) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r2, r1, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x81, 0x0, 0x5, 0xa0, 0x0, 0x101, 0x4000, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0xfff, 0x1f}, 0x10004, 0x81, 0x3ff, 0x1, 0x6, 0x4, 0x6, 0x0, 0x7, 0x0, 0x1}, r0, 0x7, r1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x143300, 0xad) setsockopt$inet6_udp_int(r3, 0x11, 0x1, &(0x7f0000000800)=0x800, 0x4) r4 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_int(r5, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) dup3(r6, r7, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r5) sendfile(r4, r4, &(0x7f0000000000)=0x7, 0x3) r8 = syz_io_uring_complete(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x898c05, &(0x7f0000000540)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d2ab7446fbcc8a6ae886d726b09403c02a546fdcfbdb0580bad0739c925bb5097691e218d850cc388063c37887b34b242785d1b4af09fc7ba5ba9d5ce032edd1dcecb031c1303ab9887619d92fb8cc9633e2a61df8c1625084cf2b17501003c2247", @ANYRESHEX=r8, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c6163636573733d616e792c736d61636b66737472616e736d7574653d6370757365742e6d656d6f72795f7370726561645f70616765002c736d61636b66736465663d2b2eed5b2f2c7063723d30303030303030303030303030303030303036342c66736e616d653d2f29267b2c6d61736b3d5e4d41595f57524954452c726f6f74636f6e746578743d726f6f742c6d61736b3d4d41595f57524954452c61756469742c00"]) 22:47:43 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x8}}], 0x2, 0x8dc0) [ 255.634173][T16511] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 255.636867][T16511] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000a697ea26 [ 255.723171][T16548] PM: suspend entry (deep) [ 255.729295][T16546] PM: suspend entry (deep) [ 255.730800][T16546] PM: suspend exit [ 255.734948][T16548] Filesystems sync: 0.010 seconds [ 255.737124][T16548] Freezing user space processes ... (elapsed 0.014 seconds) done. [ 255.753884][T16548] OOM killer disabled. [ 255.754855][T16548] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 255.758051][T16548] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:44 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 256.153695][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 256.655150][T16548] ACPI: Preparing to enter system sleep state S3 [ 256.655220][T16548] PM: Saving platform NVS memory [ 256.655224][T16548] Disabling non-boot CPUs ... [ 256.658541][T16548] smpboot: CPU 1 is now offline [ 256.661319][T16548] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 256.661386][T16548] ACPI: Low-level resume complete [ 256.661470][T16548] PM: Restoring platform NVS memory [ 256.661479][T16548] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 256.671670][T16548] Enabling non-boot CPUs ... [ 256.671945][T16548] x86: Booting SMP configuration: [ 256.671949][T16548] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 256.672122][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 256.673245][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 256.674884][T16548] CPU1 is up [ 256.675033][T16548] ACPI: Waking up from system sleep state S3 [ 256.778606][T16548] OOM killer enabled. [ 256.779387][T16548] Restarting tasks ... done. [ 256.798593][T16548] PM: suspend exit 22:47:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfc}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:44 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) r2 = accept4(r0, &(0x7f00000000c0)=@ipx, &(0x7f0000000040)=0x80, 0x80800) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r1, 0x50009418, &(0x7f0000000340)={{r2}, 0x0, 0x4, @inherit={0x68, &(0x7f0000000140)={0x0, 0x4, 0x7fffffff, 0x2, {0x8, 0x41, 0xfffffffffffffff8, 0x7ff}, [0x6, 0x10001, 0x2, 0x80]}}, @name="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"}) 22:47:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x11}}], 0x2, 0x8dc0) 22:47:44 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) preadv(r0, &(0x7f0000002580)=[{&(0x7f00000000c0)=""/201, 0xc9}, {&(0x7f00000001c0)=""/242, 0xf2}, {&(0x7f00000002c0)=""/69, 0x45}, {&(0x7f0000000340)=""/174, 0xae}, {&(0x7f0000000400)=""/100, 0x64}, {&(0x7f0000000480)=""/254, 0xfe}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/4096, 0x1000}], 0x8, 0x5, 0x8) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:47:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x1fc}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x60}}], 0x2, 0x8dc0) [ 256.890914][T16573] PM: suspend entry (deep) [ 256.901940][T16573] Filesystems sync: 0.009 seconds [ 256.904878][T16573] Freezing user space processes ... [ 256.913556][T16559] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 256.916077][T16559] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003f010896 [ 256.946232][T16573] (elapsed 0.041 seconds) done. [ 256.947214][T16573] OOM killer disabled. [ 256.947796][T16573] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 256.950744][T16573] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0xe0}}], 0x2, 0x8dc0) [ 257.166513][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 257.659003][T16573] ACPI: Preparing to enter system sleep state S3 [ 257.659079][T16573] PM: Saving platform NVS memory [ 257.659083][T16573] Disabling non-boot CPUs ... [ 257.661512][T16573] smpboot: CPU 1 is now offline [ 257.664061][T16573] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 257.664202][T16573] ACPI: Low-level resume complete [ 257.664289][T16573] PM: Restoring platform NVS memory [ 257.664298][T16573] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 257.674463][T16573] Enabling non-boot CPUs ... [ 257.674637][T16573] x86: Booting SMP configuration: [ 257.674642][T16573] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 257.674839][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 257.675798][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 257.677332][T16573] CPU1 is up [ 257.677675][T16573] ACPI: Waking up from system sleep state S3 [ 257.775650][T16573] OOM killer enabled. [ 257.776485][T16573] Restarting tasks ... [ 257.794312][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 257.797979][ T1034] block loop5: uevent: failed to send synthetic uevent 22:47:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x2, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x1100}}], 0x2, 0x8dc0) [ 257.810825][T16573] done. [ 257.813856][T16573] PM: suspend exit [ 257.817703][T16575] PM: suspend entry (deep) [ 257.827764][T16575] Filesystems sync: 0.008 seconds [ 257.829908][T16575] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 257.847058][T16575] OOM killer disabled. [ 257.847899][T16575] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 257.850621][T16575] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x300}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:46 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x6000}}], 0x2, 0x8dc0) [ 258.209538][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 258.698647][T16575] ACPI: Preparing to enter system sleep state S3 [ 258.698797][T16575] PM: Saving platform NVS memory [ 258.698801][T16575] Disabling non-boot CPUs ... [ 258.701951][T16575] smpboot: CPU 1 is now offline [ 258.704503][T16575] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 258.704570][T16575] ACPI: Low-level resume complete [ 258.704716][T16575] PM: Restoring platform NVS memory [ 258.704725][T16575] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 258.714573][T16575] Enabling non-boot CPUs ... [ 258.714763][T16575] x86: Booting SMP configuration: [ 258.714768][T16575] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 258.714980][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 258.716033][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 258.717298][T16575] CPU1 is up [ 258.717539][T16575] ACPI: Waking up from system sleep state S3 [ 258.815359][T16575] OOM killer enabled. [ 258.816040][T16575] Restarting tasks ... done. [ 258.826777][T16575] PM: suspend exit [ 258.835987][T16593] PM: suspend entry (deep) [ 258.853895][T16593] Filesystems sync: 0.016 seconds [ 258.856249][T16593] Freezing user space processes ... (elapsed 0.024 seconds) done. [ 258.882965][T16593] OOM killer disabled. [ 258.883664][T16593] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 258.886296][T16593] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 259.000702][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 259.511077][T16593] ACPI: Preparing to enter system sleep state S3 [ 259.511215][T16593] PM: Saving platform NVS memory [ 259.511220][T16593] Disabling non-boot CPUs ... [ 259.513365][T16593] smpboot: CPU 1 is now offline [ 259.516129][T16593] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 259.516195][T16593] ACPI: Low-level resume complete [ 259.516284][T16593] PM: Restoring platform NVS memory [ 259.516294][T16593] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 259.525706][T16593] Enabling non-boot CPUs ... [ 259.525898][T16593] x86: Booting SMP configuration: [ 259.525902][T16593] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 259.526124][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 259.527207][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 259.528597][T16593] CPU1 is up [ 259.528881][T16593] ACPI: Waking up from system sleep state S3 [ 259.741668][T16593] OOM killer enabled. [ 259.742386][T16593] Restarting tasks ... done. [ 259.782419][T16593] PM: suspend exit 22:47:47 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x13f441) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r3, r2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) sendmsg$NL80211_CMD_RELOAD_REGDB(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x2, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x40880) r5 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r6 = openat$cgroup_int(r5, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r6, r5, 0x0) writev(r5, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000400)={0x48c, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x2c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xcd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x967e}]}, @TIPC_NLA_MEDIA={0xc0, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xab0}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff94a0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf6}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x58}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x967}]}]}, @TIPC_NLA_NODE={0x2c4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ID={0xce, 0x3, "df713f344b270746cb32ce9debe0099cfc4b8e71d2d4b29a3b7b6906986ef1fff012bb40c74f9f6ebb8129b93fcc38a80e6117ed3d8b3f383cfa727d63d8e542f4fa22ef0fb1ea0cffd718bcbfd6de91e789427528d087d7ad608cc5fd5e5137f340ce337616a1c8172e1428b87f79aee182a42b0cf1de416671249879d90baeba7bc02aff527966c71ef102d00bad9a87473d36af20fad910697792fa8508de35006c99734720c159a53a930ec9e0599829232f1a758f9c814bda7770a60f379eb73ed942425709d957"}, @TIPC_NLA_NODE_ID={0xa1, 0x3, "53efdad60f4cc608f0bd716f16a8d18505c9d518747186c8943ac397e3fb54a3eaf3ab69275d0889f0beaf31dd54e381705f1ff5c8f31d21d302cf5126e8d7c8c75ee678ecf0d48f8e9f26bb59a050dfa856c31551178086ce51575d5c24b85759ebe4d465002ec543401cefd8de1899309750c26a2ee7ff6dca4ce5130689c6f068f36783c8a9a49e043d84a6c5df0d8c7acd4c0b91fa52c0771bd52c"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_KEY={0x49, 0x4, {'gcm(aes)\x00', 0x21, "334f970958d1df3d8412c9d46ebbb57b926f6cbdd9cf56d40e439056cf0e0d3e45"}}, @TIPC_NLA_NODE_ID={0xd3, 0x3, "e8324e0b9b12f10ca0b4ebbd94bb4ae5542ba99fe476e73615d8a0244a149be31b8eef2de682a01b8cc7ee17b0638d14719a504306d6bc4caeb9ccc20a7a7e48eed0a62db2c3399d4a5208cc4237875fc6f4adaa4e49e57a33edbcc6e3ad9679f1e4184cdad03785d8758c784685406e7ef12b9e64a02fd048b6f15713f5c55176275f7a8f808a8c0c47fe9d386da2352922a12aade71b0ba4149a2b2f34ef054496c8da15a895f00b12d8528c345d827b6d44879a08bec0e3a7d06938309d3f8e8b0e75d76da12964b061db591aeb"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x20}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x200}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x391}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x64f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x112}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}]}, 0x48c}, 0x1, 0x0, 0x0, 0x1}, 0x20000015) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}) 22:47:47 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0xe000}}], 0x2, 0x8dc0) 22:47:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x500}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:47 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = signalfd(r0, &(0x7f0000000040)={[0x4]}, 0x8) sendmsg$NL80211_CMD_DEL_TX_TS(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x0, 0x300, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x3, 0xd}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TSID={0x5, 0xd2, 0xf}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x4) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f0000000200)) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) [ 259.848117][T16618] PM: suspend entry (deep) [ 259.860357][T16618] Filesystems sync: 0.010 seconds [ 259.862512][T16618] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 259.871907][T16618] OOM killer disabled. [ 259.872752][T16618] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 259.875671][T16618] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x600}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 259.971788][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 260.469081][T16618] ACPI: Preparing to enter system sleep state S3 [ 260.469164][T16618] PM: Saving platform NVS memory [ 260.469168][T16618] Disabling non-boot CPUs ... [ 260.472330][T16618] smpboot: CPU 1 is now offline [ 260.474877][T16618] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 260.474995][T16618] ACPI: Low-level resume complete [ 260.475074][T16618] PM: Restoring platform NVS memory [ 260.475083][T16618] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 260.484196][T16618] Enabling non-boot CPUs ... [ 260.484347][T16618] x86: Booting SMP configuration: [ 260.484351][T16618] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 260.484536][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 260.485525][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 260.487029][T16618] CPU1 is up [ 260.487303][T16618] ACPI: Waking up from system sleep state S3 [ 260.587402][T16618] OOM killer enabled. 22:47:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x3, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:48 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x1000000}}], 0x2, 0x8dc0) [ 260.588124][T16618] Restarting tasks ... [ 260.613002][T16623] PM: suspend entry (deep) [ 260.613725][T16618] done. [ 260.614425][T16623] PM: suspend exit [ 260.621385][T16618] PM: suspend exit [ 260.628109][T16618] PM: suspend entry (deep) [ 260.636161][T16618] Filesystems sync: 0.006 seconds [ 260.638579][T16618] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 260.647919][T16618] OOM killer disabled. [ 260.648967][T16618] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 260.652512][T16618] printk: Suspending console(s) (use no_console_suspend to debug) [ 261.163873][ T22] input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input6 [ 261.622978][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 262.113137][T16618] ACPI: Preparing to enter system sleep state S3 [ 262.113248][T16618] PM: Saving platform NVS memory [ 262.113259][T16618] Disabling non-boot CPUs ... [ 262.116302][T16618] smpboot: CPU 1 is now offline [ 262.118537][T16618] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 262.118604][T16618] ACPI: Low-level resume complete [ 262.118681][T16618] PM: Restoring platform NVS memory [ 262.118690][T16618] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 262.129306][T16618] Enabling non-boot CPUs ... [ 262.129470][T16618] x86: Booting SMP configuration: [ 262.129474][T16618] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 262.129639][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 262.130568][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 262.131982][T16618] CPU1 is up [ 262.132238][T16618] ACPI: Waking up from system sleep state S3 [ 262.241791][T16618] OOM killer enabled. 22:47:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:50 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x2000000}}], 0x2, 0x8dc0) 22:47:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x700}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:50 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x6000004, 0x4100870, r0, 0x8023f000) [ 262.242530][T16618] Restarting tasks ... done. [ 262.268489][T16641] PM: suspend entry (deep) [ 262.269812][T16641] PM: suspend exit [ 262.276898][T16618] PM: suspend exit 22:47:50 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = io_uring_setup(0x483f, &(0x7f00000000c0)={0x0, 0xc2a, 0x8, 0x3, 0x3b0, 0x0, r0}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:47:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x4, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xa00}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 262.356929][T16655] PM: suspend entry (deep) [ 262.362943][T16642] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 262.365668][T16642] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000001c11366b [ 262.369470][T16655] Filesystems sync: 0.011 seconds [ 262.371620][T16655] Freezing user space processes ... (elapsed 0.021 seconds) done. [ 262.395892][T16655] OOM killer disabled. [ 262.396703][T16655] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 262.399603][T16655] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:50 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x4000000}}], 0x2, 0x8dc0) [ 262.455471][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 262.615280][T12851] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 262.963002][T16655] ACPI: Preparing to enter system sleep state S3 [ 262.963093][T16655] PM: Saving platform NVS memory [ 262.963097][T16655] Disabling non-boot CPUs ... [ 262.965323][T16655] smpboot: CPU 1 is now offline [ 262.967964][T16655] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 262.968024][T16655] ACPI: Low-level resume complete [ 262.968101][T16655] PM: Restoring platform NVS memory [ 262.968110][T16655] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 262.978040][T16655] Enabling non-boot CPUs ... [ 262.978211][T16655] x86: Booting SMP configuration: [ 262.978216][T16655] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 262.978384][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 262.979385][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 262.980623][T16655] CPU1 is up [ 262.980910][T16655] ACPI: Waking up from system sleep state S3 [ 263.083791][T16655] OOM killer enabled. 22:47:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x5, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x3f00}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:50 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/firmware/acpi', 0x1f3b42, 0x18d) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 263.084497][T16655] Restarting tasks ... [ 263.107580][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 263.109898][ T1034] block loop5: uevent: failed to send synthetic uevent [ 263.112076][T16655] done. [ 263.114397][T16655] PM: suspend exit [ 263.116371][T16651] PM: suspend entry (deep) [ 263.128353][T16651] Filesystems sync: 0.011 seconds [ 263.129851][T16651] Freezing user space processes ... [ 263.143049][T16659] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 263.145881][T16659] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000002568bcaa [ 263.166944][T16651] (elapsed 0.037 seconds) done. [ 263.168011][T16651] OOM killer disabled. [ 263.168675][T16651] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 263.171865][T16651] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x5, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 263.307005][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 263.811759][T16651] ACPI: Preparing to enter system sleep state S3 [ 263.811826][T16651] PM: Saving platform NVS memory [ 263.811830][T16651] Disabling non-boot CPUs ... [ 263.815045][T16651] smpboot: CPU 1 is now offline [ 263.819749][T16651] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 263.819865][T16651] ACPI: Low-level resume complete [ 263.819950][T16651] PM: Restoring platform NVS memory [ 263.819959][T16651] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 263.829559][T16651] Enabling non-boot CPUs ... [ 263.829718][T16651] x86: Booting SMP configuration: [ 263.829721][T16651] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 263.829930][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 263.830914][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 263.832515][T16651] CPU1 is up [ 263.832634][T16651] ACPI: Waking up from system sleep state S3 [ 263.934539][T16651] OOM killer enabled. [ 263.935269][T16651] Restarting tasks ... [ 263.943308][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 263.945374][ T1034] block loop5: uevent: failed to send synthetic uevent [ 263.949210][T16651] done. [ 263.951567][T16651] PM: suspend exit 22:47:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x4000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:51 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) io_setup(0xb, &(0x7f0000000100)=0x0) shutdown(r1, 0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) r3 = perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x8, 0x7, 0x3f, 0x5, 0x0, 0x406, 0x100, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x20, 0x0, 0xf2, 0x9, 0x2, 0x2, 0x3, 0x0, 0xfffffff9}, 0xffffffffffffffff, 0x6, r0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180), 0x81, 0x0) io_cancel(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0x200, r3, &(0x7f0000000140)="4fdfed1c0e6ac1d243ed3d6f9bc292ef370b3bfb278426ef963f5351ea9f582587e252c21fc08fb4debcd25604cc9c49cb7cec19", 0x34, 0x2, 0x0, 0x0, r4}, &(0x7f0000000200)) 22:47:51 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x8000000}}], 0x2, 0x8dc0) [ 263.982585][T16679] PM: suspend entry (deep) [ 263.994723][T16669] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 263.996092][T16669] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000033226345 [ 264.000288][T16679] Filesystems sync: 0.016 seconds [ 264.002228][T16679] Freezing user space processes ... (elapsed 0.022 seconds) done. [ 264.026369][T16679] OOM killer disabled. [ 264.027310][T16679] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 264.029815][T16679] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 264.218522][ T1776] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 264.725371][T16679] ACPI: Preparing to enter system sleep state S3 [ 264.725471][T16679] PM: Saving platform NVS memory [ 264.725475][T16679] Disabling non-boot CPUs ... [ 264.727797][T16679] smpboot: CPU 1 is now offline [ 264.730421][T16679] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 264.730483][T16679] ACPI: Low-level resume complete [ 264.730608][T16679] PM: Restoring platform NVS memory [ 264.730618][T16679] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 264.742163][T16679] Enabling non-boot CPUs ... [ 264.742359][T16679] x86: Booting SMP configuration: [ 264.742363][T16679] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 264.742553][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 264.743643][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 264.745223][T16679] CPU1 is up [ 264.745342][T16679] ACPI: Waking up from system sleep state S3 [ 265.168519][T16679] OOM killer enabled. [ 265.169145][T16679] Restarting tasks ... [ 265.185365][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 265.187620][ T1034] block loop5: uevent: failed to send synthetic uevent [ 265.190046][T16679] done. [ 265.191334][T16679] PM: suspend exit [ 265.196628][T16687] PM: suspend entry (deep) [ 265.208413][T16687] Filesystems sync: 0.010 seconds [ 265.210334][T16687] Freezing user space processes ... [ 265.218886][T16678] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 265.221487][T16678] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000d2aeef7f [ 265.246408][T16687] (elapsed 0.036 seconds) done. [ 265.247481][T16687] OOM killer disabled. [ 265.248427][T16687] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 265.251269][T16687] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:54 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x11000000}}], 0x2, 0x8dc0) 22:47:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x6000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 265.412288][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 265.915416][T16687] ACPI: Preparing to enter system sleep state S3 [ 265.915497][T16687] PM: Saving platform NVS memory [ 265.915502][T16687] Disabling non-boot CPUs ... [ 265.918746][T16687] smpboot: CPU 1 is now offline [ 265.921307][T16687] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 265.921368][T16687] ACPI: Low-level resume complete [ 265.921453][T16687] PM: Restoring platform NVS memory [ 265.921462][T16687] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 265.931913][T16687] Enabling non-boot CPUs ... [ 265.932105][T16687] x86: Booting SMP configuration: [ 265.932109][T16687] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 265.932278][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 265.933470][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 265.934865][T16687] CPU1 is up [ 265.935136][T16687] ACPI: Waking up from system sleep state S3 [ 266.371858][T16687] OOM killer enabled. [ 266.372663][T16687] Restarting tasks ... done. [ 266.377509][T16687] PM: suspend exit 22:47:54 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f00000001c0)='/sys/kernel/kexec_loaded', 0x109000, 0x84) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000340)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) renameat2(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x2) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f00000000c0)={{0xffffffffffffffff, 0x3, 0x7ff, 0x2, 0x3}, 0x7, 0x200, 0xfff}) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) 22:47:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x6, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:54 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x60000000}}], 0x2, 0x8dc0) 22:47:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x80fe}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x7, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:54 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0xe0000000}}], 0x2, 0x8dc0) 22:47:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xe000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:54 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/5, 0x5}, {0xfffffffffffffffc}, {&(0x7f00000000c0)=""/154, 0x9a}, {&(0x7f0000000180)=""/60, 0x3c}], 0x4, 0x7f, 0xc7c0) [ 266.499726][T16703] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 266.501424][T16703] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000018a68571 22:47:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x7, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 266.564481][T16725] PM: suspend entry (deep) [ 266.572463][T16725] Filesystems sync: 0.006 seconds [ 266.574065][T16725] Freezing user space processes ... (elapsed 0.037 seconds) done. [ 266.612529][T16725] OOM killer disabled. [ 266.613113][T16725] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 266.616129][T16725] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfc00}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:55 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r1, r0, 0x0) clone(0x1262400, &(0x7f0000000040)="5c1ce1cea1a3524501db0ef02bf2249fc190726a32394365ce175957f930ef03899d146681cede", &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000400)="f80eb5d2845f7e83abb62136dbe0306ce27b1b86aff8f4025e01e6cb278ca90e90dcafbf4ce768a1a0b9eeffabe982a8c2fe3f7315689fc5cc4736f84ae5fd7519d3f725bc80951cffd4bd4298bde03688b2cf15ae37c41fecda7bf2a94744df4e43285a3461ab1e0b823108e72f41cbef3895dfd77a94c657db60da53474887d5dcb306a8f57fc321839ff71ecd8c20c82f68e8") writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x0, 0x2, 0xa6, 0x20, 0x0, 0x0, 0x40080, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x8000, 0x9}, 0x20, 0x1, 0x7, 0x3, 0x400, 0x180, 0x3407, 0x0, 0x6, 0x0, 0x9}, 0xffffffffffffffff, 0x9, r0, 0x9) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000000)=0x7, 0x3) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r4, r3, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x34) ptrace$cont(0x18, r5, 0x0, 0x0) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x7, 0x1, 0x0, 0x0, 0x10000000000000ff, 0x0, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x2, @perf_bp={&(0x7f0000000340), 0xf}, 0x4000, 0x4, 0x81, 0x6, 0x993, 0x7, 0x0, 0x0, 0x8, 0x0, 0x8000000000000006}, r5, 0x8, r3, 0x8) 22:47:55 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0xfeffffff}}], 0x2, 0x8dc0) 22:47:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x8, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 267.035303][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 267.543469][T16725] ACPI: Preparing to enter system sleep state S3 [ 267.543561][T16725] PM: Saving platform NVS memory [ 267.543566][T16725] Disabling non-boot CPUs ... [ 267.546627][T16725] smpboot: CPU 1 is now offline [ 267.549169][T16725] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 267.549236][T16725] ACPI: Low-level resume complete [ 267.549341][T16725] PM: Restoring platform NVS memory [ 267.549350][T16725] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 267.558969][T16725] Enabling non-boot CPUs ... [ 267.559144][T16725] x86: Booting SMP configuration: [ 267.559147][T16725] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 267.559332][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 267.560479][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 267.562072][T16725] CPU1 is up [ 267.562338][T16725] ACPI: Waking up from system sleep state S3 [ 267.658374][T16725] OOM killer enabled. [ 267.658961][T16725] Restarting tasks ... [ 267.671694][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 267.673719][ T1034] block loop5: uevent: failed to send synthetic uevent [ 267.679620][T16725] done. [ 267.680931][T16725] PM: suspend exit 22:47:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfc01}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 267.699111][T16725] PM: suspend entry (deep) [ 267.707247][T16725] Filesystems sync: 0.007 seconds [ 267.708252][T16725] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 267.725248][T16725] OOM killer disabled. [ 267.725852][T16725] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 267.728563][T16725] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:56 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x8, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:56 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0xffffff7f}}], 0x2, 0x8dc0) 22:47:56 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) poll(&(0x7f0000000040)=[{r1, 0x204}, {r0, 0x6202}, {r2, 0x600}], 0x3, 0x4) 22:47:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfe80}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 267.876378][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 268.382256][T16725] ACPI: Preparing to enter system sleep state S3 [ 268.382328][T16725] PM: Saving platform NVS memory [ 268.382351][T16725] Disabling non-boot CPUs ... [ 268.384727][T16725] smpboot: CPU 1 is now offline [ 268.387013][T16725] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 268.387093][T16725] ACPI: Low-level resume complete [ 268.387173][T16725] PM: Restoring platform NVS memory [ 268.387183][T16725] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 268.397752][T16725] Enabling non-boot CPUs ... [ 268.397928][T16725] x86: Booting SMP configuration: [ 268.397932][T16725] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 268.398145][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 268.399195][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 268.400486][T16725] CPU1 is up [ 268.400745][T16725] ACPI: Waking up from system sleep state S3 [ 268.503863][T16725] OOM killer enabled. [ 268.504408][T16725] Restarting tasks ... [ 268.512556][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 268.514407][T16725] done. [ 268.514810][ T1034] block loop5: uevent: failed to send synthetic uevent [ 268.527752][T16725] PM: suspend exit [ 268.558643][T16740] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 268.560181][T16740] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000038dcd40b [ 268.575748][T16754] PM: suspend entry (deep) [ 268.582870][T16754] Filesystems sync: 0.006 seconds [ 268.583986][T16754] Freezing user space processes ... (elapsed 0.014 seconds) done. [ 268.599698][T16754] OOM killer disabled. [ 268.600363][T16754] Freezing remaining freezable tasks ... (elapsed 0.003 seconds) done. [ 268.605262][T16754] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:57 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x4) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x9, 0x7, 0x3, 0x81, 0x0, 0x3499, 0x301c1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x857, 0x4, @perf_config_ext={0x2, 0x9}, 0x1908, 0x8, 0xd7db, 0xe, 0x2, 0x3ff, 0x3, 0x0, 0x3, 0x0, 0xffffffffffffffbc}, 0xffffffffffffffff, 0x0, r0, 0x1) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:47:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x9, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 268.918369][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 269.426678][T16754] ACPI: Preparing to enter system sleep state S3 [ 269.426747][T16754] PM: Saving platform NVS memory [ 269.426752][T16754] Disabling non-boot CPUs ... [ 269.430039][T16754] smpboot: CPU 1 is now offline [ 269.432542][T16754] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 269.432604][T16754] ACPI: Low-level resume complete [ 269.432728][T16754] PM: Restoring platform NVS memory [ 269.432737][T16754] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 269.443726][T16754] Enabling non-boot CPUs ... [ 269.443977][T16754] x86: Booting SMP configuration: [ 269.443981][T16754] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 269.444146][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 269.445130][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 269.446528][T16754] CPU1 is up [ 269.446644][T16754] ACPI: Waking up from system sleep state S3 [ 269.554074][T16754] OOM killer enabled. [ 269.554707][T16754] Restarting tasks ... done. [ 269.565941][T16754] PM: suspend exit [ 269.577746][T16766] PM: suspend entry (deep) 22:47:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xff00}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 269.607015][T16766] Filesystems sync: 0.028 seconds [ 269.608183][T16766] Freezing user space processes ... [ 269.621181][T16755] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 269.623699][T16755] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000001c11366b [ 269.648722][T16766] (elapsed 0.040 seconds) done. [ 269.649493][T16766] OOM killer disabled. [ 269.650222][T16766] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 269.653047][T16766] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:58 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0xfffffffe}}], 0x2, 0x8dc0) [ 269.770808][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 270.278928][T16766] ACPI: Preparing to enter system sleep state S3 [ 270.278996][T16766] PM: Saving platform NVS memory [ 270.279000][T16766] Disabling non-boot CPUs ... [ 270.281405][T16766] smpboot: CPU 1 is now offline [ 270.283952][T16766] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 270.284013][T16766] ACPI: Low-level resume complete [ 270.284088][T16766] PM: Restoring platform NVS memory [ 270.284191][T16766] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 270.295533][T16766] Enabling non-boot CPUs ... [ 270.295773][T16766] x86: Booting SMP configuration: [ 270.295777][T16766] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 270.295931][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 270.296806][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 270.298285][T16766] CPU1 is up [ 270.298402][T16766] ACPI: Waking up from system sleep state S3 [ 270.419009][T16766] OOM killer enabled. [ 270.420012][T16766] Restarting tasks ... [ 270.429182][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 270.432709][ T1034] block loop5: uevent: failed to send synthetic uevent [ 270.443849][T16766] done. [ 270.447311][T16766] PM: suspend exit 22:47:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x9, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:47:58 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x80800) sendfile(r1, 0xffffffffffffffff, &(0x7f00000001c0)=0x9, 0x7) [ 270.453015][T16778] PM: suspend entry (deep) [ 270.459729][T16766] PM: suspend entry (deep) [ 270.461616][T16766] PM: suspend exit [ 270.470828][T16778] Filesystems sync: 0.016 seconds [ 270.472775][T16778] Freezing user space processes ... (elapsed 0.029 seconds) done. [ 270.504022][T16778] OOM killer disabled. [ 270.504865][T16778] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 270.507503][T16778] printk: Suspending console(s) (use no_console_suspend to debug) 22:47:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x40000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:47:59 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x100000000000000}}], 0x2, 0x8dc0) 22:47:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0xa, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 270.714504][T13514] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 271.226248][T16778] ACPI: Preparing to enter system sleep state S3 [ 271.226325][T16778] PM: Saving platform NVS memory [ 271.226329][T16778] Disabling non-boot CPUs ... [ 271.229382][T16778] smpboot: CPU 1 is now offline [ 271.231862][T16778] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 271.232012][T16778] ACPI: Low-level resume complete [ 271.232088][T16778] PM: Restoring platform NVS memory [ 271.232097][T16778] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 271.243174][T16778] Enabling non-boot CPUs ... [ 271.243394][T16778] x86: Booting SMP configuration: [ 271.243398][T16778] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 271.243558][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 271.244728][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 271.246250][T16778] CPU1 is up [ 271.246502][T16778] ACPI: Waking up from system sleep state S3 [ 271.665590][T16778] OOM killer enabled. [ 271.666219][T16778] Restarting tasks ... done. [ 271.678252][T16778] PM: suspend exit 22:47:59 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) [ 271.740326][T16778] PM: suspend entry (deep) [ 271.748777][T16778] Filesystems sync: 0.007 seconds [ 271.750021][T16778] Freezing user space processes ... (elapsed 0.032 seconds) done. [ 271.784157][T16778] OOM killer disabled. [ 271.784981][T16778] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 271.788831][T16778] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x100000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 271.908267][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 272.413794][T16778] ACPI: Preparing to enter system sleep state S3 [ 272.413885][T16778] PM: Saving platform NVS memory [ 272.413889][T16778] Disabling non-boot CPUs ... [ 272.417057][T16778] smpboot: CPU 1 is now offline [ 272.419504][T16778] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 272.419566][T16778] ACPI: Low-level resume complete [ 272.419638][T16778] PM: Restoring platform NVS memory [ 272.419647][T16778] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 272.430511][T16778] Enabling non-boot CPUs ... [ 272.430669][T16778] x86: Booting SMP configuration: [ 272.430673][T16778] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 272.430879][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 272.431888][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 272.433130][T16778] CPU1 is up [ 272.433243][T16778] ACPI: Waking up from system sleep state S3 [ 272.858493][T16778] OOM killer enabled. [ 272.859423][T16778] Restarting tasks ... done. [ 272.867046][T16778] PM: suspend exit [ 272.881353][T16804] PM: suspend entry (deep) [ 272.888413][T16804] Filesystems sync: 0.005 seconds [ 272.893279][T16804] Freezing user space processes ... (elapsed 0.006 seconds) done. [ 272.902304][T16804] OOM killer disabled. [ 272.902916][T16804] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 272.905672][T16804] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:01 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r3, r2, 0x0) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) 22:48:01 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x200000000000000}}], 0x2, 0x8dc0) 22:48:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0xa, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 273.101329][T13514] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 273.606078][T16804] ACPI: Preparing to enter system sleep state S3 [ 273.606146][T16804] PM: Saving platform NVS memory [ 273.606150][T16804] Disabling non-boot CPUs ... [ 273.609342][T16804] smpboot: CPU 1 is now offline [ 273.611656][T16804] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 273.611739][T16804] ACPI: Low-level resume complete [ 273.611835][T16804] PM: Restoring platform NVS memory [ 273.611844][T16804] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 273.622688][T16804] Enabling non-boot CPUs ... [ 273.622826][T16804] x86: Booting SMP configuration: [ 273.622829][T16804] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 273.622999][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 273.624057][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 273.625559][T16804] CPU1 is up [ 273.625836][T16804] ACPI: Waking up from system sleep state S3 [ 273.833854][T16804] OOM killer enabled. [ 273.834871][T16804] Restarting tasks ... [ 273.847259][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 273.850224][ T1034] block loop5: uevent: failed to send synthetic uevent [ 273.850932][T16812] PM: suspend entry (deep) [ 273.853913][T16812] PM: suspend exit [ 273.860819][T16813] PM: suspend entry (deep) [ 273.862126][T16813] PM: suspend exit 22:48:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x1000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:01 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x400000000000000}}], 0x2, 0x8dc0) [ 273.865478][T16804] done. [ 273.867502][T16804] PM: suspend exit [ 273.875936][T16804] PM: suspend entry (deep) [ 273.883648][T16804] Filesystems sync: 0.006 seconds [ 273.886464][T16804] Freezing user space processes ... (elapsed 0.033 seconds) done. [ 273.921498][T16804] OOM killer disabled. [ 273.922350][T16804] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 273.925583][T16804] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0xb, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:02 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) prctl$PR_SET_PTRACER(0x59616d61, r1) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x6, 0xea, 0x6, 0x81, 0x0, 0x1, 0x8210, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x8, 0x9, 0xa5, 0x5, 0x7fffffff, 0x9, 0xfff, 0x0, 0x5f91, 0x0, 0x54}, r1, 0xffffffffffffffff, r0, 0x1) openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x9, 0x3) 22:48:02 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) fchown(r0, r1, r3) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 274.063505][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 274.561259][T16804] ACPI: Preparing to enter system sleep state S3 [ 274.561394][T16804] PM: Saving platform NVS memory [ 274.561399][T16804] Disabling non-boot CPUs ... [ 274.563720][T16804] smpboot: CPU 1 is now offline [ 274.565998][T16804] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 274.566061][T16804] ACPI: Low-level resume complete [ 274.566140][T16804] PM: Restoring platform NVS memory [ 274.566149][T16804] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 274.576982][T16804] Enabling non-boot CPUs ... [ 274.577116][T16804] x86: Booting SMP configuration: [ 274.577125][T16804] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 274.577288][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 274.578351][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 274.579674][T16804] CPU1 is up [ 274.579971][T16804] ACPI: Waking up from system sleep state S3 [ 275.004155][T16804] OOM killer enabled. [ 275.004890][T16804] Restarting tasks ... done. [ 275.016493][T16804] PM: suspend exit 22:48:02 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x2000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:02 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x800000000000000}}], 0x2, 0x8dc0) [ 275.083349][T16835] PM: suspend entry (deep) [ 275.094673][T16835] Filesystems sync: 0.006 seconds [ 275.106319][T16835] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 275.121270][T16835] OOM killer disabled. [ 275.125313][T16835] Freezing remaining freezable tasks ... (elapsed 0.003 seconds) done. [ 275.136869][T16835] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:03 executing program 3: perf_event_open(&(0x7f00000000c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) clone3(&(0x7f0000000680)={0x0, &(0x7f0000000440)=0xffffffffffffffff, &(0x7f0000000480), &(0x7f00000004c0), {0x28}, &(0x7f0000000500)=""/134, 0x86, &(0x7f00000005c0)=""/71, &(0x7f0000000640)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0xa}, 0x58) preadv(r1, &(0x7f0000000a00)=[{&(0x7f0000000700)=""/170, 0xaa}, {&(0x7f00000007c0)=""/135, 0x87}, {&(0x7f0000000880)=""/234, 0xea}, {&(0x7f0000000980)=""/85, 0x55}], 0x4, 0x52a, 0x3) r2 = syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x622, 0x3, &(0x7f0000000340)=[{&(0x7f0000000180)="34318d4245a603de66f38928010a6f0bb012d8cea0b21f9fabc609dd7a9c3a7920e0000cbd766c93411cd46b6a13637097d0a07b9f4c0d2399c170f435d8b72f144c15a7598ed6581696bb983c2b2a1722a9be0dd94be39f41365e1c9d3e12c68d156259d34be4126d5f098a40370c5709b25b9529eaffc3f29c2b8c2996c039af177ece841b3081dc1a6d5cd5fb8c4532bfc17e040392256ab0ad1d828015b70187fab17ae67cdf7e26bb03729076ab38bcc3fc95cb3869b34b50", 0xbb, 0x1}, {&(0x7f0000000240)="61b07b699f0985cd0f8f3e1b23d199a33be7c44d62ab8f4969ce2cd787beecdd0b", 0x21, 0x7}, {&(0x7f0000000280)="fea6b559b36b5698b80c98f2bf43150a752d446b8548e6cefbc97867fab0cbd66d7f02b16963ca99f7bddfe3cb90c4cfc3d0c7990144cdcfea120b9f1c36810ee5f58c723374c1a06bfbba65b835f493f42102c1e0d5d28946e078d2786a8e26b8b70187f065c1a201d14a793b91ba4cc96e71c2b307f8e980b0158cc41124f4d04bfd78feb7942533a924e045", 0x8d, 0x100000001}], 0x2000, &(0x7f00000003c0)={[{'\\,-'}, {'%@*\xdc'}, {}, {'{\x95[+'}, {'(['}, {'-+'}, {'/-]/-'}, {'(\xd5[^'}], [{@obj_user={'obj_user', 0x3d, '#d'}}, {@hash}, {@appraise_type}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@dont_measure}]}) fcntl$addseals(r2, 0x409, 0x1) 22:48:03 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x1100000000000000}}], 0x2, 0x8dc0) 22:48:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0xb, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x3000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 275.235959][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 275.751374][T16835] ACPI: Preparing to enter system sleep state S3 [ 275.751474][T16835] PM: Saving platform NVS memory [ 275.751478][T16835] Disabling non-boot CPUs ... [ 275.754760][T16835] smpboot: CPU 1 is now offline [ 275.757017][T16835] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 275.757079][T16835] ACPI: Low-level resume complete [ 275.757164][T16835] PM: Restoring platform NVS memory [ 275.757173][T16835] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 275.769805][T16835] Enabling non-boot CPUs ... [ 275.769953][T16835] x86: Booting SMP configuration: [ 275.769957][T16835] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 275.770208][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 275.771274][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 275.772549][T16835] CPU1 is up [ 275.772848][T16835] ACPI: Waking up from system sleep state S3 [ 275.990550][T16835] OOM killer enabled. [ 275.991376][T16835] Restarting tasks ... [ 275.998437][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 276.002475][ T1034] block loop5: uevent: failed to send synthetic uevent [ 276.014760][T16835] done. [ 276.015652][T16835] PM: suspend exit [ 276.032461][T16845] PM: suspend entry (deep) [ 276.042626][T16845] Filesystems sync: 0.009 seconds [ 276.044387][T16845] Freezing user space processes ... [ 276.046922][T16829] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 276.049167][T16829] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000c0f7a2ea [ 276.076376][T16845] (elapsed 0.031 seconds) done. [ 276.077562][T16845] OOM killer disabled. [ 276.078293][T16845] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 276.081368][T16845] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0xc, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 276.220008][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 276.744138][T16845] ACPI: Preparing to enter system sleep state S3 [ 276.744273][T16845] PM: Saving platform NVS memory [ 276.744277][T16845] Disabling non-boot CPUs ... [ 276.746797][T16845] smpboot: CPU 1 is now offline [ 276.749448][T16845] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 276.749525][T16845] ACPI: Low-level resume complete [ 276.749613][T16845] PM: Restoring platform NVS memory [ 276.749623][T16845] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 276.761127][T16845] Enabling non-boot CPUs ... [ 276.761343][T16845] x86: Booting SMP configuration: [ 276.761346][T16845] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 276.761542][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 276.762530][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 276.764027][T16845] CPU1 is up [ 276.764277][T16845] ACPI: Waking up from system sleep state S3 [ 276.982402][T16845] OOM killer enabled. [ 276.983206][T16845] Restarting tasks ... [ 276.992992][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 276.993958][T16845] done. [ 276.994149][ T1034] block loop5: uevent: failed to send synthetic uevent [ 276.999782][T16856] PM: suspend entry (deep) [ 277.001029][T16856] PM: suspend exit [ 277.003919][T16845] PM: suspend exit 22:48:04 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x6000000000000000}}], 0x2, 0x8dc0) 22:48:04 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x4000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:04 executing program 4: r0 = epoll_create(0x4) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x8}) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000000)=0x7, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r1, r3, 0x0, 0x5) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) 22:48:04 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0xc, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 277.071103][T16859] loop3: detected capacity change from 0 to 264192 [ 277.113734][T16868] PM: suspend entry (deep) [ 277.121448][T16868] Filesystems sync: 0.006 seconds [ 277.123938][T16868] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 277.141269][T16868] OOM killer disabled. [ 277.141922][T16868] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 277.144575][T16868] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:05 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0xe000000000000000}}], 0x2, 0x8dc0) [ 277.233773][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 277.728912][T16868] ACPI: Preparing to enter system sleep state S3 [ 277.729078][T16868] PM: Saving platform NVS memory [ 277.729083][T16868] Disabling non-boot CPUs ... [ 277.732361][T16868] smpboot: CPU 1 is now offline [ 277.734833][T16868] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 277.734897][T16868] ACPI: Low-level resume complete [ 277.734977][T16868] PM: Restoring platform NVS memory [ 277.734987][T16868] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 277.749425][T16868] Enabling non-boot CPUs ... [ 277.749749][T16868] x86: Booting SMP configuration: [ 277.749754][T16868] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 277.749936][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 277.751002][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 277.752398][T16868] CPU1 is up [ 277.752659][T16868] ACPI: Waking up from system sleep state S3 [ 277.859093][T16868] OOM killer enabled. 22:48:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0xd, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x5000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 277.860051][T16868] Restarting tasks ... done. [ 277.896870][T16868] PM: suspend exit [ 277.908222][T16868] PM: suspend entry (deep) [ 277.927868][T16868] Filesystems sync: 0.018 seconds [ 277.929560][T16868] Freezing user space processes ... (elapsed 0.020 seconds) done. [ 277.951461][T16868] OOM killer disabled. [ 277.952182][T16868] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 277.954847][T16868] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:06 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) finit_module(r0, &(0x7f0000000040)='#)\x00', 0x2) 22:48:06 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0xfeffffff00000000}}], 0x2, 0x8dc0) [ 278.089852][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 278.600267][T16868] ACPI: Preparing to enter system sleep state S3 [ 278.600340][T16868] PM: Saving platform NVS memory [ 278.600344][T16868] Disabling non-boot CPUs ... [ 278.602683][T16868] smpboot: CPU 1 is now offline [ 278.605302][T16868] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 278.605364][T16868] ACPI: Low-level resume complete [ 278.605496][T16868] PM: Restoring platform NVS memory [ 278.605505][T16868] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 278.616148][T16868] Enabling non-boot CPUs ... [ 278.616366][T16868] x86: Booting SMP configuration: [ 278.616370][T16868] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 278.616555][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 278.617483][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 278.618977][T16868] CPU1 is up [ 278.619304][T16868] ACPI: Waking up from system sleep state S3 [ 278.725871][T16868] OOM killer enabled. [ 278.726550][T16868] Restarting tasks ... done. [ 278.729788][T16868] PM: suspend exit 22:48:06 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0xd, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 278.775690][T16899] PM: suspend entry (deep) [ 278.784641][T16899] Filesystems sync: 0.007 seconds [ 278.787433][T16899] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 278.804687][T16899] OOM killer disabled. [ 278.805809][T16899] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 278.808769][T16899] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0xffffff7f00000000}}], 0x2, 0x8dc0) 22:48:07 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) fallocate(r0, 0x44, 0x2, 0xfffffffffffff121) 22:48:07 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x6000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0xe, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:07 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0xffffffff00000000}}], 0x2, 0x8dc0) [ 278.952587][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 279.457930][T16899] ACPI: Preparing to enter system sleep state S3 [ 279.458025][T16899] PM: Saving platform NVS memory [ 279.458030][T16899] Disabling non-boot CPUs ... [ 279.461233][T16899] smpboot: CPU 1 is now offline [ 279.464026][T16899] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 279.464124][T16899] ACPI: Low-level resume complete [ 279.464264][T16899] PM: Restoring platform NVS memory [ 279.464274][T16899] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 279.474497][T16899] Enabling non-boot CPUs ... [ 279.474684][T16899] x86: Booting SMP configuration: [ 279.474687][T16899] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 279.474884][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 279.475949][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 279.477448][T16899] CPU1 is up [ 279.477677][T16899] ACPI: Waking up from system sleep state S3 [ 279.594242][T16899] OOM killer enabled. [ 279.595124][T16899] Restarting tasks ... done. [ 279.602019][T16899] PM: suspend exit 22:48:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0xe, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 279.665702][T16902] PM: suspend entry (deep) [ 279.671822][T16913] PM: suspend entry (deep) [ 279.673176][T16913] PM: suspend exit [ 279.674122][T16902] Filesystems sync: 0.006 seconds [ 279.676481][T16902] Freezing user space processes ... (elapsed 0.028 seconds) done. [ 279.706481][T16902] OOM killer disabled. [ 279.707148][T16902] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 279.709732][T16902] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0xffffffffffffffff}}], 0x2, 0x8dc0) 22:48:08 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4001}, 0x404d080) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:08 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = pidfd_getfd(r0, r0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r1, r2, &(0x7f00000000c0)=0x7, 0xfffffffffffffffa) 22:48:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x10, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 279.824735][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 280.333597][T16902] ACPI: Preparing to enter system sleep state S3 [ 280.333667][T16902] PM: Saving platform NVS memory [ 280.333672][T16902] Disabling non-boot CPUs ... [ 280.336366][T16902] smpboot: CPU 1 is now offline [ 280.338795][T16902] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 280.338905][T16902] ACPI: Low-level resume complete [ 280.338988][T16902] PM: Restoring platform NVS memory [ 280.338997][T16902] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 280.350487][T16902] Enabling non-boot CPUs ... [ 280.350682][T16902] x86: Booting SMP configuration: [ 280.350686][T16902] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 280.350855][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 280.352066][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 280.353517][T16902] CPU1 is up [ 280.353640][T16902] ACPI: Waking up from system sleep state S3 [ 280.818095][T16902] OOM killer enabled. [ 280.818776][T16902] Restarting tasks ... [ 280.830450][T16913] PM: suspend entry (deep) [ 280.830747][T16902] done. [ 280.831764][T16913] PM: suspend exit [ 280.835371][T16902] PM: suspend exit 22:48:08 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) [ 280.894646][T16929] PM: suspend entry (deep) [ 280.895106][T16934] PM: suspend entry (deep) [ 280.896679][T16934] PM: suspend exit [ 280.902659][T16929] Filesystems sync: 0.006 seconds [ 280.904527][T16929] Freezing user space processes ... (elapsed 0.021 seconds) done. [ 280.927757][T16929] OOM killer disabled. [ 280.928628][T16929] Freezing remaining freezable tasks ... (elapsed 0.003 seconds) done. [ 280.933987][T16929] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:09 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x2}}], 0x2, 0x8dc0) 22:48:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x7000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 281.057950][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 281.584948][T16929] ACPI: Preparing to enter system sleep state S3 [ 281.585029][T16929] PM: Saving platform NVS memory [ 281.585033][T16929] Disabling non-boot CPUs ... [ 281.588440][T16929] smpboot: CPU 1 is now offline [ 281.591218][T16929] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 281.591282][T16929] ACPI: Low-level resume complete [ 281.591359][T16929] PM: Restoring platform NVS memory [ 281.591368][T16929] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 281.604048][T16929] Enabling non-boot CPUs ... [ 281.604195][T16929] x86: Booting SMP configuration: [ 281.604212][T16929] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 281.604383][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 281.605382][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 281.606735][T16929] CPU1 is up [ 281.606968][T16929] ACPI: Waking up from system sleep state S3 [ 281.727469][T16929] OOM killer enabled. [ 281.728140][T16929] Restarting tasks ... [ 281.738758][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 281.742384][ T1034] block loop5: uevent: failed to send synthetic uevent 22:48:09 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x4}}], 0x2, 0x8dc0) 22:48:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x10, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x8000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16, @ANYBLOB="050000000000000000000f00000008000300", @ANYRES32, @ANYBLOB="28000e0008"], 0x74}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="3d00400832faafe6e450d7d35b7a92fd7da5fb7d693162d81065df9999d0fe22ae542734a25b27b64dd2429fc6a9c6b18bda895dc596f630944453eb057385b5ba8a48aa282d6cdbf78c98d9b846c25a3dccc4eb6e8ce42e6a3cc0638ee56396ef5b7e5ad3d1fe2b71071ddb93e7bf7659a774e28de2b598bbab7ac3588743314d60fd8a213eb16c9ef798f90accb8d6348f75f33ccc9a66f3983cc8d7b71b1fe70e6208d256e4b100e796086b987b9c2389c001", @ANYRES16=0x0, @ANYBLOB="000326bd7000fedbdf250500000008000300", @ANYRES32=r1, @ANYBLOB="0c009900ff00000062000000"], 0x28}, 0x1, 0x0, 0x0, 0x87d3de7008fa0d73}, 0x1) openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) [ 281.762338][T16934] PM: suspend entry (deep) [ 281.763923][T16934] PM: suspend exit [ 281.769489][T16929] done. [ 281.771369][T16929] PM: suspend exit [ 281.783891][T16931] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 281.786617][T16931] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000004b85bb01 [ 281.813705][T16929] PM: suspend entry (deep) [ 281.824751][T16929] Filesystems sync: 0.009 seconds [ 281.826458][T16929] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 281.835540][T16929] OOM killer disabled. [ 281.836283][T16929] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 281.838803][T16929] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xa000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x11, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:10 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) open(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x110) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x5, 0x4) 22:48:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x10000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 281.952053][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 282.446412][T16929] ACPI: Preparing to enter system sleep state S3 [ 282.446508][T16929] PM: Saving platform NVS memory [ 282.446526][T16929] Disabling non-boot CPUs ... [ 282.448954][T16929] smpboot: CPU 1 is now offline [ 282.451417][T16929] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 282.451486][T16929] ACPI: Low-level resume complete [ 282.451567][T16929] PM: Restoring platform NVS memory [ 282.451575][T16929] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 282.461740][T16929] Enabling non-boot CPUs ... [ 282.461935][T16929] x86: Booting SMP configuration: [ 282.461976][T16929] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 282.462182][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 282.463212][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 282.464541][T16929] CPU1 is up [ 282.464880][T16929] ACPI: Waking up from system sleep state S3 [ 282.893671][T16929] OOM killer enabled. [ 282.894551][T16929] Restarting tasks ... [ 282.900290][ T1034] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 282.904639][ T1034] block loop4: uevent: failed to send synthetic uevent [ 282.917597][T16929] done. [ 282.918512][T16929] PM: suspend exit 22:48:10 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x8}}], 0x2, 0x8dc0) 22:48:10 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) preadv(r1, &(0x7f00000025c0)=[{&(0x7f00000002c0)=""/155, 0x9b}, {&(0x7f00000001c0)=""/27, 0x1b}, {&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/197, 0xc5}, {&(0x7f0000000200)=""/38, 0x26}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/4096, 0x1000}, {&(0x7f0000002500)=""/144, 0x90}], 0x8, 0x27, 0xea56) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) r3 = eventfd2(0xa0, 0x800) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) ioprio_get$uid(0x3, r5) statx(r0, &(0x7f0000000040)='./file0\x00', 0x1000, 0x20, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r3, r5, r6) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x4010, r2, 0xce548000) 22:48:10 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x11}}], 0x2, 0x8dc0) [ 282.952091][T16948] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 282.954511][T16948] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000d83ab206 22:48:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x12, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x10000120}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 283.001604][T16977] PM: suspend entry (deep) [ 283.014041][T16977] Filesystems sync: 0.011 seconds [ 283.015746][T16977] Freezing user space processes ... [ 283.022484][T16948] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 283.025602][T16948] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000018a68571 [ 283.049754][T16977] (elapsed 0.033 seconds) done. [ 283.050977][T16977] OOM killer disabled. [ 283.051925][T16977] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 283.055519][T16977] printk: Suspending console(s) (use no_console_suspend to debug) [ 283.134276][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 283.617226][T12851] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 283.634041][T16977] ACPI: Preparing to enter system sleep state S3 [ 283.634108][T16977] PM: Saving platform NVS memory [ 283.634112][T16977] Disabling non-boot CPUs ... [ 283.637394][T16977] smpboot: CPU 1 is now offline [ 283.639933][T16977] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 283.639996][T16977] ACPI: Low-level resume complete [ 283.640113][T16977] PM: Restoring platform NVS memory [ 283.640122][T16977] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 283.651029][T16977] Enabling non-boot CPUs ... [ 283.651217][T16977] x86: Booting SMP configuration: [ 283.651220][T16977] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 283.651443][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 283.652462][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 283.653891][T16977] CPU1 is up [ 283.654136][T16977] ACPI: Waking up from system sleep state S3 [ 284.081215][T16977] OOM killer enabled. [ 284.081860][T16977] Restarting tasks ... [ 284.096984][T16976] PM: suspend entry (deep) [ 284.099762][T16976] PM: suspend exit [ 284.105079][ T1034] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 284.107109][ T1034] block loop4: uevent: failed to send synthetic uevent 22:48:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x11, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 284.113120][T16977] done. [ 284.113735][T16977] PM: suspend exit 22:48:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x13, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:11 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x60}}], 0x2, 0x8dc0) 22:48:11 executing program 4: write$binfmt_misc(0xffffffffffffffff, &(0x7f00000001c0)={'syz0', "c0547dec03dc6a977ccacd215843f40068f5c874aaf14c9c326959739c0589249a9dfb5e2948d970c8dc77d1d87d5cc1b000b64cdb03f687f2c8cae6dcf3e6aab274bb82fb24d25c3f738f901883a757a3b4fbd433a7a1cac3db3a904e99b0ff48e72b1b8b27772a34c5ce9977a396e5c858ebb4d4d773f11ec3c2b773c3caccd9d0a9c2715666aae7ac1b4aeb86b63b30d7c5b96fcb283e66668690344155c6a9893ac82ef8a6febac7fa7337d1a4ad30d4eaca45437888a959aba56c2a1a25c94807d575c61090c9e9837594642f7daf35db7e487b0f9a7170d7d05434a85bbac33bb2b2d196df7597fa285b"}, 0xf1) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) poll(&(0x7f0000000180)=[{r0, 0x2008}], 0x1, 0x80000001) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@get={0x1, &(0x7f00000000c0)=""/161}) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 284.156515][T16998] PM: suspend entry (deep) [ 284.179541][T16998] Filesystems sync: 0.021 seconds [ 284.180826][T16998] Freezing user space processes ... (elapsed 0.023 seconds) done. [ 284.206309][T16998] OOM killer disabled. [ 284.207209][T16998] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 284.209984][T16998] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:12 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x20010010}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 284.316968][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 284.819976][T16998] ACPI: Preparing to enter system sleep state S3 [ 284.820102][T16998] PM: Saving platform NVS memory [ 284.820107][T16998] Disabling non-boot CPUs ... [ 284.823437][T16998] smpboot: CPU 1 is now offline [ 284.825810][T16998] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 284.825924][T16998] ACPI: Low-level resume complete [ 284.826000][T16998] PM: Restoring platform NVS memory [ 284.826009][T16998] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 284.835338][T16998] Enabling non-boot CPUs ... [ 284.835621][T16998] x86: Booting SMP configuration: [ 284.835625][T16998] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 284.835796][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 284.837041][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 284.838340][T16998] CPU1 is up [ 284.838609][T16998] ACPI: Waking up from system sleep state S3 [ 284.938938][T16998] OOM killer enabled. [ 284.939736][T16998] Restarting tasks ... [ 284.946120][ T1034] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 284.950294][ T1034] block loop4: uevent: failed to send synthetic uevent [ 284.967593][T16998] done. [ 284.971987][T16998] PM: suspend exit 22:48:12 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x12, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:12 executing program 3: perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0xfe, 0x1, 0x0, 0x4, 0x0, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x5, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(0xffffffffffffffff, 0xf502, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='\x00') r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) [ 284.975562][T17007] PM: suspend entry (deep) [ 284.989377][T17007] Filesystems sync: 0.012 seconds [ 284.991051][T17007] Freezing user space processes ... (elapsed 0.031 seconds) done. [ 285.024121][T17007] OOM killer disabled. [ 285.024975][T17007] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 285.027937][T17007] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:13 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0xe0}}], 0x2, 0x8dc0) [ 285.367758][ T1776] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 285.866560][T17007] ACPI: Preparing to enter system sleep state S3 [ 285.866636][T17007] PM: Saving platform NVS memory [ 285.866641][T17007] Disabling non-boot CPUs ... [ 285.869916][T17007] smpboot: CPU 1 is now offline [ 285.872394][T17007] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 285.872491][T17007] ACPI: Low-level resume complete [ 285.872579][T17007] PM: Restoring platform NVS memory [ 285.872588][T17007] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 285.882154][T17007] Enabling non-boot CPUs ... [ 285.882332][T17007] x86: Booting SMP configuration: [ 285.882336][T17007] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 285.882538][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 285.883568][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 285.885395][T17007] CPU1 is up [ 285.885659][T17007] ACPI: Waking up from system sleep state S3 [ 285.984816][T17007] OOM killer enabled. [ 285.985798][T17007] Restarting tasks ... [ 285.989905][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 285.993768][ T1034] block loop5: uevent: failed to send synthetic uevent [ 286.013603][T17007] done. 22:48:13 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x3f000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:13 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x1100}}], 0x2, 0x8dc0) 22:48:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x27, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.017708][T17007] PM: suspend exit [ 286.031668][T17016] PM: suspend entry (deep) [ 286.048081][T17016] Filesystems sync: 0.014 seconds [ 286.050092][T17018] PM: suspend entry (deep) [ 286.050197][T17016] Freezing user space processes ... [ 286.051205][T17018] PM: suspend exit [ 286.075538][T17016] (elapsed 0.024 seconds) done. [ 286.076921][T17016] OOM killer disabled. [ 286.077594][T17016] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 286.080526][T17016] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x27, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 286.369195][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 286.867986][T17016] ACPI: Preparing to enter system sleep state S3 [ 286.868071][T17016] PM: Saving platform NVS memory [ 286.868125][T17016] Disabling non-boot CPUs ... [ 286.870426][T17016] smpboot: CPU 1 is now offline [ 286.872803][T17016] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 286.872867][T17016] ACPI: Low-level resume complete [ 286.872978][T17016] PM: Restoring platform NVS memory [ 286.872987][T17016] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 286.883257][T17016] Enabling non-boot CPUs ... [ 286.883415][T17016] x86: Booting SMP configuration: [ 286.883419][T17016] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 286.883662][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 286.884610][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 286.885823][T17016] CPU1 is up [ 286.886123][T17016] ACPI: Waking up from system sleep state S3 [ 286.983185][T17016] OOM killer enabled. [ 286.983920][T17016] Restarting tasks ... [ 286.995730][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 286.998129][T17016] done. [ 287.000767][ T1034] block loop5: uevent: failed to send synthetic uevent 22:48:14 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x181040, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x48, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.015617][T17016] PM: suspend exit 22:48:14 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) r3 = dup2(r1, r0) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000140)) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x20, 0x6e, 0xc, 0x2, 0x0, 0x3ff, 0x52, 0x1fe1278327a6d55d, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x0, 0x6}, 0x1100, 0x81, 0x8, 0x3, 0x8ee, 0x5, 0x9, 0x0, 0x6, 0x0, 0x200}, r2, 0x8, r0, 0x8) 22:48:14 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x6000}}], 0x2, 0x8dc0) 22:48:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x40000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 287.038804][T17023] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 287.041053][T17023] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000058ebfd18 22:48:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x48, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 287.107226][T17042] PM: suspend entry (deep) [ 287.121004][T17042] Filesystems sync: 0.012 seconds [ 287.123733][T17042] Freezing user space processes ... (elapsed 0.003 seconds) done. [ 287.128848][T17042] OOM killer disabled. [ 287.129514][T17042] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 287.132384][T17042] printk: Suspending console(s) (use no_console_suspend to debug) [ 287.180985][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 287.680524][T17042] ACPI: Preparing to enter system sleep state S3 [ 287.680595][T17042] PM: Saving platform NVS memory [ 287.680600][T17042] Disabling non-boot CPUs ... [ 287.683757][T17042] smpboot: CPU 1 is now offline [ 287.686485][T17042] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 287.686551][T17042] ACPI: Low-level resume complete [ 287.686632][T17042] PM: Restoring platform NVS memory [ 287.686660][T17042] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 287.696675][T17042] Enabling non-boot CPUs ... [ 287.696900][T17042] x86: Booting SMP configuration: [ 287.696905][T17042] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 287.697149][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 287.698235][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 287.699695][T17042] CPU1 is up [ 287.699990][T17042] ACPI: Waking up from system sleep state S3 [ 287.931374][T17042] OOM killer enabled. [ 287.931970][T17042] Restarting tasks ... [ 287.941046][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 287.945339][ T1034] block loop5: uevent: failed to send synthetic uevent [ 287.958365][ T1034] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 287.960423][ T1034] block loop4: uevent: failed to send synthetic uevent [ 287.962361][T17042] done. 22:48:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0xe000}}], 0x2, 0x8dc0) 22:48:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x60000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 287.963494][T17042] PM: suspend exit [ 287.973916][T17039] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 287.976652][T17039] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000d83ab206 22:48:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x4c, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x7f000001}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x1000000}}], 0x2, 0x8dc0) 22:48:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x4c, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:15 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) sendfile(r1, r0, &(0x7f0000000040)=0xfff, 0x0) 22:48:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x2000000}}], 0x2, 0x8dc0) 22:48:15 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x7ffffff7}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x68, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x97ffffff}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x4000000}}], 0x2, 0x8dc0) 22:48:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x68, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x8000000}}], 0x2, 0x8dc0) 22:48:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xac14140a}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 288.264720][T17085] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 288.267140][T17085] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000c0f7a2ea 22:48:16 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2000}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000140), 0x19a0000000000, 0x10000) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x20, 0x0, 0x2, 0xc3, 0x0, 0x200, 0x80004, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000040), 0x4}, 0x808, 0x1, 0x2, 0x4, 0x4, 0x0, 0x401, 0x0, 0x9a, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0x1) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000280)='/sys/power/state', 0x90082, 0x0) r3 = socket$inet_icmp(0x2, 0x2, 0x1) ppoll(&(0x7f0000000180)=[{r0, 0x4240}, {r3, 0x9705}], 0x2, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)={[0xb8f8]}, 0x8) sendfile(r2, r2, &(0x7f0000000000)=0x7, 0x3) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r4, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) read(r4, &(0x7f0000000240)=""/49, 0x31) pipe2(&(0x7f0000002100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r6, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) ioctl$BTRFS_IOC_BALANCE(r6, 0x5000940c, 0x0) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r7, 0x40605346, &(0x7f0000000340)={0xfffffffc, 0x0, {0x3, 0x3, 0x34, 0x0, 0x7}, 0x7d15}) sendfile(r3, r8, 0x0, 0x4) sendfile(r5, r7, &(0x7f0000002140)=0x81, 0x1) 22:48:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x6c, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xac14140b}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x11000000}}], 0x2, 0x8dc0) [ 288.358230][T17098] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 288.360964][T17098] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000018a68571 22:48:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x6c, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0x60000000}}], 0x2, 0x8dc0) 22:48:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xe0000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xe0ffffff}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0xe0000000}}], 0x2, 0x8dc0) [ 288.538222][T17111] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 288.540540][T17111] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000018a68571 22:48:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x74, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:16 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xeffdffff}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:16 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0xfeffffff}}], 0x2, 0x8dc0) [ 288.727657][T17139] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 288.730652][T17139] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000c0f7a2ea 22:48:17 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x830b) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r2, r1, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$cgroup_int(r3, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r4, r3, 0x0) writev(r3, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r3) r5 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r5, r5, &(0x7f0000000000)=0x7, 0x3) 22:48:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0xffffff7f}}], 0x2, 0x8dc0) 22:48:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xf7ffff7f}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x74, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:17 executing program 4: sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x110, 0x0, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x16bf}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_NET={0x5c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x12e}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xe765}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x10000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe33}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xc3}]}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}]}, @TIPC_NLA_SOCK={0x58, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x70}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xe0}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}]}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080), r1) r3 = socket$inet6(0xa, 0x3, 0x9) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x3a, 0x41, 0x0, 0x0) r4 = socket$inet6(0xa, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x11, r5}) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x50, r2, 0x8, 0x70bd2c, 0x25dfdbff, {}, [@GTPA_VERSION={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_TID={0xc}, @GTPA_LINK={0x8, 0x1, r5}, @GTPA_I_TEI={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}]}, 0x50}, 0x1, 0x0, 0x0, 0x44000}, 0x51) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=ANY=[@ANYBLOB="141400001b59a2d09ec713a081823d66f672650381839ef7b595f4", @ANYRES16=r2, @ANYBLOB="442a63bf5010b00fdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0xd0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000800), 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, r2, 0x204, 0x70bd26, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @rand_addr=0x64010101}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x24014001) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x300, 0x70bd2b, 0x25dfdbfc, {}, [@GTPA_I_TEI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x800) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x18800802}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB='l\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000225bd7000fedbdf2501fd00000c00030000000000000000ff08000500ac1414bb0c00030069ad77e8fa64249d946b6f6dc01405010000000000000008000900040000000c00030001000000000000000c0003000100000000000000080008000100000008000400ffffffff08000500ac1414aa8cce33ac53653493e4b27f1137c4b298a03e9e4e790e1d03b6ed0c828894d9754d9fc8f0328116aa4f63911921d385899a93874a9f27"], 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x888d0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r2, 0x20, 0x70bd2a, 0x25dfdbfb, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_LINK={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_NET_NS_FD={0x8}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_MS_ADDRESS={0x8, 0x5, @loopback}, @GTPA_FLOW={0x6, 0x6, 0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x9e744df16b9ceebc) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="f08ee02a1fc3344c", @ANYRES16=r2, @ANYBLOB="00042dbd7000ffdbdf25000000000c0003000200000000000000"], 0x20}, 0x1, 0x0, 0x0, 0x28004}, 0x20008040) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x100, 0x70bd26, 0x3ff, {}, [@GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r2, 0x800, 0x70bd2b, 0x25dfdbfc, {}, [@GTPA_VERSION={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x20000010) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x7a, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0xfffffffe}}], 0x2, 0x8dc0) [ 289.238726][T17161] PM: suspend entry (deep) [ 289.254466][T17161] Filesystems sync: 0.014 seconds [ 289.256472][T17161] Freezing user space processes ... [ 289.264435][T17157] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 289.267088][T17157] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000012acec26 [ 289.286991][T17161] (elapsed 0.030 seconds) done. [ 289.288211][T17161] OOM killer disabled. [ 289.289350][T17161] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 289.292721][T17161] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfc000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x7a, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:17 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1, 0x0, 0x0, 0xffffffff}}], 0x2, 0x8dc0) 22:48:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0xff, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 289.332361][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 289.830221][T17161] ACPI: Preparing to enter system sleep state S3 [ 289.830297][T17161] PM: Saving platform NVS memory [ 289.830302][T17161] Disabling non-boot CPUs ... [ 289.833531][T17161] smpboot: CPU 1 is now offline [ 289.836273][T17161] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 289.836341][T17161] ACPI: Low-level resume complete [ 289.836421][T17161] PM: Restoring platform NVS memory [ 289.836430][T17161] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 289.847570][T17161] Enabling non-boot CPUs ... [ 289.847860][T17161] x86: Booting SMP configuration: [ 289.847864][T17161] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 289.848038][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 289.849210][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 289.850605][T17161] CPU1 is up [ 289.850903][T17161] ACPI: Waking up from system sleep state S3 [ 289.949087][T17161] OOM killer enabled. [ 289.949646][T17161] Restarting tasks ... done. [ 289.956449][T17165] PM: suspend entry (deep) [ 289.957613][T17165] PM: suspend exit [ 289.958998][T17161] PM: suspend exit [ 289.969102][T17173] PM: suspend entry (deep) 22:48:17 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfc010000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 289.992706][T17173] Filesystems sync: 0.022 seconds [ 290.008914][T17173] Freezing user space processes ... (elapsed 0.005 seconds) done. [ 290.016948][T17173] OOM killer disabled. [ 290.017952][T17173] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 290.020730][T17173] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:18 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000040)=@v1={0x0, @aes256, 0x0, @desc2}) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0xff, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:48:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfe800000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:18 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000040)=0x4, 0x2) r1 = accept(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x80) sendfile(r1, r0, &(0x7f0000000000)=0xffffffffffffffff, 0x3) fcntl$addseals(r0, 0x409, 0x9) [ 290.375048][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 290.873953][T17173] ACPI: Preparing to enter system sleep state S3 [ 290.874055][T17173] PM: Saving platform NVS memory [ 290.874059][T17173] Disabling non-boot CPUs ... [ 290.877069][T17173] smpboot: CPU 1 is now offline [ 290.879538][T17173] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 290.879633][T17173] ACPI: Low-level resume complete [ 290.879712][T17173] PM: Restoring platform NVS memory [ 290.879721][T17173] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 290.889760][T17173] Enabling non-boot CPUs ... [ 290.890046][T17173] x86: Booting SMP configuration: [ 290.890050][T17173] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 290.890248][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 290.891285][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 290.892612][T17173] CPU1 is up [ 290.892860][T17173] ACPI: Waking up from system sleep state S3 [ 290.937327][T17190] hwrng: no data available [ 290.992389][T17173] OOM killer enabled. [ 290.993122][T17173] Restarting tasks ... [ 290.995535][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 290.998879][ T1034] block loop5: uevent: failed to send synthetic uevent [ 291.012433][T17173] done. [ 291.013412][T17173] PM: suspend exit 22:48:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfe80ffff}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 291.052985][T17179] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 291.055378][T17179] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003f010896 22:48:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:18 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x2}], 0x2, 0x8dc0) 22:48:18 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x8) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:18 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfec0ffff}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 291.146504][T17202] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 291.148762][T17202] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000ab65124b [ 291.162891][T17214] PM: suspend entry (deep) [ 291.182302][T17214] Filesystems sync: 0.017 seconds [ 291.184147][T17214] Freezing user space processes ... (elapsed 0.021 seconds) done. [ 291.207395][T17214] OOM killer disabled. [ 291.208110][T17214] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 291.210784][T17214] printk: Suspending console(s) (use no_console_suspend to debug) [ 291.657490][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 301.558990][T17214] ACPI: Preparing to enter system sleep state S3 [ 301.559114][T17214] PM: Saving platform NVS memory [ 301.559118][T17214] Disabling non-boot CPUs ... [ 301.562130][T17214] smpboot: CPU 1 is now offline [ 301.564393][T17214] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 301.564487][T17214] ACPI: Low-level resume complete [ 301.564568][T17214] PM: Restoring platform NVS memory 22:48:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x4}], 0x2, 0x8dc0) [ 301.564577][T17214] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 301.574558][T17214] Enabling non-boot CPUs ... [ 301.574707][T17214] x86: Booting SMP configuration: [ 301.574766][T17214] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 301.574947][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 301.576128][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 301.577455][T17214] CPU1 is up [ 301.577741][T17214] ACPI: Waking up from system sleep state S3 [ 301.757036][T17214] OOM killer enabled. 22:48:29 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x2, 0x0, 0x8, 0x5, 0x0, 0x7bb4, 0x800, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000040), 0xa}, 0x20, 0x4, 0x3, 0xf3fcc4693a98cf49, 0x200, 0xfffffffa, 0x9, 0x0, 0x80000000, 0x0, 0x8}, r0, 0xa, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 22:48:29 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) read$char_raw(r0, &(0x7f0000000200)={""/28308}, 0x7000) sendfile(r0, r0, &(0x7f0000000000)=0x9, 0x29) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e24, 0x9, @local, 0x7fff}, 0x1c) r1 = syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x3ff, 0x1, &(0x7f0000000140)=[{&(0x7f0000007200)="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", 0x1000}], 0x210860, &(0x7f0000008200)={[{'-}#\'--&'}, {'\x00'}], [{@fowner_lt={'fowner<', 0xee00}}, {@dont_measure}, {@fowner_lt={'fowner<', 0xee01}}, {@smackfsroot={'smackfsroot', 0x3d, '\'\x8a:\'\\.+%^^,'}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@subj_user={'subj_user', 0x3d, '\x00'}}, {@dont_hash}]}) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000180)) 22:48:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xff000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x8}], 0x2, 0x8dc0) [ 301.761011][T17214] Restarting tasks ... done. [ 301.810414][T17214] PM: suspend exit 22:48:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xffff0000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 301.868892][T17235] loop4: detected capacity change from 0 to 8 [ 301.898102][T17225] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 301.906224][T17225] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e5cb1ee4 22:48:29 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x11}], 0x2, 0x8dc0) 22:48:29 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000200)={'gretap0', 0x32, 0x36}, 0xa) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0xbbd, 0x9) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f00000001c0)) [ 301.913084][T17248] loop4: detected capacity change from 0 to 8 22:48:29 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xffff80fe}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 301.969220][T17258] PM: suspend entry (deep) [ 301.981941][T17234] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 301.990251][T17234] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000061c5f453 [ 301.990272][T17258] Filesystems sync: 0.016 seconds [ 302.007774][T17258] Freezing user space processes ... [ 302.018739][T17234] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 302.032149][T17234] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000018a68571 [ 302.058802][T17234] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 302.066880][T17234] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000061c5f453 [ 302.081637][T17258] (elapsed 0.073 seconds) done. [ 302.086562][T17258] OOM killer disabled. [ 302.090602][T17258] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 302.099899][T17258] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x2, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:30 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x60}], 0x2, 0x8dc0) 22:48:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x3, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 302.141663][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 302.633126][T17258] ACPI: Preparing to enter system sleep state S3 [ 302.633227][T17258] PM: Saving platform NVS memory [ 302.633232][T17258] Disabling non-boot CPUs ... [ 302.636517][T17258] smpboot: CPU 1 is now offline [ 302.639084][T17258] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 302.639149][T17258] ACPI: Low-level resume complete [ 302.639236][T17258] PM: Restoring platform NVS memory [ 302.639245][T17258] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 302.648720][T17258] Enabling non-boot CPUs ... [ 302.648941][T17258] x86: Booting SMP configuration: [ 302.648945][T17258] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 302.649122][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 302.650074][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 302.651401][T17258] CPU1 is up [ 302.651619][T17258] ACPI: Waking up from system sleep state S3 [ 302.758780][T17258] OOM killer enabled. [ 302.759482][T17258] Restarting tasks ... [ 302.764503][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 302.768235][ T1034] block loop3: uevent: failed to send synthetic uevent [ 302.781905][T17258] done. [ 302.786964][T17265] PM: suspend entry (deep) [ 302.788202][T17265] PM: suspend exit [ 302.789516][T17258] PM: suspend exit [ 302.805426][T17273] PM: suspend entry (deep) [ 302.807862][T17272] PM: suspend entry (deep) [ 302.809379][T17272] PM: suspend exit [ 302.819682][T17273] Filesystems sync: 0.012 seconds [ 302.826867][T17273] Freezing user space processes ... (elapsed 0.008 seconds) done. [ 302.836463][T17273] OOM killer disabled. [ 302.837249][T17273] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 302.840245][T17273] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xffffc0fe}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:31 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) dup2(r2, r0) 22:48:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0xe0}], 0x2, 0x8dc0) [ 303.152981][ T1805] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 303.654597][T17273] ACPI: Preparing to enter system sleep state S3 [ 303.654671][T17273] PM: Saving platform NVS memory [ 303.654676][T17273] Disabling non-boot CPUs ... [ 303.657036][T17273] smpboot: CPU 1 is now offline [ 303.659470][T17273] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 303.659532][T17273] ACPI: Low-level resume complete [ 303.659610][T17273] PM: Restoring platform NVS memory [ 303.659619][T17273] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 303.669313][T17273] Enabling non-boot CPUs ... [ 303.669524][T17273] x86: Booting SMP configuration: [ 303.669529][T17273] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 303.669698][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 303.670602][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 303.672118][T17273] CPU1 is up [ 303.672381][T17273] ACPI: Waking up from system sleep state S3 [ 303.776604][T17273] OOM killer enabled. 22:48:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:31 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfffffdef}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:31 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000100)) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000200)={0x3, 0x5, 0x84, 0x1, 0x9, "f455a5c46171ce049ce85f79a7c33926a8d32e"}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000240)={{0x1, 0x8}, 'port0\x00', 0x51, 0x20, 0x80000001, 0x6, 0x5, 0x9, 0x401, 0x0, 0x1, 0x2}) r2 = dup3(r0, r0, 0x80000) sendto$inet6(r2, &(0x7f0000000040)="6e2a20231222bf71c5b92c4c6df46870c4c810f9e8febf8f09d4326aae33c90d0dc3323fc6f86a2a3c9fab7254979e159ee2dd267c2bc4c0dc814f8cc5", 0x3d, 0x2400c080, &(0x7f00000000c0)={0xa, 0x4e21, 0x10000, @remote, 0x4}, 0x1c) [ 303.777407][T17273] Restarting tasks ... [ 303.806670][T17267] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 303.810748][T17267] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000061c5f453 [ 303.813937][T17273] done. [ 303.814845][T17273] PM: suspend exit [ 303.833810][T17267] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 303.836304][T17267] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000a697ea26 22:48:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x1100}], 0x2, 0x8dc0) [ 303.867887][T17293] PM: suspend entry (deep) [ 303.876432][T17293] Filesystems sync: 0.007 seconds [ 303.878431][T17293] Freezing user space processes ... (elapsed 0.030 seconds) done. [ 303.911145][T17293] OOM killer disabled. [ 303.912341][T17293] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 303.915248][T17293] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x3, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xffffff7f}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 303.994353][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 304.497715][T17293] ACPI: Preparing to enter system sleep state S3 [ 304.497811][T17293] PM: Saving platform NVS memory [ 304.497815][T17293] Disabling non-boot CPUs ... [ 304.501116][T17293] smpboot: CPU 1 is now offline [ 304.503525][T17293] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 304.503589][T17293] ACPI: Low-level resume complete [ 304.503712][T17293] PM: Restoring platform NVS memory [ 304.503721][T17293] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 304.513482][T17293] Enabling non-boot CPUs ... [ 304.513673][T17293] x86: Booting SMP configuration: [ 304.513677][T17293] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 304.513847][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 304.514751][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 304.516344][T17293] CPU1 is up [ 304.516601][T17293] ACPI: Waking up from system sleep state S3 [ 304.955584][T17293] OOM killer enabled. [ 304.956381][T17293] Restarting tasks ... [ 304.970473][T17295] PM: suspend entry (deep) [ 304.971583][T17293] done. [ 304.971978][T17295] PM: suspend exit [ 304.975119][T17293] PM: suspend exit [ 304.983621][T17293] PM: suspend entry (deep) [ 304.984414][T17288] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 304.987398][T17288] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000008d57e719 [ 304.996266][T17293] Filesystems sync: 0.010 seconds [ 304.997548][T17293] Freezing user space processes ... (elapsed 0.024 seconds) done. [ 305.023432][T17293] OOM killer disabled. [ 305.024232][T17293] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 305.027114][T17293] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:33 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x6000}], 0x2, 0x8dc0) 22:48:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x5, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:33 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000000c0)) 22:48:33 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xffffff97}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 305.196024][T13872] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 305.690175][T17293] ACPI: Preparing to enter system sleep state S3 [ 305.690307][T17293] PM: Saving platform NVS memory [ 305.690311][T17293] Disabling non-boot CPUs ... [ 305.693602][T17293] smpboot: CPU 1 is now offline [ 305.696200][T17293] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 305.696264][T17293] ACPI: Low-level resume complete [ 305.696342][T17293] PM: Restoring platform NVS memory [ 305.696411][T17293] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 305.706606][T17293] Enabling non-boot CPUs ... [ 305.706772][T17293] x86: Booting SMP configuration: [ 305.706778][T17293] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 305.706982][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 305.708054][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 305.709398][T17293] CPU1 is up [ 305.709699][T17293] ACPI: Waking up from system sleep state S3 [ 306.134950][T17293] OOM killer enabled. [ 306.135617][T17293] Restarting tasks ... [ 306.146791][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 306.150526][ T1034] block loop5: uevent: failed to send synthetic uevent [ 306.154512][T17293] done. [ 306.156040][T17293] PM: suspend exit 22:48:33 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r0, 0x4040942c, &(0x7f0000000040)={0x0, 0x7f, [0x10000, 0x9, 0x3, 0x1d4, 0x1f, 0x41c]}) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:34 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0xe000}], 0x2, 0x8dc0) [ 306.185747][T17306] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 306.187924][T17306] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000033226345 22:48:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x4, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:34 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x1000000}], 0x2, 0x8dc0) 22:48:34 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xffffffe0}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 306.235460][T17327] PM: suspend entry (deep) [ 306.243048][T17327] Filesystems sync: 0.006 seconds [ 306.244530][T17327] Freezing user space processes ... [ 306.251647][T17314] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 306.254229][T17314] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000ca5a75dd [ 306.282549][T17327] (elapsed 0.037 seconds) done. [ 306.283645][T17327] OOM killer disabled. [ 306.284557][T17327] Freezing remaining freezable tasks ... (elapsed 0.000 seconds) done. [ 306.287350][T17327] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x6, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 306.388060][ T1805] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 306.869533][T12851] psmouse serio1: Failed to reset mouse on isa0060/serio1: -5 [ 306.885359][T17327] ACPI: Preparing to enter system sleep state S3 [ 306.885440][T17327] PM: Saving platform NVS memory [ 306.885444][T17327] Disabling non-boot CPUs ... [ 306.888732][T17327] smpboot: CPU 1 is now offline [ 306.891118][T17327] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 306.891239][T17327] ACPI: Low-level resume complete [ 306.891396][T17327] PM: Restoring platform NVS memory [ 306.891405][T17327] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 306.902244][T17327] Enabling non-boot CPUs ... [ 306.902406][T17327] x86: Booting SMP configuration: [ 306.902410][T17327] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 306.902575][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 306.903580][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 306.905078][T17327] CPU1 is up [ 306.905358][T17327] ACPI: Waking up from system sleep state S3 [ 307.329703][T17327] OOM killer enabled. [ 307.330456][T17327] Restarting tasks ... [ 307.337068][ T1034] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 307.339162][ T1034] block loop4: uevent: failed to send synthetic uevent [ 307.353134][T17327] done. [ 307.353824][T17327] PM: suspend exit [ 307.357511][T17323] PM: suspend entry (deep) [ 307.365568][T17323] Filesystems sync: 0.007 seconds [ 307.366923][T17323] Freezing user space processes ... (elapsed 0.014 seconds) done. [ 307.382520][T17323] OOM killer disabled. [ 307.383107][T17323] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 307.385680][T17323] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:36 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x2000000}], 0x2, 0x8dc0) 22:48:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x5, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:36 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) fallocate(r0, 0x64, 0x7, 0x7) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/firmware/acpi', 0x380c2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) [ 307.631176][ T1495] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 308.140701][T17323] ACPI: Preparing to enter system sleep state S3 [ 308.140772][T17323] PM: Saving platform NVS memory [ 308.140777][T17323] Disabling non-boot CPUs ... [ 308.144069][T17323] smpboot: CPU 1 is now offline [ 308.146703][T17323] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 308.146842][T17323] ACPI: Low-level resume complete [ 308.146921][T17323] PM: Restoring platform NVS memory [ 308.146932][T17323] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 308.157527][T17323] Enabling non-boot CPUs ... [ 308.157738][T17323] x86: Booting SMP configuration: [ 308.157743][T17323] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 308.157973][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 308.159003][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 308.160562][T17323] CPU1 is up [ 308.160875][T17323] ACPI: Waking up from system sleep state S3 [ 308.280397][T17323] OOM killer enabled. [ 308.281094][T17323] Restarting tasks ... [ 308.284933][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 308.286930][ T1034] block loop5: uevent: failed to send synthetic uevent [ 308.296647][T17323] done. [ 308.297462][T17323] PM: suspend exit 22:48:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xffff00000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:36 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r0, 0xf505, 0x0) 22:48:36 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x4000000}], 0x2, 0x8dc0) 22:48:36 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x4000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x6, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 308.444201][T17361] PM: suspend entry (deep) [ 308.451075][T17361] Filesystems sync: 0.005 seconds [ 308.452340][T17361] Freezing user space processes ... (elapsed 0.016 seconds) done. [ 308.470769][T17361] OOM killer disabled. [ 308.471600][T17361] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 308.474546][T17361] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x10000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:37 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x8000000}], 0x2, 0x8dc0) 22:48:37 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/module/drm', 0x101002, 0x0) sendfile(r0, r0, 0x0, 0x6d) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) ioctl$CHAR_RAW_ZEROOUT(r0, 0x127f, &(0x7f0000000040)={0xd6ae, 0xbda}) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) read(r1, &(0x7f00000000c0)=""/222, 0xde) 22:48:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x100000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 308.873841][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 309.382850][T17361] ACPI: Preparing to enter system sleep state S3 [ 309.382975][T17361] PM: Saving platform NVS memory [ 309.382979][T17361] Disabling non-boot CPUs ... [ 309.386090][T17361] smpboot: CPU 1 is now offline [ 309.388900][T17361] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 309.389036][T17361] ACPI: Low-level resume complete [ 309.389113][T17361] PM: Restoring platform NVS memory [ 309.389123][T17361] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 309.399347][T17361] Enabling non-boot CPUs ... [ 309.399501][T17361] x86: Booting SMP configuration: [ 309.399505][T17361] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 309.399737][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 309.400668][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 309.402281][T17361] CPU1 is up [ 309.402577][T17361] ACPI: Waking up from system sleep state S3 [ 309.510980][T17361] OOM killer enabled. [ 309.511679][T17361] Restarting tasks ... done. [ 309.535021][T17361] PM: suspend exit 22:48:37 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r1, r0, &(0x7f0000000000)=0x7, 0x19d) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000040)) 22:48:37 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x11000000}], 0x2, 0x8dc0) [ 309.565841][T17369] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 309.567637][T17369] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000039659c5d 22:48:37 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0x60000000}], 0x2, 0x8dc0) [ 309.652172][T17404] PM: suspend entry (deep) [ 309.661061][T17404] Filesystems sync: 0.007 seconds [ 309.662420][T17404] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 309.670905][T17404] OOM killer disabled. [ 309.671475][T17404] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 309.674073][T17404] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:38 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x25, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x34) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) ptrace$cont(0x20, r2, 0x5, 0x2) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x18, r2, 0x8, 0x6) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x26, 0x0, 0x7, 0x7, 0x0, 0x400, 0x2000, 0x6d5ad90bb8df80bb, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x7fff, 0x7}, 0x48900, 0xffff, 0x5, 0x2, 0x360fc1d7, 0x9, 0x2, 0x0, 0x9, 0x0, 0x1}, r1, 0xb, r0, 0x0) ptrace$cont(0x9, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x10000000, 0x71a5, 0x2, 0x6, 0x3, 0x4, 0x10000}, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:38 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0xe0000000}], 0x2, 0x8dc0) 22:48:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x8, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:38 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/bus/mipi-dsi', 0x5a5000, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x100007f00000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x7, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 309.925758][ T220] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 310.446101][T17404] ACPI: Preparing to enter system sleep state S3 [ 310.446222][T17404] PM: Saving platform NVS memory [ 310.446227][T17404] Disabling non-boot CPUs ... [ 310.449393][T17404] smpboot: CPU 1 is now offline [ 310.451792][T17404] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 310.451857][T17404] ACPI: Low-level resume complete [ 310.451940][T17404] PM: Restoring platform NVS memory [ 310.451950][T17404] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 310.462295][T17404] Enabling non-boot CPUs ... [ 310.462593][T17404] x86: Booting SMP configuration: [ 310.462598][T17404] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 310.462815][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 310.463981][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 310.465598][T17404] CPU1 is up [ 310.465873][T17404] ACPI: Waking up from system sleep state S3 [ 310.574079][T17404] OOM killer enabled. [ 310.574626][T17404] Restarting tasks ... done. [ 310.592713][T17404] PM: suspend exit 22:48:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x200000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:38 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/cgroup', 0x2, 0x109) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff}, 0x80000) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0xa0400, 0x0) sendfile(r1, r2, &(0x7f0000000100)=0x6, 0x59d) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:38 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0xfeffffff}], 0x2, 0x8dc0) 22:48:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x300000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 310.649398][T17411] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 310.651764][T17411] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000a697ea26 22:48:38 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0xffffff7f}], 0x2, 0x8dc0) 22:48:38 executing program 4: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000080)) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000100)='/sys/module/yenta_socket', 0x2, 0x6) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x101000, 0x178) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 310.746034][T17416] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 310.747871][T17416] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000d8435515 22:48:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x400000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:38 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0xfffffffe}], 0x2, 0x8dc0) 22:48:38 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000040)) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) [ 310.804517][T17456] PM: suspend entry (deep) [ 310.814727][T17456] Filesystems sync: 0.009 seconds [ 310.815968][T17456] Freezing user space processes ... (elapsed 0.007 seconds) done. [ 310.824562][T17456] OOM killer disabled. [ 310.825182][T17456] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 310.827821][T17456] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x8, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:39 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}, 0xffffffff}], 0x2, 0x8dc0) [ 310.997774][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 311.496750][T17456] ACPI: Preparing to enter system sleep state S3 [ 311.496891][T17456] PM: Saving platform NVS memory [ 311.496896][T17456] Disabling non-boot CPUs ... [ 311.499122][T17456] smpboot: CPU 1 is now offline [ 311.501774][T17456] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 311.501859][T17456] ACPI: Low-level resume complete [ 311.501938][T17456] PM: Restoring platform NVS memory [ 311.501947][T17456] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 311.512668][T17456] Enabling non-boot CPUs ... [ 311.512887][T17456] x86: Booting SMP configuration: [ 311.512891][T17456] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 311.513075][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 311.514026][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 311.515618][T17456] CPU1 is up [ 311.515743][T17456] ACPI: Waking up from system sleep state S3 [ 311.624565][T17456] OOM killer enabled. [ 311.625247][T17456] Restarting tasks ... done. [ 311.647843][T17456] PM: suspend exit 22:48:39 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x3, 0x8dc0) [ 311.665704][T17468] PM: suspend entry (deep) [ 311.679300][T17468] Filesystems sync: 0.012 seconds [ 311.680713][T17468] Freezing user space processes ... (elapsed 0.014 seconds) done. [ 311.696557][T17468] OOM killer disabled. [ 311.697202][T17468] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 311.699703][T17468] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x500000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:40 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x5, 0x8dc0) 22:48:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0xa, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:40 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001340)={&(0x7f0000001300)={0x28, 0x3, 0x3, 0x201, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffc, 0x2}}, @NFQA_MARK={0x8, 0x3, 0x1, 0x0, 0x6}]}, 0x28}, 0x1, 0x0, 0x0, 0x44800}, 0x4004055) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) io_setup(0xb, &(0x7f0000000100)=0x0) shutdown(r1, 0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x400000, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001200), 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000001280)=[&(0x7f0000001240)={0x0, 0x0, 0x0, 0x3, 0x800, r3, &(0x7f0000000200)="c55cb2243aa3a905fa0502491c67cec5807889a4e6a69c6ac17a9d24c0c175badcbdf307dbe2c74f792beda8789888ca597e0098114baf6b84953a6340435dd2a1ef99f32088a220a9e43f53713cbb9326b0d541ee242e3f92b13d344ef30ba138c62317eee6831f57180c76ce69243d86e8d45370b7cfc562d3c62adcf5647b5e1b298cd53627b07ee35940163b7f786e9c91e6d466e59fa55e93dd7291dc27d43f97311bcaec7fb4c192d5b9a30cc1ab61c0faee9d78a46bc40d8d443c3c5491e2a38993fdbc274ee446ab49802d35af0bd329c468ff707adaedf57bd6419a19f0f11343583f97d4964fef475d9b65f58078cf99584c53aae6733c306e976d7d5349a38ed0792bbd11fc92fcf8ce665222a1c2f6227307350b1383d85b22848d7ff76e3ee0447a007e77a92500b74e672c9435743d56ff8fdeb87d3ab2fc13e4039ed6a816920c0c284350d7355242fbea6946dba78289e0e24c9b270b625e0fc7be75b37ce4d502773854e7f67ce36318da91fe38989f24e91bdc3f9b486bfaeb6ca2186c3882b9a98490f96c2a3a7bd25edb62c84d37e4a24395146defb5296e9f3e350a47dfb4481c11d0a9130741b35d02d88a908db6b402e718f928d1e0a71cac2959e4f0e0c7d2d2e72c9c69087b60cfdeb89a47efb1396d91395e15fa1621ce867bdbb9618d27b113e9e9780603642cd4efa46ec4071ca97c78a15bb084994ab11d3e2a8d2cbf35899833cb16ccfdb5f4ebf66d9942720c7c0e3dc530238be63604c7f27a7821deca246b5cf4a042667e59bce6136a6e86f2944ec79a2c37bd1cc531ed0b818f64bb9daca391b4e726c6c71a193748e08d7012a3189ead0ea3ea85ac7c8ee22c6802f5d0e2d7996ba41c4fe6a64fa09cf8155db159a05620b674c68811ca12929375c766a1eafa847dedc8d7bc18f40dc4d3573ecc2a15c67f6305e9f71c23f5b4d2d0011665ffb08e63644ada90f27c6b04db4a4ccd64cb4ce85ba9e8a6c22bd1513c36aebab4fb8c64f81e47c3a7f2aec84ca7fa85310736060669192b48f250a911b2cdb18bfcf5356b1a8118f46a9a43f010bdb89d3580f7c16f583056dcd64c89394cbd707f88e729c1aaef9ab90372c5ecc4adba5690b3b1124552dfedbc8caa44edd1034c4f4f367442cd686e9db50bbf844de6b486bebef1907c635ab6e38ef9444713fcd0166919dbd47fbebfd3530a29f6da5776f63ff3d82b34dadc863f79f53a407004c55d8ce188a16604c4247a5d62ce08a98560cae724c749c1f9cdab1985358b94f3cac517f0828fcd4671da4aa488d12c937fd4e4e55c44e4fa269a3ab6935ba226e68fc9d968be1dbf342f11dd2475630a473a4d52c946646280bfad65a8f6ca8481fbced2c19f6a6c99a8319a265713f99c7bd7f04837ec1bf28723cde40d6afe533e4dbc6edd06bd98c6db3c51ca31007d4bcfca35053b4356f7527115a00d0a874f250d323ef4cf745a19f4da1da8e1cb19a271c16da12f0e2ff5400d8a34494ef901f78c4d7ff5eac03f03f2d2d3ca2bf0d6cff41982869e83c588b1128875622cb697980cd62e84e9aac9e15daded5593a60893b44758061e21f6f48f4c61edad8c1a9e4057ebc404aa18c527a6098d50065aaa80302930816efda43587024146dd52934d3c5648944646bcf3a85a25b7d1997fe74b6af2146bff8caf98f4ae990c2dc5eab4f79d3e39e7c4364627d2631dac06d1c112901706aa48c891b3f1ed89edeec25cc214da6004855e6a900c92c5e064551431d33a922b1ea344dbd15894ccfe0d0a435abfb13893637170e84b5a71b223b0d7bfae2cdbecdf2d964b57dbc146a009178ea3c5b63c618869b46ff5e838048f31062214ceef6781a1ff13dc49637035edd709b4274844903bb368244ae9dcf690a7b872cbffe8073ee5ad08ca3a8f5c72975c3b63bd310949e5bb5c0c736e585f67d1a71b486944d6afff8341c296270c45cacbdc4c8443fe7432ff6c085acc0230b1d5ae651477dd7dd01d6ec847353ce8b4ce55b22af345f4d1c341ac4930ca508ddb5a428d0a1174018c50573fba9e741b0b465603a5d7e786c54108a170f37193787a57c9fca3b3b3ecbf120b95e68dee79d5b2f14df17dd9125137b0bb296d2e5f958f1a5135552483486f319b860c1edf1bfd4b37c4b0b53df011e30730de94754494368957ffb225c230cfe3e506d08c505050ea75d098a9a507ab038ad63c086dad06e50a648241b787a37128d937bd3b2503601d1dd70425814f8c2874fad69834b342e47901249328f09a8f5783f4c39631e88489b4773dd075d2b36ae9cd5103cb3b91980bc98f4b683ecdba81c68138f14a10f0527044af63c6353b3a0bd96681cd91f7762a8bba874fb7c26fb4c78038dfa2cd539f12884aced4bfae3d7f673aa05671aa695c4d8378b5b4fa56bcb7f07a5fa51a091f059e98c1bd9612ffd6a265938573a163815f8d35f81bac3ea1fed289f3ba0e96404334c568fcec1e0a3af48e385b2ca59e730604bdb4751c89377476ed27bd0330bb9c8d9a781d6cca953fe55ebde303dbc5daa46f177b3a7ada5d5bba1d5e2b94f1e273fd0d7bd418e104dc625a859867636d186536408dcc1797f19d2a62a60c9cd544636b63dbdf6adf3276b1a302328c93e6e726336afba5232b2fd472d7b6d8c7593e835ee1a3c4c834dc6576bddeda8c60562fa00ab28c34ef018ef30193da9944f0cf50b6e8ba934923cd9cd4b5e5519d3ef062531df6bd80f91cc01367b118f76f343ab4af8777c54fd61ed9a1e5bd6530fb11fab171848612ceb7dccaa6e3e0875b169f26fcc72a5e285ccbb52cabdd8c89725e8419a1dac685e0aabe4e61bde6cec9115219dc50591128d7de767f1d7a36519e49fe7fe960fc9cd8efcf3d5691990eb8a99349e87879771543ea5910a9a6be736f706d276c23feeba44cb94b37e791d303767e110fa7dd713629d8706277e22ec666d382b675abbd48228ddb46c5cccfa71e4ded162073d2d8a822e16243866027162f90e8b4a2b4e539bd717a5c6ac7a085fd22dd5597a2a79abece2acad4af318d3998cc850a7d69e164629c5f9d4d119896997243457ba50403727cad0a76ba49d8b02127f21d24410dc6981588960660da37811eafe80401406f7a63f8d1e5980c017ac613ef4f7499274efe4c15c6ed031d91db5e024409739e624ddc4f90700db77ccf6d0b2f7c62e6189762d8e052ab9851f0109a320d05242d9a96494a32bba9a4f923b122ac4a3fcbb7b6b9d9ea55f193c958ea5c6885f151e756c6a824f2ee0381987cb4dbac16a7bca69416d503f29a0e877f4b3281b266e32533d1d60072cb1d3d1db46bef406c4e95ed68bbf50cdde21b4a304f264b90bbe155071c953a14d423a38d7436bd5a7faf50f667fc8d4dcbb77e7ac0dd2c88f696e5a2fee0b7403b802b94890ebbdba69fed91356a9cf3521d71e1d7faca99dcec6965a88a34c3d4e952187a4967dddf89e9e1997c4e62c52a24a9b728f5eccb80843c2a8b0a0bf4f666c1cb5b7ff2d9449b95aecde867f084f2c9dbd4f057ee09ffa1fbdd04ac84ddf2ddde4d646db204c50924ba318418a322f18119a0d67aeb80cf9dd2a4b41104784b4a057458684f46d1c2f80b80c3d3c596df117b3addb2682b5d7067c04ba623913f480c4d67867dc36f4e5116604d4ea95fb938a0191b2aaeb7afc9777ab845cdacf0678030f5784cae265a83f4f51b9333886a77beecdfebe8a455087abb0a196ea6b7e59e748be950050db38be9678ee785df6419f31fc0638e69b14cb75bca340b15131ac99a5c200ff05e1dacb7546cf97032bdd5655365b720119e0f66946eb2408f65ac9487b295a05437a7c1fa3b5cabab6440b100102a6402057a0f5d6729a25257932009394d6960a2969d01809a864ac7887629ce46996d726deed42e3e714ff43c1a9838944f48f10082f6e050c9117729be0fe2d4dc597636c864ff47b1b65f11f1e0aad454c364fa087a8cb97fd8513935deddc372d294b222393007607987f278552e7b02421e4deb2c05ddab5a2ab617edd027ca20836c7cca0b46d1cf02f2fb7c595000ba8815ea53d3d11d0217793fab0858cb53a7a517c8de7253212e77c5ca40d9371f616517729f60f79f3c651cafdb3e088e4c089e423afe2c9c0aae0af5c456297738cc028e4be772f8394d9b705c92db0e9c3b612244ad66bfc8ab3d20487195022ce940b5bbba42fc70bbb4b01ceca97478da353630f8b62b5bb53618fc9e7830b983f4cf3b93b298e93c361eeaf18da4e1cd2a270f3b752ceab41aac936b39ec8be34fc5cef8d74e3b5ea1c3226c5824324318fc3f482ea99a610a588b3037a1839ae0808df4347d36e44d1c6cb5df49b9cbbcd4d60cac581deccee3acc62a6257867bfd0e205e4e828793733233278620102ac97a694b5e5ef0c03ba802abe3c4a65dfde4ac1d4cba83c2994ffe0512be01603558482a85515d4b01a314d88e266c3cf7d959ad31d496a3233ba89983c684f657bbacad5f26b9288cfd2d5569db9bb1fefb729e46b7345cc1a58dcea4307e9aaf7eb367a3eeb29a4997b716cf03b8ce94aaae2424aba89625c59e7a10bd3703af5b739fe170fba405b529a0355edf681dbb105dd01e7b769aa66550c4e7154e29db50a7cc628499572eda50aa51982297207f6e33014f087f64b47cd8fcf178be780e873dfbcfe55358c3c08fcbf43e5359ebf393e94c611b82ef333d1b93f847a92f478b1157ee8769d51582df56cd3c6e5c5673e193169c2945339cd0455aa93b806f538a9d20cb08817c1886a2070b1a437ac3871dffa210845b22198c0b5c4596627c5dac646c6da4c1690dc67bedefd7207bbe873c28c515e76c4049a66dff39d235234debd29e3debb8d0b1b0fb356707d8163da6f8b3c84dd8d55866bc45cd42a139b3b0b612a64757b91bd16d809bb57f1c2d5da3a1620abd751b80ac07fed0539c7172d7fffdbddb75d5aaa20f5312db468dab8044beb8ed3dfd22a21be7ac677e28703af1d0dc8891e9a499104e49e11afdf4f5ea09e8ece6b2bb6644873f36de3f7050f0fab7a9c13da73378bb0bf7f8af80024002383969012a6e4c10164e4820645db9fa1fedc1106333da5bc830c84776d878f67af64f0a7ddc77e3894028fb40a9076332bf80200b28a213cfabb12c60423860a5ae5c9e9f475449ed152492758ad34825debdf90c985079149860abc8d0214ded7a35ca9b51f99b303e678d6ae8eef0783ef3bc47b48d5d8855bcb7c11e06c5c40bc9fb7b2a6580c565c8d7784efa5fab127e32554a696219fc24fb4c00b417b906581a502ab5aa2107dc682f00b77af0312ab1125a06b42fa5e94095ad7f9880845f6c2c664ebdb338956e19a9ad99279388eefb1d15ba2e649cdbea15c8c0740c072b98224c78f13793b5478cac00d8eca5b447661569acebdf756536ef6b0a74e1c4ec03a6179c7cf39cb5352ce1379719d21ee57fa9e035c9bfbb0bc309bf07030f3a3e8482282ab4619ea4b3c8a1cc8f72a29e5ce6168b90307aa45e843b2fb1f9de83372950ca7b9680b806f8f071a29bf2f83347dcd76185adf77a07854072b540b6c8970525f04e3232a636d0cdd0020609ae500f12d17d2a942e228d48844d668235fdb013f2dc83c99f82de4baed107966edf434c82c77989d25681c49f898f9ae1cbde77a98967baa47581c6cdd3073f01d625e08e1890f4159fe6317ad01e1193d8e953f2d51234eb6b515036106861cd5595c9763b", 0x1000, 0x80, 0x0, 0x2, r4}]) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r5, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) ioctl$F2FS_IOC_GET_PIN_FILE(r5, 0x8004f50e, &(0x7f0000000040)) 22:48:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x600000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 311.830011][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 312.336520][T17468] ACPI: Preparing to enter system sleep state S3 [ 312.336681][T17468] PM: Saving platform NVS memory [ 312.336686][T17468] Disabling non-boot CPUs ... [ 312.339675][T17468] smpboot: CPU 1 is now offline [ 312.342322][T17468] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 312.342385][T17468] ACPI: Low-level resume complete [ 312.342461][T17468] PM: Restoring platform NVS memory [ 312.342471][T17468] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 312.352371][T17468] Enabling non-boot CPUs ... [ 312.352538][T17468] x86: Booting SMP configuration: [ 312.352542][T17468] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 312.352772][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 312.353644][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 312.355023][T17468] CPU1 is up [ 312.355242][T17468] ACPI: Waking up from system sleep state S3 [ 312.576725][T17468] OOM killer enabled. [ 312.577364][T17468] Restarting tasks ... done. [ 312.599219][T17468] PM: suspend exit 22:48:40 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10010}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/class/spi_host', 0x2, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x1032, 0xffffffffffffffff, 0x64952000) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000500)={'wlan1\x00', 0x0}) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000002ec0)=0x8) recvmmsg(r1, &(0x7f0000002d40)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001840)=[{&(0x7f00000001c0)=""/249, 0xf9}, {&(0x7f0000000680)=""/17, 0x11}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/206, 0xce}, {&(0x7f00000017c0)=""/108, 0x6c}], 0x5, &(0x7f00000018c0)=""/144, 0x90}, 0x32883fd2}, {{0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/248, 0xf8}, {&(0x7f0000002a80)=""/86, 0x56}, {&(0x7f0000002b00)=""/251, 0xfb}], 0x4, &(0x7f0000002c40)=""/242, 0xf2}, 0xbe61}], 0x2, 0x2, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f0000002e80)={&(0x7f0000002dc0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000002e40)={&(0x7f0000002e00)=ANY=[@ANYBLOB="bf4f0000", @ANYRES16=r2, @ANYBLOB="10002dbd7000fcdbdf2501000000080001004400000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900010000004b000000"], 0x30}, 0x1, 0x0, 0x0, 0x6000010}, 0xc4) sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="fb4300000000000000000500000008000300", @ANYRES32=r3, @ANYBLOB], 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000340)={0x310, 0x0, 0x1, 0x70bd2b, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x80000001, 0x47}}}}, [@NL80211_ATTR_IE={0x8a, 0x2a, [@fast_bss_trans={0x37, 0x81, {0x9, 0x2, "443c740d2ee63ae5428c14d2aa8e1fad", "0b25d4ae55b6c4078d1e3da2a5a98975e02711a02a1ba90271f6c51ced81c5de", "609266cf316b0a7ac11466beb4e3bd5a7ef2b884f84e03644504f01d062aea1f", [{0x4, 0x16, "6f06ee5d8a5cc9e2151b916d4b00b41d3647657fa43b"}, {0x4, 0x15, "f0e3846905d05a900a08bbd4528103e2cee761d835"}]}}, @sec_chan_ofs={0x3e, 0x1, 0xf8}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x2f}, @NL80211_ATTR_IE={0x68, 0x2a, [@rann={0x7e, 0x15, {{0x1, 0x8}, 0x9, 0x8, @device_b, 0x7, 0x6, 0x8}}, @dsss={0x3, 0x1, 0xb0}, @random={0x7, 0x48, "4c756e08a2955ee7dc0bcda1d749af308e37be3756634208129eab617e9aea9efb1ede7b5d62eae2c64886ffabda5e8e4c3d2ab18bfe268eae10f57bf4f3aefccebb7606169248b8"}]}, @NL80211_ATTR_IE={0x1b8, 0x2a, [@link_id={0x65, 0x12, {@from_mac=@device_b}}, @perr={0x84, 0x55, {0x4, 0x5, [@not_ext={{}, @device_b, 0x7, "", 0x3b}, @ext={{}, @device_b, 0x7, @device_a, 0x2f}, @ext={{}, @broadcast, 0x2}, @ext={{}, @device_a, 0x1, @broadcast, 0x1f}, @not_ext={{}, @broadcast, 0xfffff801, "", 0x32}]}}, @erp={0x2a, 0x1, {0x1, 0x1, 0x1}}, @fast_bss_trans={0x37, 0x8b, {0x5, 0x2, "b5677c6af18a00234691ea68d0bf9d48", "7871a9f35bc4fa5ab1324256efc1ae6b531d3a9133076f942182f3b13e92613c", "b28ae17d4c79605f76e4b28b3d7dc6a2f06a149849066899ef113a9cb2bef09a", [{0x1, 0x10, "831035f20247d2e5e436ee525c62fc9b"}, {0x4, 0x25, "b0c9229cb11bf747ccf545d6f6761460ea3050e76a56ee6fdcfefbb6f861362fe0b3ca6720"}]}}, @random={0x6, 0x68, "629f76a03d69e9090a81b504b7bb66517b21f4974df11f0cdb6f8b604f652e7885ea6aca51b952e9c14e9d2f1c6a09676835bf83ca239dab6a39ff93cb55b02a8db93112a99b1e216851e0e109baff3d8f2a1b07fcec753e4c02a373d2fba2c2f341ec4f81ac4987"}, @ht={0x2d, 0x1a, {0x10, 0x2, 0x0, 0x0, {0x9, 0xff, 0x0, 0x2, 0x0, 0x1, 0x1, 0x3, 0x1}, 0x8, 0x15}}, @ht={0x2d, 0x1a, {0x80, 0x2, 0x3, 0x0, {0x6, 0x28, 0x0, 0x381, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x1, 0x2dc, 0x16}}, @rann={0x7e, 0x15, {{0x1, 0x2}, 0xe8, 0x2, @device_a, 0x52fd, 0xfff, 0xffff}}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x53}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x39}]}, 0x310}, 0x1, 0x0, 0x0, 0x8811}, 0x4044001) [ 312.639349][T17461] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 312.640882][T17461] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000d8435515 22:48:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x9, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x700000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 312.690823][T17487] PM: suspend entry (deep) [ 312.699762][T17487] Filesystems sync: 0.007 seconds [ 312.706148][T17487] Freezing user space processes ... (elapsed 0.015 seconds) done. [ 312.722938][T17487] OOM killer disabled. [ 312.723522][T17487] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 312.726335][T17487] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:41 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x8, 0x8dc0) 22:48:41 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0xffe9, 0x8dc0) 22:48:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x800000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 313.021327][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 313.517268][T17487] ACPI: Preparing to enter system sleep state S3 [ 313.517396][T17487] PM: Saving platform NVS memory [ 313.517401][T17487] Disabling non-boot CPUs ... [ 313.520815][T17487] smpboot: CPU 1 is now offline [ 313.523701][T17487] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 313.523765][T17487] ACPI: Low-level resume complete [ 313.523842][T17487] PM: Restoring platform NVS memory [ 313.523851][T17487] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 313.533973][T17487] Enabling non-boot CPUs ... [ 313.534216][T17487] x86: Booting SMP configuration: [ 313.534219][T17487] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 313.534428][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 313.535459][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 313.536671][T17487] CPU1 is up [ 313.536906][T17487] ACPI: Waking up from system sleep state S3 [ 313.649209][T17487] OOM killer enabled. [ 313.649853][T17487] Restarting tasks ... [ 313.654257][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 313.656584][ T1034] block loop5: uevent: failed to send synthetic uevent [ 313.666656][T17487] done. [ 313.667281][T17487] PM: suspend exit 22:48:41 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0xffeb, 0x8dc0) 22:48:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xa00000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 313.702019][T17481] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 313.703523][T17481] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000a697ea26 22:48:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0xa, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 313.782233][T17481] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 313.783929][T17481] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000a697ea26 22:48:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0xb, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:41 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x20000042, 0x8dc0) 22:48:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xa1414ac00000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:41 executing program 3: r0 = perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001080)={0x5, 0x80, 0x45, 0x5, 0x0, 0x88, 0x0, 0x6, 0x4, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xfffff26c, 0x1, @perf_bp={&(0x7f0000001040), 0x6}, 0x24, 0x10000, 0x5, 0x4, 0xff, 0x1000, 0x4468, 0x0, 0x9, 0x0, 0x200}, 0xffffffffffffffff, 0xc, r0, 0x0) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r2 = openat2(0xffffffffffffff9c, &(0x7f0000001f80)='./file0\x00', &(0x7f0000000000)={0x1a9dc2}, 0x18) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000a, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r2, r3, &(0x7f0000000040)=0xffffffff, 0x1ff) writev(r2, &(0x7f00000014c0)=[{&(0x7f0000000080)="b8", 0x1}, {&(0x7f0000001640)="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", 0x140}, {&(0x7f0000000140)="f0f94bea9cc2033ba9e51efd4a2670ebb40fb2631faf85c202c2baa2f21e4bf41bda1953e3c6942d4f3157d2de52db3be7a8efaea480ad0fa051540ce3073e887894e8c4588b053ef0a2303749947ca87f18c8e84797cdce99a6dd290b9de24dc5dcf0757eb5f3bd0f6c5fac900b74372ad6903bba5cb297f877f6a4630da7341da99e23460e503a21b57096e7016cd7eacc95d07e318800db754ff7916bf0fc71632458597a9e4a0e9e7346b3aaae9cbf810a650b01ae6efa3becc5efc8be84c47ff90e937894a2efeb27b0387e89d785333c06d749b95a8b2331b8ec4b859c33f8a804b21f76c6652650c3dc11d8c3e848239e2086fe6a39b00d931a08ec00c692805051d8b56f7912245c349eb08d0287d48b82cf3be99b8103f5f4055978e128204159bf26fb69476f2c82e066d581057cbd884b9bf7bcf6ec1fd7c4f8b8b2be3416fb6ab78b91bd21845b3bb74e873f86eb588727d19744423b212e14264996878fc6a893eb4c6917067827a5dc968089ae5e99f6714fa58cc4aac7de69f72b7acffc9abb1b76f0d06feffcc51e660280c709db8bbca37ca061d38449a79beec16f8bed21a2a0e7174ac7befd246e163bf701956696fc189c35be486c081ca4fa37c520d84fc5394325282d93125c71cec21e184de97a34c4d10fd7ba7486ac4a302e6caef07139a8592805cc976223aaf5e3e12053ce189bc368e0bb436ec854f9777adb0152964dca7cc67105b6d9b8750e14c2f67b94145a870fff1a244ee46350d0932cbeab4e17c5884a5e54e9489d90d3c8562d7801495f9dec282f8f831a5b3540857b148993f4beba32820de89c1b714e05f957a837d54e11a848d32a23ad5cc2d1b6b6428d62921ac935fbf9a73f4c6a95ae060b0925c41cc1b6afd46c74f3c646a3a6776b178603c512e7da1e4fa9a95c6ccafdb3762e843db24fc7d8530e1a7b5fd4b4eaf54f2cc8c064d6090658bcba497e1023e7aa0bc2005f8cbaadf45376035bc52c40338096deaddfb49477b8d1c7bcdda732d062b0bbfa9515d16e526f9feacaacd37baea4411c7dc862b66c8966c1303ac519013efa877c0470822c2ff1425e4e6d177c7ac4782e60fa26e9d63d3e5c3c933a4b3685b0e74beea3b6b1e2a3454dd910e6844e6055bbac0a2b1f50ef633b634a247e56fdedfabc07992d7d7e3cdd5a3760d571522da4a15a9f793588a8a39be1be80c4025d3975d1e1c7181eb3ddd686db13301d5eacf2e9465d52baab3692bb0afbf1553d52666647d4dd1e338eea8c9a9dc7326d5cb810eb833d8fc54e300f3eb68446fdd68907353b198d4f59ef2e7d0c7c393a20607ae0b1c0a20fd6190975755e48f49db19a4408246085894a8d86a2438a0eeb53a466a21b90206ff41f9c77c2587cdb4f4f932fc2972bcda3f7eec8b33bc19ef05c2bf6eb3f4b9d301c234a92038b08b583580d717e0cf7f9c23d7054357f7d99d61828488e771d97da1f981fbeaff481d275af108164846a264ca7a7547205633c8c31e5a775552593856d31999183275bfa9d58f8488c402fe187a200f2d0dcdd5a67461841a4be167bce9ec64ba51e7c5bf1108353246a0de6755a7c786c4e37c75c5c2d793becd5a100621480ae7d86150408a1d270bedd1a5ee539f3ce262fbc754cdf67922bd6b5c92c4a4cc892f8956697c623b90dea42c0c46ce21948d80c2e92c2c525a700d7c5dfa75de87d234b9767022f716833d3aa7158ef34e91c30f20f306aab4e664e3c5217f782de1aeb094893fc37f6f8e5af5e9c77cb85f8acfff9bf4ba2fc2834a1187b1414ac0ad88acaa02941ec5ce4e4af690d9261713ea28c82a1f3a105853ecfe1ef2c72ec4c1c840dbbb8511771fd45fe73436c39a43d6ced289654ccd707a13c694474b6ab2b1cb05348d1d438c689af61f33994e4605e88330da5416edb0f1e056252090c4ca9a567afbc3a903f47cd2646cb085399306cc0e65eb6436c2642c8660f05e9a900a17a524bd35af061b7cf2db8a9a666f36cdc35bbe35c705bd234afd5bf5d3af388bcc1ca8cac261c5aeeee233172cbee3f6abf9bcc6b06c322a658ea299f254d469f9bab831407e23e5450d1c3809e511338c22d722fc400afab569a31f00d1143be5437e804166ebf74af93c99d28990ee12c4734af69f55c7301d3ba33c58d49183ad17934b1db529b748f8dbc982cd976434a62d2432ca407be2ca57a6203120beb8128a7c8c8ddcc43d1d98f68aca47dafd7ed8e3356c2dac293ff6866d597bbcb8e43958a4363da5aa09fac976b674d8364f41ecbca15b7177792a156de6a802cd0e2b1c3118e9c9e396b3155da21c3fe89dbd3affef6c1a81941b7631a94f12b0dab5debc198482ca29b36cf5076f69fe6d1408c89f23bf788b246fe5e3cf91c659c6bfe714ea3108c3027a352352d7ad7455a4aed68000d6a7f23824f4263d5cc8142c5833b8ef58fb186fb52c6818c714d83771b62ecd1d6e7c7893f2383f79f47d014fef37ed18557a63cec78d6e92becb23160bb8806a8292f34efbcc8ef1689f573d6d875bbd9dfe9c587536ec03aa83f1458383b1897da24249a5b4bde761e0c449b1cd8f0db5c9889936dbd5a52cf64f9e0bf60aa5ebde2d8fba8db73a8bc9cedd0ce8e60bb3fff6226203ab8f4c2e5ad05587787647929763795a93ae049d9ce34d7a71988b5342ed87f5e2231552081a401bb0e8b8587b56295d91415fbd919ae713a2de1bd7f2351432b46f7e4b3fe282addbce24ec7527fa4bec7731e98ca3beae6748c6d13a487924a9e5ed3787a1c76b1f61a997dd149b9e5e9b56885a11713afcc16be1853ef0f28c28b10ee68084ca29dfa795b869ccc18cc60cb3de42feb8fa57a7d4dbbf61c593edbfbb82ce733a35390e2919ac5a93aa075d713cf8c4fa9ab381bf51e745a7b63bc8190b9967d3060e47904360b27ee1a434faf2152ad880cdc18797537d21e7950a5e30df346737321cb69a9cc51c2f44257e5d3b8556ff473fbe57be6ddd423a85726924943d0611bef058dab3f5a0c322874c000a1cd071421115650add8f49cb38c06733b96d4be03183740e46bdf4ad81de95f70448ce71aed3459df45b102a42e30db8934ce2d4a2454bb0d0fb98a8d6ef76203857d5c8fe533bacd2723bc92e962dff3015d062ec3f10f07be1a8110978a09b815ea624bee57f20cb86fc588188398d8bcc80ecd2233e8e13a366ee9fcaf01507844393048acfc936cff9ea057c7d76ae21858c17bacf7ef38bfdb46fa2a7b8b442f84b786e3cff32412e6d02200388c5d142a5b9d4460d82f48e5fe4714f52472c0116a7457fc8db45f67c7c6cb843f7e5ff4a4a2b999bac9bdc121bae1017218f9cac8085622a23aeee1f588468e415c171da330d537afccebac9dcbfc6abffeaa4104b58de01aff95b4713ccdf93bba65e23945acb19c8c4f12a9f727224b2c7130578caba5fd3ebdafafd2fea8c01ba24acaf2e9dd3553ed6e9f92ffff69eaf00e2dac4b75f6c5037c6f3a734fda8beaf786051dc86307086c96611e3a860c8a133b5c9b716d2af06fa2913b8bc4c7a170ea0151eccc20ce6a9ea1c7f5d3069e858df173761327321a21e724dade0d5b930183c750bb5bdf1d366a93b2bdde6e856b65023e428d979354c116a12c815ec90188cf9db5ddd97a6c723914e75973d343af8d54899abb59d3664f6197c16c396df01123155a142ba5acf5b613e4f9dc425f98d5f3f9a4b9794ea114a4c6a8dc5c62cdff5c43b0c6f4c5149638ec943213c1a42fb312896c3d56617a9a1fe223453ac0b5cf3443e564928e7a8248967e5bae7c7fcf15dcf4f5b7eb6e95bf4e3c9a0159fc68f2811495828b5317b48f9e2f45d9c6b258fb459431dc42cfca05df13ba588ad002f72bf0303b151de19f0b09dc56caa057a4bbf89cd45ad05acb8d2b739c80dc4c74c98d8bf1acd051afbb5e1f5b30327e237299cf7c5129a134e8aae2ad8085ccb2bf88194a285f5c6aea78343e9478de187207984986b41be59d485d740afd5c0fa72adecacfb717e4a9b7597bdb5524a26193ef0a12d0af6741f576976e8fbf09a4558368a0dadcfb9d8119eda58f14f8b5826d835f992c3dbb58ee57870eb3d5ebb4a4c92c59d44a60623f32c1236e2a80e8f5fda1f44d17f0d057227c5ffcf887b3514c86ec5b314d979d374d692f9c0aab2f16cdf9e23c3a20144837498dd6feaed7b85d868f891645f023fb3756d3769ddc11ccaf2fd232cf057d88929d059811919b9c41790b0994a19b738a66b76868bd2a76cf82c3d950b58ef256ef6a4eb220be2086418b221ad7189abe9afc249b8b34b1c7739b79ae47fc90841fecc20598cee63b19af6195f557a346884821fafc6924b34953f0f096fca29c804aaed325d2d0923f2e21f9e4cfe234edccb239656a8f975887ceab084648fc238e41025ae4dd196f35f43269edaa96c1d92b8c7a5e46ae356ffc20496aa8006f322e1f151f413e08b1a9205b2d9915a5462aadcb46f6aeb79d4ce931dde89efce996f32209e5fa68205a9f5eacac171b55ccee03b2e34858949f3ea9c04ca77e5a42b6a0e52ab2f3bf7e9ab8ea3c31ee47504c50ec5d232f6be57913f07f3fe81cc83cb1724ab94462e5f47334319b1c0942ef720b36bb249c514455566aa8cd4b1bfbf738acbe65001f87cd345e0833e45f059e8f54dfd57e252373d4818c3faf91a627de4c665611cbbf880daee97f6581f4e1db9db040f8c31cee8027a53eb439523511860553555ccc47619dfa403b434aa780a32b5dcc5a949664ab2fa9b7593e2a123ae04614e6ed063978c61f9627107fab0e7f4e57e0d6dfea727648816244d6a2bda21820e8315fdee28719e139c7699cd35d24a5fa0695652bf6254c7009789afd0e926055a5650d330c405d7c85fe35da9561a915d036cc3b6b21bfab4f56a38cbf43f616b92b4e5060a033ddaf3a007e56efae176df140f8ef06dafbf5167c45316e8fcd25acd413ed696804be3a526797d034333d16f0942d94a3bd943bf9f891ed7134ee7ba3c09a44d7f64a12c5318ffaa02133d0047eebde319337befb15e369ebc316476f0bd760b64c6eb8f38e7c3989e0d03c11a04bee1876138f7d1c17bc4a8d64b8610a8d5ca71cf77cace109c82ca6115a39b88c648eee6409c707e4b680e731ad3023462bcd53e572dcd9ad7cbfc32dea97bd98b3e29bc0de65e7282eb0edd52e8330fbbf6a7c5fadfa5607f508117e2e017a62d1c7b45f9a3a2e128b459edfd6789a18c3d786d67307315696610c5eebad0a579a8160d76adc4e49ca56dc7fbde062fd454c4c25ae9d51", 0xec1}, {0x0, 0x8}, {&(0x7f0000002fc0)='R', 0x1}], 0x5) write$sndseq(r1, &(0x7f00000001c0)=[{0xe3, 0x22, 0x0, 0x20, @time={0x6, 0x7}, {0x2d, 0x77}, {0xff}, @note={0x3, 0x3, 0x2c, 0x9, 0x8}}, {0x4, 0x9, 0xfc, 0x1, @tick, {0x6d, 0x50}, {0x8, 0x1}, @connect={{0x6, 0x1}, {0x9}}}, {0x0, 0x4, 0x9, 0x9, @time={0x1, 0x40}, {0x20, 0x8}, {0x7f, 0x4}, @time=@time={0x7fffffff, 0x80}}, {0x81, 0x5, 0xe, 0x5, @time={0x5, 0xfa0b}, {0x9, 0x78}, {0x1, 0x2}, @ext={0xdc, &(0x7f00000000c0)="5cd6a5345775c241d818e985c4c569d5b96c9f1d7bada44846fe04e53f3573b3f993312d8da7f56126de2feec0272e0afdb832b0acffb06fd2e3d2a30de6988df39841c0cbf61c91da762369376d6e683a564db7e491629e519379322664055f2a5e04386cec39eeb806e8897800344cb9e14ab167986b9ea033ec998f962df24e9b56d1caddaddb5abd099fe9bb398dbcd9c90aa0aaa2fdf53320076eb184219836d18e7234aa4474bfd0f03cb7990fd08d60dd37749e9f300538adea7b2213cd92b0e5d47df8f3c86033566316908367ac63ecaf66b7ec11861861"}}, {0x20, 0x81, 0x5, 0xa2, @tick=0x4, {0x0, 0xeb}, {0x8, 0x3}, @raw32={[0x0, 0x7, 0xd1a]}}, {0x8, 0xa4, 0x7f, 0x9, @time={0x75, 0x4}, {0x6, 0x1}, {0x5a, 0x7}, @control={0x2, 0x9, 0xfffffff7}}, {0x3, 0x3f, 0x7, 0x8, @tick=0x4, {0x20, 0xe8}, {0x7f, 0x9}, @connect={{0x9a, 0x81}, {0xa1, 0x9}}}], 0xc4) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 22:48:41 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) recvmmsg(r0, &(0x7f0000002fc0)=[{{&(0x7f00000001c0)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000001700)=[{&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/169, 0xa9}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/232, 0xe8}], 0x4, &(0x7f0000001740)=""/110, 0x6e}, 0xff}, {{&(0x7f00000017c0)=@phonet, 0x80, &(0x7f0000001880)=[{&(0x7f0000001840)=""/10, 0xa}], 0x1}, 0x7fffffff}, {{&(0x7f00000018c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001940)=""/206, 0xce}], 0x1, &(0x7f0000001a80)=""/101, 0x65}, 0x8}, {{0x0, 0x0, &(0x7f0000002ec0), 0x0, &(0x7f0000002f40)=""/77, 0x4d}, 0x8}], 0x4, 0x103, 0xfffffffffffffffd) ioctl$FIONCLEX(r3, 0x5450) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r4, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendmsg$nl_generic(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f00000030c0)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="838e7d939ad8fa25eb5348a9ad25de3e251a785db9ade1ad7abedc1be0827cfdf1bb953ce3434fb70424e8c098ec078905af491064b91e2c1340ede87e08007400cb9a2cc226d0a7059c7bd3ec08b9b4d31606fa062664eba912a0509aefc41e33e3ca0cbc0403fe85414343be577cb53400000000000000005ffacc4112ad47d0e6208f546eff493148d9623a65fc1c3dafd711c16754a161fd012459383089275cb6716c0f28dbdeff064a742d0e521d5adfb26dab01", @ANYRES32=r4, @ANYBLOB='\x00\x00'], 0x17c}, 0x1, 0x0, 0x0, 0x8010}, 0x4010) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:41 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x20000082, 0x8dc0) 22:48:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0xb, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xb00000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 313.914451][T17541] PM: suspend entry (deep) [ 313.924809][T17541] Filesystems sync: 0.009 seconds [ 313.926300][T17541] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 313.929227][T17541] OOM killer disabled. [ 313.930058][T17541] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 313.933184][T17541] printk: Suspending console(s) (use no_console_suspend to debug) [ 314.053937][T12851] ================================================================== [ 314.053957][T12851] BUG: KCSAN: data-race in __ps2_command / ps2_handle_response [ 314.053973][T12851] [ 314.053975][T12851] write to 0xffff888105ef0050 of 8 bytes by interrupt on cpu 0: [ 314.053985][T12851] ps2_handle_response+0x98/0x140 [ 314.053997][T12851] psmouse_interrupt+0x6d4/0x930 [ 314.054009][T12851] serio_interrupt+0x5d/0xe0 [ 314.054020][T12851] i8042_interrupt+0x39e/0x720 [ 314.054030][T12851] __handle_irq_event_percpu+0x93/0x3f0 [ 314.054043][T12851] handle_irq_event+0xb0/0x160 [ 314.054052][T12851] handle_edge_irq+0x17e/0x600 [ 314.054065][T12851] __common_interrupt+0x38/0xb0 [ 314.054101][T12851] common_interrupt+0x73/0x90 [ 314.054115][T12851] asm_common_interrupt+0x1e/0x40 [ 314.054128][T12851] acpi_idle_enter+0x25b/0x2e0 [ 314.054143][T12851] cpuidle_enter_state+0x2b6/0x750 [ 314.054152][T12851] cpuidle_enter+0x3c/0x60 [ 314.054160][T12851] do_idle+0x1a3/0x240 [ 314.054172][T12851] cpu_startup_entry+0x15/0x20 [ 314.054182][T12851] rest_init+0xc9/0xd0 [ 314.054190][T12851] arch_call_rest_init+0xa/0xb [ 314.054203][T12851] start_kernel+0x59e/0x623 [ 314.054214][T12851] secondary_startup_64_no_verify+0xb0/0xbb [ 314.054226][T12851] [ 314.054229][T12851] read to 0xffff888105ef0050 of 8 bytes by task 12851 on cpu 1: [ 314.054237][T12851] __ps2_command+0x411/0xa40 [ 314.054248][T12851] ps2_command+0x51/0x90 [ 314.054258][T12851] alps_rpt_cmd+0x122/0x140 [ 314.054270][T12851] alps_identify+0x104/0x1770 [ 314.054281][T12851] alps_detect+0x2d/0x220 [ 314.054293][T12851] psmouse_extensions+0xda8/0x1790 [ 314.054303][T12851] __psmouse_reconnect+0x31e/0x620 [ 314.054315][T12851] psmouse_reconnect+0x13/0x20 [ 314.054326][T12851] serio_handle_event+0x6be/0xc20 [ 314.054336][T12851] process_one_work+0x3e9/0x8f0 [ 314.054348][T12851] worker_thread+0x636/0xae0 [ 314.054360][T12851] kthread+0x1d0/0x1f0 [ 314.054369][T12851] ret_from_fork+0x1f/0x30 [ 314.054378][T12851] [ 314.054380][T12851] value changed: 0x0000000000000006 -> 0x0000000000000000 [ 314.054386][T12851] [ 314.054387][T12851] Reported by Kernel Concurrency Sanitizer on: [ 314.054392][T12851] CPU: 1 PID: 12851 Comm: kworker/1:5 Not tainted 5.13.0-rc7-syzkaller #0 [ 314.054403][T12851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.054411][T12851] Workqueue: events_long serio_handle_event [ 314.054423][T12851] ================================================================== [ 314.302968][ T2685] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 314.797415][T17541] ACPI: Preparing to enter system sleep state S3 [ 314.797544][T17541] PM: Saving platform NVS memory [ 314.797549][T17541] Disabling non-boot CPUs ... [ 314.800762][T17541] smpboot: CPU 1 is now offline [ 314.803525][T17541] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 314.803589][T17541] ACPI: Low-level resume complete 22:48:42 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x7ffff000, 0x8dc0) 22:48:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0xc, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 314.803748][T17541] PM: Restoring platform NVS memory [ 314.803758][T17541] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 314.814373][T17541] Enabling non-boot CPUs ... [ 314.814508][T17541] x86: Booting SMP configuration: [ 314.814512][T17541] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 314.814671][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 314.815689][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 314.817278][T17541] CPU1 is up [ 314.817708][T17541] ACPI: Waking up from system sleep state S3 [ 314.974597][T17541] OOM killer enabled. [ 314.975165][T17541] Restarting tasks ... done. [ 314.993811][T17541] PM: suspend exit [ 315.010696][T17556] PM: suspend entry (deep) [ 315.019572][T17556] Filesystems sync: 0.007 seconds [ 315.021311][T17556] Freezing user space processes ... (elapsed 0.003 seconds) done. [ 315.026493][T17556] OOM killer disabled. [ 315.027148][T17556] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 315.029620][T17556] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:43 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:43 executing program 4: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x7, 0x3) 22:48:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xb1414ac00000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:43 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0xfffffdef, 0x8dc0) [ 315.165475][T13419] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 315.659698][T17556] ACPI: Preparing to enter system sleep state S3 [ 315.659770][T17556] PM: Saving platform NVS memory [ 315.659846][T17556] Disabling non-boot CPUs ... [ 315.662342][T17556] smpboot: CPU 1 is now offline [ 315.664716][T17556] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 315.664794][T17556] ACPI: Low-level resume complete [ 315.664871][T17556] PM: Restoring platform NVS memory [ 315.664879][T17556] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 315.675929][T17556] Enabling non-boot CPUs ... [ 315.676233][T17556] x86: Booting SMP configuration: [ 315.676236][T17556] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 315.676429][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 315.677548][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 315.679167][T17556] CPU1 is up [ 315.679513][T17556] ACPI: Waking up from system sleep state S3 [ 315.796460][T17556] OOM killer enabled. [ 315.797014][T17556] Restarting tasks ... done. [ 315.811974][T17556] PM: suspend exit 22:48:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0xc, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:43 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/module/drm', 0x46b02, 0x39) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000000380)=""/197, 0xc5}, {&(0x7f0000000280)=""/229, 0xe5}], 0x2, 0xb37, 0xfffffffe) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:43 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x1000000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:43 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8d26) [ 315.907893][T17559] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 315.909506][T17559] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000fedc3d1b [ 315.945312][T17583] PM: suspend entry (deep) [ 315.954306][T17583] Filesystems sync: 0.007 seconds [ 315.955743][T17583] Freezing user space processes ... (elapsed 0.006 seconds) done. [ 315.963658][T17583] OOM killer disabled. [ 315.964399][T17583] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 315.966871][T17583] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:44 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0xd, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000040)=[{&(0x7f00000001c0)="1895", 0x2}, {&(0x7f00000001c0)}, {&(0x7f0000000340)="9cff46d9720654eff131e9a8db0c85da9cc5d8feef9cbc230f4c4815da56a4152c9e7b56196e300e605997d505cde9e527cc024fe5a3e06785d5a52ba8358c68ff82f21a7f473dc1bd5857de497862e6a4d5ae14c066e5e7c1ea202f07ec98175ba43d8a47272610ae35a46c05dc3d022f639398c7e192fdcb6acf5ce1196a6005622c75f60ee3bb772f", 0x8a}, {&(0x7f00000005c0)="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", 0x104f}], 0x4}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000000c0)) [ 316.408356][ T8] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 316.926144][T17583] ACPI: Preparing to enter system sleep state S3 [ 316.926232][T17583] PM: Saving platform NVS memory [ 316.926237][T17583] Disabling non-boot CPUs ... [ 316.929480][T17583] smpboot: CPU 1 is now offline [ 316.931958][T17583] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 316.932024][T17583] ACPI: Low-level resume complete [ 316.932103][T17583] PM: Restoring platform NVS memory [ 316.932113][T17583] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 316.943468][T17583] Enabling non-boot CPUs ... [ 316.943686][T17583] x86: Booting SMP configuration: [ 316.943690][T17583] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 316.943892][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 316.944912][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 316.946234][T17583] CPU1 is up [ 316.946535][T17583] ACPI: Waking up from system sleep state S3 [ 317.064351][T17583] OOM killer enabled. 22:48:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x2001001000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:44 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0xe, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 317.065033][T17583] Restarting tasks ... done. [ 317.098258][T17583] PM: suspend exit 22:48:44 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/bus/workqueue', 0x2, 0x1) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r1, r0, &(0x7f0000000000)=0x7, 0x3) lseek(r0, 0x80, 0x3) 22:48:44 executing program 3: mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x3104400, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@debug={'debug', 0x3d, 0x9}}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@loose}], [{@hash}, {@audit}]}}) perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000100)={@loopback}, 0x14) 22:48:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x3f00000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0xd, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:45 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) sendfile(r1, r3, &(0x7f0000000000)=0x80000000000009, 0x4) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000040)={0x0, 0x6, 0xffffffffffffff80}) 22:48:45 executing program 2: socket$inet(0x2, 0x3, 0x1) 22:48:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x4000000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 317.222045][T17612] PM: suspend entry (deep) [ 317.235158][T17612] Filesystems sync: 0.011 seconds [ 317.237091][T17612] Freezing user space processes ... [ 317.245208][T17608] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 317.247964][T17608] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000008b250cff [ 317.275572][T17612] (elapsed 0.038 seconds) done. [ 317.276494][T17612] OOM killer disabled. [ 317.277254][T17612] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 317.279962][T17612] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x10, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:46 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendto$inet(r1, &(0x7f00000000c0)="bcc21f28d9769c0e9c0d14b5452a2976565105eff0705cf416aa227575a8e29b2b37e3ea96c33290fe99685731d9816daac401cf55fdcb5fefc8a950f66a303d0199facf2f2daa3d3355279142cfb5631be6240f0ee054", 0x57, 0x4000000, &(0x7f0000000140)={0x2, 0x4e22, @empty}, 0x10) 22:48:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x6000000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 317.671154][T13223] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 318.168091][T17612] ACPI: Preparing to enter system sleep state S3 [ 318.168203][T17612] PM: Saving platform NVS memory [ 318.168207][T17612] Disabling non-boot CPUs ... [ 318.171608][T17612] smpboot: CPU 1 is now offline [ 318.174408][T17612] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 318.174477][T17612] ACPI: Low-level resume complete [ 318.174577][T17612] PM: Restoring platform NVS memory [ 318.174586][T17612] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 318.185434][T17612] Enabling non-boot CPUs ... [ 318.185661][T17612] x86: Booting SMP configuration: [ 318.185666][T17612] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 318.185902][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 318.186975][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 318.188435][T17612] CPU1 is up [ 318.188566][T17612] ACPI: Waking up from system sleep state S3 [ 318.296016][T17612] OOM killer enabled. [ 318.296842][T17612] Restarting tasks ... [ 318.314576][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 318.317087][ T1034] block loop5: uevent: failed to send synthetic uevent [ 318.318466][T17612] done. [ 318.320575][T17612] PM: suspend exit 22:48:46 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/module/x86_pkg_temp_thermal', 0x408c2, 0x190) sendfile(r0, r0, &(0x7f0000000000)=0x8, 0x2a) [ 318.360576][T17627] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 318.363048][T17627] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e5cb1ee4 22:48:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x8000000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:46 executing program 3: openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8000, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="af3fab5ab01e57828bc37079a1d31e0c10af5c55e6dbd79fe46fc717ec4dada46647fbc69ca70d184413af", 0x2b}], 0x2088000, &(0x7f00000003c0)=ANY=[@ANYBLOB="687567653d61fc46c054a079c87a45dadf7aadbcc7647669736544666f776e65723e", @ANYRESDEC, @ANYBLOB="2c7063723d303030303030303030303af15778edbcedfc11773beb0f9ddc35f88d6385bf5ded5e3b2ef7d7bd5c2972ced235aa869ffb79cab0ea89305e97d1e1b7264a6be7740601c8c7a7c9f20336a16fa0994a392dfcf030018d50556725df32d6e48aef0c3250eee633a659deb1638de10f70df959e66f96f271cc9daf21b19665c8bf43d857baa22b48ac499ae41037a36dd6704f2e67056104159e56a81d593a4a7d9a7f004"]) r1 = timerfd_create(0x8, 0x80000) sendfile(r1, r0, &(0x7f0000000000), 0x1f) r2 = open(&(0x7f0000000240)='./file0\x00', 0x101040, 0x30) splice(r0, &(0x7f0000000200)=0x7, r2, &(0x7f0000000280)=0x2, 0x3f, 0x0) 22:48:46 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @private}}, &(0x7f0000000040)=0x80, 0x800) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x844) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:46 executing program 2: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r1, r0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="050000000000000000000f00000008000300", @ANYRES32, @ANYBLOB="28000e0008"], 0x74}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)={0x1c, r3, 0x100, 0x70bd23, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r4}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c41}, 0x51) r5 = syz_open_dev$sg(&(0x7f0000000240), 0x8, 0x80) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f00000002c0)={0x78e5, 0x7, 0x7, 0x80, 0x3f, 0xc4a}) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x240, 0x0) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r7, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) dup3(r6, r7, 0x80000) r8 = socket$inet(0x2, 0x3, 0x20001) sendmmsg$inet(r8, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:48:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0xe, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0x97ffffff00000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 318.412425][T17637] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 318.415108][T17637] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000024431770 22:48:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x11, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 318.478618][T17661] PM: suspend entry (deep) [ 318.488714][T17661] Filesystems sync: 0.008 seconds [ 318.491734][T17664] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 318.495055][T17661] Freezing user space processes ... (elapsed 0.001 seconds) done. [ 318.497288][T17661] OOM killer disabled. [ 318.497878][T17661] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 318.500413][T17661] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xe000000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:47 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) r1 = eventfd2(0x8, 0x1) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f00000000c0)={{0x0, 0x6, 0x4, 0xe00000000, 0x1d6, 0xfffffffffffffff8, 0x9, 0x3, 0xfff, 0x6, 0x80000000, 0x1f, 0x5, 0x400, 0x5}, 0x8, [0x0]}) [ 318.733328][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 319.246147][T17661] ACPI: Preparing to enter system sleep state S3 [ 319.246297][T17661] PM: Saving platform NVS memory [ 319.246301][T17661] Disabling non-boot CPUs ... [ 319.249569][T17661] smpboot: CPU 1 is now offline [ 319.252182][T17661] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 319.252249][T17661] ACPI: Low-level resume complete [ 319.252340][T17661] PM: Restoring platform NVS memory [ 319.252350][T17661] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 319.263894][T17661] Enabling non-boot CPUs ... [ 319.264063][T17661] x86: Booting SMP configuration: [ 319.264067][T17661] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 319.264281][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 319.265207][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 319.266922][T17661] CPU1 is up [ 319.267178][T17661] ACPI: Waking up from system sleep state S3 [ 319.390581][T17661] OOM killer enabled. [ 319.391331][T17661] Restarting tasks ... [ 319.392294][ T1034] synth uevent: /devices/virtual/block/loop3: failed to send uevent [ 319.395391][ T1034] block loop3: uevent: failed to send synthetic uevent [ 319.406123][T17661] done. [ 319.406883][T17661] PM: suspend exit [ 319.411810][T17670] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. [ 319.416328][T17672] loop3: detected capacity change from 0 to 64 22:48:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x12, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:47 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd27, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004813}, 0x20000065) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:47 executing program 2: r0 = socket$inet(0x2, 0x5, 0x4) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) 22:48:47 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r1, r0, 0x0) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x40, 0x8, 0xc, 0x0, 0x0, 0x6, 0x800, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x1, @perf_config_ext={0xe0, 0xcb3}, 0x80, 0x5, 0x100, 0x9, 0x6, 0x5ce7, 0x5, 0x0, 0x100, 0x0, 0x1f}, 0x0, 0xc, r0, 0x9) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r2, r2, &(0x7f0000000000)=0x7, 0x3) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r3, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) preadv(r3, &(0x7f0000000040), 0x0, 0xff, 0x8000) 22:48:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xe0ffffff00000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 319.476660][T17672] loop3: detected capacity change from 0 to 64 22:48:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x10, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 319.535314][T17700] PM: suspend entry (deep) [ 319.556682][T17700] Filesystems sync: 0.019 seconds [ 319.563211][T17700] Freezing user space processes ... (elapsed 0.013 seconds) done. [ 319.578134][T17700] OOM killer disabled. [ 319.578985][T17700] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 319.581821][T17700] printk: Suspending console(s) (use no_console_suspend to debug) [ 319.996839][ T22] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 320.506094][T17700] ACPI: Preparing to enter system sleep state S3 [ 320.506196][T17700] PM: Saving platform NVS memory [ 320.506201][T17700] Disabling non-boot CPUs ... [ 320.509420][T17700] smpboot: CPU 1 is now offline [ 320.511804][T17700] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 320.511948][T17700] ACPI: Low-level resume complete [ 320.512035][T17700] PM: Restoring platform NVS memory [ 320.512044][T17700] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 320.522082][T17700] Enabling non-boot CPUs ... [ 320.522301][T17700] x86: Booting SMP configuration: [ 320.522305][T17700] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 320.522470][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 320.523491][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 320.524978][T17700] CPU1 is up [ 320.525313][T17700] ACPI: Waking up from system sleep state S3 [ 320.631759][T17700] OOM killer enabled. [ 320.632358][T17700] Restarting tasks ... [ 320.637894][T17713] PM: suspend entry (deep) [ 320.639900][T17713] PM: suspend exit [ 320.656685][T17700] done. [ 320.657292][T17700] PM: suspend exit 22:48:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x27, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:48 executing program 2: ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f00000005c0)={0x0, 0x0, 0x9, 0x0, '\x00', [{0x717, 0x3, 0x1, 0x8001, 0xfffffffffffff801, 0x4}, {0x7, 0x6, 0x1, 0x1, 0x800, 0x6}], ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) open(&(0x7f00000000c0)='./file0\x00', 0x400000, 0xa) r0 = socket$inet(0x2, 0x3, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000008, 0x30, r2, 0x4b446000) setsockopt$inet_int(r1, 0x0, 0x31, &(0x7f0000000140), 0x4) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x4048dc0) 22:48:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xeffdffff00000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 320.669196][T17713] PM: suspend entry (deep) [ 320.678285][T17716] PM: suspend entry (deep) [ 320.679137][T17716] PM: suspend exit [ 320.680109][T17713] Filesystems sync: 0.009 seconds [ 320.682577][T17713] Freezing user space processes ... [ 320.684278][T17709] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 320.686922][T17709] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e5cb1ee4 [ 320.706804][T17713] (elapsed 0.024 seconds) done. [ 320.707990][T17713] OOM killer disabled. [ 320.708661][T17713] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 320.711137][T17713] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:49 executing program 4: write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000040)={0x14, 0x69, 0x1, {0x1, 0x0, 0x3}}, 0x14) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x80082, 0x0) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000140)={0x0, 0x5, 0x4}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0), 0x12200, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x50, r2, 0x28302000) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="00000300000014000000000009000000000000000000000064010101000000007fffffff"], 0x24) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f0000000080)=0x80000000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r3, &(0x7f00000001c0)="a6e2976b5c4383036d32dadd2e144d8645ca8d1b230e105614396838da83c754887e7bea2f35d4ea667817d90d532af065f2e398dd9081ea16f8b371a202a6f9e505bbc964a0d3880bf0104a0a0a2f0d311efee1637e85a0125b38f961918f99bf9c2c146e42327f178dc2b3d4936e7f7f0a79f74ba464d83ab41742d1186776dc1779b5c50ac82d0fa8f9e42074b5b6079207fb21e718080907964669be539791e3e98687ee059853", 0xfffffffffffffd18, 0x840, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r3, 0x0) sendmmsg$inet6(r3, &(0x7f0000001e40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="a7", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000140)="f607cfdc6413c0ae57e857c882790bba37f2739123f685723fb8e13b29e8a5dc5825418e8ec3d04a2c09ca", 0x2b}, {&(0x7f0000000340)="aa5308b9d3f05508a5cbd8b61231cc255a146e90f07c9ccd3545e313688b528d162708e4e1a8789c4f79bdb796f2488ead69025980d5c76cfae7307a0098381ee007deabfbdf2c805004e6b20d4690b06fe730f3caa419a01fa25fe817d08b6417ecf762f6c92e770e7c", 0x6a}, {&(0x7f00000003c0)="abff0c3ca168bb82d66cd00445769f800e9be6341195e19c5274c8b57332b12ed5", 0x21}, {&(0x7f0000000400)="766b760104893a3955b034ee50fc036428b5", 0x12}, {&(0x7f0000000440)="366b11108d7ffa583332cbd677b8481575cdc754be4ef83e1b461c470cfcf8628b6b5707ecbf3e7463934b1547b0f738e6696e65aa9d1bdc2474c601955279a850ee2220ef0af8cfc33a98aab19a420312910fa385d6fc0df47b4125e8255a276b923cd7d13d69a77f4c0682990cb02ff5b9ddd371e2af7a3404ba46f7", 0x7d}], 0x5}}, {{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000740)="c10413f782adf6be2da4826c6160b0f5536bbb8b96ff346e226cfbe4b0e70f431ac6f6475a5fc7f23a9b258f2e114d17db0815278a15f475aa19fb79b69e7aca586366128ed6e5666244a4a57a51bec58635a8443e9a76fbfd24a889d60acb3c43793b38995bbeb48af94f4a2aa270954f0ed5d493dad90afc8f1e324930a087c3d6003562c8cbcdf2ef53626190cd7db682c4643f9a86b8280eecfc00b427c3fd71ae6e19079a6c7358e2195f06f622", 0xb0}, {&(0x7f0000000800)="f8477bbe4a2a5fa97b211dc6b13ee9e06dd7d4c404c76fac5458b00291bd080386d3d8f6cff13839695d165214040c3acf791b77374da7bea8bb9f59cbaff97229d798837694d8b08c6875410433d1387592c83af352fea86e917070617883269df43d6f8c738591dc6cb07dba20a2bb6d45643df9f7de643946ec6ebdb080318da98335926fbd962ad8fc551fbc8d2f442c4bff4fe23e77467f52f8f28bc2cfeb016823e17033558a98b80d3738831f3f76533c0d2f76daa9689f24f9fa6cf29321e09b79ad99d75cb18f70311ac5280398", 0xd2}, {&(0x7f0000000900)="ecd5261a4d2b703362714deb22673445421f5b27e7e4f55726ee84bd717f16d4f4e2dfb1519c7791634ed6f897ebf54248f5cd105743272f6d47333667db7649de216f836b74f14bb570e88082ff", 0x4e}, {&(0x7f0000000980)="bebf2d93556d2b22ef7bc795d4b8ef46207199d2d21c84a72b08f95de9976c8efc", 0x21}, {&(0x7f0000000e40)="1fa9983a14f5d89f70cbaa38a58c68a87c984ec02ce30ca44416014fb73438801834a9a1c4be54e229eca4b44bd304a9abb77cff73dab1fd5857bd4c0d5d2cc1d331c0b08d5047781267de4d434938faf981ac232d65b1889f9ddb27ec9f0bd56a03baf79eb95198f8275085f29fb6ea48ae60a2f30fb53eaac25e792a5b8a9077e33fbff1b44df3e8d2d614d228066efea74c3930edb3188c896468e84edcb8c8f6c996c884dbc108cd9789e7c5d578a6aa7c8dce33c358e87a14f99d6bb6bb1dd8ba0b9f866f54559f7f3b9840f7b3c8d8763d421bc61140e573d9fc53b9b40bfcb422b6a54b484dccc126742020bd61d324ade753ba621c8de1fd321c714ef99519f5559a2201f8560ac571160fc3a942f14b0c0d3c535dbaf50ae121ae856f2ed738a199bae06948de70fc0c8ce882aaf1b1a44a912cd8f9ddddeeb5301bfcbfbc893a4353cd7490a5640bb619cb1b9fe0b922b628e0fc89fbb6fed0b1ad3bfeb47e5ca2f87ac392efd9cf5a307c46cb7b3d1d3cae8f07859bd517cf0c676802ce035e61551a7ca4b93cdd63a176ff3594bff17e5dd0287a4194abfc0002c41d63da69751afe18dc6ca2e02ece2fb1bb818b65b48644e5e93ecadf715d8e86dde2ffac0da91694f5aa8ad346d455df17d326fe33a850efcf4d1813f4f18724faf33c6645b3dbcb8fd248ff16a1e5243f5e266fa1c8b27d930fe1829c0805b3b9f91332a4c53a78f181c3dce46e0ec58bf968cb4e310df63a9e0092816e53ead8af397f437517caa799177a658c2277bbe44720211cbaafa0699c2f299fe256aecce12d6cdf65e5c73ffd4f878702378067e79234a03d64e11fa114c8693874b3d9f5aefb5699aba6c1a14366792e458abee16168473c90c4e2a70d08db49b0f06d3ffb711ed87bac39e7a91c79b71ee50242de105ead713af0c79a0a2575a8c0e5211038f66f3706c785dde3f6fa83704190401afdb99cf4045841ec0438326bb22045b74c7e6c356f316a965ca53de780d60e624c54d8f26ed4e55dd74c391ed7c4db4b269022c5e41f411963f02e7033232a195e3f652ff8ba96dccf69dbeed627ab4b63d080151df6a65714aeaf2f46c846f5fcadb48cea1f2f939f8ce77f9798ef3ba286ad767637418935362b6116f1544654b6fc3d81966b3319981e2cdd9aed6b6a698770c7debd50e701b57a5cb334e8cefcf2c6c4721ac0d581985176bc82b43599936fa690b8248b127a66fee603ea4fb454a1b0a3c2f1ece85d1cc2607b1b49b0846f34dfb39af15ef3a2a211898d9ef6d1598a279cda377577da6e3c8631ded23d179efb7eb3d54014897908d83818f2f932bdc6558f9132f938ee9d333895c14c8bcdd4b372684a04ada8cf5cf3465404070b870177fdc4a80cebde38637cc9f8922f4c3886d4d681cddec843381c4e0a645a8f1c421c270d924b9d984418771cd1d1d8e8640b80245c793cdb318f48babee0fc6803e69b8b922ef3d6ef0b91a25e17bd6503e87ea3bba695cc978c9155fa8e892b321159301e9d7c3707212045ce8581ac0c183ed87d534c3cb51de7fd9652497ac5559abaaf8d8e58f92246ed7489a15688cf9b0d91b9420ab3c22bd332703912267776eb2a9f7e2a7802195cedb82b094f1464a34164e28197d6f850ee0b6308537c470cc083d07e69f383bd1156d9af24dd6ff6dec20070266f42b45cb9b3c4e7eb4af4ee7f28032fd2c499bbd4002ccfbed6bcb71a4f057a7425852f33dbdc8ebb183b71eda3417acbc2003defb4a37a2e1ca9aa4ec9ef9711ee03e959c9575dfc7d9667efee0039a85455d2e93773123ca0974f238bb896feb46b202a13c4ec9d3debd77cbff327b0fb7e2af04a92c5a923820c693d552343e4831133fd1b3c4f229d7a7f81e0f227ae57391ad0a38e223fca6442c7969647874f3e891c5d7c76f32caea4fe989f869dfd1a8df8a18f7304c90077d48355a7d7d3d793b934f514b71aa42aa97eac396fa14a69b1c3475ca3d7011cf3c47f2ffe57dd83245e23e7339180dc514eeb015d6917ccc8b4f05432c26874b8b84c65e64a8183709a85a575c06c9a44b5a5c002b15aed71d84ffa66b0f3d4821353e326654a5e96f219b71bf37f17956b4e2af994b90ee675cdecafbbde837731e0709d1b8a658b8edbefa5f718e7d5facd6a4e05a2e5d77c2c9e10061070c827192ca18712983fc6044535d886ed56c34d574a4038f4dd852c37a1eb94a6d9b23a7bb40389b2f1c29089512f6deaa1a1d2ec3c76b35e6b84f012d1ef7b43c2bafd413212b2c93612bfb630d21601da0cae0d63582116718068fd9b50a6ea7f3027e8415cdd16f6fc872aff97f8f44ec38ee64a36ea95f9bc1d74b872c139f7410a3e8f6a30d395e4d4a18dc2757d53fbe59f75cddc5e30307762bfb0e4cd18066bd3fef4bc61478e098a0ee14ff7ccb2da93525ad423d9f96920b2077aafa5f877d193352194ff9750c5e6905071fefb156c3f141e7568e5067e5b5c5762992c42477be7a01d173af215f96f3eae01e124632eae716315af6c4be584b91958fb690f1eabbe56a9bf687693fe853874f7f9ddc55c5b12c50f84da01edf3d6f3d03772dc797314d06c40457312d937e8537efc7cf2f23e566bf0ac33fc7e36da38b3c0f025cf7db5c9806da939df6a44fc62519605fce93c494f5f4d80f5a1b9710a6379848334db5e1da5e872cd66dea7e023666c4c28a9bba5aaad0b003649710773695b69e8b0350c3f1233f1431ae969b996c98400762406146cf1043d14ea436ceeb356f8bbada76b8f6e54e265b88d09d01882b402d6010e540f59247a2159b2662aee8d57cf0d203b5732242e5232e773de9fd25746f4f39de7ac44357d2a14c31d9742d48ccd390fdc38a8b0852e9fb193b469d1078e24d762e3f7664e470aaeb032e2fd9a55e10c521ffecefebc6cc17998302ef9bace2786d3084bc7db204210bbf105dfc69fce8105884141fa310796875a899e59ef0051965068c8c41c1807587ecd315b96a34ce35331a7a302c6920aa7f9e2689073b9a9a8915d2803d8a89e3cb0408e8538d46d4b6506c854a3b27861b90796bf907d18a61818239527f01e3eea3945f7d91bf6a2d71c5e43e91dbad56ca148de2f8e76b4fd172b9bcc4892bb1336da37e682f3df49c2f7a7c50fcac87923aa42bc3658d4128da0ce65ad2f78b1890101a54c03a8e70907a3e851bfe7497544c693fc9029653891c151a4b135b62be881b6126500401b1d9fe1a07bc8734bee8de9f3aa50af1b592c946df4fcf7db929d062759b0a941e1996582d30cdb67bb08e98602c4f645cf4fa2e30d98c87ebfa05f78f7d10460331b34608523d70b5d22fc25e39fb583897618a7b49f947bb3535e3fff97328d2cf3ca896b6d2e397d411a5d653b4f9bb7c1ad85e9b4666158fb8ff9f21da08b3aee6033bb634b351b90732baa601b9d79a5ce17c649cdf94d09d26ab401fa9715a0881a2e74aadbe579f35851d0db8adc4e69b99a6f9eec0ef2170ff8bbb05f68c2a1c832ce04629528b8db24ad505326712b4844a52697c993b4899c367cf3b1073bb2d6d8345734ae0da6834d19ef7c71ff523a701d56b456f9843fab13cef2288ad6a42859bd3f5573ba4f79ea83870c53389937751ab77dfb3ed60f093d252a451622f6d2f8e9e6ad604bd4d103f348c4530f2bdce988f65f1bab3017292c432e42b664dfbc725c870cbc2d4f2f75f739cba359afa5446cfe35ce9324e3233b09cd1086a623a08ab5423765e57997daa3fd6c6907841a8994395c33390b08793a46b517ad2130808162013ee47bab7dfe1b25c04312d5ea1178b4eca216ce813c56714fe727e94d5a68ba1dc9bfb32da7e098fba6057189c5d7ab83787e8ca3e174609452067d82acc0b78a18d863416b3f05e20f92e7cdfc252689b419a8ca23a3a9fdadbd565a10cd30b44f9f89d8f759f1c011794e0ec903485b697833668fb927a6116534e4e470393dc33f6abe701c91b85e34f525d7679a993ce22a4d1c1d00125b1f5c73b35413e99da90c8bd7748ed380d4fa8f33b10833ddd9a7dc9a833b59a020b01bf2f0451069a8ea7ee7df776d8fc73e286fed0cfc486ccf5697b49416a59d322e5fa8867eaf7d10b7a9fdc9076138c1a6b20ff2e0a7c713fc5c770948d1c28c041096fe5379095bab5c47de7d966cc190f87934069f1897dfde833ffccca034d10ff41869702c8ce628f0f506cb9b7a488d5a00ecaaf5b27eb6134dc73423468ce62a13fb1e30403a28ca28c7f6aa010c7b9edd571553c7c37427a350172b225bf8a78642262dbf76e1eaec77f7fac628c4c5ce2a4c643f11f225ce9b9bf7f342661bd424e646c69c1f2929c59220574bf3dd2be99d2b010c86a3eb951af45dad01fc14ebec6254559660c227aa24b211fc4f8a8fdc4eb1473eae4cc32ab4830735b6fe22225a4ba62ed4f459af5577a9a0329b58df5bd075558c08d12bcf1cb2e3bf66f780d078228e30ec09305d1b2d6d36b88fbbd4a755cdcbf49c004a1f6e07fde4c4e49b0fd7506ca2e53159b9ec1fbbc6157ca64c89ed13acbd3a08c9499cb4a68335140fd0ab81ddeea1110c3306de883c4d936795b439", 0xcc9}], 0x5}}], 0x3, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0xfe27}, &(0x7f0000000100)=0x30) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f0000000280)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f00000002c0)=0x10) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x11, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:49 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xf7ffff7f00000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 321.028844][ T1787] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 321.526194][T17713] ACPI: Preparing to enter system sleep state S3 [ 321.526286][T17713] PM: Saving platform NVS memory [ 321.526290][T17713] Disabling non-boot CPUs ... [ 321.528732][T17713] smpboot: CPU 1 is now offline [ 321.531307][T17713] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 321.531371][T17713] ACPI: Low-level resume complete [ 321.531452][T17713] PM: Restoring platform NVS memory [ 321.531461][T17713] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 321.542451][T17713] Enabling non-boot CPUs ... [ 321.542593][T17713] x86: Booting SMP configuration: [ 321.542597][T17713] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 321.542788][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 321.543725][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 321.545190][T17713] CPU1 is up [ 321.545548][T17713] ACPI: Waking up from system sleep state S3 [ 321.656589][T17713] OOM killer enabled. [ 321.657313][T17713] Restarting tasks ... [ 321.665764][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 321.667702][ T1034] block loop5: uevent: failed to send synthetic uevent [ 321.679762][T17713] done. [ 321.680533][T17713] PM: suspend exit 22:48:49 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) r4 = dup3(r3, r1, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000280)='0', 0x1}, {&(0x7f00000003c0)='7', 0x1}], 0x2) getsockname$inet(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000340)={0x0, @can={0x1d, 0x0}, @hci={0x1f, 0x2, 0x3}, @qipcrtr={0x2a, 0x0, 0x3fff}, 0x6fc, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)='batadv_slave_1\x00', 0x4, 0x9c3, 0x7}) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000400)={@multicast2, @loopback, r6}, 0xc) r7 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r8 = openat$cgroup_int(r7, &(0x7f00000000c0)='cpuset.memory_spread_page\x00', 0x2, 0x0) dup3(r8, r7, 0x0) write$cgroup_int(r8, &(0x7f0000000240)=0xfffffffffffffffd, 0x12) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r5, 0xc0a85352, &(0x7f0000000100)={{0x2}, 'port0\x00'}) r9 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x410000, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r9, 0x81f8943c, &(0x7f00000005c0)) [ 321.705276][T17731] PM: suspend entry (deep) [ 321.714368][T17731] Filesystems sync: 0.008 seconds [ 321.716893][T17731] Freezing user space processes ... [ 321.727761][T17719] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 321.730561][T17719] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000e5cb1ee4 [ 321.747820][T17731] (elapsed 0.030 seconds) done. [ 321.748744][T17731] OOM killer disabled. [ 321.749310][T17731] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 321.752143][T17731] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:50 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1000000002, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x20400, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x1, 0x8, 0x9, 0x9, 0x0, 0x2, 0x810c2, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x40, 0x1, @perf_bp={&(0x7f0000000040), 0x1}, 0x12200, 0x0, 0x2, 0x1, 0x319, 0x3ff, 0x0, 0x0, 0x10001, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, r0, 0x2) r1 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r1, r1, &(0x7f0000000000)=0x7, 0x3) 22:48:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x48, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:50 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000005800)=[{{&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="1895", 0x2}], 0x1}}, {{&(0x7f0000000300)={0x2, 0x0, @private}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="90d1", 0x2}], 0x1}}], 0x2, 0x8dc0) r1 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@isdn, &(0x7f0000000140)=0x80) setsockopt(r1, 0x4, 0x9, &(0x7f0000000180)="1547dee2bc33fbc87a82b4ebc6c7cf1d1ef9fc113de65873dd04b45ac116ebe70182250cfd27663bdc77022a10d3bff3b13dd176108a778bb7e2c616aa04c190d8a6fb9d17b2e2ef45631ddfe4f8e21bf52af66e9983188fc6d37804b32887c1220edca9f1146e184a496d4255cb348c4ea647ed317a7a3ce8e7e4d69ea4738482c4", 0x82) shutdown(r1, 0x0) 22:48:50 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfc00000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) [ 321.921586][T13552] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 322.429960][T17731] ACPI: Preparing to enter system sleep state S3 [ 322.430036][T17731] PM: Saving platform NVS memory [ 322.430068][T17731] Disabling non-boot CPUs ... [ 322.433287][T17731] smpboot: CPU 1 is now offline [ 322.436338][T17731] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 322.436404][T17731] ACPI: Low-level resume complete [ 322.436488][T17731] PM: Restoring platform NVS memory [ 322.436498][T17731] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 322.448283][T17731] Enabling non-boot CPUs ... [ 322.448440][T17731] x86: Booting SMP configuration: [ 322.448444][T17731] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 322.448679][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 322.449678][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 322.451160][T17731] CPU1 is up [ 322.451411][T17731] ACPI: Waking up from system sleep state S3 [ 322.561989][T17731] OOM killer enabled. [ 322.562623][T17731] Restarting tasks ... [ 322.573697][ T1034] synth uevent: /devices/virtual/block/loop4: failed to send uevent [ 322.575770][ T1034] block loop4: uevent: failed to send synthetic uevent [ 322.587764][T17731] done. [ 322.588424][T17731] PM: suspend exit [ 322.618749][T17727] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 322.620639][T17727] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x000000003f010896 [ 322.645385][T17743] PM: suspend entry (deep) [ 322.652463][T17743] Filesystems sync: 0.006 seconds [ 322.653745][T17743] Freezing user space processes ... (elapsed 0.012 seconds) done. [ 322.667545][T17743] OOM killer disabled. [ 322.668359][T17743] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 322.670885][T17743] printk: Suspending console(s) (use no_console_suspend to debug) 22:48:51 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfc01000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x12, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 322.786187][T13552] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 323.300276][T17743] ACPI: Preparing to enter system sleep state S3 [ 323.300351][T17743] PM: Saving platform NVS memory [ 323.300355][T17743] Disabling non-boot CPUs ... [ 323.302830][T17743] smpboot: CPU 1 is now offline [ 323.305859][T17743] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 323.305928][T17743] ACPI: Low-level resume complete [ 323.306010][T17743] PM: Restoring platform NVS memory [ 323.306020][T17743] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 323.316488][T17743] Enabling non-boot CPUs ... [ 323.316668][T17743] x86: Booting SMP configuration: [ 323.316672][T17743] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 323.316875][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 323.317839][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 323.319454][T17743] CPU1 is up [ 323.319732][T17743] ACPI: Waking up from system sleep state S3 [ 323.536257][T17743] OOM killer enabled. [ 323.537071][T17743] Restarting tasks ... [ 323.557518][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 323.562160][ T1034] block loop5: uevent: failed to send synthetic uevent [ 323.563382][T17743] done. [ 323.564028][T17743] PM: suspend exit [ 323.581293][T17757] PM: suspend entry (deep) [ 323.595560][T17757] Filesystems sync: 0.013 seconds [ 323.596669][T17757] Freezing user space processes ... (elapsed 0.020 seconds) done. [ 323.618281][T17757] OOM killer disabled. [ 323.619014][T17757] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 323.621754][T17757] printk: Suspending console(s) (use no_console_suspend to debug) [ 323.768736][T13514] sd 0:0:1:0: [sda] Synchronizing SCSI cache [ 324.286249][T17757] ACPI: Preparing to enter system sleep state S3 [ 324.286352][T17757] PM: Saving platform NVS memory [ 324.286357][T17757] Disabling non-boot CPUs ... [ 324.289720][T17757] smpboot: CPU 1 is now offline [ 324.292051][T17757] kvm-clock: cpu 0, msr 4506001, primary cpu clock, resume [ 324.292123][T17757] ACPI: Low-level resume complete [ 324.292207][T17757] PM: Restoring platform NVS memory [ 324.292217][T17757] kvm-guest: stealtime: cpu 0, msr 237c170c0 [ 324.302395][T17757] Enabling non-boot CPUs ... [ 324.302587][T17757] x86: Booting SMP configuration: [ 324.302590][T17757] smpboot: Booting Node 0 Processor 1 APIC 0x1 [ 324.302859][ T0] kvm-clock: cpu 1, msr 4506041, secondary cpu clock [ 324.303843][ T14] kvm-guest: stealtime: cpu 1, msr 237d170c0 [ 324.305359][T17757] CPU1 is up [ 324.305645][T17757] ACPI: Waking up from system sleep state S3 [ 324.519942][T17757] OOM killer enabled. [ 324.520634][T17757] Restarting tasks ... [ 324.528657][T17768] PM: suspend entry (deep) [ 324.530812][T17768] PM: suspend exit 22:48:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfe80000000000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x4c, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:52 executing program 4: r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) r1 = openat2(r0, &(0x7f0000001240)='./file0\x00', &(0x7f0000001280)={0x10000, 0x1}, 0x18) write$eventfd(r1, &(0x7f00000012c0)=0x80000000, 0x8) clone3(&(0x7f00000011c0)={0x40040000, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100), {0xc}, &(0x7f0000000140)=""/23, 0x17, &(0x7f0000000180)=""/4087, &(0x7f0000001300)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x5, {r0}}, 0x58) sendfile(r2, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x13, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:48:52 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4f448, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000080)='/sys/power/state', 0x2, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x7, 0x3) 22:48:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmmsg$inet6(r0, &(0x7f0000002840)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @dev}, 0x1c, 0x0, 0xfe80ffff00000000}}, {{&(0x7f0000000bc0)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0}}], 0x2, 0x2400487e) 22:48:52 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendto$inet(r0, &(0x7f00000000c0)="d4195af5dd826a78a1c16324bd35cbe43d5f393aa12b296a2263bcde4add74a9c8cda7aa250bf73b9ff231456a9ca07f74eb768872d7dae7408ae565edcf4a34f5c286dd4e3f4e8069bb0e057c1cab0ed37b4efdbf29ed06f34a958ed6826b63f508a384235b28e99b40823cbcc9073b1fcd0284e1b05bb16804e957023b17a40f15ff07d5151c821a4941416fa8ca9c36fe1e8bc67cd6eed0db6e8a23c13a", 0x9f, 0x50, &(0x7f0000000180)={0x2, 0x4e24, @broadcast}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='auxv\x00') preadv(r1, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000040)=""/4, 0x4}], 0x2, 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000280)={'vxcan1\x00'}) r3 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000340), 0x123000, 0x0) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f00000003c0)={0x0, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2d}}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x8, 0x0, 0x0, 0x0, 0x7ff, &(0x7f0000000380)='veth1_to_batadv\x00', 0x0, 0xdd66, 0x7}) sendmmsg$inet(r0, &(0x7f0000005800), 0x0, 0x20048581) r4 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000083000/0x1000)=nil, 0x1000, 0x1, 0x2010, r4, 0x8000000) socket(0x11, 0x800000003, 0x0) syz_io_uring_setup(0x3b7c, &(0x7f0000000000)={0x0, 0x3832, 0x1, 0xfffffffe, 0x2, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f00007ea000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000440)=0x0) sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x18, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x20}, 0x4044840) syz_io_uring_submit(r5, r6, &(0x7f0000000240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x12}, 0x1}, 0x9) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f00000001c0), &(0x7f0000000200)=0x30) [ 324.556657][ T1034] synth uevent: /devices/virtual/block/loop5: failed to send uevent [ 324.558138][ T1034] block loop5: uevent: failed to send synthetic uevent [ 324.568659][T17757] done. [ 324.570776][T17757] PM: suspend exit [ 324.608150][T17770] ref_ctr going negative. vaddr: 0x20000004, curr val: 0, delta: -1 [ 324.609773][T17770] ref_ctr decrement failed for inode: 0x361f offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x0000000039659c5d 22:48:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x68, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 324.645140][T17785] PM: suspend entry (deep) [ 324.661426][T17785] Filesystems sync: 0.015 seconds [ 324.662768][T17785] Freezing user space processes ... (elapsed 0.027 seconds) done. [ 324.691975][T17785] OOM killer disabled. [ 324.692557][T17785] Freezing remaining freezable tasks ... (elapsed 0.001 seconds) done. [ 324.695684][T17785] printk: Suspending console(s) (use no_console_suspend to debug)