last executing test programs: 6m9.099169797s ago: executing program 0 (id=2825): r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x745100, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/midiC2D0\x00', 0x0, 0x0) r1 = openat$auto_mousedev_fops_mousedev(0xffffffffffffff9c, &(0x7f0000001140)='/dev/psaux\x00', 0x42000, 0x0) io_uring_setup$auto(0x59, &(0x7f0000000080)={0x7ffffffc, 0x8, 0x3000, 0x6, 0x7, 0x400b, r1, [], {0x6, 0x6, 0x8c48, 0x29a, 0x9, 0x80, 0x104, 0x6, 0x4}, {0x100, 0x1, 0x101, 0x85, 0x2, 0x24, 0xfe000000, 0x8, 0x3}}) r2 = openat$auto_vhci_fops_hci_vhci(0xffffffffffffff9c, &(0x7f0000000d00), 0x0, 0x0) read$auto_vhci_fops_hci_vhci(r2, &(0x7f0000000d40)=""/16, 0x10) select$auto(0xe, 0x0, 0x0, &(0x7f0000000580)={[0x1ff, 0x8000, 0xd, 0x1, 0x948d, 0x3, 0x10015f4da0a, 0xd, 0x7, 0x64c1, 0x8000001f, 0x8, 0x6d3e, 0xc, 0x2, 0x2]}, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) socket(0x2b, 0x1, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/zswap/parameters/compressor\x00', 0xc0002, 0x0) write$auto_ocfs2_control_fops_stack_user(r3, &(0x7f0000003900)='\t', 0x1) madvise$auto(0x0, 0xffffffffffff0001, 0x15) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) write$auto(0xffffffffffffffff, 0x0, 0x85) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) select$auto(0xe, 0x0, 0x0, 0x0, 0x0) getpgid$auto(0x0) ioctl$auto(0x3, 0x80000000, 0xffffffffffffffff) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0xf400, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x2003f2, 0x15) syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/mlx4_core/parameters/use_prio\x00', 0x472a43, 0x0) 6m5.308204803s ago: executing program 0 (id=2845): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000080)='/proc/key-users\x00', 0x18b800, 0x0) openat$auto_proc_pid_smaps_operations_internal(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/smaps\x00', 0x42102, 0x0) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x1e, 0x4, 0x0) bind$auto(0x3, &(0x7f0000000080)=@tipc=@id={0x1e, 0x3, 0x2, {0x4e21, 0x4}}, 0x6a) mkdir$auto(&(0x7f00000000c0)='}[,&*}\x00', 0x8001) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000140)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64$auto(r0, 0x0, 0x68, 0x10005) ioctl$auto_BLKTRACESETUP2(0xffffffffffffffff, 0xc0481273, &(0x7f0000000380)={"4bcd7c0f961d106ab9ae53172e869b62fbd03f8d61ee3f0bcdd1e1a7e518a17c", 0x0, 0x0, 0xabd, 0x4, 0x3, 0xffffffffffffffff}) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$auto(0x10, r2, 0x4, 0x7ff) r3 = openat$auto_tracing_total_entries_fops_trace(0xffffffffffffff9c, &(0x7f0000000340)='/sys/kernel/tracing/buffer_total_size_kb\x00', 0x80000, 0x0) read$auto_tracing_total_entries_fops_trace(r3, 0x0, 0x0) ptrace$auto(0x8, r2, 0x43, 0x20000000) setpgid$auto(r2, r2) r4 = getpid() r5 = ioctl$auto_TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000600)=0x3ff) io_uring_setup$auto(0x81, &(0x7f0000000640)={0xffffff38, 0xb8e, 0x8000, 0x2, 0x4, 0x1, r5, [0x0, 0xffffffff, 0x3], {0x8, 0x2, 0x702, 0x5, 0x0, 0x6, 0x3, 0x1}, {0xfffffbff, 0x6, 0x61b05d03, 0x7, 0x7, 0x0, 0x54e449bf, 0x2, 0x3}}) process_vm_readv$auto(r4, &(0x7f0000000000)={0x0, 0xfff}, 0x1, &(0x7f0000000280)={&(0x7f0000000100)='y%', 0xffffffff}, 0x4, 0x0) ioctl$auto_BLKTRACESETUP32(0xffffffffffffffff, 0xc0401273, &(0x7f0000000400)={"44c7405bec4beeb5152c58ed1d2090bb85da64ca95466a885109513a474fbae6", 0xb, 0xa, 0x1ff, 0x6, 0x6, 0x0}) r7 = clone3$auto(&(0x7f0000000480)={0x6, 0x0, 0x101, 0x1200, 0x8, 0x0, 0xf89e, 0x8, 0x0, 0x7, 0x5}, 0x6630) r8 = getsid$auto(0x0) r9 = getpid() r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) syz_clone3(&(0x7f0000000580)={0x100000000, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), {0x3}, &(0x7f0000000280)=""/80, 0x50, &(0x7f0000000300)=""/96, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, r1, r2, r4, r6, r7, r8, 0xffffffffffffffff, r9], 0xa, {r10}}, 0x58) mount$auto(0x0, &(0x7f0000000040)='}[,&*}\x00', &(0x7f0000000080)='nfsd\x00', 0x7, 0x0) lsetxattr$auto(&(0x7f0000000100)='}[,&*}\x00', &(0x7f0000000140)='nfsd\x00', 0x0, 0x0, 0x1) 6m3.771827131s ago: executing program 0 (id=2851): mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) r0 = socket(0x11, 0x2, 0x0) capset$auto(0x0, &(0x7f0000000000)={0x1, 0xd, 0x8}) sendmmsg$auto(r0, &(0x7f00000001c0)={{&(0x7f0000000000), 0x5aa, &(0x7f0000000100)={&(0x7f0000000080), 0x49}, 0x4, &(0x7f0000000180), 0x5, 0x1040}, 0x5}, 0x2, 0x100) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) write$auto(0xffffffffffffffff, &(0x7f0000000180)='7k\x00\x00\x00\x00X\xb9\x0e\x11\xfb\x00\x00\x00\x00&!\x8f-\xfb\xea=\xc0\\\xec\xe7D\xe5V\xf1b\xa0\x9a\xa1\x88\xb4\x96\xf5\\\xad4\t\xca\x03\xe4\x15\v]\x00'/58, 0x82) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) socketpair$auto(0x1e, 0x1, 0x0, 0x0) bpf$auto_BPF_MAP_CREATE(0x0, &(0x7f0000000300)=@batch={0x2, 0x8001, 0xd39, 0xfffffffffffffffc, 0x4, r0, 0x1, 0x5}, 0x5) r1 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/pts/ptmx\x00', 0x0, 0x0) r2 = openat$auto_tap_fops_tap(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$auto_TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000200)=0x8) ioctl$auto_TIOCSETD2(r1, 0x5423, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) fanotify_init$auto(0x6a1, 0x2000000000002) socket(0x26, 0x80805, 0x0) socket(0x28, 0x1, 0x0) socket(0x1, 0x1, 0x1) select$auto(0x5, 0x0, &(0x7f0000000100)={[0x9, 0x200, 0x0, 0x8000000000000201, 0x9, 0x3, 0x6, 0x7, 0xd886, 0x5e58296b, 0x341, 0x41, 0x7, 0x200, 0x8, 0xc]}, 0x0, 0x0) ioctl$auto_TCFLSH2(r1, 0x540b, 0x0) socket(0x26, 0x0, 0x0) sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="020026bd7000fedbdf25030000000810030003020000060007000080000008000200", @ANYRES32=0x0, @ANYBLOB="0a00050000000000000000000a00010000000000000000000a00010000000000000000000600070001000000060007000600000008000300"], 0x68}, 0x1, 0x0, 0x0, 0x44014}, 0x40090) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="13"], 0x1ac}}, 0x4004) sendmmsg$auto(0x3, &(0x7f0000000000)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x4, 0x0) 6m3.16509421s ago: executing program 0 (id=2855): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000640), r0) sendmsg$auto_NL802154_CMD_SET_PAN_ID(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000011c0)=ANY=[], 0x1058}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r2 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYRESOCT=r0, @ANYRES16=r1, @ANYBLOB="05082dbd7000fbdbdf257e0000000800db00", @ANYRES32=r2, @ANYBLOB="362d8d737407000000"], 0x28}, 0x1, 0x0, 0x0, 0x4004044}, 0x8000) sendmsg$auto_NL80211_CMD_GET_WIPHY(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="810b25bd7080fbdbdf25010000000400ae"], 0x18}, 0x1, 0x0, 0x0, 0x20008010}, 0xc004) recvmmsg$auto(r0, &(0x7f0000000180)={{0x0, 0x7, 0x0, 0x0, 0x0, 0x2, 0x6}, 0xfffffffc}, 0x10a, 0x6, 0x0) r3 = openat$auto_fops_x16_ro_(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/ieee80211/phy0/netdev:wlan0/dormant_links\x00', 0x8040, 0x0) io_uring_register$auto_IORING_REGISTER_PBUF_RING(r3, 0x16, &(0x7f0000000280)="b4dc694efa1149efce5bd03c592600a75e6cc91e39f5aebeed", 0x8) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) mmap$auto(0x0, 0x400008, 0x5f, 0x9b72, 0x2, 0x8000) r4 = openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/event0\x00', 0x2000, 0x0) ioctl$auto(r4, 0x80004507, 0x10000000000402) madvise$auto(0x8000, 0x87fff, 0xc) clone$auto(0x9001, 0x5, 0xffffffffffffffff, 0xfffffffffffffffc, 0x6) read$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffffff, 0x0, 0x0) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, 0x0, 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket(0x2, 0x80002, 0x73) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @local}, 0x54) sendmmsg$auto(r5, 0x0, 0x9a6, 0xe000) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) connect$auto(0x3, &(0x7f0000000080)=@xdp={0x2c, 0x4, 0x0, 0xc}, 0x54) mmap$auto(0x0, 0x20009, 0xe3, 0x100000eb1, 0x40000000000a1, 0x8000) socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) openat$auto_sco_debugfs_fops_(0xffffffffffffff9c, 0x0, 0x242, 0x0) openat$auto_snd_timer_f_ops_timer(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) 6m1.857492784s ago: executing program 0 (id=2860): mmap$auto(0x0, 0x40009, 0xe2, 0x9b72, 0x7, 0x28000) close_range$auto(0x2, 0xa, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x2, 0x3, 0x6) getsockopt$auto_SO_DOMAIN(r0, 0x6eda, 0x27, &(0x7f0000000180)='\xb9%\x00', &(0x7f0000000100)=0xa) lsm_list_modules$auto(0x0, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_mtd_fops_mtdchar(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mtd0ro\x00', 0x0, 0x0) ioctl$auto_BLKPG2(r2, 0x1269, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8643, 0x15e) ioctl$sock_SIOCGIFINDEX(r1, 0x401c5820, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x4200, 0x4) mmap$auto(0x0, 0x40009, 0xe2, 0x9b72, 0x7, 0x28000) (async) close_range$auto(0x2, 0xa, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket(0x2, 0x3, 0x6) (async) getsockopt$auto_SO_DOMAIN(r0, 0x6eda, 0x27, &(0x7f0000000180)='\xb9%\x00', &(0x7f0000000100)=0xa) (async) lsm_list_modules$auto(0x0, 0x0, 0x0) (async) close_range$auto(0x2, 0x8, 0x0) (async) openat$auto_mtd_fops_mtdchar(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mtd0ro\x00', 0x0, 0x0) (async) ioctl$auto_BLKPG2(r2, 0x1269, 0x0) (async) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) (async) open(&(0x7f0000000040)='./file0\x00', 0x8643, 0x15e) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x401c5820, 0x0) (async) open(&(0x7f0000000140)='./file0\x00', 0x4200, 0x4) (async) 6m1.713459782s ago: executing program 0 (id=2861): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) openat$auto_proc_pid_maps_operations_internal(0xffffffffffffff9c, &(0x7f0000000180)='/proc/swaps\x00', 0x800, 0x0) r0 = socket(0xa, 0x801, 0x84) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x11}}, 0x54) getsockopt$auto(r0, 0x84, 0x7b, 0x0, &(0x7f0000000200)=0xeb) 5m46.64571349s ago: executing program 32 (id=2861): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) openat$auto_proc_pid_maps_operations_internal(0xffffffffffffff9c, &(0x7f0000000180)='/proc/swaps\x00', 0x800, 0x0) r0 = socket(0xa, 0x801, 0x84) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x11}}, 0x54) getsockopt$auto(r0, 0x84, 0x7b, 0x0, &(0x7f0000000200)=0xeb) 17.978999776s ago: executing program 1 (id=4520): close_range$auto(0x0, 0xfffffffffffff000, 0x2) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram2\x00', 0xe883, 0x0) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop6\x00', 0x101202, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r0, 0x4c00, 0x0) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, 0x0, 0x802, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x26, 0x2, 0x12) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x103080, 0x0) unshare$auto(0x40000080) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x400009, 0x1000000000001, 0x0, 0xffffffffffffffff, 0x0) write$auto(r2, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) socket(0x2b, 0x1, 0x0) listen$auto(0x3, 0x81) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) keyctl$auto(0x1f, 0x1, 0x6, 0x3, 0x3ff) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x2003f2, 0x15) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000980)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="01002fbd7000fddbdf250c200000"], 0x14}}, 0x40080d4) madvise$auto(0x0, 0x200007, 0x19) openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/pagemap\x00', 0x103003, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x101001, 0x0) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) r3 = openat$auto_zero_fops_mem(0xffffffffffffff9c, &(0x7f0000000340), 0x80200, 0x0) pread64$auto(r3, &(0x7f0000000240)='\x03W\x96l\x15\x00'/21, 0x100000002, 0x100000001) close_range$auto(0x2, 0x8, 0x0) syz_genetlink_get_family_id$auto_smc_gen_netlink(&(0x7f0000000040), r1) 17.736438886s ago: executing program 1 (id=4524): socket(0x2a, 0x80000, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x0, @remote}, 0x6a) write$auto_proc_loginuid_operations_base(0xffffffffffffffff, &(0x7f0000000040)="9dc4e29815c3dd855a4340428a12ae12c859250e55d63ef492651f515f9a76158c045ff86707a23e18496d5d7129a8e340b7ebcd1806c7b26420ea05cab20eabc25b6240b084785dac9ddeceedcf0c288633b6a40eb3c9a9a00a8140c1a5d3f4418e6820622dc5e8f300f88254e3b7a4052254f9c40b62b89841b2", 0x7b) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/devices/virtual/net/nr11/ifindex\x00', 0x8ea182, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x800, 0x0) write$auto(0xffffffffffffffff, 0x0, 0x81) write$auto(0xffffffffffffffff, &(0x7f0000000440)='0\x00\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94\xf8F\xbb\xa2\xbb>\xade\x18\xbd\xe2\x1c\x89OO]e[\xbb\xf9\xcd\xc0\xc9\x00\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\xef\xc0\x04z\xd0I>\x8f\x00\xe5\x1c*\xed`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\f};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xacA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xdeL/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(\x95\xdfH\xf4\v\xf3CRnz\xc2\x13<\xf0\v\x1f\x14\xf3\xd0\xf2\xd1L!\x81\xea\x83\xa0\r|%\xbf\x02trg\x9a\xe7)\a\xf4\xaa\x05\xc0\xa0r\xd2\x85\x8dH\xd0>\xca\xfc5\x01\x95O4\xca\x95\x1d\x83\xec\nD\x8e\xfb\xce\xd1w\x15:\xe9\x81/B#\xc6\xa1\xfa-\x1b\x8cr\x92nM\xa1\xbb\xe4pd$\xd7\x1b\v\x82\rd\xd2\xaa\v!\xb1}\x92\x89\x8d\xcd\x1e\xc7N\xeeO\x8dO\xe9\xfc\x91\xa1\xa8=R+\a\xb7R\t\f+\x7f\xd5H\x90G=\x9a\r\xb10\x17n\x1b\xf8\v\x11\v\xbb', 0x98c7) open(&(0x7f00000000c0)='./file1\x00', 0x167a43, 0x86) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), 0xffffffffffffffff) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) close_range$auto(0x2, 0x8, 0x0) r1 = socket(0x2, 0x80002, 0x73) socket(0xa, 0x1, 0x84) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3a, 0x1, 0xffffffffffffffff, 0x1, 0x4) sysfs$auto(0x2, 0x23, 0x0) r2 = openat$auto_ftrace_set_event_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/tracing/set_event\x00', 0x20201, 0x0) write$auto(r2, 0x0, 0x4) bind$auto(0x3, &(0x7f0000000100)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) write$auto_kernfs_file_fops_kernfs_internal(r0, &(0x7f0000000000)="42bf", 0x2) syz_genetlink_get_family_id$auto_netdev(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$auto_NETDEV_CMD_PAGE_POOL_GET(r1, &(0x7f0000000040)={0x0, 0x11, &(0x7f0000000100)={&(0x7f0000000840)=ANY=[], 0x50}, 0x1, 0x0, 0x0, 0x404c040}, 0x20004831) socket(0x10, 0x2, 0x6) mmap$auto(0x0, 0x2020007, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x60742, 0x0) futex$auto(&(0x7f0000000080)=0x1, 0x9, 0x1, 0x0, 0x0, 0xfffffffa) sendmsg$auto_GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8000}, 0x4000804) 16.80122449s ago: executing program 1 (id=4533): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x22240, 0x0) close_range$auto(r0, r0, 0xdb) io_uring_setup$auto(0x20, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyprintk\x00', 0x40001, 0x0) write$auto(0x3, 0x0, 0xfdef) ioctl$auto(0x3, 0x5402, r0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0xaaf, 0x4000000000df, 0x40000000000eb1, 0xffffffffffffffff, 0x8000) r1 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/oom_adj\x00', 0x101000, 0x0) read$auto(r1, 0x0, 0x4) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r2, &(0x7f0000000240)={0x0, 0x7}, 0x3) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/uts\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_SMC_NETLINK_GET_DEV_SMCD(r3, &(0x7f0000004380)={0x0, 0x0, &(0x7f0000004340)={&(0x7f0000004300)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB='\v'], 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x810) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), r3) read$auto(r3, &(0x7f0000000000)='\x00', 0x91e2) close_range$auto(0x2, r3, 0x8000) sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0xffffffffffffffae, 0x0, 0x1, 0x0, 0x0, 0x40080}, 0x6cc31ef15fcd919c) bpf$auto(0x0, &(0x7f00000001c0)=@bpf_attr_4={0x17, 0x1, 0xa9, 0x4004}, 0x6f4) socket(0x2, 0x3, 0x100) socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="13"], 0x1ac}}, 0x20004004) sendmmsg$auto(0x3, &(0x7f0000000100)={{0x0, 0x7f, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x1, 0x3}, 0x7}, 0x0, 0x0) mmap$auto(0x0, 0x2020006, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket(0xa, 0x1, 0x84) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/devices/pci0000:00/0000:00:00.0/enable\x00', 0x18b042, 0x0) 16.338227974s ago: executing program 1 (id=4538): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) close_range$auto(0x0, 0xfffffffffffff001, 0x2) futex$auto(0x0, 0x6, 0x47, 0x0, 0x0, 0xff) r0 = open(0x0, 0x1e7d43, 0xa6) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x80, 0x0) mmap$auto(0x0, 0xa, 0xdb, 0x9b72, 0x5, 0x8000) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r1, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x140082, 0x0) ioctl$auto_USBDEVFS_SUBMITURB32(r0, 0x802c550a, &(0x7f0000000140)=ANY=[@ANYBLOB="08000000030000001d736774bab3ac8bdbc91f3e621d497ebaf6f3d562a859090000000400000000000000060000005606000007000000020000200500000001f8ffff40"]) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0xa0340, 0x0) socket(0x2, 0x80002, 0x73) socket(0x2, 0x801, 0x106) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x2202, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x6, 0x0) 16.081302833s ago: executing program 1 (id=4541): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x80002, 0x0) sendfile$auto(r0, 0xffffffffffffffff, 0x0, 0x3) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_mac80211_hwsim(0x0, r1) syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'veth1_vlan\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'ip6erspan0\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'wlan1\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bond_slave_1\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002fbd7000fddbdf250c00000014000380100003800c00058008000100", @ANYRES32=0x0, @ANYBLOB="0c00018008000100", @ANYRES32=r4], 0x34}}, 0x24048084) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'ip_vti0\x00'}) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000600), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000480)={'dummy0\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) 15.614489979s ago: executing program 1 (id=4544): close_range$auto(0x0, 0xfffffffffffff000, 0x2) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram2\x00', 0xe883, 0x0) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop6\x00', 0x101202, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r0, 0x4c00, 0x0) 5.948201739s ago: executing program 3 (id=4573): close_range$auto(0x0, 0xfffffffffffff000, 0x2) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram2\x00', 0xe883, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x4c00, 0x0) 5.563884037s ago: executing program 3 (id=4574): socket(0x2, 0x80002, 0x73) socket(0xa, 0x1, 0x84) madvise$auto(0x0, 0x2000040080000004, 0xe) read$auto(0xffffffffffffffff, &(0x7f00000000c0)='/sys/devices/porm/vhci_hcd.7/uwb2\xb6\x9d23-0:1.0/ep\xdf\x001/interval\x00\x00\x00\x00\x00', 0x2) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$auto_zero_fops_mem(0xffffffffffffff9c, &(0x7f0000000340), 0x80200, 0x0) pread64$auto(r0, &(0x7f0000000240)='\x03W\x96l\x15\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00', 0x100000002, 0x100000004) 5.401802114s ago: executing program 3 (id=4575): mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) r0 = socket(0x10, 0x2, 0x0) sendmsg$auto_CTRL_CMD_GETPOLICY(0xffffffffffffffff, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="0600", @ANYBLOB="843645247c3b63c26c8e29ba94b4460e6aae73f829cae64ef3312b564ed0c3a1f3b069baa59f1e972765240ea87ccc9e0b2db4fa43a0119d87d9b853fd86f021907cf855f62eef7075fc8633cb69fba9328977c126455a64ef93a98ccfbc4dd96e8f73a479c44bec4b1354c7bcd483fca0e1357fc89fd66fc4a65646e0ebf0d139728706b14cee8e9a9b1d70ddd9de84c1011ae0b1d874574ecc1209a2f8231f8a1c28224d1222ed4ffdde12bc49c01f07ef9aee6e", @ANYBLOB="010025bd", @ANYRES16=r0], 0x14}, 0x1, 0x0, 0x0, 0x825}, 0xc040804) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB='B'], 0x1ac}}, 0x40000) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x20342, 0x0) socket(0x10, 0x2, 0x0) openat$auto_proc_clear_refs_operations_internal(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/clear_refs\x00', 0x80101, 0x0) r1 = socket(0x10, 0x2, 0x0) close_range$auto(0x2, 0x8, 0x0) r2 = socket(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bond0\x00'}) bpf$auto(0x0, &(0x7f00000000c0)=@query={@target_fd=r0, 0x37c, 0x9, 0xb61, 0x4, @prog_cnt=0x288e2982, 0x0, 0x8, 0x2, 0x5, 0xfffffffffffffffe}, 0xf) socketpair$auto(0x1, 0x803, 0x8000000000000000, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) bpf$auto(0x2, &(0x7f00000001c0)=@raw_tracepoint={0x5, r4, 0x0, 0x3}, 0xc) recvmmsg$auto(r1, 0x0, 0x5, 0x0, 0x0) sendmmsg$auto(r0, &(0x7f0000000200)={{0x0, 0x4000, &(0x7f0000000100)={&(0x7f0000000080), 0x96bc}, 0x2, &(0x7f0000000380), 0x7, 0x4}, 0x9}, 0x7, 0x4008) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x1a000, 0x0) madvise$auto(0x0, 0xffffffffffff0005, 0x17) madvise$auto(0x0, 0xffffffffffff0001, 0x15) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/platform/vhci_hcd.12/usb33/bcdDevice\x00', 0x103042, 0x0) sendfile$auto(r3, r5, 0x0, 0xf) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) memfd_create$auto(&(0x7f0000000000)=',-\x00', 0x0) utimes$auto(0x0, 0xfffffffffffffffd) 5.178377976s ago: executing program 4 (id=4576): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) fanotify_init$auto(0x1f53, 0x2000000000002) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) fanotify_mark$auto(0x0, 0x401, 0x4, 0x4, 0x0) unshare$auto(0x40000080) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, 0x0, 0x100000a3d9) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0x387c0000000004, 0x19) madvise$auto(0x0, 0x2003f2, 0x15) flock$auto(r0, 0x2) madvise$auto(0x0, 0x7fffffffffffffff, 0xd) bpf$auto(0x21, 0x0, 0xc4a) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r1, &(0x7f0000000080)={0x0, 0x3}, 0x3) unshare$auto(0x20000080) fanotify_mark$auto(0x400000000000, 0x6, 0xa, 0x4, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system/memory/memory12/power/control\x00', 0x100, 0x0) r2 = openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fb0\x00', 0x121002, 0x0) ioctl$auto_FBIOGETCMAP(r2, 0x4604, &(0x7f0000000080)="127c19f12a4dae73af2b6487e5eda6149b7a714bfb1eb991f009606e1f6fa67cd1e603565a6d7deb6fbe538a24c59c07941d3a91d3c5ece0be95011f4cf59a49948c45f3ef5febfca88b5fdf566a905c6486201e839039decf528124f852ab7576a1d3730ab20218791de2b35753b54eb8636a4f2e05da3007ad225c69ffe36a7653ac64fec6") close_range$auto(0x2, 0x8, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x8c00, 0x0) ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) 4.122566385s ago: executing program 4 (id=4579): sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400c890}, 0x800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x40000) r0 = socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) r1 = fanotify_init$auto(0x602, 0x1) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000100)='/dev/radio6\x00', 0x8a240, 0x0) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x341102, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000280), 0x101000, 0x0) r4 = ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = socket(0xa, 0x1, 0x84) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) setsockopt$auto(0x3, 0x10000000084, 0x76, 0x0, 0x8) r6 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000140), r5) sendmsg$auto_NL80211_CMD_GET_MPP(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x358, r6, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@NL80211_ATTR_HE_OBSS_PD={0x84, 0x117, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_SR_CTRL={0x5, 0x6, 0x5}, @NL80211_HE_OBSS_PD_ATTR_BSS_COLOR_BITMAP={0x75, 0x4, "a2d648f402aba981aecd5f105e6d63aa9af434ae0c6420764ba45df72b4e02ce44d624af44c48fde0b79d38adf712e5f4eb6fd7f07e288e4a32406e4d2647c3b01adfee5939efc2a024bbcb308d3e98fcdd49ba9cc4c8b7a7530f84702c74e9cff131c3aabf1671de75cc00de707011e08"}]}, @NL80211_ATTR_FILS_DISCOVERY={0x214, 0x126, 0x0, 0x1, [@NL80211_FILS_DISCOVERY_ATTR_TMPL={0xcd, 0x3, "dcc0a75ebbbe4671eaf996f70fd87311de0f7e3214249836726994b3cc1fd839cb2077b0877fe6261621f4da490f1645d97a35c936a3746299270fc834955a1eef2fb7c90f4650066d69c6696018e660ddcec80f32f9595b7fe0cdec62a2fda595e84b2c5d358ce2e637804bc33ebc48b02907a915ae8a9d5e48203b3f2f3c331a1512d72d48ccd4f7b575a00b15942c5ae59896f16590dd685d45d23a8fc96f2f8b0695ccf67f42f1a8f16a5678b67bbe2a2f4da95e2941914be3a49ecd04cf642f14fce554d189dd"}, @NL80211_FILS_DISCOVERY_ATTR_INT_MAX={0x8, 0x2, 0x5ca}, @NL80211_FILS_DISCOVERY_ATTR_INT_MAX={0x8, 0x2, 0xfffffff7}, @NL80211_FILS_DISCOVERY_ATTR_INT_MIN={0x8, 0x1, 0x8}, @NL80211_FILS_DISCOVERY_ATTR_INT_MAX={0x8, 0x2, 0x8}, @NL80211_FILS_DISCOVERY_ATTR_INT_MAX={0x8, 0x2, 0x9}, @NL80211_FILS_DISCOVERY_ATTR_INT_MAX={0x8, 0x2, 0x7fff}, @NL80211_FILS_DISCOVERY_ATTR_TMPL={0xca, 0x3, "076cba094560054ebcb829d1378069624ef204371ea117a1c417924ab835ae19dc6e7232f7aa05e0267ec3ce1b66fc78f7a659c441ea5a6852fb29bc5a685ad06bce9c70ca56cc2b184555463227de24ff208026ecd0680644381e3079bf7b01b675600fdd3ff5e49b4d7a2b891e7e47ad35eff6b1b1cc0783193ad522a3d3e503c388e8759e6971a4d18f3cfb4a7dd8085f018a6a3400637796dc57f5035f026ecab1631d63897167b4c78f0ef17272eac33801ebe764943660db6dde9f6e4be3e062711086"}, @NL80211_FILS_DISCOVERY_ATTR_TMPL={0x39, 0x3, "cb14e02b3961309dd9fd6d78968ddcaf20853addccc70f2e11e056b89641595f4601f6dedb4afe7531b9e201bc44e52b0dba97a780"}, @NL80211_FILS_DISCOVERY_ATTR_INT_MAX={0x8, 0x2, 0x7ff}]}, @NL80211_ATTR_EHT_CAPABILITY={0xa0, 0x136, "9229032955a18a8d4e738216603485a23448a4635e781f6633480383b5863bbebd721f36d86e808b1cb765109532524a2c5ed2b62860e331bd78717035d6a55c5d9c6873f7e12216ed91e39c6b700b79bce4df417955172eaeabd4a09aede7caa3910b15bcd5189aa23aa6fd2dd44b11eb8cfadb1dc9f2b50bebd9765a665caff83ed3ffccc3c0bef4c459c3280ecc6b50d495194ad773aa20053558"}, @NL80211_ATTR_SSID={0xc, 0x34, "2c6e0c49afda3a4f"}]}, 0x358}, 0x1, 0x0, 0x0, 0x4040053}, 0x8800) ioctl$auto(0x3, 0xae41, r0) ioctl$auto_KVM_CREATE_VM(r4, 0xaea2, 0x0) futex$auto(&(0x7f0000000740)=0x9, 0x3, 0xf822, &(0x7f0000000780)={0x1, 0x9}, &(0x7f00000007c0)=0x7677b1f8, 0x8) lseek$auto(0xffffffffffffffff, 0x3, 0x200004) r7 = openat$auto_vhost_vsock_fops_vsock(0xffffffffffffff9c, &(0x7f0000001f00), 0x101002, 0x0) utimensat$auto(r1, &(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x1, 0x5}, 0xfffffffb) write$auto(r7, &(0x7f0000001f40)='!+*\x00', 0x8) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$auto_batadv(&(0x7f0000000680), r9) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000006c0)={'batadv0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00', 0x0}) sendmsg$auto_BATADV_CMD_GET_NEIGHBORS(r8, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000880)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="110b27bd7000fbdbdf250900000008000300", @ANYRES32=r11, @ANYBLOB="08070000c9d786235f32c41c361fafc6a1d71617b8afa078b8fbc9e9723bc837391c8eb2d6e1862676949581cdbaae508c7315c08c40c6b7ae01cd196d54671513dc72c038e41d7872d31767e07b3649cbdd5295e04aa1140cc0eb66b049cff5d0c5ebcefc1dadbb7843c58fd5f11cea5334c36e3961cd6738f685ca6f55caef22f19e1cfa542f6997b6993f3ca1d9b5867cb9dd3caa09000000", @ANYRES32=r12, @ANYBLOB], 0x24}, 0x1, 0x0, 0x0, 0x4001}, 0x9800) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bus/usb/027/001\x00', 0x4a901, 0x0) 3.943114754s ago: executing program 3 (id=4580): mmap$auto(0x0, 0x4020009, 0xdb, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) sendfile$auto(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x442) r0 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/fail-nth\x00', 0x2, 0x0) write$auto(r0, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) r1 = socket(0x2, 0x3, 0xa) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/neigh/batadv0/mcast_solicit\x00', 0x2000, 0x0) connect$auto(r1, &(0x7f0000000080)=@in={0x2, 0x0, @empty}, 0x54) socketpair$auto(0x1, 0x5, 0x8000000000000000, 0x0) setsockopt$auto(0x3, 0x0, 0xa, 0x0, 0x10000) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) write$auto(0x3, 0x0, 0x100082) close_range$auto(0x2, 0x8, 0x0) 3.302755566s ago: executing program 4 (id=4583): mmap$auto(0x0, 0x400008, 0x4, 0x40009b72, 0x2, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) process_vm_readv$auto(0x0, 0x0, 0x1, 0x0, 0x6, 0x0) madvise$auto(0x0, 0xffffffffffff0005, 0x19) r0 = socket(0xa, 0x5, 0x84) sendto$auto(r0, 0x0, 0x100000401, 0x7f, &(0x7f0000000000)=@generic={0xb, "e2e18340cba8fe8000"}, 0x0) madvise$auto(0x0, 0x2003f2, 0x15) madvise$auto(0x0, 0x1010001, 0x100000003) madvise$auto(0x1000, 0x400050, 0x9) r1 = prctl$auto_PR_SET_MM_START_BRK(0x9, 0x6, 0x0, 0x6, 0x4) fcntl$auto_F_SETSIG(r1, 0xa, 0x1) write$auto(0x1, 0x0, 0x80000000) preadv$auto(0x40000000000003, 0x0, 0x6, 0xe27c, 0x8) openat$auto_ppp_device_fops_ppp_generic(0xffffffffffffff9c, 0x0, 0x92602, 0x0) mmap$auto(0x7fffffffc, 0x694, 0x5, 0xd494, 0xfffffffffffffffa, 0x8002) ioctl$auto_SNDCTL_DSP_SETFMT(0xffffffffffffffff, 0xc0045005, 0x0) getpid() munmap$auto(0x8000, 0xffffffff) ioctl$auto(0x4000000000000c8, 0x3, 0x3) 2.925125734s ago: executing program 2 (id=4585): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) close_range$auto(0x0, 0xfffffffffffff001, 0x2) futex$auto(0x0, 0x6, 0x47, 0x0, 0x0, 0xff) r0 = open(0x0, 0x1e7d43, 0xa6) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x80, 0x0) mmap$auto(0x0, 0xa, 0xdb, 0x9b72, 0x5, 0x8000) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r1, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x140082, 0x0) ioctl$auto_USBDEVFS_SUBMITURB32(r0, 0x802c550a, &(0x7f0000000140)=ANY=[@ANYBLOB="08000000030000001d736774bab3ac8bdbc91f3e621d497ebaf6f3d562a859090000000400000000000000060000005606000007000000020000200500000001f8ffff40"]) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0xa0340, 0x0) socket(0x2, 0x80002, 0x73) socket(0x2, 0x801, 0x106) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x2202, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x6, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_tap_fops_tap(0xffffffffffffff9c, &(0x7f0000000080), 0x101, 0x0) r3 = socket(0x10, 0x2, 0xf) r4 = bpf$auto(0x0, &(0x7f0000000200)=@bpf_attr_4={0x1e, r3, 0x5}, 0xd) bpf$auto(0x2, &(0x7f0000000080)=@iter_create={r4, 0x98}, 0x5) r5 = socket(0xa, 0x1, 0x84) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) unshare$auto(0x40000080) getsockopt$auto(r5, 0x84, 0x75, 0x0, 0x0) 2.384077954s ago: executing program 4 (id=4586): socket(0x2, 0x80002, 0x73) socket(0xa, 0x1, 0x84) madvise$auto(0x0, 0x2000040080000004, 0xe) read$auto(0xffffffffffffffff, &(0x7f00000000c0)='/sys/devices/porm/vhci_hcd.7/uwb2\xb6\x9d23-0:1.0/ep\xdf\x001/interval\x00\x00\x00\x00\x00', 0x2) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$auto_zero_fops_mem(0xffffffffffffff9c, &(0x7f0000000340), 0x80200, 0x0) pread64$auto(r0, &(0x7f0000000240)='\x03W\x96l\x15\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00', 0x100000002, 0x100000004) 2.34657462s ago: executing program 2 (id=4587): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x22004840}, 0x4001) sendmsg$auto_BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x24, 0x0, 0x300, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_HOP_PENALTY={0x0, 0x35, 0x6}, @BATADV_ATTR_TT_CRC32={0x8, 0x13, 0x10001}]}, 0x24}, 0x1, 0x0, 0x0, 0x4c894}, 0x4008800) sendmmsg$auto(0x3, 0x0, 0x3, 0x0) sendmsg$auto_NETDEV_CMD_QUEUE_GET(0xffffffffffffffff, &(0x7f0000003040)={0x0, 0x0, &(0x7f0000003000)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x20008810) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB='!\x00'], 0x1ac}, 0x1, 0x0, 0x0, 0x44}, 0x40090) r0 = socket(0x10, 0x2, 0x0) sendmmsg$auto(r0, &(0x7f0000000080)={{0x0, 0x8002, &(0x7f00000002c0)={0x0, 0xc4}, 0x2, 0x0, 0x0, 0x1}, 0x5}, 0x3, 0x20000000) 2.17885155s ago: executing program 3 (id=4588): mmap$auto(0x0, 0x2020009, 0x3, 0x9000000eb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0xa, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/platform/vhci_hcd.0/usbip_debug\x00', 0x8002, 0x0) r0 = openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sg0\x00', 0xa402, 0x0) r1 = inotify_init1$auto(0x3000000000000) inotify_add_watch$auto(r1, 0x0, 0x8000) write$auto_hwsim_fops_rx_rssi_(r1, &(0x7f0000000140)="7a7c50627acda4e993c1b5c24c71439a1eace7b7109de058d3c76fbe1cb94b38b4e3d7119f9036578914cfe08961470545de4369c6fdd7099c48dc8b53cb15d74901fcaed2a3523e36697bd3e3ca5e9d63ff305dbf9c1a01435782b38fd799fc108f999ab2c06519952317f08687ac73dd1888694e59e74309cb6371190b1b0a9d46fa696e54c91e2326e97f9d2b48f4f3e8b30339cc970c4bef6f161b9d6be8420d629978f4f9ed30a89b978e0542846898709618e6a4d1a5a723140849c098009302354cd9f4852ec39252d91c1dfaae7d5389", 0xd4) ioctl$auto_SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000080)="ec") r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000004440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) sendmsg$auto_OVS_DP_CMD_NEW(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004540)={&(0x7f0000000140)={0x40, r3, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@OVS_DP_ATTR_IFINDEX={0x8, 0x9, r4}, @OVS_DP_ATTR_USER_FEATURES={0x8, 0x5, 0x6}, @OVS_DP_ATTR_NAME={0x11, 0x1, 'ovs_\x12\xff\xfe\x02\xff\xfe?\x00/'}, @OVS_DP_ATTR_UPCALL_PID={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x2000000) read$auto(r0, 0x0, 0x1001) write$auto(0x3, 0x0, 0x5c8) 1.988958298s ago: executing program 2 (id=4589): close_range$auto(0x0, 0xfffffffffffff000, 0x2) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop6\x00', 0x101202, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r0, 0x4c00, 0x0) 1.852073837s ago: executing program 3 (id=4590): r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x745100, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/midiC2D0\x00', 0x0, 0x0) r1 = openat$auto_mousedev_fops_mousedev(0xffffffffffffff9c, &(0x7f0000001140)='/dev/psaux\x00', 0x42000, 0x0) io_uring_setup$auto(0x59, &(0x7f0000000080)={0x7ffffffc, 0x8, 0x3000, 0x6, 0x7, 0x400b, r1, [], {0x6, 0x6, 0x8c48, 0x29a, 0x9, 0x80, 0x104, 0x6, 0x4}, {0x100, 0x1, 0x101, 0x85, 0x2, 0x24, 0xfe000000, 0x8, 0x3}}) r2 = openat$auto_vhci_fops_hci_vhci(0xffffffffffffff9c, &(0x7f0000000d00), 0x0, 0x0) read$auto_vhci_fops_hci_vhci(r2, &(0x7f0000000d40)=""/16, 0x10) select$auto(0xe, 0x0, 0x0, &(0x7f0000000580)={[0x1ff, 0x8000, 0xd, 0x1, 0x948d, 0x3, 0x10015f4da0a, 0xd, 0x7, 0x64c1, 0x8000001f, 0x8, 0x6d3e, 0xc, 0x2, 0x2]}, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) socket(0x2b, 0x1, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/zswap/parameters/compressor\x00', 0xc0002, 0x0) write$auto_ocfs2_control_fops_stack_user(r3, &(0x7f0000003900)='\t', 0x1) madvise$auto(0x0, 0xffffffffffff0001, 0x15) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) write$auto(0xffffffffffffffff, 0x0, 0x85) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) select$auto(0xe, 0x0, 0x0, 0x0, 0x0) getpgid$auto(0x0) ioctl$auto(0x3, 0x80000000, 0xffffffffffffffff) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x200000000000000, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x2003f2, 0x15) syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/mlx4_core/parameters/use_prio\x00', 0x472a43, 0x0) 1.761711552s ago: executing program 2 (id=4591): unshare$auto(0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000180), r0) sendmsg$auto_OVS_DP_CMD_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000200)={0x2c, r1, 0x1, 0x70bd26, 0x25dfdbf8, {}, [@OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x4}, @OVS_DP_ATTR_NAME={0x8, 0x1, 'HfR\x00'}, @OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x801}, 0x80) r2 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000080), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_OVS_DP_CMD_DEL(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0109080000000000002502"], 0x38}, 0x1, 0x0, 0x0, 0x20040011}, 0x20000000) mlockall$auto(0x7) mremap$auto(0x0, 0x4, 0x4, 0x7, 0x100000000) openat$auto_ftrace_set_event_notrace_pid_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing/set_event_notrace_pid\x00', 0x40000, 0x0) read$auto(0xffffffffffffffff, 0x0, 0x1) r4 = openat$auto_trace_options_fops_trace(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/tracing/options/blk_cgname\x00', 0x5, 0x0) write$auto(r4, 0x0, 0x6) socket(0x1d, 0x2, 0x2) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) socketpair$auto(0x4, 0x2, 0x3, 0x0) socket(0x10, 0x1, 0x0) read$auto(0x3, 0x0, 0x10) write$auto(0x3, 0x0, 0xffd8) r5 = socket(0x10, 0x2, 0x0) mmap$auto(0x0, 0x400008, 0xde, 0x11, r5, 0x8000) socket(0x80000000000000a, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'tunl0\x00'}) 1.738681226s ago: executing program 4 (id=4592): mmap$auto(0x0, 0x20009, 0x10, 0xeb1, 0x401, 0x4008000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/system/memory/memory12/power/control\x00', 0x100, 0x0) close_range$auto(0x2, 0x8, 0x0) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x8c00, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/scsi/scsi\x00', 0x400, 0x0) mmap$auto(0x0, 0x9, 0x3, 0x8012, 0x3, 0x8000) r1 = ioctl$auto_KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000040)='/dev/tty38\x00', 0x301, 0x0) write$auto_tty_fops_tty_io(r2, &(0x7f0000000080)="976f09bd689a850edbe36136c8515f5b3331280bb0b4ba0edd7932ab185cca0dd500a70a2c064833fd9b4b", 0x2b) r3 = syz_genetlink_get_family_id$auto_batadv(&(0x7f0000000080), r1) sendmsg$auto_BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@BATADV_ATTR_TT_FLAGS={0x8, 0x15, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000015}, 0x4040090) 1.210115755s ago: executing program 2 (id=4593): mmap$auto(0x0, 0x400008, 0x200, 0x9b72, 0x2, 0x8000) openat$auto_proc_mem_operations_base(0xffffffffffffff9c, &(0x7f0000001640)='/proc/self/mem\x00', 0x401, 0x0) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) socket(0xa, 0x3, 0x3b) mmap$auto(0xfff, 0x40000b, 0xdf, 0x9b72, 0x2, 0x2) io_uring_setup$auto(0x1, 0x0) futex$auto(0x0, 0x6, 0x8, 0x0, 0x0, 0x80000001) futex$auto(0x0, 0x403, 0x40000006, 0x0, 0x0, 0x80000001) connect$auto(0x3, &(0x7f0000000000)=@llc={0x1a, 0x302, 0xa, 0x1, 0x5, 0x7f, @link_local}, 0x58) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) read$auto_tracing_cpumask_fops_trace(0xffffffffffffffff, &(0x7f0000001340)=""/48, 0x30) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual/graphics/fbcon/rotate_all\x00', 0xa001, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r0 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x2000, 0x0) read$auto(r0, 0x0, 0x1ff) write$auto(0x3, 0x0, 0xfdef) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x129882, 0x0) r1 = openat$auto_uinput_fops_uinput(0xffffffffffffff9c, 0x0, 0x610841, 0x0) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000001380)='/sys/module/go7007/parameters/index\x00', 0x1a9581, 0x0) write$auto(r2, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) mknod$auto(&(0x7f0000001040)=':,\x00', 0xca, 0xfffffffa) r3 = openat$auto_rng_chrdev_ops_core(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) r4 = ioctl$auto_TUNGETSNDBUF(r0, 0x800454d3, &(0x7f00000011c0)=0x19) bpf$auto_BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001480)=@link_update={r3, @new_prog_fd=r1, 0x7f, @old_map_fd=r4}, 0x5) read$auto_rng_chrdev_ops_core(r3, &(0x7f0000000040)=""/4096, 0xfffffe82) openat$auto_proc_page_owner_operations_page_owner(0xffffffffffffff9c, &(0x7f0000001300), 0x800, 0x0) execve$auto(&(0x7f0000001080)=':,\x00', &(0x7f0000001100)=&(0x7f00000010c0)='/sys/devices/virtual/graphics/fbcon/rotate_all\x00', &(0x7f0000001180)=&(0x7f0000001140)='/dev/hwrng\x00') 2.221642ms ago: executing program 2 (id=4594): mmap$auto(0x0, 0x400008, 0x4, 0x40009b72, 0x2, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) process_vm_readv$auto(0x0, 0x0, 0x1, 0x0, 0x6, 0x0) madvise$auto(0x0, 0xffffffffffff0005, 0x19) r0 = socket(0xa, 0x5, 0x84) sendto$auto(r0, 0x0, 0x100000401, 0x7f, &(0x7f0000000000)=@generic={0xb, "e2e18340cba8fe8000"}, 0x0) madvise$auto(0x0, 0x2003f2, 0x15) madvise$auto(0x0, 0x1010001, 0x100000003) madvise$auto(0x1000, 0x400050, 0x9) r1 = prctl$auto_PR_SET_MM_START_BRK(0x9, 0x6, 0x0, 0x6, 0x4) fcntl$auto_F_SETSIG(r1, 0xa, 0x1) write$auto(0x1, 0x0, 0x80000000) preadv$auto(0x40000000000003, 0x0, 0x6, 0xe27c, 0x8) openat$auto_ppp_device_fops_ppp_generic(0xffffffffffffff9c, 0x0, 0x92602, 0x0) mmap$auto(0x7fffffffc, 0x694, 0x5, 0xd494, 0xfffffffffffffffa, 0x8002) ioctl$auto_SNDCTL_DSP_SETFMT(0xffffffffffffffff, 0xc0045005, 0x0) getpid() munmap$auto(0x8000, 0xffffffff) ioctl$auto(0x4000000000000c8, 0x3, 0x3) 0s ago: executing program 4 (id=4601): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) sendmsg$auto_NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r0 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sendmsg$auto_NL80211_CMD_GET_WIPHY(0xffffffffffffffff, 0x0, 0xc004) recvmmsg$auto(0xffffffffffffffff, &(0x7f0000000180)={{0x0, 0x7, 0x0, 0x0, 0x0, 0x2, 0x6}, 0xfffffffc}, 0x10a, 0x6, 0x0) openat$auto_fops_x16_ro_(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/debug/ieee80211/phy0/netdev:wlan0/dormant_links\x00', 0x109a42, 0x0) mmap$auto(0x0, 0x400008, 0x5f, 0x9b72, 0x2, 0x8000) r1 = openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/event0\x00', 0x2000, 0x0) r2 = syz_genetlink_get_family_id$auto_ovs_flow(&(0x7f0000000180), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_OVS_FLOW_CMD_GET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="d2435be60bf9041aa3bfcef53c998f010029bd7000fbdbdf250300000071a563a318000110e483f6352a"], 0x30}, 0x1, 0x0, 0x0, 0x40010}, 0x448c0) ioctl$auto(r1, 0x80004507, 0x10000000000402) close_range$auto(r0, r1, 0xb) madvise$auto(0x8000, 0x87fff, 0xc) clone$auto(0x9001, 0x5, 0xffffffffffffffff, 0xfffffffffffffffc, 0x6) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, 0x0, 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x80002, 0x73) mmap$auto(0x0, 0x20009, 0xe3, 0x100000eb1, 0x40000000000a1, 0x8000) kernel console output (not intermixed with test programs): 1051.719781][T24102] ? do_raw_spin_lock+0x128/0x260 [ 1051.719802][T24102] ? find_held_lock+0x2b/0x80 [ 1051.719817][T24102] ? get_signal+0x7e0/0x21e0 [ 1051.719836][T24102] do_group_exit+0xd5/0x2a0 [ 1051.719860][T24102] get_signal+0x1ec7/0x21e0 [ 1051.719881][T24102] ? ksys_write+0x190/0x250 [ 1051.719899][T24102] ? __pfx_get_signal+0x10/0x10 [ 1051.719917][T24102] ? do_futex+0x192/0x350 [ 1051.719938][T24102] arch_do_signal_or_restart+0x91/0x770 [ 1051.719959][T24102] ? __might_fault+0xc5/0x140 [ 1051.719975][T24102] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1051.720001][T24102] ? __pfx___x64_sys_futex+0x10/0x10 [ 1051.720025][T24102] exit_to_user_mode_loop+0x86/0x4b0 [ 1051.720045][T24102] ? rcu_is_watching+0x12/0xc0 [ 1051.720061][T24102] do_syscall_64+0x4ea/0xf80 [ 1051.720081][T24102] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1051.720097][T24102] RIP: 0033:0x7f046dd9aeb9 [ 1051.720109][T24102] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1051.720124][T24102] RSP: 002b:00007f046eb7e0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1051.720139][T24102] RAX: fffffffffffffe00 RBX: 00007f046e016098 RCX: 00007f046dd9aeb9 [ 1051.720149][T24102] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f046e016098 [ 1051.720159][T24102] RBP: 00007f046e016090 R08: 0000000000000000 R09: 0000000000000000 [ 1051.720168][T24102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1051.720176][T24102] R13: 00007f046e016128 R14: 00007fff4f78b290 R15: 00007fff4f78b378 [ 1051.720196][T24102] [ 1052.001824][T24108] netlink: 'syz.3.4041': attribute type 19 has an invalid length. [ 1052.009722][T24108] netlink: 334 bytes leftover after parsing attributes in process `syz.3.4041'. [ 1052.446545][T24112] FAULT_INJECTION: forcing a failure. [ 1052.446545][T24112] name failslab, interval 1, probability 0, space 0, times 0 [ 1052.493273][T24112] CPU: 0 UID: 0 PID: 24112 Comm: syz.2.4043 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1052.493304][T24112] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1052.493311][T24112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1052.493321][T24112] Call Trace: [ 1052.493327][T24112] [ 1052.493334][T24112] dump_stack_lvl+0x100/0x190 [ 1052.493357][T24112] should_fail_ex.cold+0x5/0xa [ 1052.493388][T24112] should_failslab+0xc2/0x120 [ 1052.493410][T24112] kmem_cache_alloc_noprof+0x83/0x780 [ 1052.493430][T24112] ? path_mount+0x1ded/0x23c0 [ 1052.493448][T24112] ? alloc_vfsmnt+0x23/0x6b0 [ 1052.493471][T24112] ? alloc_vfsmnt+0x23/0x6b0 [ 1052.493491][T24112] alloc_vfsmnt+0x23/0x6b0 [ 1052.493512][T24112] path_mount+0x1e47/0x23c0 [ 1052.493534][T24112] ? __pfx_path_mount+0x10/0x10 [ 1052.493553][T24112] ? kmem_cache_free+0x143/0x720 [ 1052.493572][T24112] ? strncpy_from_user+0x19d/0x2d0 [ 1052.493596][T24112] ? putname+0xf5/0x1a0 [ 1052.493618][T24112] ? putname+0xf5/0x1a0 [ 1052.493636][T24112] ? putname+0xfa/0x1a0 [ 1052.493657][T24112] ? __x64_sys_mount+0x293/0x310 [ 1052.493676][T24112] __x64_sys_mount+0x293/0x310 [ 1052.493696][T24112] ? __pfx___x64_sys_mount+0x10/0x10 [ 1052.493721][T24112] do_syscall_64+0xc9/0xf80 [ 1052.493740][T24112] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1052.493755][T24112] RIP: 0033:0x7f1ad659aeb9 [ 1052.493768][T24112] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1052.493782][T24112] RSP: 002b:00007f1ad73b2028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1052.493798][T24112] RAX: ffffffffffffffda RBX: 00007f1ad6815fa0 RCX: 00007f1ad659aeb9 [ 1052.493810][T24112] RDX: 0000200000000580 RSI: 00002000000000c0 RDI: 0000000000000000 [ 1052.493820][T24112] RBP: 00007f1ad6608c1f R08: 0000000000000000 R09: 0000000000000000 [ 1052.493830][T24112] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 [ 1052.493839][T24112] R13: 00007f1ad6816038 R14: 00007f1ad6815fa0 R15: 00007ffdacaecee8 [ 1052.493859][T24112] [ 1052.815593][T24121] HfR: entered promiscuous mode [ 1052.826183][T24121] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4047'. [ 1052.835261][T24121] HfR: left promiscuous mode [ 1052.992505][T24126] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4048'. [ 1053.092811][T24129] Invalid ELF header magic: != ELF [ 1053.491621][T24125] openvswitch: HfR: Dropping previously announced user features [ 1053.512794][T24126] HfR: left promiscuous mode [ 1053.691408][T24117] Invalid ELF header magic: != ELF [ 1054.158027][T24152] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.4.4052: iget: checksum invalid [ 1054.242443][T24152] faux_driver regulatory: loading /lib/firmware/updates/syzkaller/regulatory.db failed with error -74 [ 1054.358269][T24152] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.4.4052: iget: checksum invalid [ 1054.455560][T24152] faux_driver regulatory: loading /lib/firmware/updates/regulatory.db failed with error -74 [ 1054.508391][T24152] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.4.4052: iget: checksum invalid [ 1054.538549][T24152] faux_driver regulatory: loading /lib/firmware/syzkaller/regulatory.db failed with error -74 [ 1054.565724][T24152] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.4.4052: iget: checksum invalid [ 1054.595555][T24152] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -74 [ 1054.629285][T24152] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -74 [ 1054.639365][T24152] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 1054.811036][T19635] Bluetooth: hci6: unexpected event 0x33 length: 124 > 10 [ 1054.927706][T24163] Invalid ELF header magic: != ELF [ 1055.007974][T24161] FAULT_INJECTION: forcing a failure. [ 1055.007974][T24161] name failslab, interval 1, probability 0, space 0, times 0 [ 1055.062089][T24161] CPU: 0 UID: 0 PID: 24161 Comm: syz.4.4055 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1055.062121][T24161] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1055.062127][T24161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1055.062137][T24161] Call Trace: [ 1055.062143][T24161] [ 1055.062149][T24161] dump_stack_lvl+0x100/0x190 [ 1055.062173][T24161] should_fail_ex.cold+0x5/0xa [ 1055.062199][T24161] should_failslab+0xc2/0x120 [ 1055.062220][T24161] kmem_cache_alloc_noprof+0x83/0x780 [ 1055.062239][T24161] ? path_mount+0x1ded/0x23c0 [ 1055.062258][T24161] ? alloc_vfsmnt+0x23/0x6b0 [ 1055.062281][T24161] ? alloc_vfsmnt+0x23/0x6b0 [ 1055.062302][T24161] alloc_vfsmnt+0x23/0x6b0 [ 1055.062324][T24161] path_mount+0x1e47/0x23c0 [ 1055.062345][T24161] ? __pfx_path_mount+0x10/0x10 [ 1055.062364][T24161] ? kmem_cache_free+0x143/0x720 [ 1055.062380][T24161] ? strncpy_from_user+0x19d/0x2d0 [ 1055.062399][T24161] ? putname+0xf5/0x1a0 [ 1055.062430][T24161] ? putname+0xf5/0x1a0 [ 1055.062447][T24161] ? putname+0xfa/0x1a0 [ 1055.062467][T24161] ? __x64_sys_mount+0x293/0x310 [ 1055.062487][T24161] __x64_sys_mount+0x293/0x310 [ 1055.062507][T24161] ? __pfx___x64_sys_mount+0x10/0x10 [ 1055.062532][T24161] do_syscall_64+0xc9/0xf80 [ 1055.062551][T24161] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1055.062566][T24161] RIP: 0033:0x7f046dd9aeb9 [ 1055.062579][T24161] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1055.062594][T24161] RSP: 002b:00007f046eb9f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1055.062611][T24161] RAX: ffffffffffffffda RBX: 00007f046e015fa0 RCX: 00007f046dd9aeb9 [ 1055.062621][T24161] RDX: 0000200000000580 RSI: 00002000000000c0 RDI: 0000000000000000 [ 1055.062630][T24161] RBP: 00007f046de08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1055.062639][T24161] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 [ 1055.062648][T24161] R13: 00007f046e016038 R14: 00007f046e015fa0 R15: 00007fff4f78b378 [ 1055.062667][T24161] [ 1055.893935][T24185] netlink: 186 bytes leftover after parsing attributes in process `syz.2.4063'. [ 1056.057475][T24185] zswap: compressor not available [ 1056.245510][T24199] Invalid ELF header magic: != ELF [ 1056.421341][T19366] Bluetooth: hci2: Opcode 0x0c03 failed: -110 [ 1056.452996][T24204] HfR: entered promiscuous mode [ 1056.500990][T24204] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4068'. [ 1056.544004][T24204] HfR: left promiscuous mode [ 1056.829342][T24216] FAULT_INJECTION: forcing a failure. [ 1056.829342][T24216] name failslab, interval 1, probability 0, space 0, times 0 [ 1056.863204][T24224] FAULT_INJECTION: forcing a failure. [ 1056.863204][T24224] name failslab, interval 1, probability 0, space 0, times 0 [ 1056.905602][T24216] CPU: 0 UID: 0 PID: 24216 Comm: syz.4.4071 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1056.905633][T24216] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1056.905640][T24216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1056.905650][T24216] Call Trace: [ 1056.905656][T24216] [ 1056.905663][T24216] dump_stack_lvl+0x100/0x190 [ 1056.905687][T24216] should_fail_ex.cold+0x5/0xa [ 1056.905712][T24216] should_failslab+0xc2/0x120 [ 1056.905734][T24216] kmem_cache_alloc_noprof+0x83/0x780 [ 1056.905753][T24216] ? path_mount+0x1ded/0x23c0 [ 1056.905772][T24216] ? alloc_vfsmnt+0x23/0x6b0 [ 1056.905795][T24216] ? alloc_vfsmnt+0x23/0x6b0 [ 1056.905815][T24216] alloc_vfsmnt+0x23/0x6b0 [ 1056.905836][T24216] path_mount+0x1e47/0x23c0 [ 1056.905868][T24216] ? __pfx_path_mount+0x10/0x10 [ 1056.905888][T24216] ? kmem_cache_free+0x143/0x720 [ 1056.905904][T24216] ? strncpy_from_user+0x19d/0x2d0 [ 1056.905925][T24216] ? putname+0xf5/0x1a0 [ 1056.905946][T24216] ? putname+0xf5/0x1a0 [ 1056.905962][T24216] ? putname+0xfa/0x1a0 [ 1056.905983][T24216] ? __x64_sys_mount+0x293/0x310 [ 1056.906002][T24216] __x64_sys_mount+0x293/0x310 [ 1056.906022][T24216] ? __pfx___x64_sys_mount+0x10/0x10 [ 1056.906047][T24216] do_syscall_64+0xc9/0xf80 [ 1056.906067][T24216] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1056.906082][T24216] RIP: 0033:0x7f046dd9aeb9 [ 1056.906095][T24216] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1056.906113][T24216] RSP: 002b:00007f046eb9f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1056.906129][T24216] RAX: ffffffffffffffda RBX: 00007f046e015fa0 RCX: 00007f046dd9aeb9 [ 1056.906140][T24216] RDX: 0000200000000580 RSI: 00002000000000c0 RDI: 0000000000000000 [ 1056.906150][T24216] RBP: 00007f046de08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1056.906160][T24216] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 [ 1056.906170][T24216] R13: 00007f046e016038 R14: 00007f046e015fa0 R15: 00007fff4f78b378 [ 1056.906191][T24216] [ 1057.157160][T24224] CPU: 0 UID: 0 PID: 24224 Comm: syz.2.4072 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1057.157189][T24224] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1057.157194][T24224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1057.157204][T24224] Call Trace: [ 1057.157209][T24224] [ 1057.157215][T24224] dump_stack_lvl+0x100/0x190 [ 1057.157238][T24224] should_fail_ex.cold+0x5/0xa [ 1057.157264][T24224] should_failslab+0xc2/0x120 [ 1057.157285][T24224] __kvmalloc_node_noprof+0x101/0xac0 [ 1057.157304][T24224] ? find_held_lock+0x2b/0x80 [ 1057.157319][T24224] ? proc_sys_call_handler+0x169/0x5a0 [ 1057.157342][T24224] ? proc_sys_call_handler+0x2c7/0x5a0 [ 1057.157368][T24224] ? proc_sys_call_handler+0x2c7/0x5a0 [ 1057.157389][T24224] proc_sys_call_handler+0x2c7/0x5a0 [ 1057.157412][T24224] ? __pfx_proc_sys_call_handler+0x10/0x10 [ 1057.157441][T24224] vfs_write+0x6ac/0x1070 [ 1057.157459][T24224] ? __pfx_proc_sys_write+0x10/0x10 [ 1057.157482][T24224] ? __pfx_vfs_write+0x10/0x10 [ 1057.157497][T24224] ? find_held_lock+0x2b/0x80 [ 1057.157523][T24224] ksys_write+0x12a/0x250 [ 1057.157540][T24224] ? __pfx_ksys_write+0x10/0x10 [ 1057.157562][T24224] do_syscall_64+0xc9/0xf80 [ 1057.157582][T24224] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1057.157597][T24224] RIP: 0033:0x7f1ad659aeb9 [ 1057.157610][T24224] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1057.157623][T24224] RSP: 002b:00007f1ad73b2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1057.157639][T24224] RAX: ffffffffffffffda RBX: 00007f1ad6815fa0 RCX: 00007f1ad659aeb9 [ 1057.157649][T24224] RDX: 0000000000000073 RSI: 0000000000000000 RDI: 0000000000000004 [ 1057.157658][T24224] RBP: 00007f1ad73b2090 R08: 0000000000000000 R09: 0000000000000000 [ 1057.157667][T24224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1057.157676][T24224] R13: 00007f1ad6816038 R14: 00007f1ad6815fa0 R15: 00007ffdacaecee8 [ 1057.157696][T24224] [ 1058.904155][T24267] NFSD: Failed to start, no listeners configured. [ 1059.466552][T24278] netlink: 350 bytes leftover after parsing attributes in process `syz.4.4083'. [ 1059.546567][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1059.553162][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1059.639301][T24281] FAULT_INJECTION: forcing a failure. [ 1059.639301][T24281] name failslab, interval 1, probability 0, space 0, times 0 [ 1059.767098][T24281] CPU: 0 UID: 0 PID: 24281 Comm: syz.2.4084 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1059.767128][T24281] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1059.767134][T24281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1059.767144][T24281] Call Trace: [ 1059.767150][T24281] [ 1059.767156][T24281] dump_stack_lvl+0x100/0x190 [ 1059.767179][T24281] should_fail_ex.cold+0x5/0xa [ 1059.767205][T24281] should_failslab+0xc2/0x120 [ 1059.767226][T24281] kmem_cache_alloc_noprof+0x83/0x780 [ 1059.767245][T24281] ? path_mount+0x1ded/0x23c0 [ 1059.767263][T24281] ? alloc_vfsmnt+0x23/0x6b0 [ 1059.767286][T24281] ? alloc_vfsmnt+0x23/0x6b0 [ 1059.767305][T24281] alloc_vfsmnt+0x23/0x6b0 [ 1059.767326][T24281] path_mount+0x1e47/0x23c0 [ 1059.767348][T24281] ? __pfx_path_mount+0x10/0x10 [ 1059.767367][T24281] ? kmem_cache_free+0x143/0x720 [ 1059.767382][T24281] ? strncpy_from_user+0x19d/0x2d0 [ 1059.767401][T24281] ? putname+0xf5/0x1a0 [ 1059.767422][T24281] ? putname+0xf5/0x1a0 [ 1059.767439][T24281] ? putname+0xfa/0x1a0 [ 1059.767459][T24281] ? __x64_sys_mount+0x293/0x310 [ 1059.767479][T24281] __x64_sys_mount+0x293/0x310 [ 1059.767498][T24281] ? __pfx___x64_sys_mount+0x10/0x10 [ 1059.767523][T24281] do_syscall_64+0xc9/0xf80 [ 1059.767542][T24281] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1059.767557][T24281] RIP: 0033:0x7f1ad659aeb9 [ 1059.767571][T24281] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1059.767585][T24281] RSP: 002b:00007f1ad73b2028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1059.767601][T24281] RAX: ffffffffffffffda RBX: 00007f1ad6815fa0 RCX: 00007f1ad659aeb9 [ 1059.767612][T24281] RDX: 0000200000000580 RSI: 00002000000000c0 RDI: 0000000000000000 [ 1059.767621][T24281] RBP: 00007f1ad6608c1f R08: 0000000000000000 R09: 0000000000000000 [ 1059.767631][T24281] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 [ 1059.767640][T24281] R13: 00007f1ad6816038 R14: 00007f1ad6815fa0 R15: 00007ffdacaecee8 [ 1059.767660][T24281] [ 1062.332395][ T30] audit: type=1800 audit(1769485912.960:14): pid=24344 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.4096" name="SYSV00000008" dev="tmpfs" ino=0 res=0 errno=0 [ 1062.432503][T24335] zswap: compressor not available [ 1062.921573][T24355] Invalid ELF header magic: != ELF [ 1063.436439][T24361] netlink: 186 bytes leftover after parsing attributes in process `syz.2.4101'. [ 1063.641526][T24361] zswap: compressor not available [ 1064.756842][T24380] netlink: 350 bytes leftover after parsing attributes in process `syz.3.4105'. [ 1065.066551][T19366] Bluetooth: hci2: Opcode 0x0c03 failed: -110 [ 1066.804248][T24422] virtio-pci 0000:00:04.0: [Firmware Bug]: Overriding NUMA node to 0. Contact your vendor for updates. [ 1067.238359][T24431] HfR: entered promiscuous mode [ 1068.586245][T24460] netlink: 186 bytes leftover after parsing attributes in process `syz.4.4127'. [ 1068.807550][T24460] zswap: compressor not available [ 1068.886675][T24466] FAULT_INJECTION: forcing a failure. [ 1068.886675][T24466] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1068.928221][T24466] CPU: 0 UID: 0 PID: 24466 Comm: syz.3.4128 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1068.928251][T24466] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1068.928258][T24466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1068.928267][T24466] Call Trace: [ 1068.928272][T24466] [ 1068.928279][T24466] dump_stack_lvl+0x100/0x190 [ 1068.928303][T24466] should_fail_ex.cold+0x5/0xa [ 1068.928328][T24466] _copy_to_user+0x32/0xd0 [ 1068.928352][T24466] simple_read_from_buffer+0xcb/0x170 [ 1068.928370][T24466] proc_fail_nth_read+0x1af/0x230 [ 1068.928389][T24466] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1068.928408][T24466] ? rw_verify_area+0xce/0x6d0 [ 1068.928423][T24466] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1068.928440][T24466] vfs_read+0x1e4/0xb30 [ 1068.928459][T24466] ? __pfx_vfs_read+0x10/0x10 [ 1068.928474][T24466] ? find_held_lock+0x2b/0x80 [ 1068.928490][T24466] ? __fget_files+0x215/0x3d0 [ 1068.928510][T24466] ? __fget_files+0x21f/0x3d0 [ 1068.928531][T24466] ksys_read+0x12a/0x250 [ 1068.928547][T24466] ? __pfx_ksys_read+0x10/0x10 [ 1068.928569][T24466] do_syscall_64+0xc9/0xf80 [ 1068.928589][T24466] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1068.928605][T24466] RIP: 0033:0x7f6b5c95b78e [ 1068.928626][T24466] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1068.928645][T24466] RSP: 002b:00007f6b5d7b5fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1068.928661][T24466] RAX: ffffffffffffffda RBX: 00007f6b5d7b66c0 RCX: 00007f6b5c95b78e [ 1068.928672][T24466] RDX: 000000000000000f RSI: 00007f6b5d7b60a0 RDI: 0000000000000005 [ 1068.928682][T24466] RBP: 00007f6b5d7b6090 R08: 0000000000000000 R09: 0000000000000000 [ 1068.928691][T24466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1068.928700][T24466] R13: 00007f6b5cc16038 R14: 00007f6b5cc15fa0 R15: 00007fff4f5ee498 [ 1068.928720][T24466] [ 1070.819714][T24497] FAULT_INJECTION: forcing a failure. [ 1070.819714][T24497] name failslab, interval 1, probability 0, space 0, times 0 [ 1070.926281][T24497] CPU: 0 UID: 0 PID: 24497 Comm: syz.2.4135 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1070.926314][T24497] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1070.926322][T24497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1070.926333][T24497] Call Trace: [ 1070.926338][T24497] [ 1070.926346][T24497] dump_stack_lvl+0x100/0x190 [ 1070.926370][T24497] should_fail_ex.cold+0x5/0xa [ 1070.926397][T24497] should_failslab+0xc2/0x120 [ 1070.926418][T24497] kmem_cache_alloc_noprof+0x83/0x780 [ 1070.926447][T24497] ? path_mount+0x1ded/0x23c0 [ 1070.926467][T24497] ? alloc_vfsmnt+0x23/0x6b0 [ 1070.926491][T24497] ? alloc_vfsmnt+0x23/0x6b0 [ 1070.926512][T24497] alloc_vfsmnt+0x23/0x6b0 [ 1070.926534][T24497] path_mount+0x1e47/0x23c0 [ 1070.926556][T24497] ? __pfx_path_mount+0x10/0x10 [ 1070.926575][T24497] ? kmem_cache_free+0x143/0x720 [ 1070.926591][T24497] ? strncpy_from_user+0x19d/0x2d0 [ 1070.926611][T24497] ? putname+0xf5/0x1a0 [ 1070.926632][T24497] ? putname+0xf5/0x1a0 [ 1070.926649][T24497] ? putname+0xfa/0x1a0 [ 1070.926670][T24497] ? __x64_sys_mount+0x293/0x310 [ 1070.926689][T24497] __x64_sys_mount+0x293/0x310 [ 1070.926710][T24497] ? __pfx___x64_sys_mount+0x10/0x10 [ 1070.926734][T24497] do_syscall_64+0xc9/0xf80 [ 1070.926753][T24497] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1070.926769][T24497] RIP: 0033:0x7f1ad659aeb9 [ 1070.926782][T24497] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1070.926797][T24497] RSP: 002b:00007f1ad73b2028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1070.926818][T24497] RAX: ffffffffffffffda RBX: 00007f1ad6815fa0 RCX: 00007f1ad659aeb9 [ 1070.926828][T24497] RDX: 0000200000000580 RSI: 00002000000000c0 RDI: 0000000000000000 [ 1070.926839][T24497] RBP: 00007f1ad6608c1f R08: 0000000000000000 R09: 0000000000000000 [ 1070.926848][T24497] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 [ 1070.926858][T24497] R13: 00007f1ad6816038 R14: 00007f1ad6815fa0 R15: 00007ffdacaecee8 [ 1070.926878][T24497] [ 1071.619308][T24512] FAULT_INJECTION: forcing a failure. [ 1071.619308][T24512] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.654275][T24512] CPU: 0 UID: 0 PID: 24512 Comm: syz.4.4139 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1071.654305][T24512] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1071.654312][T24512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1071.654321][T24512] Call Trace: [ 1071.654327][T24512] [ 1071.654333][T24512] dump_stack_lvl+0x100/0x190 [ 1071.654362][T24512] should_fail_ex.cold+0x5/0xa [ 1071.654386][T24512] should_failslab+0xc2/0x120 [ 1071.654408][T24512] ? tomoyo_realpath_from_path+0xb6/0x690 [ 1071.654423][T24512] __kmalloc_noprof+0xf6/0x9c0 [ 1071.654444][T24512] ? tomoyo_realpath_from_path+0xb6/0x690 [ 1071.654458][T24512] tomoyo_realpath_from_path+0xb6/0x690 [ 1071.654477][T24512] tomoyo_path_number_perm+0x23c/0x580 [ 1071.654498][T24512] ? tomoyo_path_number_perm+0x22e/0x580 [ 1071.654520][T24512] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1071.654560][T24512] ? find_held_lock+0x2b/0x80 [ 1071.654574][T24512] ? hook_file_ioctl_common+0x146/0x410 [ 1071.654596][T24512] ? __fget_files+0x215/0x3d0 [ 1071.654615][T24512] ? __fget_files+0x21f/0x3d0 [ 1071.654634][T24512] security_file_ioctl+0xd3/0x230 [ 1071.654656][T24512] __x64_sys_ioctl+0xb7/0x210 [ 1071.654681][T24512] do_syscall_64+0xc9/0xf80 [ 1071.654701][T24512] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1071.654716][T24512] RIP: 0033:0x7f046dd9aeb9 [ 1071.654729][T24512] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1071.654744][T24512] RSP: 002b:00007f046eb9f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1071.654759][T24512] RAX: ffffffffffffffda RBX: 00007f046e015fa0 RCX: 00007f046dd9aeb9 [ 1071.654769][T24512] RDX: 0000000000000003 RSI: 000000004020aea5 RDI: 0000000000000003 [ 1071.654778][T24512] RBP: 00007f046eb9f090 R08: 0000000000000000 R09: 0000000000000000 [ 1071.654787][T24512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1071.654796][T24512] R13: 00007f046e016038 R14: 00007f046e015fa0 R15: 00007fff4f78b378 [ 1071.654815][T24512] [ 1071.654822][T24512] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1072.370534][T24523] HfR: entered promiscuous mode [ 1072.842361][T24530] zswap: compressor not available [ 1073.502452][T24553] NFSD: Failed to start, no listeners configured. [ 1074.055244][T24566] netlink: 342 bytes leftover after parsing attributes in process `syz.4.4152'. [ 1074.168134][T24568] FAULT_INJECTION: forcing a failure. [ 1074.168134][T24568] name failslab, interval 1, probability 0, space 0, times 0 [ 1074.186635][T24571] netlink: 330 bytes leftover after parsing attributes in process `syz.1.4154'. [ 1074.207563][T24566] NFSD: Failed to start, no listeners configured. [ 1074.230859][T24568] CPU: 0 UID: 0 PID: 24568 Comm: syz.3.4153 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1074.230890][T24568] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1074.230898][T24568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1074.230907][T24568] Call Trace: [ 1074.230913][T24568] [ 1074.230919][T24568] dump_stack_lvl+0x100/0x190 [ 1074.230943][T24568] should_fail_ex.cold+0x5/0xa [ 1074.230969][T24568] should_failslab+0xc2/0x120 [ 1074.230990][T24568] __kvmalloc_node_noprof+0x101/0xac0 [ 1074.231010][T24568] ? io_uring_setup.cold+0x171/0x1a89 [ 1074.231032][T24568] ? io_uring_setup.cold+0x171/0x1a89 [ 1074.231049][T24568] io_uring_setup.cold+0x171/0x1a89 [ 1074.231070][T24568] ? __pfx_io_uring_setup+0x10/0x10 [ 1074.231100][T24568] ? do_futex+0x192/0x350 [ 1074.231122][T24568] ? __pfx_do_futex+0x10/0x10 [ 1074.231152][T24568] ? xfd_validate_state+0x129/0x190 [ 1074.231175][T24568] ? __task_pid_nr_ns+0x1f5/0x500 [ 1074.231199][T24568] __x64_sys_io_uring_setup+0xc2/0x170 [ 1074.231218][T24568] do_syscall_64+0xc9/0xf80 [ 1074.231237][T24568] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1074.231253][T24568] RIP: 0033:0x7f6b5c99aeb9 [ 1074.231266][T24568] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1074.231281][T24568] RSP: 002b:00007f6b5d7b6028 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 1074.231297][T24568] RAX: ffffffffffffffda RBX: 00007f6b5cc15fa0 RCX: 00007f6b5c99aeb9 [ 1074.231308][T24568] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000059 [ 1074.231318][T24568] RBP: 00007f6b5ca08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1074.231328][T24568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1074.231337][T24568] R13: 00007f6b5cc16038 R14: 00007f6b5cc15fa0 R15: 00007fff4f5ee498 [ 1074.231357][T24568] [ 1074.500050][T24571] mac80211_hwsim hwsim17 ›: renamed from wlan0 (while UP) [ 1074.968632][T24584] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.4.4156: iget: checksum invalid [ 1075.035695][T24584] faux_driver regulatory: loading /lib/firmware/updates/syzkaller/regulatory.db failed with error -74 [ 1075.079339][T24584] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.4.4156: iget: checksum invalid [ 1075.104424][T24584] faux_driver regulatory: loading /lib/firmware/updates/regulatory.db failed with error -74 [ 1075.127463][T24584] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.4.4156: iget: checksum invalid [ 1075.154281][T24584] faux_driver regulatory: loading /lib/firmware/syzkaller/regulatory.db failed with error -74 [ 1075.176834][T24584] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.4.4156: iget: checksum invalid [ 1075.208372][T24584] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -74 [ 1075.238993][T24584] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -74 [ 1075.268570][T24584] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 1075.473415][T19366] Bluetooth: hci2: Opcode 0x0c03 failed: -110 [ 1076.158048][T24610] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4165'. [ 1076.430579][T24613] zswap: compressor not available [ 1078.540589][T24681] raw_sendmsg: syz.2.4180 forgot to set AF_INET. Fix it! [ 1079.054592][T24696] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1079.105307][T24696] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1079.160970][T24696] veth0_to_bridge: entered allmulticast mode [ 1079.195692][T24696] veth0_to_bridge: entered promiscuous mode [ 1079.227599][T24696] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1079.280232][T24696] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1079.287524][T24696] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 1080.719957][T24738] random: crng reseeded on system resumption [ 1081.388856][T24758] netlink: 330 bytes leftover after parsing attributes in process `syz.4.4200'. [ 1081.429012][T24760] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.1.4196: iget: checksum invalid [ 1081.467068][T24759] FAULT_INJECTION: forcing a failure. [ 1081.467068][T24759] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1081.480138][T24758] mac80211_hwsim hwsim25 ›: renamed from wlan0 (while UP) [ 1081.497876][T24760] faux_driver regulatory: loading /lib/firmware/updates/syzkaller/regulatory.db failed with error -74 [ 1081.529716][T24759] CPU: 0 UID: 0 PID: 24759 Comm: syz.3.4201 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1081.529746][T24759] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1081.529753][T24759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1081.529762][T24759] Call Trace: [ 1081.529767][T24759] [ 1081.529773][T24759] dump_stack_lvl+0x100/0x190 [ 1081.529796][T24759] should_fail_ex.cold+0x5/0xa [ 1081.529821][T24759] get_futex_key+0x1d2/0x1620 [ 1081.529844][T24759] ? __pfx_get_futex_key+0x10/0x10 [ 1081.529869][T24759] futex_wake+0xea/0x530 [ 1081.529893][T24759] ? __pfx_futex_wake+0x10/0x10 [ 1081.529925][T24759] do_futex+0x32b/0x350 [ 1081.529945][T24759] ? __pfx_do_futex+0x10/0x10 [ 1081.529970][T24759] __x64_sys_futex+0x34f/0x4d0 [ 1081.529992][T24759] ? __pfx___x64_sys_futex+0x10/0x10 [ 1081.530013][T24759] ? __pfx___x64_sys_mount+0x10/0x10 [ 1081.530039][T24759] do_syscall_64+0xc9/0xf80 [ 1081.530058][T24759] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1081.530074][T24759] RIP: 0033:0x7f6b5c99aeb9 [ 1081.530087][T24759] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1081.530102][T24759] RSP: 002b:00007f6b5d7b60e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1081.530118][T24759] RAX: ffffffffffffffda RBX: 00007f6b5cc15fa8 RCX: 00007f6b5c99aeb9 [ 1081.530133][T24759] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f6b5cc15fac [ 1081.530142][T24759] RBP: 00007f6b5cc15fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1081.530152][T24759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1081.530161][T24759] R13: 00007f6b5cc16038 R14: 00007fff4f5ee3b0 R15: 00007fff4f5ee498 [ 1081.530180][T24759] [ 1081.718135][T24760] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.1.4196: iget: checksum invalid [ 1081.729409][T24760] faux_driver regulatory: loading /lib/firmware/updates/regulatory.db failed with error -74 [ 1081.742322][T24760] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.1.4196: iget: checksum invalid [ 1081.753502][T24760] faux_driver regulatory: loading /lib/firmware/syzkaller/regulatory.db failed with error -74 [ 1081.764031][T24760] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.1.4196: iget: checksum invalid [ 1081.775245][T24760] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -74 [ 1081.784726][T24760] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -74 [ 1081.794571][T24760] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 1082.885016][T24793] FAULT_INJECTION: forcing a failure. [ 1082.885016][T24793] name failslab, interval 1, probability 0, space 0, times 0 [ 1082.898183][T24793] CPU: 0 UID: 0 PID: 24793 Comm: syz.4.4208 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1082.898213][T24793] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1082.898221][T24793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1082.898238][T24793] Call Trace: [ 1082.898243][T24793] [ 1082.898250][T24793] dump_stack_lvl+0x100/0x190 [ 1082.898274][T24793] should_fail_ex.cold+0x5/0xa [ 1082.898300][T24793] should_failslab+0xc2/0x120 [ 1082.898323][T24793] __kmalloc_cache_noprof+0x80/0x810 [ 1082.898339][T24793] ? report_access+0x101/0x4d0 [ 1082.898352][T24793] ? rcu_is_watching+0x12/0xc0 [ 1082.898367][T24793] ? cap_capable+0x107/0x3f0 [ 1082.898386][T24793] ? report_access+0x101/0x4d0 [ 1082.898400][T24793] report_access+0x101/0x4d0 [ 1082.898417][T24793] yama_ptrace_access_check+0x645/0xd00 [ 1082.898435][T24793] security_ptrace_access_check+0xe9/0x210 [ 1082.898454][T24793] __ptrace_may_access+0x473/0x900 [ 1082.898474][T24793] ptrace_attach+0x248/0x6a0 [ 1082.898494][T24793] __x64_sys_ptrace+0x263/0x2a0 [ 1082.898514][T24793] do_syscall_64+0xc9/0xf80 [ 1082.898533][T24793] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1082.898548][T24793] RIP: 0033:0x7f046dd9aeb9 [ 1082.898562][T24793] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1082.898577][T24793] RSP: 002b:00007f046eb7e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000065 [ 1082.898592][T24793] RAX: ffffffffffffffda RBX: 00007f046e016090 RCX: 00007f046dd9aeb9 [ 1082.898602][T24793] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000004206 [ 1082.898611][T24793] RBP: 00007f046de08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1082.898621][T24793] R10: 0000000000200005 R11: 0000000000000246 R12: 0000000000000000 [ 1082.898631][T24793] R13: 00007f046e016128 R14: 00007f046e016090 R15: 00007fff4f78b378 [ 1082.898651][T24793] [ 1083.321471][T24795] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4210'. [ 1086.734065][T24877] FAULT_INJECTION: forcing a failure. [ 1086.734065][T24877] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.786737][T24877] CPU: 0 UID: 0 PID: 24877 Comm: syz.2.4231 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1086.786767][T24877] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1086.786774][T24877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1086.786783][T24877] Call Trace: [ 1086.786788][T24877] [ 1086.786795][T24877] dump_stack_lvl+0x100/0x190 [ 1086.786817][T24877] should_fail_ex.cold+0x5/0xa [ 1086.786841][T24877] should_failslab+0xc2/0x120 [ 1086.786864][T24877] kmem_cache_alloc_noprof+0x83/0x780 [ 1086.786883][T24877] ? __pfx_acct_collect+0x10/0x10 [ 1086.786903][T24877] ? taskstats_exit+0x650/0xbd0 [ 1086.786921][T24877] ? taskstats_exit+0x650/0xbd0 [ 1086.786934][T24877] taskstats_exit+0x650/0xbd0 [ 1086.786948][T24877] ? __pfx_acct_update_integrals+0x10/0x10 [ 1086.786964][T24877] ? __pfx_taskstats_exit+0x10/0x10 [ 1086.786980][T24877] ? rcu_read_lock_any_held+0x6a/0xa0 [ 1086.786996][T24877] ? exit_signals+0x395/0xaf0 [ 1086.787015][T24877] do_exit+0x5ca/0x2a30 [ 1086.787039][T24877] ? __pfx_do_exit+0x10/0x10 [ 1086.787060][T24877] ? do_raw_spin_lock+0x128/0x260 [ 1086.787082][T24877] ? find_held_lock+0x2b/0x80 [ 1086.787096][T24877] ? get_signal+0x7e0/0x21e0 [ 1086.787114][T24877] do_group_exit+0xd5/0x2a0 [ 1086.787137][T24877] get_signal+0x1ec7/0x21e0 [ 1086.787161][T24877] ? __pfx_get_signal+0x10/0x10 [ 1086.787179][T24877] ? do_futex+0x192/0x350 [ 1086.787201][T24877] arch_do_signal_or_restart+0x91/0x770 [ 1086.787223][T24877] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1086.787248][T24877] ? __pfx___x64_sys_futex+0x10/0x10 [ 1086.787273][T24877] exit_to_user_mode_loop+0x86/0x4b0 [ 1086.787294][T24877] ? rcu_is_watching+0x12/0xc0 [ 1086.787309][T24877] do_syscall_64+0x4ea/0xf80 [ 1086.787328][T24877] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1086.787344][T24877] RIP: 0033:0x7f1ad659aeb9 [ 1086.787357][T24877] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1086.787371][T24877] RSP: 002b:00007f1ad73b20e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1086.787386][T24877] RAX: fffffffffffffe00 RBX: 00007f1ad6815fa8 RCX: 00007f1ad659aeb9 [ 1086.787396][T24877] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1ad6815fa8 [ 1086.787406][T24877] RBP: 00007f1ad6815fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1086.787414][T24877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1086.787423][T24877] R13: 00007f1ad6816038 R14: 00007ffdacaece00 R15: 00007ffdacaecee8 [ 1086.787442][T24877] [ 1087.658058][T24883] Invalid ELF header magic: != ELF [ 1087.736327][T24883] delete_channel: no stack [ 1089.122195][T24917] netlink: 330 bytes leftover after parsing attributes in process `syz.3.4241'. [ 1090.145858][T19357] EXT4-fs error (device sda1): ext4_validate_block_bitmap:423: comm kworker/u10:0: bg 2: bad block bitmap checksum [ 1090.491258][T19357] EXT4-fs (sda1): Delayed block allocation failed for inode 2028 at logical offset 13 with max blocks 15 with error 74 [ 1090.625061][T19357] EXT4-fs (sda1): This should not happen!! Data will be lost [ 1090.625061][T19357] [ 1090.675227][T19357] EXT4-fs (sda1): Delayed block allocation failed for inode 2026 at logical offset 9 with max blocks 19 with error 117 [ 1090.764805][T19357] EXT4-fs (sda1): This should not happen!! Data will be lost [ 1090.764805][T19357] [ 1092.218046][T24957] netlink: 'syz.2.4248': attribute type 19 has an invalid length. [ 1092.252988][T24957] netlink: 334 bytes leftover after parsing attributes in process `syz.2.4248'. [ 1093.781190][T24982] ptrace attach of "./syz-executor exec"[17056] was attempted by "./syz-executor exec"[24982] [ 1093.975880][T24985] FAULT_INJECTION: forcing a failure. [ 1093.975880][T24985] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1094.019171][T24985] CPU: 0 UID: 0 PID: 24985 Comm: syz.4.4256 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1094.019203][T24985] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1094.019210][T24985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1094.019220][T24985] Call Trace: [ 1094.019227][T24985] [ 1094.019234][T24985] dump_stack_lvl+0x100/0x190 [ 1094.019257][T24985] should_fail_ex.cold+0x5/0xa [ 1094.019284][T24985] _copy_from_iter+0x1f4/0x1690 [ 1094.019311][T24985] ? __pfx__copy_from_iter+0x10/0x10 [ 1094.019338][T24985] ? __pfx___might_resched+0x10/0x10 [ 1094.019363][T24985] skb_copy_datagram_from_iter+0x11f/0x720 [ 1094.019384][T24985] ? pidfs_register_pid+0x72/0x200 [ 1094.019405][T24985] unix_stream_sendmsg+0x536/0x1310 [ 1094.019428][T24985] ? __pfx_unix_stream_sendmsg+0x10/0x10 [ 1094.019447][T24985] ? try_to_wake_up+0x644/0x1a60 [ 1094.019464][T24985] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1094.019486][T24985] sock_write_iter+0x566/0x610 [ 1094.019506][T24985] ? __pfx_sock_write_iter+0x10/0x10 [ 1094.019529][T24985] ? bpf_lsm_file_permission+0x9/0x10 [ 1094.019549][T24985] ? security_file_permission+0x76/0x210 [ 1094.019573][T24985] ? rw_verify_area+0xce/0x6d0 [ 1094.019589][T24985] vfs_write+0x6ac/0x1070 [ 1094.019606][T24985] ? __pfx_sock_write_iter+0x10/0x10 [ 1094.019623][T24985] ? __pfx_vfs_write+0x10/0x10 [ 1094.019639][T24985] ? find_held_lock+0x2b/0x80 [ 1094.019664][T24985] ksys_write+0x1f8/0x250 [ 1094.019681][T24985] ? __pfx_ksys_write+0x10/0x10 [ 1094.019703][T24985] do_syscall_64+0xc9/0xf80 [ 1094.019722][T24985] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1094.019737][T24985] RIP: 0033:0x7f046dd9aeb9 [ 1094.019751][T24985] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1094.019766][T24985] RSP: 002b:00007f046eb9f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1094.019782][T24985] RAX: ffffffffffffffda RBX: 00007f046e015fa0 RCX: 00007f046dd9aeb9 [ 1094.019792][T24985] RDX: 0000000000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 1094.019801][T24985] RBP: 00007f046de08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1094.019810][T24985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1094.019819][T24985] R13: 00007f046e016038 R14: 00007f046e015fa0 R15: 00007fff4f78b378 [ 1094.019838][T24985] [ 1097.055733][T25073] netlink: 'syz.1.4271': attribute type 33 has an invalid length. [ 1097.837663][T25084] zswap: compressor not available [ 1098.254914][T25101] FAULT_INJECTION: forcing a failure. [ 1098.254914][T25101] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.298154][T25101] CPU: 0 UID: 0 PID: 25101 Comm: syz.4.4279 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1098.298184][T25101] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1098.298191][T25101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1098.298201][T25101] Call Trace: [ 1098.298206][T25101] [ 1098.298212][T25101] dump_stack_lvl+0x100/0x190 [ 1098.298235][T25101] should_fail_ex.cold+0x5/0xa [ 1098.298259][T25101] should_failslab+0xc2/0x120 [ 1098.298280][T25101] kmem_cache_alloc_noprof+0x83/0x780 [ 1098.298300][T25101] ? __pfx_acct_collect+0x10/0x10 [ 1098.298313][T25101] ? taskstats_exit+0x650/0xbd0 [ 1098.298331][T25101] ? taskstats_exit+0x650/0xbd0 [ 1098.298344][T25101] taskstats_exit+0x650/0xbd0 [ 1098.298358][T25101] ? __pfx_acct_update_integrals+0x10/0x10 [ 1098.298375][T25101] ? __pfx_taskstats_exit+0x10/0x10 [ 1098.298390][T25101] ? rcu_read_lock_any_held+0x6a/0xa0 [ 1098.298406][T25101] ? exit_signals+0x395/0xaf0 [ 1098.298425][T25101] do_exit+0x5ca/0x2a30 [ 1098.298449][T25101] ? __pfx_do_exit+0x10/0x10 [ 1098.298470][T25101] ? do_raw_spin_lock+0x128/0x260 [ 1098.298492][T25101] ? find_held_lock+0x2b/0x80 [ 1098.298506][T25101] ? get_signal+0x7e0/0x21e0 [ 1098.298524][T25101] do_group_exit+0xd5/0x2a0 [ 1098.298547][T25101] get_signal+0x1ec7/0x21e0 [ 1098.298571][T25101] ? __pfx_get_signal+0x10/0x10 [ 1098.298589][T25101] ? do_futex+0x192/0x350 [ 1098.298612][T25101] arch_do_signal_or_restart+0x91/0x770 [ 1098.298634][T25101] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1098.298660][T25101] ? __pfx___x64_sys_futex+0x10/0x10 [ 1098.298684][T25101] exit_to_user_mode_loop+0x86/0x4b0 [ 1098.298705][T25101] ? rcu_is_watching+0x12/0xc0 [ 1098.298720][T25101] do_syscall_64+0x4ea/0xf80 [ 1098.298740][T25101] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1098.298762][T25101] RIP: 0033:0x7f046dd9aeb9 [ 1098.298776][T25101] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1098.298790][T25101] RSP: 002b:00007f046eb9f0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1098.298806][T25101] RAX: fffffffffffffe00 RBX: 00007f046e015fa8 RCX: 00007f046dd9aeb9 [ 1098.298816][T25101] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f046e015fa8 [ 1098.298825][T25101] RBP: 00007f046e015fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.298834][T25101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1098.298843][T25101] R13: 00007f046e016038 R14: 00007fff4f78b290 R15: 00007fff4f78b378 [ 1098.298862][T25101] [ 1099.294287][T25117] netlink: 'syz.3.4284': attribute type 19 has an invalid length. [ 1099.331464][T25117] netlink: 334 bytes leftover after parsing attributes in process `syz.3.4284'. [ 1099.682065][T25122] Console: switching to colour VGA+ 80x25 [ 1100.138182][T25139] Invalid ELF header magic: != ELF [ 1100.362868][T25146] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4291'. [ 1100.413511][T25143] openvswitch: HfR: Dropping previously announced user features [ 1100.510354][T25146] HfR: left promiscuous mode [ 1102.242098][T25188] FAULT_INJECTION: forcing a failure. [ 1102.242098][T25188] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1102.313478][T25188] CPU: 0 UID: 0 PID: 25188 Comm: syz.4.4300 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1102.313509][T25188] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1102.313516][T25188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1102.313526][T25188] Call Trace: [ 1102.313531][T25188] [ 1102.313538][T25188] dump_stack_lvl+0x100/0x190 [ 1102.313562][T25188] should_fail_ex.cold+0x5/0xa [ 1102.313594][T25188] get_futex_key+0x1d2/0x1620 [ 1102.313616][T25188] ? __pfx_get_futex_key+0x10/0x10 [ 1102.313641][T25188] futex_wake+0xea/0x530 [ 1102.313666][T25188] ? __pfx_futex_wake+0x10/0x10 [ 1102.313698][T25188] do_futex+0x32b/0x350 [ 1102.313718][T25188] ? __pfx_do_futex+0x10/0x10 [ 1102.313742][T25188] __x64_sys_futex+0x34f/0x4d0 [ 1102.313765][T25188] ? __pfx___x64_sys_futex+0x10/0x10 [ 1102.313786][T25188] ? __pfx___x64_sys_mount+0x10/0x10 [ 1102.313811][T25188] do_syscall_64+0xc9/0xf80 [ 1102.313830][T25188] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1102.313845][T25188] RIP: 0033:0x7f046dd9aeb9 [ 1102.313858][T25188] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1102.313873][T25188] RSP: 002b:00007f046eb9f0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1102.313889][T25188] RAX: ffffffffffffffda RBX: 00007f046e015fa8 RCX: 00007f046dd9aeb9 [ 1102.313899][T25188] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f046e015fac [ 1102.313908][T25188] RBP: 00007f046e015fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1102.313917][T25188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1102.313926][T25188] R13: 00007f046e016038 R14: 00007fff4f78b290 R15: 00007fff4f78b378 [ 1102.313945][T25188] [ 1103.891156][T25223] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 1104.181100][T25229] FAULT_INJECTION: forcing a failure. [ 1104.181100][T25229] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1104.236881][T25229] CPU: 0 UID: 0 PID: 25229 Comm: syz.3.4311 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1104.236912][T25229] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1104.236919][T25229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1104.236929][T25229] Call Trace: [ 1104.236934][T25229] [ 1104.236941][T25229] dump_stack_lvl+0x100/0x190 [ 1104.236963][T25229] should_fail_ex.cold+0x5/0xa [ 1104.236988][T25229] get_futex_key+0x1d2/0x1620 [ 1104.237009][T25229] ? __pfx_get_futex_key+0x10/0x10 [ 1104.237034][T25229] futex_wake+0xea/0x530 [ 1104.237066][T25229] ? __pfx_futex_wake+0x10/0x10 [ 1104.237098][T25229] do_futex+0x32b/0x350 [ 1104.237119][T25229] ? __pfx_do_futex+0x10/0x10 [ 1104.237145][T25229] __x64_sys_futex+0x34f/0x4d0 [ 1104.237168][T25229] ? __pfx___x64_sys_futex+0x10/0x10 [ 1104.237188][T25229] ? xfd_validate_state+0x129/0x190 [ 1104.237218][T25229] do_syscall_64+0xc9/0xf80 [ 1104.237237][T25229] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1104.237253][T25229] RIP: 0033:0x7f6b5c99aeb9 [ 1104.237266][T25229] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1104.237281][T25229] RSP: 002b:00007f6b5d7b60e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1104.237300][T25229] RAX: ffffffffffffffda RBX: 00007f6b5cc15fa8 RCX: 00007f6b5c99aeb9 [ 1104.237311][T25229] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f6b5cc15fac [ 1104.237321][T25229] RBP: 00007f6b5cc15fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1104.237330][T25229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1104.237339][T25229] R13: 00007f6b5cc16038 R14: 00007fff4f5ee3b0 R15: 00007fff4f5ee498 [ 1104.237358][T25229] [ 1107.800583][T25316] HfR: entered promiscuous mode [ 1107.832301][T25316] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4337'. [ 1107.884128][T25316] HfR: left promiscuous mode [ 1109.200045][T25349] FAULT_INJECTION: forcing a failure. [ 1109.200045][T25349] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.258082][T25345] netlink: 350 bytes leftover after parsing attributes in process `syz.1.4344'. [ 1109.284239][T25349] CPU: 0 UID: 0 PID: 25349 Comm: syz.4.4345 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1109.284271][T25349] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1109.284279][T25349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1109.284289][T25349] Call Trace: [ 1109.284295][T25349] [ 1109.284301][T25349] dump_stack_lvl+0x100/0x190 [ 1109.284324][T25349] should_fail_ex.cold+0x5/0xa [ 1109.284350][T25349] should_failslab+0xc2/0x120 [ 1109.284371][T25349] __kmalloc_cache_noprof+0x80/0x810 [ 1109.284387][T25349] ? get_mountpoint+0x174/0x4f0 [ 1109.284412][T25349] ? get_mountpoint+0x174/0x4f0 [ 1109.284433][T25349] get_mountpoint+0x174/0x4f0 [ 1109.284455][T25349] attach_recursive_mnt.isra.0+0x223/0x1aa0 [ 1109.284481][T25349] ? __pfx_attach_recursive_mnt.isra.0+0x10/0x10 [ 1109.284501][T25349] ? find_held_lock+0x2b/0x80 [ 1109.284520][T25349] ? do_raw_spin_unlock+0x145/0x1e0 [ 1109.284545][T25349] ? graft_tree+0x19f/0x250 [ 1109.284562][T25349] ? do_lock_mount.part.0+0x40b/0xb10 [ 1109.284577][T25349] graft_tree+0x19f/0x250 [ 1109.284596][T25349] do_add_mount+0x1e2/0x360 [ 1109.284617][T25349] path_mount+0x907/0x23c0 [ 1109.284651][T25349] ? __pfx_path_mount+0x10/0x10 [ 1109.284671][T25349] ? kmem_cache_free+0x143/0x720 [ 1109.284687][T25349] ? strncpy_from_user+0x19d/0x2d0 [ 1109.284709][T25349] ? putname+0xf5/0x1a0 [ 1109.284730][T25349] ? putname+0xf5/0x1a0 [ 1109.284747][T25349] ? putname+0xfa/0x1a0 [ 1109.284768][T25349] ? __x64_sys_mount+0x293/0x310 [ 1109.284786][T25349] __x64_sys_mount+0x293/0x310 [ 1109.284805][T25349] ? __pfx___x64_sys_mount+0x10/0x10 [ 1109.284830][T25349] do_syscall_64+0xc9/0xf80 [ 1109.284850][T25349] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1109.284865][T25349] RIP: 0033:0x7f046dd9aeb9 [ 1109.284878][T25349] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1109.284893][T25349] RSP: 002b:00007f046eb9f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1109.284909][T25349] RAX: ffffffffffffffda RBX: 00007f046e015fa0 RCX: 00007f046dd9aeb9 [ 1109.284919][T25349] RDX: 0000200000000580 RSI: 00002000000000c0 RDI: 0000000000000000 [ 1109.284929][T25349] RBP: 00007f046de08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1109.284938][T25349] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000000 [ 1109.284947][T25349] R13: 00007f046e016038 R14: 00007f046e015fa0 R15: 00007fff4f78b378 [ 1109.284967][T25349] [ 1109.787867][T25351] FAULT_INJECTION: forcing a failure. [ 1109.787867][T25351] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1109.834676][T25351] CPU: 0 UID: 0 PID: 25351 Comm: syz.2.4346 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1109.834710][T25351] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1109.834717][T25351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1109.834727][T25351] Call Trace: [ 1109.834733][T25351] [ 1109.834740][T25351] dump_stack_lvl+0x100/0x190 [ 1109.834765][T25351] should_fail_ex.cold+0x5/0xa [ 1109.834793][T25351] ? __lock_acquire+0x4a5/0x2630 [ 1109.834814][T25351] get_futex_key+0x1d2/0x1620 [ 1109.834837][T25351] ? __pfx_get_futex_key+0x10/0x10 [ 1109.834858][T25351] ? update_se+0x93/0x700 [ 1109.834879][T25351] futex_wait_setup+0x81/0x500 [ 1109.834898][T25351] __futex_wait+0x19f/0x300 [ 1109.834914][T25351] ? __pfx___futex_wait+0x10/0x10 [ 1109.834927][T25351] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1109.834944][T25351] ? lockdep_hardirqs_on+0x78/0x100 [ 1109.834963][T25351] ? __pfx_futex_wake_mark+0x10/0x10 [ 1109.834989][T25351] ? find_held_lock+0x2b/0x80 [ 1109.835003][T25351] ? futex_wake+0x456/0x530 [ 1109.835030][T25351] futex_wait+0xed/0x380 [ 1109.835045][T25351] ? __pfx_futex_wait+0x10/0x10 [ 1109.835065][T25351] ? kmem_cache_free+0x48f/0x720 [ 1109.835083][T25351] do_futex+0x1ef/0x350 [ 1109.835104][T25351] ? __pfx_do_futex+0x10/0x10 [ 1109.835124][T25351] ? __pfx___might_resched+0x10/0x10 [ 1109.835145][T25351] ? blkcg_maybe_throttle_current+0x5df/0xeb0 [ 1109.835166][T25351] __x64_sys_futex+0x34f/0x4d0 [ 1109.835188][T25351] ? __pfx_task_work_run+0x10/0x10 [ 1109.835210][T25351] ? __pfx___x64_sys_futex+0x10/0x10 [ 1109.835237][T25351] do_syscall_64+0xc9/0xf80 [ 1109.835256][T25351] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1109.835272][T25351] RIP: 0033:0x7f1ad659aeb9 [ 1109.835285][T25351] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1109.835300][T25351] RSP: 002b:00007f1ad73b20e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1109.835316][T25351] RAX: ffffffffffffffda RBX: 00007f1ad6815fa8 RCX: 00007f1ad659aeb9 [ 1109.835326][T25351] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1ad6815fa8 [ 1109.835336][T25351] RBP: 00007f1ad6815fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1109.835346][T25351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1109.835355][T25351] R13: 00007f1ad6816038 R14: 00007ffdacaece00 R15: 00007ffdacaecee8 [ 1109.835375][T25351] [ 1110.321043][T25362] netlink: 20 bytes leftover after parsing attributes in process `syz.4.4349'. [ 1110.559309][T25366] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 1110.565509][T25366] Bluetooth: hci6: Opcode 0x0c1a failed: -4 [ 1110.589700][T25366] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 1110.597526][T25366] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 1111.044082][T25370] zswap: compressor not available [ 1111.336372][T25377] FAULT_INJECTION: forcing a failure. [ 1111.336372][T25377] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.399350][T25377] CPU: 0 UID: 0 PID: 25377 Comm: syz.4.4352 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1111.399379][T25377] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1111.399386][T25377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1111.399396][T25377] Call Trace: [ 1111.399401][T25377] [ 1111.399407][T25377] dump_stack_lvl+0x100/0x190 [ 1111.399430][T25377] should_fail_ex.cold+0x5/0xa [ 1111.399455][T25377] should_failslab+0xc2/0x120 [ 1111.399476][T25377] __kmalloc_cache_noprof+0x80/0x810 [ 1111.399492][T25377] ? __kasan_kmalloc+0xaa/0xb0 [ 1111.399509][T25377] ? sctp_auth_shkey_create+0x9e/0x210 [ 1111.399535][T25377] ? sctp_auth_shkey_create+0x9e/0x210 [ 1111.399556][T25377] sctp_auth_shkey_create+0x9e/0x210 [ 1111.399578][T25377] sctp_auth_asoc_copy_shkeys+0x1f2/0x360 [ 1111.399604][T25377] sctp_association_new+0x19ab/0x2990 [ 1111.399640][T25377] sctp_connect_new_asoc+0x1a8/0x770 [ 1111.399657][T25377] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 1111.399671][T25377] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 1111.399693][T25377] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 1111.399721][T25377] __sctp_connect+0x3e7/0xc70 [ 1111.399740][T25377] ? __pfx___sctp_connect+0x10/0x10 [ 1111.399756][T25377] ? __pfx_sctp_inet_connect+0x10/0x10 [ 1111.399772][T25377] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1111.399790][T25377] ? __pfx_sctp_inet_connect+0x10/0x10 [ 1111.399804][T25377] sctp_inet_connect+0x15f/0x220 [ 1111.399819][T25377] __sys_connect_file+0x141/0x1a0 [ 1111.399842][T25377] __sys_connect+0x141/0x170 [ 1111.399861][T25377] ? __pfx___sys_connect+0x10/0x10 [ 1111.399882][T25377] ? __fget_files+0x21f/0x3d0 [ 1111.399905][T25377] ? __pfx_ksys_write+0x10/0x10 [ 1111.399925][T25377] __x64_sys_connect+0x72/0xb0 [ 1111.399944][T25377] ? lockdep_hardirqs_on+0x78/0x100 [ 1111.399961][T25377] do_syscall_64+0xc9/0xf80 [ 1111.399981][T25377] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1111.399996][T25377] RIP: 0033:0x7f046dd9aeb9 [ 1111.400010][T25377] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1111.400025][T25377] RSP: 002b:00007f046eb9f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1111.400040][T25377] RAX: ffffffffffffffda RBX: 00007f046e015fa0 RCX: 00007f046dd9aeb9 [ 1111.400050][T25377] RDX: 0000000000000054 RSI: 0000200000000080 RDI: 0000000000000003 [ 1111.400060][T25377] RBP: 00007f046eb9f090 R08: 0000000000000000 R09: 0000000000000000 [ 1111.400070][T25377] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1111.400078][T25377] R13: 00007f046e016038 R14: 00007f046e015fa0 R15: 00007fff4f78b378 [ 1111.400099][T25377] [ 1111.873780][T25386] netlink: 350 bytes leftover after parsing attributes in process `syz.4.4355'. [ 1112.171557][T25393] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4356'. [ 1112.344119][T25397] netlink: 350 bytes leftover after parsing attributes in process `syz.4.4357'. [ 1112.609440][T19366] Bluetooth: hci1: command 0x0c1a tx timeout [ 1112.615461][T19366] Bluetooth: hci0: command 0x0c1a tx timeout [ 1112.621900][T19635] Bluetooth: hci6: command 0x0c1a tx timeout [ 1112.627883][T19635] Bluetooth: hci5: command 0x040f tx timeout [ 1114.368246][T25436] FAULT_INJECTION: forcing a failure. [ 1114.368246][T25436] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1114.443155][T25436] CPU: 0 UID: 0 PID: 25436 Comm: syz.2.4366 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1114.443187][T25436] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1114.443195][T25436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1114.443205][T25436] Call Trace: [ 1114.443211][T25436] [ 1114.443218][T25436] dump_stack_lvl+0x100/0x190 [ 1114.443241][T25436] should_fail_ex.cold+0x5/0xa [ 1114.443263][T25436] ? __kernel_text_address+0xd/0x30 [ 1114.443289][T25436] get_futex_key+0x1d2/0x1620 [ 1114.443310][T25436] ? __pfx_get_futex_key+0x10/0x10 [ 1114.443330][T25436] ? stack_trace_save+0x8e/0xc0 [ 1114.443347][T25436] ? __pfx_stack_trace_save+0x10/0x10 [ 1114.443366][T25436] futex_wait_setup+0x81/0x500 [ 1114.443385][T25436] __futex_wait+0x19f/0x300 [ 1114.443400][T25436] ? __pfx___futex_wait+0x10/0x10 [ 1114.443417][T25436] ? __pfx_futex_wake_mark+0x10/0x10 [ 1114.443443][T25436] ? futex_hash+0x2c5/0x380 [ 1114.443466][T25436] futex_wait+0xed/0x380 [ 1114.443480][T25436] ? __pfx_futex_wait+0x10/0x10 [ 1114.443501][T25436] ? kmem_cache_free+0x48f/0x720 [ 1114.443518][T25436] do_futex+0x1ef/0x350 [ 1114.443539][T25436] ? __pfx_do_futex+0x10/0x10 [ 1114.443558][T25436] ? __pfx___might_resched+0x10/0x10 [ 1114.443586][T25436] ? blkcg_maybe_throttle_current+0x5df/0xeb0 [ 1114.443607][T25436] __x64_sys_futex+0x34f/0x4d0 [ 1114.443629][T25436] ? __pfx_task_work_run+0x10/0x10 [ 1114.443651][T25436] ? __pfx___x64_sys_futex+0x10/0x10 [ 1114.443679][T25436] do_syscall_64+0xc9/0xf80 [ 1114.443698][T25436] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1114.443714][T25436] RIP: 0033:0x7f1ad659aeb9 [ 1114.443726][T25436] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1114.443742][T25436] RSP: 002b:00007f1ad73b20e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1114.443757][T25436] RAX: ffffffffffffffda RBX: 00007f1ad6815fa8 RCX: 00007f1ad659aeb9 [ 1114.443768][T25436] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1ad6815fa8 [ 1114.443777][T25436] RBP: 00007f1ad6815fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1114.443786][T25436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1114.443795][T25436] R13: 00007f1ad6816038 R14: 00007ffdacaece00 R15: 00007ffdacaecee8 [ 1114.443814][T25436] [ 1114.751219][T25438] netlink: 350 bytes leftover after parsing attributes in process `syz.4.4368'. [ 1115.301987][T25448] HfR: entered promiscuous mode [ 1115.357286][T25448] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4371'. [ 1115.380276][T25448] HfR: left promiscuous mode [ 1116.350629][T25472] netlink: 334 bytes leftover after parsing attributes in process `syz.4.4377'. [ 1116.961858][T25479] size and base must be multiples of 4 kiB [ 1116.991674][T25479] CPU: 0 UID: 0 PID: 25479 Comm: syz.3.4380 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1116.991707][T25479] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1116.991714][T25479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1116.991724][T25479] Call Trace: [ 1116.991729][T25479] [ 1116.991736][T25479] dump_stack_lvl+0x100/0x190 [ 1116.991761][T25479] mtrr_del.cold+0x72/0x85 [ 1116.991778][T25479] mtrr_ioctl+0xbc8/0xcf0 [ 1116.991808][T25479] ? __pfx_mtrr_ioctl+0x10/0x10 [ 1116.991834][T25479] ? find_held_lock+0x2b/0x80 [ 1116.991855][T25479] ? __fget_files+0x21f/0x3d0 [ 1116.991872][T25479] ? __pfx_mtrr_ioctl+0x10/0x10 [ 1116.991894][T25479] proc_reg_unlocked_ioctl+0x229/0x320 [ 1116.991915][T25479] ? __pfx_proc_reg_unlocked_ioctl+0x10/0x10 [ 1116.991938][T25479] __x64_sys_ioctl+0x18e/0x210 [ 1116.991962][T25479] do_syscall_64+0xc9/0xf80 [ 1116.991982][T25479] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1116.991997][T25479] RIP: 0033:0x7f6b5c99aeb9 [ 1116.992010][T25479] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1116.992026][T25479] RSP: 002b:00007f6b5d7b6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1116.992041][T25479] RAX: ffffffffffffffda RBX: 00007f6b5cc15fa0 RCX: 00007f6b5c99aeb9 [ 1116.992052][T25479] RDX: 0000000000000007 RSI: 0000000040104d04 RDI: 0000000000000006 [ 1116.992061][T25479] RBP: 00007f6b5ca08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1116.992070][T25479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1116.992079][T25479] R13: 00007f6b5cc16038 R14: 00007f6b5cc15fa0 R15: 00007fff4f5ee498 [ 1116.992099][T25479] [ 1117.288444][T25486] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4383'. [ 1117.361647][ T30] audit: type=1800 audit(1769485967.902:15): pid=25486 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.4.4383" name="dbroot" dev="configfs" ino=112891 res=0 errno=0 [ 1117.392660][T25479] base or size exceeds the MTRR width [ 1118.085619][T25504] FAULT_INJECTION: forcing a failure. [ 1118.085619][T25504] name failslab, interval 1, probability 0, space 0, times 0 [ 1118.129411][T25505] netlink: 'syz.1.4382': attribute type 64 has an invalid length. [ 1118.155714][T25504] CPU: 0 UID: 0 PID: 25504 Comm: syz.2.4387 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1118.155745][T25504] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1118.155752][T25504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1118.155761][T25504] Call Trace: [ 1118.155767][T25504] [ 1118.155773][T25504] dump_stack_lvl+0x100/0x190 [ 1118.155796][T25504] should_fail_ex.cold+0x5/0xa [ 1118.155820][T25504] should_failslab+0xc2/0x120 [ 1118.155841][T25504] __kmalloc_cache_noprof+0x80/0x810 [ 1118.155858][T25504] ? sctp_add_bind_addr+0xae/0x3e0 [ 1118.155880][T25504] ? sctp_add_bind_addr+0xae/0x3e0 [ 1118.155897][T25504] sctp_add_bind_addr+0xae/0x3e0 [ 1118.155917][T25504] sctp_copy_local_addr_list+0x349/0x550 [ 1118.155942][T25504] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 1118.155965][T25504] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360 [ 1118.155988][T25504] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1118.156007][T25504] sctp_bind_addr_copy+0xe0/0x530 [ 1118.156030][T25504] sctp_connect_new_asoc+0x1c9/0x770 [ 1118.156046][T25504] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 1118.156060][T25504] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 1118.156082][T25504] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 1118.156111][T25504] __sctp_connect+0x3e7/0xc70 [ 1118.156129][T25504] ? __pfx___sctp_connect+0x10/0x10 [ 1118.156145][T25504] ? __pfx_sctp_inet_connect+0x10/0x10 [ 1118.156161][T25504] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1118.156178][T25504] ? __pfx_sctp_inet_connect+0x10/0x10 [ 1118.156192][T25504] sctp_inet_connect+0x15f/0x220 [ 1118.156207][T25504] __sys_connect_file+0x141/0x1a0 [ 1118.156231][T25504] __sys_connect+0x141/0x170 [ 1118.156249][T25504] ? __pfx___sys_connect+0x10/0x10 [ 1118.156267][T25504] ? __fget_files+0x21f/0x3d0 [ 1118.156290][T25504] ? __pfx_ksys_write+0x10/0x10 [ 1118.156310][T25504] __x64_sys_connect+0x72/0xb0 [ 1118.156328][T25504] ? lockdep_hardirqs_on+0x78/0x100 [ 1118.156346][T25504] do_syscall_64+0xc9/0xf80 [ 1118.156365][T25504] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1118.156381][T25504] RIP: 0033:0x7f1ad659aeb9 [ 1118.156393][T25504] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1118.156408][T25504] RSP: 002b:00007f1ad73b2028 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1118.156424][T25504] RAX: ffffffffffffffda RBX: 00007f1ad6815fa0 RCX: 00007f1ad659aeb9 [ 1118.156434][T25504] RDX: 0000000000000054 RSI: 0000200000000080 RDI: 0000000000000003 [ 1118.156443][T25504] RBP: 00007f1ad73b2090 R08: 0000000000000000 R09: 0000000000000000 [ 1118.156453][T25504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1118.156461][T25504] R13: 00007f1ad6816038 R14: 00007f1ad6815fa0 R15: 00007ffdacaecee8 [ 1118.156481][T25504] [ 1118.455817][T25505] netlink: 74 bytes leftover after parsing attributes in process `syz.1.4382'. [ 1119.387069][T25531] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input729 [ 1119.835449][T25535] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input730 [ 1120.839990][T25558] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x18000 [ 1120.928790][T25558] flags: 0xfff00000002000(reserved|node=0|zone=1|lastcpupid=0x7ff) [ 1120.974503][T25558] raw: 00fff00000002000 ffffea0000600008 ffffea0000600008 0000000000000000 [ 1121.026469][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1121.033186][T25558] raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 [ 1121.041909][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1121.064235][T25558] page dumped because: unmovable page [ 1121.085910][T25558] page_owner info is not present (never set?) [ 1121.239139][T25545] kexec: Could not allocate control_code_buffer [ 1122.324891][T25577] FAULT_INJECTION: forcing a failure. [ 1122.324891][T25577] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.392583][T25577] CPU: 0 UID: 0 PID: 25577 Comm: syz.3.4402 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1122.392613][T25577] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1122.392620][T25577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1122.392629][T25577] Call Trace: [ 1122.392635][T25577] [ 1122.392641][T25577] dump_stack_lvl+0x100/0x190 [ 1122.392664][T25577] should_fail_ex.cold+0x5/0xa [ 1122.392689][T25577] should_failslab+0xc2/0x120 [ 1122.392711][T25577] __kmalloc_cache_noprof+0x80/0x810 [ 1122.392727][T25577] ? sctp_add_bind_addr+0xae/0x3e0 [ 1122.392748][T25577] ? sctp_add_bind_addr+0xae/0x3e0 [ 1122.392766][T25577] sctp_add_bind_addr+0xae/0x3e0 [ 1122.392786][T25577] sctp_copy_local_addr_list+0x349/0x550 [ 1122.392811][T25577] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 1122.392834][T25577] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360 [ 1122.392857][T25577] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1122.392875][T25577] sctp_bind_addr_copy+0xe0/0x530 [ 1122.392897][T25577] sctp_connect_new_asoc+0x1c9/0x770 [ 1122.392914][T25577] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 1122.392928][T25577] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 1122.392950][T25577] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 1122.392978][T25577] __sctp_connect+0x3e7/0xc70 [ 1122.392997][T25577] ? __pfx___sctp_connect+0x10/0x10 [ 1122.393013][T25577] ? __pfx_sctp_inet_connect+0x10/0x10 [ 1122.393029][T25577] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1122.393046][T25577] ? __pfx_sctp_inet_connect+0x10/0x10 [ 1122.393060][T25577] sctp_inet_connect+0x15f/0x220 [ 1122.393075][T25577] __sys_connect_file+0x141/0x1a0 [ 1122.393098][T25577] __sys_connect+0x141/0x170 [ 1122.393117][T25577] ? __pfx___sys_connect+0x10/0x10 [ 1122.393135][T25577] ? __fget_files+0x21f/0x3d0 [ 1122.393158][T25577] ? __pfx_ksys_write+0x10/0x10 [ 1122.393179][T25577] __x64_sys_connect+0x72/0xb0 [ 1122.393197][T25577] ? lockdep_hardirqs_on+0x78/0x100 [ 1122.393215][T25577] do_syscall_64+0xc9/0xf80 [ 1122.393234][T25577] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1122.393250][T25577] RIP: 0033:0x7f6b5c99aeb9 [ 1122.393262][T25577] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1122.393277][T25577] RSP: 002b:00007f6b5d7b6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1122.393293][T25577] RAX: ffffffffffffffda RBX: 00007f6b5cc15fa0 RCX: 00007f6b5c99aeb9 [ 1122.393304][T25577] RDX: 0000000000000054 RSI: 0000200000000080 RDI: 0000000000000003 [ 1122.393313][T25577] RBP: 00007f6b5d7b6090 R08: 0000000000000000 R09: 0000000000000000 [ 1122.393322][T25577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1122.393331][T25577] R13: 00007f6b5cc16038 R14: 00007f6b5cc15fa0 R15: 00007fff4f5ee498 [ 1122.393350][T25577] [ 1123.739364][T25588] futex_wake_op: syz.1.4406 tries to shift op by -2048; fix this program [ 1124.028312][T25606] HfR: entered promiscuous mode [ 1124.126309][T25606] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4410'. [ 1124.217989][T25606] HfR: left promiscuous mode [ 1124.268930][T25602] zswap: compressor not available [ 1124.928654][T25629] HfR: entered promiscuous mode [ 1124.970722][T25629] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4415'. [ 1125.046499][T25629] HfR: left promiscuous mode [ 1125.332350][T25639] syz_tun: tun_chr_ioctl cmd 1074025678 [ 1125.381140][T25639] syz_tun: group set to 23693 [ 1125.418613][T25636] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.2.4416: iget: checksum invalid [ 1125.484232][T25636] faux_driver regulatory: loading /lib/firmware/updates/syzkaller/regulatory.db failed with error -74 [ 1125.529369][T25636] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.2.4416: iget: checksum invalid [ 1125.596165][T25636] faux_driver regulatory: loading /lib/firmware/updates/regulatory.db failed with error -74 [ 1125.642097][T25636] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.2.4416: iget: checksum invalid [ 1125.690366][T25636] faux_driver regulatory: loading /lib/firmware/syzkaller/regulatory.db failed with error -74 [ 1125.735865][T25636] EXT4-fs error (device sda1): ext4_lookup:1785: inode #274: comm syz.2.4416: iget: checksum invalid [ 1125.781999][T25636] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -74 [ 1125.819715][T25636] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -74 [ 1125.876107][T25636] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 1126.228359][T25653] zswap: compressor not available [ 1126.567160][T25668] FAULT_INJECTION: forcing a failure. [ 1126.567160][T25668] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.602645][T25668] CPU: 0 UID: 0 PID: 25668 Comm: syz.2.4424 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1126.602676][T25668] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1126.602684][T25668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1126.602694][T25668] Call Trace: [ 1126.602699][T25668] [ 1126.602705][T25668] dump_stack_lvl+0x100/0x190 [ 1126.602729][T25668] should_fail_ex.cold+0x5/0xa [ 1126.602756][T25668] should_failslab+0xc2/0x120 [ 1126.602778][T25668] __kmalloc_cache_noprof+0x80/0x810 [ 1126.602794][T25668] ? io_wq_create+0x6a/0x9a0 [ 1126.602812][T25668] ? io_wq_create+0x6a/0x9a0 [ 1126.602826][T25668] io_wq_create+0x6a/0x9a0 [ 1126.602847][T25668] io_uring_alloc_task_context+0x2db/0x54b [ 1126.602871][T25668] ? __pfx_io_uring_alloc_task_context+0x10/0x10 [ 1126.602893][T25668] ? alloc_file_pseudo+0x1a5/0x230 [ 1126.602918][T25668] __io_uring_add_tctx_node.cold+0x10/0x185 [ 1126.602939][T25668] ? __pfx___io_uring_add_tctx_node+0x10/0x10 [ 1126.602965][T25668] ? __anon_inode_getfile+0x17c/0x280 [ 1126.602986][T25668] io_uring_setup.cold+0x17f8/0x1a89 [ 1126.603008][T25668] ? __pfx_io_uring_setup+0x10/0x10 [ 1126.603029][T25668] ? __pfx_do_futex+0x10/0x10 [ 1126.603056][T25668] ? __pfx_task_work_run+0x10/0x10 [ 1126.603079][T25668] ? xfd_validate_state+0x129/0x190 [ 1126.603107][T25668] __x64_sys_io_uring_setup+0xc2/0x170 [ 1126.603126][T25668] do_syscall_64+0xc9/0xf80 [ 1126.603145][T25668] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1126.603161][T25668] RIP: 0033:0x7f1ad659aeb9 [ 1126.603174][T25668] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1126.603189][T25668] RSP: 002b:00007f1ad73b2028 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 1126.603204][T25668] RAX: ffffffffffffffda RBX: 00007f1ad6815fa0 RCX: 00007f1ad659aeb9 [ 1126.603215][T25668] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1126.603223][T25668] RBP: 00007f1ad6608c1f R08: 0000000000000000 R09: 0000000000000000 [ 1126.603232][T25668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1126.603241][T25668] R13: 00007f1ad6816038 R14: 00007f1ad6815fa0 R15: 00007ffdacaecee8 [ 1126.603260][T25668] [ 1127.085083][T19366] Bluetooth: hci2: Opcode 0x0c03 failed: -110 [ 1128.954600][T25715] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4436'. [ 1129.568908][T25742] loop6: detected capacity change from 0 to 8192 [ 1130.477262][T25724] kexec: Could not allocate control_code_buffer [ 1130.619193][T25757] zswap: compressor not available [ 1133.180169][T19366] Bluetooth: hci2: Opcode 0x0c03 failed: -110 [ 1133.583685][T25818] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4461'. [ 1133.815492][T25822] FAULT_INJECTION: forcing a failure. [ 1133.815492][T25822] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.874085][T25822] CPU: 0 UID: 0 PID: 25822 Comm: syz.3.4463 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1133.874115][T25822] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1133.874122][T25822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1133.874131][T25822] Call Trace: [ 1133.874137][T25822] [ 1133.874143][T25822] dump_stack_lvl+0x100/0x190 [ 1133.874166][T25822] should_fail_ex.cold+0x5/0xa [ 1133.874191][T25822] should_failslab+0xc2/0x120 [ 1133.874213][T25822] __kmalloc_cache_noprof+0x80/0x810 [ 1133.874229][T25822] ? sctp_add_bind_addr+0xae/0x3e0 [ 1133.874251][T25822] ? sctp_add_bind_addr+0xae/0x3e0 [ 1133.874269][T25822] sctp_add_bind_addr+0xae/0x3e0 [ 1133.874289][T25822] sctp_copy_local_addr_list+0x349/0x550 [ 1133.874314][T25822] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 1133.874337][T25822] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360 [ 1133.874360][T25822] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1133.874378][T25822] sctp_bind_addr_copy+0xe0/0x530 [ 1133.874401][T25822] sctp_connect_new_asoc+0x1c9/0x770 [ 1133.874418][T25822] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 1133.874432][T25822] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 1133.874454][T25822] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 1133.874481][T25822] __sctp_connect+0x3e7/0xc70 [ 1133.874500][T25822] ? __pfx___sctp_connect+0x10/0x10 [ 1133.874516][T25822] ? __pfx_sctp_inet_connect+0x10/0x10 [ 1133.874532][T25822] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1133.874549][T25822] ? __pfx_sctp_inet_connect+0x10/0x10 [ 1133.874562][T25822] sctp_inet_connect+0x15f/0x220 [ 1133.874578][T25822] __sys_connect_file+0x141/0x1a0 [ 1133.874600][T25822] __sys_connect+0x141/0x170 [ 1133.874619][T25822] ? __pfx___sys_connect+0x10/0x10 [ 1133.874636][T25822] ? __fget_files+0x21f/0x3d0 [ 1133.874659][T25822] ? __pfx_ksys_write+0x10/0x10 [ 1133.874680][T25822] __x64_sys_connect+0x72/0xb0 [ 1133.874698][T25822] ? lockdep_hardirqs_on+0x78/0x100 [ 1133.874715][T25822] do_syscall_64+0xc9/0xf80 [ 1133.874735][T25822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1133.874750][T25822] RIP: 0033:0x7f6b5c99aeb9 [ 1133.874762][T25822] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1133.874776][T25822] RSP: 002b:00007f6b5d7b6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1133.874792][T25822] RAX: ffffffffffffffda RBX: 00007f6b5cc15fa0 RCX: 00007f6b5c99aeb9 [ 1133.874802][T25822] RDX: 0000000000000054 RSI: 0000200000000080 RDI: 0000000000000003 [ 1133.874812][T25822] RBP: 00007f6b5d7b6090 R08: 0000000000000000 R09: 0000000000000000 [ 1133.874821][T25822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1133.874830][T25822] R13: 00007f6b5cc16038 R14: 00007f6b5cc15fa0 R15: 00007fff4f5ee498 [ 1133.874849][T25822] [ 1135.039775][T25844] zswap: compressor not available [ 1135.934664][T25877] HfR: entered promiscuous mode [ 1135.973691][T25877] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4476'. [ 1136.021910][T25877] HfR: left promiscuous mode [ 1138.253326][T25928] zswap: compressor not available [ 1139.685974][T25977] netlink: 146 bytes leftover after parsing attributes in process `syz.4.4501'. [ 1141.167185][T26014] netlink: 'syz.1.4508': attribute type 19 has an invalid length. [ 1141.214169][T26014] netlink: 334 bytes leftover after parsing attributes in process `syz.1.4508'. [ 1141.433842][T26013] zswap: compressor not available [ 1141.756588][T26028] HfR: entered promiscuous mode [ 1143.272648][T26056] FAULT_INJECTION: forcing a failure. [ 1143.272648][T26056] name failslab, interval 1, probability 0, space 0, times 0 [ 1143.330180][T26056] CPU: 0 UID: 0 PID: 26056 Comm: syz.3.4518 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1143.330211][T26056] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1143.330219][T26056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1143.330229][T26056] Call Trace: [ 1143.330235][T26056] [ 1143.330242][T26056] dump_stack_lvl+0x100/0x190 [ 1143.330265][T26056] should_fail_ex.cold+0x5/0xa [ 1143.330291][T26056] should_failslab+0xc2/0x120 [ 1143.330312][T26056] __kmalloc_cache_noprof+0x80/0x810 [ 1143.330327][T26056] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 1143.330343][T26056] ? io_uring_alloc_task_context+0x1a6/0x54b [ 1143.330373][T26056] ? io_uring_alloc_task_context+0x1a6/0x54b [ 1143.330393][T26056] io_uring_alloc_task_context+0x1a6/0x54b [ 1143.330416][T26056] ? __pfx_io_uring_alloc_task_context+0x10/0x10 [ 1143.330438][T26056] ? alloc_file_pseudo+0x1a5/0x230 [ 1143.330463][T26056] __io_uring_add_tctx_node.cold+0x10/0x185 [ 1143.330484][T26056] ? __pfx___io_uring_add_tctx_node+0x10/0x10 [ 1143.330510][T26056] ? __anon_inode_getfile+0x17c/0x280 [ 1143.330532][T26056] io_uring_setup.cold+0x17f8/0x1a89 [ 1143.330553][T26056] ? __pfx_io_uring_setup+0x10/0x10 [ 1143.330574][T26056] ? __pfx_do_futex+0x10/0x10 [ 1143.330602][T26056] ? __pfx_task_work_run+0x10/0x10 [ 1143.330626][T26056] ? xfd_validate_state+0x129/0x190 [ 1143.330653][T26056] __x64_sys_io_uring_setup+0xc2/0x170 [ 1143.330672][T26056] do_syscall_64+0xc9/0xf80 [ 1143.330691][T26056] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1143.330707][T26056] RIP: 0033:0x7f6b5c99aeb9 [ 1143.330720][T26056] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1143.330735][T26056] RSP: 002b:00007f6b5d7b6028 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 1143.330751][T26056] RAX: ffffffffffffffda RBX: 00007f6b5cc15fa0 RCX: 00007f6b5c99aeb9 [ 1143.330761][T26056] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 1143.330770][T26056] RBP: 00007f6b5ca08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1143.330779][T26056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1143.330788][T26056] R13: 00007f6b5cc16038 R14: 00007f6b5cc15fa0 R15: 00007fff4f5ee498 [ 1143.330808][T26056] [ 1143.742946][T26072] netlink: 'syz.2.4522': attribute type 19 has an invalid length. [ 1143.751306][T26072] netlink: 334 bytes leftover after parsing attributes in process `syz.2.4522'. [ 1144.066247][T19366] Bluetooth: hci2: Opcode 0x0c03 failed: -110 [ 1144.352847][T26086] HfR: entered promiscuous mode [ 1144.659570][T26088] zswap: compressor not available [ 1144.671451][T26095] ovs_ÿþÿþ?: entered promiscuous mode [ 1145.269481][T26109] overlayfs: missing 'lowerdir' [ 1145.757217][T26130] netlink: 12 bytes leftover after parsing attributes in process `syz.4.4540'. [ 1145.803701][T26118] zswap: compressor not available [ 1145.932372][T26134] netlink: 'syz.2.4542': attribute type 19 has an invalid length. [ 1145.992647][T26134] netlink: 334 bytes leftover after parsing attributes in process `syz.2.4542'. [ 1146.246368][T26140] EXT4-fs error (device sda1): ext4_validate_inode_bitmap:104: comm syz-executor: Corrupt inode bitmap - block_group = 2, inode_bitmap = 139 [ 1146.272662][T26136] netlink: 350 bytes leftover after parsing attributes in process `syz.3.4543'. [ 1146.701722][T19635] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 1146.712338][T19635] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 1146.721074][T19635] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 1146.731988][T19635] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 1146.739666][T19635] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 1147.737400][T25049] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1147.951889][T25049] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1147.964612][T26173] zswap: compressor not available [ 1148.243520][T25049] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1148.408644][T25049] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1148.571567][T26151] chnl_net:caif_netlink_parms(): no params data found [ 1148.787565][T19635] Bluetooth: hci2: command tx timeout [ 1149.047090][T26151] bridge0: port 1(bridge_slave_0) entered blocking state [ 1149.092840][T26151] bridge0: port 1(bridge_slave_0) entered disabled state [ 1149.144360][T26151] bridge_slave_0: entered allmulticast mode [ 1149.203885][T26151] bridge_slave_0: entered promiscuous mode [ 1149.261271][T25049] bridge_slave_1: left allmulticast mode [ 1149.284920][T25049] bridge_slave_1: left promiscuous mode [ 1149.325436][T25049] bridge0: port 2(bridge_slave_1) entered disabled state [ 1149.391916][T25049] bridge_slave_0: left allmulticast mode [ 1149.437970][T25049] bridge_slave_0: left promiscuous mode [ 1149.469770][T25049] bridge0: port 1(bridge_slave_0) entered disabled state [ 1149.737092][T26143] kexec: Could not allocate control_code_buffer [ 1150.869586][T19635] Bluetooth: hci2: command tx timeout [ 1150.902045][T26230] zswap: compressor not available [ 1151.056287][T25049] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1151.129075][T25049] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1151.152009][T25049] bond0 (unregistering): Released all slaves [ 1151.166329][T26240] zswap: compressor not available [ 1151.194937][T26151] bridge0: port 2(bridge_slave_1) entered blocking state [ 1151.239079][T26151] bridge0: port 2(bridge_slave_1) entered disabled state [ 1151.265335][T26151] bridge_slave_1: entered allmulticast mode [ 1151.292063][T26151] bridge_slave_1: entered promiscuous mode [ 1151.318598][T25049] ovs_?ÿþÿþ?: left promiscuous mode [ 1151.480715][T26250] netlink: 'syz.3.4562': attribute type 19 has an invalid length. [ 1151.502542][T26151] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1151.520873][T26250] netlink: 334 bytes leftover after parsing attributes in process `syz.3.4562'. [ 1151.542207][T26151] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1151.780024][T26151] team0: Port device team_slave_0 added [ 1151.807183][T26151] team0: Port device team_slave_1 added [ 1152.223604][T26261] zswap: compressor not available [ 1152.363174][T26151] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1152.404618][T26151] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1152.523984][T26151] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1152.660275][T26151] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1152.667230][T26151] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1152.842059][T26151] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1152.950427][T19394] Bluetooth: hci2: command tx timeout [ 1153.289298][T25049] hsr_slave_0: left promiscuous mode [ 1153.301285][T25049] hsr_slave_1: left promiscuous mode [ 1153.320264][T25049] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1153.348044][T25049] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1153.380141][T25049] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1153.411350][T25049] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1153.446468][T26284] overlayfs: missing 'lowerdir' [ 1153.495894][T25049] veth0_macvtap: left promiscuous mode [ 1153.524785][T25049] veth1_vlan: left promiscuous mode [ 1153.542743][T25049] veth0_vlan: left promiscuous mode [ 1153.793802][T25049] pim6reg (unregistering): left allmulticast mode [ 1153.910675][T19635] Bluetooth: hci3: Opcode 0x0c03 failed: -110 [ 1154.309156][T26291] FAULT_INJECTION: forcing a failure. [ 1154.309156][T26291] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1154.365363][T26291] CPU: 0 UID: 0 PID: 26291 Comm: syz.4.4568 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1154.365395][T26291] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1154.365402][T26291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1154.365413][T26291] Call Trace: [ 1154.365418][T26291] [ 1154.365425][T26291] dump_stack_lvl+0x100/0x190 [ 1154.365449][T26291] should_fail_ex.cold+0x5/0xa [ 1154.365473][T26291] ? prepare_alloc_pages+0x16d/0x5f0 [ 1154.365496][T26291] should_fail_alloc_page+0xeb/0x140 [ 1154.365518][T26291] prepare_alloc_pages+0x1f0/0x5f0 [ 1154.365543][T26291] __alloc_frozen_pages_noprof+0x193/0x2410 [ 1154.365562][T26291] ? folio_lock_anon_vma_read+0x348/0xe30 [ 1154.365580][T26291] ? folio_lock_anon_vma_read+0x348/0xe30 [ 1154.365598][T26291] ? __up_read+0x2c5/0x700 [ 1154.365620][T26291] ? __pfx___up_read+0x10/0x10 [ 1154.365641][T26291] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1154.365676][T26291] __folio_alloc_noprof+0x13/0x2f0 [ 1154.365694][T26291] alloc_migration_target+0x1d7/0x640 [ 1154.365717][T26291] migrate_pages_batch+0x4f2/0x4530 [ 1154.365741][T26291] ? __pfx_alloc_migration_target+0x10/0x10 [ 1154.365769][T26291] ? walk_pgd_range+0x1115/0x1eb0 [ 1154.365787][T26291] ? __pfx_migrate_pages_batch+0x10/0x10 [ 1154.365822][T26291] migrate_pages_sync+0x12c/0x880 [ 1154.365845][T26291] ? __pfx_alloc_migration_target+0x10/0x10 [ 1154.365871][T26291] ? __pfx_migrate_pages_sync+0x10/0x10 [ 1154.365893][T26291] ? __pfx_queue_pages_test_walk+0x10/0x10 [ 1154.365918][T26291] ? walk_page_range_mm_unsafe+0x32c/0xad0 [ 1154.365941][T26291] migrate_pages+0x1a5b/0x2810 [ 1154.365967][T26291] ? __pfx_alloc_migration_target+0x10/0x10 [ 1154.365993][T26291] ? __pfx_migrate_pages+0x10/0x10 [ 1154.366015][T26291] ? queue_pages_range+0x11e/0x180 [ 1154.366035][T26291] ? __up_read+0x2c5/0x700 [ 1154.366056][T26291] ? __pfx___up_read+0x10/0x10 [ 1154.366076][T26291] ? do_migrate_pages+0x451/0x740 [ 1154.366096][T26291] ? do_migrate_pages+0x451/0x740 [ 1154.366120][T26291] do_migrate_pages+0x488/0x740 [ 1154.366146][T26291] ? __pfx_do_migrate_pages+0x10/0x10 [ 1154.366170][T26291] ? rcu_is_watching+0x12/0xc0 [ 1154.366185][T26291] ? get_task_mm+0xc2/0xf0 [ 1154.366203][T26291] ? security_capable+0xbd/0x260 [ 1154.366224][T26291] kernel_migrate_pages+0x560/0x700 [ 1154.366245][T26291] ? __pfx_kernel_migrate_pages+0x10/0x10 [ 1154.366271][T26291] __x64_sys_migrate_pages+0x96/0x100 [ 1154.366293][T26291] ? lockdep_hardirqs_on+0x78/0x100 [ 1154.366320][T26291] do_syscall_64+0xc9/0xf80 [ 1154.366341][T26291] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1154.366357][T26291] RIP: 0033:0x7f046dd9aeb9 [ 1154.366372][T26291] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1154.366387][T26291] RSP: 002b:00007f046eb9f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000100 [ 1154.366404][T26291] RAX: ffffffffffffffda RBX: 00007f046e015fa0 RCX: 00007f046dd9aeb9 [ 1154.366415][T26291] RDX: 0000200000000100 RSI: 000000000000000a RDI: 0000000000000000 [ 1154.366425][T26291] RBP: 00007f046de08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1154.366436][T26291] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000000 [ 1154.366447][T26291] R13: 00007f046e016038 R14: 00007f046e015fa0 R15: 00007fff4f78b378 [ 1154.366468][T26291] [ 1154.994666][T25049] team0 (unregistering): Port device team_slave_1 removed [ 1155.079663][T19366] Bluetooth: hci4: Opcode 0x0c03 failed: -110 [ 1155.097314][T19366] Bluetooth: hci2: command tx timeout [ 1155.659754][T26291] FAULT_INJECTION: forcing a failure. [ 1155.659754][T26291] name failslab, interval 1, probability 0, space 0, times 0 [ 1155.711925][T26291] CPU: 0 UID: 0 PID: 26291 Comm: syz.4.4568 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1155.711957][T26291] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1155.711965][T26291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1155.711975][T26291] Call Trace: [ 1155.711981][T26291] [ 1155.711988][T26291] dump_stack_lvl+0x100/0x190 [ 1155.712011][T26291] should_fail_ex.cold+0x5/0xa [ 1155.712037][T26291] should_failslab+0xc2/0x120 [ 1155.712058][T26291] kmem_cache_alloc_lru_noprof+0x8e/0x7d0 [ 1155.712078][T26291] ? start_dirop+0x79/0xb0 [ 1155.712094][T26291] ? alloc_inode+0x68/0x250 [ 1155.712117][T26291] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 1155.712134][T26291] ? alloc_inode+0x68/0x250 [ 1155.712154][T26291] alloc_inode+0x68/0x250 [ 1155.712178][T26291] new_inode+0x22/0x1c0 [ 1155.712201][T26291] __debugfs_create_file+0x105/0x4f0 [ 1155.712221][T26291] debugfs_create_file_full+0x41/0x60 [ 1155.712242][T26291] drm_debugfs_clients_add+0xd9/0x210 [ 1155.712262][T26291] drm_file_alloc+0x5c6/0xb40 [ 1155.712283][T26291] drm_open_helper+0x1fc/0x540 [ 1155.712305][T26291] drm_open+0x1a0/0x3e0 [ 1155.712323][T26291] ? __pfx_drm_open+0x10/0x10 [ 1155.712341][T26291] drm_stub_open+0x20f/0x380 [ 1155.712362][T26291] ? __pfx_drm_stub_open+0x10/0x10 [ 1155.712381][T26291] chrdev_open+0x234/0x6a0 [ 1155.712398][T26291] ? __pfx_apparmor_file_open+0x10/0x10 [ 1155.712418][T26291] ? __pfx_chrdev_open+0x10/0x10 [ 1155.712437][T26291] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1155.712459][T26291] do_dentry_open+0x73e/0x1570 [ 1155.712476][T26291] ? __pfx_chrdev_open+0x10/0x10 [ 1155.712494][T26291] ? security_inode_permission+0xbf/0x250 [ 1155.712518][T26291] vfs_open+0x82/0x3f0 [ 1155.712541][T26291] path_openat+0x21dc/0x3120 [ 1155.712565][T26291] ? __pfx_path_openat+0x10/0x10 [ 1155.712589][T26291] do_filp_open+0x1f7/0x420 [ 1155.712608][T26291] ? __pfx_do_filp_open+0x10/0x10 [ 1155.712638][T26291] ? _raw_spin_unlock+0x28/0x50 [ 1155.712653][T26291] ? alloc_fd+0x476/0x790 [ 1155.712674][T26291] do_sys_openat2+0x12e/0x220 [ 1155.712696][T26291] ? __pfx_do_sys_openat2+0x10/0x10 [ 1155.712720][T26291] ? __fget_files+0x21f/0x3d0 [ 1155.712740][T26291] __x64_sys_openat+0x12d/0x210 [ 1155.712763][T26291] ? __pfx___x64_sys_openat+0x10/0x10 [ 1155.712784][T26291] ? xfd_validate_state+0x129/0x190 [ 1155.712814][T26291] do_syscall_64+0xc9/0xf80 [ 1155.712833][T26291] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1155.712849][T26291] RIP: 0033:0x7f046dd9aeb9 [ 1155.712871][T26291] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1155.712888][T26291] RSP: 002b:00007f046eb9f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1155.712905][T26291] RAX: ffffffffffffffda RBX: 00007f046e015fa0 RCX: 00007f046dd9aeb9 [ 1155.712916][T26291] RDX: 0000000000000000 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1155.712927][T26291] RBP: 00007f046de08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1155.712936][T26291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1155.712945][T26291] R13: 00007f046e016038 R14: 00007f046e015fa0 R15: 00007fff4f78b378 [ 1155.712966][T26291] [ 1155.713030][T26291] debugfs: out of free dentries, can not create file 'proc_info' [ 1156.817713][T26151] hsr_slave_0: entered promiscuous mode [ 1156.838960][T26151] hsr_slave_1: entered promiscuous mode [ 1156.852155][T26151] debugfs: 'hsr0' already exists in 'hsr' [ 1156.865345][T26151] Cannot create hsr debugfs directory [ 1157.741611][T26340] FAULT_INJECTION: forcing a failure. [ 1157.741611][T26340] name failslab, interval 1, probability 0, space 0, times 0 [ 1157.831420][T26340] CPU: 0 UID: 0 PID: 26340 Comm: syz.3.4580 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1157.831451][T26340] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1157.831459][T26340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1157.831468][T26340] Call Trace: [ 1157.831474][T26340] [ 1157.831481][T26340] dump_stack_lvl+0x100/0x190 [ 1157.831504][T26340] should_fail_ex.cold+0x5/0xa [ 1157.831529][T26340] should_failslab+0xc2/0x120 [ 1157.831551][T26340] kmem_cache_alloc_lru_noprof+0x8e/0x7d0 [ 1157.831571][T26340] ? do_raw_spin_lock+0x128/0x260 [ 1157.831593][T26340] ? find_held_lock+0x2b/0x80 [ 1157.831607][T26340] ? __d_alloc+0x34/0xa80 [ 1157.831628][T26340] ? __d_alloc+0x34/0xa80 [ 1157.831644][T26340] __d_alloc+0x34/0xa80 [ 1157.831664][T26340] d_alloc_pseudo+0x1c/0xc0 [ 1157.831686][T26340] alloc_file_pseudo+0xcf/0x230 [ 1157.831708][T26340] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1157.831729][T26340] ? alloc_fd+0x476/0x790 [ 1157.831749][T26340] sock_alloc_file+0x50/0x210 [ 1157.831773][T26340] __sys_socket+0x1c0/0x260 [ 1157.831789][T26340] ? fput+0x79/0x100 [ 1157.831807][T26340] ? __pfx___sys_socket+0x10/0x10 [ 1157.831824][T26340] ? xfd_validate_state+0x129/0x190 [ 1157.831851][T26340] __x64_sys_socket+0x72/0xb0 [ 1157.831868][T26340] ? lockdep_hardirqs_on+0x78/0x100 [ 1157.831885][T26340] do_syscall_64+0xc9/0xf80 [ 1157.831904][T26340] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1157.831930][T26340] RIP: 0033:0x7f6b5c99aeb9 [ 1157.831944][T26340] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1157.831960][T26340] RSP: 002b:00007f6b5d7b6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 1157.831977][T26340] RAX: ffffffffffffffda RBX: 00007f6b5cc15fa0 RCX: 00007f6b5c99aeb9 [ 1157.831988][T26340] RDX: 000000000000000a RSI: 0000000000000003 RDI: 0000000000000002 [ 1157.831998][T26340] RBP: 00007f6b5ca08c1f R08: 0000000000000000 R09: 0000000000000000 [ 1157.832008][T26340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1157.832017][T26340] R13: 00007f6b5cc16038 R14: 00007f6b5cc15fa0 R15: 00007fff4f5ee498 [ 1157.832037][T26340] [ 1159.387688][T26373] netlink: 'syz.2.4587': attribute type 19 has an invalid length. [ 1159.429870][T26151] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1159.444894][T26373] netlink: 334 bytes leftover after parsing attributes in process `syz.2.4587'. [ 1159.529262][T26151] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1159.590143][T26378] ovs_ÿþÿþ?: entered promiscuous mode [ 1159.645233][T26151] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1159.688844][T26151] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1159.975335][T26396] openvswitch: HfR: Dropping previously announced user features [ 1160.021337][T26396] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4591'. [ 1160.070456][T26151] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1160.105232][T26396] HfR: left promiscuous mode [ 1160.140016][T26151] 8021q: adding VLAN 0 to HW filter on device team0 [ 1160.168648][T25067] bridge0: port 1(bridge_slave_0) entered blocking state [ 1160.168745][T25067] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1160.188671][T25051] bridge0: port 2(bridge_slave_1) entered blocking state [ 1160.188739][T25051] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1160.426619][T26402] zswap: compressor not available [ 1160.918635][T26151] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1161.080066][T26151] veth0_vlan: entered promiscuous mode [ 1161.122934][T26151] veth1_vlan: entered promiscuous mode [ 1161.262984][T26151] veth0_macvtap: entered promiscuous mode [ 1161.319719][T26151] veth1_macvtap: entered promiscuous mode [ 1161.392542][T26151] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1161.443409][T26151] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1161.492325][T25067] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1161.524726][T25067] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1161.687762][T25067] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1161.721398][T25067] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1161.945830][T19360] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1161.995359][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1162.007784][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1162.020081][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1162.032322][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1162.044614][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1162.057103][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1162.069331][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1162.081544][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1162.093765][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1162.106420][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1163.686998][T19366] Bluetooth: hci3: Opcode 0x0c03 failed: -110 [ 1166.809563][T19360] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1167.006683][ C0] net_ratelimit: 22445 callbacks suppressed [ 1167.006701][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1167.024838][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1167.037069][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1167.049293][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1167.061509][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1167.073698][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1167.085917][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1167.098106][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1167.110303][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1167.122530][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1167.294121][ C0] sched: DL replenish lagged too much [ 1172.019232][ C0] net_ratelimit: 22582 callbacks suppressed [ 1172.019249][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1172.037399][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1172.049705][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1172.061959][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1172.074212][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1172.086446][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1172.098790][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1172.111368][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1172.123636][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1172.135880][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1177.031595][ C0] net_ratelimit: 22975 callbacks suppressed [ 1177.031613][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1177.049777][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1177.062003][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1177.074310][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1177.086638][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1177.098939][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1177.111173][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1177.123398][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1177.135602][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1177.147844][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1182.044160][ C0] net_ratelimit: 23501 callbacks suppressed [ 1182.044177][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1182.062380][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1182.074592][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1182.086837][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1182.099490][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1182.111725][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1182.123939][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1182.136139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1182.148360][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1182.160565][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1182.597252][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1182.609883][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1187.056622][ C0] net_ratelimit: 23030 callbacks suppressed [ 1187.056642][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1187.074823][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1187.087039][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1187.099369][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1187.111623][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1187.123861][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1187.136069][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1187.148302][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1187.160581][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1187.172805][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1192.069382][ C0] net_ratelimit: 22876 callbacks suppressed [ 1192.069400][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1192.087647][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1192.099901][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1192.112163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1192.124422][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1192.136663][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1192.148921][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1192.161161][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1192.173425][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1192.185674][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1197.081632][ C0] net_ratelimit: 23925 callbacks suppressed [ 1197.081649][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1197.099740][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1197.111991][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1197.124171][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1197.136328][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1197.148554][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1197.160748][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1197.173007][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1197.185228][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1197.197395][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1202.094236][ C0] net_ratelimit: 24112 callbacks suppressed [ 1202.094254][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1202.112408][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1202.124592][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1202.136791][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1202.148966][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1202.161106][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1202.173315][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1202.185478][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1202.197655][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1202.209865][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1207.106715][ C0] net_ratelimit: 23311 callbacks suppressed [ 1207.106732][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1207.124863][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1207.137038][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1207.149182][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1207.161413][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1207.173571][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1207.185752][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1207.197956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1207.210138][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1207.222320][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1212.119152][ C0] net_ratelimit: 22816 callbacks suppressed [ 1212.119169][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1212.137235][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1212.149460][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1212.161642][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1212.173812][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1212.186027][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1212.198212][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1212.210350][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1212.222542][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1212.234717][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1217.131756][ C0] net_ratelimit: 24324 callbacks suppressed [ 1217.131774][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1217.149900][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1217.162074][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1217.174237][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1217.186461][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1217.198657][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1217.210838][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1217.223053][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1217.235226][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1217.247371][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1222.144254][ C0] net_ratelimit: 23591 callbacks suppressed [ 1222.144272][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1222.162444][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1222.174625][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1222.186807][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1222.199061][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1222.211271][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1222.223559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1222.236179][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1222.248415][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1222.260635][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1227.156738][ C0] net_ratelimit: 15256 callbacks suppressed [ 1227.156755][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1227.174895][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1227.187652][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1227.199848][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1227.211992][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1227.224752][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1227.236937][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1227.249192][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1227.262023][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1227.274253][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1232.169114][ C0] net_ratelimit: 12707 callbacks suppressed [ 1232.169133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1232.187242][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1232.200064][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1232.212258][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1232.224427][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1232.237176][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1232.249370][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1232.261690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1232.274463][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1232.286646][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1237.181820][ C0] net_ratelimit: 13098 callbacks suppressed [ 1237.181839][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1237.200588][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1237.212778][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1237.224933][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1237.237797][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1237.250048][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1237.262222][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1237.275072][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1237.287352][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1237.299613][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1242.194539][ C0] net_ratelimit: 12870 callbacks suppressed [ 1242.194555][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1242.212703][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1242.225267][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1242.238157][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1242.250421][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1242.262660][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1242.275415][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1242.287614][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1242.299788][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1242.312534][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1244.067940][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1244.081076][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1247.206759][ C0] net_ratelimit: 12839 callbacks suppressed [ 1247.206778][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1247.224889][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1247.237033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1247.249787][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1247.261974][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1247.274123][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1247.286886][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1247.299050][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1247.311182][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1247.323899][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1252.219554][ C0] net_ratelimit: 13328 callbacks suppressed [ 1252.219572][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1252.237705][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1252.249872][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1252.262631][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1252.274808][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1252.287083][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1252.299888][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1252.312089][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1252.324258][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1252.337152][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1257.231751][ C0] net_ratelimit: 13796 callbacks suppressed [ 1257.231768][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1257.249867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1257.262038][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1257.274876][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1257.287094][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1257.299316][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1257.311477][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1257.324184][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1257.336351][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:7a:ce:1d:0e:73:85, vlan:0) [ 1257.348596][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1258.628531][T25051] ------------[ cut here ]------------ [ 1258.643169][T25051] !bss [ 1258.643190][T25051] WARNING: net/wireless/ibss.c:37 at __cfg80211_ibss_joined+0x4d5/0x580, CPU#0: kworker/u10:13/25051 [ 1258.674775][T25051] Modules linked in: [ 1258.678916][T25051] CPU: 0 UID: 0 PID: 25051 Comm: kworker/u10:13 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1258.700630][T25051] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1258.717291][T25051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1258.736306][T25051] Workqueue: cfg80211 cfg80211_event_work [ 1258.742049][T25051] RIP: 0010:__cfg80211_ibss_joined+0x4d5/0x580 [ 1258.757820][T25051] Code: ff ff e8 8e d8 32 f7 90 0f 0b 90 e9 58 fe ff ff e8 10 2f 9c f7 e9 22 fc ff ff e8 a6 2e 9c f7 e9 66 fc ff ff e8 6c d8 32 f7 90 <0f> 0b 90 e9 6f fc ff ff e8 5e d8 32 f7 90 0f 0b e8 16 2f 9c f7 e9 [ 1258.787178][T25051] RSP: 0018:ffffc9000aff7a60 EFLAGS: 00010293 [ 1258.802606][T25051] RAX: 0000000000000000 RBX: ffff888044f8cd90 RCX: 0000000000000040 [ 1258.810596][T25051] RDX: ffff8880784cdb80 RSI: ffffffff8ad37214 RDI: ffffffff8bfa32a0 [ 1258.827614][T25051] RBP: ffffc9000aff7b10 R08: 0000000000000001 R09: 0000000000000000 [ 1258.844413][T25051] R10: 0000000000000001 R11: 0000000000000000 R12: ffff888044f8c000 [ 1258.861387][T25051] R13: 1ffff920015fef50 R14: 0000000000000000 R15: ffffc9000aff7aa0 [ 1258.878345][T25051] FS: 0000000000000000(0000) GS:ffff8881245e3000(0000) knlGS:0000000000000000 [ 1258.896616][T25051] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1258.912540][T25051] CR2: 00007fa9909ea0a3 CR3: 000000000e392000 CR4: 00000000003526f0 [ 1258.920529][T25051] Call Trace: [ 1258.932757][T25051] [ 1258.935700][T25051] ? __pfx___cfg80211_ibss_joined+0x10/0x10 [ 1258.941584][T25051] ? mark_held_locks+0x40/0x70 [ 1258.955161][T25051] ? cfg80211_process_wdev_events+0x3dd/0x5c0 [ 1258.961245][T25051] cfg80211_process_wdev_events+0x3dd/0x5c0 [ 1258.976374][T25051] cfg80211_process_rdev_events+0x9f/0x130 [ 1258.991639][T25051] cfg80211_event_work+0x37/0x70 [ 1259.005452][T25051] process_one_work+0x9c2/0x1840 [ 1259.010423][T25051] ? __pfx_process_one_work+0x10/0x10 [ 1259.024632][T25051] ? assign_work+0x19c/0x250 [ 1259.029236][T25051] worker_thread+0x5da/0xe40 [ 1259.042701][T25051] ? kthread+0x17d/0x730 [ 1259.046953][T25051] ? __pfx_worker_thread+0x10/0x10 [ 1259.052068][T25051] kthread+0x3b3/0x730 [ 1259.065076][T25051] ? __pfx_kthread+0x10/0x10 [ 1259.069680][T25051] ? ret_from_fork+0x79/0xaf0 [ 1259.083112][T25051] ? ret_from_fork+0x79/0xaf0 [ 1259.087800][T25051] ? rcu_is_watching+0x12/0xc0 [ 1259.101895][T25051] ? __pfx_kthread+0x10/0x10 [ 1259.115570][T25051] ret_from_fork+0x754/0xaf0 [ 1259.120172][T25051] ? __pfx_ret_from_fork+0x10/0x10 [ 1259.134112][T25051] ? __switch_to+0x7b9/0x10c0 [ 1259.138804][T25051] ? __pfx_kthread+0x10/0x10 [ 1259.152285][T25051] ret_from_fork_asm+0x1a/0x30 [ 1259.165908][T25051] [ 1259.168939][T25051] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1259.176203][T25051] CPU: 0 UID: 0 PID: 25051 Comm: kworker/u10:13 Tainted: G U I L syzkaller #0 PREEMPT(full) [ 1259.187473][T25051] Tainted: [U]=USER, [I]=FIRMWARE_WORKAROUND, [L]=SOFTLOCKUP [ 1259.194814][T25051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1259.204882][T25051] Workqueue: cfg80211 cfg80211_event_work [ 1259.210609][T25051] Call Trace: [ 1259.213885][T25051] [ 1259.216807][T25051] dump_stack_lvl+0x100/0x190 [ 1259.221476][T25051] vpanic+0x20d/0x630 [ 1259.225442][T25051] panic+0xd1/0xd1 [ 1259.229156][T25051] ? __pfx_panic+0x10/0x10 [ 1259.233577][T25051] ? check_panic_on_warn+0x1f/0x90 [ 1259.238704][T25051] check_panic_on_warn.cold+0x19/0x34 [ 1259.244072][T25051] ? __cfg80211_ibss_joined+0x4d5/0x580 [ 1259.249630][T25051] __warn.cold+0x191/0x2f8 [ 1259.254052][T25051] __report_bug+0x296/0x3d0 [ 1259.258537][T25051] ? __cfg80211_ibss_joined+0x4d5/0x580 [ 1259.264066][T25051] ? __pfx___report_bug+0x10/0x10 [ 1259.269071][T25051] ? rcu_is_watching+0x12/0xc0 [ 1259.273819][T25051] ? __lock_acquire+0x4a5/0x2630 [ 1259.278751][T25051] ? __cfg80211_ibss_joined+0x4d5/0x580 [ 1259.284279][T25051] report_bug+0xb2/0x220 [ 1259.288503][T25051] ? __cfg80211_ibss_joined+0x4d5/0x580 [ 1259.294067][T25051] handle_bug+0x166/0x2a0 [ 1259.298383][T25051] exc_invalid_op+0x17/0x50 [ 1259.302890][T25051] asm_exc_invalid_op+0x1a/0x20 [ 1259.307724][T25051] RIP: 0010:__cfg80211_ibss_joined+0x4d5/0x580 [ 1259.313965][T25051] Code: ff ff e8 8e d8 32 f7 90 0f 0b 90 e9 58 fe ff ff e8 10 2f 9c f7 e9 22 fc ff ff e8 a6 2e 9c f7 e9 66 fc ff ff e8 6c d8 32 f7 90 <0f> 0b 90 e9 6f fc ff ff e8 5e d8 32 f7 90 0f 0b e8 16 2f 9c f7 e9 [ 1259.333570][T25051] RSP: 0018:ffffc9000aff7a60 EFLAGS: 00010293 [ 1259.339630][T25051] RAX: 0000000000000000 RBX: ffff888044f8cd90 RCX: 0000000000000040 [ 1259.347588][T25051] RDX: ffff8880784cdb80 RSI: ffffffff8ad37214 RDI: ffffffff8bfa32a0 [ 1259.355543][T25051] RBP: ffffc9000aff7b10 R08: 0000000000000001 R09: 0000000000000000 [ 1259.363494][T25051] R10: 0000000000000001 R11: 0000000000000000 R12: ffff888044f8c000 [ 1259.371444][T25051] R13: 1ffff920015fef50 R14: 0000000000000000 R15: ffffc9000aff7aa0 [ 1259.379433][T25051] ? __cfg80211_ibss_joined+0x4d4/0x580 [ 1259.384997][T25051] ? __pfx___cfg80211_ibss_joined+0x10/0x10 [ 1259.390906][T25051] ? mark_held_locks+0x40/0x70 [ 1259.395682][T25051] ? cfg80211_process_wdev_events+0x3dd/0x5c0 [ 1259.401761][T25051] cfg80211_process_wdev_events+0x3dd/0x5c0 [ 1259.407658][T25051] cfg80211_process_rdev_events+0x9f/0x130 [ 1259.413453][T25051] cfg80211_event_work+0x37/0x70 [ 1259.418384][T25051] process_one_work+0x9c2/0x1840 [ 1259.423318][T25051] ? __pfx_process_one_work+0x10/0x10 [ 1259.428685][T25051] ? assign_work+0x19c/0x250 [ 1259.433352][T25051] worker_thread+0x5da/0xe40 [ 1259.437940][T25051] ? kthread+0x17d/0x730 [ 1259.442171][T25051] ? __pfx_worker_thread+0x10/0x10 [ 1259.447272][T25051] kthread+0x3b3/0x730 [ 1259.451334][T25051] ? __pfx_kthread+0x10/0x10 [ 1259.455911][T25051] ? ret_from_fork+0x79/0xaf0 [ 1259.460572][T25051] ? ret_from_fork+0x79/0xaf0 [ 1259.465229][T25051] ? rcu_is_watching+0x12/0xc0 [ 1259.469974][T25051] ? __pfx_kthread+0x10/0x10 [ 1259.474551][T25051] ret_from_fork+0x754/0xaf0 [ 1259.479123][T25051] ? __pfx_ret_from_fork+0x10/0x10 [ 1259.484217][T25051] ? __switch_to+0x7b9/0x10c0 [ 1259.488880][T25051] ? __pfx_kthread+0x10/0x10 [ 1259.493466][T25051] ret_from_fork_asm+0x1a/0x30 [ 1259.498231][T25051] [ 1259.501290][T25051] Kernel Offset: disabled [ 1259.505599][T25051] Rebooting in 86400 seconds..