last executing test programs: 7.796980289s ago: executing program 2 (id=613): mmap$auto(0x0, 0x6, 0x2, 0x40eb2, 0xffffffffffffffff, 0x308000000000) (async) close_range$auto(0x2, 0x8, 0x0) openat$auto_uprobe_events_ops_trace_uprobe(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/tracing/uprobe_events\x00', 0x2102, 0x0) (async) socket(0x2, 0x1, 0x106) (async, rerun: 32) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) (async) bind$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x4001, @loopback}, 0x6b) (async) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/controlC2\x00', 0x2584, 0x0) (async) ioctl$auto(0x3, 0xc0045540, 0xb551) 6.875260595s ago: executing program 2 (id=618): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0x8, 0x0) r0 = socket(0x2, 0x80802, 0x0) r1 = socket(0x2b, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x4e22, @loopback}, 0x6a) sendmmsg$auto(r1, &(0x7f0000000140)={{&(0x7f0000000040), 0x10, 0x0, 0x9, 0x0, 0x1f, 0x9}, 0x800009}, 0x7, 0x20000000) ioctl$auto_SNDCTL_DSP_GETISPACE(0xffffffffffffffff, 0x8010500d, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) waitid$auto_P_ALL(0x0, 0x6, &(0x7f00000000c0)={@siginfo_0_0={0x5, 0x5, 0xffffffff, @_sigfault={&(0x7f0000000000)="6ee2a44ddf155204d09dcfb1a8991ad001ce6dda2eb79a460cd39a871ffe21a1a62f87cdad8416a5daf5727d818ad2c384e1ee6f20ed00d050b94a07c2922dd2d32290891621aaf62a42722d530c79180bb81c8f5cb51147d6b12a1bf1db08963cde3ed94dd979ca8894f4758bd89bbeae81d989b06f5ba4b2571b82af9c43e12aaf3c0a946464daf38601a6d991a51492f9c197480266531bd4dc4233304b84da783ba0e068d09a", @_trapno=0xfffffffc}}}, 0xffff, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) openat$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffff9c, 0x0, 0x2a540, 0x0) io_uring_setup$auto(0xa, 0x0) syz_genetlink_get_family_id$auto_nfc(0xfffffffffffffffe, r0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) close_range$auto(0x2, 0xa, 0x0) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, 0x0, 0x40, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x400, 0x0) sendmmsg$auto(0xffffffffffffffff, 0x0, 0x7, 0x4008) mprotect$auto(0x0, 0x8000000000000001, 0x8) setsockopt$auto(0x3, 0x1, 0x2f, 0x0, 0x9) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = prctl$auto(0x3c, 0x1, 0x0, 0x2, 0x6) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0xffffffffffffffff, 0x8000) fchdir$auto(r2) mmap$auto(0x0, 0x2, 0x3, 0x15, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) sendmsg$auto_OVS_FLOW_CMD_GET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x200400f0}, 0x800) unshare$auto(0x8000000) semget$auto(0x0, 0x2e4a, 0x8000) semtimedop$auto(0x0, &(0x7f0000000000)={0x7, 0x9, 0x36ec}, 0x1f4, 0x0) 5.716260754s ago: executing program 1 (id=621): socket(0xa, 0x3, 0x3b) (async, rerun: 32) connect$auto(0x3, &(0x7f0000000000)=@generic={0xa, "0000e100"}, 0x2) (async, rerun: 32) prctl$auto(0x3d, 0x1, 0x0, 0x5, 0x0) (async) mmap$auto(0x0, 0x100, 0xdf, 0xffffffffffffffdd, 0x401, 0x0) (async, rerun: 32) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) (async, rerun: 32) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) (async) close_range$auto(0x2, 0x8, 0x4) close_range$auto(0x0, 0xfffffffffffff000, 0x2) (async) r0 = socket(0x2, 0xa, 0x5) bpf$auto(0x0, &(0x7f0000000000)=@bpf_attr_4={0x1b, r0, 0x10000}, 0x10) (async) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) (async, rerun: 32) mmap$auto(0x0, 0x8000, 0xdf, 0xeb1, 0x401, 0x8000) (rerun: 32) r1 = socket(0xa, 0x5, 0x0) (async) pipe$auto(0x0) setsockopt$auto(0x3, 0xffffffff, 0x3e, 0x0, 0x7) (async) connect$auto(0x3, &(0x7f00000018c0)=@qipcrtr={0x2a, 0x2, 0x4000}, 0x55) (async) io_uring_setup$auto(0x8, 0x0) setsockopt$auto(0x3, 0x10000000084, 0x18, 0x0, 0x8) (async, rerun: 64) io_uring_setup$auto(0x20, 0x0) (async, rerun: 64) bpf$auto(0xc, 0xffffffffffffffff, 0x10000) (async) openat$auto_rtc_dev_fops_dev(0xffffffffffffff9c, &(0x7f0000000340), 0x105281, 0x0) (async) pwrite64$auto(r1, &(0x7f0000000200)='\vX\xb5n\x91p\xe6\x1eRN8\x99\x88\xa8\x14\r>\x94\x1a\xd3\xd3\x1d\xf8\xbebZ\xddL\'\x03\xf1`^\x0fo\x84\xfc\x89\v\xea\x1b\x95\xafQ;CL\"\x01\x0e\xa4\xdf\xdav\x1cC\x8a\xeeq\xf0\xcdr\xfa\xa2@X\xb9_\xdd*\xd1\x14^\xbe\xa2', 0x4d, 0x7f) (async, rerun: 32) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/block/zram0/algorithm_params\x00', 0xa001, 0x0) (rerun: 32) write$auto(r2, &(0x7f0000000140)='\xc7\x83=\"\xad\xff\x8d\xf9;\x18\xa4\xb0\xb4\xd9]\xce\xd8Q~\x17\xfb&L\xf9=b\a\xf1y\xb3\"\x80 B\xb1\x18[\x8f\xdf\x84\'\x8e\x0e+\xbcwx\xe6-!\xfe\xf7\x83\x7f\xc5&\xb6\xb7j\x0f\xa1\xbe!t\x17\x9b?\xbb\xf7\xec\xcc\xd4b\xb1\xc7\xf0\xa1D\x12,I\a\x00\x00\x00\x00\x00\x00\x00%\xcd@Ky\x05\xa6\xe8\xf9^\t\xff\x06\x0eD\xe5\xcd\xcb\xd2\x81\xbf%\x1e\xb4\x94\xf8\xfcj\xd3;\xf4\xcc\xa2\x18\xb6\xc4', 0x81) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/cgroup.threads\x00', 0x80302, 0x0) preadv$auto(0x3, &(0x7f0000000040)={0x0, 0x5}, 0x3, 0xf8, 0xffffffffffffffff) (async) mmap$auto(0x55c, 0x20009, 0xdf, 0xeb2, 0x401, 0x8000) (async, rerun: 32) mmap$auto(0x0, 0x400009, 0xdf, 0x9b70, 0xffffffffffffffff, 0x4) (async, rerun: 32) io_uring_setup$auto(0x401, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) 5.439167568s ago: executing program 1 (id=622): write$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffffff, 0x0, 0x0) mmap$auto(0x7fffffffffffffff, 0x20009, 0x4000000000df, 0x19, 0x401, 0x8001) openat$auto_vmwgfx_driver_fops_vmwgfx_drv(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dri/card1\x00', 0x2000, 0x0) r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/oom_adj\x00', 0x48402, 0x0) read$auto(r0, 0x0, 0x1f40) r1 = socket(0xa, 0x3, 0x3a) close_range$auto(0x2, 0xa, 0x0) openat$auto_ftrace_enable_fops_trace_events(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/kernel/debug/tracing/events/vmalloc/purge_vmap_area_lazy/enable\x00', 0x4000, 0x0) r2 = socket(0x18, 0xa, 0x1) r3 = socket(0xa, 0x3, 0x3a) r4 = openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/pcmC1D0c\x00', 0x8343, 0x0) ioctl$auto_SNDRV_PCM_IOCTL_STATUS322(r4, 0x806c4120, &(0x7f0000000140)={0x6, 0xf, 0x60f6, 0x8, 0x9, 0x6, 0x9, 0x7, 0x7, 0xf88, 0x1, 0x8, 0x2b, 0x9, 0x4, 0xffffffff, 0x86, 0x80000001, "b5d3db4f467e28330f2dd7d66bbc5e3a1810546163bcd06e2872c871d18d5e854886ca79"}) setsockopt$auto(r3, 0x29, 0x4b, &(0x7f00000000c0)='\x15!\xa8^J/\xddCx4!\x00\xd3\x8f\x1e\x1b\xc3 \xe2\xa8\xd6\xd9\xc0\xa2\x0f\x88\xb1e\x8a\xd8?\xfe\xda\xc4\xef\xff(i\xc6@\x91_\vBj\x0eQ\xce\x16\'C\x8c\x01\x98\x92u\xd5\xb8\\\x82,\xe2=y\x9bR\xbcn\xa0c\x16~\x86\"t\x00\x00\x00\x00\xe4\xa5\xfe\xb5', 0x10000110) ioctl$auto_KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) r5 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/scsi/device_info\x00', 0x48041, 0x0) write$auto_proc_reg_file_ops_compat_inode(r5, &(0x7f00000000c0)="22edd92f26639ec0023a8686bd579dcf16f50e9bfa20abfa3a30", 0x1a) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x8) r6 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) rseq$auto(&(0x7f0000000300)={0xe, 0x401, 0x0, 0x6, 0xffffffff, 0x2}, 0x8006, 0x0, 0x6) rseq$auto(&(0x7f0000000300)={0xd, 0x401, 0xfffffffffffffffd, 0x20000006, 0xe}, 0x8002, 0x2, 0x6) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0x2003f0, 0x17) writev$auto(r6, &(0x7f00000000c0)={0x0, 0xffffffff}, 0x6) close_range$auto(0x2, 0x8, 0x0) r7 = syz_genetlink_get_family_id$auto_ovs_flow(&(0x7f0000000280), r1) sendmsg$auto_OVS_FLOW_CMD_DEL(r2, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xe4, r7, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [@OVS_FLOW_ATTR_CLEAR={0x4}, @OVS_FLOW_ATTR_KEY={0xc8, 0x1, 0x0, 0x1, [@generic="b233fd83ea1fd55a39c6a4cb896ae203bfec98722b19732163c63e991a2ea8e860dab82de24e1088609c8fa91f31d09a81acb92bf04343d66a62aca54f85d44109a96e8dd35566acdbffe7d94cdf4954098de5f3f5113766f62aa6", @generic, @typed={0x4, 0x1e}, @generic="f04e934683e23637b1b2c34fde085c2ff2a5778db577d254ccad1ed97d4c52af9825562558319c939e0d6b0f2b714a3c2e9925b146f93a9eec156ab02065c983953706cfd454db8160cf7dc4a3", @generic="9dcaaa8103d4631b734791772b2907eca2da39dc523917fd"]}, @OVS_FLOW_ATTR_PROBE={0x4}]}, 0xe4}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) 5.247159213s ago: executing program 3 (id=624): socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) r0 = openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vbi21\x00', 0x900, 0x0) ioctl$auto(r0, 0xc0945662, r0) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_SMC_NETLINK_GET_DEV_SMCD(r1, &(0x7f0000004380)={0x0, 0x0, &(0x7f0000004340)={&(0x7f0000004300)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB='\v'], 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x810) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), r1) read$auto(r1, &(0x7f0000000000)='\x00', 0x91e2) r2 = pidfd_open$auto(0x1, 0x0) pidfd_send_signal$auto_PIDFD_SIGNAL_THREAD_GROUP(r2, 0x8, &(0x7f0000000440)={@siginfo_0_0={0x8, 0x80, 0x676164a5, @_rt={0x0, 0x0, @sival_ptr=0x0}}}, 0x2) r3 = socket(0x18, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x4008b100, 0x0) getsockopt$auto(0x3, 0x200000000001, 0x26, 0x0, 0x0) 4.947585367s ago: executing program 2 (id=625): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/block/ram7/queue/zone_write_granularity\x00', 0xa900, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r0, &(0x7f0000000400)=""/212, 0xd4) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/kernel/irq/5/chip_name\x00', 0x40000, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r1, &(0x7f0000000680)=""/4121, 0x1019) 4.924527147s ago: executing program 3 (id=627): unshare$auto(0x40000080) mmap$auto(0x0, 0x2020009, 0xffffffffffffffff, 0xeb1, 0xfffffffffffffffa, 0x8000) statx$auto(0x2, 0x0, 0x1000, 0x8, 0x0) open(0x0, 0x4000, 0x124) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) mmap$auto(0x4, 0xa020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x7ffe) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000100)='/proc/fs/cifs/mount_params\x00', 0x802, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f0000000640)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\xff\x7f\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc:\xfa\x01\xd1\xa3\xb5\xc2B\xa5\xac:woR^a\xb9}\xe7\xbd\xe1\xf77.\xa3\xd8\xc2T\x95\x13\x91\xb6p\xf3\xb2w\xe6\xd7\x94DW\x97\x90a\xe6c\xfb\x88x\xd5L\xa9\xe4\x82\x04\xb1\x8b\r\xcaP\\\x1aVP\xc9\xa4`\xfd\v\x94\f\xc1\x0fQ\xc9\xdcL\x03\x9c\xbfk\xa6\xb1\xb0\xa1\xeeJ\xd8\xef\xc8t\x9d\x1e=J\x91W\xc6AuJ\xb9Q\xed\xd1\a\x05\x9d\x85\xb7b#r\xcd\xaf\xb7\x9f\xf7\xd2\xae\x0f\x98\xa9&\xb6~\xd4\xbd\xbbr\xb9\xc3\xacH!\xc1\x90K2\x05K@\xee\xac\xe8\xc7\t\xab\xbf\xa3\xedb\xd7\xb5\xd7\x83&\x95\xb2?\x0e\x85\xaaIGu\xd6$\xeb\xb6\xdd\a\x121\a\xac\x1bx#\x87\xa9\x10\x9b\xf8YD\x04ZL\xca\x99]\x8f[\x90[\xa8\xbf\x98\xa6\xe50(zC\xe84*w\x13\x96\xd5\xd0\x877\x12\xbc\xa1\xd0h@|\xf9\xfa\x9b\x17\x94\xb9\xe7\xf3\x15\x05\x91\xe8\x98p\x7f:\xd7s\xd9wo\x82\xda\xec\x91\xb7\xd9;H\x8a\b\x00\x00\x00\x00\x00\x00\x00\x8aZ\x94\x14$X7\xaeW6=^I\x9fQ\r5c\x81\xca]\x97m\x89o\x8f\xd8}P>I\xd0\xb3\x88C\xd7', 0x100000a3d9) openat$auto_vhost_vsock_fops_vsock(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) socket(0xa, 0x3, 0x3b) socket(0x15, 0x5, 0x0) r1 = socket(0x2, 0x3, 0xa) select$auto(0xe, 0x0, 0x0, &(0x7f0000000040)={[0x1ff, 0x7, 0xd, 0x8fd5, 0x948b, 0x3, 0x15f4da0a, 0x4, 0x3, 0x62, 0x80000002, 0x7, 0x1, 0x9, 0x3, 0xfffffffffefffffe]}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000140), r1) sendmsg$auto_NL80211_CMD_GET_MPP(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r3, 0x200, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f0000000340)={[0x1ff, 0x7, 0xd40, 0x1, 0x948f, 0x5, 0x95f4da0a, 0xffffffffffffffff, 0x3, 0x62, 0x80000001, 0x7, 0x6d3f, 0xa, 0x8, 0x6]}, 0x0) 4.679569848s ago: executing program 1 (id=628): r0 = openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000000880)='/dev/binderfs/binder0\x00', 0x400, 0x0) ioctl$auto_BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) statmount$auto(0x0, 0x0, 0x1fe, 0x81) ppoll$auto(&(0x7f0000000140)={0xffffffffffffffff, 0x3ff, 0x4}, 0x7f, 0x0, 0x0, 0x8) 4.66701568s ago: executing program 2 (id=629): socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) socket(0x848000000015, 0x5, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket(0xa, 0x1, 0x84) bind$auto(0x3, &(0x7f0000000100)=@in={0x2, 0x3, @empty}, 0x6a) statmount$auto(0x0, &(0x7f00000006c0)={0x7, 0x2, 0x4, 0x7, 0x84, 0xfffffffffffffffa, 0x1ffde, 0x820c, 0x6, 0x202, 0x9, 0x2, 0x6, 0x4, 0xfffffffeffffffff, 0xffff, 0x2008000001, 0x10000, 0x80, 0x8, 0x2d7d01bf, 0x7, 0x0, 0x9, 0x4, 0x3, 0x3, 0xff, 0x0, 0x4, 0xffffffe0, [0xf1, 0x0, 0x0, 0x5, 0x0, 0x2, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x80000001, 0xffffffffffffffff, 0x0, 0x80000001, 0x0, 0x20000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6, 0x5, 0x7, 0x0, 0x4, 0x8000000000, 0x400000003, 0x0, 0x2, 0x0, 0x4, 0x2, 0x7ff, 0x0, 0x35, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1000], "f2acef4cf14f5a482b73a752e5588854f875d76c99a789f4fd680ff6cd4eda4c52d629ba030000000000000067a7b56b7248fb28ff7c03777e0f5939107125cf450d2d00ae04c5f4efc3c759903e4281d318b1c25ab91f115ab4d61f232b85947b2290c9c7ca9ac99e0b850ad862ab0e726d99d127331422ee978b8c099e47e1b0c84c2d78551a1cbedf0068ddb9b192bf3bb55ec9319ece9abf1d23427119d3be8f13135e20ae2707000000e7a50a779a9b85832ccfa43e670d3f0cdb76"}, 0x1fe, 0x200a) r0 = openat$auto_uinput_fops_uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) ioctl$auto_UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000000c0)={{0x9, 0xf2cf, 0x8, 0x80}, "6a034a07c7b82d90b69a39e32576f893fba86c9dd051a0094a3836d61c9100fefbbabea6ef9368c7996e841f3f1561d4992f726b0a6c36b0b2fd1678e816201cf562367fe6596824588a2e3d84ba165f", 0x8}) ioctl$auto_UI_DEV_CREATE(r0, 0x5501, 0x0) writev$auto(r0, &(0x7f0000000340)={&(0x7f00000002c0), 0xda7e}, 0x9) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x50) setsockopt$auto(0x3, 0x10000000084, 0x82, 0x0, 0x8) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/block/nbd4/queue/iosched/front_merges\x00', 0xe0281, 0x0) write$auto_kernfs_file_fops_kernfs_internal(r1, &(0x7f00000000c0)='-7', 0x2) connect$auto(0x3, 0x0, 0x55) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x7) close_range$auto(0x2, 0x8, 0x9) r2 = openat$auto_vmwgfx_driver_fops_vmwgfx_drv(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dri/card0\x00', 0x20100, 0x0) ioctl$auto(r2, 0x64ca, 0x40) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS2\x00', 0x101e81, 0x0) mmap$auto(0x0, 0x10001, 0x3f8d, 0xeb1, 0x401, 0x8000) capset$auto(&(0x7f0000000180)={0x19980330}, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) select$auto(0xffffffff, &(0x7f0000000040)={[0x54, 0x10, 0x800000c8be, 0x8, 0x273a, 0x0, 0xb, 0x5, 0x5, 0x330, 0x7, 0x200cf, 0x45, 0xc, 0x5, 0xb98]}, 0x0, 0x0, 0x0) sendmsg$auto_TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)=ANY=[@ANYBLOB='J\x00\x00\x00', @ANYRES16, @ANYBLOB="010025bd7000fcdbdf25020000002c00018028003c8008001b"], 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x44) sendmsg$auto_CTRL_CMD_GETPOLICY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x10, 0x70bd2c, 0x25dfdbfd, {0xa, 0x0, 0xa00}}, 0x14}, 0x1, 0x0, 0x0, 0x20008000}, 0x10004010) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1a0027"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) 4.228520611s ago: executing program 2 (id=631): openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sg0\x00', 0x60042, 0x0) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x22400, 0x0) ioctl$auto_SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0xad, 0x8, 0x7, 0x1, 0x80007, "e722f1f563ee52ea1a039700"}) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x8001, 0x0) r1 = openat$auto_snd_timer_f_ops_timer(0xffffffffffffff9c, 0x0, 0x40c880, 0x0) mmap$auto(0x48d5, 0xe981, 0x1, 0xeb3, r1, 0x8002) setsockopt$auto(0xffffffffffffffff, 0x9, 0x69ce, 0x0, 0x3) read$auto(r1, 0x0, 0xb4d3) prctl$auto(0x1000000003b, 0x1, 0x0, 0x5, 0x7) mmap$auto(0x0, 0x400004, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) socket(0x2, 0x1, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptya6\x00', 0x40001, 0x0) r2 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snd/controlC1\x00', 0x802, 0x0) r3 = io_uring_setup$auto(0x6, 0x0) ioctl$auto(r2, 0xc1205531, r3) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) unshare$auto(0x40000080) r4 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r4, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) socket(0x10, 0x2, 0x0) mmap$auto(0x0, 0x2000a, 0x7e, 0xeb2, 0x401, 0x8000) r5 = open(&(0x7f0000000100)='.\x00', 0x0, 0x408) getdents$auto(r5, 0x0, 0x400018) r6 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nbd13\x00', 0x707343, 0x0) ioctl$auto_BLKROSET(r6, 0x125d, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r7 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000140), 0x8f80, 0x0) ioctl$auto_KVM_CREATE_VM(r7, 0xae01, 0x0) 3.998306002s ago: executing program 0 (id=632): futex$auto(&(0x7f0000001d40)=0x7fffffff, 0x8, 0x5, 0x0, 0x0, 0x6) (fail_nth: 3) 3.749421394s ago: executing program 3 (id=633): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000600), 0xffffffffffffffff) r2 = io_uring_setup$auto(0x6, 0x0) ioctl$auto_SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000100)="522e9c1dbf8883a53a") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000480)={'dummy0\x00', 0x0}) close_range$auto(0x0, 0xfffffffffffff000, 0x2) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ram0\x00', 0x63cd6092de85b59, 0x0) r4 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop6\x00', 0x101202, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r4, 0x4c00, 0x0) sendmsg$auto_ETHTOOL_MSG_MODULE_FW_FLASH_ACT(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000e80)={0x20, r1, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_MODULE_FW_FLASH_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x20}, 0x1, 0x1000060}, 0x400c080) 3.625613728s ago: executing program 1 (id=634): unshare$auto(0x8) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) socket(0x2c, 0x1, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) symlink$auto(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)='./file0\x00') readlink$auto(&(0x7f0000000040)='./file0\x00', 0x0, 0x40) readlink$auto(&(0x7f0000000040)='./file0\x00', 0x0, 0x800) socket(0x10, 0x2, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000140), 0x8f80, 0x0) r2 = ioctl$auto_KVM_CREATE_VM(r1, 0xae01, 0x0) mremap$auto(0x1ff000, 0x100005, 0x843, 0x3, 0x2) mremap$auto(0xfffff000, 0x4, 0x4, 0x7, 0x1001ff000) prctl$auto(0x1000000003b, 0x1, 0x4, 0xd73, 0xb) madvise$auto(0xfffffffffffffffa, 0x7f, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$auto_OVS_DP_CMD_SET(r2, 0x0, 0x24000040) r3 = socket(0x1d, 0x3, 0x1) getsockopt$auto(r3, 0x65, 0x6, 0xffffffffffffffff, 0x0) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/memory.limit_in_bytes\x00', 0x182b02, 0x0) sendfile$auto(r4, r4, 0x0, 0x3) madvise$auto(0x0, 0xffffffffffff0005, 0x19) 3.03220888s ago: executing program 0 (id=635): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ioam6(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$auto_IOAM6_CMD_ADD_NAMESPACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x40) 3.031029884s ago: executing program 3 (id=636): unshare$auto(0x40000080) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) listen$auto(0x3, 0x81) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) clock_adjtime$auto(0x0, &(0x7f0000000040)={0xfbb, 0x0, 0x7f, 0xfffffffff7fffffe, 0x600, 0x8, 0x7, 0x0, 0x7, 0x8, 0x5, {0x400, 0x7}, 0xfffffffffffffffa, 0x80000000a5, 0xa, 0x13c, 0x0, 0xc3, 0x1000, 0x7, 0x1, 0x8f, 0xfffffff5}) socket(0x1d, 0x2, 0x7) r2 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) bind$auto(0x3, &(0x7f0000000040)=@can={0x1d, r3}, 0x6a) write$auto(r1, 0x0, 0x100000a3d9) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x2003f2, 0x15) r4 = syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000980)=ANY=[@ANYBLOB="00020000", @ANYRES16=r4, @ANYBLOB="010031bd7000fddbdf250c000000"], 0x14}}, 0x24048084) madvise$auto(0x0, 0x200007, 0x19) openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, 0x0, 0x103003, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x101001, 0x0) r5 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) ioctl$auto_KVM_CREATE_VM(r5, 0xae01, 0x0) sendmsg$auto_IEEE802154_SET_MACPARAMS(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="0070002300000008002c000100"/22], 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x4000000) openat$auto_zero_fops_mem(0xffffffffffffff9c, &(0x7f0000000340), 0x80200, 0x0) setsockopt$auto_SO_WIFI_STATUS(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x2) mmap$auto(0x0, 0x20009, 0xe3, 0x100000eb1, 0x40000000000a1, 0x8000) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0xc0) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x3, 0xdcb) 2.553408057s ago: executing program 0 (id=637): r0 = openat$auto_ftrace_system_enable_fops_trace_events(0xffffffffffffff9c, 0x0, 0x20a01, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) r1 = socket(0x2, 0x1, 0x106) bind$auto(r1, &(0x7f0000000040)=@l2tp={0x2, 0x0, @multicast1, 0x2}, 0x6a) write$auto(r0, &(0x7f0000000240)='/dev/vhost-net\x00', 0x4) r2 = open(&(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x42842, 0x95) sendmsg$auto_NL80211_CMD_PROBE_CLIENT(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x6}, 0x20000000) read$auto(r2, 0x0, 0x1) writev$auto(0x3, &(0x7f0000000100)={0x0, 0x7111}, 0x8) openat$auto_tracing_buffers_fops_trace(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing/per_cpu/cpu1/trace_pipe_raw\x00', 0x1000, 0x0) socket(0x3, 0x6, 0x4) io_uring_setup$auto(0x2, 0x0) openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) recvmsg$auto(0xffffffffffffffff, 0x0, 0x2) syz_genetlink_get_family_id$auto_ovs_vport(&(0x7f0000000280), r2) write$auto(r3, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) select$auto(0x10, 0x0, 0x0, &(0x7f0000000140)={[0x1ff, 0x4, 0xd3e, 0x1, 0x948b, 0x3, 0x800295f4da0a, 0x2, 0x3, 0x5, 0x80000001, 0x40, 0x6d3f, 0x9, 0x2, 0xfffffffffffffffe]}, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x4, 0xd, 0x1, 0x948f, 0x1005, 0x206, 0x1, 0x0, 0x7, 0x9, 0xfffffffffffffff4, 0x6, 0x1f00000000000000, 0xfff, 0xf]}, 0x0) prctl$auto(0x1, 0x800000000000008, 0x0, 0x1000, 0x4) pread64$auto(0xffffffffffffffff, 0x0, 0x100000001, 0x100) socket(0x2b, 0x1, 0x1) close_range$auto(0x2, 0x8, 0x0) 1.936241896s ago: executing program 1 (id=638): unshare$auto(0x40000080) statx$auto(0x2, 0x0, 0x1000, 0x8, 0x0) open(0x0, 0x204000, 0x82) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) mmap$auto(0x4, 0xa020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x7ffe) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000100)='/proc/fs/cifs/mount_params\x00', 0x802, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f0000000640)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\xff\x7f\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc:\xfa\x01\xd1\xa3\xb5\xc2B\xa5\xac:woR^a\xb9}\xe7\xbd\xe1\xf77.\xa3\xd8\xc2T\x95\x13\x91\xb6p\xf3\xb2w\xe6\xd7\x94DW\x97\x90a\xe6c\xfb\x88x\xd5L\xa9\xe4\x82\x04\xb1\x8b\r\xcaP\\\x1aVP\xc9\xa4`\xfd\v\x94\f\xc1\x0fQ\xc9\xdcL\x03\x9c\xbfk\xa6\xb1\xb0\xa1\xeeJ\xd8\xef\xc8t\x9d\x1e=J\x91W\xc6AuJ\xb9Q\xed\xd1\a\x05\x9d\x85\xb7b#r\xcd\xaf\xb7\x9f\xf7\xd2\xae\x0f\x98\xa9&\xb6~\xd4\xbd\xbbr\xb9\xc3\xacH!\xc1\x90K2\x05K@\xee\xac\xe8\xc7\t\xab\xbf\xa3\xedb\xd7\xb5\xd7\x83&\x95\xb2?\x0e\x85\xaaIGu\xd6$\xeb\xb6\xdd\a\x121\a\xac\x1bx#\x87\xa9\x10\x9b\xf8YD\x04ZL\xca\x99]\x8f[\x90[\xa8\xbf\x98\xa6\xe50(zC\xe84*w\x13\x96\xd5\xd0\x877\x12\xbc\xa1\xd0h@|\xf9\xfa\x9b\x17\x94\xb9\xe7\xf3\x15\x05\x91\xe8\x98p\x7f:\xd7s\xd9wo\x82\xda\xec\x91\xb7\xd9;H\x8a\b\x00\x00\x00\x00\x00\x00\x00\x8aZ\x94\x14$X7\xaeW6=^I\x9fQ\r5c\x81\xca]\x97m\x89o\x8f\xd8}P>I\xd0\xb3\x88C\xd7', 0x100000a3d9) openat$auto_vhost_vsock_fops_vsock(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) socket(0x1d, 0x3, 0x3c) r1 = openat$auto_mousedev_fops_mousedev(0xffffffffffffff9c, &(0x7f0000000080)='/dev/psaux\x00', 0x2, 0x0) write$auto_mousedev_fops_mousedev(r1, &(0x7f0000000400)="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", 0x103) bpf$auto_BPF_MAP_DELETE_BATCH(0x1b, &(0x7f0000000180)=@bpf_attr_11={0x454, 0x3, 0xc, 0x7, 0xfb, 0x1, 0xa, r0}, 0x7) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$auto_nfsd(&(0x7f0000002f00), 0xffffffffffffffff) sendmsg$auto_NFSD_CMD_LISTENER_SET(r3, &(0x7f0000005380)={0x0, 0x0, &(0x7f0000005340)={&(0x7f0000000000)={0x14, r4, 0x1, 0x870bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x20000000) sendmsg$auto_NFSD_CMD_LISTENER_SET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x14, r4, 0x1, 0x70bd2d, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x200048d0) socket(0x15, 0x5, 0x0) mmap$auto(0xfffffffffffffffd, 0x20007, 0x556, 0xeb1, 0x40000000000a5, 0x8000) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, 0x0, 0x20342, 0x0) mmap$auto(0x0, 0x2, 0x3, 0xeb1, 0xfffffffffffffffa, 0x0) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) openat$auto_vmuser_fops_vmci_host(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) r5 = openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x101200, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x149443, 0x0) mount$auto(&(0x7f0000000000)='veth0_macvtap\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='nfs\x00', 0x1, &(0x7f00000001c0)) ioctl$auto_FBIOGETCMAP(r5, 0x4604, &(0x7f00000002c0)="f300000000d2") 1.540585167s ago: executing program 0 (id=639): bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0xffff, @remote}, 0x6a) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x3fd, 0x8000) close_range$auto(0x2, 0x8, 0x0) memfd_create$auto(0x0, 0xe) socket(0xa, 0x5, 0x0) close_range$auto(0x2, 0x8, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/platform/vidtv.0/i2c-0/delete_device\x00', 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000100)='/proc/irq/default_smp_affinity\x00', 0x48041, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x4) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) io_uring_setup$auto(0x2, 0x0) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptyyb\x00', 0x0, 0x0) ioctl$auto_TIOCSETD2(r0, 0x5423, 0x0) socketpair$auto(0x5b, 0x2, 0x420000, 0x0) ioctl$auto_TIOCSETD2(r0, 0x5423, 0x0) ioctl$auto_TIOCVHANGUP2(r0, 0x5437, 0x0) 833.477033ms ago: executing program 2 (id=640): socket(0xa, 0x1, 0x84) bind$auto(0x3, 0x0, 0x6a) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x3fd, 0x8000) close_range$auto(0x2, 0x8, 0x0) memfd_create$auto(0x0, 0xe) socket(0xa, 0x5, 0x0) close_range$auto(0x2, 0x8, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/platform/vidtv.0/i2c-0/delete_device\x00', 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000100)='/proc/irq/default_smp_affinity\x00', 0x48041, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0x4) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) io_uring_setup$auto(0x2, 0x0) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptyyb\x00', 0x0, 0x0) ioctl$auto_TIOCSETD2(r0, 0x5423, 0x0) socketpair$auto(0x5b, 0x2, 0x420000, 0x0) ioctl$auto_TIOCSETD2(r0, 0x5423, 0x0) ioctl$auto_TIOCVHANGUP2(r0, 0x5437, 0x0) 747.840035ms ago: executing program 0 (id=641): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket(0x10, 0x3, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x4004) sendmsg$auto_ETHTOOL_MSG_PHY_GET(0xffffffffffffffff, &(0x7f0000003200)={0x0, 0x0, &(0x7f00000031c0)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16, @ANYBLOB="010326bd7000ffdbdf252d"], 0x20}, 0x1, 0x0, 0x0, 0x2404c012}, 0x80) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1e00"], 0x1ac}}, 0x0) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc1}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x100, 0x0) 654.636089ms ago: executing program 3 (id=642): r0 = openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000000880)='/dev/binderfs/binder0\x00', 0x400, 0x0) ioctl$auto_BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) statmount$auto(0x0, &(0x7f0000000400)={0x8, 0x1, 0x9, 0x3, 0xb, 0x940, 0x1ffde, 0x3, 0x6, 0x2, 0x9, 0x5, 0x3, 0x4, 0xb0, 0x7, 0xe, 0x3, 0x5, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x1fe, 0x81) ppoll$auto(0x0, 0x7f, 0x0, 0x0, 0x8) 383.141828ms ago: executing program 3 (id=643): r0 = syz_genetlink_get_family_id$auto_ovs_vport(&(0x7f0000004680), 0xffffffffffffffff) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f00000049c0)={0x0, 0x0, &(0x7f0000004980)={&(0x7f0000000040)=ANY=[@ANYBLOB="1cff0000", @ANYRES16=r0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x40040801}, 0x44000) mmap$auto(0x0, 0x2000c, 0xdf, 0x20eb1, 0x40000000000a5, 0x8000) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000140), 0x2002, 0x0) socket(0x29, 0x2, 0x0) select$auto(0x8, &(0x7f0000000340)={[0xffff, 0x6, 0xfffc000000000000, 0x6, 0x1, 0x5, 0x8, 0x1ff, 0x9, 0x1, 0x5, 0x81, 0x5, 0x7fff, 0x8]}, 0x0, &(0x7f00000004c0)={[0xe3c6, 0x8, 0x20000000002, 0x8, 0x7, 0x3ff, 0x3, 0xa, 0x0, 0x9, 0x6, 0x1, 0x7a, 0x8, 0x66960ada, 0xffff]}, 0x0) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) socket(0x2, 0x1, 0x0) select$auto(0x8, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x0, 0xd, 0x2, 0x1000000000009489, 0x3, 0x15f4da0a, 0x1, 0x7, 0x7, 0x80000001, 0x4, 0x6d3f, 0x9, 0x2, 0xfffffffffffffffa]}, 0x0) write$auto(r1, &(0x7f0000000400)='\x00\x00\x00\x00', 0x100000a3d9) r2 = getpid() process_vm_readv$auto(r2, &(0x7f0000000000)={0x0, 0xfff}, 0x40000000001, &(0x7f0000000180)={&(0x7f0000000140), 0x40000000001243}, 0xa, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x100, 0x0) ioctl$auto(0x3, 0x400454ca, 0x38) mmap$auto(0x0, 0x400008, 0x7, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0x8, 0x0) 176.456479ms ago: executing program 0 (id=644): r0 = syz_genetlink_get_family_id$auto_ovs_vport(&(0x7f0000004680), 0xffffffffffffffff) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f00000049c0)={0x0, 0x0, &(0x7f0000004980)={&(0x7f0000000040)=ANY=[@ANYBLOB="1cff0000", @ANYRES16=r0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x40040801}, 0x44000) mmap$auto(0x0, 0x2000c, 0xdf, 0x20eb1, 0x40000000000a5, 0x8000) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000140), 0x2002, 0x0) socket(0x29, 0x2, 0x0) select$auto(0x8, &(0x7f0000000340)={[0xffff, 0x6, 0xfffc000000000000, 0x6, 0x1, 0x5, 0x8, 0x1ff, 0x9, 0x1, 0x5, 0x81, 0x5, 0x7fff, 0x8]}, 0x0, &(0x7f00000004c0)={[0xe3c6, 0x8, 0x20000000002, 0x8, 0x7, 0x3ff, 0x3, 0xa, 0x0, 0x9, 0x6, 0x1, 0x7a, 0x8, 0x66960ada, 0xffff]}, 0x0) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) socket(0x2, 0x1, 0x0) select$auto(0x8, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x0, 0xd, 0x2, 0x1000000000009489, 0x3, 0x15f4da0a, 0x1, 0x7, 0x7, 0x80000001, 0x4, 0x6d3f, 0x9, 0x2, 0xfffffffffffffffa]}, 0x0) write$auto(r1, &(0x7f0000000400)='\x00\x00\x00\x00', 0x100000a3d9) r2 = getpid() process_vm_readv$auto(r2, &(0x7f0000000000)={0x0, 0xfff}, 0x40000000001, &(0x7f0000000180)={&(0x7f0000000140), 0x40000000001243}, 0xa, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x100, 0x0) ioctl$auto(0x3, 0x400454ca, 0x38) mmap$auto(0x0, 0x400008, 0x7, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0x8, 0x0) 0s ago: executing program 1 (id=645): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x1cb602, 0x0) mmap$auto(0x0, 0x2020007, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xfffffffd}, 0x6, 0x3, 0x5) lseek$auto(0x3, 0x0, 0x1) write$auto(0x3, 0x0, 0xfdef) munmap$auto(0x8000, 0xffffffff) r0 = pidfd_open$auto(0x1, 0x0) move_mount$auto(0xffffffffffffffff, 0x0, r0, 0x0, 0x273) r1 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f00000000c0), 0xffffffffffffffff) mmap$auto(0x1a24, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0xb, 0x0) r2 = socket(0x2, 0x5, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) sendmmsg$auto(r2, &(0x7f0000000100)={{&(0x7f0000000040), 0x10, &(0x7f00000000c0)={0x0, 0x1a000}, 0x7, 0x0, 0x2, 0xb}, 0xfff}, 0x5, 0x311) close_range$auto(0x0, 0xffffeffe, 0x2) openat$auto_bm_register_operations_binfmt_misc(0xffffffffffffff9c, 0x0, 0x181441, 0x0) socket(0xa, 0x1, 0x84) r3 = socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x3, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4000894}, 0x4000000) bpf$auto(0x7fffffe, &(0x7f00000001c0)=@test={r3, 0xffff, 0xfffff0b6, 0xffff, 0x84, 0xac5, 0x2, 0x36242398, 0xfffff5b2, 0x3bb, 0x1c00000000000000, 0xffff, 0x40006, 0x81, 0x68198}, 0x6) sendmsg$auto_ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="d4000000", @ANYRES16=0x0, @ANYBLOB="100027bd7000fbdbdf2518000000200001800247eea41fac000014000200766574683100000000000000000000000800070063fbffff0500060001000000840002803d00488013b37090badc49d6dc93876646d25a4d297d01cd3b7da38d12889cc50d505f353dc42d0a3c0a14c7b46428910708003600", @ANYRES32=0x0, @ANYBLOB="0400b3800000003d003b800400a4800c009a00008000000000000004008680c16ab1b1b39dcaa14b6af7dcc011b43cf706e562811c62b28a702b72e0a87126700294f2350000000c000180080003"], 0xd4}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) rt_tgsigqueueinfo$auto(0x3, 0x96, 0x3, &(0x7f0000000180)={@siginfo_0_0={0x80000000, 0x7, 0x8000, @_kill={0xffffffffffffffff}}}) sendmsg$auto_ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYBLOB="010027bd"], 0x2c}, 0x1, 0x0, 0x0, 0x4801}, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="12"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) sendmsg$auto_NL80211_CMD_SET_KEY(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x53c, r1, 0x200, 0x70bd27, 0x25dfdbdb, {}, [@NL80211_ATTR_BEACON_TAIL={0x4fd, 0xf, "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"}, @NL80211_ATTR_PMK_LIFETIME={0x8, 0x11f, 0x6}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x9}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x9}, @NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0xfd5}, @NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0x1000}]}, 0x53c}, 0x1, 0x0, 0x0, 0x50}, 0x20040080) syz_genetlink_get_family_id$auto_tipcv2(0x0, 0xffffffffffffffff) kernel console output (not intermixed with test programs): [ T7125] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 200.960184][ T7125] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 201.049513][ T7125] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 201.056998][ T7125] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 201.188526][ T7125] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 201.207791][ T7125] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 3896940737 [ 201.249517][ T7125] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 201.296514][ T7126] ubi0: detaching mtd0 [ 201.303632][ T7142] NFSD: Failed to start, no listeners configured. [ 201.324301][ T7126] ubi0: mtd0 is detached [ 202.658622][ T7168] FAULT_INJECTION: forcing a failure. [ 202.658622][ T7168] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 202.699535][ T7168] CPU: 1 UID: 0 PID: 7168 Comm: syz.1.245 Not tainted syzkaller #0 PREEMPT(full) [ 202.699568][ T7168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 202.699583][ T7168] Call Trace: [ 202.699591][ T7168] [ 202.699600][ T7168] dump_stack_lvl+0x100/0x190 [ 202.699644][ T7168] should_fail_ex.cold+0x5/0xa [ 202.699673][ T7168] strncpy_from_user+0x3b/0x2d0 [ 202.699716][ T7168] do_getname+0x78/0x390 [ 202.699750][ T7168] do_sys_openat2+0xc5/0x1e0 [ 202.699789][ T7168] ? __pfx_do_sys_openat2+0x10/0x10 [ 202.699822][ T7168] ? apparmor_capable+0x1d7/0x4d0 [ 202.699866][ T7168] __x64_sys_openat+0x12d/0x210 [ 202.699900][ T7168] ? __pfx___x64_sys_openat+0x10/0x10 [ 202.699943][ T7168] do_syscall_64+0x106/0xf80 [ 202.699972][ T7168] ? clear_bhb_loop+0x40/0x90 [ 202.700003][ T7168] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 202.700029][ T7168] RIP: 0033:0x7f7cc359c799 [ 202.700049][ T7168] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 202.700072][ T7168] RSP: 002b:00007f7cc4416028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 202.700095][ T7168] RAX: ffffffffffffffda RBX: 00007f7cc3815fa0 RCX: 00007f7cc359c799 [ 202.700111][ T7168] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 202.700127][ T7168] RBP: 00007f7cc3632bd9 R08: 0000000000000000 R09: 0000000000000000 [ 202.700141][ T7168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 202.700156][ T7168] R13: 00007f7cc3816038 R14: 00007f7cc3815fa0 R15: 00007fff33e19038 [ 202.700186][ T7168] [ 204.527599][ T7189] FAULT_INJECTION: forcing a failure. [ 204.527599][ T7189] name fail_futex, interval 1, probability 0, space 0, times 1 [ 204.581707][ T7189] CPU: 1 UID: 0 PID: 7189 Comm: syz.1.251 Not tainted syzkaller #0 PREEMPT(full) [ 204.581760][ T7189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 204.581775][ T7189] Call Trace: [ 204.581783][ T7189] [ 204.581792][ T7189] dump_stack_lvl+0x100/0x190 [ 204.581835][ T7189] should_fail_ex.cold+0x5/0xa [ 204.581863][ T7189] get_futex_key+0x1d2/0x1620 [ 204.581897][ T7189] ? __pfx_get_futex_key+0x10/0x10 [ 204.581936][ T7189] futex_wait_setup+0x83/0x510 [ 204.581982][ T7189] __futex_wait+0x19f/0x300 [ 204.582023][ T7189] ? __pfx___futex_wait+0x10/0x10 [ 204.582067][ T7189] ? __pfx_futex_wake_mark+0x10/0x10 [ 204.582110][ T7189] ? find_held_lock+0x2b/0x80 [ 204.582132][ T7189] ? futex_wake+0x456/0x530 [ 204.582175][ T7189] futex_wait+0xed/0x380 [ 204.582213][ T7189] ? __pfx_futex_wait+0x10/0x10 [ 204.582269][ T7189] do_futex+0x1ef/0x350 [ 204.582301][ T7189] ? __pfx_do_futex+0x10/0x10 [ 204.582334][ T7189] ? __pfx___might_resched+0x10/0x10 [ 204.582369][ T7189] ? blkcg_maybe_throttle_current+0x5df/0xeb0 [ 204.582405][ T7189] __x64_sys_futex+0x34f/0x4d0 [ 204.582441][ T7189] ? __pfx___x64_sys_futex+0x10/0x10 [ 204.582485][ T7189] do_syscall_64+0x106/0xf80 [ 204.582514][ T7189] ? clear_bhb_loop+0x40/0x90 [ 204.582544][ T7189] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 204.582570][ T7189] RIP: 0033:0x7f7cc359c799 [ 204.582589][ T7189] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 204.582613][ T7189] RSP: 002b:00007f7cc43f50e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 204.582635][ T7189] RAX: ffffffffffffffda RBX: 00007f7cc3816098 RCX: 00007f7cc359c799 [ 204.582652][ T7189] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f7cc3816098 [ 204.582666][ T7189] RBP: 00007f7cc3816090 R08: 0000000000000000 R09: 0000000000000000 [ 204.582681][ T7189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 204.582695][ T7189] R13: 00007f7cc3816128 R14: 00007fff33e18f50 R15: 00007fff33e19038 [ 204.582726][ T7189] [ 205.864408][ T7206] FAULT_INJECTION: forcing a failure. [ 205.864408][ T7206] name failslab, interval 1, probability 0, space 0, times 0 [ 205.981194][ T7206] CPU: 1 UID: 0 PID: 7206 Comm: syz.0.256 Not tainted syzkaller #0 PREEMPT(full) [ 205.981226][ T7206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 205.981241][ T7206] Call Trace: [ 205.981249][ T7206] [ 205.981258][ T7206] dump_stack_lvl+0x100/0x190 [ 205.981299][ T7206] should_fail_ex.cold+0x5/0xa [ 205.981328][ T7206] should_failslab+0xc2/0x120 [ 205.981353][ T7206] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 205.981390][ T7206] ? do_getname+0x35/0x390 [ 205.981425][ T7206] do_getname+0x35/0x390 [ 205.981458][ T7206] do_sys_openat2+0xc5/0x1e0 [ 205.981490][ T7206] ? __pfx_do_sys_openat2+0x10/0x10 [ 205.981523][ T7206] ? apparmor_capable+0x1d7/0x4d0 [ 205.981567][ T7206] __x64_sys_openat+0x12d/0x210 [ 205.981600][ T7206] ? __pfx___x64_sys_openat+0x10/0x10 [ 205.981644][ T7206] do_syscall_64+0x106/0xf80 [ 205.981673][ T7206] ? clear_bhb_loop+0x40/0x90 [ 205.981704][ T7206] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 205.981729][ T7206] RIP: 0033:0x7f01d079c799 [ 205.981749][ T7206] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 205.981773][ T7206] RSP: 002b:00007f01d15a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 205.981796][ T7206] RAX: ffffffffffffffda RBX: 00007f01d0a15fa0 RCX: 00007f01d079c799 [ 205.981812][ T7206] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 205.981828][ T7206] RBP: 00007f01d0832bd9 R08: 0000000000000000 R09: 0000000000000000 [ 205.981843][ T7206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 205.981857][ T7206] R13: 00007f01d0a16038 R14: 00007f01d0a15fa0 R15: 00007ffd9ba46cf8 [ 205.981888][ T7206] [ 206.701391][ T7217] random: crng reseeded on system resumption [ 206.892707][ T7217] Unrecognized hibernate image header format! [ 206.926189][ T7217] PM: hibernation: Image mismatch: architecture specific data [ 209.370501][ T7246] FAULT_INJECTION: forcing a failure. [ 209.370501][ T7246] name failslab, interval 1, probability 0, space 0, times 0 [ 209.422841][ T7246] CPU: 1 UID: 0 PID: 7246 Comm: syz.1.263 Not tainted syzkaller #0 PREEMPT(full) [ 209.422886][ T7246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 209.422905][ T7246] Call Trace: [ 209.422923][ T7246] [ 209.422932][ T7246] dump_stack_lvl+0x100/0x190 [ 209.422976][ T7246] should_fail_ex.cold+0x5/0xa [ 209.423004][ T7246] ? sk_prot_alloc+0x10b/0x2a0 [ 209.423038][ T7246] should_failslab+0xc2/0x120 [ 209.423063][ T7246] __kmalloc_noprof+0xe0/0x850 [ 209.423107][ T7246] sk_prot_alloc+0x10b/0x2a0 [ 209.423144][ T7246] sk_alloc+0x36/0xe80 [ 209.423171][ T7246] mctp_pf_create+0xe8/0x360 [ 209.423206][ T7246] __sock_create+0x339/0x860 [ 209.423249][ T7246] __sys_socket+0x14d/0x260 [ 209.423289][ T7246] ? __pfx___sys_socket+0x10/0x10 [ 209.423336][ T7246] __x64_sys_socket+0x72/0xb0 [ 209.423374][ T7246] ? lockdep_hardirqs_on+0x78/0x100 [ 209.423409][ T7246] do_syscall_64+0x106/0xf80 [ 209.423438][ T7246] ? clear_bhb_loop+0x40/0x90 [ 209.423468][ T7246] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 209.423493][ T7246] RIP: 0033:0x7f7cc359c799 [ 209.423513][ T7246] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 209.423537][ T7246] RSP: 002b:00007f7cc4416028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 209.423560][ T7246] RAX: ffffffffffffffda RBX: 00007f7cc3815fa0 RCX: 00007f7cc359c799 [ 209.423577][ T7246] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000002d [ 209.423591][ T7246] RBP: 00007f7cc3632bd9 R08: 0000000000000000 R09: 0000000000000000 [ 209.423606][ T7246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 209.423621][ T7246] R13: 00007f7cc3816038 R14: 00007f7cc3815fa0 R15: 00007fff33e19038 [ 209.423651][ T7246] [ 210.190909][ T7256] ubi0: attaching mtd0 [ 210.196751][ T7256] ubi0: scanning is finished [ 210.712144][ T7256] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 210.747662][ T7256] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 210.783323][ T7256] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 210.790319][ T7256] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 210.887812][ T7256] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 211.038446][ T7256] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 211.093371][ T7256] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 3896940737 [ 211.172682][ T7256] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 211.308850][ T7257] ubi0: detaching mtd0 [ 211.334929][ T7257] ubi0: mtd0 is detached [ 212.673664][ T7285] ubi0: attaching mtd0 [ 212.711051][ T7285] ubi0: scanning is finished [ 212.954253][ T7294] FAULT_INJECTION: forcing a failure. [ 212.954253][ T7294] name failslab, interval 1, probability 0, space 0, times 0 [ 212.967277][ T7294] CPU: 0 UID: 0 PID: 7294 Comm: syz.1.274 Not tainted syzkaller #0 PREEMPT(full) [ 212.967321][ T7294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 212.967341][ T7294] Call Trace: [ 212.967352][ T7294] [ 212.967365][ T7294] dump_stack_lvl+0x100/0x190 [ 212.967423][ T7294] should_fail_ex.cold+0x5/0xa [ 212.967465][ T7294] should_failslab+0xc2/0x120 [ 212.967500][ T7294] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 212.967562][ T7294] ? alloc_empty_file+0x55/0x1c0 [ 212.967606][ T7294] ? __pfx_stack_trace_save+0x10/0x10 [ 212.967647][ T7294] alloc_empty_file+0x55/0x1c0 [ 212.967692][ T7294] path_openat+0xe8/0x31a0 [ 212.967722][ T7294] ? kasan_save_stack+0x3f/0x50 [ 212.967774][ T7294] ? kasan_save_stack+0x30/0x50 [ 212.967825][ T7294] ? kasan_save_track+0x14/0x30 [ 212.967876][ T7294] ? __kasan_slab_alloc+0x89/0x90 [ 212.967928][ T7294] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 212.967979][ T7294] ? do_getname+0x35/0x390 [ 212.968017][ T7294] ? do_sys_openat2+0xc5/0x1e0 [ 212.968061][ T7294] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 212.968104][ T7294] ? __pfx_path_openat+0x10/0x10 [ 212.968160][ T7294] do_file_open+0x20e/0x430 [ 212.968197][ T7294] ? __pfx_do_file_open+0x10/0x10 [ 212.968263][ T7294] ? alloc_fd+0x476/0x790 [ 212.968301][ T7294] ? do_getname+0x191/0x390 [ 212.968346][ T7294] do_sys_openat2+0x10d/0x1e0 [ 212.968392][ T7294] ? __pfx_do_sys_openat2+0x10/0x10 [ 212.968439][ T7294] ? apparmor_capable+0x1d7/0x4d0 [ 212.968500][ T7294] __x64_sys_openat+0x12d/0x210 [ 212.968555][ T7294] ? __pfx___x64_sys_openat+0x10/0x10 [ 212.968619][ T7294] do_syscall_64+0x106/0xf80 [ 212.968660][ T7294] ? clear_bhb_loop+0x40/0x90 [ 212.968703][ T7294] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 212.968740][ T7294] RIP: 0033:0x7f7cc359c799 [ 212.968768][ T7294] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 212.968801][ T7294] RSP: 002b:00007f7cc4416028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 212.968833][ T7294] RAX: ffffffffffffffda RBX: 00007f7cc3815fa0 RCX: 00007f7cc359c799 [ 212.968856][ T7294] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 212.968878][ T7294] RBP: 00007f7cc3632bd9 R08: 0000000000000000 R09: 0000000000000000 [ 212.968899][ T7294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 212.968919][ T7294] R13: 00007f7cc3816038 R14: 00007f7cc3815fa0 R15: 00007fff33e19038 [ 212.968964][ T7294] [ 213.420329][ T7285] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 213.428039][ T7285] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 213.435415][ T7285] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 213.442415][ T7285] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 213.450089][ T7285] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 213.457039][ T7285] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 213.465131][ T7285] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 3896940737 [ 213.475237][ T7285] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 213.489514][ T7288] ubi0: detaching mtd0 [ 213.498001][ T7288] ubi0: mtd0 is detached [ 214.149041][ T7303] zswap: compressor not available [ 214.324540][ T7315] FAULT_INJECTION: forcing a failure. [ 214.324540][ T7315] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 214.337730][ T7315] CPU: 1 UID: 0 PID: 7315 Comm: syz.0.279 Not tainted syzkaller #0 PREEMPT(full) [ 214.337770][ T7315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 214.337785][ T7315] Call Trace: [ 214.337794][ T7315] [ 214.337803][ T7315] dump_stack_lvl+0x100/0x190 [ 214.337846][ T7315] should_fail_ex.cold+0x5/0xa [ 214.337875][ T7315] strncpy_from_user+0x3b/0x2d0 [ 214.337918][ T7315] do_getname+0x78/0x390 [ 214.337952][ T7315] do_sys_openat2+0xc5/0x1e0 [ 214.337984][ T7315] ? __pfx_do_sys_openat2+0x10/0x10 [ 214.338017][ T7315] ? apparmor_capable+0x1d7/0x4d0 [ 214.338061][ T7315] __x64_sys_openat+0x12d/0x210 [ 214.338094][ T7315] ? __pfx___x64_sys_openat+0x10/0x10 [ 214.338138][ T7315] do_syscall_64+0x106/0xf80 [ 214.338166][ T7315] ? clear_bhb_loop+0x40/0x90 [ 214.338196][ T7315] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 214.338222][ T7315] RIP: 0033:0x7f01d079c799 [ 214.338242][ T7315] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 214.338274][ T7315] RSP: 002b:00007f01d15a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 214.338297][ T7315] RAX: ffffffffffffffda RBX: 00007f01d0a15fa0 RCX: 00007f01d079c799 [ 214.338313][ T7315] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 214.338329][ T7315] RBP: 00007f01d0832bd9 R08: 0000000000000000 R09: 0000000000000000 [ 214.338344][ T7315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 214.338358][ T7315] R13: 00007f01d0a16038 R14: 00007f01d0a15fa0 R15: 00007ffd9ba46cf8 [ 214.338389][ T7315] [ 217.192999][ T7353] FAULT_INJECTION: forcing a failure. [ 217.192999][ T7353] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 217.227126][ T7353] CPU: 1 UID: 0 PID: 7353 Comm: syz.1.290 Not tainted syzkaller #0 PREEMPT(full) [ 217.227189][ T7353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 217.227210][ T7353] Call Trace: [ 217.227221][ T7353] [ 217.227234][ T7353] dump_stack_lvl+0x100/0x190 [ 217.227294][ T7353] should_fail_ex.cold+0x5/0xa [ 217.227336][ T7353] strncpy_from_user+0x3b/0x2d0 [ 217.227397][ T7353] do_getname+0x78/0x390 [ 217.227444][ T7353] do_sys_openat2+0xc5/0x1e0 [ 217.227490][ T7353] ? __pfx_do_sys_openat2+0x10/0x10 [ 217.227538][ T7353] ? apparmor_capable+0x1d7/0x4d0 [ 217.227599][ T7353] __x64_sys_openat+0x12d/0x210 [ 217.227646][ T7353] ? __pfx___x64_sys_openat+0x10/0x10 [ 217.227708][ T7353] do_syscall_64+0x106/0xf80 [ 217.227748][ T7353] ? clear_bhb_loop+0x40/0x90 [ 217.227791][ T7353] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 217.227828][ T7353] RIP: 0033:0x7f7cc359c799 [ 217.227856][ T7353] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 217.227889][ T7353] RSP: 002b:00007f7cc4416028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 217.227921][ T7353] RAX: ffffffffffffffda RBX: 00007f7cc3815fa0 RCX: 00007f7cc359c799 [ 217.227944][ T7353] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 217.227966][ T7353] RBP: 00007f7cc3632bd9 R08: 0000000000000000 R09: 0000000000000000 [ 217.227986][ T7353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 217.228006][ T7353] R13: 00007f7cc3816038 R14: 00007f7cc3815fa0 R15: 00007fff33e19038 [ 217.228050][ T7353] [ 218.380889][ T7362] FAULT_INJECTION: forcing a failure. [ 218.380889][ T7362] name failslab, interval 1, probability 0, space 0, times 0 [ 218.627202][ T7362] CPU: 1 UID: 0 PID: 7362 Comm: syz.0.293 Not tainted syzkaller #0 PREEMPT(full) [ 218.627249][ T7362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 218.627270][ T7362] Call Trace: [ 218.627278][ T7362] [ 218.627287][ T7362] dump_stack_lvl+0x100/0x190 [ 218.627330][ T7362] should_fail_ex.cold+0x5/0xa [ 218.627359][ T7362] should_failslab+0xc2/0x120 [ 218.627384][ T7362] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 218.627428][ T7362] ? __proc_create+0x2cb/0x8c0 [ 218.627477][ T7362] __proc_create+0x2cb/0x8c0 [ 218.627517][ T7362] ? __pfx___proc_create+0x10/0x10 [ 218.627556][ T7362] ? __lock_acquire+0x4a5/0x2630 [ 218.627589][ T7362] ? proc_register+0x559/0x8a0 [ 218.627636][ T7362] proc_create_reg+0x75/0x170 [ 218.627661][ T7362] proc_create_data+0x86/0x110 [ 218.627684][ T7362] ? __pfx_proc_create_data+0x10/0x10 [ 218.627706][ T7362] ? net_generic+0xea/0x2a0 [ 218.627737][ T7362] gss_svc_init_net+0x233/0x640 [ 218.627762][ T7362] ? __pfx_canbcm_pernet_init+0x10/0x10 [ 218.627795][ T7362] ? __pfx_rpcsec_gss_init_net+0x10/0x10 [ 218.627823][ T7362] ops_init+0x1e2/0x5f0 [ 218.627857][ T7362] setup_net+0x118/0x3a0 [ 218.627889][ T7362] ? __pfx_setup_net+0x10/0x10 [ 218.627918][ T7362] ? lockdep_init_map_type+0x5c/0x250 [ 218.627951][ T7362] ? mutex_init_lockep+0x110/0x150 [ 218.627990][ T7362] copy_net_ns+0x46f/0x7c0 [ 218.628026][ T7362] create_new_namespaces+0x3ea/0xac0 [ 218.628059][ T7362] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 218.628088][ T7362] ksys_unshare+0x473/0xad0 [ 218.628121][ T7362] ? __pfx_ksys_unshare+0x10/0x10 [ 218.628163][ T7362] __x64_sys_unshare+0x31/0x40 [ 218.628193][ T7362] do_syscall_64+0x106/0xf80 [ 218.628221][ T7362] ? clear_bhb_loop+0x40/0x90 [ 218.628252][ T7362] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 218.628277][ T7362] RIP: 0033:0x7f01d079c799 [ 218.628297][ T7362] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 218.628321][ T7362] RSP: 002b:00007f01d15a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 218.628343][ T7362] RAX: ffffffffffffffda RBX: 00007f01d0a15fa0 RCX: 00007f01d079c799 [ 218.628359][ T7362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 218.628374][ T7362] RBP: 00007f01d0832bd9 R08: 0000000000000000 R09: 0000000000000000 [ 218.628389][ T7362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 218.628410][ T7362] R13: 00007f01d0a16038 R14: 00007f01d0a15fa0 R15: 00007ffd9ba46cf8 [ 218.628441][ T7362] [ 219.829926][ T7356] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 221.351694][ T7397] FAULT_INJECTION: forcing a failure. [ 221.351694][ T7397] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 221.429016][ T7397] CPU: 1 UID: 0 PID: 7397 Comm: syz.0.300 Not tainted syzkaller #0 PREEMPT(full) [ 221.429051][ T7397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 221.429065][ T7397] Call Trace: [ 221.429073][ T7397] [ 221.429082][ T7397] dump_stack_lvl+0x100/0x190 [ 221.429124][ T7397] should_fail_ex.cold+0x5/0xa [ 221.429153][ T7397] strncpy_from_user+0x3b/0x2d0 [ 221.429199][ T7397] do_getname+0x78/0x390 [ 221.429233][ T7397] do_sys_openat2+0xc5/0x1e0 [ 221.429265][ T7397] ? __pfx_do_sys_openat2+0x10/0x10 [ 221.429298][ T7397] ? apparmor_capable+0x1d7/0x4d0 [ 221.429349][ T7397] __x64_sys_openat+0x12d/0x210 [ 221.429382][ T7397] ? __pfx___x64_sys_openat+0x10/0x10 [ 221.429427][ T7397] do_syscall_64+0x106/0xf80 [ 221.429455][ T7397] ? clear_bhb_loop+0x40/0x90 [ 221.429485][ T7397] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 221.429511][ T7397] RIP: 0033:0x7f01d079c799 [ 221.429531][ T7397] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 221.429554][ T7397] RSP: 002b:00007f01d15a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 221.429577][ T7397] RAX: ffffffffffffffda RBX: 00007f01d0a15fa0 RCX: 00007f01d079c799 [ 221.429593][ T7397] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 221.429609][ T7397] RBP: 00007f01d0832bd9 R08: 0000000000000000 R09: 0000000000000000 [ 221.429623][ T7397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 221.429638][ T7397] R13: 00007f01d0a16038 R14: 00007f01d0a15fa0 R15: 00007ffd9ba46cf8 [ 221.429676][ T7397] [ 222.281145][ T7408] ubi0: attaching mtd0 [ 222.299836][ T7408] ubi0: scanning is finished [ 222.707448][ T7408] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 222.761872][ T7408] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 222.849425][ T7408] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 222.856458][ T7408] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 223.015587][ T7408] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 223.160946][ T7408] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 223.182752][ T7408] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 3896940737 [ 223.279685][ T7408] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 223.337932][ T7410] ubi0: detaching mtd0 [ 223.346384][ T7419] ubi0: background thread "ubi_bgt0d" started, PID 7419 [ 223.398196][ T7410] ubi0: mtd0 is detached [ 224.579915][ T7444] FAULT_INJECTION: forcing a failure. [ 224.579915][ T7444] name failslab, interval 1, probability 0, space 0, times 0 [ 224.670481][ T7444] CPU: 1 UID: 0 PID: 7444 Comm: syz.0.311 Not tainted syzkaller #0 PREEMPT(full) [ 224.670525][ T7444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 224.670544][ T7444] Call Trace: [ 224.670555][ T7444] [ 224.670567][ T7444] dump_stack_lvl+0x100/0x190 [ 224.670625][ T7444] should_fail_ex.cold+0x5/0xa [ 224.670663][ T7444] should_failslab+0xc2/0x120 [ 224.670698][ T7444] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 224.670751][ T7444] ? __d_alloc+0x34/0xa80 [ 224.670785][ T7444] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 224.670831][ T7444] __d_alloc+0x34/0xa80 [ 224.670874][ T7444] d_alloc_parallel+0x111/0x14e0 [ 224.670918][ T7444] ? find_held_lock+0x2b/0x80 [ 224.670940][ T7444] ? __d_lookup+0x25c/0x4a0 [ 224.670976][ T7444] ? __pfx_d_alloc_parallel+0x10/0x10 [ 224.671016][ T7444] ? __d_lookup+0x266/0x4a0 [ 224.671058][ T7444] lookup_open.isra.0+0x57c/0x11b0 [ 224.671101][ T7444] ? __pfx_lookup_open.isra.0+0x10/0x10 [ 224.671155][ T7444] ? mnt_get_write_access+0x1e9/0x2f0 [ 224.671193][ T7444] path_openat+0xa98/0x31a0 [ 224.671226][ T7444] ? __pfx_path_openat+0x10/0x10 [ 224.671262][ T7444] do_file_open+0x20e/0x430 [ 224.671288][ T7444] ? __pfx_do_file_open+0x10/0x10 [ 224.671340][ T7444] ? alloc_fd+0x476/0x790 [ 224.671366][ T7444] ? do_getname+0x191/0x390 [ 224.671399][ T7444] do_sys_openat2+0x10d/0x1e0 [ 224.671432][ T7444] ? __pfx_do_sys_openat2+0x10/0x10 [ 224.671465][ T7444] ? apparmor_capable+0x1d7/0x4d0 [ 224.671509][ T7444] __x64_sys_openat+0x12d/0x210 [ 224.671542][ T7444] ? __pfx___x64_sys_openat+0x10/0x10 [ 224.671586][ T7444] do_syscall_64+0x106/0xf80 [ 224.671614][ T7444] ? clear_bhb_loop+0x40/0x90 [ 224.671645][ T7444] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 224.671670][ T7444] RIP: 0033:0x7f01d079c799 [ 224.671690][ T7444] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 224.671714][ T7444] RSP: 002b:00007f01d15a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 224.671737][ T7444] RAX: ffffffffffffffda RBX: 00007f01d0a15fa0 RCX: 00007f01d079c799 [ 224.671753][ T7444] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 224.671769][ T7444] RBP: 00007f01d0832bd9 R08: 0000000000000000 R09: 0000000000000000 [ 224.671784][ T7444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 224.671798][ T7444] R13: 00007f01d0a16038 R14: 00007f01d0a15fa0 R15: 00007ffd9ba46cf8 [ 224.671830][ T7444] [ 227.458437][ T7488] ubi0: attaching mtd0 [ 227.474070][ T7488] ubi0: scanning is finished [ 227.726888][ T7488] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 227.771793][ T7488] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 227.789445][ T7488] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 227.824405][ T7497] FAULT_INJECTION: forcing a failure. [ 227.824405][ T7497] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 227.838605][ T7488] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 227.846911][ T7497] CPU: 1 UID: 0 PID: 7497 Comm: syz.3.322 Not tainted syzkaller #0 PREEMPT(full) [ 227.846954][ T7497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 227.846974][ T7497] Call Trace: [ 227.846985][ T7497] [ 227.846997][ T7497] dump_stack_lvl+0x100/0x190 [ 227.847054][ T7497] should_fail_ex.cold+0x5/0xa [ 227.847095][ T7497] strncpy_from_user+0x3b/0x2d0 [ 227.847154][ T7497] do_getname+0x78/0x390 [ 227.847201][ T7497] do_sys_openat2+0xc5/0x1e0 [ 227.847246][ T7497] ? __pfx_do_sys_openat2+0x10/0x10 [ 227.847290][ T7497] ? apparmor_capable+0x1d7/0x4d0 [ 227.847352][ T7497] __x64_sys_openat+0x12d/0x210 [ 227.847398][ T7497] ? __pfx___x64_sys_openat+0x10/0x10 [ 227.847467][ T7497] do_syscall_64+0x106/0xf80 [ 227.847507][ T7497] ? clear_bhb_loop+0x40/0x90 [ 227.847551][ T7497] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 227.847595][ T7497] RIP: 0033:0x7ffb7ad9c799 [ 227.847621][ T7497] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 227.847653][ T7497] RSP: 002b:00007ffb7bb98028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 227.847685][ T7497] RAX: ffffffffffffffda RBX: 00007ffb7b015fa0 RCX: 00007ffb7ad9c799 [ 227.847706][ T7497] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 227.847728][ T7497] RBP: 00007ffb7ae32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 227.847749][ T7497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 227.847769][ T7497] R13: 00007ffb7b016038 R14: 00007ffb7b015fa0 R15: 00007ffe40574298 [ 227.847813][ T7497] [ 227.851415][ T7488] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 228.033426][ T7488] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 228.055580][ T7488] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 3896940737 [ 228.066427][ T7488] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 228.133027][ T7493] ubi0: background thread "ubi_bgt0d" started, PID 7493 [ 228.156614][ T7490] ubi0: detaching mtd0 [ 228.207009][ T7501] FAULT_INJECTION: forcing a failure. [ 228.207009][ T7501] name failslab, interval 1, probability 0, space 0, times 0 [ 228.221031][ T7501] CPU: 1 UID: 0 PID: 7501 Comm: syz.3.323 Not tainted syzkaller #0 PREEMPT(full) [ 228.221077][ T7501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 228.221099][ T7501] Call Trace: [ 228.221110][ T7501] [ 228.221123][ T7501] dump_stack_lvl+0x100/0x190 [ 228.221184][ T7501] should_fail_ex.cold+0x5/0xa [ 228.221225][ T7501] should_failslab+0xc2/0x120 [ 228.221260][ T7501] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 228.221316][ T7501] ? __d_alloc+0x34/0xa80 [ 228.221352][ T7501] ? __pfx_stack_trace_save+0x10/0x10 [ 228.221390][ T7501] __d_alloc+0x34/0xa80 [ 228.221431][ T7501] d_alloc_parallel+0x111/0x14e0 [ 228.221489][ T7501] ? find_held_lock+0x2b/0x80 [ 228.221520][ T7501] ? __d_lookup+0x25c/0x4a0 [ 228.221568][ T7501] ? __pfx_d_alloc_parallel+0x10/0x10 [ 228.221633][ T7501] ? __d_lookup+0x266/0x4a0 [ 228.221692][ T7501] lookup_open.isra.0+0x57c/0x11b0 [ 228.221753][ T7501] ? __pfx_lookup_open.isra.0+0x10/0x10 [ 228.221826][ T7501] ? mnt_get_write_access+0x1e9/0x2f0 [ 228.221878][ T7501] path_openat+0xa98/0x31a0 [ 228.221928][ T7501] ? __pfx_path_openat+0x10/0x10 [ 228.221978][ T7501] do_file_open+0x20e/0x430 [ 228.222015][ T7501] ? __pfx_do_file_open+0x10/0x10 [ 228.222078][ T7501] ? alloc_fd+0x476/0x790 [ 228.222114][ T7501] ? do_getname+0x191/0x390 [ 228.222161][ T7501] do_sys_openat2+0x10d/0x1e0 [ 228.222207][ T7501] ? __pfx_do_sys_openat2+0x10/0x10 [ 228.222253][ T7501] ? apparmor_capable+0x1d7/0x4d0 [ 228.222314][ T7501] __x64_sys_openat+0x12d/0x210 [ 228.222360][ T7501] ? __pfx___x64_sys_openat+0x10/0x10 [ 228.222422][ T7501] do_syscall_64+0x106/0xf80 [ 228.222462][ T7501] ? clear_bhb_loop+0x40/0x90 [ 228.222505][ T7501] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 228.222541][ T7501] RIP: 0033:0x7ffb7ad9c799 [ 228.222577][ T7501] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 228.222611][ T7501] RSP: 002b:00007ffb7bb98028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 228.222644][ T7501] RAX: ffffffffffffffda RBX: 00007ffb7b015fa0 RCX: 00007ffb7ad9c799 [ 228.222665][ T7501] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 228.222687][ T7501] RBP: 00007ffb7ae32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 228.222708][ T7501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 228.222728][ T7501] R13: 00007ffb7b016038 R14: 00007ffb7b015fa0 R15: 00007ffe40574298 [ 228.222770][ T7501] [ 228.606073][ T7490] ubi0: mtd0 is detached [ 230.538980][ T7517] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input6 [ 231.372852][ T7546] FAULT_INJECTION: forcing a failure. [ 231.372852][ T7546] name failslab, interval 1, probability 0, space 0, times 0 [ 231.406325][ T7546] CPU: 0 UID: 0 PID: 7546 Comm: syz.1.335 Not tainted syzkaller #0 PREEMPT(full) [ 231.406359][ T7546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 231.406373][ T7546] Call Trace: [ 231.406381][ T7546] [ 231.406390][ T7546] dump_stack_lvl+0x100/0x190 [ 231.406433][ T7546] should_fail_ex.cold+0x5/0xa [ 231.406462][ T7546] should_failslab+0xc2/0x120 [ 231.406486][ T7546] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 231.406525][ T7546] ? __d_alloc+0x34/0xa80 [ 231.406551][ T7546] ? __pfx_stack_trace_save+0x10/0x10 [ 231.406579][ T7546] __d_alloc+0x34/0xa80 [ 231.406609][ T7546] d_alloc_parallel+0x111/0x14e0 [ 231.406653][ T7546] ? find_held_lock+0x2b/0x80 [ 231.406675][ T7546] ? __d_lookup+0x25c/0x4a0 [ 231.406709][ T7546] ? __pfx_d_alloc_parallel+0x10/0x10 [ 231.406748][ T7546] ? __d_lookup+0x266/0x4a0 [ 231.406790][ T7546] lookup_open.isra.0+0x57c/0x11b0 [ 231.406833][ T7546] ? __pfx_lookup_open.isra.0+0x10/0x10 [ 231.406886][ T7546] ? mnt_get_write_access+0x1e9/0x2f0 [ 231.406923][ T7546] path_openat+0xa98/0x31a0 [ 231.406958][ T7546] ? __pfx_path_openat+0x10/0x10 [ 231.406993][ T7546] do_file_open+0x20e/0x430 [ 231.407020][ T7546] ? __pfx_do_file_open+0x10/0x10 [ 231.407066][ T7546] ? alloc_fd+0x476/0x790 [ 231.407091][ T7546] ? do_getname+0x191/0x390 [ 231.407124][ T7546] do_sys_openat2+0x10d/0x1e0 [ 231.407156][ T7546] ? __pfx_do_sys_openat2+0x10/0x10 [ 231.407189][ T7546] ? apparmor_capable+0x1d7/0x4d0 [ 231.407232][ T7546] __x64_sys_openat+0x12d/0x210 [ 231.407265][ T7546] ? __pfx___x64_sys_openat+0x10/0x10 [ 231.407317][ T7546] do_syscall_64+0x106/0xf80 [ 231.407346][ T7546] ? clear_bhb_loop+0x40/0x90 [ 231.407376][ T7546] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 231.407402][ T7546] RIP: 0033:0x7f7cc359c799 [ 231.407423][ T7546] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 231.407451][ T7546] RSP: 002b:00007f7cc4416028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 231.407474][ T7546] RAX: ffffffffffffffda RBX: 00007f7cc3815fa0 RCX: 00007f7cc359c799 [ 231.407490][ T7546] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 231.407506][ T7546] RBP: 00007f7cc3632bd9 R08: 0000000000000000 R09: 0000000000000000 [ 231.407520][ T7546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 231.407535][ T7546] R13: 00007f7cc3816038 R14: 00007f7cc3815fa0 R15: 00007fff33e19038 [ 231.407566][ T7546] [ 232.958447][ T7558] netlink: 4 bytes leftover after parsing attributes in process `syz.2.337'. [ 232.968054][ T7558] netlink: 25 bytes leftover after parsing attributes in process `syz.2.337'. [ 237.218132][ T7625] ubi0: attaching mtd0 [ 237.225147][ T7625] ubi0: scanning is finished [ 237.358933][ T7625] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 237.393275][ T7625] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 237.427876][ T7625] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 237.492061][ T7625] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 237.526098][ T7625] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 237.566677][ T7625] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 237.624519][ T7625] ubi0: max/mean erase counter: 2/1, WL threshold: 4096, image sequence number: 3896940737 [ 237.704364][ T7625] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 237.733510][ T7629] ubi0: background thread "ubi_bgt0d" started, PID 7629 [ 237.767598][ T7627] ubi0: detaching mtd0 [ 237.798884][ T7627] ubi0: mtd0 is detached [ 237.804386][ T7632] FAULT_INJECTION: forcing a failure. [ 237.804386][ T7632] name failslab, interval 1, probability 0, space 0, times 0 [ 237.836953][ T7632] CPU: 1 UID: 0 PID: 7632 Comm: syz.2.354 Not tainted syzkaller #0 PREEMPT(full) [ 237.836997][ T7632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 237.837016][ T7632] Call Trace: [ 237.837026][ T7632] [ 237.837039][ T7632] dump_stack_lvl+0x100/0x190 [ 237.837091][ T7632] should_fail_ex.cold+0x5/0xa [ 237.837119][ T7632] should_failslab+0xc2/0x120 [ 237.837144][ T7632] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 237.837181][ T7632] ? security_file_alloc+0x34/0x2c0 [ 237.837206][ T7632] ? trace_kmem_cache_alloc+0xf3/0x120 [ 237.837236][ T7632] security_file_alloc+0x34/0x2c0 [ 237.837261][ T7632] init_file+0x95/0x480 [ 237.837289][ T7632] alloc_empty_file+0x73/0x1c0 [ 237.837320][ T7632] path_openat+0xe8/0x31a0 [ 237.837343][ T7632] ? kasan_save_stack+0x3f/0x50 [ 237.837380][ T7632] ? kasan_save_stack+0x30/0x50 [ 237.837423][ T7632] ? kasan_save_track+0x14/0x30 [ 237.837464][ T7632] ? __kasan_slab_alloc+0x89/0x90 [ 237.837503][ T7632] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 237.837540][ T7632] ? do_getname+0x35/0x390 [ 237.837569][ T7632] ? do_sys_openat2+0xc5/0x1e0 [ 237.837599][ T7632] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 237.837629][ T7632] ? __pfx_path_openat+0x10/0x10 [ 237.837663][ T7632] do_file_open+0x20e/0x430 [ 237.837690][ T7632] ? __pfx_do_file_open+0x10/0x10 [ 237.837735][ T7632] ? alloc_fd+0x476/0x790 [ 237.837760][ T7632] ? do_getname+0x191/0x390 [ 237.837792][ T7632] do_sys_openat2+0x10d/0x1e0 [ 237.837824][ T7632] ? __pfx_do_sys_openat2+0x10/0x10 [ 237.837857][ T7632] ? apparmor_capable+0x1d7/0x4d0 [ 237.837902][ T7632] __x64_sys_openat+0x12d/0x210 [ 237.837936][ T7632] ? __pfx___x64_sys_openat+0x10/0x10 [ 237.837980][ T7632] do_syscall_64+0x106/0xf80 [ 237.838008][ T7632] ? clear_bhb_loop+0x40/0x90 [ 237.838038][ T7632] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 237.838064][ T7632] RIP: 0033:0x7f0da3b9c799 [ 237.838084][ T7632] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 237.838108][ T7632] RSP: 002b:00007f0da4ac8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 237.838131][ T7632] RAX: ffffffffffffffda RBX: 00007f0da3e15fa0 RCX: 00007f0da3b9c799 [ 237.838147][ T7632] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 237.838162][ T7632] RBP: 00007f0da3c32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 237.838177][ T7632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 237.838192][ T7632] R13: 00007f0da3e16038 R14: 00007f0da3e15fa0 R15: 00007ffd4d79cc88 [ 237.838223][ T7632] [ 238.348873][ T7634] ubi0: attaching mtd0 [ 238.396778][ T7634] ubi0: scanning is finished [ 238.782025][ T7634] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 238.872194][ T7634] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 238.910428][ T7634] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 239.013516][ T7634] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 239.082922][ T7634] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 239.129743][ T7634] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 239.222908][ T7634] ubi0: max/mean erase counter: 2/1, WL threshold: 4096, image sequence number: 3896940737 [ 239.364927][ T7634] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 239.459005][ T7642] ubi0: detaching mtd0 [ 239.463249][ T7648] ubi0: background thread "ubi_bgt0d" started, PID 7648 [ 239.600140][ T7642] ubi0: mtd0 is detached [ 242.120830][ T7719] ubi0: attaching mtd0 [ 242.126949][ T7719] ubi0: scanning is finished [ 242.132470][ T7719] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 242.411048][ T7719] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 244.215485][ T7737] block loop4: the capability attribute has been deprecated. [ 244.829654][ T30] audit: type=1806 audit(1772566488.386:5): xattr="" res=-22 [ 246.890356][ T7741] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 248.146833][ T7819] FAULT_INJECTION: forcing a failure. [ 248.146833][ T7819] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 248.146872][ T7819] CPU: 0 UID: 0 PID: 7819 Comm: syz.0.395 Not tainted syzkaller #0 PREEMPT(full) [ 248.146900][ T7819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 248.146926][ T7819] Call Trace: [ 248.146933][ T7819] [ 248.146946][ T7819] dump_stack_lvl+0x100/0x190 [ 248.146988][ T7819] should_fail_ex.cold+0x5/0xa [ 248.147017][ T7819] strncpy_from_user+0x3b/0x2d0 [ 248.147066][ T7819] do_getname+0x78/0x390 [ 248.147101][ T7819] do_sys_openat2+0xc5/0x1e0 [ 248.147133][ T7819] ? __pfx_do_sys_openat2+0x10/0x10 [ 248.147166][ T7819] ? apparmor_capable+0x1d7/0x4d0 [ 248.147210][ T7819] __x64_sys_openat+0x12d/0x210 [ 248.147249][ T7819] ? __pfx___x64_sys_openat+0x10/0x10 [ 248.147295][ T7819] do_syscall_64+0x106/0xf80 [ 248.147324][ T7819] ? clear_bhb_loop+0x40/0x90 [ 248.147355][ T7819] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 248.147380][ T7819] RIP: 0033:0x7f01d079c799 [ 248.147399][ T7819] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 248.147423][ T7819] RSP: 002b:00007f01d15a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 248.147445][ T7819] RAX: ffffffffffffffda RBX: 00007f01d0a15fa0 RCX: 00007f01d079c799 [ 248.147465][ T7819] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 248.147481][ T7819] RBP: 00007f01d0832bd9 R08: 0000000000000000 R09: 0000000000000000 [ 248.147496][ T7819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 248.147510][ T7819] R13: 00007f01d0a16038 R14: 00007f01d0a15fa0 R15: 00007ffd9ba46cf8 [ 248.147541][ T7819] [ 252.601529][ T7884] input: jJǸ-9%vlQ J86 as /devices/virtual/input/input7 [ 253.754383][ T7905] FAULT_INJECTION: forcing a failure. [ 253.754383][ T7905] name failslab, interval 1, probability 0, space 0, times 0 [ 253.824812][ T7905] CPU: 1 UID: 0 PID: 7905 Comm: syz.2.417 Not tainted syzkaller #0 PREEMPT(full) [ 253.824858][ T7905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 253.824877][ T7905] Call Trace: [ 253.824888][ T7905] [ 253.824901][ T7905] dump_stack_lvl+0x100/0x190 [ 253.824959][ T7905] should_fail_ex.cold+0x5/0xa [ 253.825000][ T7905] should_failslab+0xc2/0x120 [ 253.825036][ T7905] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 253.825089][ T7905] ? __d_alloc+0x34/0xa80 [ 253.825124][ T7905] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 253.825170][ T7905] __d_alloc+0x34/0xa80 [ 253.825213][ T7905] d_alloc_parallel+0x111/0x14e0 [ 253.825280][ T7905] ? find_held_lock+0x2b/0x80 [ 253.825312][ T7905] ? __d_lookup+0x25c/0x4a0 [ 253.825359][ T7905] ? __pfx_d_alloc_parallel+0x10/0x10 [ 253.825425][ T7905] ? __d_lookup+0x266/0x4a0 [ 253.825484][ T7905] lookup_open.isra.0+0x57c/0x11b0 [ 253.825547][ T7905] ? __pfx_lookup_open.isra.0+0x10/0x10 [ 253.825624][ T7905] ? mnt_get_write_access+0x1e9/0x2f0 [ 253.825678][ T7905] path_openat+0xa98/0x31a0 [ 253.825728][ T7905] ? __pfx_path_openat+0x10/0x10 [ 253.825778][ T7905] do_file_open+0x20e/0x430 [ 253.825823][ T7905] ? __pfx_do_file_open+0x10/0x10 [ 253.825889][ T7905] ? alloc_fd+0x476/0x790 [ 253.825926][ T7905] ? do_getname+0x191/0x390 [ 253.825973][ T7905] do_sys_openat2+0x10d/0x1e0 [ 253.826019][ T7905] ? __pfx_do_sys_openat2+0x10/0x10 [ 253.826065][ T7905] ? apparmor_capable+0x1d7/0x4d0 [ 253.826127][ T7905] __x64_sys_openat+0x12d/0x210 [ 253.826174][ T7905] ? __pfx___x64_sys_openat+0x10/0x10 [ 253.826235][ T7905] do_syscall_64+0x106/0xf80 [ 253.826274][ T7905] ? clear_bhb_loop+0x40/0x90 [ 253.826316][ T7905] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 253.826352][ T7905] RIP: 0033:0x7f0da3b9c799 [ 253.826381][ T7905] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 253.826421][ T7905] RSP: 002b:00007f0da4ac8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 253.826454][ T7905] RAX: ffffffffffffffda RBX: 00007f0da3e15fa0 RCX: 00007f0da3b9c799 [ 253.826476][ T7905] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 253.826499][ T7905] RBP: 00007f0da3c32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 253.826520][ T7905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 253.826540][ T7905] R13: 00007f0da3e16038 R14: 00007f0da3e15fa0 R15: 00007ffd4d79cc88 [ 253.826585][ T7905] [ 256.003371][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 256.010139][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 257.363821][ T7951] FAULT_INJECTION: forcing a failure. [ 257.363821][ T7951] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.377106][ T7951] CPU: 1 UID: 0 PID: 7951 Comm: syz.0.426 Not tainted syzkaller #0 PREEMPT(full) [ 257.377148][ T7951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 257.377166][ T7951] Call Trace: [ 257.377176][ T7951] [ 257.377188][ T7951] dump_stack_lvl+0x100/0x190 [ 257.377244][ T7951] should_fail_ex.cold+0x5/0xa [ 257.377283][ T7951] _copy_from_user+0x2e/0xd0 [ 257.377338][ T7951] copy_msghdr_from_user+0x9f/0x4f0 [ 257.377392][ T7951] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 257.377449][ T7951] ? rcu_is_watching+0x12/0xc0 [ 257.377504][ T7951] ? ___sys_recvmsg+0x177/0x1a0 [ 257.377550][ T7951] ? kfree+0x2ec/0x6b0 [ 257.377599][ T7951] ___sys_recvmsg+0xdd/0x1a0 [ 257.377651][ T7951] ? __pfx____sys_recvmsg+0x10/0x10 [ 257.377732][ T7951] ? __pfx___might_resched+0x10/0x10 [ 257.377790][ T7951] do_recvmmsg+0x301/0x760 [ 257.377846][ T7951] ? __pfx_do_recvmmsg+0x10/0x10 [ 257.377892][ T7951] ? ksys_write+0x190/0x250 [ 257.377943][ T7951] ? ksys_write+0x190/0x250 [ 257.378000][ T7951] ? __mutex_unlock_slowpath+0x15c/0x790 [ 257.378054][ T7951] ? __fget_files+0x21f/0x3d0 [ 257.378116][ T7951] __x64_sys_recvmmsg+0x22a/0x280 [ 257.378159][ T7951] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 257.378213][ T7951] do_syscall_64+0x106/0xf80 [ 257.378250][ T7951] ? clear_bhb_loop+0x40/0x90 [ 257.378292][ T7951] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 257.378325][ T7951] RIP: 0033:0x7f01d079c799 [ 257.378352][ T7951] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 257.378383][ T7951] RSP: 002b:00007f01d1580028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 257.378413][ T7951] RAX: ffffffffffffffda RBX: 00007f01d0a16090 RCX: 00007f01d079c799 [ 257.378434][ T7951] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 257.378453][ T7951] RBP: 00007f01d1580090 R08: 0000000000000000 R09: 0000000000000000 [ 257.378472][ T7951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 257.378491][ T7951] R13: 00007f01d0a16128 R14: 00007f01d0a16090 R15: 00007ffd9ba46cf8 [ 257.378533][ T7951] [ 258.522306][ T7966] FAULT_INJECTION: forcing a failure. [ 258.522306][ T7966] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 258.663003][ T7966] CPU: 1 UID: 0 PID: 7966 Comm: syz.2.431 Not tainted syzkaller #0 PREEMPT(full) [ 258.663038][ T7966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 258.663059][ T7966] Call Trace: [ 258.663070][ T7966] [ 258.663083][ T7966] dump_stack_lvl+0x100/0x190 [ 258.663126][ T7966] should_fail_ex.cold+0x5/0xa [ 258.663155][ T7966] strncpy_from_user+0x3b/0x2d0 [ 258.663199][ T7966] do_getname+0x78/0x390 [ 258.663233][ T7966] do_sys_openat2+0xc5/0x1e0 [ 258.663284][ T7966] ? __pfx_do_sys_openat2+0x10/0x10 [ 258.663317][ T7966] ? apparmor_capable+0x1d7/0x4d0 [ 258.663361][ T7966] __x64_sys_openat+0x12d/0x210 [ 258.663394][ T7966] ? __pfx___x64_sys_openat+0x10/0x10 [ 258.663438][ T7966] do_syscall_64+0x106/0xf80 [ 258.663466][ T7966] ? clear_bhb_loop+0x40/0x90 [ 258.663497][ T7966] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 258.663522][ T7966] RIP: 0033:0x7f0da3b9c799 [ 258.663550][ T7966] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 258.663574][ T7966] RSP: 002b:00007f0da4ac8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 258.663597][ T7966] RAX: ffffffffffffffda RBX: 00007f0da3e15fa0 RCX: 00007f0da3b9c799 [ 258.663613][ T7966] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 258.663628][ T7966] RBP: 00007f0da3c32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 258.663643][ T7966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 258.663657][ T7966] R13: 00007f0da3e16038 R14: 00007f0da3e15fa0 R15: 00007ffd4d79cc88 [ 258.663688][ T7966] [ 262.006081][ T8018] FAULT_INJECTION: forcing a failure. [ 262.006081][ T8018] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 262.019495][ T8018] CPU: 1 UID: 0 PID: 8018 Comm: syz.2.443 Not tainted syzkaller #0 PREEMPT(full) [ 262.019528][ T8018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 262.019543][ T8018] Call Trace: [ 262.019552][ T8018] [ 262.019562][ T8018] dump_stack_lvl+0x100/0x190 [ 262.019610][ T8018] should_fail_ex.cold+0x5/0xa [ 262.019638][ T8018] strncpy_from_user+0x3b/0x2d0 [ 262.019682][ T8018] do_getname+0x78/0x390 [ 262.019717][ T8018] do_sys_openat2+0xc5/0x1e0 [ 262.019749][ T8018] ? __pfx_do_sys_openat2+0x10/0x10 [ 262.019781][ T8018] ? apparmor_capable+0x1d7/0x4d0 [ 262.019825][ T8018] __x64_sys_openat+0x12d/0x210 [ 262.019876][ T8018] ? __pfx___x64_sys_openat+0x10/0x10 [ 262.019993][ T8018] do_syscall_64+0x106/0xf80 [ 262.020048][ T8018] ? clear_bhb_loop+0x40/0x90 [ 262.020125][ T8018] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 262.020197][ T8018] RIP: 0033:0x7f0da3b9c799 [ 262.020226][ T8018] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 262.020262][ T8018] RSP: 002b:00007f0da4ac8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 262.020285][ T8018] RAX: ffffffffffffffda RBX: 00007f0da3e15fa0 RCX: 00007f0da3b9c799 [ 262.020301][ T8018] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 262.020317][ T8018] RBP: 00007f0da3c32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 262.020332][ T8018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 262.020346][ T8018] R13: 00007f0da3e16038 R14: 00007f0da3e15fa0 R15: 00007ffd4d79cc88 [ 262.020377][ T8018] [ 262.654148][ T8021] FAULT_INJECTION: forcing a failure. [ 262.654148][ T8021] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 262.676008][ T8021] CPU: 1 UID: 0 PID: 8021 Comm: syz.2.444 Not tainted syzkaller #0 PREEMPT(full) [ 262.676054][ T8021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 262.676076][ T8021] Call Trace: [ 262.676087][ T8021] [ 262.676099][ T8021] dump_stack_lvl+0x100/0x190 [ 262.676159][ T8021] should_fail_ex.cold+0x5/0xa [ 262.676197][ T8021] strncpy_from_user+0x3b/0x2d0 [ 262.676255][ T8021] do_getname+0x78/0x390 [ 262.676303][ T8021] do_sys_openat2+0xc5/0x1e0 [ 262.676347][ T8021] ? __pfx_do_sys_openat2+0x10/0x10 [ 262.676393][ T8021] ? apparmor_capable+0x1d7/0x4d0 [ 262.676453][ T8021] __x64_sys_openat+0x12d/0x210 [ 262.676498][ T8021] ? __pfx___x64_sys_openat+0x10/0x10 [ 262.676558][ T8021] do_syscall_64+0x106/0xf80 [ 262.676608][ T8021] ? clear_bhb_loop+0x40/0x90 [ 262.676650][ T8021] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 262.676680][ T8021] RIP: 0033:0x7f0da3b9c799 [ 262.676705][ T8021] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 262.676732][ T8021] RSP: 002b:00007f0da4ac8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 262.676759][ T8021] RAX: ffffffffffffffda RBX: 00007f0da3e15fa0 RCX: 00007f0da3b9c799 [ 262.676777][ T8021] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 262.676795][ T8021] RBP: 00007f0da3c32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 262.676812][ T8021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 262.676828][ T8021] R13: 00007f0da3e16038 R14: 00007f0da3e15fa0 R15: 00007ffd4d79cc88 [ 262.676866][ T8021] [ 263.967290][ T8041] FAULT_INJECTION: forcing a failure. [ 263.967290][ T8041] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 264.003758][ T8041] CPU: 1 UID: 0 PID: 8041 Comm: syz.3.451 Not tainted syzkaller #0 PREEMPT(full) [ 264.003816][ T8041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 264.003837][ T8041] Call Trace: [ 264.003847][ T8041] [ 264.003860][ T8041] dump_stack_lvl+0x100/0x190 [ 264.003920][ T8041] should_fail_ex.cold+0x5/0xa [ 264.003963][ T8041] strncpy_from_user+0x3b/0x2d0 [ 264.004032][ T8041] do_getname+0x78/0x390 [ 264.004080][ T8041] do_sys_openat2+0xc5/0x1e0 [ 264.004123][ T8041] ? __pfx_do_sys_openat2+0x10/0x10 [ 264.004169][ T8041] ? apparmor_capable+0x1d7/0x4d0 [ 264.004228][ T8041] __x64_sys_openat+0x12d/0x210 [ 264.004273][ T8041] ? __pfx___x64_sys_openat+0x10/0x10 [ 264.004334][ T8041] do_syscall_64+0x106/0xf80 [ 264.004372][ T8041] ? clear_bhb_loop+0x40/0x90 [ 264.004413][ T8041] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 264.004448][ T8041] RIP: 0033:0x7ffb7ad9c799 [ 264.004476][ T8041] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 264.004510][ T8041] RSP: 002b:00007ffb7bb98028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 264.004542][ T8041] RAX: ffffffffffffffda RBX: 00007ffb7b015fa0 RCX: 00007ffb7ad9c799 [ 264.004565][ T8041] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 264.004586][ T8041] RBP: 00007ffb7ae32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 264.004606][ T8041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 264.004626][ T8041] R13: 00007ffb7b016038 R14: 00007ffb7b015fa0 R15: 00007ffe40574298 [ 264.004670][ T8041] [ 265.626603][ T8055] FAULT_INJECTION: forcing a failure. [ 265.626603][ T8055] name failslab, interval 1, probability 0, space 0, times 0 [ 265.641511][ T8055] CPU: 0 UID: 0 PID: 8055 Comm: syz.1.455 Not tainted syzkaller #0 PREEMPT(full) [ 265.641556][ T8055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 265.641576][ T8055] Call Trace: [ 265.641586][ T8055] [ 265.641599][ T8055] dump_stack_lvl+0x100/0x190 [ 265.641658][ T8055] should_fail_ex.cold+0x5/0xa [ 265.641698][ T8055] should_failslab+0xc2/0x120 [ 265.641734][ T8055] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 265.641787][ T8055] ? alloc_empty_file+0x55/0x1c0 [ 265.641842][ T8055] ? __pfx_stack_trace_save+0x10/0x10 [ 265.641885][ T8055] alloc_empty_file+0x55/0x1c0 [ 265.641928][ T8055] path_openat+0xe8/0x31a0 [ 265.641960][ T8055] ? kasan_save_stack+0x3f/0x50 [ 265.642009][ T8055] ? kasan_save_stack+0x30/0x50 [ 265.642058][ T8055] ? kasan_save_track+0x14/0x30 [ 265.642109][ T8055] ? __kasan_slab_alloc+0x89/0x90 [ 265.642163][ T8055] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 265.642213][ T8055] ? do_getname+0x35/0x390 [ 265.642252][ T8055] ? do_sys_openat2+0xc5/0x1e0 [ 265.642295][ T8055] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 265.642336][ T8055] ? __pfx_path_openat+0x10/0x10 [ 265.642384][ T8055] do_file_open+0x20e/0x430 [ 265.642421][ T8055] ? __pfx_do_file_open+0x10/0x10 [ 265.642487][ T8055] ? alloc_fd+0x476/0x790 [ 265.642525][ T8055] ? do_getname+0x191/0x390 [ 265.642572][ T8055] do_sys_openat2+0x10d/0x1e0 [ 265.642617][ T8055] ? __pfx_do_sys_openat2+0x10/0x10 [ 265.642663][ T8055] ? apparmor_capable+0x1d7/0x4d0 [ 265.642725][ T8055] __x64_sys_openat+0x12d/0x210 [ 265.642771][ T8055] ? __pfx___x64_sys_openat+0x10/0x10 [ 265.642843][ T8055] do_syscall_64+0x106/0xf80 [ 265.642884][ T8055] ? clear_bhb_loop+0x40/0x90 [ 265.642928][ T8055] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 265.642964][ T8055] RIP: 0033:0x7f7cc359c799 [ 265.642994][ T8055] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 265.643027][ T8055] RSP: 002b:00007f7cc4416028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 265.643059][ T8055] RAX: ffffffffffffffda RBX: 00007f7cc3815fa0 RCX: 00007f7cc359c799 [ 265.643081][ T8055] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 265.643103][ T8055] RBP: 00007f7cc3632bd9 R08: 0000000000000000 R09: 0000000000000000 [ 265.643124][ T8055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 265.643144][ T8055] R13: 00007f7cc3816038 R14: 00007f7cc3815fa0 R15: 00007fff33e19038 [ 265.643189][ T8055] [ 266.485196][ T8063] input: jJǸ-9%vlQ J86 as /devices/virtual/input/input8 [ 267.370516][ T8036] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 268.516131][ T8087] FAULT_INJECTION: forcing a failure. [ 268.516131][ T8087] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 268.554150][ T8087] CPU: 1 UID: 0 PID: 8087 Comm: syz.1.470 Not tainted syzkaller #0 PREEMPT(full) [ 268.554185][ T8087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 268.554200][ T8087] Call Trace: [ 268.554207][ T8087] [ 268.554216][ T8087] dump_stack_lvl+0x100/0x190 [ 268.554260][ T8087] should_fail_ex.cold+0x5/0xa [ 268.554289][ T8087] strncpy_from_user+0x3b/0x2d0 [ 268.554332][ T8087] do_getname+0x78/0x390 [ 268.554366][ T8087] do_sys_openat2+0xc5/0x1e0 [ 268.554398][ T8087] ? __pfx_do_sys_openat2+0x10/0x10 [ 268.554431][ T8087] ? apparmor_capable+0x1d7/0x4d0 [ 268.554475][ T8087] __x64_sys_openat+0x12d/0x210 [ 268.554508][ T8087] ? __pfx___x64_sys_openat+0x10/0x10 [ 268.554552][ T8087] do_syscall_64+0x106/0xf80 [ 268.554580][ T8087] ? clear_bhb_loop+0x40/0x90 [ 268.554610][ T8087] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.554644][ T8087] RIP: 0033:0x7f7cc359c799 [ 268.554664][ T8087] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 268.554688][ T8087] RSP: 002b:00007f7cc4416028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 268.554711][ T8087] RAX: ffffffffffffffda RBX: 00007f7cc3815fa0 RCX: 00007f7cc359c799 [ 268.554728][ T8087] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 268.554744][ T8087] RBP: 00007f7cc3632bd9 R08: 0000000000000000 R09: 0000000000000000 [ 268.554759][ T8087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 268.554773][ T8087] R13: 00007f7cc3816038 R14: 00007f7cc3815fa0 R15: 00007fff33e19038 [ 268.554804][ T8087] [ 269.198847][ T8093] ubi0: attaching mtd0 [ 269.209686][ T8093] ubi0: scanning is finished [ 269.227681][ T8093] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 269.483967][ T8093] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 270.018474][ T8115] FAULT_INJECTION: forcing a failure. [ 270.018474][ T8115] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 270.043295][ T8115] CPU: 1 UID: 0 PID: 8115 Comm: syz.1.471 Not tainted syzkaller #0 PREEMPT(full) [ 270.043343][ T8115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 270.043364][ T8115] Call Trace: [ 270.043374][ T8115] [ 270.043387][ T8115] dump_stack_lvl+0x100/0x190 [ 270.043447][ T8115] should_fail_ex.cold+0x5/0xa [ 270.043488][ T8115] strncpy_from_user+0x3b/0x2d0 [ 270.043550][ T8115] do_getname+0x78/0x390 [ 270.043598][ T8115] do_sys_openat2+0xc5/0x1e0 [ 270.043644][ T8115] ? __pfx_do_sys_openat2+0x10/0x10 [ 270.043690][ T8115] ? apparmor_capable+0x1d7/0x4d0 [ 270.043751][ T8115] __x64_sys_openat+0x12d/0x210 [ 270.043797][ T8115] ? __pfx___x64_sys_openat+0x10/0x10 [ 270.043859][ T8115] do_syscall_64+0x106/0xf80 [ 270.043898][ T8115] ? clear_bhb_loop+0x40/0x90 [ 270.043954][ T8115] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 270.043989][ T8115] RIP: 0033:0x7f7cc359c799 [ 270.044017][ T8115] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 270.044050][ T8115] RSP: 002b:00007f7cc4416028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 270.044081][ T8115] RAX: ffffffffffffffda RBX: 00007f7cc3815fa0 RCX: 00007f7cc359c799 [ 270.044103][ T8115] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 270.044125][ T8115] RBP: 00007f7cc3632bd9 R08: 0000000000000000 R09: 0000000000000000 [ 270.044146][ T8115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 270.044166][ T8115] R13: 00007f7cc3816038 R14: 00007f7cc3815fa0 R15: 00007fff33e19038 [ 270.044206][ T8115] [ 270.338322][ T8117] FAULT_INJECTION: forcing a failure. [ 270.338322][ T8117] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 270.352324][ T8117] CPU: 1 UID: 0 PID: 8117 Comm: syz.1.473 Not tainted syzkaller #0 PREEMPT(full) [ 270.352366][ T8117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 270.352385][ T8117] Call Trace: [ 270.352395][ T8117] [ 270.352408][ T8117] dump_stack_lvl+0x100/0x190 [ 270.352464][ T8117] should_fail_ex.cold+0x5/0xa [ 270.352502][ T8117] strncpy_from_user+0x3b/0x2d0 [ 270.352561][ T8117] do_getname+0x78/0x390 [ 270.352634][ T8117] do_sys_openat2+0xc5/0x1e0 [ 270.352679][ T8117] ? __pfx_do_sys_openat2+0x10/0x10 [ 270.352724][ T8117] ? apparmor_capable+0x1d7/0x4d0 [ 270.352782][ T8117] __x64_sys_openat+0x12d/0x210 [ 270.352825][ T8117] ? __pfx___x64_sys_openat+0x10/0x10 [ 270.352885][ T8117] do_syscall_64+0x106/0xf80 [ 270.352923][ T8117] ? clear_bhb_loop+0x40/0x90 [ 270.352976][ T8117] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 270.353011][ T8117] RIP: 0033:0x7f7cc359c799 [ 270.353039][ T8117] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 270.353072][ T8117] RSP: 002b:00007f7cc4416028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 270.353104][ T8117] RAX: ffffffffffffffda RBX: 00007f7cc3815fa0 RCX: 00007f7cc359c799 [ 270.353125][ T8117] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 270.353147][ T8117] RBP: 00007f7cc3632bd9 R08: 0000000000000000 R09: 0000000000000000 [ 270.353168][ T8117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 270.353188][ T8117] R13: 00007f7cc3816038 R14: 00007f7cc3815fa0 R15: 00007fff33e19038 [ 270.353232][ T8117] [ 272.791051][ T8156] FAULT_INJECTION: forcing a failure. [ 272.791051][ T8156] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 272.805079][ T8156] CPU: 0 UID: 0 PID: 8156 Comm: syz.3.482 Not tainted syzkaller #0 PREEMPT(full) [ 272.805111][ T8156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 272.805125][ T8156] Call Trace: [ 272.805133][ T8156] [ 272.805142][ T8156] dump_stack_lvl+0x100/0x190 [ 272.805185][ T8156] should_fail_ex.cold+0x5/0xa [ 272.805222][ T8156] strncpy_from_user+0x3b/0x2d0 [ 272.805266][ T8156] do_getname+0x78/0x390 [ 272.805299][ T8156] do_sys_openat2+0xc5/0x1e0 [ 272.805331][ T8156] ? __pfx_do_sys_openat2+0x10/0x10 [ 272.805364][ T8156] ? apparmor_capable+0x1d7/0x4d0 [ 272.805407][ T8156] __x64_sys_openat+0x12d/0x210 [ 272.805440][ T8156] ? __pfx___x64_sys_openat+0x10/0x10 [ 272.805484][ T8156] do_syscall_64+0x106/0xf80 [ 272.805512][ T8156] ? clear_bhb_loop+0x40/0x90 [ 272.805542][ T8156] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 272.805568][ T8156] RIP: 0033:0x7ffb7ad9c799 [ 272.805588][ T8156] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 272.805612][ T8156] RSP: 002b:00007ffb7bb98028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 272.805634][ T8156] RAX: ffffffffffffffda RBX: 00007ffb7b015fa0 RCX: 00007ffb7ad9c799 [ 272.805651][ T8156] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 272.805666][ T8156] RBP: 00007ffb7ae32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 272.805681][ T8156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 272.805695][ T8156] R13: 00007ffb7b016038 R14: 00007ffb7b015fa0 R15: 00007ffe40574298 [ 272.805727][ T8156] [ 277.906738][ T8210] netlink: 342 bytes leftover after parsing attributes in process `syz.1.494'. [ 278.185274][ T8218] FAULT_INJECTION: forcing a failure. [ 278.185274][ T8218] name failslab, interval 1, probability 0, space 0, times 0 [ 278.199068][ T8218] CPU: 1 UID: 0 PID: 8218 Comm: syz.1.497 Not tainted syzkaller #0 PREEMPT(full) [ 278.199114][ T8218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 278.199130][ T8218] Call Trace: [ 278.199138][ T8218] [ 278.199147][ T8218] dump_stack_lvl+0x100/0x190 [ 278.199193][ T8218] should_fail_ex.cold+0x5/0xa [ 278.199222][ T8218] should_failslab+0xc2/0x120 [ 278.199246][ T8218] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 278.199284][ T8218] ? alloc_empty_file+0x55/0x1c0 [ 278.199314][ T8218] ? __pfx_stack_trace_save+0x10/0x10 [ 278.199343][ T8218] alloc_empty_file+0x55/0x1c0 [ 278.199374][ T8218] path_openat+0xe8/0x31a0 [ 278.199397][ T8218] ? kasan_save_stack+0x3f/0x50 [ 278.199434][ T8218] ? kasan_save_stack+0x30/0x50 [ 278.199470][ T8218] ? kasan_save_track+0x14/0x30 [ 278.199507][ T8218] ? __kasan_slab_alloc+0x89/0x90 [ 278.199546][ T8218] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 278.199582][ T8218] ? do_getname+0x35/0x390 [ 278.199610][ T8218] ? do_sys_openat2+0xc5/0x1e0 [ 278.199641][ T8218] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 278.199671][ T8218] ? __pfx_path_openat+0x10/0x10 [ 278.199713][ T8218] do_file_open+0x20e/0x430 [ 278.199740][ T8218] ? __pfx_do_file_open+0x10/0x10 [ 278.199785][ T8218] ? alloc_fd+0x476/0x790 [ 278.199811][ T8218] ? do_getname+0x191/0x390 [ 278.199856][ T8218] do_sys_openat2+0x10d/0x1e0 [ 278.199894][ T8218] ? __pfx_do_sys_openat2+0x10/0x10 [ 278.199927][ T8218] ? apparmor_capable+0x1d7/0x4d0 [ 278.199970][ T8218] __x64_sys_openat+0x12d/0x210 [ 278.200004][ T8218] ? __pfx___x64_sys_openat+0x10/0x10 [ 278.200047][ T8218] do_syscall_64+0x106/0xf80 [ 278.200077][ T8218] ? clear_bhb_loop+0x40/0x90 [ 278.200107][ T8218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 278.200132][ T8218] RIP: 0033:0x7f7cc359c799 [ 278.200152][ T8218] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 278.200176][ T8218] RSP: 002b:00007f7cc4416028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 278.200199][ T8218] RAX: ffffffffffffffda RBX: 00007f7cc3815fa0 RCX: 00007f7cc359c799 [ 278.200215][ T8218] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 278.200231][ T8218] RBP: 00007f7cc3632bd9 R08: 0000000000000000 R09: 0000000000000000 [ 278.200246][ T8218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 278.200261][ T8218] R13: 00007f7cc3816038 R14: 00007f7cc3815fa0 R15: 00007fff33e19038 [ 278.200291][ T8218] [ 278.485920][ T8216] bridge0: port 3(veth0_to_bridge) entered blocking state [ 278.493451][ T8216] bridge0: port 3(veth0_to_bridge) entered disabled state [ 278.500786][ T8216] veth0_to_bridge: entered allmulticast mode [ 278.508910][ T8216] veth0_to_bridge: entered promiscuous mode [ 278.514973][ T8216] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 278.528279][ T8216] bridge0: port 3(veth0_to_bridge) entered blocking state [ 278.535658][ T8216] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 279.250314][ T8240] FAULT_INJECTION: forcing a failure. [ 279.250314][ T8240] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 279.265443][ T8240] CPU: 0 UID: 0 PID: 8240 Comm: syz.0.503 Not tainted syzkaller #0 PREEMPT(full) [ 279.265485][ T8240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 279.265504][ T8240] Call Trace: [ 279.265514][ T8240] [ 279.265526][ T8240] dump_stack_lvl+0x100/0x190 [ 279.265580][ T8240] should_fail_ex.cold+0x5/0xa [ 279.265619][ T8240] _copy_from_user+0x2e/0xd0 [ 279.265673][ T8240] __tun_chr_ioctl+0x2952/0x47c0 [ 279.265717][ T8240] ? __pfx_do_vfs_ioctl+0x10/0x10 [ 279.265776][ T8240] ? __pfx___tun_chr_ioctl+0x10/0x10 [ 279.265826][ T8240] ? hook_file_ioctl_common+0x146/0x410 [ 279.265887][ T8240] ? __fget_files+0x21f/0x3d0 [ 279.265944][ T8240] ? __pfx_tun_chr_ioctl+0x10/0x10 [ 279.265991][ T8240] __x64_sys_ioctl+0x18e/0x210 [ 279.266039][ T8240] do_syscall_64+0x106/0xf80 [ 279.266076][ T8240] ? clear_bhb_loop+0x40/0x90 [ 279.266117][ T8240] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.266150][ T8240] RIP: 0033:0x7f01d079c799 [ 279.266178][ T8240] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 279.266217][ T8240] RSP: 002b:00007f01d15a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 279.266248][ T8240] RAX: ffffffffffffffda RBX: 00007f01d0a15fa0 RCX: 00007f01d079c799 [ 279.266269][ T8240] RDX: 0000000000000000 RSI: 00000000401054d5 RDI: 00000000000000c8 [ 279.266289][ T8240] RBP: 00007f01d15a1090 R08: 0000000000000000 R09: 0000000000000000 [ 279.266308][ T8240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.266326][ T8240] R13: 00007f01d0a16038 R14: 00007f01d0a15fa0 R15: 00007ffd9ba46cf8 [ 279.266366][ T8240] [ 281.385905][ T8309] FAULT_INJECTION: forcing a failure. [ 281.385905][ T8309] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 281.439626][ T8309] CPU: 1 UID: 0 PID: 8309 Comm: syz.3.510 Not tainted syzkaller #0 PREEMPT(full) [ 281.439672][ T8309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 281.439687][ T8309] Call Trace: [ 281.439695][ T8309] [ 281.439704][ T8309] dump_stack_lvl+0x100/0x190 [ 281.439746][ T8309] should_fail_ex.cold+0x5/0xa [ 281.439775][ T8309] strncpy_from_user+0x3b/0x2d0 [ 281.439818][ T8309] do_getname+0x78/0x390 [ 281.439852][ T8309] do_sys_openat2+0xc5/0x1e0 [ 281.439884][ T8309] ? __pfx_do_sys_openat2+0x10/0x10 [ 281.439917][ T8309] ? apparmor_capable+0x1d7/0x4d0 [ 281.439961][ T8309] __x64_sys_openat+0x12d/0x210 [ 281.439994][ T8309] ? __pfx___x64_sys_openat+0x10/0x10 [ 281.440038][ T8309] do_syscall_64+0x106/0xf80 [ 281.440066][ T8309] ? clear_bhb_loop+0x40/0x90 [ 281.440098][ T8309] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 281.440124][ T8309] RIP: 0033:0x7ffb7ad9c799 [ 281.440143][ T8309] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 281.440166][ T8309] RSP: 002b:00007ffb7bb98028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 281.440189][ T8309] RAX: ffffffffffffffda RBX: 00007ffb7b015fa0 RCX: 00007ffb7ad9c799 [ 281.440205][ T8309] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 281.440220][ T8309] RBP: 00007ffb7ae32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 281.440235][ T8309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 281.440250][ T8309] R13: 00007ffb7b016038 R14: 00007ffb7b015fa0 R15: 00007ffe40574298 [ 281.440280][ T8309] [ 282.290122][ T8347] FAULT_INJECTION: forcing a failure. [ 282.290122][ T8347] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.389873][ T8347] CPU: 1 UID: 0 PID: 8347 Comm: syz.2.513 Not tainted syzkaller #0 PREEMPT(full) [ 282.389907][ T8347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 282.389922][ T8347] Call Trace: [ 282.389930][ T8347] [ 282.389939][ T8347] dump_stack_lvl+0x100/0x190 [ 282.389982][ T8347] should_fail_ex.cold+0x5/0xa [ 282.390018][ T8347] strncpy_from_user+0x3b/0x2d0 [ 282.390063][ T8347] do_getname+0x78/0x390 [ 282.390097][ T8347] do_sys_openat2+0xc5/0x1e0 [ 282.390129][ T8347] ? __pfx_do_sys_openat2+0x10/0x10 [ 282.390162][ T8347] ? apparmor_capable+0x1d7/0x4d0 [ 282.390206][ T8347] __x64_sys_openat+0x12d/0x210 [ 282.390239][ T8347] ? __pfx___x64_sys_openat+0x10/0x10 [ 282.390283][ T8347] do_syscall_64+0x106/0xf80 [ 282.390312][ T8347] ? clear_bhb_loop+0x40/0x90 [ 282.390342][ T8347] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.390367][ T8347] RIP: 0033:0x7f0da3b9c799 [ 282.390387][ T8347] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 282.390410][ T8347] RSP: 002b:00007f0da4ac8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 282.390433][ T8347] RAX: ffffffffffffffda RBX: 00007f0da3e15fa0 RCX: 00007f0da3b9c799 [ 282.390449][ T8347] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 282.390464][ T8347] RBP: 00007f0da3c32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 282.390479][ T8347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 282.390493][ T8347] R13: 00007f0da3e16038 R14: 00007f0da3e15fa0 R15: 00007ffd4d79cc88 [ 282.390526][ T8347] [ 283.074828][ T8355] FAULT_INJECTION: forcing a failure. [ 283.074828][ T8355] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 283.120536][ T8355] CPU: 1 UID: 0 PID: 8355 Comm: syz.3.514 Not tainted syzkaller #0 PREEMPT(full) [ 283.120571][ T8355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 283.120586][ T8355] Call Trace: [ 283.120594][ T8355] [ 283.120603][ T8355] dump_stack_lvl+0x100/0x190 [ 283.120646][ T8355] should_fail_ex.cold+0x5/0xa [ 283.120675][ T8355] strncpy_from_user+0x3b/0x2d0 [ 283.120719][ T8355] do_getname+0x78/0x390 [ 283.120752][ T8355] do_sys_openat2+0xc5/0x1e0 [ 283.120785][ T8355] ? __pfx_do_sys_openat2+0x10/0x10 [ 283.120818][ T8355] ? apparmor_capable+0x1d7/0x4d0 [ 283.120864][ T8355] __x64_sys_openat+0x12d/0x210 [ 283.120929][ T8355] ? __pfx___x64_sys_openat+0x10/0x10 [ 283.120974][ T8355] do_syscall_64+0x106/0xf80 [ 283.121003][ T8355] ? clear_bhb_loop+0x40/0x90 [ 283.121033][ T8355] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.121059][ T8355] RIP: 0033:0x7ffb7ad9c799 [ 283.121079][ T8355] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 283.121102][ T8355] RSP: 002b:00007ffb7bb98028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 283.121125][ T8355] RAX: ffffffffffffffda RBX: 00007ffb7b015fa0 RCX: 00007ffb7ad9c799 [ 283.121141][ T8355] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 283.121157][ T8355] RBP: 00007ffb7ae32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 283.121171][ T8355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 283.121192][ T8355] R13: 00007ffb7b016038 R14: 00007ffb7b015fa0 R15: 00007ffe40574298 [ 283.121228][ T8355] [ 284.060078][ T8405] FAULT_INJECTION: forcing a failure. [ 284.060078][ T8405] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 284.110703][ T8405] CPU: 1 UID: 0 PID: 8405 Comm: syz.3.517 Not tainted syzkaller #0 PREEMPT(full) [ 284.110752][ T8405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 284.110772][ T8405] Call Trace: [ 284.110783][ T8405] [ 284.110796][ T8405] dump_stack_lvl+0x100/0x190 [ 284.110863][ T8405] should_fail_ex.cold+0x5/0xa [ 284.110899][ T8405] strncpy_from_user+0x3b/0x2d0 [ 284.110952][ T8405] do_getname+0x78/0x390 [ 284.110993][ T8405] do_sys_openat2+0xc5/0x1e0 [ 284.111032][ T8405] ? __pfx_do_sys_openat2+0x10/0x10 [ 284.111072][ T8405] ? apparmor_capable+0x1d7/0x4d0 [ 284.111124][ T8405] __x64_sys_openat+0x12d/0x210 [ 284.111164][ T8405] ? __pfx___x64_sys_openat+0x10/0x10 [ 284.111216][ T8405] do_syscall_64+0x106/0xf80 [ 284.111255][ T8405] ? clear_bhb_loop+0x40/0x90 [ 284.111293][ T8405] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 284.111324][ T8405] RIP: 0033:0x7ffb7ad9c799 [ 284.111349][ T8405] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 284.111378][ T8405] RSP: 002b:00007ffb7bb98028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 284.111438][ T8405] RAX: ffffffffffffffda RBX: 00007ffb7b015fa0 RCX: 00007ffb7ad9c799 [ 284.111458][ T8405] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 284.111477][ T8405] RBP: 00007ffb7ae32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 284.111494][ T8405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 284.111512][ T8405] R13: 00007ffb7b016038 R14: 00007ffb7b015fa0 R15: 00007ffe40574298 [ 284.111551][ T8405] [ 287.939194][ T8508] FAULT_INJECTION: forcing a failure. [ 287.939194][ T8508] name failslab, interval 1, probability 0, space 0, times 0 [ 288.000659][ T8508] CPU: 0 UID: 0 PID: 8508 Comm: syz.2.533 Not tainted syzkaller #0 PREEMPT(full) [ 288.000691][ T8508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 288.000705][ T8508] Call Trace: [ 288.000712][ T8508] [ 288.000721][ T8508] dump_stack_lvl+0x100/0x190 [ 288.000761][ T8508] should_fail_ex.cold+0x5/0xa [ 288.000788][ T8508] should_failslab+0xc2/0x120 [ 288.000813][ T8508] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 288.000848][ T8508] ? security_file_alloc+0x34/0x2c0 [ 288.000878][ T8508] ? trace_kmem_cache_alloc+0xf3/0x120 [ 288.000907][ T8508] security_file_alloc+0x34/0x2c0 [ 288.000930][ T8508] init_file+0x95/0x480 [ 288.000957][ T8508] alloc_empty_file+0x73/0x1c0 [ 288.000986][ T8508] path_openat+0xe8/0x31a0 [ 288.001008][ T8508] ? kasan_save_stack+0x3f/0x50 [ 288.001043][ T8508] ? kasan_save_stack+0x30/0x50 [ 288.001077][ T8508] ? kasan_save_track+0x14/0x30 [ 288.001112][ T8508] ? __kasan_slab_alloc+0x89/0x90 [ 288.001149][ T8508] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 288.001183][ T8508] ? do_getname+0x35/0x390 [ 288.001210][ T8508] ? do_sys_openat2+0xc5/0x1e0 [ 288.001239][ T8508] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 288.001267][ T8508] ? __pfx_path_openat+0x10/0x10 [ 288.001301][ T8508] do_file_open+0x20e/0x430 [ 288.001326][ T8508] ? __pfx_do_file_open+0x10/0x10 [ 288.001371][ T8508] ? alloc_fd+0x476/0x790 [ 288.001396][ T8508] ? do_getname+0x191/0x390 [ 288.001427][ T8508] do_sys_openat2+0x10d/0x1e0 [ 288.001457][ T8508] ? __pfx_do_sys_openat2+0x10/0x10 [ 288.001498][ T8508] __x64_sys_openat+0x12d/0x210 [ 288.001530][ T8508] ? __pfx___x64_sys_openat+0x10/0x10 [ 288.001572][ T8508] do_syscall_64+0x106/0xf80 [ 288.001599][ T8508] ? clear_bhb_loop+0x40/0x90 [ 288.001632][ T8508] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 288.001656][ T8508] RIP: 0033:0x7f0da3b5cfce [ 288.001675][ T8508] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 288.001721][ T8508] RSP: 002b:00007f0da4ac7f98 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 288.001750][ T8508] RAX: ffffffffffffffda RBX: 00007f0da4ac86c0 RCX: 00007f0da3b5cfce [ 288.001770][ T8508] RDX: 0000000000000002 RSI: 00007f0da3c324e0 RDI: ffffffffffffff9c [ 288.001789][ T8508] RBP: 00007f0da3c32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 288.001807][ T8508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 288.001824][ T8508] R13: 00007f0da3e16038 R14: 00007f0da3e15fa0 R15: 00007ffd4d79cc88 [ 288.001867][ T8508] [ 288.259793][ T8530] workqueue: name exceeds WQ_NAME_LEN. Truncating to: !PjE r҄y*"l-y– [ 289.620316][ T8566] netlink: 342 bytes leftover after parsing attributes in process `syz.1.538'. [ 291.525770][ T8676] FAULT_INJECTION: forcing a failure. [ 291.525770][ T8676] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 291.572656][ T8676] CPU: 1 UID: 0 PID: 8676 Comm: syz.0.542 Not tainted syzkaller #0 PREEMPT(full) [ 291.572695][ T8676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 291.572712][ T8676] Call Trace: [ 291.572721][ T8676] [ 291.572731][ T8676] dump_stack_lvl+0x100/0x190 [ 291.572779][ T8676] should_fail_ex.cold+0x5/0xa [ 291.572812][ T8676] strncpy_from_user+0x3b/0x2d0 [ 291.572868][ T8676] do_getname+0x78/0x390 [ 291.572906][ T8676] do_sys_openat2+0xc5/0x1e0 [ 291.572942][ T8676] ? __pfx_do_sys_openat2+0x10/0x10 [ 291.572980][ T8676] ? apparmor_capable+0x1d7/0x4d0 [ 291.573029][ T8676] __x64_sys_openat+0x12d/0x210 [ 291.573066][ T8676] ? __pfx___x64_sys_openat+0x10/0x10 [ 291.573124][ T8676] do_syscall_64+0x106/0xf80 [ 291.573159][ T8676] ? clear_bhb_loop+0x40/0x90 [ 291.573193][ T8676] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 291.573222][ T8676] RIP: 0033:0x7f01d079c799 [ 291.573245][ T8676] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 291.573271][ T8676] RSP: 002b:00007f01d15a1028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 291.573297][ T8676] RAX: ffffffffffffffda RBX: 00007f01d0a15fa0 RCX: 00007f01d079c799 [ 291.573315][ T8676] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 291.573332][ T8676] RBP: 00007f01d0832bd9 R08: 0000000000000000 R09: 0000000000000000 [ 291.573349][ T8676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 291.573378][ T8676] R13: 00007f01d0a16038 R14: 00007f01d0a15fa0 R15: 00007ffd9ba46cf8 [ 291.573411][ T8676] [ 292.735684][ T8717] zswap: compressor not available [ 293.896567][ T5145] Bluetooth: hci3: unexpected subevent 0x01 length: 123 > 18 [ 294.267712][ T8784] FAULT_INJECTION: forcing a failure. [ 294.267712][ T8784] name failslab, interval 1, probability 0, space 0, times 0 [ 294.332496][ T8784] CPU: 1 UID: 0 PID: 8784 Comm: syz.2.550 Not tainted syzkaller #0 PREEMPT(full) [ 294.332538][ T8784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 294.332556][ T8784] Call Trace: [ 294.332566][ T8784] [ 294.332577][ T8784] dump_stack_lvl+0x100/0x190 [ 294.332628][ T8784] should_fail_ex.cold+0x5/0xa [ 294.332666][ T8784] should_failslab+0xc2/0x120 [ 294.332699][ T8784] kmem_cache_alloc_node_noprof+0x81/0x6f0 [ 294.332748][ T8784] ? zswap_store+0xc42/0x29d0 [ 294.332794][ T8784] zswap_store+0xc42/0x29d0 [ 294.332837][ T8784] ? __pfx___up_read+0x10/0x10 [ 294.332881][ T8784] ? rmap_walk_anon+0x561/0x870 [ 294.332925][ T8784] ? __pfx_zswap_store+0x10/0x10 [ 294.332962][ T8784] ? do_raw_spin_lock+0x128/0x260 [ 294.333008][ T8784] ? find_held_lock+0x2b/0x80 [ 294.333037][ T8784] ? folio_free_swap+0x3d9/0xb50 [ 294.333059][ T8784] ? folio_free_swap+0x3d9/0xb50 [ 294.333083][ T8784] ? do_raw_spin_unlock+0x145/0x1e0 [ 294.333119][ T8784] ? _raw_spin_unlock+0x28/0x50 [ 294.333142][ T8784] ? folio_free_swap+0x39/0xb50 [ 294.333164][ T8784] ? __pfx_try_to_unmap+0x10/0x10 [ 294.333199][ T8784] swap_writeout+0x49d/0x12b0 [ 294.333236][ T8784] shrink_folio_list+0x5c4a/0x6000 [ 294.333284][ T8784] ? __lock_acquire+0x4a5/0x2630 [ 294.333315][ T8784] ? __pfx_shrink_folio_list+0x10/0x10 [ 294.333357][ T8784] ? find_held_lock+0x2b/0x80 [ 294.333379][ T8784] ? unwind_next_frame+0x3be/0x1ea0 [ 294.333436][ T8784] ? update_se+0x94/0x760 [ 294.333467][ T8784] reclaim_folio_list+0xdc/0x600 [ 294.333497][ T8784] ? __schedule+0x2fd3/0x6120 [ 294.333524][ T8784] ? __pfx_reclaim_folio_list+0x10/0x10 [ 294.333567][ T8784] ? lru_gen_update_size+0x431/0xe40 [ 294.333603][ T8784] ? lru_gen_del_folio+0x382/0x5f0 [ 294.333635][ T8784] reclaim_pages+0x428/0x5e0 [ 294.333670][ T8784] ? __pfx_reclaim_pages+0x10/0x10 [ 294.333701][ T8784] ? find_held_lock+0x2b/0x80 [ 294.333722][ T8784] ? madvise_cold_or_pageout_pte_range+0xb49/0x2720 [ 294.333756][ T8784] madvise_cold_or_pageout_pte_range+0x1635/0x2720 [ 294.333799][ T8784] ? __pfx_madvise_cold_or_pageout_pte_range+0x10/0x10 [ 294.333835][ T8784] ? css_rstat_updated+0x1ce/0x5a0 [ 294.333862][ T8784] ? __pfx_madvise_cold_or_pageout_pte_range+0x10/0x10 [ 294.333892][ T8784] walk_pgd_range+0xc04/0x1eb0 [ 294.333946][ T8784] ? __pfx_walk_pgd_range+0x10/0x10 [ 294.333984][ T8784] ? folios_put_refs+0x66d/0x840 [ 294.334023][ T8784] __walk_page_range+0x163/0x820 [ 294.334072][ T8784] walk_page_range_vma_unsafe+0x209/0x8f0 [ 294.334114][ T8784] ? __pfx_walk_page_range_vma_unsafe+0x10/0x10 [ 294.334158][ T8784] ? find_held_lock+0x2b/0x80 [ 294.334179][ T8784] ? mlock_drain_local+0x254/0x4e0 [ 294.334212][ T8784] ? mlock_drain_local+0x254/0x4e0 [ 294.334251][ T8784] walk_page_range_vma+0x63/0x90 [ 294.334297][ T8784] madvise_pageout+0x259/0x540 [ 294.334322][ T8784] ? __pfx_madvise_pageout+0x10/0x10 [ 294.334363][ T8784] ? mtree_range_walk+0x6ce/0xcd0 [ 294.334388][ T8784] madvise_vma_behavior+0x3e6/0x3050 [ 294.334416][ T8784] ? mt_find+0x687/0x8e0 [ 294.334444][ T8784] ? mt_find+0x687/0x8e0 [ 294.334472][ T8784] ? __pfx_madvise_vma_behavior+0x10/0x10 [ 294.334503][ T8784] ? mt_find+0x45e/0x8e0 [ 294.334582][ T8784] ? __pfx_mt_find+0x10/0x10 [ 294.334621][ T8784] ? find_vma_prev+0xd8/0x150 [ 294.334643][ T8784] ? _kstrtoull+0x13c/0x1f0 [ 294.334678][ T8784] ? find_vma+0xbf/0x140 [ 294.334698][ T8784] ? __pfx_find_vma+0x10/0x10 [ 294.334726][ T8784] madvise_walk_vmas+0x2fe/0xa90 [ 294.334758][ T8784] ? __pfx_madvise_walk_vmas+0x10/0x10 [ 294.334795][ T8784] madvise_do_behavior+0x1ea/0x510 [ 294.334825][ T8784] ? __pfx_madvise_do_behavior+0x10/0x10 [ 294.334856][ T8784] ? down_read+0x13b/0x460 [ 294.334941][ T8784] do_madvise+0x195/0x240 [ 294.334976][ T8784] ? __pfx_do_madvise+0x10/0x10 [ 294.335011][ T8784] ? __mutex_unlock_slowpath+0x15c/0x790 [ 294.335079][ T8784] ? ksys_write+0x1ac/0x250 [ 294.335129][ T8784] ? __pfx_ksys_write+0x10/0x10 [ 294.335181][ T8784] __x64_sys_madvise+0xa9/0x110 [ 294.335207][ T8784] ? lockdep_hardirqs_on+0x78/0x100 [ 294.335235][ T8784] do_syscall_64+0x106/0xf80 [ 294.335287][ T8784] ? clear_bhb_loop+0x40/0x90 [ 294.335329][ T8784] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 294.335362][ T8784] RIP: 0033:0x7f0da3b9c799 [ 294.335382][ T8784] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 294.335405][ T8784] RSP: 002b:00007f0da4ac8028 EFLAGS: 00000246 ORIG_RAX: 000000000000001c [ 294.335427][ T8784] RAX: ffffffffffffffda RBX: 00007f0da3e15fa0 RCX: 00007f0da3b9c799 [ 294.335443][ T8784] RDX: 0000000000000015 RSI: ffffffffffff0001 RDI: 0000000000000000 [ 294.335458][ T8784] RBP: 00007f0da4ac8090 R08: 0000000000000000 R09: 0000000000000000 [ 294.335472][ T8784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 294.335486][ T8784] R13: 00007f0da3e16038 R14: 00007f0da3e15fa0 R15: 00007ffd4d79cc88 [ 294.335516][ T8784] [ 294.822814][ T8798] ubi0: attaching mtd0 [ 294.829577][ T8798] ubi0: scanning is finished [ 294.835837][ T8798] ubi0 error: ubi_read_volume_table: the layout volume was not found [ 295.671384][ T8798] ubi0 error: ubi_attach_mtd_dev: failed to attach mtd0, error -22 [ 298.324075][ T8915] netlink: 'syz.1.558': attribute type 2 has an invalid length. [ 299.183728][ T8939] netlink: 8 bytes leftover after parsing attributes in process `syz.3.563'. [ 300.135968][ T8957] netlink: 342 bytes leftover after parsing attributes in process `syz.2.565'. [ 301.691735][ T9016] nvme_fcloop: unknown parameter or missing value '7' [ 301.749999][ T9020] FAULT_INJECTION: forcing a failure. [ 301.749999][ T9020] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 301.778796][ T9020] CPU: 1 UID: 0 PID: 9020 Comm: syz.1.572 Not tainted syzkaller #0 PREEMPT(full) [ 301.778867][ T9020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 301.778888][ T9020] Call Trace: [ 301.778900][ T9020] [ 301.778911][ T9020] dump_stack_lvl+0x100/0x190 [ 301.778972][ T9020] should_fail_ex.cold+0x5/0xa [ 301.779016][ T9020] strncpy_from_user+0x3b/0x2d0 [ 301.779078][ T9020] do_getname+0x78/0x390 [ 301.779126][ T9020] do_sys_openat2+0xc5/0x1e0 [ 301.779172][ T9020] ? __pfx_do_sys_openat2+0x10/0x10 [ 301.779227][ T9020] ? apparmor_capable+0x1d7/0x4d0 [ 301.779288][ T9020] __x64_sys_openat+0x12d/0x210 [ 301.779333][ T9020] ? __pfx___x64_sys_openat+0x10/0x10 [ 301.779392][ T9020] do_syscall_64+0x106/0xf80 [ 301.779429][ T9020] ? clear_bhb_loop+0x40/0x90 [ 301.779470][ T9020] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 301.779506][ T9020] RIP: 0033:0x7f7cc359c799 [ 301.779535][ T9020] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 301.779568][ T9020] RSP: 002b:00007f7cc4416028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 301.779600][ T9020] RAX: ffffffffffffffda RBX: 00007f7cc3815fa0 RCX: 00007f7cc359c799 [ 301.779624][ T9020] RDX: 00000000000c2481 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 301.779645][ T9020] RBP: 00007f7cc3632bd9 R08: 0000000000000000 R09: 0000000000000000 [ 301.779665][ T9020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 301.779685][ T9020] R13: 00007f7cc3816038 R14: 00007f7cc3815fa0 R15: 00007fff33e19038 [ 301.779737][ T9020] [ 302.791222][ T9058] netlink: 342 bytes leftover after parsing attributes in process `syz.1.575'. [ 303.367874][ T9080] netlink: 342 bytes leftover after parsing attributes in process `syz.2.578'. [ 305.386982][ T9144] zswap: compressor not available [ 306.761092][ T9219] smpboot: CPU 1 is now offline [ 308.730160][ T9305] netlink: 8 bytes leftover after parsing attributes in process `syz.0.590'. [ 310.501381][ T9382] netlink: 146 bytes leftover after parsing attributes in process `syz.3.598'. [ 311.346231][ T9406] netlink: 28 bytes leftover after parsing attributes in process `syz.1.600'. [ 312.119485][ T9429] netlink: 28 bytes leftover after parsing attributes in process `syz.1.602'. [ 313.977558][ T9484] NFSD: Failed to start, no listeners configured. [ 314.777218][ T9510] binder: 9509:9510 ioctl c0046209 9 returned -22 [ 315.268098][ T9516] bond0: invalid ARP target specified [ 315.366161][ T9516] FAULT_INJECTION: forcing a failure. [ 315.366161][ T9516] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 315.406303][ T9516] CPU: 0 UID: 0 PID: 9516 Comm: syz.3.616 Not tainted syzkaller #0 PREEMPT(full) [ 315.406337][ T9516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 315.406353][ T9516] Call Trace: [ 315.406361][ T9516] [ 315.406370][ T9516] dump_stack_lvl+0x100/0x190 [ 315.406413][ T9516] should_fail_ex.cold+0x5/0xa [ 315.406443][ T9516] _copy_from_user+0x2e/0xd0 [ 315.406485][ T9516] copy_msghdr_from_user+0x9f/0x4f0 [ 315.406526][ T9516] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 315.406574][ T9516] ? __pfx_futex_wake_mark+0x10/0x10 [ 315.406618][ T9516] ___sys_sendmsg+0x106/0x1e0 [ 315.406658][ T9516] ? __pfx____sys_sendmsg+0x10/0x10 [ 315.406732][ T9516] __sys_sendmsg+0x170/0x220 [ 315.406762][ T9516] ? __pfx___sys_sendmsg+0x10/0x10 [ 315.406791][ T9516] ? __x64_sys_futex+0x34f/0x4d0 [ 315.406844][ T9516] do_syscall_64+0x106/0xf80 [ 315.406874][ T9516] ? clear_bhb_loop+0x40/0x90 [ 315.406904][ T9516] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 315.406930][ T9516] RIP: 0033:0x7ffb7ad9c799 [ 315.406958][ T9516] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 315.406982][ T9516] RSP: 002b:00007ffb7bb98028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 315.407006][ T9516] RAX: ffffffffffffffda RBX: 00007ffb7b015fa0 RCX: 00007ffb7ad9c799 [ 315.407023][ T9516] RDX: 0000000000000000 RSI: 0000200000000640 RDI: 0000000000000005 [ 315.407038][ T9516] RBP: 00007ffb7ae32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 315.407054][ T9516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 315.407069][ T9516] R13: 00007ffb7b016038 R14: 00007ffb7b015fa0 R15: 00007ffe40574298 [ 315.407100][ T9516] [ 316.191164][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.197602][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 317.657400][ T9597] input: jJǸ-9%vlQ J86 as /devices/virtual/input/input9 [ 318.448585][ T9624] FAULT_INJECTION: forcing a failure. [ 318.448585][ T9624] name fail_futex, interval 1, probability 0, space 0, times 0 [ 318.617427][ T9624] CPU: 0 UID: 0 PID: 9624 Comm: syz.0.632 Not tainted syzkaller #0 PREEMPT(full) [ 318.617460][ T9624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 318.617474][ T9624] Call Trace: [ 318.617486][ T9624] [ 318.617496][ T9624] dump_stack_lvl+0x100/0x190 [ 318.617537][ T9624] should_fail_ex.cold+0x5/0xa [ 318.617564][ T9624] get_futex_key+0x295/0x1620 [ 318.617597][ T9624] ? __pfx_get_futex_key+0x10/0x10 [ 318.617627][ T9624] ? kasan_save_track+0x14/0x30 [ 318.617664][ T9624] ? __kasan_kmalloc+0xaa/0xb0 [ 318.617704][ T9624] futex_lock_pi+0x1d3/0x7b0 [ 318.617743][ T9624] ? __pfx_futex_lock_pi+0x10/0x10 [ 318.617814][ T9624] ? __pfx_futex_wake_mark+0x10/0x10 [ 318.617855][ T9624] ? find_held_lock+0x2b/0x80 [ 318.617877][ T9624] ? ksys_write+0x190/0x250 [ 318.617914][ T9624] ? ksys_write+0x190/0x250 [ 318.617956][ T9624] do_futex+0x21f/0x350 [ 318.617987][ T9624] ? __pfx_do_futex+0x10/0x10 [ 318.618025][ T9624] __x64_sys_futex+0x34f/0x4d0 [ 318.618058][ T9624] ? fput+0x79/0x100 [ 318.618082][ T9624] ? __pfx___x64_sys_futex+0x10/0x10 [ 318.618111][ T9624] ? ksys_write+0x1ac/0x250 [ 318.618147][ T9624] ? __pfx_ksys_write+0x10/0x10 [ 318.618191][ T9624] do_syscall_64+0x106/0xf80 [ 318.618218][ T9624] ? clear_bhb_loop+0x40/0x90 [ 318.618247][ T9624] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 318.618270][ T9624] RIP: 0033:0x7f01d079c799 [ 318.618289][ T9624] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 318.618310][ T9624] RSP: 002b:00007f01d15a1028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 318.618332][ T9624] RAX: ffffffffffffffda RBX: 00007f01d0a15fa0 RCX: 00007f01d079c799 [ 318.618347][ T9624] RDX: 0000000000000005 RSI: 0000000000000008 RDI: 0000200000001d40 [ 318.618361][ T9624] RBP: 00007f01d15a1090 R08: 0000000000000000 R09: 0000000000000006 [ 318.618375][ T9624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.618389][ T9624] R13: 00007f01d0a16038 R14: 00007f01d0a15fa0 R15: 00007ffd9ba46cf8 [ 318.618418][ T9624] [ 322.591827][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 322.604672][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 322.617299][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 322.629718][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 322.642129][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 322.654564][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 322.666958][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 322.679456][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 322.691832][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 322.704219][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 327.601737][ C0] net_ratelimit: 14858 callbacks suppressed [ 327.601759][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 327.620331][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 327.633648][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 327.646219][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 327.658748][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 327.671345][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 327.683931][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 327.696572][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 327.709096][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 327.721647][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 328.747782][ C0] sched: DL replenish lagged too much [ 332.614175][ C0] net_ratelimit: 14894 callbacks suppressed [ 332.614199][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 332.632721][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 332.645296][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 332.657788][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 332.670243][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 332.682796][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 332.695213][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 332.707864][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 332.720494][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 332.732949][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 337.626576][ C0] net_ratelimit: 14852 callbacks suppressed [ 337.626599][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 337.645423][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 337.657874][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 337.670381][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 337.682924][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 337.695417][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 337.707853][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 337.720289][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 337.733049][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 337.745466][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 342.639257][ C0] net_ratelimit: 15041 callbacks suppressed [ 342.639279][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 342.657648][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 342.670004][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 342.682427][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 342.694811][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 342.707202][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 342.719545][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 342.731937][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 342.744310][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 342.756778][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 347.651697][ C0] net_ratelimit: 15577 callbacks suppressed [ 347.651720][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 347.670064][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 347.682501][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 347.694881][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 347.707252][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 347.719671][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 347.732104][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 347.744589][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 347.757097][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 347.769597][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 352.664092][ C0] net_ratelimit: 15529 callbacks suppressed [ 352.664116][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 352.682635][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 352.695175][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 352.707739][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 352.720296][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 352.732702][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 352.745064][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 352.757434][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 352.769853][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 352.782293][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 357.676782][ C0] net_ratelimit: 15789 callbacks suppressed [ 357.676805][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 357.695330][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 357.707920][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 357.720548][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 357.732995][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 357.745551][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 357.758000][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 357.770531][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 357.782945][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 357.795443][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 362.689358][ C0] net_ratelimit: 5961 callbacks suppressed [ 362.689381][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 362.708871][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 362.722179][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 362.736624][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 362.750344][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 362.763553][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 362.776772][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 362.790126][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 362.803588][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 362.816887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 367.702080][ C0] net_ratelimit: 4454 callbacks suppressed [ 367.702108][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 367.721305][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 367.734578][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 367.747859][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 367.761035][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 367.774377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 367.787589][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 367.800995][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 367.814517][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 367.827969][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 372.714049][ C0] net_ratelimit: 4474 callbacks suppressed [ 372.714070][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 372.733852][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 372.747054][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 372.760261][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 372.773545][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 372.786751][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 372.800038][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 372.813238][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 372.826588][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 372.839970][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 377.726779][ C0] net_ratelimit: 6246 callbacks suppressed [ 377.726800][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 377.745560][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.758483][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 377.771225][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.784171][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 377.796965][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.809818][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 377.822579][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.835411][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 377.848187][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.739334][ C0] net_ratelimit: 9154 callbacks suppressed [ 382.739356][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.757630][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.770432][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 382.783233][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.795623][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.807999][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.820760][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 382.833611][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.845968][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.858314][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.170884][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 387.751766][ C0] net_ratelimit: 9582 callbacks suppressed [ 387.751787][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.770094][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.782982][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 387.795984][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.808316][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.820686][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.833601][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 387.846474][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.858876][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.871436][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.764452][ C0] net_ratelimit: 9556 callbacks suppressed [ 392.764474][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 392.783168][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.795522][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.807911][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.821247][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 392.834171][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.846534][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.858977][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.872092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 392.884922][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.776688][ C0] net_ratelimit: 9553 callbacks suppressed [ 397.776710][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.795471][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 397.808467][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.820877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.833349][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.846206][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 397.858930][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.871224][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.883601][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.897414][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 402.789228][ C0] net_ratelimit: 9719 callbacks suppressed [ 402.789251][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 402.808321][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.820694][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.833124][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.846157][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 402.858975][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.871343][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.883690][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.896503][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 402.909255][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.801878][ C0] net_ratelimit: 9679 callbacks suppressed [ 407.801900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.820139][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.832515][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.845483][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 407.858282][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.870688][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.883121][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.895897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 407.908902][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.921359][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.814719][ C0] net_ratelimit: 9397 callbacks suppressed [ 412.814740][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 412.833604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.846072][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.858415][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.871201][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 412.884183][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.896527][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.908970][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.921722][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 412.934520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.826808][ C0] net_ratelimit: 9634 callbacks suppressed [ 417.826829][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 417.845635][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.858140][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.870566][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.883623][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 417.896376][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.908720][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.921256][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.934116][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 417.946864][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.839451][ C0] net_ratelimit: 9547 callbacks suppressed [ 422.839474][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.857718][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.870252][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.883165][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 422.896076][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.908483][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.920914][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.934002][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 422.946873][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.959298][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.851998][ C0] net_ratelimit: 9694 callbacks suppressed [ 427.852019][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 427.870456][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.882935][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.895834][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 427.908631][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 427.920958][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.933311][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.946151][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 427.959070][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 427.972032][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.864453][ C0] net_ratelimit: 9674 callbacks suppressed [ 432.864475][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.882767][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.895139][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.907994][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 432.920981][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.933509][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.945919][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.958720][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 432.971547][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.983867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 435.075185][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 435.082190][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5829/1:b..l [ 435.090513][ C0] rcu: (detected by 0, t=10502 jiffies, g=41805, q=584 ncpus=1) [ 435.098352][ C0] task:syz-executor state:R running task stack:22712 pid:5829 tgid:5829 ppid:5821 task_flags:0x400140 flags:0x00080001 [ 435.112487][ C0] Call Trace: [ 435.115786][ C0] [ 435.118731][ C0] __schedule+0xfee/0x6120 [ 435.123183][ C0] ? lock_acquire+0x1cf/0x380 [ 435.127888][ C0] ? __pfx___schedule+0x10/0x10 [ 435.133018][ C0] ? mark_held_locks+0x40/0x70 [ 435.137810][ C0] preempt_schedule_irq+0x50/0x90 [ 435.142850][ C0] irqentry_exit+0x17b/0x670 [ 435.147481][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 435.153502][ C0] RIP: 0010:lock_acquire+0x5e/0x380 [ 435.158729][ C0] Code: 05 bb e9 28 12 83 f8 07 0f 87 f0 00 00 00 48 0f a3 05 86 59 f5 0e 0f 82 c2 02 00 00 8b 35 4e 8d f5 0e 85 f6 0f 85 dd 00 00 00 <48> 8b 44 24 30 65 48 2b 05 5d e9 28 12 0f 85 02 03 00 00 48 83 c4 [ 435.178529][ C0] RSP: 0018:ffffc900039672b8 EFLAGS: 00000206 [ 435.184615][ C0] RAX: 0000000000000046 RBX: 0000000000000000 RCX: 0000000000000001 [ 435.192599][ C0] RDX: 0000000000000000 RSI: ffffffff8de55850 RDI: ffffffff8c1af520 [ 435.200584][ C0] RBP: ffffffff8e7e9220 R08: 00000000fbee2bab R09: 0000000000000007 [ 435.208566][ C0] R10: 0000000000000200 R11: 0000000000000000 R12: 0000000000000002 [ 435.216662][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 435.224679][ C0] ? unwind_next_frame+0x3be/0x1ea0 [ 435.229907][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 435.236099][ C0] is_module_text_address+0x33/0x220 [ 435.241404][ C0] ? is_module_text_address+0x1f/0x220 [ 435.246883][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 435.253061][ C0] kernel_text_address+0x81/0x100 [ 435.258117][ C0] __kernel_text_address+0xd/0x30 [ 435.263183][ C0] unwind_get_return_address+0x59/0xa0 [ 435.268660][ C0] arch_stack_walk+0xa6/0xf0 [ 435.273274][ C0] stack_trace_save+0x8e/0xc0 [ 435.277964][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 435.283352][ C0] ? __lock_acquire+0x4a5/0x2630 [ 435.288315][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 435.294135][ C0] ? lockdep_hardirqs_on+0x78/0x100 [ 435.299349][ C0] save_stack+0x162/0x1e0 [ 435.303708][ C0] ? __pfx_save_stack+0x10/0x10 [ 435.308584][ C0] ? free_unref_folios+0xaea/0x1790 [ 435.313823][ C0] ? folios_put_refs+0x53c/0x840 [ 435.318783][ C0] ? shmem_undo_range+0x5e5/0x1570 [ 435.323914][ C0] ? shmem_evict_inode+0x39e/0xbd0 [ 435.329048][ C0] ? evict+0x3c2/0xad0 [ 435.333138][ C0] ? iput.part.0+0x605/0xf50 [ 435.337743][ C0] ? iput+0x35/0x40 [ 435.341568][ C0] ? filename_unlinkat+0x466/0x730 [ 435.346693][ C0] ? __x64_sys_unlink+0x46/0x70 [ 435.351556][ C0] ? do_syscall_64+0x106/0xf80 [ 435.356338][ C0] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 435.362424][ C0] ? page_ext_put+0x3e/0xd0 [ 435.366966][ C0] __reset_page_owner+0x84/0x190 [ 435.371941][ C0] free_unref_folios+0xaea/0x1790 [ 435.377093][ C0] ? mark_held_locks+0x40/0x70 [ 435.381879][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 435.387706][ C0] folios_put_refs+0x53c/0x840 [ 435.392596][ C0] ? __pfx_folios_put_refs+0x10/0x10 [ 435.397914][ C0] ? folio_batch_remove_exceptionals+0x115/0x1a0 [ 435.404386][ C0] shmem_undo_range+0x5e5/0x1570 [ 435.409372][ C0] ? __pfx_shmem_undo_range+0x10/0x10 [ 435.414843][ C0] ? unwind_get_return_address+0x59/0xa0 [ 435.420516][ C0] ? arch_stack_walk+0xa6/0xf0 [ 435.425332][ C0] ? kasan_save_stack+0x3f/0x50 [ 435.430212][ C0] ? kasan_save_stack+0x30/0x50 [ 435.435087][ C0] ? kasan_record_aux_stack+0xa7/0xc0 [ 435.440478][ C0] ? __call_rcu_common.constprop.0+0xa5/0x9b0 [ 435.446566][ C0] ? dentry_free+0xc2/0x170 [ 435.451085][ C0] ? __dentry_kill+0x49a/0x600 [ 435.455872][ C0] ? dput.part.0+0x456/0x570 [ 435.460573][ C0] shmem_evict_inode+0x39e/0xbd0 [ 435.465593][ C0] ? inode_wait_for_writeback+0x171/0x390 [ 435.471381][ C0] ? __pfx_shmem_evict_inode+0x10/0x10 [ 435.476877][ C0] ? __pfx_inode_wait_for_writeback+0x10/0x10 [ 435.482980][ C0] ? find_held_lock+0x2b/0x80 [ 435.487678][ C0] ? evict+0x37e/0xad0 [ 435.491787][ C0] ? evict+0x37e/0xad0 [ 435.495889][ C0] ? __pfx_shmem_evict_inode+0x10/0x10 [ 435.501393][ C0] evict+0x3c2/0xad0 [ 435.505399][ C0] ? __pfx_evict+0x10/0x10 [ 435.509893][ C0] ? iput.part.0+0x5fd/0xf50 [ 435.514506][ C0] iput.part.0+0x605/0xf50 [ 435.518961][ C0] ? __pfx_inode_just_drop+0x10/0x10 [ 435.524301][ C0] iput+0x35/0x40 [ 435.527973][ C0] filename_unlinkat+0x466/0x730 [ 435.532961][ C0] ? __pfx_filename_unlinkat+0x10/0x10 [ 435.538551][ C0] ? do_getname+0x191/0x390 [ 435.543089][ C0] __x64_sys_unlink+0x46/0x70 [ 435.547814][ C0] do_syscall_64+0x106/0xf80 [ 435.552459][ C0] ? clear_bhb_loop+0x40/0x90 [ 435.557169][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 435.563176][ C0] RIP: 0033:0x7f0da3b9b887 [ 435.567617][ C0] RSP: 002b:00007ffd4d79bef8 EFLAGS: 00000206 ORIG_RAX: 0000000000000057 [ 435.576140][ C0] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0da3b9b887 [ 435.584248][ C0] RDX: 00007ffd4d79bf20 RSI: 00007ffd4d79bfb0 RDI: 00007ffd4d79bfb0 [ 435.592253][ C0] RBP: 00007ffd4d79bfb0 R08: 00007ffd4d79cfb0 R09: 00000000ffffffff [ 435.600245][ C0] R10: 0000000000000100 R11: 0000000000000206 R12: 00007ffd4d79d040 [ 435.608226][ C0] R13: 00007f0da3c31f90 R14: 000000000004d9df R15: 00007ffd4d79d080 [ 435.616404][ C0] [ 435.619455][ C0] rcu: rcu_preempt kthread starved for 349 jiffies! g41805 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 435.630582][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 435.640602][ C0] rcu: RCU grace-period kthread stack dump: [ 435.646501][ C0] task:rcu_preempt state:R running task stack:28688 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 [ 435.660129][ C0] Call Trace: [ 435.663417][ C0] [ 435.666361][ C0] __schedule+0xfee/0x6120 [ 435.670834][ C0] ? __lock_acquire+0x4a5/0x2630 [ 435.675812][ C0] ? __pfx___schedule+0x10/0x10 [ 435.680685][ C0] ? find_held_lock+0x2b/0x80 [ 435.685374][ C0] ? schedule+0x2bf/0x390 [ 435.689745][ C0] schedule+0xdd/0x390 [ 435.693860][ C0] schedule_timeout+0x127/0x280 [ 435.698742][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 435.704171][ C0] ? __pfx_process_timeout+0x10/0x10 [ 435.709489][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 435.715332][ C0] ? prepare_to_swait_event+0xdf/0x4a0 [ 435.720837][ C0] rcu_gp_fqs_loop+0x1a9/0x900 [ 435.725625][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 435.730953][ C0] ? __pfx_rcu_gp_init+0x10/0x10 [ 435.735912][ C0] ? __pfx_rcu_gp_cleanup+0x10/0x10 [ 435.741127][ C0] ? rcu_is_watching+0x12/0xc0 [ 435.745923][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 435.752447][ C0] rcu_gp_kthread+0x179/0x230 [ 435.757156][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 435.762373][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 435.768205][ C0] ? __kthread_parkme+0x18c/0x230 [ 435.773252][ C0] ? kthread+0x13a/0x450 [ 435.777517][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 435.782773][ C0] kthread+0x370/0x450 [ 435.786862][ C0] ? __pfx_kthread+0x10/0x10 [ 435.791476][ C0] ret_from_fork+0x754/0xd80 [ 435.796090][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 435.801238][ C0] ? __switch_to+0x7b4/0x1120 [ 435.805933][ C0] ? __pfx_kthread+0x10/0x10 [ 435.810546][ C0] ret_from_fork_asm+0x1a/0x30 [ 435.815396][ C0] [ 435.818426][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 435.824778][ C0] CPU: 0 UID: 0 PID: 3409 Comm: kworker/R-bat_e Not tainted syzkaller #0 PREEMPT(full) [ 435.834547][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 435.844675][ C0] Workqueue: bat_events batadv_dat_purge [ 435.850361][ C0] RIP: 0010:unwind_next_frame+0xe55/0x1ea0 [ 435.856206][ C0] Code: 85 ee 0d 00 00 49 89 6d 40 48 b8 00 00 00 00 00 fc ff df 4c 89 ea 48 c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e d3 0d 00 00 <41> 39 5d 00 0f 84 cd 06 00 00 bd 01 00 00 00 e9 3a f5 ff ff ba a8 [ 435.875856][ C0] RSP: 0018:ffffc90000006cf0 EFLAGS: 00000246 [ 435.881949][ C0] RAX: 0000000000000000 RBX: 0000000000000002 RCX: ffffffff91781d5c [ 435.889932][ C0] RDX: 1ffff92000000db6 RSI: ffffc90000006d80 RDI: ffffc90000006df0 [ 435.897923][ C0] RBP: ffffc90000006e40 R08: 0000000000000001 R09: 0000000000000007 [ 435.905912][ C0] R10: 0000000000000200 R11: 000000000000b7cb R12: ffffc90000006e00 [ 435.913997][ C0] R13: ffffc90000006db0 R14: ffffc90000006db0 R15: ffffc90000006de4 [ 435.922018][ C0] FS: 0000000000000000(0000) GS:ffff88812434c000(0000) knlGS:0000000000000000 [ 435.930973][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 435.937665][ C0] CR2: 00007f937b8ff5a0 CR3: 000000007acf0000 CR4: 00000000003526f0 [ 435.945651][ C0] Call Trace: [ 435.948949][ C0] [ 435.951868][ C0] ? __unwind_start+0x2fb/0x7f0 [ 435.956759][ C0] __unwind_start+0x3d1/0x7f0 [ 435.961477][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 435.967667][ C0] arch_stack_walk+0x73/0xf0 [ 435.972295][ C0] ? arch_stack_walk+0x73/0xf0 [ 435.977090][ C0] ? kfree_skbmem+0x19a/0x210 [ 435.981801][ C0] stack_trace_save+0x8e/0xc0 [ 435.986597][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 435.992002][ C0] ? __lock_acquire+0x4a5/0x2630 [ 435.996984][ C0] ? fdb_notify+0xfb/0x190 [ 436.001526][ C0] ? br_fdb_update+0x324/0x720 [ 436.006326][ C0] ? br_handle_frame_finish+0xc75/0x1f00 [ 436.012000][ C0] kasan_save_stack+0x30/0x50 [ 436.016775][ C0] kasan_save_track+0x14/0x30 [ 436.021482][ C0] kasan_save_free_info+0x3b/0x70 [ 436.026529][ C0] __kasan_slab_free+0x5f/0x80 [ 436.031327][ C0] kmem_cache_free+0x124/0x6a0 [ 436.036229][ C0] ? skb_release_data+0x7a0/0x9d0 [ 436.041275][ C0] kfree_skbmem+0x19a/0x210 [ 436.045811][ C0] consume_skb+0xd1/0x110 [ 436.050169][ C0] netlink_broadcast_filtered+0x3cc/0xf50 [ 436.055926][ C0] ? __pfx_netlink_broadcast_filtered+0x10/0x10 [ 436.062193][ C0] ? __pfx_fdb_fill_info+0x10/0x10 [ 436.067327][ C0] ? __alloc_skb+0x4e9/0x710 [ 436.071932][ C0] ? __alloc_skb+0x5b7/0x710 [ 436.076549][ C0] nlmsg_notify+0xb1/0x290 [ 436.080990][ C0] fdb_notify+0xfb/0x190 [ 436.085265][ C0] br_fdb_update+0x324/0x720 [ 436.089913][ C0] ? __pfx_br_fdb_update+0x10/0x10 [ 436.095067][ C0] br_handle_frame_finish+0xc75/0x1f00 [ 436.100554][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 436.106648][ C0] ? __local_bh_enable_ip+0x9e/0x120 [ 436.112011][ C0] ? ip6t_do_table+0xc1d/0x1c90 [ 436.116899][ C0] ? __pfx_ip6t_do_table+0x10/0x10 [ 436.122053][ C0] ? nf_hook_slow+0x167/0x220 [ 436.126756][ C0] br_nf_hook_thresh+0x30d/0x420 [ 436.131829][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 436.137745][ C0] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 436.143221][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 436.149136][ C0] ? __pfx_nf_nat_ipv6_in+0x10/0x10 [ 436.154351][ C0] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 436.160274][ C0] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 436.166297][ C0] br_nf_pre_routing_finish_ipv6+0x769/0xfb0 [ 436.172317][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 436.178237][ C0] br_nf_pre_routing_ipv6+0x39c/0x8b0 [ 436.183632][ C0] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 436.189543][ C0] ? lock_acquire+0x1cf/0x380 [ 436.194248][ C0] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 436.200774][ C0] ? net_generic+0xea/0x2a0 [ 436.205298][ C0] br_nf_pre_routing+0x93b/0x1510 [ 436.210352][ C0] br_handle_frame+0xcdd/0x1520 [ 436.215232][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 436.220543][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 436.226465][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 436.231781][ C0] __netif_receive_skb_core.constprop.0+0x6c5/0x3550 [ 436.238496][ C0] ? mark_held_locks+0x40/0x70 [ 436.243292][ C0] ? kmem_cache_free+0x124/0x6a0 [ 436.248253][ C0] ? skb_release_data+0x7a0/0x9d0 [ 436.253298][ C0] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 436.260456][ C0] ? kfree_skbmem+0x19f/0x210 [ 436.265176][ C0] ? sk_skb_reason_drop+0x114/0x1b0 [ 436.270396][ C0] ? ip6_mc_input+0x51a/0xf50 [ 436.275108][ C0] ? __pfx_ip6_mc_input+0x10/0x10 [ 436.280183][ C0] ? __lock_acquire+0x4a5/0x2630 [ 436.285152][ C0] ? process_backlog+0x32a/0x1580 [ 436.290190][ C0] __netif_receive_skb_one_core+0xb0/0x1e0 [ 436.296029][ C0] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 436.302476][ C0] ? lock_acquire+0x1cf/0x380 [ 436.307200][ C0] ? process_backlog+0x32a/0x1580 [ 436.312248][ C0] ? process_backlog+0x32a/0x1580 [ 436.317282][ C0] __netif_receive_skb+0x1f/0x120 [ 436.322342][ C0] process_backlog+0x37a/0x1580 [ 436.327302][ C0] __napi_poll.constprop.0+0xaf/0x450 [ 436.332707][ C0] net_rx_action+0xa40/0xf20 [ 436.337335][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 436.342462][ C0] ? mark_held_locks+0x40/0x70 [ 436.347289][ C0] ? lockdep_hardirqs_on+0x78/0x100 [ 436.352528][ C0] ? tmigr_handle_remote+0x132/0x380 [ 436.357851][ C0] ? run_timer_base+0x121/0x190 [ 436.362721][ C0] ? __pfx_run_timer_base+0x10/0x10 [ 436.367953][ C0] handle_softirqs+0x1eb/0x9e0 [ 436.372741][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 436.378056][ C0] ? __batadv_dat_purge.part.0+0x294/0x3c0 [ 436.383904][ C0] ? __pfx_batadv_dat_to_purge+0x10/0x10 [ 436.389567][ C0] do_softirq+0xac/0xe0 [ 436.393749][ C0] [ 436.396705][ C0] [ 436.399642][ C0] __local_bh_enable_ip+0xf8/0x120 [ 436.404794][ C0] __batadv_dat_purge.part.0+0x294/0x3c0 [ 436.410467][ C0] batadv_dat_purge+0x4b/0xa0 [ 436.415180][ C0] process_one_work+0x9d7/0x1920 [ 436.420159][ C0] ? __pfx_process_one_work+0x10/0x10 [ 436.425585][ C0] ? __pfx_batadv_dat_purge+0x10/0x10 [ 436.431046][ C0] rescuer_thread+0x902/0x1490 [ 436.435866][ C0] ? rescuer_thread+0x23d/0x1490 [ 436.440835][ C0] ? rescuer_thread+0x118/0x1490 [ 436.446376][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 436.451648][ C0] ? __kthread_parkme+0x18c/0x230 [ 436.456699][ C0] ? kthread+0x13a/0x450 [ 436.460972][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 436.466230][ C0] kthread+0x370/0x450 [ 436.470329][ C0] ? __pfx_kthread+0x10/0x10 [ 436.474967][ C0] ret_from_fork+0x754/0xd80 [ 436.479609][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 436.484994][ C0] ? __switch_to+0x7b4/0x1120 [ 436.489705][ C0] ? __pfx_kthread+0x10/0x10 [ 436.494417][ C0] ret_from_fork_asm+0x1a/0x30 [ 436.499225][ C0] [ 437.876646][ C0] net_ratelimit: 6550 callbacks suppressed [ 437.876668][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 437.895082][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.907651][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.920646][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 437.933546][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 437.945877][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.958248][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.971033][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 437.983906][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 437.996206][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.889412][ C0] net_ratelimit: 8882 callbacks suppressed [ 442.889434][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 442.907683][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.920063][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.932976][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 442.945772][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 442.958160][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.971726][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 442.984638][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:5a:28:f6:d5:8a:65, vlan:0) [ 442.997494][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 443.009900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)