last executing test programs: 5.985243493s ago: executing program 3 (id=3182): close_range$auto(0x0, 0xffffffffffffffff, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) open_tree_attr$auto(0xffffffffffffff9c, 0x0, 0x9, 0x0, 0x0) fsconfig$auto_FSCONFIG_CMD_CREATE(r0, 0x6, &(0x7f0000000000)='#{\xe7-.\x00', &(0x7f0000000100)="38344debe6a3489e1387a0a2ba92c2b952ab86db9c62ca7fe9af3ad788908d53efee23fc15e5acb062cbf17177e021d9b4f1f3d92a74f79f44763d945cff2d23b8e50d10ffc4e775b28204caa6182d486e83b7c69a374701faf9368f3a004a72f567320ceece221d3c7b0c8ea0a95692f63a356b3bb3d26b99161d2ebeb4b09e716932b1ab6156a8e25f8ce02a1c28e9474d3a1a157992be548bc9152fcafb4d607993c07a0efd4e963e637a7dfaeb4551cfbe2611ae2789eb7f3bb574c0e9d5f5df9087399e7f7d815b828f04e185de922ff2793fd8c0b6eb26cebca18cec65819bb513c2620777", 0x9) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x14be02, 0x0) unshare$auto(0x40000080) mmap$auto(0x0, 0x2020009, 0xffffffffffffffff, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) madvise$auto(0x0, 0x2003f2, 0x15) syz_genetlink_get_family_id$auto_ovs_meter(&(0x7f0000003040), 0xffffffffffffffff) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/net/sit0/ifindex\x00', 0x80000, 0x0) read$auto(r1, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x202, 0x0) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x2) mmap$auto(0x0, 0x8000, 0x3, 0xeb1, 0xfffffffffffffffa, 0x10000000008000) socket(0xa, 0x1, 0x84) 5.079892922s ago: executing program 3 (id=3185): openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptyxb\x00', 0x400a83, 0x0) socket(0x10, 0x3, 0x6) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket(0x21, 0x2, 0xa) sendmsg$auto_NBD_CMD_CONNECT(r1, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0}, 0x48041) sendmmsg$auto(0x6, &(0x7f0000000400)={{0x0, 0x3, &(0x7f00000002c0)={0x0, 0x8}, 0x1, &(0x7f0000000300), 0x10, 0x8000000}, 0xed7138c}, 0x6, 0x0) r2 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snd/controlC1\x00', 0x103240, 0x0) socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x2, r2, 0x2) socket(0x10, 0x2, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_SMC_NETLINK_GET_DEV_SMCD(r0, &(0x7f0000004380)={0x0, 0x0, &(0x7f0000004340)={&(0x7f0000000140)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x810) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), r3) read$auto(r3, &(0x7f0000000000)='\x00', 0x91e2) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0xc) socket(0x1d, 0x3, 0x2) mmap$auto(0x4, 0x20005, 0xe0, 0x10011, 0x40000000000a5, 0x8002) openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000300)='/sys/fs/ocfs2/cluster_stack\x00', 0x88282, 0x0) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/disk\x00', 0xda25b84c77eeb07c, 0x0) mmap$auto(0x0, 0x420009, 0xdf, 0xeb1, 0x401, 0x8000) prctl$auto(0x1003b, 0x5aa, 0x4, 0x5, 0x800) getpgrp(0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv6/conf/veth1_macvtap/ioam6_id_wide\x00', 0x169002, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x28, 0x800, 0x3) 4.171377245s ago: executing program 3 (id=3193): socket(0x2, 0x3, 0xa) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x9, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) socket(0x11, 0x3, 0x2) getpeername$auto(0x3, 0x0, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x62, 0x0) mmap$auto(0x0, 0xe983, 0x6, 0xeb1, 0xffffffffffffffff, 0x8000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x20401, 0x0) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_nbd(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$auto_NBD_CMD_RECONFIGURE(r2, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000c2849fb45e01bdd0572a6540e480de70d07f31a4dfc930a71b492523ab7865367851fbfe91b5d84b7c62202b422057206ede83d4666feb69d5ba1fc0d6a301a7a0b364c6f66c7e23b3ac5abec66cb26c8d98a84a90e7d2a3ddc28e8d0f8e58101a906bcc34730196f43d33f6166e7c1c5653816663d5e9c24acd258372f5d2aa5ab9754ddf622b473d4ec040641056e87cbc", @ANYRES16=r3, @ANYBLOB="010029bd7000ffdbdf2503000000080001003c8b0000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x90) r4 = ioctl$auto_KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$auto_KVM_GET_MSRS(r4, 0x4068aea3, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) timer_create$auto(0x803, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) epoll_ctl$auto_EPOLL_CTL_DEL(r1, 0x2, r0, &(0x7f0000000040)={0x6, 0x7}) openat$auto_tracing_saved_tgids_fops_trace(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/tracing/saved_tgids\x00', 0x109100, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttynull\x00', 0x201, 0x0) open(&(0x7f0000001bc0)='./file0\x00', 0x4142, 0x1) r5 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptyz7\x00', 0x48f41, 0x0) ioctl$auto(0x3, 0x402c542d, r5) write$auto(0x3, 0x0, 0xfffffdef) 3.801446462s ago: executing program 1 (id=3195): mmap$auto(0x0, 0x420009, 0xfff, 0xeb1, 0x401, 0x7ffd) r0 = bpf$auto(0x0, &(0x7f00000001c0)=@task_fd_query={0x19, 0x4, 0x4, 0x880b, 0x8, 0xd, 0x66b, 0x4, 0x7ff}, 0x6f4) r2 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x14fa02, 0x0) mmap$auto(0x0, 0x810004, 0x400000000ffb, 0x8000000008011, 0x3, 0x8000) sendmsg$auto_NL80211_CMD_GET_STATION(0xffffffffffffffff, 0x0, 0x8000) socket(0xa, 0x1, 0xfffffeff) r3 = openat$auto_stats_fops_(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r4 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS2\x00', 0x101e81, 0x0) ioctl$auto_SNDCTL_TMR_CONTINUE(r4, 0x5404, &(0x7f0000000180)="697d37cbf26e92f636") pread64$auto(r3, 0x0, 0x2, 0x3) r5 = openat$auto_raw_fops_raw_gadget(0xffffffffffffff9c, &(0x7f0000000000), 0x123000, 0x0) ioctl$auto_USB_RAW_IOCTL_EVENT_FETCH(r5, 0x80085502, &(0x7f00000001c0)=ANY=[@ANYBLOB="100000000010008d"]) prctl$auto(0x3e, 0x4a, r1, 0x6, 0x80000001) write$auto(0xffffffffffffffff, &(0x7f0000000340)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\x97U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x181500, 0x0) sched_setattr$auto(r1, 0x0, 0x3) msync$auto(0x1ffff000, 0x180000000000000, 0x400000004) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) fanotify_mark$auto(0xffffffffffffffff, 0x9, 0x1000000009, r0, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x408) sendfile$auto(r2, 0x3, 0x0, 0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = open(&(0x7f0000000000)='./cgroup.cpu/cgroup.procs\x00', 0x2000, 0xb5d1af1605322c72) open_by_handle_at$auto(r7, &(0x7f0000000080)={0x8, 0x100fe, "9700000000000000"}, 0x2) sendmsg$auto_IPVS_CMD_GET_DAEMON(r6, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x804}, 0x40000) writev$auto(0xffffffffffffffff, 0x0, 0x8) socket$nl_generic(0x10, 0x3, 0x10) socket(0x1e, 0x2, 0x0) 3.425519072s ago: executing program 2 (id=3196): openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/net/nfsfs/volumes\x00', 0x4a141, 0x0) mmap$auto(0x0, 0x2000d, 0x7, 0xeb1, 0xffffffffffffffff, 0x10008000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_macsec(&(0x7f0000000900), r0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000980)={'virt_wifi0\x00', 0x0}) sendmsg$auto_MACSEC_CMD_UPD_OFFLOAD(r0, &(0x7f0000002200)={0x0, 0x0, &(0x7f00000021c0)={&(0x7f0000000480)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010027bd7000fddbdf250a00000008000100", @ANYRES32=r2, @ANYBLOB="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"], 0x20}, 0x1, 0x0, 0x0, 0x20000001}, 0x40840) r3 = openat$auto_ppp_device_fops_ppp_generic(0xffffffffffffff9c, &(0x7f0000000080), 0x80080, 0x0) ioctl$auto_PPPIOCSMRU(r3, 0xc004743e, 0x0) mmap$auto(0xffffffffffffff00, 0x4020008, 0x4, 0xeb1, 0xffffffffffffffff, 0x8000) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/midiC2D3\x00', 0x200a41, 0x0) r4 = bpf$auto(0x8000000, 0x0, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(0xffffffffffffffff, &(0x7f00000002c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1d\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"P\x8a\xbbY8@Z5`\xa2\x9aSVd\x1d\xac\xe8\x90e\x9d\x03tm\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7.\xbe\x01\x98\xd7l\x00\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfa\xf0\xd9\xc0K\x8b\xa3c\x00'/160, 0x7) write$auto(0xffffffffffffffff, 0x0, 0x98c7) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x2000d, 0x4, 0xeb1, 0xffffffffffffffff, 0x6000000000) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x4c2080, 0x0) r5 = openat$auto_rng_chrdev_ops_core(0xffffffffffffff9c, &(0x7f0000000000), 0x10600, 0x0) readv$auto(r5, &(0x7f0000001140)={&(0x7f0000001080), 0x3}, 0x2) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x3, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) mmap$auto(0x0, 0x8, 0x2, 0xeb1, 0x401, 0x8000) ioctl$auto(0x4000000000000c8, 0x800454cf, 0x3) r6 = openat$auto_vmuser_fops_vmci_host(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) sendmsg$auto_ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYRES64=r2, @ANYRES16=r0, @ANYRESDEC=r2, @ANYRES16=0x0], 0xd4}, 0x1, 0x0, 0x0, 0x20004010}, 0x24048880) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=ANY=[@ANYBLOB="db931779", @ANYRESDEC=0x0, @ANYRESOCT=r7], 0x14}}, 0x44840) r8 = socket(0x10, 0x2, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="12"], 0x1ac}}, 0x40000) ioctl$auto_IOCTL_VMCI_INIT_CONTEXT(r6, 0x7a0, 0x6) sysfs$auto(0x1, 0x1, 0xfffffffffffffff7) 3.045997655s ago: executing program 0 (id=3197): openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x202, 0x0) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) lseek$auto(0x3, 0x7fffffffffffffff, 0x1) 3.039092849s ago: executing program 1 (id=3198): mmap$auto(0x0, 0x2020009, 0x7, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/oom_adj\x00', 0x48402, 0x0) read$auto(r0, 0x0, 0x9a28) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r1, &(0x7f0000000200)={0x0, 0x7}, 0x3) flock$auto(r1, 0xa) write$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffffff, 0x0, 0x0) openat$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffff9c, &(0x7f0000000000), 0x1e3800, 0x0) (fail_nth: 8) 3.035244378s ago: executing program 2 (id=3199): openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) io_uring_setup$auto(0x59, &(0x7f0000000080)={0x7ffffffc, 0x8, 0x3000, 0x6, 0x7, 0x400b, 0xffffffffffffffff, [], {0x6, 0x6, 0x8c48, 0x29a, 0x9, 0x80, 0x104, 0x6, 0x4}, {0x100, 0x1, 0x101, 0x85, 0x2, 0x24, 0xfe000000, 0x8, 0x3}}) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/mm/ksm/advisor_min_pages_to_scan\x00', 0x88282, 0x0) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) setresuid$auto(0xffffffffffffffff, 0x0, 0x0) write$auto(0xffffffffffffffff, 0x0, 0x100000a3d9) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x0, 0x5, 0x5) madvise$auto(0x0, 0x2003f2, 0x15) socket(0x2, 0x1, 0x106) listen$auto(0x3, 0x83) select$auto(0x7, 0x0, &(0x7f0000000100)={[0x9, 0x5, 0x0, 0xfffffffffffffff6, 0x7, 0xfffffffffffdffff, 0xdffffffffffffff8, 0x2, 0x0, 0x10000005e58296f, 0x1e, 0x7, 0x3, 0x200, 0x1, 0x9]}, 0x0, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x4000000000009b72, 0x2, 0x8000) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000200), 0x880, 0x0) openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, 0x0, 0x201, 0x0) mbind$auto(0x0, 0x2091d2, 0x4, 0x0, 0x6, 0x2) socket$nl_generic(0x10, 0x3, 0x10) exit$auto(0x2) select$auto(0xe, 0x0, 0x0, &(0x7f0000000580)={[0x1ff, 0x8000, 0xd, 0x1, 0x200948d, 0x3, 0x10015f4da0a, 0xd, 0x7, 0x6, 0x8000001f, 0x8, 0x6d3e, 0xc, 0x2, 0x2]}, 0x0) 2.876461766s ago: executing program 0 (id=3200): r0 = openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000000), 0x118080, 0x0) ioctl$auto(r0, 0x6f3e, 0x38) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/mm/ksm/stable_node_chains_prune_millisecs\x00', 0x82942, 0x0) r1 = socket(0xa, 0x80803, 0x6) bind$auto(r1, &(0x7f0000000040)=@generic={0xa, "2c551d000000fe8000"}, 0x66) openat$auto_severities_coverage_fops_severity(0xffffffffffffff9c, 0x0, 0x15bb42, 0x0) mmap$auto(0x0, 0x400005, 0xdf, 0x9b72, 0x2, 0x8000) openat$auto__ctl_fops_dm_ioctl(0xffffffffffffff9c, &(0x7f0000000180), 0xd4000, 0x0) listmount$auto(&(0x7f0000000100)={0x20, @raw, 0xffffffffffffffff}, 0x0, 0x5, 0x1) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) unshare$auto(0x40000080) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) r2 = openat$auto_vhci_fops_hci_vhci(0xffffffffffffff9c, &(0x7f0000000d00), 0x0, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$auto_PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x7, 0x4) read$auto_vhci_fops_hci_vhci(r2, &(0x7f0000000d40)=""/16, 0x10) select$auto(0xe, 0x0, 0x0, &(0x7f0000000580)={[0x1ff, 0x8000, 0xd, 0x1, 0x200948d, 0x3, 0x10015f4da0a, 0xd, 0x7, 0x6, 0x8000001f, 0x8, 0x6d3e, 0x2, 0x2, 0x2]}, 0x0) mmap$auto(0x0, 0x2020009, 0xffffffffffffffff, 0xeb1, 0xfffffffffffffffa, 0x2) r4 = socket(0x11, 0x80003, 0x303) setsockopt$auto(r4, 0x107, 0x5, 0x0, 0x24) mmap$auto(0x0, 0x2020009, 0x8000000000000003, 0x40000000000eb1, 0xffffffffffffffff, 0x8000) madvise$auto(0x0, 0xffffffffffff0001, 0x15) syz_genetlink_get_family_id$auto_hsr(0x0, 0xffffffffffffffff) socket(0xa, 0x5, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snd/controlC0\x00', 0x802, 0x0) setsockopt$auto(0x3, 0x10000000084, 0x7c, 0x0, 0x8) mmap$auto(0x0, 0x2000c, 0xdf, 0x20eb1, 0x40000000000a5, 0x8000) select$auto(0x8, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0x7}) 2.397641454s ago: executing program 1 (id=3201): mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) write$auto(0xffffffffffffffff, &(0x7f0000000200)='/X\xf3\x04\xa6\xf3\xb6\xb1/,\xc1g\xd6\x9a{.6\xa4\x00\x19$\xf5\xea\x1e\x1d~\xbd\xfa\x98\xf9\xcc\xae\xe5\xa1\x01\xec\x96\x170\x83k%\xdb\xc4\xaf\xb0Ro6\xd2}Q\n\xa3\x9fak\xea\xab\xd1v\x93\xca\xfe\xa9\x15%V\xc0H\xf7\xa0hx\x81t\x1c\nH\x17\x81\x85\xf7\x86\xb7\x8dS5\xb7\x06\x9eJ\xb1\xbd\x96\x00\x00\x00\x00\x00', 0x40000000004) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0xe) r0 = io_uring_setup$auto(0x1d48, &(0x7f0000000340)={0x7fffffff, 0x10, 0x2, 0x6, 0x7, 0x8, 0xffffffffffffffff, [], {0x5, 0x88, 0x1, 0x80000000, 0x10000100, 0x83, 0x101, 0x6, 0x8000000000000001}, {0x100, 0x1, 0x10100052, 0x7, 0x11, 0x101, 0x876c5, 0xc9, 0x3}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_nfsd(0x0, 0xffffffffffffffff) sendmsg$auto_NFSD_CMD_THREADS_SET(r2, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x4000) io_uring_register$auto(r0, 0x18, 0x0, 0x9) r3 = openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$auto_VHOST_SET_OWNER(r3, 0xaf01, 0x5) ioctl$auto(r3, 0x4008af04, 0x0) timer_create$auto(0x0, 0x0, 0x0) r4 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r4, 0x0, 0x0) getsockopt$auto_SO_RCVTIMEO_NEW(r4, 0x8, 0x42, 0x0, 0x0) mmap$auto(0x0, 0x2020006, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_ETHTOOL_MSG_MM_GET(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="4b146644c513257ec651d290dd32d6a9b20be3d9708df3b1a0bba3752c59f58903e55c4496db2c1b7ee67db0f7d6c7ea0b734402c67ede224b1d92cec01549"], 0x14}, 0x1, 0x0, 0x0, 0x44808}, 0x2004c894) unshare$auto(0x40000080) openat$auto_sw_sync_debugfs_fops_sync_debug(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$auto_transaction_log_fops_(r1, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) acct$auto(&(0x7f0000000100)='./cgroup/cgroup.subtree_control\x00') acct$auto(0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$auto(0xffffffffffffffff, 0x4004550c, 0xffffffffffffffff) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r6 = socket(0x2, 0x2, 0x1) connect$auto(r6, &(0x7f00000000c0)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x36}}, 0x55) 2.051235945s ago: executing program 2 (id=3202): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x8000) set_mempolicy_home_node$auto(0x0, 0x2010001, 0x0, 0x0) io_uring_setup$auto(0x6, 0x0) openat$auto_tk_debug_sleep_time_fops_(0xffffffffffffff9c, &(0x7f0000000000), 0x434000, 0x0) openat$auto_null_fops_mem(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat$auto_ext4_dir_operations_ext4(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/bluetooth/hci1/hci1:201\x00', 0x48381, 0x0) r1 = openat$auto_bm_status_operations_binfmt_misc(0xffffffffffffff9c, &(0x7f00000000c0), 0x210000, 0x0) close_range$auto(r0, r1, 0x1100) r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS0\x00', 0x0, 0x0) ioctl$auto(r2, 0x545c, 0xffffffffffffffff) 1.786872605s ago: executing program 2 (id=3204): mmap$auto(0x0, 0xe1f, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) sendmsg$auto_OVS_VPORT_CMD_NEW(0xffffffffffffffff, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x34, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@OVS_VPORT_ATTR_OPTIONS={0x4}, @OVS_VPORT_ATTR_NAME={0x6, 0x3, '*\x00'}, @OVS_VPORT_ATTR_UPCALL_PID={0x4}, @OVS_VPORT_ATTR_TYPE={0x8, 0x2, 0x2}, @OVS_VPORT_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040010}, 0x800) r0 = openat$auto_ppp_device_fops_ppp_generic(0xffffffffffffff9c, &(0x7f0000000340), 0x80080, 0x0) ioctl$auto_PPPIOCSMRU(r0, 0xc004743e, 0x0) (async) ioctl$auto_PPPIOCSPASS(r0, 0x40107447, &(0x7f00000000c0)={0x9, &(0x7f0000000000)={0x30, 0xff, 0x0, @raw=0xfffff020}}) r1 = socket(0xa, 0x1, 0x84) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'nr0\x00', 0x0}) bpf$auto_BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)=@bpf_attr_3={0x9, 0x6, 0x3, 0x5, 0xf, 0x9, 0x40, 0x0, 0x6, "47f15717388a2c1ecfc66f2365397742", r2, 0x6, r0, 0x5, 0x6, 0xfffffffe, 0x1000, 0xfff, 0x4, 0xfffffffe, @attach_prog_fd=r0, 0x0, 0x9, 0x304, 0x8001, 0x1, r1, r0}, 0x7fff) mknod$auto(&(0x7f0000000180)=':,\x00', 0xcb, 0xfffffffa) (async) execve$auto(&(0x7f0000000000)=':,\x00', 0x0, 0x0) (async) listen$auto(0x3, 0x81) socket(0x2b, 0x1, 0x0) (async) sysfs$auto(0x2, 0xd, 0x0) (async) r3 = fsopen$auto(0x0, 0x1) fsconfig$auto(r3, 0x8, 0x0, 0x0, 0x0) (async) fsmount$auto(0x4, 0x0, 0x200003) 1.706967166s ago: executing program 3 (id=3205): openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty12\x00', 0x4000, 0x0) r1 = socket(0x10, 0x3, 0x6) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket(0x21, 0x2, 0xa) sendmsg$auto_NBD_CMD_CONNECT(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40080}, 0x20040000) sendmmsg$auto(r1, &(0x7f0000000400)={{0x0, 0x5, &(0x7f00000002c0)={0x0, 0x8}, 0x1, &(0x7f0000000300), 0x10, 0x8000000}, 0xed7138c}, 0x6, 0x0) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/controlC1\x00', 0x40000, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x2, r0, 0x2) socket(0x10, 0x2, 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_SMC_NETLINK_GET_DEV_SMCD(r4, &(0x7f0000004380)={0x0, 0x0, &(0x7f0000004340)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="f0080000000000000044f76b", @ANYRES8=r3], 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x810) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), 0xffffffffffffffff) read$auto(r4, &(0x7f0000000000)='\x00', 0x91e2) r5 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/neigh/virt_wifi0/interval_probe_time_ms\x00', 0x382, 0x0) sendfile$auto(r5, r5, 0x0, 0x1ff) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0xc) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000300)='/sys/fs/ocfs2/cluster_stack\x00', 0x88282, 0x0) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/disk\x00', 0xda25b84c77eeb07c, 0x0) socket(0x22, 0x3, 0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv6/conf/veth1_macvtap/ioam6_id_wide\x00', 0x169002, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x2, 0xc) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000100)=ANY=[], 0x18}, 0x1, 0x0, 0x0, 0x60008004}, 0x4048001) 1.640020277s ago: executing program 0 (id=3206): r0 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000200)='/proc/kcore\x00', 0x28000, 0x0) pread64$auto(r0, 0x0, 0x800003, 0x270) r1 = openat$auto_debugfs_full_proxy_file_operations_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/ieee80211/phy0/netdev:wlan0/active_links\x00', 0x0, 0x0) mmap$auto(0x0, 0x1, 0x18e, 0x8000000000000011, 0xffffffffffffffff, 0x9) r2 = socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) syz_genetlink_get_family_id$auto_tipcv2(0x0, r2) r3 = prctl$auto(0x1, 0x6, 0x0, 0xb117, 0x9) sendmsg$auto_TIPC_NL_BEARER_ADD(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4048804}, 0x4000) ioctl$auto_PAGEMAP_SCAN(0xffffffffffffffff, 0xc0606610, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x25, 0x5, 0x2) r4 = socket(0x848000000015, 0x5, 0x0) bind$auto(0x3, &(0x7f0000000240)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x23}}, 0x6b) connect$auto(r3, &(0x7f0000000080)=@in={0x2, 0x4e21, @loopback}, 0x55) sendmsg$auto_NL80211_CMD_GET_MPATH(r4, &(0x7f0000000d80)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x20004000}, 0x100000) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, 0x0, 0x103880, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x7) close_range$auto(0x2, 0x8, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x0) r5 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS2\x00', 0x101e81, 0x0) ioctl$auto_TIOCSTI2(r5, 0x545c, 0x0) ioctl$auto_TIOCVHANGUP2(r5, 0x5437, 0x0) read$auto_debugfs_full_proxy_file_operations_internal(r1, 0x0, 0x0) 1.26964439s ago: executing program 2 (id=3207): close_range$auto(0x0, 0xffffffffffffffff, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) open_tree_attr$auto(0xffffffffffffff9c, 0x0, 0x9, 0x0, 0x0) fsconfig$auto_FSCONFIG_CMD_CREATE(r0, 0x6, &(0x7f0000000000)='#{\xe7-.\x00', &(0x7f0000000100)="38344debe6a3489e1387a0a2ba92c2b952ab86db9c62ca7fe9af3ad788908d53efee23fc15e5acb062cbf17177e021d9b4f1f3d92a74f79f44763d945cff2d23b8e50d10ffc4e775b28204caa6182d486e83b7c69a374701faf9368f3a004a72f567320ceece221d3c7b0c8ea0a95692f63a356b3bb3d26b99161d2ebeb4b09e716932b1ab6156a8e25f8ce02a1c28e9474d3a1a157992be548bc9152fcafb4d607993c07a0efd4e963e637a7dfaeb4551cfbe2611ae2789eb7f3bb574c0e9d5f5df9087399e7f7d815b828f04e185de922ff2793fd8c0b6eb26cebca18cec65819bb513c2620777", 0x9) mmap$auto(0x0, 0x2020009, 0xffffffffffffffff, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) madvise$auto(0x0, 0x2003f2, 0x15) syz_genetlink_get_family_id$auto_ovs_meter(&(0x7f0000003040), 0xffffffffffffffff) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/net/sit0/ifindex\x00', 0x80000, 0x0) read$auto(r1, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x202, 0x0) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x2) mmap$auto(0x0, 0x8000, 0x3, 0xeb1, 0xfffffffffffffffa, 0x10000000008000) socket(0xa, 0x1, 0x84) 936.075589ms ago: executing program 2 (id=3208): mmap$auto(0x0, 0x420009, 0xfff, 0xeb1, 0x401, 0x7ffd) r0 = bpf$auto(0x0, &(0x7f00000001c0)=@task_fd_query={0x19, 0x4, 0x4, 0x880b, 0x8, 0xd, 0x66b, 0x4, 0x7ff}, 0x6f4) r2 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x14fa02, 0x0) mmap$auto(0x0, 0x810004, 0x400000000ffb, 0x8000000008011, 0x3, 0x8000) sendmsg$auto_NL80211_CMD_GET_STATION(0xffffffffffffffff, 0x0, 0x8000) socket(0xa, 0x1, 0xfffffeff) r3 = openat$auto_stats_fops_(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r4 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS2\x00', 0x101e81, 0x0) ioctl$auto_SNDCTL_TMR_CONTINUE(r4, 0x5404, &(0x7f0000000180)="697d37cbf26e92f636") pread64$auto(r3, 0x0, 0x2, 0x3) r5 = openat$auto_raw_fops_raw_gadget(0xffffffffffffff9c, &(0x7f0000000000), 0x123000, 0x0) ioctl$auto_USB_RAW_IOCTL_EVENT_FETCH(r5, 0x80085502, &(0x7f00000001c0)=ANY=[@ANYBLOB="100000000010008d"]) prctl$auto(0x3e, 0x4a, r1, 0x6, 0x80000001) write$auto(0xffffffffffffffff, &(0x7f0000000340)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\x97U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x181500, 0x0) sched_setattr$auto(r1, 0x0, 0x3) msync$auto(0x1ffff000, 0x180000000000000, 0x400000004) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) fanotify_mark$auto(0xffffffffffffffff, 0x9, 0x1000000009, r0, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x408) sendfile$auto(r2, 0x3, 0x0, 0x4) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = open(&(0x7f0000000000)='./cgroup.cpu/cgroup.procs\x00', 0x2000, 0xb5d1af1605322c72) open_by_handle_at$auto(r7, &(0x7f0000000080)={0x8, 0x100fe, "9700000000000000"}, 0x2) sendmsg$auto_IPVS_CMD_GET_DAEMON(r6, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x804}, 0x40000) writev$auto(0xffffffffffffffff, 0x0, 0x8) socket$nl_generic(0x10, 0x3, 0x10) socket(0x1e, 0x2, 0x0) 935.461344ms ago: executing program 1 (id=3216): openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty12\x00', 0x800, 0x0) r0 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/controlC1\x00', 0x40000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x2, r0, 0x0) r2 = socket(0x10, 0x2, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_SMC_NETLINK_GET_DEV_SMCD(r3, &(0x7f0000004380)={0x0, 0x0, &(0x7f0000004340)={&(0x7f0000004300)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB='\v'], 0x14}, 0x1, 0x0, 0x0, 0x8010}, 0x810) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), r3) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0xc) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000300)='/sys/fs/ocfs2/cluster_stack\x00', 0x88282, 0x0) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/disk\x00', 0xda25b84c77eeb07c, 0x0) socket$nl_generic(0x10, 0x3, 0x10) fanotify_init$auto(0x65, 0x2) socket(0x22, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x10, 0x2, 0xc) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="180000", @ANYRES8=r4, @ANYRES8=r1], 0x18}, 0x1, 0x0, 0x0, 0x60008004}, 0x4000050) write$auto(r2, &(0x7f0000000000)='-\x00', 0xfdef) 884.823867ms ago: executing program 1 (id=3209): openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x202, 0x0) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) lseek$auto(0x3, 0x7fffffffffffffff, 0x1) 854.881185ms ago: executing program 1 (id=3210): openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/net/nfsfs/volumes\x00', 0x4a141, 0x0) mmap$auto(0x0, 0x2000d, 0x7, 0xeb1, 0xffffffffffffffff, 0x10008000) r0 = openat$auto_ppp_device_fops_ppp_generic(0xffffffffffffff9c, &(0x7f0000000080), 0x80080, 0x0) ioctl$auto_PPPIOCSMRU(r0, 0xc004743e, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/midiC2D3\x00', 0x200a41, 0x0) bpf$auto(0x8000000, 0x0, 0x0) r1 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(0xffffffffffffffff, &(0x7f00000002c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1d\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"P\x8a\xbbY8@Z5`\xa2\x9aSVd\x1d\xac\xe8\x90e\x9d\x03tm\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7.\xbe\x01\x98\xd7l\x00\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfa\xf0\xd9\xc0K\x8b\xa3c\x00'/160, 0xa9) write$auto(0xffffffffffffffff, 0x0, 0x98c7) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x3, 0x7) sysinfo$auto(0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x2000d, 0x4, 0xeb1, 0xffffffffffffffff, 0x6000000000) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x4c2080, 0x0) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x3, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) mmap$auto(0x0, 0x8, 0x2, 0xeb1, 0x401, 0x8000) ioctl$auto(0x4000000000000c8, 0x800454cf, r0) ioctl$auto_IOCTL_VMCI_VERSION2(0xffffffffffffffff, 0x7a7, 0x0) sendmsg$auto_ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000016c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="d4000000", @ANYRES8=r1, @ANYBLOB="100027bd7000fbdbdf2518000000200001800247eea41fac000014000200766574683100000000000000000000000800070063fbffff0500060001000000840002803d00488013b37090badc49d6dc93876646d25a4d297d01cd3b7da38d12889cc50d505f35", @ANYRES64, @ANYBLOB="0400b3800000003d003b800400a4800c009a00008000000000000004008680c16ab1b1b39dcaa14b6af7dcc011b43cf706e562811c62b28a702b72e0a87126700294f2350000000c"], 0xd4}, 0x1, 0x0, 0x0, 0x20000010}, 0x20008000) r3 = socket(0x2, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000004c0)=ANY=[@ANYRESDEC=r3, @ANYRES32=r2, @ANYBLOB="4985107396baf992f0833f4f2057099888249f55629998bcf6fdd9242df8563f79cb7cf09fd4b1f191d33019e0ab10c2db23bb2321eab98926bbae2cb581bd24d27a7df751b3cc9ddd9dbfacd84441031f0a637cd2e628e445b443661432ea0746427f171db64becb00a0da60a1ef1acd0d04c33c311028fccafca83ef03e0c58ea2eb7385dbb377b8bd433fdc3cb1dfad9114480e23a62608c9493ecd73539c737a3c9d6b498d6c933f2fb419ff2e7d4b220693af89b6732accbed0788ae80a589e53e37ebdee6d79a9584a307f382a2c30f50626e5b7acc0880da32ed93732e48c18e13957479173ded84899e74601a0abf763c4e59897b47e12fe446c34aaa254dbbb7c31c0395db5e5e01da1586220fab7f98c8663e0bca164219a551f7a4804bf33a9542265d87ab7afca9e4a4ab724534a44946619c6dff261eaa42c189e2b4bac1b8bfde14a6a6e00f3dc50cafc97fecbf3e38e9393d67ab2cf98f5e628dbda278feead938fb9228ce04a9cf7d6eace7e60fa6e0f4d9eec837188e4c259f0a6ba85c57690bb8d14556e452dd5c1d292810216458ab0179e76d55061b1d008036635a3d288546b49896b8e934e68276cd6f81ea3da8375cc6e3a3e3e437f89edf9029cf4ed14bc02f58a9c9c419731bf1c543f678abf3a563e1783dfb1a3cfcf5ea1a4396b52626d3b980e42e2a279eb5b4f1535d1e200da9e51d769ee8dabdc7861682bccf387a60d08651bef498f46ecbe346dc7b9b0eb864fcddcd95c6fe76acdf521daff93588a854d926227263b1a84a6c4e27ec22a4a04fa76d9df418fa2b1a3cb942610cbce52959ef7152646da34d4d663fd16e6e8f55bc59a4f0d0a9485ed767f16d2259b0ad8307d0ac8313cc027aaa39169de5084368915c253db6e5211ec00e27db8cd2e814ac0e51413c8a53e4f9d4c6abacad62c6aff503ecae435cfb4232870c376ba165380bb3484d54d5d88183d97d25ebc5695d990e83e8a8c440a53e4901bd68d2cea0e13ccbdb00a042cc09dde3ff2f96b622be382a544f708b620470379327ac9638c42b818dd8147ca41349ba03aafecaab55cdf1656a5dc81c81111b4f49e8054b510943f8b0117dc5598b2581f98f16f738e9c72c4a9ada2e67111fb1c0587f7090a51750e5084a2e2630d368764bd7f76ef40087572cc3838c0560bc4324afb1785d7a45388493a8013380e0f3a873f414cf0e2c20bf40d3419e3f604894ebde5940706971be9cd32207af4c0f029537982c9fcda91e38c831d4818a9efce80413a169d2002b92ab2dfd4dea3715a9ae9eb30c02f54a2209908ba6bada627f667974e09bdc7c46347f9a223930faffc7c5c955b13c3faf118d25f23b2a8584d6bc45f669e84fa5458f2d1138d5e72ee43feba8642768195e74db234ae38264123fd7604a75b3d926738e6794f83dc7a3394451f4d8154d01eac7e250bc8423a13dcc9b50f7548b7043dde80ef32dcc3d43efd8e4128f505f0129ba7e3bc353206a54db9c70411376121c84f12a0e4389bd9d9b017b289eff444d049cf95a6a021f0da9b578aa79e1a389bf55c9b9b3889c2614f06bcb4162e07b9451774557789d092dca0f778bcc7e4056945d1652819557c71d38d3cc4cdc579057a0d838c7a9fbee4818055c50a4548931da365a86082cab94fc4ce4d51c2aaa331381052af0f320bf5032a061eafeea261086bc14675a1e38faa3d43791a1f3d2d6c3f2d07458dd21c3b6e9d8281b0b0a8e8326e10bfa0cdb9b070fb36d5aa9f420fa932d45812832b80c51ee152087c0adaa3269261c85a39770f60bad8fb5c3466d75c3667181a6cab096d0db67edde1615d1ccbfc1b5341547f9b9c9559b40d1b1debd7a0fbad994654b5a3cf528ea14e1e6016894a92b0cfbb327f649bfacadc03717b54f1b6315f7ccb2490e50bf8bb3f5bfc00073141340c70b02ced8f93dcf051491e01ed511e990aafe060d9de08e4c906264257864d995f2ed9e0216fcdc96f326bcb8ac2582f1e27dafc0069378dfa7bbaa833564db98d8661510cc5679f7d2e38261e4199fe4e6089d1baddb978529fa0f1f417e9115e2001a6f32cafc551554d7c39fe79787064f40fdf2e57bfb8afd0416864ffc7f1bbcb9a599f766973a9275dc0d072db22da0bb44d119da9931e051941d7cea15e269bbdb52332d00bbde16b8622fdda575a5dfb8f6be46353b9ccc32cde669d223f6cda308639afc9e12a63bad83ca8d88e6ea9e6137f0a60ea92273e231adb3c03550401c7c890415e8c8df2edee61236a66deea7ea6563605c0733f38862f9b77a3b5f1d43af55338c6b616a689ec10ad8eaddcc270a0c59047ac431546248a1d4b884396133bea6f53df095c9885fb81f628f3c1540665480b1be23c4b482463f723cb950fd7afea565600befeecd3c62257ada861a0284090872ddaf6af2d561acfe82f33300122317d92ec90a6d843256becc592d7dfa6d2bf50c63a3d4536ddf989edb1e33a586db5c2e9b9c5d237035fb7fd051fcaf573e0ac849ec02ce585aee68622ef59a250100e4502d5bf0e153d1ebd8ef316805fc4fb3160405371799a29fbab116a99479ee0674c0320a3f01d8219b8a8c08981f81d6a4937dfae380debf6bdb2deb9fd1553bee938bc8e0bd10fdb6aee22a326e7c669fc4e5cfb65c2125055038c9e1edbe0eb42f33c51f68197533257c04f531af76a262589a60743baf8df5c77668bf545896afcc7596fd92992b4745173b9e590d917ca05601cf1f3cfc5c581b939c24d41b9166db448021b87d56ad4aff1879734ca6e9c00b3b2ea8a98b3ea46417dd84c73005f0eb7f4adf013fd3627658903e086f0d5b22347dab98e010a4b725c81a9f659642032de62c07aab5ff500a10c0fa2464c34880f251f9c824d021c91214683ed21b6b6408c9ffe748efa944528f85661f5c0b4086ace83e04864fc98c274a9d1a5488059c980bb64c13bdaaf02e02f3ebeec3d6bbcf9832c51e7e641c98f466b12ea62861e88a050d0e3d23eed2260475f584bc1f441ac75ac030fac0ac34353a879f7f52ef6b4a9bc58624bb946886432a92b2707d002fc38ebb20df33413feb3f84fee563a0240460a8dc9195f65a6001d5e71a1f222f6d2de00acd37e3a3a346b3e076f9925fbca422d79fad371548e116a39d6567c29a29b66082e2121db1c2aad90745b2a5d4331f385931f70fe1eaa97fa8ac12cfd6c8a066fe59c668271cbda16092ec0f44916665499cdf11abc5b43fe7471982996b54c00600afc760c6e8b36b787bfc5c2de8a4a6b18f6b0443c859f6fc0cfff96c0772631b89f2fa41a2ba1cdfca663871b234d5efdb1ef0782420a467a63f6bc2ff09c99bca50275c24bf547c1184d22c4c793c5685073519799480c4078faf321f4e183f0f71f5674966a7f8334c3f60bc70add6a0497c5221420f1d9071e4204f742b2064aa90723c6ae41c078c385b9e4d0783c6bf2adec053ae414ede0f94420e188029822350bef6d4c0be0459af9c5c615cfcc56369a2e5158c59db29ae91d0d643dc6ada68492018d09ad3d79f6b55d735547aa81236d688853b7a2c0ce27380ffe1c38588e84c18d3f367d7026709648fc666be28ebccee6cef441ad83d8b39653e35fcf055e5f854adc6dd9883de4352a799876c02076c0503aaa0b045b6296df1955bffb30339082bd0627fb497b07b8a874e1c862065b5cfdb0aef978a5f6555615103961a5cac026c2ecbdd0fdac3b03f236fdd17114e344664f3f55e9d94955722908d726e70bb407f487661cd9da51ece00a7d003802647d27f3a38a7e873ca9df457bdda1ac3dc9591cb4fa22e2450995456d83a7c4ecc9aa6cfbad5fbfa87ddd0f7324c38464bdc4cc820d03e84af77a80cde4aef9818c48a9a6cf8a582375d02d8f5c480c6e590bfc34d753eda1f957d2ac99d29005e6292b04a8918654fba2d011c4a28a93feac5198409874a41c56b6ff26b3b036085b71d2431483379ad721952c670bcabf83dafcd38608a87270393f35b502737f083f906c06570695c2235195d1ebae7ddcff8aef8207dd370056f5bbf5bc7f2a902e6a2e186d3a1a3fbcdf6b351b5046c6144e1272e76f13715338d51763eabd7838be3107a8b10f60c23389f9d4a90744d989c101d0fa99aeafa747e6b70a4ac76cae98d5780af6070bab4bfcde66eb984b4002872f77432c224fc15805a3faf84ab94db7c7e4bacbe13bb545c0110f8e72ffc115b032f915765880643c7e57deb9ad06fefa08a06c10eb4c68e2bc779710b4833a8ef0e897e44e81364f2ab15e033ee7de9e96a91d1e80ed5a4b538a9f0dfc7ce5fd7801e8a80bf6d8906b8d42cc3321433196da2845234b3193f5d0022138e713e1d96d350673eef105be64a8a1e760104db54ef6023bcc3ee340ec75bd9d03c14d0188b9308bd9e8898d724c033799ed9e3f35c5851783fa2b3af05000c4b22b7ed91da8fc8ac53a295dfeca9fc8e56556473f19cfb2bd1ff3d0c445b51df35c814128d08139f4d9337eb40ca03c20a11b25b994dfe337c9a4bd324611e8b5507eedebbf6a1206a8fa8e14e510f13657de45877d8dc71a827fc88fb7c9476689baba1bb89c524f998a26614ee45cd90a6b225c01ed9c3f8b194373df45d687e14fe7e8abea11234fcc5fe46a3b9a320b7638cf2e12c1ef2e741984ce12fe60c923a72bee8aa127b14615fef69bbb5b3b8d7b55105bcccf7a3d4e2f59c5da36098e29115bf52ad145b3203e7aa8f0c3403757a99bc563bbfa605fc961dd783b4db2470d20a29c0d5c4349691879662f8a1648a459cbf42e647b873ac4e544d00d92ba96ebc4abca33303496622244d9356319b13f3d28f2d104e9e1d8c6734fed0dc8b778580568c09272d803d522234a6216034c21160bdf88b15bb49690bf277f52260f8a9bd8f449ce4e60b14000238b982ca89ed64722f94155293322631ec7f2b6dab562de7e6c3c40c875fa4f0f3bca1bdeec264b2442926b3bd8a55ea90405d10ba93483f796640adf8eddab00eb45eff457360d01b5b8f730aa3e226282b964f17ed41af4d16e11cf875fb528addd720c2a40e7e8c355a371f65cd00c6e8690cc68db310bf8942de907ccd831122e9522464192b3012ab74f2e2c2a51301fef8ee946990b2511bdcda0c456d9e35b642ba190f658b0cee97614f64b2c0317314d65c1ccbecf09ca07f7068701a46ce2db0f10dd5e290136b79a0a57bb0fd14eb7b32c1af78f699182c027849ca35cbfbab42544cc007ee896a0d9e3714cead033d8fbff946dfafe5eec307d5d67b517ac270e96042e3a1e4f25636b7efca94029336410717ff70bf4f11887ba65060b868d7282d14e3181f6e56956d050639a9c17e0ff7fa3f79e0c78f84779cfbe9ab1efe0fd27b4c8aa1cc7442e29edd70559065ede088fca9d0721e09601a80a36f1b9995699bc6126da17ede86fe2c8960f5f79d9710f25a487cdd0663c2fca887d69a8674a4f6b7472bf8ead2818fada803369905e12e595f3ea6137a18a004e0150d8740d24aadfcfcb008d79810f4aefcdc9423d6daec584317032d9a759288c19343b090cff628fe12d10152ab6c7d805e055907e687bdfa75d4b8e13b96c131a6e267a5659cb6efbfc7436e4b07d6256c1818716699762fdd064f9baf1439b28075f7b1ca7bfe3a2bc3e1018fea1dc57f142c638c49c4193fe99cf98aee97e512635155a60d0d167410695821c7f648cf63214442734571809b4b8e754afbbb323c08831feab359c"], 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x40048c0) r5 = socket(0x10, 0x2, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="12"], 0x1ac}}, 0x40000) ioctl$auto_IOCTL_VMCI_INIT_CONTEXT(0xffffffffffffffff, 0x7a0, 0x6) sysfs$auto(0x2, 0x2000000000040, 0x0) 717.125965ms ago: executing program 3 (id=3211): mmap$auto(0xffffffffffffffff, 0x2000009, 0x3, 0xebe, 0xfffffffffffffffa, 0x8000) setrlimit$auto(0x40020000, 0x0) mprotect$auto(0x200000000000, 0x806121, 0x6) 661.341516ms ago: executing program 0 (id=3212): mmap$auto(0x0, 0x2020009, 0x7, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/oom_adj\x00', 0x48402, 0x0) read$auto(r0, 0x0, 0x9a28) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r1, &(0x7f0000000200)={0x0, 0x7}, 0x3) flock$auto(r1, 0xa) write$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffffff, 0x0, 0x0) openat$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffff9c, &(0x7f0000000000), 0x1e3800, 0x0) (fail_nth: 9) 544.707947ms ago: executing program 3 (id=3213): r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000540)='/dev/tty45\x00', 0x0, 0x0) ioctl$auto_TIOCSTI2(r0, 0x5412, &(0x7f0000000840)="13") openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) mq_notify$auto(r1, &(0x7f0000000100)={@sival_int=0xffff7fff, @raw=0x8, 0x2, @_tid=0xffffffffffffffff}) io_uring_setup$auto(0x59, &(0x7f0000000080)={0x7ffffffc, 0x8, 0x3000, 0x6, 0x7, 0x400b, 0xffffffffffffffff, [], {0x6, 0x6, 0x8c48, 0x29a, 0x9, 0x80, 0x104, 0x6, 0x4}, {0x100, 0x1, 0x101, 0x85, 0x2, 0x24, 0xfe000000, 0x8, 0x3}}) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/mm/ksm/advisor_min_pages_to_scan\x00', 0x88282, 0x0) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) setresuid$auto(0xffffffffffffffff, 0x0, 0x0) write$auto(0xffffffffffffffff, 0x0, 0x100000a3d9) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x0, 0x5, 0x5) madvise$auto(0x0, 0x2003f2, 0x15) mmap$auto(0x0, 0x400008, 0xdf, 0x4000000000009b72, 0x2, 0x8000) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000200), 0x880, 0x0) openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, 0x0, 0x201, 0x0) mbind$auto(0x0, 0x2091d2, 0x4, 0x0, 0x6, 0x2) socket$nl_generic(0x10, 0x3, 0x10) exit$auto(0x2) select$auto(0xe, 0x0, 0x0, &(0x7f0000000580)={[0x1ff, 0x8000, 0xd, 0x1, 0x200948d, 0x3, 0x10015f4da0a, 0xd, 0x7, 0x6, 0x8000001f, 0x8, 0x6d3e, 0xc, 0x2, 0x2]}, 0x0) 109.73074ms ago: executing program 0 (id=3214): mmap$auto(0x0, 0x20005, 0x4000000000e0, 0xeb1, 0xffffffffffffffff, 0x8000) openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r0 = prctl$auto(0x41, 0x5, 0x0, 0x1, 0x0) r1 = socket(0x10, 0x2, 0x0) r2 = openat$auto_ext4_dir_operations_ext4(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/virtual/bluetooth/hci4/power\x00', 0x8a040, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0xc000) close_range$auto(0x2, 0x8, 0x0) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab83, 0x0) openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/input/event0\x00', 0x325d42, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000001180), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r4 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000080), 0x101042, 0x0) ioctl$auto_KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r4) ioctl$auto_KVM_GET_MSRS(r3, 0x4138ae84, &(0x7f0000000040)={0x2, 0x179}) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0xc) socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r6 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r6) ioctl$auto_KVM_GET_MSRS(r5, 0x4008ae89, &(0x7f00000000c0)={0xdd, 0x0, [{0x40000108, 0x400, 0x2}]}) fcntl$auto_F_DUPFD_QUERY(r2, 0x403, r1) mmap$auto(0x0, 0x2020009, 0x3, 0x9000000eb1, 0xfffffffffffffffa, 0x8000) r7 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$auto(r7, 0x110, 0x4, 0x0, 0x4) syz_genetlink_get_family_id$auto_nl802154(&(0x7f0000000080), r0) 0s ago: executing program 0 (id=3215): socket(0x2, 0x3, 0xa) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x9, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) socket(0x11, 0x3, 0x2) getpeername$auto(0x3, 0x0, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x62, 0x0) mmap$auto(0x0, 0xe983, 0x6, 0xeb1, 0xffffffffffffffff, 0x8000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x20401, 0x0) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_nbd(&(0x7f0000000480), 0xffffffffffffffff) sendmsg$auto_NBD_CMD_RECONFIGURE(r2, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f00000004c0)={0x1c, r3, 0x1, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x8b3c}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x90) r4 = ioctl$auto_KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$auto_KVM_GET_MSRS(r4, 0x4068aea3, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) timer_create$auto(0x803, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) r5 = openat$auto_fops_u8_(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/nfcsim/nfc0/dropframe\x00', 0x40080, 0x0) epoll_ctl$auto_EPOLL_CTL_DEL(r5, 0x2, r0, &(0x7f0000000040)={0x5, 0x7}) openat$auto_tracing_saved_tgids_fops_trace(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/tracing/saved_tgids\x00', 0x109100, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttynull\x00', 0x201, 0x0) open(&(0x7f0000001bc0)='./file0\x00', 0x4142, 0x1) r6 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptyz7\x00', 0x48f41, 0x0) ioctl$auto(0x3, 0x402c542d, r6) write$auto(0x3, 0x0, 0xfffffdef) kernel console output (not intermixed with test programs): 10 [ 879.115077][T19943] ? do_futex+0x192/0x350 [ 879.115097][T19943] ? __pfx_do_futex+0x10/0x10 [ 879.115119][T19943] ksys_mmap_pgoff+0xe1/0x650 [ 879.115135][T19943] ? __x64_sys_futex+0x34f/0x4d0 [ 879.115152][T19943] ? __x64_sys_futex+0x358/0x4d0 [ 879.115171][T19943] ? __pfx_ksys_mmap_pgoff+0x10/0x10 [ 879.115187][T19943] ? xfd_validate_state+0x129/0x190 [ 879.115212][T19943] __x64_sys_mmap+0x125/0x190 [ 879.115235][T19943] do_syscall_64+0x106/0xf80 [ 879.115253][T19943] ? clear_bhb_loop+0x40/0x90 [ 879.115271][T19943] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 879.115287][T19943] RIP: 0033:0x7fe5c779c799 [ 879.115301][T19943] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 879.115317][T19943] RSP: 002b:00007fe5c8706028 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 879.115333][T19943] RAX: ffffffffffffffda RBX: 00007fe5c7a15fa0 RCX: 00007fe5c779c799 [ 879.115344][T19943] RDX: 00000000000000df RSI: 0000000000400008 RDI: 0000000000000000 [ 879.115354][T19943] RBP: 00007fe5c7832bd9 R08: ffffffffffffffff R09: 0000000000000000 [ 879.115363][T19943] R10: 0000000000009b72 R11: 0000000000000246 R12: 0000000000000000 [ 879.115373][T19943] R13: 00007fe5c7a16038 R14: 00007fe5c7a15fa0 R15: 00007ffd9bd15928 [ 879.115395][T19943] [ 879.499990][T19943] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2976'. [ 880.412928][T19943] bond0: (slave bond_slave_1): Releasing backup interface [ 881.186880][T19967] FAULT_INJECTION: forcing a failure. [ 881.186880][T19967] name failslab, interval 1, probability 0, space 0, times 0 [ 881.279549][T19967] CPU: 0 UID: 0 PID: 19967 Comm: syz.1.2984 Tainted: G U L syzkaller #0 PREEMPT(full) [ 881.279580][T19967] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 881.279587][T19967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 881.279597][T19967] Call Trace: [ 881.279603][T19967] [ 881.279610][T19967] dump_stack_lvl+0x100/0x190 [ 881.279639][T19967] should_fail_ex.cold+0x5/0xa [ 881.279658][T19967] should_failslab+0xc2/0x120 [ 881.279674][T19967] __kmalloc_cache_noprof+0x7a/0x6f0 [ 881.279694][T19967] ? alloc_super+0x52/0xd20 [ 881.279719][T19967] alloc_super+0x52/0xd20 [ 881.279742][T19967] ? __pfx_mqueue_fill_super+0x10/0x10 [ 881.279761][T19967] sget_fc+0x117/0xc70 [ 881.279783][T19967] ? __pfx_set_anon_super_fc+0x10/0x10 [ 881.279804][T19967] ? __pfx_mqueue_fill_super+0x10/0x10 [ 881.279823][T19967] get_tree_nodev+0x28/0x190 [ 881.279847][T19967] mqueue_get_tree+0xf1/0x130 [ 881.279867][T19967] vfs_get_tree+0x92/0x320 [ 881.279888][T19967] fc_mount_longterm+0x1a/0x270 [ 881.279909][T19967] mq_init_ns+0x482/0x820 [ 881.279932][T19967] copy_ipcs+0x3dd/0x7e0 [ 881.279955][T19967] create_new_namespaces+0x20a/0xac0 [ 881.279972][T19967] ? security_capable+0x80/0x260 [ 881.279994][T19967] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 881.280013][T19967] ksys_unshare+0x473/0xad0 [ 881.280033][T19967] ? __pfx_ksys_unshare+0x10/0x10 [ 881.280059][T19967] __x64_sys_unshare+0x31/0x40 [ 881.280076][T19967] do_syscall_64+0x106/0xf80 [ 881.280094][T19967] ? clear_bhb_loop+0x40/0x90 [ 881.280113][T19967] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 881.280128][T19967] RIP: 0033:0x7fcf29f9c799 [ 881.280143][T19967] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 881.280157][T19967] RSP: 002b:00007fcf2ade9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 881.280174][T19967] RAX: ffffffffffffffda RBX: 00007fcf2a215fa0 RCX: 00007fcf29f9c799 [ 881.280184][T19967] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c000000 [ 881.280193][T19967] RBP: 00007fcf2a032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 881.280203][T19967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 881.280212][T19967] R13: 00007fcf2a216038 R14: 00007fcf2a215fa0 R15: 00007ffded56e558 [ 881.280233][T19967] [ 882.381201][T19982] netlink: 10337 bytes leftover after parsing attributes in process `syz.1.2987'. [ 882.427175][T19979] hub 1-0:1.0: USB hub found [ 882.445644][T19979] hub 1-0:1.0: 1 port detected [ 883.037706][T19991] FAULT_INJECTION: forcing a failure. [ 883.037706][T19991] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 883.345765][T19991] CPU: 0 UID: 0 PID: 19991 Comm: syz.2.2988 Tainted: G U L syzkaller #0 PREEMPT(full) [ 883.345795][T19991] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 883.345801][T19991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 883.345811][T19991] Call Trace: [ 883.345818][T19991] [ 883.345825][T19991] dump_stack_lvl+0x100/0x190 [ 883.345853][T19991] should_fail_ex.cold+0x5/0xa [ 883.345869][T19991] ? prepare_alloc_pages+0x16d/0x5f0 [ 883.345889][T19991] should_fail_alloc_page+0xeb/0x140 [ 883.345905][T19991] prepare_alloc_pages+0x1f0/0x5f0 [ 883.345922][T19991] ? mas_wr_store_entry+0x6d2/0x2390 [ 883.345946][T19991] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 883.345968][T19991] ? perf_event_mmap+0xbc/0xe40 [ 883.345990][T19991] ? vms_complete_munmap_vmas+0x1e1/0xdd0 [ 883.346012][T19991] ? mas_store_prealloc+0x893/0xfb0 [ 883.346034][T19991] ? __pfx_perf_event_mmap+0x10/0x10 [ 883.346059][T19991] ? __pfx_vms_complete_munmap_vmas+0x10/0x10 [ 883.346089][T19991] ? vma_wants_writenotify+0x10b/0x390 [ 883.346112][T19991] ? __pfx_vma_wants_writenotify+0x10/0x10 [ 883.346136][T19991] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 883.346164][T19991] ? vma_set_page_prot+0xb1/0x120 [ 883.346187][T19991] ? mas_ascend+0x53d/0xb30 [ 883.346203][T19991] ? __pfx___mmap_region+0x10/0x10 [ 883.346223][T19991] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 883.346249][T19991] ? policy_nodemask+0xed/0x4f0 [ 883.346266][T19991] alloc_pages_mpol+0x1fb/0x550 [ 883.346283][T19991] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 883.346304][T19991] alloc_pages_noprof+0x131/0x390 [ 883.346321][T19991] __pmd_alloc+0x3b/0x9c0 [ 883.346340][T19991] __handle_mm_fault+0xa99/0x2b60 [ 883.346363][T19991] ? mt_find+0x45e/0x8e0 [ 883.346382][T19991] ? __pfx___handle_mm_fault+0x10/0x10 [ 883.346401][T19991] ? __pfx_mt_find+0x10/0x10 [ 883.346435][T19991] handle_mm_fault+0x36d/0xa20 [ 883.346458][T19991] __get_user_pages+0xf9c/0x34d0 [ 883.346483][T19991] ? __pfx___get_user_pages+0x10/0x10 [ 883.346504][T19991] populate_vma_page_range+0x267/0x3f0 [ 883.346524][T19991] ? __pfx_populate_vma_page_range+0x10/0x10 [ 883.346541][T19991] ? __pfx_find_vma_intersection+0x10/0x10 [ 883.346558][T19991] ? do_mmap+0x93f/0x12f0 [ 883.346575][T19991] __mm_populate+0x107/0x3a0 [ 883.346594][T19991] ? __pfx___mm_populate+0x10/0x10 [ 883.346613][T19991] ? up_write+0x290/0x4f0 [ 883.346636][T19991] vm_mmap_pgoff+0x37f/0x470 [ 883.346656][T19991] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 883.346673][T19991] ? do_futex+0x192/0x350 [ 883.346693][T19991] ? __pfx_do_futex+0x10/0x10 [ 883.346715][T19991] ksys_mmap_pgoff+0xe1/0x650 [ 883.346731][T19991] ? __x64_sys_futex+0x34f/0x4d0 [ 883.346749][T19991] ? __x64_sys_futex+0x358/0x4d0 [ 883.346768][T19991] ? __pfx_ksys_mmap_pgoff+0x10/0x10 [ 883.346787][T19991] ? xfd_validate_state+0x129/0x190 [ 883.346812][T19991] __x64_sys_mmap+0x125/0x190 [ 883.346836][T19991] do_syscall_64+0x106/0xf80 [ 883.346855][T19991] ? clear_bhb_loop+0x40/0x90 [ 883.346873][T19991] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 883.346889][T19991] RIP: 0033:0x7f54ce99c799 [ 883.346903][T19991] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 883.346919][T19991] RSP: 002b:00007f54cf8c3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 883.346935][T19991] RAX: ffffffffffffffda RBX: 00007f54cec15fa0 RCX: 00007f54ce99c799 [ 883.346945][T19991] RDX: 00000000000000df RSI: 0000000000400008 RDI: 0000000000000000 [ 883.346955][T19991] RBP: 00007f54cea32bd9 R08: ffffffffffffffff R09: 0000000000000000 [ 883.346965][T19991] R10: 0000000000009b72 R11: 0000000000000246 R12: 0000000000000000 [ 883.346974][T19991] R13: 00007f54cec16038 R14: 00007f54cec15fa0 R15: 00007ffe76ed4b88 [ 883.346995][T19991] [ 883.352004][T19996] netlink: 28 bytes leftover after parsing attributes in process `syz.2.2988'. [ 883.774819][T19990] FAULT_INJECTION: forcing a failure. [ 883.774819][T19990] name failslab, interval 1, probability 0, space 0, times 0 [ 883.800690][T19990] CPU: 0 UID: 0 PID: 19990 Comm: syz.0.2996 Tainted: G U L syzkaller #0 PREEMPT(full) [ 883.800722][T19990] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 883.800729][T19990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 883.800739][T19990] Call Trace: [ 883.800746][T19990] [ 883.800753][T19990] dump_stack_lvl+0x100/0x190 [ 883.800781][T19990] should_fail_ex.cold+0x5/0xa [ 883.800800][T19990] should_failslab+0xc2/0x120 [ 883.800816][T19990] __kmalloc_cache_noprof+0x7a/0x6f0 [ 883.800836][T19990] ? sctp_auth_shkey_create+0x9e/0x210 [ 883.800858][T19990] sctp_auth_shkey_create+0x9e/0x210 [ 883.800878][T19990] sctp_endpoint_new+0x589/0xb20 [ 883.800900][T19990] ? __pfx_sctp_endpoint_new+0x10/0x10 [ 883.800922][T19990] ? lockdep_init_map_type+0x5c/0x250 [ 883.800941][T19990] ? lockdep_init_map_type+0x5c/0x250 [ 883.800964][T19990] sctp_init_sock+0xe2b/0x1300 [ 883.800981][T19990] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 883.801000][T19990] sctp_v6_init_sock+0x16/0x70 [ 883.801016][T19990] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 883.801081][T19990] inet6_create+0xb21/0x12b0 [ 883.801102][T19990] ? inet6_create+0x7f/0x12b0 [ 883.801123][T19990] __sock_create+0x339/0x860 [ 883.801149][T19990] __sys_socket+0x14d/0x260 [ 883.801172][T19990] ? __pfx___sys_socket+0x10/0x10 [ 883.801200][T19990] __x64_sys_socket+0x72/0xb0 [ 883.801223][T19990] ? lockdep_hardirqs_on+0x78/0x100 [ 883.801240][T19990] do_syscall_64+0x106/0xf80 [ 883.801257][T19990] ? clear_bhb_loop+0x40/0x90 [ 883.801276][T19990] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 883.801292][T19990] RIP: 0033:0x7fe5c779c799 [ 883.801306][T19990] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 883.801321][T19990] RSP: 002b:00007fe5c86e5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 883.801336][T19990] RAX: ffffffffffffffda RBX: 00007fe5c7a16090 RCX: 00007fe5c779c799 [ 883.801347][T19990] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 883.801357][T19990] RBP: 00007fe5c7832bd9 R08: 0000000000000000 R09: 0000000000000000 [ 883.801366][T19990] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 883.801376][T19990] R13: 00007fe5c7a16128 R14: 00007fe5c7a16090 R15: 00007ffd9bd15928 [ 883.801397][T19990] [ 884.046431][T19997] device-mapper: ioctl: name not supplied when creating device [ 884.698737][T19996] bond0: (slave bond_slave_1): Releasing backup interface [ 886.290932][T20022] FAULT_INJECTION: forcing a failure. [ 886.290932][T20022] name failslab, interval 1, probability 0, space 0, times 0 [ 886.427670][T20022] CPU: 0 UID: 0 PID: 20022 Comm: syz.1.2995 Tainted: G U L syzkaller #0 PREEMPT(full) [ 886.427700][T20022] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 886.427707][T20022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 886.427718][T20022] Call Trace: [ 886.427729][T20022] [ 886.427736][T20022] dump_stack_lvl+0x100/0x190 [ 886.427766][T20022] should_fail_ex.cold+0x5/0xa [ 886.427786][T20022] should_failslab+0xc2/0x120 [ 886.427803][T20022] __kmalloc_cache_noprof+0x7a/0x6f0 [ 886.427823][T20022] ? sctp_auth_shkey_create+0x9e/0x210 [ 886.427846][T20022] sctp_auth_shkey_create+0x9e/0x210 [ 886.427866][T20022] sctp_endpoint_new+0x589/0xb20 [ 886.427888][T20022] ? __pfx_sctp_endpoint_new+0x10/0x10 [ 886.427910][T20022] ? lockdep_init_map_type+0x5c/0x250 [ 886.427930][T20022] ? lockdep_init_map_type+0x5c/0x250 [ 886.427952][T20022] sctp_init_sock+0xe2b/0x1300 [ 886.427969][T20022] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 886.427988][T20022] sctp_v6_init_sock+0x16/0x70 [ 886.428004][T20022] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 886.428021][T20022] inet6_create+0xb21/0x12b0 [ 886.428041][T20022] ? inet6_create+0x7f/0x12b0 [ 886.428061][T20022] __sock_create+0x339/0x860 [ 886.428087][T20022] __sys_socket+0x14d/0x260 [ 886.428110][T20022] ? __pfx___sys_socket+0x10/0x10 [ 886.428144][T20022] __x64_sys_socket+0x72/0xb0 [ 886.428166][T20022] ? lockdep_hardirqs_on+0x78/0x100 [ 886.428185][T20022] do_syscall_64+0x106/0xf80 [ 886.428204][T20022] ? clear_bhb_loop+0x40/0x90 [ 886.428223][T20022] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 886.428240][T20022] RIP: 0033:0x7fcf29f9c799 [ 886.428254][T20022] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 886.428270][T20022] RSP: 002b:00007fcf2adc8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 886.428286][T20022] RAX: ffffffffffffffda RBX: 00007fcf2a216090 RCX: 00007fcf29f9c799 [ 886.428296][T20022] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 886.428305][T20022] RBP: 00007fcf2a032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 886.428315][T20022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 886.428324][T20022] R13: 00007fcf2a216128 R14: 00007fcf2a216090 R15: 00007ffded56e558 [ 886.428344][T20022] [ 887.258661][ T29] audit: type=1804 audit(4294967312.620:18): pid=20036 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz.3.3000" name="/newroot/120/file0" dev="tmpfs" ino=633 res=1 errno=0 [ 887.628049][T20042] netlink: 10337 bytes leftover after parsing attributes in process `syz.2.3001'. [ 888.661254][T20047] FAULT_INJECTION: forcing a failure. [ 888.661254][T20047] name failslab, interval 1, probability 0, space 0, times 0 [ 888.699650][T20047] CPU: 0 UID: 0 PID: 20047 Comm: syz.3.3003 Tainted: G U L syzkaller #0 PREEMPT(full) [ 888.699680][T20047] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 888.699687][T20047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 888.699697][T20047] Call Trace: [ 888.699703][T20047] [ 888.699709][T20047] dump_stack_lvl+0x100/0x190 [ 888.699737][T20047] should_fail_ex.cold+0x5/0xa [ 888.699756][T20047] should_failslab+0xc2/0x120 [ 888.699773][T20047] __kmalloc_cache_noprof+0x7a/0x6f0 [ 888.699792][T20047] ? sctp_auth_shkey_create+0x9e/0x210 [ 888.699815][T20047] sctp_auth_shkey_create+0x9e/0x210 [ 888.699835][T20047] sctp_endpoint_new+0x589/0xb20 [ 888.699856][T20047] ? __pfx_sctp_endpoint_new+0x10/0x10 [ 888.699878][T20047] ? lockdep_init_map_type+0x5c/0x250 [ 888.699898][T20047] ? lockdep_init_map_type+0x5c/0x250 [ 888.699920][T20047] sctp_init_sock+0xe2b/0x1300 [ 888.699938][T20047] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 888.699956][T20047] sctp_v6_init_sock+0x16/0x70 [ 888.699973][T20047] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 888.699990][T20047] inet6_create+0xb21/0x12b0 [ 888.700010][T20047] ? inet6_create+0x7f/0x12b0 [ 888.700029][T20047] __sock_create+0x339/0x860 [ 888.700055][T20047] __sys_socket+0x14d/0x260 [ 888.700078][T20047] ? __pfx___sys_socket+0x10/0x10 [ 888.700107][T20047] __x64_sys_socket+0x72/0xb0 [ 888.700129][T20047] ? lockdep_hardirqs_on+0x78/0x100 [ 888.700147][T20047] do_syscall_64+0x106/0xf80 [ 888.700164][T20047] ? clear_bhb_loop+0x40/0x90 [ 888.700182][T20047] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 888.700198][T20047] RIP: 0033:0x7fa3e239c799 [ 888.700211][T20047] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 888.700226][T20047] RSP: 002b:00007fa3e328e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 888.700241][T20047] RAX: ffffffffffffffda RBX: 00007fa3e2616090 RCX: 00007fa3e239c799 [ 888.700251][T20047] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 888.700260][T20047] RBP: 00007fa3e2432bd9 R08: 0000000000000000 R09: 0000000000000000 [ 888.700269][T20047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 888.700278][T20047] R13: 00007fa3e2616128 R14: 00007fa3e2616090 R15: 00007ffe14f24db8 [ 888.700298][T20047] [ 889.286154][T20052] netlink: 10337 bytes leftover after parsing attributes in process `syz.0.3012'. [ 889.311360][T20055] FAULT_INJECTION: forcing a failure. [ 889.311360][T20055] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 889.507290][T20055] CPU: 0 UID: 0 PID: 20055 Comm: syz.1.3004 Tainted: G U L syzkaller #0 PREEMPT(full) [ 889.507319][T20055] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 889.507326][T20055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 889.507336][T20055] Call Trace: [ 889.507344][T20055] [ 889.507352][T20055] dump_stack_lvl+0x100/0x190 [ 889.507380][T20055] should_fail_ex.cold+0x5/0xa [ 889.507397][T20055] ? prepare_alloc_pages+0x16d/0x5f0 [ 889.507416][T20055] should_fail_alloc_page+0xeb/0x140 [ 889.507433][T20055] prepare_alloc_pages+0x1f0/0x5f0 [ 889.507450][T20055] ? mas_wr_store_entry+0x6d2/0x2390 [ 889.507474][T20055] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 889.507523][T20055] ? perf_event_mmap+0xbc/0xe40 [ 889.507548][T20055] ? vms_complete_munmap_vmas+0x1e1/0xdd0 [ 889.507570][T20055] ? mas_store_prealloc+0x893/0xfb0 [ 889.507592][T20055] ? __pfx_perf_event_mmap+0x10/0x10 [ 889.507618][T20055] ? __pfx_vms_complete_munmap_vmas+0x10/0x10 [ 889.507639][T20055] ? vma_wants_writenotify+0x10b/0x390 [ 889.507661][T20055] ? __pfx_vma_wants_writenotify+0x10/0x10 [ 889.507684][T20055] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 889.507710][T20055] ? vma_set_page_prot+0xb1/0x120 [ 889.507732][T20055] ? mas_ascend+0x53d/0xb30 [ 889.507748][T20055] ? __pfx___mmap_region+0x10/0x10 [ 889.507768][T20055] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 889.507793][T20055] ? policy_nodemask+0xed/0x4f0 [ 889.507810][T20055] alloc_pages_mpol+0x1fb/0x550 [ 889.507827][T20055] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 889.507848][T20055] alloc_pages_noprof+0x131/0x390 [ 889.507865][T20055] __pmd_alloc+0x3b/0x9c0 [ 889.507884][T20055] __handle_mm_fault+0xa99/0x2b60 [ 889.507907][T20055] ? mt_find+0x45e/0x8e0 [ 889.507926][T20055] ? __pfx___handle_mm_fault+0x10/0x10 [ 889.507944][T20055] ? __pfx_mt_find+0x10/0x10 [ 889.507978][T20055] handle_mm_fault+0x36d/0xa20 [ 889.508006][T20055] __get_user_pages+0xf9c/0x34d0 [ 889.508030][T20055] ? __pfx___get_user_pages+0x10/0x10 [ 889.508053][T20055] populate_vma_page_range+0x267/0x3f0 [ 889.508072][T20055] ? __pfx_populate_vma_page_range+0x10/0x10 [ 889.508090][T20055] ? __pfx_find_vma_intersection+0x10/0x10 [ 889.508109][T20055] ? do_mmap+0x93f/0x12f0 [ 889.508127][T20055] __mm_populate+0x107/0x3a0 [ 889.508146][T20055] ? __pfx___mm_populate+0x10/0x10 [ 889.508165][T20055] ? up_write+0x290/0x4f0 [ 889.508188][T20055] vm_mmap_pgoff+0x37f/0x470 [ 889.508208][T20055] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 889.508226][T20055] ? do_futex+0x192/0x350 [ 889.508245][T20055] ? __pfx_do_futex+0x10/0x10 [ 889.508267][T20055] ksys_mmap_pgoff+0xe1/0x650 [ 889.508283][T20055] ? __x64_sys_futex+0x34f/0x4d0 [ 889.508301][T20055] ? __x64_sys_futex+0x358/0x4d0 [ 889.508320][T20055] ? __pfx_ksys_mmap_pgoff+0x10/0x10 [ 889.508336][T20055] ? xfd_validate_state+0x129/0x190 [ 889.508361][T20055] __x64_sys_mmap+0x125/0x190 [ 889.508385][T20055] do_syscall_64+0x106/0xf80 [ 889.508403][T20055] ? clear_bhb_loop+0x40/0x90 [ 889.508422][T20055] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 889.508438][T20055] RIP: 0033:0x7fcf29f9c799 [ 889.508454][T20055] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 889.508469][T20055] RSP: 002b:00007fcf2ade9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 889.508485][T20055] RAX: ffffffffffffffda RBX: 00007fcf2a215fa0 RCX: 00007fcf29f9c799 [ 889.508504][T20055] RDX: 00000000000000df RSI: 0000000000400008 RDI: 0000000000000000 [ 889.508513][T20055] RBP: 00007fcf2a032bd9 R08: ffffffffffffffff R09: 0000000000000000 [ 889.508523][T20055] R10: 0000000000009b72 R11: 0000000000000246 R12: 0000000000000000 [ 889.508533][T20055] R13: 00007fcf2a216038 R14: 00007fcf2a215fa0 R15: 00007ffded56e558 [ 889.508555][T20055] [ 889.926230][T20055] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3004'. [ 890.126246][T20055] bond0: (slave bond_slave_1): Releasing backup interface [ 890.617060][ T9] Process accounting resumed [ 890.629967][T20065] FAULT_INJECTION: forcing a failure. [ 890.629967][T20065] name fail_futex, interval 1, probability 0, space 0, times 0 [ 890.680714][T20065] CPU: 0 UID: 0 PID: 20065 Comm: syz.0.3006 Tainted: G U L syzkaller #0 PREEMPT(full) [ 890.680743][T20065] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 890.680749][T20065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 890.680759][T20065] Call Trace: [ 890.680764][T20065] [ 890.680771][T20065] dump_stack_lvl+0x100/0x190 [ 890.680800][T20065] should_fail_ex.cold+0x5/0xa [ 890.680824][T20065] get_futex_key+0x1d2/0x1620 [ 890.680847][T20065] ? __pfx_get_futex_key+0x10/0x10 [ 890.680872][T20065] futex_wake+0xea/0x530 [ 890.680897][T20065] ? __pfx_futex_wake+0x10/0x10 [ 890.680921][T20065] ? putname+0xb1/0x110 [ 890.680936][T20065] ? kmem_cache_free+0x124/0x6a0 [ 890.680959][T20065] do_futex+0x32b/0x350 [ 890.680979][T20065] ? __pfx_do_futex+0x10/0x10 [ 890.680996][T20065] ? __pfx_do_sys_openat2+0x10/0x10 [ 890.681020][T20065] __x64_sys_futex+0x34f/0x4d0 [ 890.681039][T20065] ? __x64_sys_openat+0x12d/0x210 [ 890.681059][T20065] ? __pfx___x64_sys_futex+0x10/0x10 [ 890.681085][T20065] do_syscall_64+0x106/0xf80 [ 890.681102][T20065] ? clear_bhb_loop+0x40/0x90 [ 890.681121][T20065] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 890.681136][T20065] RIP: 0033:0x7fe5c779c799 [ 890.681150][T20065] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 890.681167][T20065] RSP: 002b:00007fe5c86e50e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 890.681183][T20065] RAX: ffffffffffffffda RBX: 00007fe5c7a16098 RCX: 00007fe5c779c799 [ 890.681193][T20065] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fe5c7a1609c [ 890.681202][T20065] RBP: 00007fe5c7a16090 R08: 0000000000000000 R09: 0000000000000000 [ 890.681212][T20065] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000000 [ 890.681220][T20065] R13: 00007fe5c7a16128 R14: 00007ffd9bd15840 R15: 00007ffd9bd15928 [ 890.681240][T20065] [ 891.750053][T20091] FAULT_INJECTION: forcing a failure. [ 891.750053][T20091] name failslab, interval 1, probability 0, space 0, times 0 [ 891.774567][T20092] FAULT_INJECTION: forcing a failure. [ 891.774567][T20092] name failslab, interval 1, probability 0, space 0, times 0 [ 891.816372][T20091] CPU: 0 UID: 0 PID: 20091 Comm: syz.3.3014 Tainted: G U L syzkaller #0 PREEMPT(full) [ 891.816402][T20091] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 891.816408][T20091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 891.816417][T20091] Call Trace: [ 891.816424][T20091] [ 891.816430][T20091] dump_stack_lvl+0x100/0x190 [ 891.816459][T20091] should_fail_ex.cold+0x5/0xa [ 891.816477][T20091] ? tomoyo_encode2+0xfb/0x3c0 [ 891.816493][T20091] should_failslab+0xc2/0x120 [ 891.816509][T20091] __kmalloc_noprof+0xe0/0x850 [ 891.816530][T20091] ? d_absolute_path+0x136/0x1b0 [ 891.816554][T20091] tomoyo_encode2+0xfb/0x3c0 [ 891.816573][T20091] tomoyo_encode+0x29/0x50 [ 891.816589][T20091] tomoyo_realpath_from_path+0x18c/0x690 [ 891.816610][T20091] tomoyo_path_number_perm+0x23c/0x580 [ 891.816633][T20091] ? tomoyo_path_number_perm+0x22e/0x580 [ 891.816657][T20091] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 891.816699][T20091] ? find_held_lock+0x2b/0x80 [ 891.816713][T20091] ? __fget_files+0x215/0x3d0 [ 891.816726][T20091] ? hook_file_ioctl_common+0x146/0x410 [ 891.816754][T20091] ? __fget_files+0x21f/0x3d0 [ 891.816771][T20091] security_file_ioctl+0xd3/0x230 [ 891.816795][T20091] __x64_sys_ioctl+0xb7/0x210 [ 891.816818][T20091] do_syscall_64+0x106/0xf80 [ 891.816837][T20091] ? clear_bhb_loop+0x40/0x90 [ 891.816855][T20091] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 891.816871][T20091] RIP: 0033:0x7fa3e239c799 [ 891.816883][T20091] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 891.816898][T20091] RSP: 002b:00007fa3e32af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 891.816913][T20091] RAX: ffffffffffffffda RBX: 00007fa3e2615fa0 RCX: 00007fa3e239c799 [ 891.816923][T20091] RDX: ffffffffffffffff RSI: 000000000000545c RDI: 0000000000000002 [ 891.816933][T20091] RBP: 00007fa3e32af090 R08: 0000000000000000 R09: 0000000000000000 [ 891.816942][T20091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 891.816951][T20091] R13: 00007fa3e2616038 R14: 00007fa3e2615fa0 R15: 00007ffe14f24db8 [ 891.816971][T20091] [ 891.816986][T20091] ERROR: Out of memory at tomoyo_realpath_from_path. [ 892.102423][T20092] CPU: 0 UID: 0 PID: 20092 Comm: syz.0.3013 Tainted: G U L syzkaller #0 PREEMPT(full) [ 892.102455][T20092] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 892.102462][T20092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 892.102472][T20092] Call Trace: [ 892.102478][T20092] [ 892.102484][T20092] dump_stack_lvl+0x100/0x190 [ 892.102512][T20092] should_fail_ex.cold+0x5/0xa [ 892.102531][T20092] should_failslab+0xc2/0x120 [ 892.102547][T20092] __kmalloc_cache_noprof+0x7a/0x6f0 [ 892.102567][T20092] ? sctp_auth_shkey_create+0x9e/0x210 [ 892.102590][T20092] sctp_auth_shkey_create+0x9e/0x210 [ 892.102610][T20092] sctp_endpoint_new+0x589/0xb20 [ 892.102635][T20092] ? __pfx_sctp_endpoint_new+0x10/0x10 [ 892.102656][T20092] ? lockdep_init_map_type+0x5c/0x250 [ 892.102677][T20092] ? lockdep_init_map_type+0x5c/0x250 [ 892.102699][T20092] sctp_init_sock+0xe2b/0x1300 [ 892.102716][T20092] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 892.102735][T20092] sctp_v6_init_sock+0x16/0x70 [ 892.102751][T20092] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 892.102768][T20092] inet6_create+0xb21/0x12b0 [ 892.102788][T20092] ? inet6_create+0x7f/0x12b0 [ 892.102807][T20092] __sock_create+0x339/0x860 [ 892.102834][T20092] __sys_socket+0x14d/0x260 [ 892.102856][T20092] ? __pfx___sys_socket+0x10/0x10 [ 892.102885][T20092] __x64_sys_socket+0x72/0xb0 [ 892.102907][T20092] ? lockdep_hardirqs_on+0x78/0x100 [ 892.102925][T20092] do_syscall_64+0x106/0xf80 [ 892.102942][T20092] ? clear_bhb_loop+0x40/0x90 [ 892.102961][T20092] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 892.102976][T20092] RIP: 0033:0x7fe5c779c799 [ 892.102991][T20092] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 892.103006][T20092] RSP: 002b:00007fe5c86e5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 892.103022][T20092] RAX: ffffffffffffffda RBX: 00007fe5c7a16090 RCX: 00007fe5c779c799 [ 892.103032][T20092] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 892.103041][T20092] RBP: 00007fe5c7832bd9 R08: 0000000000000000 R09: 0000000000000000 [ 892.103050][T20092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 892.103059][T20092] R13: 00007fe5c7a16128 R14: 00007fe5c7a16090 R15: 00007ffd9bd15928 [ 892.103079][T20092] [ 892.501662][T20097] FAULT_INJECTION: forcing a failure. [ 892.501662][T20097] name failslab, interval 1, probability 0, space 0, times 0 [ 892.514621][T20097] CPU: 0 UID: 0 PID: 20097 Comm: syz.1.3015 Tainted: G U L syzkaller #0 PREEMPT(full) [ 892.514648][T20097] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 892.514655][T20097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 892.514665][T20097] Call Trace: [ 892.514672][T20097] [ 892.514678][T20097] dump_stack_lvl+0x100/0x190 [ 892.514706][T20097] should_fail_ex.cold+0x5/0xa [ 892.514725][T20097] should_failslab+0xc2/0x120 [ 892.514741][T20097] __kmalloc_cache_noprof+0x7a/0x6f0 [ 892.514761][T20097] ? sctp_auth_shkey_create+0x9e/0x210 [ 892.514783][T20097] sctp_auth_shkey_create+0x9e/0x210 [ 892.514803][T20097] sctp_endpoint_new+0x589/0xb20 [ 892.514823][T20097] ? __pfx_sctp_endpoint_new+0x10/0x10 [ 892.514844][T20097] ? lockdep_init_map_type+0x5c/0x250 [ 892.514863][T20097] ? lockdep_init_map_type+0x5c/0x250 [ 892.514886][T20097] sctp_init_sock+0xe2b/0x1300 [ 892.514903][T20097] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 892.514921][T20097] sctp_v6_init_sock+0x16/0x70 [ 892.514937][T20097] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 892.514955][T20097] inet6_create+0xb21/0x12b0 [ 892.514974][T20097] ? inet6_create+0x7f/0x12b0 [ 892.514993][T20097] __sock_create+0x339/0x860 [ 892.515019][T20097] __sys_socket+0x14d/0x260 [ 892.515042][T20097] ? __pfx___sys_socket+0x10/0x10 [ 892.515069][T20097] __x64_sys_socket+0x72/0xb0 [ 892.515109][T20097] ? lockdep_hardirqs_on+0x78/0x100 [ 892.515127][T20097] do_syscall_64+0x106/0xf80 [ 892.515146][T20097] ? clear_bhb_loop+0x40/0x90 [ 892.515164][T20097] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 892.515180][T20097] RIP: 0033:0x7fcf29f9c799 [ 892.515194][T20097] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 892.515209][T20097] RSP: 002b:00007fcf2ade9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 892.515225][T20097] RAX: ffffffffffffffda RBX: 00007fcf2a215fa0 RCX: 00007fcf29f9c799 [ 892.515235][T20097] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 892.515244][T20097] RBP: 00007fcf2a032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 892.515253][T20097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 892.515262][T20097] R13: 00007fcf2a216038 R14: 00007fcf2a215fa0 R15: 00007ffded56e558 [ 892.515283][T20097] [ 892.956461][T20102] FAULT_INJECTION: forcing a failure. [ 892.956461][T20102] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 892.970037][T20102] CPU: 0 UID: 0 PID: 20102 Comm: syz.3.3018 Tainted: G U L syzkaller #0 PREEMPT(full) [ 892.970066][T20102] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 892.970073][T20102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 892.970083][T20102] Call Trace: [ 892.970089][T20102] [ 892.970096][T20102] dump_stack_lvl+0x100/0x190 [ 892.970124][T20102] should_fail_ex.cold+0x5/0xa [ 892.970140][T20102] ? prepare_alloc_pages+0x16d/0x5f0 [ 892.970159][T20102] should_fail_alloc_page+0xeb/0x140 [ 892.970176][T20102] prepare_alloc_pages+0x1f0/0x5f0 [ 892.970193][T20102] ? mas_wr_store_entry+0x6d2/0x2390 [ 892.970217][T20102] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 892.970238][T20102] ? perf_event_mmap+0xbc/0xe40 [ 892.970261][T20102] ? vms_complete_munmap_vmas+0x1e1/0xdd0 [ 892.970283][T20102] ? mas_store_prealloc+0x893/0xfb0 [ 892.970305][T20102] ? __pfx_perf_event_mmap+0x10/0x10 [ 892.970329][T20102] ? __pfx_vms_complete_munmap_vmas+0x10/0x10 [ 892.970349][T20102] ? vma_wants_writenotify+0x10b/0x390 [ 892.970370][T20102] ? __pfx_vma_wants_writenotify+0x10/0x10 [ 892.970392][T20102] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 892.970418][T20102] ? vma_set_page_prot+0xb1/0x120 [ 892.970439][T20102] ? mas_ascend+0x53d/0xb30 [ 892.970455][T20102] ? __pfx___mmap_region+0x10/0x10 [ 892.970475][T20102] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 892.970500][T20102] ? policy_nodemask+0xed/0x4f0 [ 892.970520][T20102] alloc_pages_mpol+0x1fb/0x550 [ 892.970537][T20102] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 892.970558][T20102] alloc_pages_noprof+0x131/0x390 [ 892.970575][T20102] __pmd_alloc+0x3b/0x9c0 [ 892.970593][T20102] __handle_mm_fault+0xa99/0x2b60 [ 892.970616][T20102] ? mt_find+0x45e/0x8e0 [ 892.970635][T20102] ? __pfx___handle_mm_fault+0x10/0x10 [ 892.970653][T20102] ? __pfx_mt_find+0x10/0x10 [ 892.970687][T20102] handle_mm_fault+0x36d/0xa20 [ 892.970710][T20102] __get_user_pages+0xf9c/0x34d0 [ 892.970734][T20102] ? __pfx___get_user_pages+0x10/0x10 [ 892.970756][T20102] populate_vma_page_range+0x267/0x3f0 [ 892.970776][T20102] ? __pfx_populate_vma_page_range+0x10/0x10 [ 892.970793][T20102] ? __pfx_find_vma_intersection+0x10/0x10 [ 892.970809][T20102] ? do_mmap+0x93f/0x12f0 [ 892.970832][T20102] __mm_populate+0x107/0x3a0 [ 892.970850][T20102] ? __pfx___mm_populate+0x10/0x10 [ 892.970869][T20102] ? up_write+0x290/0x4f0 [ 892.970893][T20102] vm_mmap_pgoff+0x37f/0x470 [ 892.970913][T20102] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 892.970932][T20102] ? do_futex+0x192/0x350 [ 892.970951][T20102] ? __pfx_do_futex+0x10/0x10 [ 892.970974][T20102] ksys_mmap_pgoff+0xe1/0x650 [ 892.970990][T20102] ? __x64_sys_futex+0x34f/0x4d0 [ 892.971013][T20102] ? __x64_sys_futex+0x358/0x4d0 [ 892.971033][T20102] ? __pfx_ksys_mmap_pgoff+0x10/0x10 [ 892.971049][T20102] ? xfd_validate_state+0x129/0x190 [ 892.971076][T20102] __x64_sys_mmap+0x125/0x190 [ 892.971100][T20102] do_syscall_64+0x106/0xf80 [ 892.971117][T20102] ? clear_bhb_loop+0x40/0x90 [ 892.971136][T20102] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 892.971151][T20102] RIP: 0033:0x7fa3e239c799 [ 892.971167][T20102] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 892.971182][T20102] RSP: 002b:00007fa3e32af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 892.971197][T20102] RAX: ffffffffffffffda RBX: 00007fa3e2615fa0 RCX: 00007fa3e239c799 [ 892.971207][T20102] RDX: 00000000000000df RSI: 0000000000400008 RDI: 0000000000000000 [ 892.971217][T20102] RBP: 00007fa3e2432bd9 R08: ffffffffffffffff R09: 0000000000000000 [ 892.971226][T20102] R10: 0000000000009b72 R11: 0000000000000246 R12: 0000000000000000 [ 892.971236][T20102] R13: 00007fa3e2616038 R14: 00007fa3e2615fa0 R15: 00007ffe14f24db8 [ 892.971257][T20102] [ 893.356575][T20104] netlink: 10337 bytes leftover after parsing attributes in process `syz.2.3017'. [ 894.395893][T20102] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3018'. [ 894.557624][T20102] bond0: (slave bond_slave_1): Releasing backup interface [ 895.120674][T19525] Bluetooth: hci4: ACL packet for unknown connection handle 0 [ 895.168600][T20137] nbd: couldn't find a device at index 35644 [ 895.249120][T20135] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3027'. [ 896.098810][T20148] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3030'. [ 896.375372][T20153] program syz.0.3039 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 896.472289][T20158] FAULT_INJECTION: forcing a failure. [ 896.472289][T20158] name fail_futex, interval 1, probability 0, space 0, times 0 [ 896.545636][T20158] CPU: 0 UID: 0 PID: 20158 Comm: syz.1.3031 Tainted: G U L syzkaller #0 PREEMPT(full) [ 896.545666][T20158] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 896.545672][T20158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 896.545682][T20158] Call Trace: [ 896.545688][T20158] [ 896.545694][T20158] dump_stack_lvl+0x100/0x190 [ 896.545724][T20158] should_fail_ex.cold+0x5/0xa [ 896.545743][T20158] get_futex_key+0x1d2/0x1620 [ 896.545764][T20158] ? __pfx_get_futex_key+0x10/0x10 [ 896.545789][T20158] futex_wake+0xea/0x530 [ 896.545812][T20158] ? __pfx_futex_wake+0x10/0x10 [ 896.545836][T20158] ? putname+0xb1/0x110 [ 896.545851][T20158] ? kmem_cache_free+0x124/0x6a0 [ 896.545875][T20158] do_futex+0x32b/0x350 [ 896.545894][T20158] ? __pfx_do_futex+0x10/0x10 [ 896.545912][T20158] ? __pfx_do_sys_openat2+0x10/0x10 [ 896.545936][T20158] __x64_sys_futex+0x34f/0x4d0 [ 896.545956][T20158] ? __x64_sys_openat+0x12d/0x210 [ 896.545975][T20158] ? __pfx___x64_sys_futex+0x10/0x10 [ 896.546002][T20158] do_syscall_64+0x106/0xf80 [ 896.546020][T20158] ? clear_bhb_loop+0x40/0x90 [ 896.546038][T20158] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 896.546054][T20158] RIP: 0033:0x7fcf29f9c799 [ 896.546068][T20158] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 896.546083][T20158] RSP: 002b:00007fcf2adc80e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 896.546099][T20158] RAX: ffffffffffffffda RBX: 00007fcf2a216098 RCX: 00007fcf29f9c799 [ 896.546109][T20158] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fcf2a21609c [ 896.546118][T20158] RBP: 00007fcf2a216090 R08: 0000000000000000 R09: 0000000000000000 [ 896.546128][T20158] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000000 [ 896.546136][T20158] R13: 00007fcf2a216128 R14: 00007ffded56e470 R15: 00007ffded56e558 [ 896.546156][T20158] [ 897.052727][ T5829] Process accounting resumed [ 898.179211][T20206] netlink: 'syz.1.3044': attribute type 5 has an invalid length. [ 898.439840][T20208] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3045'. [ 904.169883][T20254] FAULT_INJECTION: forcing a failure. [ 904.169883][T20254] name failslab, interval 1, probability 0, space 0, times 0 [ 904.222562][T20254] CPU: 0 UID: 0 PID: 20254 Comm: syz.0.3054 Tainted: G U L syzkaller #0 PREEMPT(full) [ 904.222591][T20254] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 904.222598][T20254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 904.222607][T20254] Call Trace: [ 904.222613][T20254] [ 904.222619][T20254] dump_stack_lvl+0x100/0x190 [ 904.222646][T20254] should_fail_ex.cold+0x5/0xa [ 904.222665][T20254] should_failslab+0xc2/0x120 [ 904.222682][T20254] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 904.222704][T20254] ? skb_clone+0x190/0x400 [ 904.222725][T20254] skb_clone+0x190/0x400 [ 904.222744][T20254] netlink_deliver_tap+0xaed/0xcc0 [ 904.222767][T20254] netlink_unicast+0x650/0x870 [ 904.222789][T20254] ? __pfx_netlink_unicast+0x10/0x10 [ 904.222853][T20254] ? __asan_memset+0x23/0x50 [ 904.222875][T20254] ? __build_skb_around+0x278/0x390 [ 904.222899][T20254] ? is_vmalloc_addr+0x86/0xa0 [ 904.222923][T20254] netlink_sendmsg+0x8b0/0xda0 [ 904.222945][T20254] ? __pfx_netlink_sendmsg+0x10/0x10 [ 904.222967][T20254] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 904.222992][T20254] sock_write_iter+0x566/0x610 [ 904.223014][T20254] ? __pfx_sock_write_iter+0x10/0x10 [ 904.223042][T20254] ? bpf_lsm_file_permission+0x9/0x10 [ 904.223065][T20254] ? security_file_permission+0x76/0x210 [ 904.223081][T20254] ? rw_verify_area+0xce/0x6d0 [ 904.223104][T20254] vfs_write+0x6ac/0x1070 [ 904.223128][T20254] ? __pfx_sock_write_iter+0x10/0x10 [ 904.223151][T20254] ? __pfx_vfs_write+0x10/0x10 [ 904.223172][T20254] ? find_held_lock+0x2b/0x80 [ 904.223199][T20254] ksys_write+0x1f8/0x250 [ 904.223222][T20254] ? __pfx_ksys_write+0x10/0x10 [ 904.223250][T20254] do_syscall_64+0x106/0xf80 [ 904.223268][T20254] ? clear_bhb_loop+0x40/0x90 [ 904.223287][T20254] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 904.223303][T20254] RIP: 0033:0x7fe5c779c799 [ 904.223316][T20254] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 904.223332][T20254] RSP: 002b:00007fe5c8706028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 904.223347][T20254] RAX: ffffffffffffffda RBX: 00007fe5c7a15fa0 RCX: 00007fe5c779c799 [ 904.223357][T20254] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000002 [ 904.223366][T20254] RBP: 00007fe5c8706090 R08: 0000000000000000 R09: 0000000000000000 [ 904.223375][T20254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 904.223384][T20254] R13: 00007fe5c7a16038 R14: 00007fe5c7a15fa0 R15: 00007ffd9bd15928 [ 904.223404][T20254] [ 904.567427][T20255] FAULT_INJECTION: forcing a failure. [ 904.567427][T20255] name failslab, interval 1, probability 0, space 0, times 0 [ 904.672024][T20255] CPU: 0 UID: 0 PID: 20255 Comm: syz.2.3053 Tainted: G U L syzkaller #0 PREEMPT(full) [ 904.672054][T20255] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 904.672061][T20255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 904.672071][T20255] Call Trace: [ 904.672077][T20255] [ 904.672084][T20255] dump_stack_lvl+0x100/0x190 [ 904.672113][T20255] should_fail_ex.cold+0x5/0xa [ 904.672132][T20255] should_failslab+0xc2/0x120 [ 904.672148][T20255] __kmalloc_cache_noprof+0x7a/0x6f0 [ 904.672168][T20255] ? sctp_auth_shkey_create+0x9e/0x210 [ 904.672191][T20255] sctp_auth_shkey_create+0x9e/0x210 [ 904.672214][T20255] sctp_endpoint_new+0x589/0xb20 [ 904.672235][T20255] ? __pfx_sctp_endpoint_new+0x10/0x10 [ 904.672256][T20255] ? lockdep_init_map_type+0x5c/0x250 [ 904.672275][T20255] ? lockdep_init_map_type+0x5c/0x250 [ 904.672298][T20255] sctp_init_sock+0xe2b/0x1300 [ 904.672317][T20255] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 904.672335][T20255] sctp_v6_init_sock+0x16/0x70 [ 904.672352][T20255] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 904.672370][T20255] inet6_create+0xb21/0x12b0 [ 904.672389][T20255] ? inet6_create+0x7f/0x12b0 [ 904.672409][T20255] __sock_create+0x339/0x860 [ 904.672435][T20255] __sys_socket+0x14d/0x260 [ 904.672459][T20255] ? __pfx___sys_socket+0x10/0x10 [ 904.672487][T20255] __x64_sys_socket+0x72/0xb0 [ 904.672510][T20255] ? lockdep_hardirqs_on+0x78/0x100 [ 904.672528][T20255] do_syscall_64+0x106/0xf80 [ 904.672545][T20255] ? clear_bhb_loop+0x40/0x90 [ 904.672563][T20255] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 904.672579][T20255] RIP: 0033:0x7f54ce99c799 [ 904.672594][T20255] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 904.672608][T20255] RSP: 002b:00007f54cf8a2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 904.672624][T20255] RAX: ffffffffffffffda RBX: 00007f54cec16090 RCX: 00007f54ce99c799 [ 904.672634][T20255] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 904.672643][T20255] RBP: 00007f54cea32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 904.672652][T20255] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 904.672661][T20255] R13: 00007f54cec16128 R14: 00007f54cec16090 R15: 00007ffe76ed4b88 [ 904.672680][T20255] [ 906.217515][T20266] netlink: 10409 bytes leftover after parsing attributes in process `syz.0.3056'. [ 907.241838][T20277] nbd: couldn't find a device at index 35644 [ 907.779312][T20285] FAULT_INJECTION: forcing a failure. [ 907.779312][T20285] name failslab, interval 1, probability 0, space 0, times 0 [ 907.821370][T20285] CPU: 0 UID: 0 PID: 20285 Comm: syz.1.3060 Tainted: G U L syzkaller #0 PREEMPT(full) [ 907.821401][T20285] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 907.821408][T20285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 907.821418][T20285] Call Trace: [ 907.821424][T20285] [ 907.821431][T20285] dump_stack_lvl+0x100/0x190 [ 907.821459][T20285] should_fail_ex.cold+0x5/0xa [ 907.821478][T20285] should_failslab+0xc2/0x120 [ 907.821495][T20285] __kmalloc_cache_noprof+0x7a/0x6f0 [ 907.821514][T20285] ? sctp_auth_shkey_create+0x9e/0x210 [ 907.821537][T20285] sctp_auth_shkey_create+0x9e/0x210 [ 907.821557][T20285] sctp_endpoint_new+0x589/0xb20 [ 907.821578][T20285] ? __pfx_sctp_endpoint_new+0x10/0x10 [ 907.821599][T20285] ? lockdep_init_map_type+0x5c/0x250 [ 907.821619][T20285] ? lockdep_init_map_type+0x5c/0x250 [ 907.821641][T20285] sctp_init_sock+0xe2b/0x1300 [ 907.821658][T20285] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 907.821677][T20285] sctp_v6_init_sock+0x16/0x70 [ 907.821693][T20285] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 907.821711][T20285] inet6_create+0xb21/0x12b0 [ 907.821731][T20285] ? inet6_create+0x7f/0x12b0 [ 907.821750][T20285] __sock_create+0x339/0x860 [ 907.821777][T20285] __sys_socket+0x14d/0x260 [ 907.821808][T20285] ? __pfx___sys_socket+0x10/0x10 [ 907.821836][T20285] __x64_sys_socket+0x72/0xb0 [ 907.821859][T20285] ? lockdep_hardirqs_on+0x78/0x100 [ 907.821877][T20285] do_syscall_64+0x106/0xf80 [ 907.821894][T20285] ? clear_bhb_loop+0x40/0x90 [ 907.821914][T20285] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 907.821930][T20285] RIP: 0033:0x7fcf29f9c799 [ 907.821944][T20285] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 907.821959][T20285] RSP: 002b:00007fcf2adc8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 907.821975][T20285] RAX: ffffffffffffffda RBX: 00007fcf2a216090 RCX: 00007fcf29f9c799 [ 907.821985][T20285] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 907.821994][T20285] RBP: 00007fcf2a032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 907.822003][T20285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 907.822012][T20285] R13: 00007fcf2a216128 R14: 00007fcf2a216090 R15: 00007ffded56e558 [ 907.822031][T20285] [ 910.311420][T20311] FAULT_INJECTION: forcing a failure. [ 910.311420][T20311] name failslab, interval 1, probability 0, space 0, times 0 [ 910.377363][T20311] CPU: 0 UID: 0 PID: 20311 Comm: syz.3.3066 Tainted: G U L syzkaller #0 PREEMPT(full) [ 910.377393][T20311] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 910.377399][T20311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 910.377409][T20311] Call Trace: [ 910.377414][T20311] [ 910.377420][T20311] dump_stack_lvl+0x100/0x190 [ 910.377448][T20311] should_fail_ex.cold+0x5/0xa [ 910.377467][T20311] should_failslab+0xc2/0x120 [ 910.377483][T20311] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 910.377505][T20311] ? taskstats_exit+0x650/0xbd0 [ 910.377532][T20311] taskstats_exit+0x650/0xbd0 [ 910.377554][T20311] ? __pfx_acct_update_integrals+0x10/0x10 [ 910.377579][T20311] ? __pfx_taskstats_exit+0x10/0x10 [ 910.377603][T20311] ? rcu_read_lock_any_held+0x6a/0xa0 [ 910.377626][T20311] ? exit_signals+0x395/0xaf0 [ 910.377644][T20311] do_exit+0x5ca/0x2aa0 [ 910.377666][T20311] ? __pfx_do_exit+0x10/0x10 [ 910.377685][T20311] ? do_raw_spin_lock+0x128/0x260 [ 910.377707][T20311] ? find_held_lock+0x2b/0x80 [ 910.377720][T20311] ? get_signal+0x7e0/0x21e0 [ 910.377737][T20311] do_group_exit+0xd5/0x2a0 [ 910.377758][T20311] get_signal+0x1ec7/0x21e0 [ 910.377781][T20311] ? __pfx_get_signal+0x10/0x10 [ 910.377797][T20311] ? do_futex+0x192/0x350 [ 910.377819][T20311] arch_do_signal_or_restart+0x91/0x770 [ 910.377839][T20311] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 910.377863][T20311] ? __pfx___x64_sys_futex+0x10/0x10 [ 910.377886][T20311] exit_to_user_mode_loop+0x86/0x4a0 [ 910.377907][T20311] do_syscall_64+0x668/0xf80 [ 910.377925][T20311] ? clear_bhb_loop+0x40/0x90 [ 910.377944][T20311] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 910.377959][T20311] RIP: 0033:0x7fa3e239c799 [ 910.377973][T20311] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 910.377988][T20311] RSP: 002b:00007fa3e32af0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 910.378004][T20311] RAX: fffffffffffffe00 RBX: 00007fa3e2615fa8 RCX: 00007fa3e239c799 [ 910.378014][T20311] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fa3e2615fa8 [ 910.378024][T20311] RBP: 00007fa3e2615fa0 R08: 0000000000000000 R09: 0000000000000000 [ 910.378033][T20311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 910.378042][T20311] R13: 00007fa3e2616038 R14: 00007ffe14f24cd0 R15: 00007ffe14f24db8 [ 910.378061][T20311] [ 910.943583][T20313] FAULT_INJECTION: forcing a failure. [ 910.943583][T20313] name failslab, interval 1, probability 0, space 0, times 0 [ 911.002336][T20313] CPU: 0 UID: 0 PID: 20313 Comm: syz.1.3067 Tainted: G U L syzkaller #0 PREEMPT(full) [ 911.002365][T20313] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 911.002372][T20313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 911.002382][T20313] Call Trace: [ 911.002388][T20313] [ 911.002395][T20313] dump_stack_lvl+0x100/0x190 [ 911.002423][T20313] should_fail_ex.cold+0x5/0xa [ 911.002443][T20313] should_failslab+0xc2/0x120 [ 911.002459][T20313] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 911.002483][T20313] ? __d_alloc+0x34/0xa80 [ 911.002500][T20313] ? lockdep_init_map_type+0x5c/0x250 [ 911.002523][T20313] __d_alloc+0x34/0xa80 [ 911.002541][T20313] d_alloc_pseudo+0x1c/0xc0 [ 911.002561][T20313] alloc_file_pseudo+0xcf/0x230 [ 911.002582][T20313] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 911.002601][T20313] ? alloc_fd+0x476/0x790 [ 911.002618][T20313] sock_alloc_file+0x50/0x210 [ 911.002638][T20313] __sys_socket+0x1c0/0x260 [ 911.002661][T20313] ? __pfx___sys_socket+0x10/0x10 [ 911.002689][T20313] __x64_sys_socket+0x72/0xb0 [ 911.002711][T20313] ? lockdep_hardirqs_on+0x78/0x100 [ 911.002730][T20313] do_syscall_64+0x106/0xf80 [ 911.002746][T20313] ? clear_bhb_loop+0x40/0x90 [ 911.002765][T20313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 911.002781][T20313] RIP: 0033:0x7fcf29f9c799 [ 911.002795][T20313] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 911.002810][T20313] RSP: 002b:00007fcf2adc8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 911.002825][T20313] RAX: ffffffffffffffda RBX: 00007fcf2a216090 RCX: 00007fcf29f9c799 [ 911.002835][T20313] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 911.002844][T20313] RBP: 00007fcf2a032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 911.002854][T20313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 911.002863][T20313] R13: 00007fcf2a216128 R14: 00007fcf2a216090 R15: 00007ffded56e558 [ 911.002883][T20313] [ 911.330782][T20316] netlink: 10445 bytes leftover after parsing attributes in process `syz.3.3068'. [ 912.939698][T20332] netlink: 10465 bytes leftover after parsing attributes in process `syz.0.3073'. [ 914.002489][T20345] FAULT_INJECTION: forcing a failure. [ 914.002489][T20345] name failslab, interval 1, probability 0, space 0, times 0 [ 914.066042][T20345] CPU: 0 UID: 0 PID: 20345 Comm: syz.0.3076 Tainted: G U L syzkaller #0 PREEMPT(full) [ 914.066072][T20345] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 914.066078][T20345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 914.066088][T20345] Call Trace: [ 914.066093][T20345] [ 914.066100][T20345] dump_stack_lvl+0x100/0x190 [ 914.066127][T20345] should_fail_ex.cold+0x5/0xa [ 914.066146][T20345] should_failslab+0xc2/0x120 [ 914.066162][T20345] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 914.066184][T20345] ? taskstats_exit+0x650/0xbd0 [ 914.066211][T20345] taskstats_exit+0x650/0xbd0 [ 914.066234][T20345] ? __pfx_acct_update_integrals+0x10/0x10 [ 914.066258][T20345] ? __pfx_taskstats_exit+0x10/0x10 [ 914.066282][T20345] ? rcu_read_lock_any_held+0x6a/0xa0 [ 914.066307][T20345] ? exit_signals+0x395/0xaf0 [ 914.066324][T20345] do_exit+0x5ca/0x2aa0 [ 914.066346][T20345] ? __pfx_do_exit+0x10/0x10 [ 914.066365][T20345] ? do_raw_spin_lock+0x128/0x260 [ 914.066386][T20345] ? find_held_lock+0x2b/0x80 [ 914.066399][T20345] ? get_signal+0x7e0/0x21e0 [ 914.066416][T20345] do_group_exit+0xd5/0x2a0 [ 914.066437][T20345] get_signal+0x1ec7/0x21e0 [ 914.066460][T20345] ? __pfx_get_signal+0x10/0x10 [ 914.066476][T20345] ? do_futex+0x192/0x350 [ 914.066498][T20345] arch_do_signal_or_restart+0x91/0x770 [ 914.066518][T20345] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 914.066541][T20345] ? __pfx___x64_sys_futex+0x10/0x10 [ 914.066565][T20345] exit_to_user_mode_loop+0x86/0x4a0 [ 914.066586][T20345] do_syscall_64+0x668/0xf80 [ 914.066603][T20345] ? clear_bhb_loop+0x40/0x90 [ 914.066622][T20345] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 914.066638][T20345] RIP: 0033:0x7fe5c779c799 [ 914.066651][T20345] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 914.066666][T20345] RSP: 002b:00007fe5c87060e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 914.066691][T20345] RAX: fffffffffffffe00 RBX: 00007fe5c7a15fa8 RCX: 00007fe5c779c799 [ 914.066702][T20345] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fe5c7a15fa8 [ 914.066711][T20345] RBP: 00007fe5c7a15fa0 R08: 0000000000000000 R09: 0000000000000000 [ 914.066720][T20345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 914.066729][T20345] R13: 00007fe5c7a16038 R14: 00007ffd9bd15840 R15: 00007ffd9bd15928 [ 914.066749][T20345] [ 914.624248][T20357] netlink: 10445 bytes leftover after parsing attributes in process `syz.1.3080'. [ 917.330640][T20380] FAULT_INJECTION: forcing a failure. [ 917.330640][T20380] name failslab, interval 1, probability 0, space 0, times 0 [ 917.487048][T20380] CPU: 0 UID: 0 PID: 20380 Comm: syz.2.3083 Tainted: G U L syzkaller #0 PREEMPT(full) [ 917.487077][T20380] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 917.487084][T20380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 917.487093][T20380] Call Trace: [ 917.487101][T20380] [ 917.487108][T20380] dump_stack_lvl+0x100/0x190 [ 917.487136][T20380] should_fail_ex.cold+0x5/0xa [ 917.487155][T20380] should_failslab+0xc2/0x120 [ 917.487171][T20380] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 917.487193][T20380] ? skb_clone+0x190/0x400 [ 917.487221][T20380] skb_clone+0x190/0x400 [ 917.487240][T20380] netlink_deliver_tap+0xaed/0xcc0 [ 917.487263][T20380] netlink_unicast+0x70c/0x870 [ 917.487285][T20380] ? __pfx_netlink_unicast+0x10/0x10 [ 917.487304][T20380] ? __alloc_skb+0x5b7/0x710 [ 917.487320][T20380] ? __dev_queue_xmit+0x8a0/0x4800 [ 917.487343][T20380] ? __dev_queue_xmit+0x8a0/0x4800 [ 917.487364][T20380] ? __dev_queue_xmit+0x5af/0x4800 [ 917.487390][T20380] netlink_ack+0x655/0xb80 [ 917.487415][T20380] netlink_rcv_skb+0x333/0x420 [ 917.487434][T20380] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 917.487460][T20380] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 917.487488][T20380] ? ns_capable+0xd2/0xf0 [ 917.487505][T20380] nfnetlink_rcv+0x1b3/0x440 [ 917.487528][T20380] ? __pfx_nfnetlink_rcv+0x10/0x10 [ 917.487551][T20380] ? netlink_deliver_tap+0x1ae/0xcc0 [ 917.487572][T20380] netlink_unicast+0x5aa/0x870 [ 917.487594][T20380] ? __pfx_netlink_unicast+0x10/0x10 [ 917.487612][T20380] ? __asan_memset+0x23/0x50 [ 917.487632][T20380] ? __build_skb_around+0x278/0x390 [ 917.487657][T20380] ? is_vmalloc_addr+0x86/0xa0 [ 917.487680][T20380] netlink_sendmsg+0x8b0/0xda0 [ 917.487702][T20380] ? __pfx_netlink_sendmsg+0x10/0x10 [ 917.487724][T20380] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 917.487748][T20380] sock_write_iter+0x566/0x610 [ 917.487770][T20380] ? __pfx_sock_write_iter+0x10/0x10 [ 917.487798][T20380] ? bpf_lsm_file_permission+0x9/0x10 [ 917.487821][T20380] ? security_file_permission+0x76/0x210 [ 917.487838][T20380] ? rw_verify_area+0xce/0x6d0 [ 917.487860][T20380] vfs_write+0x6ac/0x1070 [ 917.487884][T20380] ? __pfx_sock_write_iter+0x10/0x10 [ 917.487907][T20380] ? __pfx_vfs_write+0x10/0x10 [ 917.487928][T20380] ? find_held_lock+0x2b/0x80 [ 917.487954][T20380] ksys_write+0x1f8/0x250 [ 917.487976][T20380] ? __pfx_ksys_write+0x10/0x10 [ 917.488004][T20380] do_syscall_64+0x106/0xf80 [ 917.488022][T20380] ? clear_bhb_loop+0x40/0x90 [ 917.488041][T20380] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 917.488057][T20380] RIP: 0033:0x7f54ce99c799 [ 917.488070][T20380] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 917.488087][T20380] RSP: 002b:00007f54cf8c3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 917.488103][T20380] RAX: ffffffffffffffda RBX: 00007f54cec15fa0 RCX: 00007f54ce99c799 [ 917.488113][T20380] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000002 [ 917.488122][T20380] RBP: 00007f54cf8c3090 R08: 0000000000000000 R09: 0000000000000000 [ 917.488131][T20380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 917.488140][T20380] R13: 00007f54cec16038 R14: 00007f54cec15fa0 R15: 00007ffe76ed4b88 [ 917.488160][T20380] [ 919.102454][T20394] FAULT_INJECTION: forcing a failure. [ 919.102454][T20394] name failslab, interval 1, probability 0, space 0, times 0 [ 919.175346][T20394] CPU: 0 UID: 0 PID: 20394 Comm: syz.2.3085 Tainted: G U L syzkaller #0 PREEMPT(full) [ 919.175376][T20394] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 919.175382][T20394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 919.175393][T20394] Call Trace: [ 919.175399][T20394] [ 919.175405][T20394] dump_stack_lvl+0x100/0x190 [ 919.175433][T20394] should_fail_ex.cold+0x5/0xa [ 919.175452][T20394] should_failslab+0xc2/0x120 [ 919.175470][T20394] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 919.175493][T20394] ? __d_alloc+0x34/0xa80 [ 919.175509][T20394] ? lockdep_init_map_type+0x5c/0x250 [ 919.175532][T20394] __d_alloc+0x34/0xa80 [ 919.175550][T20394] d_alloc_pseudo+0x1c/0xc0 [ 919.175571][T20394] alloc_file_pseudo+0xcf/0x230 [ 919.175591][T20394] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 919.175609][T20394] ? alloc_fd+0x476/0x790 [ 919.175627][T20394] sock_alloc_file+0x50/0x210 [ 919.175647][T20394] __sys_socket+0x1c0/0x260 [ 919.175670][T20394] ? __pfx___sys_socket+0x10/0x10 [ 919.175699][T20394] __x64_sys_socket+0x72/0xb0 [ 919.175722][T20394] ? lockdep_hardirqs_on+0x78/0x100 [ 919.175740][T20394] do_syscall_64+0x106/0xf80 [ 919.175757][T20394] ? clear_bhb_loop+0x40/0x90 [ 919.175776][T20394] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 919.175792][T20394] RIP: 0033:0x7f54ce99c799 [ 919.175806][T20394] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 919.175821][T20394] RSP: 002b:00007f54cf8a2028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 919.175837][T20394] RAX: ffffffffffffffda RBX: 00007f54cec16090 RCX: 00007f54ce99c799 [ 919.175851][T20394] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 919.175860][T20394] RBP: 00007f54cea32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 919.175869][T20394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 919.175878][T20394] R13: 00007f54cec16128 R14: 00007f54cec16090 R15: 00007ffe76ed4b88 [ 919.175898][T20394] [ 919.617356][T20403] netlink: 10473 bytes leftover after parsing attributes in process `syz.2.3090'. [ 920.989446][ T5913] Process accounting resumed [ 921.154301][T20440] kmem.tcp.limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 923.370322][T20469] netlink: 10473 bytes leftover after parsing attributes in process `syz.3.3103'. [ 923.622435][T20472] FAULT_INJECTION: forcing a failure. [ 923.622435][T20472] name failslab, interval 1, probability 0, space 0, times 0 [ 924.236573][T20472] CPU: 0 UID: 0 PID: 20472 Comm: syz.0.3102 Tainted: G U L syzkaller #0 PREEMPT(full) [ 924.236605][T20472] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 924.236612][T20472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 924.236621][T20472] Call Trace: [ 924.236628][T20472] [ 924.236634][T20472] dump_stack_lvl+0x100/0x190 [ 924.236663][T20472] should_fail_ex.cold+0x5/0xa [ 924.236683][T20472] ? ima_alloc_init_template+0xb6/0x6d0 [ 924.236704][T20472] should_failslab+0xc2/0x120 [ 924.236720][T20472] __kmalloc_noprof+0xe0/0x850 [ 924.236747][T20472] ima_alloc_init_template+0xb6/0x6d0 [ 924.236773][T20472] ima_store_measurement+0x1e3/0x5b0 [ 924.236796][T20472] ? __pfx_ima_store_measurement+0x10/0x10 [ 924.236826][T20472] ? __pfx_ima_get_hash_algo+0x10/0x10 [ 924.236848][T20472] process_measurement+0x19cc/0x2350 [ 924.236876][T20472] ? __pfx_process_measurement+0x10/0x10 [ 924.236897][T20472] ? trace_contention_end+0x140/0x180 [ 924.236920][T20472] ? find_held_lock+0x2b/0x80 [ 924.236934][T20472] ? trace_array_get+0xd8/0x100 [ 924.236948][T20472] ? trace_array_get+0xd8/0x100 [ 924.236978][T20472] ? bpf_lsm_locked_down+0x9/0x10 [ 924.236993][T20472] ? security_locked_down+0x70/0x1e0 [ 924.237010][T20472] ? tracing_open_generic+0x94/0xc0 [ 924.237032][T20472] ? subsystem_open+0x1bc/0x4b0 [ 924.237047][T20472] ? inode_to_bdi+0x9e/0x160 [ 924.237064][T20472] ima_file_check+0xcc/0x120 [ 924.237085][T20472] ? __pfx_ima_file_check+0x10/0x10 [ 924.237109][T20472] security_file_post_open+0xc4/0x210 [ 924.237133][T20472] path_openat+0x1418/0x31a0 [ 924.237155][T20472] ? __pfx_path_openat+0x10/0x10 [ 924.237178][T20472] do_file_open+0x20e/0x430 [ 924.237195][T20472] ? __pfx_do_file_open+0x10/0x10 [ 924.237224][T20472] ? alloc_fd+0x476/0x790 [ 924.237241][T20472] ? do_getname+0x191/0x390 [ 924.237261][T20472] do_sys_openat2+0x10d/0x1e0 [ 924.237280][T20472] ? __pfx_do_sys_openat2+0x10/0x10 [ 924.237307][T20472] __x64_sys_openat+0x12d/0x210 [ 924.237327][T20472] ? __pfx___x64_sys_openat+0x10/0x10 [ 924.237354][T20472] do_syscall_64+0x106/0xf80 [ 924.237372][T20472] ? clear_bhb_loop+0x40/0x90 [ 924.237391][T20472] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 924.237406][T20472] RIP: 0033:0x7fe5c779c799 [ 924.237421][T20472] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 924.237446][T20472] RSP: 002b:00007fe5c86c4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 924.237462][T20472] RAX: ffffffffffffffda RBX: 00007fe5c7a16180 RCX: 00007fe5c779c799 [ 924.237472][T20472] RDX: 0000000000000400 RSI: 00002000000001c0 RDI: ffffffffffffff9c [ 924.237482][T20472] RBP: 00007fe5c7832bd9 R08: 0000000000000000 R09: 0000000000000000 [ 924.237492][T20472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 924.237501][T20472] R13: 00007fe5c7a16218 R14: 00007fe5c7a16180 R15: 00007ffd9bd15928 [ 924.237522][T20472] [ 924.237694][ T29] audit: type=1804 audit(4294967298.130:19): pid=20472 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=add_template_measure cause=ENOMEM comm="syz.0.3102" name="/newroot/sys/kernel/tracing/events/vmalloc/filter" dev="tracefs" ino=19680823 res=0 errno=0 [ 925.470998][T20511] nbd: couldn't find a device at index 35644 [ 925.513516][T20516] netlink: 342 bytes leftover after parsing attributes in process `syz.3.3115'. [ 925.565123][T20516] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3115'. [ 925.637857][ T5829] Process accounting resumed [ 926.171915][T20528] FAULT_INJECTION: forcing a failure. [ 926.171915][T20528] name failslab, interval 1, probability 0, space 0, times 0 [ 926.221419][T20528] CPU: 0 UID: 0 PID: 20528 Comm: syz.3.3117 Tainted: G U L syzkaller #0 PREEMPT(full) [ 926.221450][T20528] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 926.221457][T20528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 926.221466][T20528] Call Trace: [ 926.221472][T20528] [ 926.221479][T20528] dump_stack_lvl+0x100/0x190 [ 926.221507][T20528] should_fail_ex.cold+0x5/0xa [ 926.221527][T20528] should_failslab+0xc2/0x120 [ 926.221544][T20528] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 926.221566][T20528] ? __kernfs_new_node+0xd2/0x960 [ 926.221591][T20528] __kernfs_new_node+0xd2/0x960 [ 926.221613][T20528] ? __lock_acquire+0x4a5/0x2630 [ 926.221632][T20528] ? __pfx___kernfs_new_node+0x10/0x10 [ 926.221658][T20528] ? find_held_lock+0x2b/0x80 [ 926.221671][T20528] ? kernfs_root+0xee/0x2a0 [ 926.221690][T20528] ? kernfs_root+0xee/0x2a0 [ 926.221714][T20528] kernfs_new_node+0x11b/0x1a0 [ 926.221739][T20528] __kernfs_create_file+0x53/0x350 [ 926.221759][T20528] sysfs_add_file_mode_ns+0x207/0x3c0 [ 926.221783][T20528] internal_create_group+0x593/0xf40 [ 926.221809][T20528] ? __pfx_internal_create_group+0x10/0x10 [ 926.221834][T20528] ? kernfs_create_link+0x1bd/0x240 [ 926.221853][T20528] internal_create_groups+0x9d/0x150 [ 926.221876][T20528] device_add+0xf5b/0x1950 [ 926.221906][T20528] ? __pfx_device_add+0x10/0x10 [ 926.221930][T20528] ? lockdep_init_map_type+0x5c/0x250 [ 926.221950][T20528] ? __init_waitqueue_head+0xca/0x150 [ 926.221978][T20528] netdev_register_kobject+0x1a9/0x3d0 [ 926.222003][T20528] register_netdevice+0x12e0/0x2210 [ 926.222027][T20528] ? __pfx_register_netdevice+0x10/0x10 [ 926.222051][T20528] ? __pfx_loopback_net_init+0x10/0x10 [ 926.222073][T20528] register_netdev+0x34/0x50 [ 926.222091][T20528] loopback_net_init+0x7a/0x170 [ 926.222113][T20528] ? __pfx_loopback_net_init+0x10/0x10 [ 926.222133][T20528] ops_init+0x1e2/0x5f0 [ 926.222154][T20528] setup_net+0x118/0x3a0 [ 926.222172][T20528] ? __pfx_setup_net+0x10/0x10 [ 926.222189][T20528] ? lockdep_init_map_type+0x5c/0x250 [ 926.222209][T20528] ? mutex_init_lockep+0x110/0x150 [ 926.222232][T20528] copy_net_ns+0x46f/0x7c0 [ 926.222261][T20528] create_new_namespaces+0x3ea/0xac0 [ 926.222284][T20528] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 926.222304][T20528] ksys_unshare+0x473/0xad0 [ 926.222324][T20528] ? __pfx_ksys_unshare+0x10/0x10 [ 926.222351][T20528] __x64_sys_unshare+0x31/0x40 [ 926.222369][T20528] do_syscall_64+0x106/0xf80 [ 926.222387][T20528] ? clear_bhb_loop+0x40/0x90 [ 926.222408][T20528] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 926.222424][T20528] RIP: 0033:0x7fa3e239c799 [ 926.222438][T20528] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 926.222453][T20528] RSP: 002b:00007fa3e32af028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 926.222470][T20528] RAX: ffffffffffffffda RBX: 00007fa3e2615fa0 RCX: 00007fa3e239c799 [ 926.222482][T20528] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 926.222491][T20528] RBP: 00007fa3e2432bd9 R08: 0000000000000000 R09: 0000000000000000 [ 926.222501][T20528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 926.222511][T20528] R13: 00007fa3e2616038 R14: 00007fa3e2615fa0 R15: 00007ffe14f24db8 [ 926.222531][T20528] [ 927.416807][T20549] dvb_demux: dvb_demux_feed_del: feed not in list (type=0 state=0 pid=ffff) [ 927.481267][T20552] netlink: 'syz.0.3124': attribute type 1 has an invalid length. [ 927.612626][T20558] FAULT_INJECTION: forcing a failure. [ 927.612626][T20558] name failslab, interval 1, probability 0, space 0, times 0 [ 927.670431][T20558] CPU: 0 UID: 0 PID: 20558 Comm: syz.1.3125 Tainted: G U L syzkaller #0 PREEMPT(full) [ 927.670461][T20558] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 927.670467][T20558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 927.670478][T20558] Call Trace: [ 927.670484][T20558] [ 927.670490][T20558] dump_stack_lvl+0x100/0x190 [ 927.670518][T20558] should_fail_ex.cold+0x5/0xa [ 927.670537][T20558] should_failslab+0xc2/0x120 [ 927.670554][T20558] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 927.670577][T20558] ? __d_alloc+0x34/0xa80 [ 927.670594][T20558] ? lockdep_init_map_type+0x5c/0x250 [ 927.670616][T20558] __d_alloc+0x34/0xa80 [ 927.670634][T20558] d_alloc_pseudo+0x1c/0xc0 [ 927.670654][T20558] alloc_file_pseudo+0xcf/0x230 [ 927.670674][T20558] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 927.670692][T20558] ? alloc_fd+0x476/0x790 [ 927.670710][T20558] sock_alloc_file+0x50/0x210 [ 927.670731][T20558] __sys_socket+0x1c0/0x260 [ 927.670754][T20558] ? __pfx___sys_socket+0x10/0x10 [ 927.670783][T20558] __x64_sys_socket+0x72/0xb0 [ 927.670805][T20558] ? lockdep_hardirqs_on+0x78/0x100 [ 927.670828][T20558] do_syscall_64+0x106/0xf80 [ 927.670846][T20558] ? clear_bhb_loop+0x40/0x90 [ 927.670867][T20558] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 927.670883][T20558] RIP: 0033:0x7fcf29f9c799 [ 927.670896][T20558] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 927.670911][T20558] RSP: 002b:00007fcf2adc8028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 927.670927][T20558] RAX: ffffffffffffffda RBX: 00007fcf2a216090 RCX: 00007fcf29f9c799 [ 927.670937][T20558] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 927.670946][T20558] RBP: 00007fcf2a032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 927.670956][T20558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 927.670965][T20558] R13: 00007fcf2a216128 R14: 00007fcf2a216090 R15: 00007ffded56e558 [ 927.670985][T20558] [ 928.100310][T20565] loop6: detected capacity change from 0 to 8 [ 928.417855][T20569] ima: Unable to open file: /surit‹¯Ròy/integrity?iqa/policy (-2) [ 928.418917][T20569] ima: policy update failed [ 928.445042][ T29] audit: type=1802 audit(4294967299.590:20): pid=20569 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=policy_update cause=failed comm="syz.3.3128" res=0 errno=0 [ 928.470421][T20569] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3128'. [ 928.815014][T20573] FAULT_INJECTION: forcing a failure. [ 928.815014][T20573] name failslab, interval 1, probability 0, space 0, times 0 [ 928.854137][T20578] netlink: 10473 bytes leftover after parsing attributes in process `syz.2.3130'. [ 928.879718][T20573] CPU: 0 UID: 0 PID: 20573 Comm: syz.1.3137 Tainted: G U L syzkaller #0 PREEMPT(full) [ 928.879747][T20573] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 928.879754][T20573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 928.879763][T20573] Call Trace: [ 928.879770][T20573] [ 928.879776][T20573] dump_stack_lvl+0x100/0x190 [ 928.879804][T20573] should_fail_ex.cold+0x5/0xa [ 928.879825][T20573] should_failslab+0xc2/0x120 [ 928.879841][T20573] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 928.879864][T20573] ? __kernfs_new_node+0xd2/0x960 [ 928.879902][T20573] __kernfs_new_node+0xd2/0x960 [ 928.879927][T20573] ? __pfx___kernfs_new_node+0x10/0x10 [ 928.879954][T20573] ? find_held_lock+0x2b/0x80 [ 928.879968][T20573] ? kernfs_root+0xee/0x2a0 [ 928.879988][T20573] ? kernfs_root+0xee/0x2a0 [ 928.880013][T20573] kernfs_new_node+0x11b/0x1a0 [ 928.880038][T20573] __kernfs_create_file+0x53/0x350 [ 928.880058][T20573] sysfs_add_file_mode_ns+0x207/0x3c0 [ 928.880082][T20573] internal_create_group+0x593/0xf40 [ 928.880108][T20573] ? __pfx_internal_create_group+0x10/0x10 [ 928.880132][T20573] ? kernfs_create_link+0x1bd/0x240 [ 928.880152][T20573] internal_create_groups+0x9d/0x150 [ 928.880175][T20573] device_add+0x71a/0x1950 [ 928.880200][T20573] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 928.880225][T20573] ? __pfx_device_add+0x10/0x10 [ 928.880249][T20573] ? lockdep_init_map_type+0x5c/0x250 [ 928.880269][T20573] ? __init_waitqueue_head+0xca/0x150 [ 928.880296][T20573] netdev_register_kobject+0x1a9/0x3d0 [ 928.880320][T20573] register_netdevice+0x12e0/0x2210 [ 928.880345][T20573] ? __pfx_register_netdevice+0x10/0x10 [ 928.880369][T20573] ? __pfx_loopback_net_init+0x10/0x10 [ 928.880395][T20573] register_netdev+0x34/0x50 [ 928.880413][T20573] loopback_net_init+0x7a/0x170 [ 928.880435][T20573] ? __pfx_loopback_net_init+0x10/0x10 [ 928.880455][T20573] ops_init+0x1e2/0x5f0 [ 928.880476][T20573] setup_net+0x118/0x3a0 [ 928.880495][T20573] ? __pfx_setup_net+0x10/0x10 [ 928.880512][T20573] ? lockdep_init_map_type+0x5c/0x250 [ 928.880533][T20573] ? mutex_init_lockep+0x110/0x150 [ 928.880556][T20573] copy_net_ns+0x46f/0x7c0 [ 928.880578][T20573] create_new_namespaces+0x3ea/0xac0 [ 928.880599][T20573] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 928.880617][T20573] ksys_unshare+0x473/0xad0 [ 928.880637][T20573] ? __pfx_ksys_unshare+0x10/0x10 [ 928.880663][T20573] __x64_sys_unshare+0x31/0x40 [ 928.880681][T20573] do_syscall_64+0x106/0xf80 [ 928.880699][T20573] ? clear_bhb_loop+0x40/0x90 [ 928.880718][T20573] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 928.880735][T20573] RIP: 0033:0x7fcf29f9c799 [ 928.880749][T20573] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 928.880765][T20573] RSP: 002b:00007fcf2ade9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 928.880780][T20573] RAX: ffffffffffffffda RBX: 00007fcf2a215fa0 RCX: 00007fcf29f9c799 [ 928.880791][T20573] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 928.880801][T20573] RBP: 00007fcf2a032bd9 R08: 0000000000000000 R09: 0000000000000000 [ 928.880811][T20573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 928.880820][T20573] R13: 00007fcf2a216038 R14: 00007fcf2a215fa0 R15: 00007ffded56e558 [ 928.880841][T20573] [ 929.958948][ T5249] Process accounting resumed [ 930.426491][T20606] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3136'. [ 930.477514][T20606] bridge0: port 2(bridge_slave_1) entered disabled state [ 930.541659][T20606] bridge_slave_1 (unregistering): left allmulticast mode [ 930.570889][T20606] bridge_slave_1 (unregistering): left promiscuous mode [ 930.598266][T20606] bridge0: port 2(bridge_slave_1) entered disabled state [ 931.669280][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.675701][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 931.819968][T20628] netlink: 10473 bytes leftover after parsing attributes in process `syz.0.3144'. [ 932.759465][T20635] FAULT_INJECTION: forcing a failure. [ 932.759465][T20635] name failslab, interval 1, probability 0, space 0, times 0 [ 932.833696][T20635] CPU: 0 UID: 0 PID: 20635 Comm: syz.2.3145 Tainted: G U L syzkaller #0 PREEMPT(full) [ 932.833727][T20635] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 932.833734][T20635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 932.833744][T20635] Call Trace: [ 932.833750][T20635] [ 932.833757][T20635] dump_stack_lvl+0x100/0x190 [ 932.833787][T20635] should_fail_ex.cold+0x5/0xa [ 932.833806][T20635] should_failslab+0xc2/0x120 [ 932.833822][T20635] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 932.833846][T20635] ? __kernfs_new_node+0xd2/0x960 [ 932.833872][T20635] __kernfs_new_node+0xd2/0x960 [ 932.833895][T20635] ? __pfx___kernfs_new_node+0x10/0x10 [ 932.833921][T20635] ? find_held_lock+0x2b/0x80 [ 932.833936][T20635] ? kernfs_root+0xee/0x2a0 [ 932.833955][T20635] ? kernfs_root+0xee/0x2a0 [ 932.833980][T20635] kernfs_new_node+0x11b/0x1a0 [ 932.834006][T20635] __kernfs_create_file+0x53/0x350 [ 932.834026][T20635] sysfs_add_file_mode_ns+0x207/0x3c0 [ 932.834051][T20635] internal_create_group+0x593/0xf40 [ 932.834077][T20635] ? __pfx_internal_create_group+0x10/0x10 [ 932.834102][T20635] ? kernfs_create_link+0x1bd/0x240 [ 932.834122][T20635] internal_create_groups+0x9d/0x150 [ 932.834145][T20635] device_add+0x71a/0x1950 [ 932.834170][T20635] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 932.834194][T20635] ? __pfx_device_add+0x10/0x10 [ 932.834218][T20635] ? lockdep_init_map_type+0x5c/0x250 [ 932.834238][T20635] ? __init_waitqueue_head+0xca/0x150 [ 932.834265][T20635] netdev_register_kobject+0x1a9/0x3d0 [ 932.834289][T20635] register_netdevice+0x12e0/0x2210 [ 932.834313][T20635] ? __pfx_register_netdevice+0x10/0x10 [ 932.834337][T20635] ? __pfx_loopback_net_init+0x10/0x10 [ 932.834359][T20635] register_netdev+0x34/0x50 [ 932.834377][T20635] loopback_net_init+0x7a/0x170 [ 932.834399][T20635] ? __pfx_loopback_net_init+0x10/0x10 [ 932.834428][T20635] ops_init+0x1e2/0x5f0 [ 932.834450][T20635] setup_net+0x118/0x3a0 [ 932.834470][T20635] ? __pfx_setup_net+0x10/0x10 [ 932.834488][T20635] ? lockdep_init_map_type+0x5c/0x250 [ 932.834508][T20635] ? mutex_init_lockep+0x110/0x150 [ 932.834532][T20635] copy_net_ns+0x46f/0x7c0 [ 932.834554][T20635] create_new_namespaces+0x3ea/0xac0 [ 932.834575][T20635] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 932.834593][T20635] ksys_unshare+0x473/0xad0 [ 932.834613][T20635] ? __pfx_ksys_unshare+0x10/0x10 [ 932.834639][T20635] __x64_sys_unshare+0x31/0x40 [ 932.834657][T20635] do_syscall_64+0x106/0xf80 [ 932.834675][T20635] ? clear_bhb_loop+0x40/0x90 [ 932.834694][T20635] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 932.834711][T20635] RIP: 0033:0x7f54ce99c799 [ 932.834728][T20635] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 932.834743][T20635] RSP: 002b:00007f54cf8c3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 932.834759][T20635] RAX: ffffffffffffffda RBX: 00007f54cec15fa0 RCX: 00007f54ce99c799 [ 932.834770][T20635] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 932.834779][T20635] RBP: 00007f54cea32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 932.834789][T20635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 932.834798][T20635] R13: 00007f54cec16038 R14: 00007f54cec15fa0 R15: 00007ffe76ed4b88 [ 932.834819][T20635] [ 933.549494][T20640] nbd: couldn't find a device at index 35644 [ 933.923996][T20651] netlink: 28 bytes leftover after parsing attributes in process `syz.3.3148'. [ 933.948136][T20651] bridge0: port 2(bridge_slave_1) entered disabled state [ 933.994404][T20651] bridge_slave_1 (unregistering): left allmulticast mode [ 934.016697][T20651] bridge_slave_1 (unregistering): left promiscuous mode [ 934.041677][T20651] bridge0: port 2(bridge_slave_1) entered disabled state [ 934.141078][T20656] netlink: 10477 bytes leftover after parsing attributes in process `syz.0.3149'. [ 938.059738][ T5829] Process accounting resumed [ 940.210645][T20703] netlink: 10477 bytes leftover after parsing attributes in process `syz.1.3159'. [ 941.433969][T20723] netlink: 10477 bytes leftover after parsing attributes in process `syz.2.3164'. [ 942.887496][T20740] netlink: 'syz.2.3169': attribute type 2 has an invalid length. [ 943.600337][T20752] netlink: 10477 bytes leftover after parsing attributes in process `syz.0.3171'. [ 945.057366][T20762] bridge0: port 3(veth0_to_bridge) entered blocking state [ 945.064553][T20762] bridge0: port 3(veth0_to_bridge) entered disabled state [ 945.359634][T20762] veth0_to_bridge: entered allmulticast mode [ 945.388418][T20762] veth0_to_bridge: entered promiscuous mode [ 945.402577][T20762] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 945.453331][T20762] bridge0: port 3(veth0_to_bridge) entered blocking state [ 945.460585][T20762] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 945.527304][T20761] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -4 [ 945.567290][T20761] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -4 [ 945.659416][T20761] faux_driver regulatory: Falling back to sysfs fallback for: regulatory.db [ 945.712678][ T5905] Process accounting resumed [ 946.169456][T20787] FAULT_INJECTION: forcing a failure. [ 946.169456][T20787] name failslab, interval 1, probability 0, space 0, times 0 [ 946.222767][T20787] CPU: 0 UID: 0 PID: 20787 Comm: syz.0.3181 Tainted: G U L syzkaller #0 PREEMPT(full) [ 946.222796][T20787] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 946.222802][T20787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 946.222812][T20787] Call Trace: [ 946.222817][T20787] [ 946.222824][T20787] dump_stack_lvl+0x100/0x190 [ 946.222851][T20787] should_fail_ex.cold+0x5/0xa [ 946.222869][T20787] should_failslab+0xc2/0x120 [ 946.222886][T20787] __kmalloc_cache_noprof+0x7a/0x6f0 [ 946.222905][T20787] ? seq_create_client1+0x4d/0x640 [ 946.222929][T20787] ? __pfx_snd_seq_open+0x10/0x10 [ 946.222948][T20787] seq_create_client1+0x4d/0x640 [ 946.222972][T20787] ? __pfx_snd_seq_open+0x10/0x10 [ 946.222992][T20787] snd_seq_open+0x59/0x590 [ 946.223012][T20787] ? __pfx_snd_seq_open+0x10/0x10 [ 946.223030][T20787] snd_open+0x22d/0x4c0 [ 946.223052][T20787] ? __pfx_snd_open+0x10/0x10 [ 946.223073][T20787] chrdev_open+0x234/0x6a0 [ 946.223088][T20787] ? __pfx_apparmor_file_open+0x10/0x10 [ 946.223110][T20787] ? __pfx_chrdev_open+0x10/0x10 [ 946.223127][T20787] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 946.223147][T20787] do_dentry_open+0x6d8/0x1660 [ 946.223162][T20787] ? __pfx_chrdev_open+0x10/0x10 [ 946.223182][T20787] vfs_open+0x82/0x3f0 [ 946.223203][T20787] path_openat+0x208c/0x31a0 [ 946.223225][T20787] ? __pfx_path_openat+0x10/0x10 [ 946.223247][T20787] do_file_open+0x20e/0x430 [ 946.223264][T20787] ? __pfx_do_file_open+0x10/0x10 [ 946.223293][T20787] ? alloc_fd+0x476/0x790 [ 946.223310][T20787] ? do_getname+0x191/0x390 [ 946.223330][T20787] do_sys_openat2+0x10d/0x1e0 [ 946.223349][T20787] ? __pfx_do_sys_openat2+0x10/0x10 [ 946.223367][T20787] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 946.223389][T20787] ? __fget_files+0x21f/0x3d0 [ 946.223406][T20787] __x64_sys_openat+0x12d/0x210 [ 946.223425][T20787] ? __pfx___x64_sys_openat+0x10/0x10 [ 946.223444][T20787] ? ksys_write+0x1ac/0x250 [ 946.223473][T20787] do_syscall_64+0x106/0xf80 [ 946.223496][T20787] ? clear_bhb_loop+0x40/0x90 [ 946.223514][T20787] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.223530][T20787] RIP: 0033:0x7fe5c779c799 [ 946.223543][T20787] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 946.223558][T20787] RSP: 002b:00007fe5c8706028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 946.223573][T20787] RAX: ffffffffffffffda RBX: 00007fe5c7a15fa0 RCX: 00007fe5c779c799 [ 946.223584][T20787] RDX: 00000000001e3800 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 946.223594][T20787] RBP: 00007fe5c8706090 R08: 0000000000000000 R09: 0000000000000000 [ 946.223603][T20787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 946.223611][T20787] R13: 00007fe5c7a16038 R14: 00007fe5c7a15fa0 R15: 00007ffd9bd15928 [ 946.223631][T20787] [ 946.619439][T20796] FAULT_INJECTION: forcing a failure. [ 946.619439][T20796] name failslab, interval 1, probability 0, space 0, times 0 [ 946.632746][T20796] CPU: 0 UID: 0 PID: 20796 Comm: syz.3.3182 Tainted: G U L syzkaller #0 PREEMPT(full) [ 946.632776][T20796] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 946.632783][T20796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 946.632793][T20796] Call Trace: [ 946.632799][T20796] [ 946.632805][T20796] dump_stack_lvl+0x100/0x190 [ 946.632835][T20796] should_fail_ex.cold+0x5/0xa [ 946.632853][T20796] should_failslab+0xc2/0x120 [ 946.632870][T20796] __kmalloc_cache_noprof+0x7a/0x6f0 [ 946.632890][T20796] ? sctp_auth_shkey_create+0x9e/0x210 [ 946.632912][T20796] sctp_auth_shkey_create+0x9e/0x210 [ 946.632931][T20796] sctp_endpoint_new+0x589/0xb20 [ 946.632952][T20796] ? __pfx_sctp_endpoint_new+0x10/0x10 [ 946.632973][T20796] ? lockdep_init_map_type+0x5c/0x250 [ 946.632993][T20796] ? lockdep_init_map_type+0x5c/0x250 [ 946.633016][T20796] sctp_init_sock+0xe2b/0x1300 [ 946.633033][T20796] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 946.633051][T20796] sctp_v6_init_sock+0x16/0x70 [ 946.633068][T20796] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 946.633085][T20796] inet6_create+0xb21/0x12b0 [ 946.633104][T20796] ? inet6_create+0x7f/0x12b0 [ 946.633124][T20796] __sock_create+0x339/0x860 [ 946.633149][T20796] __sys_socket+0x14d/0x260 [ 946.633172][T20796] ? __pfx___sys_socket+0x10/0x10 [ 946.633200][T20796] __x64_sys_socket+0x72/0xb0 [ 946.633221][T20796] ? lockdep_hardirqs_on+0x78/0x100 [ 946.633239][T20796] do_syscall_64+0x106/0xf80 [ 946.633256][T20796] ? clear_bhb_loop+0x40/0x90 [ 946.633275][T20796] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.633290][T20796] RIP: 0033:0x7fa3e239c799 [ 946.633304][T20796] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 946.633319][T20796] RSP: 002b:00007fa3e326d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 946.633335][T20796] RAX: ffffffffffffffda RBX: 00007fa3e2616180 RCX: 00007fa3e239c799 [ 946.633345][T20796] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 946.633355][T20796] RBP: 00007fa3e2432bd9 R08: 0000000000000000 R09: 0000000000000000 [ 946.633364][T20796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 946.633374][T20796] R13: 00007fa3e2616218 R14: 00007fa3e2616180 R15: 00007ffe14f24db8 [ 946.633394][T20796] [ 948.032039][T20830] FAULT_INJECTION: forcing a failure. [ 948.032039][T20830] name failslab, interval 1, probability 0, space 0, times 0 [ 948.079841][T20830] CPU: 0 UID: 0 PID: 20830 Comm: syz.0.3194 Tainted: G U L syzkaller #0 PREEMPT(full) [ 948.079870][T20830] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 948.079877][T20830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 948.079887][T20830] Call Trace: [ 948.079894][T20830] [ 948.079900][T20830] dump_stack_lvl+0x100/0x190 [ 948.079929][T20830] should_fail_ex.cold+0x5/0xa [ 948.079949][T20830] should_failslab+0xc2/0x120 [ 948.079965][T20830] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 948.079987][T20830] ? alloc_empty_file+0x55/0x1c0 [ 948.080010][T20830] alloc_empty_file+0x55/0x1c0 [ 948.080029][T20830] alloc_file_pseudo+0x13a/0x230 [ 948.080048][T20830] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 948.080067][T20830] ? alloc_fd+0x476/0x790 [ 948.080085][T20830] sock_alloc_file+0x50/0x210 [ 948.080105][T20830] __sys_socket+0x1c0/0x260 [ 948.080129][T20830] ? __pfx___sys_socket+0x10/0x10 [ 948.080158][T20830] __x64_sys_socket+0x72/0xb0 [ 948.080179][T20830] ? lockdep_hardirqs_on+0x78/0x100 [ 948.080197][T20830] do_syscall_64+0x106/0xf80 [ 948.080213][T20830] ? clear_bhb_loop+0x40/0x90 [ 948.080232][T20830] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 948.080247][T20830] RIP: 0033:0x7fe5c779c799 [ 948.080261][T20830] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 948.080276][T20830] RSP: 002b:00007fe5c8706028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 948.080292][T20830] RAX: ffffffffffffffda RBX: 00007fe5c7a15fa0 RCX: 00007fe5c779c799 [ 948.080303][T20830] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 948.080312][T20830] RBP: 00007fe5c7832bd9 R08: 0000000000000000 R09: 0000000000000000 [ 948.080321][T20830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 948.080330][T20830] R13: 00007fe5c7a16038 R14: 00007fe5c7a15fa0 R15: 00007ffd9bd15928 [ 948.080350][T20830] [ 948.358969][T20836] FAULT_INJECTION: forcing a failure. [ 948.358969][T20836] name failslab, interval 1, probability 0, space 0, times 0 [ 948.372299][T20836] CPU: 0 UID: 0 PID: 20836 Comm: syz.0.3203 Tainted: G U L syzkaller #0 PREEMPT(full) [ 948.372330][T20836] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 948.372337][T20836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 948.372347][T20836] Call Trace: [ 948.372353][T20836] [ 948.372359][T20836] dump_stack_lvl+0x100/0x190 [ 948.372389][T20836] should_fail_ex.cold+0x5/0xa [ 948.372408][T20836] should_failslab+0xc2/0x120 [ 948.372424][T20836] __kmalloc_cache_noprof+0x7a/0x6f0 [ 948.372443][T20836] ? sctp_auth_shkey_create+0x9e/0x210 [ 948.372466][T20836] sctp_auth_shkey_create+0x9e/0x210 [ 948.372485][T20836] sctp_endpoint_new+0x589/0xb20 [ 948.372505][T20836] ? __pfx_sctp_endpoint_new+0x10/0x10 [ 948.372527][T20836] ? lockdep_init_map_type+0x5c/0x250 [ 948.372547][T20836] ? lockdep_init_map_type+0x5c/0x250 [ 948.372568][T20836] sctp_init_sock+0xe2b/0x1300 [ 948.372585][T20836] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 948.372603][T20836] sctp_v6_init_sock+0x16/0x70 [ 948.372620][T20836] ? __pfx_sctp_v6_init_sock+0x10/0x10 [ 948.372637][T20836] inet6_create+0xb21/0x12b0 [ 948.372656][T20836] ? inet6_create+0x7f/0x12b0 [ 948.372675][T20836] __sock_create+0x339/0x860 [ 948.372701][T20836] __sys_socket+0x14d/0x260 [ 948.372723][T20836] ? __pfx___sys_socket+0x10/0x10 [ 948.372759][T20836] __x64_sys_socket+0x72/0xb0 [ 948.372782][T20836] ? lockdep_hardirqs_on+0x78/0x100 [ 948.372800][T20836] do_syscall_64+0x106/0xf80 [ 948.372818][T20836] ? clear_bhb_loop+0x40/0x90 [ 948.372838][T20836] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 948.372854][T20836] RIP: 0033:0x7fe5c779c799 [ 948.372869][T20836] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 948.372883][T20836] RSP: 002b:00007fe5c8706028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 948.372899][T20836] RAX: ffffffffffffffda RBX: 00007fe5c7a15fa0 RCX: 00007fe5c779c799 [ 948.372909][T20836] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 948.372918][T20836] RBP: 00007fe5c7832bd9 R08: 0000000000000000 R09: 0000000000000000 [ 948.372927][T20836] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 948.372936][T20836] R13: 00007fe5c7a16038 R14: 00007fe5c7a15fa0 R15: 00007ffd9bd15928 [ 948.372956][T20836] [ 948.706487][T20839] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3196'. [ 949.170398][T20849] FAULT_INJECTION: forcing a failure. [ 949.170398][T20849] name failslab, interval 1, probability 0, space 0, times 0 [ 949.249672][T20849] CPU: 0 UID: 0 PID: 20849 Comm: syz.1.3198 Tainted: G U L syzkaller #0 PREEMPT(full) [ 949.249708][T20849] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 949.249714][T20849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 949.249724][T20849] Call Trace: [ 949.249729][T20849] [ 949.249736][T20849] dump_stack_lvl+0x100/0x190 [ 949.249765][T20849] should_fail_ex.cold+0x5/0xa [ 949.249783][T20849] should_failslab+0xc2/0x120 [ 949.249799][T20849] __kmalloc_cache_noprof+0x7a/0x6f0 [ 949.249819][T20849] ? snd_seq_pool_new+0x44/0x230 [ 949.249846][T20849] ? __pfx_snd_seq_open+0x10/0x10 [ 949.249866][T20849] snd_seq_pool_new+0x44/0x230 [ 949.249890][T20849] seq_create_client1+0x66/0x640 [ 949.249911][T20849] ? __pfx_snd_seq_open+0x10/0x10 [ 949.249931][T20849] snd_seq_open+0x59/0x590 [ 949.249951][T20849] ? __pfx_snd_seq_open+0x10/0x10 [ 949.249969][T20849] snd_open+0x22d/0x4c0 [ 949.249991][T20849] ? __pfx_snd_open+0x10/0x10 [ 949.250012][T20849] chrdev_open+0x234/0x6a0 [ 949.250027][T20849] ? __pfx_apparmor_file_open+0x10/0x10 [ 949.250048][T20849] ? __pfx_chrdev_open+0x10/0x10 [ 949.250064][T20849] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 949.250085][T20849] do_dentry_open+0x6d8/0x1660 [ 949.250099][T20849] ? __pfx_chrdev_open+0x10/0x10 [ 949.250118][T20849] vfs_open+0x82/0x3f0 [ 949.250139][T20849] path_openat+0x208c/0x31a0 [ 949.250161][T20849] ? __pfx_path_openat+0x10/0x10 [ 949.250183][T20849] do_file_open+0x20e/0x430 [ 949.250200][T20849] ? __pfx_do_file_open+0x10/0x10 [ 949.250229][T20849] ? alloc_fd+0x476/0x790 [ 949.250245][T20849] ? do_getname+0x191/0x390 [ 949.250265][T20849] do_sys_openat2+0x10d/0x1e0 [ 949.250284][T20849] ? __pfx_do_sys_openat2+0x10/0x10 [ 949.250302][T20849] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 949.250324][T20849] ? __fget_files+0x21f/0x3d0 [ 949.250340][T20849] __x64_sys_openat+0x12d/0x210 [ 949.250360][T20849] ? __pfx___x64_sys_openat+0x10/0x10 [ 949.250378][T20849] ? ksys_write+0x1ac/0x250 [ 949.250407][T20849] do_syscall_64+0x106/0xf80 [ 949.250425][T20849] ? clear_bhb_loop+0x40/0x90 [ 949.250443][T20849] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 949.250459][T20849] RIP: 0033:0x7fcf29f9c799 [ 949.250472][T20849] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 949.250487][T20849] RSP: 002b:00007fcf2ade9028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 949.250502][T20849] RAX: ffffffffffffffda RBX: 00007fcf2a215fa0 RCX: 00007fcf29f9c799 [ 949.250512][T20849] RDX: 00000000001e3800 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 949.250522][T20849] RBP: 00007fcf2ade9090 R08: 0000000000000000 R09: 0000000000000000 [ 949.250531][T20849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 949.250540][T20849] R13: 00007fcf2a216038 R14: 00007fcf2a215fa0 R15: 00007ffded56e558 [ 949.250560][T20849] [ 950.067985][ T5829] Process accounting resumed [ 950.876981][T20890] FAULT_INJECTION: forcing a failure. [ 950.876981][T20890] name failslab, interval 1, probability 0, space 0, times 0 [ 950.905735][T20890] CPU: 0 UID: 0 PID: 20890 Comm: syz.2.3207 Tainted: G U L syzkaller #0 PREEMPT(full) [ 950.905765][T20890] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 950.905772][T20890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 950.905783][T20890] Call Trace: [ 950.905789][T20890] [ 950.905795][T20890] dump_stack_lvl+0x100/0x190 [ 950.905823][T20890] should_fail_ex.cold+0x5/0xa [ 950.905843][T20890] should_failslab+0xc2/0x120 [ 950.905859][T20890] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 950.905882][T20890] ? alloc_empty_file+0x55/0x1c0 [ 950.905904][T20890] alloc_empty_file+0x55/0x1c0 [ 950.905923][T20890] alloc_file_pseudo+0x13a/0x230 [ 950.905943][T20890] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 950.905961][T20890] ? alloc_fd+0x476/0x790 [ 950.905979][T20890] sock_alloc_file+0x50/0x210 [ 950.905999][T20890] __sys_socket+0x1c0/0x260 [ 950.906022][T20890] ? __pfx___sys_socket+0x10/0x10 [ 950.906051][T20890] __x64_sys_socket+0x72/0xb0 [ 950.906073][T20890] ? lockdep_hardirqs_on+0x78/0x100 [ 950.906090][T20890] do_syscall_64+0x106/0xf80 [ 950.906108][T20890] ? clear_bhb_loop+0x40/0x90 [ 950.906126][T20890] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 950.906141][T20890] RIP: 0033:0x7f54ce99c799 [ 950.906156][T20890] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 950.906171][T20890] RSP: 002b:00007f54cf8c3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 950.906186][T20890] RAX: ffffffffffffffda RBX: 00007f54cec15fa0 RCX: 00007f54ce99c799 [ 950.906196][T20890] RDX: 0000000000000084 RSI: 0000000000000001 RDI: 000000000000000a [ 950.906205][T20890] RBP: 00007f54cea32bd9 R08: 0000000000000000 R09: 0000000000000000 [ 950.906214][T20890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 950.906223][T20890] R13: 00007f54cec16038 R14: 00007f54cec15fa0 R15: 00007ffe76ed4b88 [ 950.906244][T20890] [ 951.545394][T20905] FAULT_INJECTION: forcing a failure. [ 951.545394][T20905] name failslab, interval 1, probability 0, space 0, times 0 [ 951.616394][T20905] CPU: 0 UID: 0 PID: 20905 Comm: syz.0.3212 Tainted: G U L syzkaller #0 PREEMPT(full) [ 951.616422][T20905] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 951.616428][T20905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 951.616437][T20905] Call Trace: [ 951.616443][T20905] [ 951.616449][T20905] dump_stack_lvl+0x100/0x190 [ 951.616476][T20905] should_fail_ex.cold+0x5/0xa [ 951.616495][T20905] should_failslab+0xc2/0x120 [ 951.616511][T20905] __kmalloc_cache_noprof+0x7a/0x6f0 [ 951.616530][T20905] ? snd_seq_fifo_new+0x42/0x270 [ 951.616547][T20905] ? _raw_spin_unlock_irq+0x2e/0x50 [ 951.616565][T20905] ? __pfx_snd_seq_open+0x10/0x10 [ 951.616585][T20905] snd_seq_fifo_new+0x42/0x270 [ 951.616602][T20905] snd_seq_open+0x3fe/0x590 [ 951.616622][T20905] ? __pfx_snd_seq_open+0x10/0x10 [ 951.616640][T20905] snd_open+0x22d/0x4c0 [ 951.616663][T20905] ? __pfx_snd_open+0x10/0x10 [ 951.616683][T20905] chrdev_open+0x234/0x6a0 [ 951.616698][T20905] ? __pfx_apparmor_file_open+0x10/0x10 [ 951.616721][T20905] ? __pfx_chrdev_open+0x10/0x10 [ 951.616737][T20905] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 951.616757][T20905] do_dentry_open+0x6d8/0x1660 [ 951.616773][T20905] ? __pfx_chrdev_open+0x10/0x10 [ 951.616792][T20905] vfs_open+0x82/0x3f0 [ 951.616821][T20905] path_openat+0x208c/0x31a0 [ 951.616843][T20905] ? __pfx_path_openat+0x10/0x10 [ 951.616865][T20905] do_file_open+0x20e/0x430 [ 951.616882][T20905] ? __pfx_do_file_open+0x10/0x10 [ 951.616911][T20905] ? alloc_fd+0x476/0x790 [ 951.616928][T20905] ? do_getname+0x191/0x390 [ 951.616948][T20905] do_sys_openat2+0x10d/0x1e0 [ 951.616967][T20905] ? __pfx_do_sys_openat2+0x10/0x10 [ 951.616984][T20905] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 951.617006][T20905] ? __fget_files+0x21f/0x3d0 [ 951.617023][T20905] __x64_sys_openat+0x12d/0x210 [ 951.617043][T20905] ? __pfx___x64_sys_openat+0x10/0x10 [ 951.617061][T20905] ? ksys_write+0x1ac/0x250 [ 951.617090][T20905] do_syscall_64+0x106/0xf80 [ 951.617107][T20905] ? clear_bhb_loop+0x40/0x90 [ 951.617126][T20905] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 951.617141][T20905] RIP: 0033:0x7fe5c779c799 [ 951.617154][T20905] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 951.617169][T20905] RSP: 002b:00007fe5c8706028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 951.617184][T20905] RAX: ffffffffffffffda RBX: 00007fe5c7a15fa0 RCX: 00007fe5c779c799 [ 951.617194][T20905] RDX: 00000000001e3800 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 951.617204][T20905] RBP: 00007fe5c8706090 R08: 0000000000000000 R09: 0000000000000000 [ 951.617213][T20905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 951.617222][T20905] R13: 00007fe5c7a16038 R14: 00007fe5c7a15fa0 R15: 00007ffd9bd15928 [ 951.617242][T20905] [ 962.393729][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 962.405942][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 962.418705][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 962.430911][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 962.443642][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 962.455941][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 962.468776][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 962.480987][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 962.493765][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 962.505970][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 967.394892][ C0] net_ratelimit: 10062 callbacks suppressed [ 967.394909][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 967.413017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 967.425765][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 967.437956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 967.450724][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 967.462923][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 967.475664][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 967.487832][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 967.500562][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 967.512749][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 969.714760][ C0] sched: DL replenish lagged too much [ 972.405261][ C0] net_ratelimit: 9772 callbacks suppressed [ 972.405279][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 972.423335][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 972.436235][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 972.448495][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 972.461300][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 972.473532][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 972.486317][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 972.498520][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 972.511334][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 972.523552][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 977.414818][ C0] net_ratelimit: 9458 callbacks suppressed [ 977.414836][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 977.432867][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 977.445640][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 977.457824][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 977.470618][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 977.482797][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 977.495572][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 977.507785][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 977.520518][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 977.533013][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 982.424907][ C0] net_ratelimit: 10136 callbacks suppressed [ 982.424925][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 982.443036][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 982.455804][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 982.467984][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 982.480717][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 982.492931][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 982.505673][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 982.517848][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 982.530583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 982.542775][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 987.435327][ C0] net_ratelimit: 10138 callbacks suppressed [ 987.435346][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 987.453504][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 987.466296][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 987.478513][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 987.491377][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 987.503596][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 987.516397][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 987.528591][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 987.541375][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 987.553628][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 992.444979][ C0] net_ratelimit: 10208 callbacks suppressed [ 992.444999][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 992.463287][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 992.476286][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 992.488565][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 992.501405][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 992.513650][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 992.526464][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 992.538664][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 992.551474][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 992.563794][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 997.454964][ C0] net_ratelimit: 10152 callbacks suppressed [ 997.454983][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 997.473100][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 997.485885][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 997.498163][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 997.510983][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 997.523232][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 997.536546][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 997.549042][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 997.562094][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 997.574412][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1002.464880][ C0] net_ratelimit: 10008 callbacks suppressed [ 1002.464898][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1002.483080][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1002.495901][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1002.508137][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1002.521030][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1002.533299][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1002.546249][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1002.558499][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1002.571419][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1002.583712][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1007.475003][ C0] net_ratelimit: 9960 callbacks suppressed [ 1007.475022][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1007.493120][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1007.506029][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1007.518296][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1007.531174][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1007.544084][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1007.556955][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1007.569191][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1007.582017][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1007.594367][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1008.529841][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 1012.484730][ C0] net_ratelimit: 9968 callbacks suppressed [ 1012.484748][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1012.502837][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1012.515730][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1012.528115][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1012.541187][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1012.553565][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1012.566414][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1012.578745][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1012.591622][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1012.603872][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1017.494876][ C0] net_ratelimit: 9874 callbacks suppressed [ 1017.494895][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1017.513027][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1017.526256][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1017.538558][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1017.551427][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1017.563753][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1017.577694][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1017.590045][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1017.602990][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1017.615343][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1022.504709][ C0] net_ratelimit: 9913 callbacks suppressed [ 1022.504729][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1022.524584][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1022.537766][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1022.551088][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1022.563440][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1022.576539][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1022.588828][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1022.601972][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1022.616207][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1022.631497][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1027.515335][ C0] net_ratelimit: 9723 callbacks suppressed [ 1027.515355][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1027.533503][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1027.546483][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1027.558933][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1027.571812][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1027.584089][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1027.596948][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1027.609273][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1027.622180][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1027.635346][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1032.524855][ C0] net_ratelimit: 9764 callbacks suppressed [ 1032.524873][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1032.544411][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1032.558117][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1032.570886][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1032.583999][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1032.596924][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1032.611887][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1032.624554][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1032.638046][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1032.650906][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1037.534675][ C0] net_ratelimit: 9796 callbacks suppressed [ 1037.534694][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1037.552915][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1037.565814][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1037.578288][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1037.591214][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1037.603781][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1037.616712][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1037.628982][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1037.641848][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1037.654150][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1042.545006][ C0] net_ratelimit: 9814 callbacks suppressed [ 1042.545026][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1042.564106][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1042.578218][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1042.590650][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1042.603870][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1042.616254][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1042.629545][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1042.644017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1042.657982][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1042.671622][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1047.554911][ C0] net_ratelimit: 9479 callbacks suppressed [ 1047.554930][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1047.575347][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1047.588732][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1047.601753][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1047.614781][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1047.627859][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1047.640114][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1047.654544][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1047.667281][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1047.680481][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1052.565418][ C0] net_ratelimit: 9153 callbacks suppressed [ 1052.565445][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1052.585063][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1052.600207][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1052.616151][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1052.630293][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1052.644284][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1052.658476][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1052.672704][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1052.688110][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1052.701017][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1057.574797][ C0] net_ratelimit: 9276 callbacks suppressed [ 1057.574816][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1057.592942][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1057.606420][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1057.619270][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1057.632691][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1057.645098][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1057.658142][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1057.670425][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1057.683342][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1057.695710][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f2:1b:61:64:49:27, vlan:0) [ 1057.738692][ C0] ------------[ cut here ]------------ [ 1057.745485][ C0] 1 [ 1057.745522][ C0] WARNING: kernel/rcu/tree_stall.h:1049 at rcu_check_gp_start_stall.part.0+0x1c4/0x4b0, CPU#0: kworker/R-bat_e/3409 [ 1057.760174][ C0] Modules linked in: [ 1057.764977][ C0] CPU: 0 UID: 0 PID: 3409 Comm: kworker/R-bat_e Tainted: G U L syzkaller #0 PREEMPT(full) [ 1057.776315][ C0] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1057.781527][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1057.791670][ C0] Workqueue: bat_events batadv_tt_purge [ 1057.797222][ C0] RIP: 0010:rcu_check_gp_start_stall.part.0+0x1c4/0x4b0 [ 1057.804197][ C0] Code: 88 61 01 00 00 be 04 00 00 00 48 c7 c7 80 c3 1c 9b e8 30 87 86 00 b8 01 00 00 00 87 05 c5 ae 2f 19 85 c0 0f 85 3d 01 00 00 90 <0f> 0b 90 48 c7 c3 e4 e5 d9 90 48 81 fd c0 46 7f 8e 74 5a 48 b8 00 [ 1057.823808][ C0] RSP: 0018:ffffc90000007e10 EFLAGS: 00010046 [ 1057.829897][ C0] RAX: 0000000000000000 RBX: 0000000000002904 RCX: ffffffff81ed14b0 [ 1057.837876][ C0] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffffff9b1cc380 [ 1057.845867][ C0] RBP: ffffffff8e7f46c0 R08: 0000000000000001 R09: fffffbfff3639870 [ 1057.853864][ C0] R10: 0000000000000003 R11: 0000000000000000 R12: 1ffffffff1c82250 [ 1057.862188][ C0] R13: 0000000000000246 R14: ffffffff8e40c108 R15: 0000000000000001 [ 1057.870289][ C0] FS: 0000000000000000(0000) GS:ffff88812434e000(0000) knlGS:0000000000000000 [ 1057.879213][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1057.885827][ C0] CR2: 00007f5ce226391a CR3: 0000000033fc6000 CR4: 00000000003526f0 [ 1057.893792][ C0] Call Trace: [ 1057.897070][ C0] [ 1057.899908][ C0] rcu_core+0x2cb/0x10d0 [ 1057.904260][ C0] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 1057.909997][ C0] ? __pfx_rcu_core+0x10/0x10 [ 1057.914678][ C0] ? find_held_lock+0x2b/0x80 [ 1057.919350][ C0] ? mark_held_locks+0x40/0x70 [ 1057.924287][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1057.930087][ C0] handle_softirqs+0x1eb/0x9e0 [ 1057.934873][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 1057.940169][ C0] ? batadv_tt_local_purge+0x21c/0x3d0 [ 1057.945623][ C0] do_softirq+0xac/0xe0 [ 1057.949769][ C0] [ 1057.952687][ C0] [ 1057.955608][ C0] __local_bh_enable_ip+0xf8/0x120 [ 1057.960716][ C0] batadv_tt_local_purge+0x21c/0x3d0 [ 1057.966004][ C0] ? look_up_lock_class+0x55/0x120 [ 1057.971112][ C0] ? __pfx_batadv_tt_local_purge+0x10/0x10 [ 1057.976919][ C0] batadv_tt_purge+0x8b/0xbd0 [ 1057.981593][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 1057.987395][ C0] ? debug_object_deactivate+0x2e4/0x3b0 [ 1057.993225][ C0] ? __pfx_batadv_tt_purge+0x10/0x10 [ 1057.999177][ C0] ? rcu_is_watching+0x12/0xc0 [ 1058.003965][ C0] process_one_work+0x9d7/0x1920 [ 1058.009064][ C0] ? __pfx_process_one_work+0x10/0x10 [ 1058.014762][ C0] ? __pfx_batadv_tt_purge+0x10/0x10 [ 1058.020403][ C0] rescuer_thread+0x902/0x1490 [ 1058.025222][ C0] ? rescuer_thread+0x23d/0x1490 [ 1058.030209][ C0] ? rescuer_thread+0x118/0x1490 [ 1058.035304][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 1058.040518][ C0] ? __kthread_parkme+0x18c/0x230 [ 1058.045561][ C0] ? kthread+0x13a/0x450 [ 1058.049905][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 1058.055200][ C0] kthread+0x370/0x450 [ 1058.059574][ C0] ? __pfx_kthread+0x10/0x10 [ 1058.064360][ C0] ret_from_fork+0x754/0xd80 [ 1058.069315][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 1058.074570][ C0] ? __switch_to+0x7b4/0x1120 [ 1058.079680][ C0] ? __pfx_kthread+0x10/0x10 [ 1058.084283][ C0] ret_from_fork_asm+0x1a/0x30 [ 1058.089248][ C0] [ 1058.092304][ C0] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1058.099773][ C0] CPU: 0 UID: 0 PID: 3409 Comm: kworker/R-bat_e Tainted: G U L syzkaller #0 PREEMPT(full) [ 1058.111074][ C0] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1058.116336][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1058.127002][ C0] Workqueue: bat_events batadv_tt_purge [ 1058.132584][ C0] Call Trace: [ 1058.136226][ C0] [ 1058.139362][ C0] dump_stack_lvl+0x100/0x190 [ 1058.144661][ C0] vpanic+0x552/0x970 [ 1058.149572][ C0] ? __pfx_vpanic+0x10/0x10 [ 1058.154580][ C0] panic+0xd1/0xe0 [ 1058.158399][ C0] ? __pfx_panic+0x10/0x10 [ 1058.162894][ C0] ? check_panic_on_warn+0x1f/0x90 [ 1058.168436][ C0] check_panic_on_warn.cold+0x19/0x34 [ 1058.174446][ C0] ? rcu_check_gp_start_stall.part.0+0x1c4/0x4b0 [ 1058.180811][ C0] __warn.cold+0x191/0x348 [ 1058.185768][ C0] __report_bug+0x296/0x3d0 [ 1058.190298][ C0] ? rcu_check_gp_start_stall.part.0+0x1c4/0x4b0 [ 1058.196642][ C0] ? __pfx___report_bug+0x10/0x10 [ 1058.201795][ C0] ? do_raw_spin_lock+0x128/0x260 [ 1058.206864][ C0] ? __lock_acquire+0x4a5/0x2630 [ 1058.211931][ C0] ? rcu_check_gp_start_stall.part.0+0x1c4/0x4b0 [ 1058.218811][ C0] report_bug+0xb2/0x220 [ 1058.223199][ C0] ? rcu_check_gp_start_stall.part.0+0x1c4/0x4b0 [ 1058.229523][ C0] handle_bug+0x16a/0x2a0 [ 1058.233850][ C0] exc_invalid_op+0x17/0x50 [ 1058.238352][ C0] asm_exc_invalid_op+0x1a/0x20 [ 1058.243371][ C0] RIP: 0010:rcu_check_gp_start_stall.part.0+0x1c4/0x4b0 [ 1058.250383][ C0] Code: 88 61 01 00 00 be 04 00 00 00 48 c7 c7 80 c3 1c 9b e8 30 87 86 00 b8 01 00 00 00 87 05 c5 ae 2f 19 85 c0 0f 85 3d 01 00 00 90 <0f> 0b 90 48 c7 c3 e4 e5 d9 90 48 81 fd c0 46 7f 8e 74 5a 48 b8 00 [ 1058.270202][ C0] RSP: 0018:ffffc90000007e10 EFLAGS: 00010046 [ 1058.276375][ C0] RAX: 0000000000000000 RBX: 0000000000002904 RCX: ffffffff81ed14b0 [ 1058.284531][ C0] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffffffff9b1cc380 [ 1058.292593][ C0] RBP: ffffffff8e7f46c0 R08: 0000000000000001 R09: fffffbfff3639870 [ 1058.300564][ C0] R10: 0000000000000003 R11: 0000000000000000 R12: 1ffffffff1c82250 [ 1058.308643][ C0] R13: 0000000000000246 R14: ffffffff8e40c108 R15: 0000000000000001 [ 1058.316859][ C0] ? rcu_check_gp_start_stall.part.0+0x1b0/0x4b0 [ 1058.323523][ C0] rcu_core+0x2cb/0x10d0 [ 1058.327855][ C0] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 1058.333570][ C0] ? __pfx_rcu_core+0x10/0x10 [ 1058.338249][ C0] ? find_held_lock+0x2b/0x80 [ 1058.343112][ C0] ? mark_held_locks+0x40/0x70 [ 1058.348058][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1058.353897][ C0] handle_softirqs+0x1eb/0x9e0 [ 1058.358706][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 1058.364014][ C0] ? batadv_tt_local_purge+0x21c/0x3d0 [ 1058.369563][ C0] do_softirq+0xac/0xe0 [ 1058.374678][ C0] [ 1058.377640][ C0] [ 1058.380653][ C0] __local_bh_enable_ip+0xf8/0x120 [ 1058.385765][ C0] batadv_tt_local_purge+0x21c/0x3d0 [ 1058.392113][ C0] ? look_up_lock_class+0x55/0x120 [ 1058.397259][ C0] ? __pfx_batadv_tt_local_purge+0x10/0x10 [ 1058.403081][ C0] batadv_tt_purge+0x8b/0xbd0 [ 1058.407883][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 1058.413695][ C0] ? debug_object_deactivate+0x2e4/0x3b0 [ 1058.419434][ C0] ? __pfx_batadv_tt_purge+0x10/0x10 [ 1058.424913][ C0] ? rcu_is_watching+0x12/0xc0 [ 1058.429802][ C0] process_one_work+0x9d7/0x1920 [ 1058.435045][ C0] ? __pfx_process_one_work+0x10/0x10 [ 1058.440857][ C0] ? __pfx_batadv_tt_purge+0x10/0x10 [ 1058.446265][ C0] rescuer_thread+0x902/0x1490 [ 1058.451037][ C0] ? rescuer_thread+0x23d/0x1490 [ 1058.456043][ C0] ? rescuer_thread+0x118/0x1490 [ 1058.461035][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 1058.466252][ C0] ? __kthread_parkme+0x18c/0x230 [ 1058.471284][ C0] ? kthread+0x13a/0x450 [ 1058.475526][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 1058.480818][ C0] kthread+0x370/0x450 [ 1058.484923][ C0] ? __pfx_kthread+0x10/0x10 [ 1058.489877][ C0] ret_from_fork+0x754/0xd80 [ 1058.494631][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 1058.500072][ C0] ? __switch_to+0x7b4/0x1120 [ 1058.505168][ C0] ? __pfx_kthread+0x10/0x10 [ 1058.510158][ C0] ret_from_fork_asm+0x1a/0x30 [ 1058.515457][ C0] [ 1058.518681][ C0] Kernel Offset: disabled [ 1058.523303][ C0] Rebooting in 86400 seconds..