last executing test programs: 1m47.539160543s ago: executing program 2 (id=2048): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async) madvise$auto(0x0, 0xffffffffffff0005, 0x17) set_mempolicy$auto(0x6, &(0x7f0000000080)=0x3, 0x21) (async) r0 = set_tid_address$auto(&(0x7f0000000040)=0x2) syz_open_procfs$namespace(r0, &(0x7f00000000c0)='ns/time_for_children\x00') unshare$auto(0x40000000002003) (async) madvise$auto(0x0, 0x2000040080000004, 0xe) open(0x0, 0x78081, 0x0) (async, rerun: 32) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) (async, rerun: 32) write$auto(0xffffffffffffffff, 0x0, 0x100000a3d9) (async) socket(0x2, 0x1, 0x0) (async) openat$auto_loop_ctl_fops_loop(0xffffffffffffff9c, 0x0, 0x622601, 0x0) (async, rerun: 32) prctl$auto(0x3e, 0x6, 0x0, 0x1, 0x0) (async, rerun: 32) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x60742, 0x0) (async) fallocate$auto(0x3, 0x3, 0xe, 0x80000007) (async) r1 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop2\x00', 0x24040, 0x0) ioctl$auto_BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000240)={"6c00cf81000300ffffffffffffff291d00", 0x3f7, 0x408, 0xffc, 0x400004, 0x200000000040000b}) mprotect$auto(0x1ffffffff000, 0x100018, 0x4) (async) mmap$auto(0xfffffffffffff457, 0x2020009, 0x7f, 0xeb3, 0xfffffffffffffffa, 0x8002) pread64$auto(0xffffffffffffffff, 0x0, 0x40000000f42c, 0x80002) (async) mmap$auto(0x0, 0x3, 0xdf, 0xeb1, 0x401, 0x8000) (async) prctl$auto(0x1000000003b, 0x1, 0x4, 0x3, 0x7) (async, rerun: 32) writev$auto(0x0, 0x0, 0xb) (async, rerun: 32) quotactl$auto(0x0, 0xfffffffffffffffc, 0x7, 0x0) madvise$auto(0x0, 0xffffffffffff0005, 0x19) 1m47.405857253s ago: executing program 0 (id=2049): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) openat$auto_stats_seq_fops_netdebug(0xffffffffffffff9c, &(0x7f0000000640), 0x88180, 0x0) (async, rerun: 32) ioctl$auto(0x3, 0xae60, 0x10000000000402) (async, rerun: 32) r0 = openat$auto_raw_fops_raw_gadget(0xffffffffffffff9c, &(0x7f0000000000), 0x102, 0x0) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_NL80211_CMD_VENDOR(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_AP_SETTINGS_FLAGS={0x8, 0x135, 0x9}, @NL80211_ATTR_VIF_RADIO_MASK={0x8, 0x14d, 0x1}, @NL80211_ATTR_BSS_HT_OPMODE={0x6, 0x6d, 0x58}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x800}]}, 0x34}, 0x1, 0x0, 0x0, 0xc000}, 0x8000) ioctl$auto_USB_RAW_IOCTL_EP_ENABLE(r0, 0x40095505, 0x0) socket$nl_generic(0x10, 0x3, 0x10) rmdir$auto(0x0) (async, rerun: 64) futex$auto(0x0, 0x89, 0x4, 0x0, 0x0, 0x100) (rerun: 64) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000280), 0xffffffffffffffff) 1m47.152577404s ago: executing program 0 (id=2050): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xf8, 0xfffffffffffffffa, 0x8000) setreuid$auto(0x80000000, 0x7fffffffffffffff) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) fanotify_init$auto(0x5, 0x2000000000002) socket$nl_generic(0x10, 0x3, 0x10) socket(0x26, 0x80805, 0x0) clone$auto(0x20003b46, 0x2, 0x0, 0x0, 0x2) ioctl$auto(0x3, 0xff01, 0x0) madvise$auto(0x0, 0xffffffffffff0005, 0x17) madvise$auto(0x0, 0xffffffffffff0001, 0x15) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) socketcall$auto(0x8000, 0x0) 1m46.288459956s ago: executing program 0 (id=2053): r0 = syz_genetlink_get_family_id$auto_ovs_packet(&(0x7f0000001940), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$auto_ioam6(&(0x7f0000001180), 0xffffffffffffffff) sendmsg$auto_IOAM6_CMD_ADD_NAMESPACE(r1, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f00000011c0)={0x24, r2, 0x1, 0x70bd25, 0x25dfdbff, {}, [@IOAM6_ATTR_NS_DATA={0x8, 0x2, 0x2}, @IOAM6_ATTR_NS_ID={0x6, 0x1, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4008000) sendmsg$auto_IOAM6_CMD_DEL_SCHEMA(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r2, 0x100, 0x70bd2d, 0x25dfdbfb, {}, [@IOAM6_ATTR_SC_ID={0x8, 0x4, 0x4}, @IOAM6_ATTR_SC_ID={0x8, 0x4, 0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x10) r3 = socketpair$auto(0x1, 0x5, 0x8000000000000000, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$auto_nfc(&(0x7f0000000100), r4) sendmsg$auto_NFC_CMD_DISABLE_SE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="2c05626e2c000000", @ANYRES16=r5, @ANYBLOB="080c2dbd7000fbdbdf251200000005000c000900000008001500080000000600110009000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20008094}, 0x0) r6 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000300), r1) sendmsg$auto_NL80211_CMD_NOTIFY_RADAR(r3, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x24, r6, 0x200, 0x70bd29, 0x25dfdbff, {}, [@NL80211_ATTR_ASSOC_MLD_EXT_CAPA_OPS={0x6, 0x151, 0x1}, @NL80211_ATTR_RECEIVE_MULTICAST={0x4}, @NL80211_ATTR_BSS_DUMP_INCLUDE_USE_DATA={0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4800}, 0x1) getpgid$auto(0x0) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x4c, r0, 0x1b, 0x74bd26, 0x25dfdbfd, {}, [@OVS_PACKET_ATTR_PROBE={0x4}, @OVS_PACKET_ATTR_PACKET={0x12, 0x1, "e225647b392cf049ed0bc5d664e3"}, @OVS_PACKET_ATTR_PACKET={0x12, 0x1, "898771f1c19f17790485908286dd"}, @OVS_PACKET_ATTR_HASH={0xc, 0xb, 0x7fffffff}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000840}, 0xc080) r7 = syz_genetlink_get_family_id$auto_gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$auto_GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x2c, r7, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@GTPA_O_TEI={0x8, 0x9, 0xc}, @GTPA_FAMILY={0x5, 0xd, 0x40}, @GTPA_FAMILY={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000004) 1m45.556673708s ago: executing program 0 (id=2054): mmap$auto(0x0, 0x200004, 0x4000000000e3, 0x40eb2, 0xd, 0x300000000000) r0 = openat$auto_stat_fops_per_vm_kvm_main(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/kvm/pages_1g\x00', 0x602, 0x0) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/block/nullb0/queue/nr_requests\x00', 0x0, 0x0) read$auto(r1, 0x0, 0x843) write$auto(0x3, 0x0, 0x100082) mmap$auto(0x0, 0x400008, 0x5f, 0x9b72, 0x2, 0x8000) madvise$auto(0x8000, 0x87fff, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_mac80211_hwsim(0x0, 0xffffffffffffffff) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) io_setup$auto(0x2002, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x1, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/platform/mac802154_hwsim/ieee802154/phy1/net/wpan1/queues/tx-0/byte_queue_limits/stall_cnt\x00', 0x0, 0x0) read$auto(r3, 0x0, 0x20) write$auto(0x3, 0x0, 0xfdef) r4 = openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x20401, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x4605, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f00000164c0), 0xffffffffffffffff) sendmsg$auto_NL80211_CMD_GET_SCAN(r5, &(0x7f00000165c0)={0x0, 0x0, &(0x7f0000016580)={&(0x7f0000000280)=ANY=[@ANYBLOB="18000000", @ANYRES16=r6, @ANYBLOB="79a327bd70de91633478c82a633d1b00fbdb"], 0x18}, 0x1, 0x0, 0x0, 0x2404c000}, 0x0) sendmsg$auto_HWSIM_CMD_NEW_RADIO(r2, 0x0, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x38, 0xffffffffffffffff, 0x8000) close_range$auto(r0, 0x8, 0x0) socket(0x2, 0x5, 0x0) setsockopt$auto(0x3, 0x1, 0xf, 0x0, 0x8) listen$auto(0x3, 0x83) syz_genetlink_get_family_id$auto_nl802154(0x0, 0xffffffffffffffff) r7 = setfsuid$auto(0x0) setuid$auto(r7) 1m45.226884575s ago: executing program 1 (id=2055): mmap$auto(0x0, 0xe983, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) mmap$auto(0x0, 0x3, 0xdf, 0xeb1, 0x403, 0x8000) socket(0x1d, 0x3, 0x1) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/platform/dummy_hcd.3/usb4/4-0:1.0/authorized\x00', 0x10b142, 0x0) mmap$auto(0x0, 0x2020006, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) madvise$auto(0x0, 0xffffffffffff0001, 0x15) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop6\x00', 0x400, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r0, 0x4c05, 0xfffffffffffffffd) 1m45.083895156s ago: executing program 0 (id=2057): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) socketpair$auto(0x1, 0x5, 0x8000000000000000, 0x0) r0 = prctl$auto(0x3e, 0x4000000000001, 0x0, 0x1, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) socket(0x18, 0x2, 0x0) sendto$auto(0x3, 0x0, 0x2000f, 0x0, 0x0, 0x1c) r1 = open(&(0x7f0000000040)='./bus\x00', 0x4c27e, 0xd3) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = openat$auto_rtc_dev_fops_dev(0xffffffffffffff9c, &(0x7f0000000040), 0x8300, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000100)={{@raw=0xb, 0x3, 0xcf, 0x8, "16a0d89bf208384515b5375a677609aa1bc737276563c3d5a2fca999d5797ab7a10a4d2bc341c4bd369ae535", @raw=0x1}, 0x1, @integer=@value=[0x6d, 0x1, 0x0, 0xbb, 0x4, 0x80000000, 0x1, 0x10001, 0x1, 0x400000000009, 0xc4, 0x9, 0x1, 0x7, 0x3, 0xfffffffffffffff8, 0x1, 0x3, 0x4, 0x401, 0x6, 0x0, 0xa0, 0x5, 0x2, 0x3, 0x5, 0xa, 0x8, 0x1, 0x8, 0x7f, 0xffffffffffffdb75, 0x100000000, 0x3, 0x7, 0x7fffffffffffffff, 0x1, 0xd, 0x1, 0x4, 0x0, 0x8, 0x2, 0x3, 0x3, 0x2d7, 0x1, 0x1, 0x6, 0x2, 0x800000001, 0x6, 0x0, 0x8b, 0x6, 0x4, 0x3, 0x40a, 0xd, 0x80000000003fd, 0x8, 0x40000000003, 0xfffc, 0x50ce0883, 0xbd9, 0x5, 0x2, 0xd8f, 0x80000000, 0x0, 0x2000000000000007, 0x46e, 0xa5cf, 0x4, 0x7, 0xc16b, 0x6, 0x9, 0x6, 0x8000002, 0x6, 0x1, 0x3, 0x3, 0xfffffffffffff16a, 0x6, 0xffffffffffff0001, 0x100000000, 0x4, 0x8, 0x4, 0x2, 0x2000000003, 0xfffffffffffffffe, 0x20007cf9, 0x40, 0x2, 0x5, 0x100, 0x14b, 0x8001, 0x45f3, 0x0, 0x0, 0x4, 0x0, 0x8001, 0x0, 0x1, 0x7, 0xcf4, 0x1, 0x3, 0x0, 0x4, 0x7, 0x6, 0x25e2, 0xc9a, 0xd09, 0x40, 0x2, 0xffffffffffffff00, 0x7, 0x0, 0xfffffffffffffff8, 0x40], "f3fadb90a56b67d92a5b28b4b23f332550b1e5454e2027fb1a37efe81bbc27deaf7c3100aab088cdb3b40dad335c9174f18934845ac3152fef1e0f42b42471efc0225a4ebe7e05ce3d4ab429805d5921633ffbce8f1a82ff9dec6c288f431cb7005b85ca8633c55d49bbdf4bd9cac1046064001bca7ba37e4b5eacf1940c9a78"}) ioctl$auto_RTC_PIE_ON(r2, 0x7005, 0x0) readv$auto(r2, &(0x7f00000000c0)={0x0, 0x4}, 0x5) fallocate$auto(0x8000000000000003, 0x0, 0xd, 0xfff) copy_file_range$auto(r1, 0x0, r1, &(0x7f0000000080)=0x8, 0x2, 0x0) sendmmsg$auto(0x4, 0x0, 0x9a6, 0x2) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) io_uring_setup$auto(0x4e8f, 0x0) r3 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000080), r0) io_uring_setup$auto(0x1, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000007480)='/dev/cec12\x00', 0x121600, 0x0) close_range$auto(0x2, 0x8, 0x0) sendmsg$auto_NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYBLOB="2000b70004000000", @ANYRES16=r3], 0x1c}, 0x1, 0x0, 0x0, 0x80004}, 0x30018040) madvise$auto(0x0, 0x2003f0, 0x15) r4 = openat$auto_iommufd_fops_main(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$auto_VFIO_IOMMU_MAP_DMA(r4, 0x3b71, 0x0) r5 = openat$auto_sco_debugfs_fops_(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pread64$auto(r5, 0x0, 0x800, 0x45e) 1m44.984621163s ago: executing program 2 (id=2058): socket(0x10, 0x2, 0x0) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000306b87000fedbdf250300000004000800040003800c00160067"], 0x28}, 0x1, 0x0, 0x0, 0x4004040}, 0x4c810) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_CTRL_CMD_GETPOLICY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="0700000000000000df250a"], 0x14}, 0x1, 0x0, 0x0, 0x20008000}, 0x10004010) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB=' \x00'], 0x1ac}}, 0x40000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/net/nr12/address\x00', 0x101800, 0x0) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop6\x00', 0x18dd01, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r0, 0x4c02, 0x0) 1m44.859373228s ago: executing program 2 (id=2060): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x14fa02, 0x0) r1 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x14fa02, 0x0) mmap$auto(0x0, 0x810004, 0x400000000ffb, 0x8000000008011, 0x3, 0x8000) openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, 0x0, 0x0, 0x0) setresuid$auto(0x0, 0x0, 0x0) mmap$auto(0x802, 0x404007, 0x8000db, 0x13, r1, 0xb) mmap$auto(0xffff, 0x8000000008, 0x40002, 0x9b72, 0x5, 0xffffffffffffffff) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, 0x0, 0x860102, 0x0) r3 = openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000002340)='/dev/binderfs/binder0\x00', 0x0, 0x0) ioctl$auto_BINDER_WRITE_READ(r3, 0xc0306201, 0x0) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, 0x0, 0x20342, 0x0) writev$auto(r2, 0x0, 0x3) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0x4) r4 = openat$auto_snapshot_fops_user(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) ioctl$auto_SNAPSHOT_ATOMIC_RESTORE(r4, 0x3304, 0x0) mmap$auto(0x2, 0x7fffffffffffffff, 0xe2, 0x18, r0, 0x28000) socket(0x18, 0x3, 0x4) newfstatat$auto(0xffffffffffffffff, 0x0, 0x0, 0xfffffffe) r5 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000200)='/dev/tty12\x00', 0x101440, 0x0) r6 = socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) ioctl$auto(r5, 0x4b67, r6) 1m44.571867149s ago: executing program 2 (id=2061): r0 = socket(0x2, 0x1, 0x106) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) connect$auto(r0, &(0x7f00000001c0)=@in={0x2, 0x3}, 0x55) setsockopt$auto(r0, 0x6, 0xd, &(0x7f0000000280)='lp\x00h\x85M\xdf\xdc\x83\x8a\xa7\xe4]U(\x01\t=\x1e\x00\x00', 0x4) r1 = socket(0x1e, 0x1, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r2 = socket(0xa, 0x1, 0x84) getsockopt$auto(r2, 0x84, 0x7b, 0x0, &(0x7f0000000000)=0x98) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) socket(0xa, 0x3, 0x3b) connect$auto(r1, &(0x7f0000000000)=@generic={0x1f, '\x00\x00A\x00'}, 0x3) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) madvise$auto(0x0, 0x6, 0x66) madvise$auto(0x0, 0xffffffffffff0005, 0x19) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) mmap$auto(0x0, 0x2020009, 0x3, 0x8000eb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) setresuid$auto(0x0, 0x7, 0x8080) capset$auto(&(0x7f0000000180)={0x19980330}, 0x0) lseek$auto(0x3, 0x7fffffffffffffff, 0x0) mmap$auto(0x0, 0xa00006, 0x400002, 0x40ebe, 0xffffffffffffffff, 0x300000000000) io_uring_setup$auto(0x6, 0x0) mmap$auto(0x0, 0x3, 0x4000000000df, 0x40eb1, 0x401, 0x300040000000) socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x2, 0xa, 0x0) mmap$auto(0xe779, 0x400000000007, 0xdf, 0x13, 0xffffffffffffffff, 0x0) socket(0x2b, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) 1m43.971743562s ago: executing program 1 (id=2065): mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) madvise$auto(0x110c230000, 0x1, 0x9) r0 = socket(0x1d, 0x2, 0x6) r1 = socket(0xa, 0x802, 0x3a) setsockopt$auto(r1, 0x0, 0x21, &(0x7f0000000000)='\x15!\xa8^J/\xddCx4!\x00\xd3\x8f\xff\x1b\x01\x1e\xe2\xa8\xd6\xd9\xc0\xa2\x0f\x88\xb1e\x8a\xd8?\xfe\xda\xc4\xef\xff(i\xc6@\xf2Vw\xbe\x1c$\xddm\x8a\x9d\x91_\v\xb2j\x0eQ\xce\x16\'C\x8c\x01\x80\x92u\xd5\xb8\\\x82,\xe2=y\x9bR\xbcn\xa0c\x16~\x86\"t\x00\x00\x00\x00\xe4\xa5\xfe\xb5h\xae\xec%\xf9\xa3>\xd6,\xf3\x98\'\xb0\t~~\xb4\x98\xbb3=A\x9c\x17\xa2\xce\fh-M\xdb-\x15VX\xfe\xca+\xb3JL\x0fl\xe84\xbd\xa3nO\x9f\xfa\xb1\x06$\b$i\x00\x80\xff\xff\xd6\x1e\xdbB\x9bb\x1cXC\x8c\x8b\xd9\xff\xf2B\xd4\xb4V0x0}) bind$auto(r0, &(0x7f0000000040)=@can={0x1d, r3, 0xfd}, 0x6a) sendmsg$auto_MACSEC_CMD_UPD_RXSA(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1400", @ANYRES16=0x0, @ANYRESHEX], 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x8840) close_range$auto(0x2, 0x8, 0x0) ioctl$auto_TIOCVHANGUP2(0xffffffffffffffff, 0x5437, 0x0) socketpair$auto(0x1, 0x5, 0x8000000000000000, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x4, 0x0, 0x9a6, 0x6) recvmmsg$auto(0x3, 0x0, 0x10000, 0x6, 0x0) openat$auto_vsock_device_ops_af_vsock(0xffffffffffffff9c, &(0x7f00000001c0), 0x220001, 0x0) remap_file_pages$auto(0x6a27, 0x1000, 0x0, 0xb74, 0x66a) r4 = openat$auto_tracing_iter_fops_trace(0xffffffffffffff9c, &(0x7f0000000cc0)='/sys/kernel/tracing/trace_options\x00', 0x442, 0x0) writev$auto(r4, &(0x7f0000000e00)={0x0, 0xd762}, 0x400) timer_create$auto(0x9, 0x0, 0x0) timer_settime$auto(0x0, 0x9, &(0x7f00000000c0)={{0x2, 0x10007}, {0x9}}, 0x0) r5 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000140)='/proc/asound/card0/pcm0p/oss\x00', 0x88400, 0x0) r6 = openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bus/usb/015/001\x00', 0x18bd01, 0x0) ioctl$auto_USBDEVFS_BULK(r6, 0xc0185502, &(0x7f0000000200)={0x81, 0x5, 0x2, 0x0}) read$auto_proc_reg_file_ops_compat_inode(r5, &(0x7f0000000040)=""/209, 0xd1) madvise$auto(0x0, 0xffffffffffff0001, 0x15) futex$auto(0x0, 0x85, 0x10005, 0x0, 0x0, 0x10000007) setsockopt$auto(r4, 0x4, 0x3, &(0x7f0000000000)='/proc/asound/card0/pcm0p/oss\x00', 0x8) 1m43.304648332s ago: executing program 0 (id=2066): mmap$auto(0xde3b, 0x409, 0xdf, 0xeb1, 0x401, 0x9) madvise$auto(0x0, 0xffffffffffff0001, 0x15) r0 = prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) mmap$auto(0x0, 0x2000020009, 0x4000000000df, 0x14, r0, 0x8004) unshare$auto(0x40000080) symlinkat$auto(0x0, 0xffffffffffffffff, 0x0) mmap$auto(0xfffffffffffffff8, 0x40, 0xdf, 0x8000000000000011, 0xffffffffffffffff, 0x8000) connect$auto(0x3, &(0x7f0000000080)=@l2={0x1f, 0x2, @none, 0x4, 0x2}, 0x54) r1 = openat$auto_uinput_fops_uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$auto(r1, 0xd23, r1) setsockopt$auto(0x400000000000003, 0x29, 0x33, 0x0, 0x20056b) mmap$auto(0xffffffffffffffff, 0x0, 0xdf, 0x8010, r1, 0x7fff) unshare$auto(0x40000080) r2 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x1020009, 0x20004000000000df, 0xeb1, r2, 0x8000) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) sendmsg$auto_NL80211_CMD_SET_FILS_AAD(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f00000000c0)={0x0, 0x380}, 0x1, 0x0, 0x0, 0x4040000}, 0x41) io_uring_setup$auto(0x89, 0x0) sendmsg$auto_IEEE802154_ASSOCIATE_RESP(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) close_range$auto(0x2, 0xa, 0x0) io_uring_setup$auto(0x6, 0x0) io_uring_register$auto(0x2, 0x0, &(0x7f0000000000), 0x1000) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) mmap$auto(0x400000000000000, 0x2020009, 0x3, 0xeb3, 0xfffffffffffffffa, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x80302, 0x0) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x100201, 0x0) openat$auto_fops_atomic_t_(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/fail_io_timeout/times\x00', 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x40, 0x0) 1m43.30392245s ago: executing program 3 (id=2067): r0 = openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000000240)='/dev/binderfs/binder1\x00', 0x814a3f894c102307, 0x0) ioctl$auto_BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)="fc1c4959f721a2458364a2b1590d19513f344e1b39ce") close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0xc) mmap$auto(0x0, 0x8, 0x1000000004, 0x9b72, 0x2, 0x8000) r1 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x89b0, &(0x7f0000000140)={'bridge0\x00'}) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = socketcall$auto(0x8000, 0x0) openat$auto_sg_fops_sg(0xffffffffffffff9c, 0x0, 0x8402, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9a72, 0x2, 0x8000) unshare$auto(0x40000080) unshare$auto(0x21) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x1) socket(0xa, 0x5, 0x84) init_module$auto(0x0, 0xffff9, 0x0) close_range$auto(0x2, 0xa, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000840)='/dev/tty6\x00', 0x0, 0x0) r4 = openat$auto_rng_chrdev_ops_core(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) read$auto_rng_chrdev_ops_core(r4, 0x0, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) setgroups$auto(0xe32, 0x0) get_mempolicy$auto(0x0, 0x0, 0x400, 0x0, 0x1) r5 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto_KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$auto(0x3, 0xae60, 0x10000000000402) ioctl$auto(0x3, 0xae41, r3) ioctl$auto_KVM_GET_MSRS(r2, 0x4138ae84, &(0x7f0000000080)={0xfc}) 1m42.859399341s ago: executing program 3 (id=2068): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000004440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6gre0\x00', 0x0}) sendmsg$auto_OVS_DP_CMD_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004540)={&(0x7f0000000180)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002bbd7000ffdbdf250100000008000900", @ANYRES32=r2, @ANYBLOB="0800050006000000110001006f76735f12fffe02fffe00000200000008000200", @ANYRES32=0x0, @ANYBLOB="b426bffae7938bf58a6ce001f1d2a48f71ab9059e2062a10c1dcba0e7b7174d57024d6d973b32e2fc497504eba606a6311174b22f7537eaa7c1f4595f2024887a8dc9b4a569f848f3f74f79ff07fe0bc5263034f40355b47e3a2d7c098879afb256e86d1ee26ae05dc0825c6df2ecc52d7e44e34f36ad3153e115db15ccb1187beba78698b6e0842f6e89664fdd9ac1cee929b41bae128e29a7000"], 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x2000000) 1m42.645575678s ago: executing program 3 (id=2069): socket(0x10, 0x2, 0x0) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000306b87000fedbdf250300000004000800040003800c00160067"], 0x28}, 0x1, 0x0, 0x0, 0x4004040}, 0x4c810) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_CTRL_CMD_GETPOLICY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="0700000000000000df250a"], 0x14}, 0x1, 0x0, 0x0, 0x20008000}, 0x10004010) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB=' \x00'], 0x1ac}}, 0x40000) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop6\x00', 0x18dd01, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r0, 0x4c02, 0x0) 1m42.599238439s ago: executing program 1 (id=2070): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x14fa02, 0x0) r1 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x14fa02, 0x0) mmap$auto(0x0, 0x810004, 0x400000000ffb, 0x8000000008011, 0x3, 0x8000) openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, 0x0, 0x0, 0x0) setresuid$auto(0x0, 0x0, 0x0) mmap$auto(0x802, 0x404007, 0x8000db, 0x13, r1, 0xb) mmap$auto(0xffff, 0x8000000008, 0x40002, 0x9b72, 0x5, 0xffffffffffffffff) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, 0x0, 0x860102, 0x0) r3 = openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000002340)='/dev/binderfs/binder0\x00', 0x0, 0x0) ioctl$auto_BINDER_WRITE_READ(r3, 0xc0306201, 0x0) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, 0x0, 0x20342, 0x0) writev$auto(r2, 0x0, 0x3) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0x4) r4 = openat$auto_snapshot_fops_user(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) ioctl$auto_SNAPSHOT_ATOMIC_RESTORE(r4, 0x3304, 0x0) mmap$auto(0x2, 0x7fffffffffffffff, 0xe2, 0x18, r0, 0x28000) socket(0x18, 0x3, 0x4) newfstatat$auto(0xffffffffffffffff, 0x0, 0x0, 0xfffffffe) r5 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000200)='/dev/tty12\x00', 0x101440, 0x0) r6 = socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) ioctl$auto(r5, 0x4b67, r6) 1m42.486251948s ago: executing program 3 (id=2071): openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sg0\x00', 0x60042, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, 0x0, 0x100102, 0x0) write$auto(r0, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x3) write$auto(0x3, 0x0, 0x100082) 1m42.279560203s ago: executing program 3 (id=2072): unshare$auto(0x40000080) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r1 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) setresuid$auto(0xffffffffffffffff, 0x0, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r2 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x123002, 0x0) ioctl$auto_KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000180)={0x7}) ioctl$auto_SNDCTL_DSP_GETBLKSIZE(r2, 0xc0045004, &(0x7f0000000080)) mmap$auto(0x0, 0x2020009, 0x3, 0xebf, 0xfffffffffffffffa, 0x80000001) madvise$auto(0xfffffffffffffffe, 0x240007, 0x17) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x8) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x2003f2, 0x15) r3 = syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYRES8=r1], 0x3c}}, 0x24048084) madvise$auto(0x0, 0x200007, 0x19) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/fs/btrfs/features/free_space_tree\x00', 0x40c00, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r4, &(0x7f0000000140)=""/181, 0xb5) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000200)='/sys/devices/platform/vivid.0/video4linux/vbi30/power/control\x00', 0x102, 0x0) ioctl$auto_KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$auto_XFS_IOC_FSBULKSTAT(r1, 0xc0205865, &(0x7f00000002c0)={0x0, 0x10001, 0x0, &(0x7f0000000280)=0x2}) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000640)='/dev/snd/controlC0\x00', 0x0, 0x0) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual/block/loop14/queue/dma_alignment\x00', 0x80000, 0x0) read$auto(r5, 0x0, 0x20) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000200)={{@raw=0x7, 0x1, 0xfffffffb, 0x480008, "3112d58500a8b47148e22af9ffb683dbede3d0bf828bbf100000e5e2f96ee50484b0755015e48d00", @raw=0xfffffffe}, 0x2, 0x5, 0x4, @inferred, @integer64={0x8, 0x0, 0xf}, "7a9fc199a16a2311eacf2fc7ae1da978dc3e8090d70925450ece0bb32777702b07552d000000000000000000ebff0000000000000059a200"}) setsockopt$auto_SO_RCVMARK(r5, 0xf54, 0x4b, &(0x7f0000000340)='z^\x00', 0x400) 1m42.167586643s ago: executing program 1 (id=2073): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async, rerun: 32) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x800, 0x0) (rerun: 32) ioctl$auto(r0, 0x4bfa, 0x1) r1 = open(&(0x7f0000000800)='./file0\x00', 0x22240, 0x154) fcntl$auto(r1, 0x400, 0x1) r2 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$auto_NL80211_CMD_GET_PROTOCOL_FEATURES(0xffffffffffffffff, 0x0, 0xc08c) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) (async, rerun: 64) close_range$auto(0x2, 0x8, 0x0) (async, rerun: 64) socket(0xa, 0x1, 0x84) (async) socket$nl_generic(0x10, 0x3, 0x10) bpf$auto(0x7, &(0x7f0000000340)=@bpf_attr_7={@btf_id=0x101, 0x401, 0x5}, 0x3ff) socket(0x2, 0x1, 0x106) (async) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) (async) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) (async, rerun: 64) select$auto(0xe, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) sysfs$auto(0x2, 0x23, 0x0) (async) r3 = openat$auto_ftrace_set_event_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/tracing/set_event\x00', 0x20201, 0x0) write$auto(r3, 0x0, 0x4) bind$auto(0x3, &(0x7f0000000100)=@in={0x2, 0x3, @empty}, 0x6a) (async, rerun: 32) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) (async, rerun: 32) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x1, 0x0) (async) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) (async) shutdown$auto(0x200000003, 0x2) (async, rerun: 64) sendmsg$auto_NL80211_CMD_GET_WIPHY(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[], 0x1a0}, 0x1, 0x0, 0x0, 0x4040004}, 0x24048000) (async, rerun: 64) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_NL80211_CMD_SET_MCAST_RATE(r4, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0xf0, r2, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@NL80211_ATTR_AP_SETTINGS_FLAGS={0x8, 0x135, 0x4}, @NL80211_ATTR_FILS_ERP_REALM={0xd2, 0xfa, "e20d497d7c16d48cff08ac454213ab6c6ef9743bfc0afb8259cf6582161810ed9e599f54bc32a3cda83f658e05067f5d1b5a2c39e291008fd5a742b4ad65ceb3c850b9b57205db88fa5188c91c6d0c9884e7e5ca226e072e0f36473bd0fa1830b9b17f6dd14793ec24dcb5aafa042584fda9469b41a6ce6a84516194e72ee84ba82c967445be3efc6c48422e0536830baa365dc54b0024ef5f5d06068196460c9adeeeafcf7f909b935509882cd7d39691d8a20f8efbc094b97ff7516e65a9238d5bc38a62c6af7a7c18185f0904"}]}, 0xf0}, 0x1, 0x0, 0x0, 0x810}, 0x0) 1m42.036903138s ago: executing program 2 (id=2074): mmap$auto(0x0, 0xe983, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) mmap$auto(0x0, 0x3, 0xdf, 0xeb1, 0x403, 0x8000) socket(0x1d, 0x3, 0x1) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/platform/dummy_hcd.3/usb4/4-0:1.0/authorized\x00', 0x10b142, 0x0) mmap$auto(0x0, 0x2020006, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) madvise$auto(0x0, 0xffffffffffff0001, 0x15) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop6\x00', 0x400, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r0, 0x4c05, 0xfffffffffffffffd) 1m41.279634578s ago: executing program 3 (id=2075): r0 = openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000000040)='/dev/input/event0\x00', 0x2000, 0x0) ioctl$auto_EVIOCGMASK(r0, 0x80104592, 0x0) mmap$auto(0x0, 0x2040009, 0x20000000df, 0x400000015, 0x7, 0x28000) r1 = openat$auto_snapshot_fops_user(0xffffffffffffff9c, &(0x7f0000000000), 0x8001, 0x0) mmap$auto(0xfffffffffffffffd, 0x20009, 0x0, 0xeb1, 0x40000000000a5, 0x8000) close_range$auto(0x2, r1, 0xfffffffc) mmap$auto(0x80000000, 0xfffffffffffffffc, 0x1c, 0x40eb1, 0xffffffffffffffff, 0x300000000000) socket(0xb, 0x80000, 0x8000037) connect$auto(0x3, &(0x7f0000000000)=@generic={0xa, "0000e100"}, 0x58) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) msync$auto(0x0, 0x2000000005, 0x6) setfsuid$auto(0x0) write$auto(0xca, &(0x7f0000000040)='\x04\x1c\xdc\xec7z\xdf3\xf2\xd3!\v\xb0M\xf8Q\x15\f', 0x2d8) close_range$auto(0x2, 0x8, 0x0) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x2, 0x80002, 0x73) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @local}, 0x54) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x24, 0x0, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_MESH_IFINDEX={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x140080e4) sendmsg$auto_BATADV_CMD_GET_MCAST_FLAGS(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, 0x0, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0xa2}, @BATADV_ATTR_MESH_ADDRESS={0xa, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}]}, 0x28}}, 0x2404c004) syz_genetlink_get_family_id$auto_nfsd(0x0, 0xffffffffffffffff) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) fanotify_mark$auto(0xffffffffffffffff, 0x205, 0xa, 0x4, 0x0) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xe000) preadv2$auto(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x8}, 0x8000000000000001, 0x7fffffffffffffff, 0x2, 0x858b) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) 1m41.120700498s ago: executing program 1 (id=2076): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) io_uring_setup$auto(0x8, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x3, 0xf9) r0 = socket(0x2, 0x2, 0x1) fcntl$auto_F_GET_RW_HINT(r0, 0x40b, 0x4) connect$auto(0x3, &(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x55) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x4, &(0x7f00000002c0)={0x0, 0xfdef}, 0x800, 0x0, 0x5, 0x7}, 0xff}, 0xffffffff, 0xb10) 1m40.984932346s ago: executing program 1 (id=2077): socket(0x2, 0x3, 0xa) (async) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x9, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) (async) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000001b80), r0) (async) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/zswap/parameters/enabled\x00', 0x62, 0x0) write$auto(r2, &(0x7f0000000440)='ON\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94\xf0F\xbb\xa2\xbb>\xade\x18\xbd\xe2\x1c\x89OO]e[\xbb\xf9\xcd\xc0\xc9\x00\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\xef\xc0\x04z\xd0I>\x8f\x00\xe5\x1c*\xed`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\f};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xacA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xdeL/\xed\'\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(\x95\xdfH\xf4\v\xf3CRnz\xc2\x13<\xf0\v\x1f\x14\xf3\xd0\xf2\xd1L!\x81\xea\x83\xa0\r|%\xbf\x02trg\x9a\xe7)\a\xf4\xaa\x05\xc0\xa0r\xd2\x85\x8dH\xd0>\xca\xfc5\x01\x95O4\xca\x95\x1d\x83\xec\nD\x8e\xfb\xce\xd1w\x15:\xe9\x81/B#\xc6\xa1\xfa-\x1b\x8cr\x92nM\xa1\xbb\xe4pd$\xd7\x1b\v\x82\rd\xd2\xaa\v!\xb1}\x92\x89\x8d\xcd\x1e\xc7N\xeeO\x8dO\xe9\xfc\x91\xa1\xa8=R+\a\xb7R\t\f+\x7f\xd5H\x90G=\x9a\r\xb10\x17n\x1b\xf8\v\x11\v\xbb', 0xb8c5) (async) sendmsg$auto_HWSIM_CMD_NEW_RADIO(r0, &(0x7f0000001e00)={0x0, 0x0, &(0x7f0000001dc0)={&(0x7f0000001e40)={0x20, r1, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@HWSIM_ATTR_IFTYPE_SUPPORT={0x8, 0x17, 0x8}, @HWSIM_ATTR_SUPPORT_P2P_DEVICE={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x220000c1}, 0xc0) mmap$auto(0x0, 0xe983, 0x6, 0xeb1, 0xffffffffffffffff, 0x8000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) (async) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) mmap$auto(0x0, 0x10000000400008, 0xdf, 0x9b72, 0x2, 0x40000008000) pipe2$auto(&(0x7f0000000180), 0x1000) (async) socket(0xf, 0x3, 0x2) (async) preadv$auto(r0, &(0x7f0000000140)={&(0x7f00000000c0)="293579062140d23bb49d2abd081f7392047a10cccc095fd021ce22b40555aecc873a7641f5ccae4aec0ed080cf7e9e8faa9e14ec7829e6f428404b3b3bad76d9f1200238c0ec9d2224704e46b7", 0x2}, 0x2, 0x1000, 0x9) (async) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D2\x00', 0x20401, 0x0) (async) mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x8000) (async) io_uring_setup$auto(0xf92b, 0x0) (async) futex$auto(0x0, 0x6, 0x8, 0x0, 0x0, 0x80000001) (async) r3 = gettid() (async) futex$auto(0x0, 0x6, 0x8, 0x0, 0x0, 0x80000001) kill$auto(r3, 0x11) r4 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv6/conf/all/forwarding\x00', 0x42a81, 0x0) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/bdi/43:288/max_ratio_fine\x00', 0x10b142, 0x0) sendfile$auto(r4, r5, 0x0, 0x1000200) 1m40.904350548s ago: executing program 2 (id=2078): mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) r0 = socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) mmap$auto(0x0, 0x200006, 0x2, 0x40eb1, 0x602, 0x300000000000) madvise$auto(0x0, 0x2003f0, 0x18) r1 = openat$auto_lowpan_control_fops_6lowpan(0xffffffffffffff9c, &(0x7f0000000080), 0x4100, 0x0) recvmmsg$auto(r1, 0x0, 0x166, 0x1, 0x0) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) ioctl$auto_VHOST_SET_MEM_TABLE2(r0, 0x4008af03, &(0x7f0000000000)={0x0, 0x0, [{0x0, 0x8001, 0x80000000}, {0x5, 0x100, 0xe6f}, {0xe8, 0x3ff, 0x7}]}) connect$auto(0x3, 0x0, 0x54) sendmmsg$auto(0x4, 0x0, 0x9a6, 0x6) 0s ago: executing program 32 (id=2066): mmap$auto(0xde3b, 0x409, 0xdf, 0xeb1, 0x401, 0x9) madvise$auto(0x0, 0xffffffffffff0001, 0x15) r0 = prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) mmap$auto(0x0, 0x2000020009, 0x4000000000df, 0x14, r0, 0x8004) unshare$auto(0x40000080) symlinkat$auto(0x0, 0xffffffffffffffff, 0x0) mmap$auto(0xfffffffffffffff8, 0x40, 0xdf, 0x8000000000000011, 0xffffffffffffffff, 0x8000) connect$auto(0x3, &(0x7f0000000080)=@l2={0x1f, 0x2, @none, 0x4, 0x2}, 0x54) r1 = openat$auto_uinput_fops_uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$auto(r1, 0xd23, r1) setsockopt$auto(0x400000000000003, 0x29, 0x33, 0x0, 0x20056b) mmap$auto(0xffffffffffffffff, 0x0, 0xdf, 0x8010, r1, 0x7fff) unshare$auto(0x40000080) r2 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x1020009, 0x20004000000000df, 0xeb1, r2, 0x8000) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) sendmsg$auto_NL80211_CMD_SET_FILS_AAD(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200004}, 0xc, &(0x7f00000000c0)={0x0, 0x380}, 0x1, 0x0, 0x0, 0x4040000}, 0x41) io_uring_setup$auto(0x89, 0x0) sendmsg$auto_IEEE802154_ASSOCIATE_RESP(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) close_range$auto(0x2, 0xa, 0x0) io_uring_setup$auto(0x6, 0x0) io_uring_register$auto(0x2, 0x0, &(0x7f0000000000), 0x1000) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) mmap$auto(0x400000000000000, 0x2020009, 0x3, 0xeb3, 0xfffffffffffffffa, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x80302, 0x0) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x100201, 0x0) openat$auto_fops_atomic_t_(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/fail_io_timeout/times\x00', 0x0, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual/block/ram9/diskseq\x00', 0x40, 0x0) kernel console output (not intermixed with test programs): _fault+0x64/0xc0 [ 440.851110][T13754] asm_exc_page_fault+0x26/0x30 [ 440.851124][T13754] RIP: 0010:rep_movs_alternative+0x30/0x90 [ 440.851141][T13754] Code: 83 f9 08 73 25 85 c9 74 0f 8a 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 0d 81 04 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 90 <48> 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 [ 440.851153][T13754] RSP: 0018:ffffc9000c77fb80 EFLAGS: 00050212 [ 440.851165][T13754] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000022 [ 440.851173][T13754] RDX: fffff520018eff80 RSI: 0000000000000000 RDI: ffffc9000c77fbe0 [ 440.851182][T13754] RBP: 0000000000000022 R08: 0000000000000001 R09: fffff520018eff80 [ 440.851190][T13754] R10: 0000000000000001 R11: ffff8880365966b0 R12: 0000000000000000 [ 440.851198][T13754] R13: ffffc9000c77fbe0 R14: ffffc9000c77fca8 R15: ffffc9000c77fbe0 [ 440.851229][T13754] _copy_from_user+0x98/0xd0 [ 440.851246][T13754] kstrtouint_from_user+0xd6/0x1d0 [ 440.851266][T13754] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 440.851283][T13754] ? __lock_acquire+0x436/0x2890 [ 440.851300][T13754] ? lock_acquire+0x179/0x330 [ 440.851317][T13754] proc_fail_nth_write+0x83/0x220 [ 440.851331][T13754] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 440.851349][T13754] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 440.851360][T13754] vfs_write+0x2a0/0x11d0 [ 440.851381][T13754] ? __pfx___mutex_lock+0x10/0x10 [ 440.851401][T13754] ? __pfx_vfs_write+0x10/0x10 [ 440.851424][T13754] ? __fget_files+0x20e/0x3c0 [ 440.851448][T13754] ksys_write+0x12a/0x250 [ 440.851466][T13754] ? __pfx_ksys_write+0x10/0x10 [ 440.851489][T13754] do_syscall_64+0xcd/0xf80 [ 440.851509][T13754] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 440.851523][T13754] RIP: 0033:0x7f2fe878f7c9 [ 440.851535][T13754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 440.851548][T13754] RSP: 002b:00007f2fe969d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 440.851560][T13754] RAX: ffffffffffffffda RBX: 00007f2fe89e5fa0 RCX: 00007f2fe878f7c9 [ 440.851569][T13754] RDX: 00000000fffffdef RSI: 0000000000000000 RDI: 0000000000000003 [ 440.851577][T13754] RBP: 00007f2fe8813f91 R08: 0000000000000000 R09: 0000000000000000 [ 440.851586][T13754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 440.851593][T13754] R13: 00007f2fe89e6038 R14: 00007f2fe89e5fa0 R15: 00007ffd12a38338 [ 440.851612][T13754] [ 441.379566][T13754] FAULT_INJECTION: forcing a failure. [ 441.379566][T13754] name failslab, interval 1, probability 0, space 0, times 0 [ 441.407238][T13757] snd_aloop snd_aloop.0: snd_timer_open (10,0,0) failed with -19 [ 441.415775][T13758] snd_aloop snd_aloop.0: snd_timer_open (10,0,0) failed with -19 [ 441.424933][T13757] vivid-003: ================= START STATUS ================= [ 441.432743][T13757] vivid-003: Radio HW Seek Mode: Bounded [ 441.435760][T13754] CPU: 0 UID: 0 PID: 13754 Comm: syz.1.1747 Tainted: G U L syzkaller #0 PREEMPT(full) [ 441.435802][T13754] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 441.435812][T13754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 441.435827][T13754] Call Trace: [ 441.435836][T13754] [ 441.435846][T13754] dump_stack_lvl+0x16c/0x1f0 [ 441.435886][T13754] should_fail_ex+0x512/0x640 [ 441.435912][T13754] ? __kmalloc_cache_noprof+0x5f/0x800 [ 441.435944][T13754] should_failslab+0xc2/0x120 [ 441.435980][T13754] __kmalloc_cache_noprof+0x80/0x800 [ 441.436007][T13754] ? fuse_dev_alloc+0x48/0x280 [ 441.436046][T13754] ? fuse_dev_alloc+0x48/0x280 [ 441.436079][T13754] fuse_dev_alloc+0x48/0x280 [ 441.436114][T13754] fuse_dev_alloc_install+0x13/0x40 [ 441.436148][T13754] cuse_channel_open+0x100/0x7f0 [ 441.436181][T13754] ? __pfx_cuse_channel_open+0x10/0x10 [ 441.436215][T13754] misc_open+0x26d/0x450 [ 441.436241][T13754] ? __pfx_misc_open+0x10/0x10 [ 441.436267][T13754] chrdev_open+0x234/0x6a0 [ 441.436300][T13754] ? __pfx_apparmor_file_open+0x10/0x10 [ 441.436324][T13754] ? __pfx_chrdev_open+0x10/0x10 [ 441.436359][T13754] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 441.436403][T13754] do_dentry_open+0x748/0x1590 [ 441.436436][T13754] ? __pfx_chrdev_open+0x10/0x10 [ 441.436486][T13754] vfs_open+0x82/0x3f0 [ 441.436517][T13754] path_openat+0x2078/0x3140 [ 441.436563][T13754] ? __pfx_path_openat+0x10/0x10 [ 441.436610][T13754] do_filp_open+0x20b/0x470 [ 441.436644][T13754] ? __pfx_do_filp_open+0x10/0x10 [ 441.436703][T13754] ? alloc_fd+0x471/0x7d0 [ 441.436745][T13754] do_sys_openat2+0x121/0x290 [ 441.436771][T13754] ? __pfx_do_sys_openat2+0x10/0x10 [ 441.436811][T13754] __x64_sys_openat+0x174/0x210 [ 441.436837][T13754] ? __pfx___x64_sys_openat+0x10/0x10 [ 441.436879][T13754] do_syscall_64+0xcd/0xf80 [ 441.436915][T13754] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 441.436939][T13754] RIP: 0033:0x7f2fe878f7c9 [ 441.436960][T13754] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.436984][T13754] RSP: 002b:00007f2fe969d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 441.437007][T13754] RAX: ffffffffffffffda RBX: 00007f2fe89e5fa0 RCX: 00007f2fe878f7c9 [ 441.437025][T13754] RDX: 0000000000181041 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 441.437042][T13754] RBP: 00007f2fe8813f91 R08: 0000000000000000 R09: 0000000000000000 [ 441.437057][T13754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 441.437072][T13754] R13: 00007f2fe89e6038 R14: 00007f2fe89e5fa0 R15: 00007ffd12a38338 [ 441.437107][T13754] [ 441.651634][T13760] Invalid ELF header magic: != ELF [ 441.658429][T13757] vivid-003: Radio Programmable HW Seek: false [ 441.714437][T13757] vivid-003: RDS Rx I/O Mode: Block I/O [ 441.721607][T13757] vivid-003: Generate RBDS Instead of RDS: false [ 441.727971][T13757] vivid-003: RDS Reception: true [ 441.733008][T13757] vivid-003: RDS Program Type: 0 inactive [ 441.738762][T13757] vivid-003: RDS PS Name: inactive [ 441.744123][T13757] vivid-003: RDS Radio Text: inactive [ 441.763639][T13757] vivid-003: RDS Traffic Announcement: false inactive [ 441.797655][T13757] vivid-003: RDS Traffic Program: false inactive [ 441.829484][T13757] vivid-003: RDS Music: false inactive [ 441.835018][T13757] vivid-003: ================== END STATUS ================== [ 441.889855][T13767] usb usb15: usbfs: process 13767 (syz.1.1749) did not claim interface 0 before use [ 442.075189][T13771] snd_aloop snd_aloop.0: snd_timer_open (10,0,0) failed with -19 [ 442.102807][T13771] snd_aloop snd_aloop.0: snd_timer_open (10,0,0) failed with -19 [ 442.257938][T13776] FAULT_INJECTION: forcing a failure. [ 442.257938][T13776] name failslab, interval 1, probability 0, space 0, times 0 [ 442.305879][T13776] CPU: 1 UID: 0 PID: 13776 Comm: syz.0.1752 Tainted: G U L syzkaller #0 PREEMPT(full) [ 442.305908][T13776] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 442.305914][T13776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 442.305923][T13776] Call Trace: [ 442.305929][T13776] [ 442.305935][T13776] dump_stack_lvl+0x16c/0x1f0 [ 442.305961][T13776] should_fail_ex+0x512/0x640 [ 442.305977][T13776] ? kmem_cache_alloc_lru_noprof+0x66/0x770 [ 442.305997][T13776] should_failslab+0xc2/0x120 [ 442.306018][T13776] kmem_cache_alloc_lru_noprof+0x87/0x770 [ 442.306036][T13776] ? shmem_alloc_inode+0x25/0x50 [ 442.306056][T13776] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 442.306073][T13776] ? shmem_alloc_inode+0x25/0x50 [ 442.306091][T13776] shmem_alloc_inode+0x25/0x50 [ 442.306108][T13776] alloc_inode+0x64/0x240 [ 442.306123][T13776] new_inode+0x22/0x1c0 [ 442.306139][T13776] shmem_get_inode+0x19a/0xfb0 [ 442.306162][T13776] shmem_mknod+0x1a2/0x3b0 [ 442.306183][T13776] ? __pfx_shmem_create+0x10/0x10 [ 442.306200][T13776] lookup_open.isra.0+0x12dc/0x1780 [ 442.306222][T13776] ? __pfx_lookup_open.isra.0+0x10/0x10 [ 442.306242][T13776] ? find_held_lock+0x2b/0x80 [ 442.306264][T13776] ? __pfx_down_write+0x10/0x10 [ 442.306282][T13776] path_openat+0xa95/0x3140 [ 442.306307][T13776] ? __pfx_path_openat+0x10/0x10 [ 442.306339][T13776] do_filp_open+0x20b/0x470 [ 442.306360][T13776] ? __pfx_do_filp_open+0x10/0x10 [ 442.306393][T13776] ? alloc_fd+0x471/0x7d0 [ 442.306418][T13776] do_sys_openat2+0x121/0x290 [ 442.306433][T13776] ? __pfx_do_sys_openat2+0x10/0x10 [ 442.306456][T13776] __x64_sys_openat+0x174/0x210 [ 442.306471][T13776] ? __pfx___x64_sys_openat+0x10/0x10 [ 442.306494][T13776] do_syscall_64+0xcd/0xf80 [ 442.306513][T13776] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 442.306528][T13776] RIP: 0033:0x7fdcb718f7c9 [ 442.306539][T13776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 442.306553][T13776] RSP: 002b:00007fdcb8035038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 442.306566][T13776] RAX: ffffffffffffffda RBX: 00007fdcb73e5fa0 RCX: 00007fdcb718f7c9 [ 442.306575][T13776] RDX: 0000000000181041 RSI: 0000000000000000 RDI: ffffffffffffff9c [ 442.306583][T13776] RBP: 00007fdcb7213f91 R08: 0000000000000000 R09: 0000000000000000 [ 442.306591][T13776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 442.306600][T13776] R13: 00007fdcb73e6038 R14: 00007fdcb73e5fa0 R15: 00007fffd5191438 [ 442.306619][T13776] [ 442.680161][T13781] random: crng reseeded on system resumption [ 442.823846][T13785] FAULT_INJECTION: forcing a failure. [ 442.823846][T13785] name fail_futex, interval 1, probability 0, space 0, times 0 [ 442.867532][T13785] CPU: 0 UID: 0 PID: 13785 Comm: syz.0.1756 Tainted: G U L syzkaller #0 PREEMPT(full) [ 442.867575][T13785] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 442.867584][T13785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 442.867597][T13785] Call Trace: [ 442.867605][T13785] [ 442.867615][T13785] dump_stack_lvl+0x16c/0x1f0 [ 442.867654][T13785] should_fail_ex+0x512/0x640 [ 442.867682][T13785] get_futex_key+0x293/0x15f0 [ 442.867710][T13785] ? __pfx_get_futex_key+0x10/0x10 [ 442.867746][T13785] futex_wake+0xea/0x530 [ 442.867779][T13785] ? __pfx_futex_wake+0x10/0x10 [ 442.867823][T13785] do_futex+0x1e3/0x350 [ 442.867850][T13785] ? __pfx_do_futex+0x10/0x10 [ 442.867873][T13785] ? __might_fault+0xe3/0x190 [ 442.867908][T13785] mm_release+0x24e/0x300 [ 442.867938][T13785] do_exit+0x69e/0x2bd0 [ 442.867968][T13785] ? __pfx_do_exit+0x10/0x10 [ 442.867990][T13785] ? do_raw_spin_lock+0x12c/0x2b0 [ 442.868016][T13785] ? find_held_lock+0x2b/0x80 [ 442.868050][T13785] do_group_exit+0xd3/0x2a0 [ 442.868075][T13785] get_signal+0x2671/0x26d0 [ 442.868114][T13785] ? vfs_write+0x15d/0x11d0 [ 442.868146][T13785] ? __pfx_get_signal+0x10/0x10 [ 442.868178][T13785] ? do_futex+0x122/0x350 [ 442.868207][T13785] arch_do_signal_or_restart+0x8f/0x7a0 [ 442.868240][T13785] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 442.868280][T13785] ? fput+0x70/0xf0 [ 442.868301][T13785] ? __pfx___x64_sys_futex+0x10/0x10 [ 442.868341][T13785] exit_to_user_mode_loop+0x8c/0x540 [ 442.868374][T13785] do_syscall_64+0x4ee/0xf80 [ 442.868409][T13785] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 442.868433][T13785] RIP: 0033:0x7fdcb718f7c9 [ 442.868452][T13785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 442.868473][T13785] RSP: 002b:00007fdcb80350e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 442.868495][T13785] RAX: fffffffffffffe00 RBX: 00007fdcb73e5fa8 RCX: 00007fdcb718f7c9 [ 442.868509][T13785] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fdcb73e5fa8 [ 442.868523][T13785] RBP: 00007fdcb73e5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 442.868536][T13785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 442.868549][T13785] R13: 00007fdcb73e6038 R14: 00007fffd5191350 R15: 00007fffd5191438 [ 442.868582][T13785] [ 443.264142][T13790] FAULT_INJECTION: forcing a failure. [ 443.264142][T13790] name failslab, interval 1, probability 0, space 0, times 0 [ 443.367155][T13790] CPU: 1 UID: 0 PID: 13790 Comm: syz.2.1758 Tainted: G U L syzkaller #0 PREEMPT(full) [ 443.367197][T13790] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 443.367206][T13790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 443.367219][T13790] Call Trace: [ 443.367227][T13790] [ 443.367237][T13790] dump_stack_lvl+0x16c/0x1f0 [ 443.367277][T13790] should_fail_ex+0x512/0x640 [ 443.367305][T13790] ? fs_reclaim_acquire+0xae/0x150 [ 443.367345][T13790] should_failslab+0xc2/0x120 [ 443.367374][T13790] __kmalloc_node_track_caller_noprof+0xec/0x930 [ 443.367395][T13790] ? ima_collect_measurement+0x4c2/0xa50 [ 443.367414][T13790] ? krealloc_node_align_noprof+0x2ea/0x3d0 [ 443.367431][T13790] krealloc_node_align_noprof+0x2ea/0x3d0 [ 443.367448][T13790] ? ima_calc_file_hash+0x1e2/0x490 [ 443.367464][T13790] ima_collect_measurement+0x4c2/0xa50 [ 443.367477][T13790] ? ksys_mmap_pgoff+0x1c8/0x5c0 [ 443.367499][T13790] ? __pfx_ima_collect_measurement+0x10/0x10 [ 443.367514][T13790] ? lock_acquire+0x179/0x330 [ 443.367538][T13790] ? process_measurement+0x7f8/0x22d0 [ 443.367556][T13790] ? is_bad_inode+0xd/0x40 [ 443.367572][T13790] ? xattr_resolve_name+0x27b/0x3f0 [ 443.367593][T13790] ? vfs_getxattr_alloc+0xec/0x350 [ 443.367615][T13790] ? ima_get_hash_algo+0x27c/0x400 [ 443.367633][T13790] ? __pfx_ima_get_hash_algo+0x10/0x10 [ 443.367656][T13790] ? process_measurement+0x11b9/0x22d0 [ 443.367674][T13790] process_measurement+0x11b9/0x22d0 [ 443.367699][T13790] ? __pfx_process_measurement+0x10/0x10 [ 443.367717][T13790] ? kasan_save_stack+0x42/0x60 [ 443.367733][T13790] ? kasan_save_track+0x14/0x30 [ 443.367749][T13790] ? kmem_cache_alloc_noprof+0x25e/0x770 [ 443.367769][T13790] ? find_held_lock+0x2b/0x80 [ 443.367786][T13790] ? aa_file_perm+0x29e/0x1560 [ 443.367824][T13790] ima_file_mmap+0x1b6/0x1e0 [ 443.367844][T13790] ? __pfx_ima_file_mmap+0x10/0x10 [ 443.367868][T13790] security_mmap_file+0x88c/0x990 [ 443.367886][T13790] vm_mmap_pgoff+0xec/0x470 [ 443.367906][T13790] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 443.367922][T13790] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 443.367938][T13790] ? hugetlbfs_get_inode+0x31f/0x700 [ 443.367957][T13790] ksys_mmap_pgoff+0x1c8/0x5c0 [ 443.367978][T13790] __x64_sys_mmap+0x125/0x190 [ 443.367995][T13790] do_syscall_64+0xcd/0xf80 [ 443.368029][T13790] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 443.368045][T13790] RIP: 0033:0x7ff45cd8f7c9 [ 443.368058][T13790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 443.368072][T13790] RSP: 002b:00007ff45dc93038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 443.368087][T13790] RAX: ffffffffffffffda RBX: 00007ff45cfe6090 RCX: 00007ff45cd8f7c9 [ 443.368096][T13790] RDX: 00004000000000df RSI: 0000000000000004 RDI: 0000000000000004 [ 443.368105][T13790] RBP: 00007ff45ce13f91 R08: 0000000000000004 R09: 0000300000000000 [ 443.368114][T13790] R10: 0000000000040eb2 R11: 0000000000000246 R12: 0000000000000000 [ 443.368122][T13790] R13: 00007ff45cfe6128 R14: 00007ff45cfe6090 R15: 00007ffd2a275328 [ 443.368142][T13790] [ 443.708483][ T30] audit: type=1800 audit(1843104652.256:23): pid=13790 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.2.1758" name="anon_hugepage" dev="hugetlbfs" ino=55019 res=0 errno=0 [ 443.820265][T13798] Invalid ELF header magic: != ELF [ 443.937884][T13805] FAULT_INJECTION: forcing a failure. [ 443.937884][T13805] name failslab, interval 1, probability 0, space 0, times 0 [ 443.957864][T13805] CPU: 1 UID: 0 PID: 13805 Comm: syz.1.1762 Tainted: G U L syzkaller #0 PREEMPT(full) [ 443.957908][T13805] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 443.957917][T13805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 443.957932][T13805] Call Trace: [ 443.957941][T13805] [ 443.957951][T13805] dump_stack_lvl+0x16c/0x1f0 [ 443.957989][T13805] should_fail_ex+0x512/0x640 [ 443.958012][T13805] ? kmem_cache_alloc_lru_noprof+0x66/0x770 [ 443.958041][T13805] should_failslab+0xc2/0x120 [ 443.958069][T13805] kmem_cache_alloc_lru_noprof+0x87/0x770 [ 443.958098][T13805] ? __d_alloc+0x35/0xa80 [ 443.958123][T13805] ? __d_alloc+0x35/0xa80 [ 443.958141][T13805] __d_alloc+0x35/0xa80 [ 443.958165][T13805] d_alloc_pseudo+0x1c/0xc0 [ 443.958192][T13805] alloc_file_pseudo+0xcf/0x230 [ 443.958220][T13805] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 443.958268][T13805] ? alloc_fd+0x471/0x7d0 [ 443.958307][T13805] sock_alloc_file+0x50/0x210 [ 443.958341][T13805] __sys_socket+0x1c0/0x260 [ 443.958363][T13805] ? fput+0x70/0xf0 [ 443.958385][T13805] ? __pfx___sys_socket+0x10/0x10 [ 443.958409][T13805] ? xfd_validate_state+0x61/0x180 [ 443.958431][T13805] ? __pfx_ksys_write+0x10/0x10 [ 443.958469][T13805] __x64_sys_socket+0x72/0xb0 [ 443.958491][T13805] ? lockdep_hardirqs_on+0x7c/0x110 [ 443.958525][T13805] do_syscall_64+0xcd/0xf80 [ 443.958561][T13805] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 443.958586][T13805] RIP: 0033:0x7f2fe878f7c9 [ 443.958606][T13805] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 443.958631][T13805] RSP: 002b:00007f2fe965b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 443.958656][T13805] RAX: ffffffffffffffda RBX: 00007f2fe89e6180 RCX: 00007f2fe878f7c9 [ 443.958672][T13805] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000023 [ 443.958686][T13805] RBP: 00007f2fe8813f91 R08: 0000000000000000 R09: 0000000000000000 [ 443.958702][T13805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 443.958717][T13805] R13: 00007f2fe89e6218 R14: 00007f2fe89e6180 R15: 00007ffd12a38338 [ 443.958750][T13805] [ 444.218801][T13808] FAULT_INJECTION: forcing a failure. [ 444.218801][T13808] name failslab, interval 1, probability 0, space 0, times 0 [ 444.238739][T13808] CPU: 0 UID: 0 PID: 13808 Comm: syz.2.1763 Tainted: G U L syzkaller #0 PREEMPT(full) [ 444.238785][T13808] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 444.238795][T13808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 444.238811][T13808] Call Trace: [ 444.238821][T13808] [ 444.238833][T13808] dump_stack_lvl+0x16c/0x1f0 [ 444.238876][T13808] should_fail_ex+0x512/0x640 [ 444.238903][T13808] ? kmem_cache_alloc_lru_noprof+0x66/0x770 [ 444.238938][T13808] should_failslab+0xc2/0x120 [ 444.238974][T13808] kmem_cache_alloc_lru_noprof+0x87/0x770 [ 444.239006][T13808] ? shmem_alloc_inode+0x25/0x50 [ 444.239044][T13808] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 444.239075][T13808] ? shmem_alloc_inode+0x25/0x50 [ 444.239104][T13808] shmem_alloc_inode+0x25/0x50 [ 444.239135][T13808] alloc_inode+0x64/0x240 [ 444.239163][T13808] new_inode+0x22/0x1c0 [ 444.239202][T13808] shmem_get_inode+0x19a/0xfb0 [ 444.239248][T13808] shmem_mknod+0x1a2/0x3b0 [ 444.239288][T13808] ? __pfx_shmem_create+0x10/0x10 [ 444.239319][T13808] lookup_open.isra.0+0x12dc/0x1780 [ 444.239359][T13808] ? __pfx_lookup_open.isra.0+0x10/0x10 [ 444.239396][T13808] ? find_held_lock+0x2b/0x80 [ 444.239436][T13808] ? __pfx_down_write+0x10/0x10 [ 444.239470][T13808] path_openat+0xa95/0x3140 [ 444.239516][T13808] ? __pfx_path_openat+0x10/0x10 [ 444.239564][T13808] do_filp_open+0x20b/0x470 [ 444.239600][T13808] ? __pfx_do_filp_open+0x10/0x10 [ 444.239661][T13808] ? alloc_fd+0x471/0x7d0 [ 444.239705][T13808] do_sys_openat2+0x121/0x290 [ 444.239732][T13808] ? __pfx_do_sys_openat2+0x10/0x10 [ 444.239774][T13808] __x64_sys_openat+0x174/0x210 [ 444.239803][T13808] ? __pfx___x64_sys_openat+0x10/0x10 [ 444.239846][T13808] do_syscall_64+0xcd/0xf80 [ 444.239884][T13808] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 444.239909][T13808] RIP: 0033:0x7ff45cd8f7c9 [ 444.239931][T13808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 444.239957][T13808] RSP: 002b:00007ff45dcb4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 444.239981][T13808] RAX: ffffffffffffffda RBX: 00007ff45cfe5fa0 RCX: 00007ff45cd8f7c9 [ 444.239999][T13808] RDX: 0000000000181041 RSI: 0000000000000000 RDI: ffffffffffffff9c [ 444.240016][T13808] RBP: 00007ff45ce13f91 R08: 0000000000000000 R09: 0000000000000000 [ 444.240030][T13808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 444.240045][T13808] R13: 00007ff45cfe6038 R14: 00007ff45cfe5fa0 R15: 00007ffd2a275328 [ 444.240082][T13808] [ 444.681266][T13812] netlink: 16 bytes leftover after parsing attributes in process `syz.2.1764'. [ 444.711481][T13815] random: crng reseeded on system resumption [ 445.073856][T13818] usb usb15: usbfs: process 13818 (syz.0.1766) did not claim interface 0 before use [ 445.317337][T13828] zswap: compressor not available [ 445.679287][T13848] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1773'. [ 446.684854][T13859] Invalid ELF header magic: != ELF [ 447.037779][T13864] FAULT_INJECTION: forcing a failure. [ 447.037779][T13864] name failslab, interval 1, probability 0, space 0, times 0 [ 447.052832][T13864] CPU: 1 UID: 0 PID: 13864 Comm: syz.0.1777 Tainted: G U L syzkaller #0 PREEMPT(full) [ 447.052879][T13864] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 447.052890][T13864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 447.052905][T13864] Call Trace: [ 447.052914][T13864] [ 447.052925][T13864] dump_stack_lvl+0x16c/0x1f0 [ 447.052966][T13864] should_fail_ex+0x512/0x640 [ 447.052994][T13864] ? __kmalloc_cache_noprof+0x5f/0x800 [ 447.053028][T13864] should_failslab+0xc2/0x120 [ 447.053064][T13864] __kmalloc_cache_noprof+0x80/0x800 [ 447.053093][T13864] ? fuse_dev_alloc+0x48/0x280 [ 447.053133][T13864] ? fuse_dev_alloc+0x48/0x280 [ 447.053166][T13864] fuse_dev_alloc+0x48/0x280 [ 447.053203][T13864] fuse_dev_alloc_install+0x13/0x40 [ 447.053239][T13864] cuse_channel_open+0x100/0x7f0 [ 447.053273][T13864] ? __pfx_cuse_channel_open+0x10/0x10 [ 447.053307][T13864] misc_open+0x26d/0x450 [ 447.053334][T13864] ? __pfx_misc_open+0x10/0x10 [ 447.053361][T13864] chrdev_open+0x234/0x6a0 [ 447.053396][T13864] ? __pfx_apparmor_file_open+0x10/0x10 [ 447.053423][T13864] ? __pfx_chrdev_open+0x10/0x10 [ 447.053460][T13864] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 447.053504][T13864] do_dentry_open+0x748/0x1590 [ 447.053536][T13864] ? __pfx_chrdev_open+0x10/0x10 [ 447.053580][T13864] vfs_open+0x82/0x3f0 [ 447.053622][T13864] path_openat+0x2078/0x3140 [ 447.053673][T13864] ? __pfx_path_openat+0x10/0x10 [ 447.053723][T13864] do_filp_open+0x20b/0x470 [ 447.053758][T13864] ? __pfx_do_filp_open+0x10/0x10 [ 447.053820][T13864] ? alloc_fd+0x471/0x7d0 [ 447.053863][T13864] do_sys_openat2+0x121/0x290 [ 447.053892][T13864] ? __pfx_do_sys_openat2+0x10/0x10 [ 447.053933][T13864] __x64_sys_openat+0x174/0x210 [ 447.053962][T13864] ? __pfx___x64_sys_openat+0x10/0x10 [ 447.054004][T13864] do_syscall_64+0xcd/0xf80 [ 447.054042][T13864] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 447.054069][T13864] RIP: 0033:0x7fdcb718f7c9 [ 447.054091][T13864] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 447.054115][T13864] RSP: 002b:00007fdcb8035038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 447.054142][T13864] RAX: ffffffffffffffda RBX: 00007fdcb73e5fa0 RCX: 00007fdcb718f7c9 [ 447.054161][T13864] RDX: 0000000000181041 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 447.054177][T13864] RBP: 00007fdcb7213f91 R08: 0000000000000000 R09: 0000000000000000 [ 447.054194][T13864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 447.054209][T13864] R13: 00007fdcb73e6038 R14: 00007fdcb73e5fa0 R15: 00007fffd5191438 [ 447.054255][T13864] [ 447.423678][T13871] FAULT_INJECTION: forcing a failure. [ 447.423678][T13871] name fail_futex, interval 1, probability 0, space 0, times 0 [ 447.437244][T13871] CPU: 1 UID: 0 PID: 13871 Comm: syz.3.1778 Tainted: G U L syzkaller #0 PREEMPT(full) [ 447.437284][T13871] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 447.437293][T13871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 447.437308][T13871] Call Trace: [ 447.437316][T13871] [ 447.437326][T13871] dump_stack_lvl+0x16c/0x1f0 [ 447.437364][T13871] should_fail_ex+0x512/0x640 [ 447.437395][T13871] get_futex_key+0x1d0/0x15f0 [ 447.437425][T13871] ? __pfx_get_futex_key+0x10/0x10 [ 447.437460][T13871] futex_wake+0xea/0x530 [ 447.437492][T13871] ? __pfx_futex_wake+0x10/0x10 [ 447.437537][T13871] do_futex+0x1e3/0x350 [ 447.437564][T13871] ? __pfx_do_futex+0x10/0x10 [ 447.437587][T13871] ? __might_fault+0xe3/0x190 [ 447.437622][T13871] mm_release+0x24e/0x300 [ 447.437653][T13871] do_exit+0x69e/0x2bd0 [ 447.437682][T13871] ? __pfx_do_exit+0x10/0x10 [ 447.437704][T13871] ? do_raw_spin_lock+0x12c/0x2b0 [ 447.437729][T13871] ? find_held_lock+0x2b/0x80 [ 447.437762][T13871] do_group_exit+0xd3/0x2a0 [ 447.437787][T13871] get_signal+0x2671/0x26d0 [ 447.437830][T13871] ? __pfx_get_signal+0x10/0x10 [ 447.437862][T13871] ? do_futex+0x122/0x350 [ 447.437896][T13871] arch_do_signal_or_restart+0x8f/0x7a0 [ 447.437929][T13871] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 447.437969][T13871] ? fput+0x70/0xf0 [ 447.437992][T13871] ? __pfx___x64_sys_futex+0x10/0x10 [ 447.438024][T13871] exit_to_user_mode_loop+0x8c/0x540 [ 447.438058][T13871] do_syscall_64+0x4ee/0xf80 [ 447.438093][T13871] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 447.438117][T13871] RIP: 0033:0x7fca4b58f7c9 [ 447.438136][T13871] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 447.438159][T13871] RSP: 002b:00007fca4c3e20e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 447.438182][T13871] RAX: fffffffffffffe00 RBX: 00007fca4b7e5fa8 RCX: 00007fca4b58f7c9 [ 447.438198][T13871] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fca4b7e5fa8 [ 447.438213][T13871] RBP: 00007fca4b7e5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 447.438228][T13871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 447.438243][T13871] R13: 00007fca4b7e6038 R14: 00007ffd3eb2d040 R15: 00007ffd3eb2d128 [ 447.438277][T13871] [ 447.746126][T12904] Bluetooth: hci1: unexpected subevent 0x01 length: 123 > 18 [ 447.838230][T13881] FAULT_INJECTION: forcing a failure. [ 447.838230][T13881] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 447.852078][T13881] CPU: 1 UID: 0 PID: 13881 Comm: syz.0.1780 Tainted: G U L syzkaller #0 PREEMPT(full) [ 447.852119][T13881] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 447.852128][T13881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 447.852143][T13881] Call Trace: [ 447.852152][T13881] [ 447.852161][T13881] dump_stack_lvl+0x16c/0x1f0 [ 447.852198][T13881] should_fail_ex+0x512/0x640 [ 447.852230][T13881] _copy_from_user+0x2e/0xd0 [ 447.852256][T13881] kstrtouint_from_user+0xd6/0x1d0 [ 447.852287][T13881] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 447.852315][T13881] ? __lock_acquire+0x436/0x2890 [ 447.852343][T13881] ? lock_acquire+0x179/0x330 [ 447.852373][T13881] proc_fail_nth_write+0x83/0x220 [ 447.852396][T13881] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 447.852429][T13881] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 447.852450][T13881] vfs_write+0x2a0/0x11d0 [ 447.852482][T13881] ? __pfx___mutex_lock+0x10/0x10 [ 447.852517][T13881] ? __pfx_vfs_write+0x10/0x10 [ 447.852557][T13881] ? __fget_files+0x20e/0x3c0 [ 447.852609][T13881] ksys_write+0x12a/0x250 [ 447.852638][T13881] ? __pfx_ksys_write+0x10/0x10 [ 447.852679][T13881] do_syscall_64+0xcd/0xf80 [ 447.852712][T13881] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 447.852736][T13881] RIP: 0033:0x7fdcb718e27f [ 447.852754][T13881] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 447.852778][T13881] RSP: 002b:00007fdcb8035030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 447.852800][T13881] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fdcb718e27f [ 447.852816][T13881] RDX: 0000000000000001 RSI: 00007fdcb8035090 RDI: 0000000000000005 [ 447.852831][T13881] RBP: 00007fdcb8035090 R08: 0000000000000000 R09: 00007fdcb8034df7 [ 447.852845][T13881] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 447.852859][T13881] R13: 00007fdcb73e6038 R14: 00007fdcb73e5fa0 R15: 00007fffd5191438 [ 447.852895][T13881] [ 448.365866][T13900] usb usb15: usbfs: process 13900 (syz.3.1784) did not claim interface 0 before use [ 449.180941][T13915] FAULT_INJECTION: forcing a failure. [ 449.180941][T13915] name failslab, interval 1, probability 0, space 0, times 0 [ 449.214739][T13915] CPU: 1 UID: 0 PID: 13915 Comm: syz.1.1790 Tainted: G U L syzkaller #0 PREEMPT(full) [ 449.214782][T13915] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 449.214792][T13915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 449.214805][T13915] Call Trace: [ 449.214814][T13915] [ 449.214824][T13915] dump_stack_lvl+0x16c/0x1f0 [ 449.214864][T13915] should_fail_ex+0x512/0x640 [ 449.214892][T13915] ? __kmalloc_cache_noprof+0x5f/0x800 [ 449.214925][T13915] should_failslab+0xc2/0x120 [ 449.214961][T13915] __kmalloc_cache_noprof+0x80/0x800 [ 449.214990][T13915] ? fuse_dev_alloc+0x48/0x280 [ 449.215030][T13915] ? fuse_dev_alloc+0x48/0x280 [ 449.215062][T13915] fuse_dev_alloc+0x48/0x280 [ 449.215098][T13915] fuse_dev_alloc_install+0x13/0x40 [ 449.215129][T13915] cuse_channel_open+0x100/0x7f0 [ 449.215159][T13915] ? __pfx_cuse_channel_open+0x10/0x10 [ 449.215191][T13915] misc_open+0x26d/0x450 [ 449.215218][T13915] ? __pfx_misc_open+0x10/0x10 [ 449.215244][T13915] chrdev_open+0x234/0x6a0 [ 449.215278][T13915] ? __pfx_apparmor_file_open+0x10/0x10 [ 449.215304][T13915] ? __pfx_chrdev_open+0x10/0x10 [ 449.215341][T13915] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 449.215385][T13915] do_dentry_open+0x748/0x1590 [ 449.215417][T13915] ? __pfx_chrdev_open+0x10/0x10 [ 449.215463][T13915] vfs_open+0x82/0x3f0 [ 449.215497][T13915] path_openat+0x2078/0x3140 [ 449.215541][T13915] ? __pfx_path_openat+0x10/0x10 [ 449.215587][T13915] do_filp_open+0x20b/0x470 [ 449.215622][T13915] ? __pfx_do_filp_open+0x10/0x10 [ 449.215680][T13915] ? alloc_fd+0x471/0x7d0 [ 449.215733][T13915] do_sys_openat2+0x121/0x290 [ 449.215764][T13915] ? __pfx_do_sys_openat2+0x10/0x10 [ 449.215809][T13915] __x64_sys_openat+0x174/0x210 [ 449.215837][T13915] ? __pfx___x64_sys_openat+0x10/0x10 [ 449.215879][T13915] do_syscall_64+0xcd/0xf80 [ 449.215919][T13915] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 449.215946][T13915] RIP: 0033:0x7f2fe878f7c9 [ 449.215965][T13915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 449.215983][T13915] RSP: 002b:00007f2fe969d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 449.216006][T13915] RAX: ffffffffffffffda RBX: 00007f2fe89e5fa0 RCX: 00007f2fe878f7c9 [ 449.216022][T13915] RDX: 0000000000181041 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 449.216039][T13915] RBP: 00007f2fe8813f91 R08: 0000000000000000 R09: 0000000000000000 [ 449.216054][T13915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 449.216069][T13915] R13: 00007f2fe89e6038 R14: 00007f2fe89e5fa0 R15: 00007ffd12a38338 [ 449.216106][T13915] [ 449.785469][ T5842] Bluetooth: hci1: command 0x0c1a tx timeout [ 449.813614][T13918] FAULT_INJECTION: forcing a failure. [ 449.813614][T13918] name fail_futex, interval 1, probability 0, space 0, times 0 [ 449.826837][T13918] CPU: 1 UID: 0 PID: 13918 Comm: syz.0.1791 Tainted: G U L syzkaller #0 PREEMPT(full) [ 449.826877][T13918] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 449.826886][T13918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 449.826899][T13918] Call Trace: [ 449.826907][T13918] [ 449.826917][T13918] dump_stack_lvl+0x16c/0x1f0 [ 449.826962][T13918] should_fail_ex+0x512/0x640 [ 449.826992][T13918] get_futex_key+0x1d0/0x15f0 [ 449.827020][T13918] ? __pfx_get_futex_key+0x10/0x10 [ 449.827056][T13918] futex_wake+0xea/0x530 [ 449.827088][T13918] ? __pfx_futex_wake+0x10/0x10 [ 449.827130][T13918] do_futex+0x1e3/0x350 [ 449.827155][T13918] ? __pfx_do_futex+0x10/0x10 [ 449.827177][T13918] ? __might_fault+0xe3/0x190 [ 449.827211][T13918] mm_release+0x24e/0x300 [ 449.827241][T13918] do_exit+0x69e/0x2bd0 [ 449.827265][T13918] ? __pfx_do_exit+0x10/0x10 [ 449.827286][T13918] ? do_raw_spin_lock+0x12c/0x2b0 [ 449.827310][T13918] ? find_held_lock+0x2b/0x80 [ 449.827350][T13918] do_group_exit+0xd3/0x2a0 [ 449.827374][T13918] get_signal+0x2671/0x26d0 [ 449.827415][T13918] ? __pfx_get_signal+0x10/0x10 [ 449.827446][T13918] ? do_futex+0x122/0x350 [ 449.827473][T13918] arch_do_signal_or_restart+0x8f/0x7a0 [ 449.827501][T13918] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 449.827536][T13918] ? fput+0x70/0xf0 [ 449.827556][T13918] ? __pfx___x64_sys_futex+0x10/0x10 [ 449.827584][T13918] exit_to_user_mode_loop+0x8c/0x540 [ 449.827614][T13918] do_syscall_64+0x4ee/0xf80 [ 449.827642][T13918] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 449.827660][T13918] RIP: 0033:0x7fdcb718f7c9 [ 449.827676][T13918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 449.827694][T13918] RSP: 002b:00007fdcb80350e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 449.827711][T13918] RAX: fffffffffffffe00 RBX: 00007fdcb73e5fa8 RCX: 00007fdcb718f7c9 [ 449.827724][T13918] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fdcb73e5fa8 [ 449.827735][T13918] RBP: 00007fdcb73e5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 449.827746][T13918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 449.827756][T13918] R13: 00007fdcb73e6038 R14: 00007fffd5191350 R15: 00007fffd5191438 [ 449.827782][T13918] [ 450.823455][T13929] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1796'. [ 451.132615][T13945] usb usb15: usbfs: process 13945 (syz.2.1798) did not claim interface 0 before use [ 451.614516][T13934] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 451.623331][T13934] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 451.632355][T13934] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 451.638637][T13934] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 451.847584][T13960] FAULT_INJECTION: forcing a failure. [ 451.847584][T13960] name fail_futex, interval 1, probability 0, space 0, times 0 [ 451.872920][T13960] CPU: 0 UID: 0 PID: 13960 Comm: syz.0.1802 Tainted: G U L syzkaller #0 PREEMPT(full) [ 451.872962][T13960] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 451.872970][T13960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 451.872983][T13960] Call Trace: [ 451.872992][T13960] [ 451.873002][T13960] dump_stack_lvl+0x16c/0x1f0 [ 451.873039][T13960] should_fail_ex+0x512/0x640 [ 451.873069][T13960] get_futex_key+0x1d0/0x15f0 [ 451.873100][T13960] ? __pfx_get_futex_key+0x10/0x10 [ 451.873139][T13960] futex_wake+0xea/0x530 [ 451.873171][T13960] ? __pfx_futex_wake+0x10/0x10 [ 451.873216][T13960] do_futex+0x1e3/0x350 [ 451.873243][T13960] ? __pfx_do_futex+0x10/0x10 [ 451.873264][T13960] ? __might_fault+0xe3/0x190 [ 451.873297][T13960] mm_release+0x24e/0x300 [ 451.873328][T13960] do_exit+0x69e/0x2bd0 [ 451.873357][T13960] ? __pfx_do_exit+0x10/0x10 [ 451.873379][T13960] ? do_raw_spin_lock+0x12c/0x2b0 [ 451.873405][T13960] ? find_held_lock+0x2b/0x80 [ 451.873447][T13960] do_group_exit+0xd3/0x2a0 [ 451.873472][T13960] get_signal+0x2671/0x26d0 [ 451.873515][T13960] ? __pfx_get_signal+0x10/0x10 [ 451.873548][T13960] ? do_futex+0x122/0x350 [ 451.873574][T13960] arch_do_signal_or_restart+0x8f/0x7a0 [ 451.873605][T13960] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 451.873645][T13960] ? fput+0x70/0xf0 [ 451.873667][T13960] ? __pfx___x64_sys_futex+0x10/0x10 [ 451.873698][T13960] exit_to_user_mode_loop+0x8c/0x540 [ 451.873731][T13960] do_syscall_64+0x4ee/0xf80 [ 451.873766][T13960] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 451.873790][T13960] RIP: 0033:0x7fdcb718f7c9 [ 451.873810][T13960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 451.873834][T13960] RSP: 002b:00007fdcb80350e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 451.873857][T13960] RAX: fffffffffffffe00 RBX: 00007fdcb73e5fa8 RCX: 00007fdcb718f7c9 [ 451.873874][T13960] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fdcb73e5fa8 [ 451.873889][T13960] RBP: 00007fdcb73e5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 451.873900][T13960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 451.873910][T13960] R13: 00007fdcb73e6038 R14: 00007fffd5191350 R15: 00007fffd5191438 [ 451.873942][T13960] [ 452.903817][ T5842] Bluetooth: hci2: command 0x0c1a tx timeout [ 453.621896][T13993] usb usb15: usbfs: process 13993 (syz.0.1812) did not claim interface 0 before use [ 453.631807][ T5842] Bluetooth: hci1: command 0x0c1a tx timeout [ 453.703429][T12904] Bluetooth: hci3: command 0x0c1a tx timeout [ 453.709510][ T5842] Bluetooth: hci0: command 0x0c1a tx timeout [ 454.438185][T14018] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 454.899276][T14040] FAULT_INJECTION: forcing a failure. [ 454.899276][T14040] name failslab, interval 1, probability 0, space 0, times 0 [ 454.912377][T14040] CPU: 0 UID: 0 PID: 14040 Comm: syz.2.1820 Tainted: G U L syzkaller #0 PREEMPT(full) [ 454.912422][T14040] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 454.912432][T14040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 454.912448][T14040] Call Trace: [ 454.912458][T14040] [ 454.912468][T14040] dump_stack_lvl+0x16c/0x1f0 [ 454.912511][T14040] should_fail_ex+0x512/0x640 [ 454.912543][T14040] should_failslab+0xc2/0x120 [ 454.912581][T14040] __kmalloc_cache_noprof+0x80/0x800 [ 454.912612][T14040] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 454.912640][T14040] ? tipc_nametbl_insert_publ+0x700/0x1740 [ 454.912678][T14040] ? tipc_nametbl_insert_publ+0x700/0x1740 [ 454.912710][T14040] tipc_nametbl_insert_publ+0x700/0x1740 [ 454.912750][T14040] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 454.912777][T14040] ? net_generic+0xea/0x2a0 [ 454.912819][T14040] tipc_nametbl_publish+0x137/0x280 [ 454.912861][T14040] tipc_sk_publish+0x1d8/0x430 [ 454.912887][T14040] ? __pfx_tipc_sk_publish+0x10/0x10 [ 454.912914][T14040] ? __local_bh_enable_ip+0xa4/0x120 [ 454.912950][T14040] tipc_sk_bind+0x16f/0x380 [ 454.912977][T14040] tipc_bind+0x190/0x2a0 [ 454.913004][T14040] __sys_bind+0x1a7/0x260 [ 454.913030][T14040] ? __pfx___sys_bind+0x10/0x10 [ 454.913068][T14040] ? xfd_validate_state+0x61/0x180 [ 454.913090][T14040] ? __pfx_do_writev+0x10/0x10 [ 454.913128][T14040] __x64_sys_bind+0x72/0xb0 [ 454.913158][T14040] ? lockdep_hardirqs_on+0x7c/0x110 [ 454.913196][T14040] do_syscall_64+0xcd/0xf80 [ 454.913234][T14040] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 454.913260][T14040] RIP: 0033:0x7ff45cd8f7c9 [ 454.913282][T14040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 454.913307][T14040] RSP: 002b:00007ff45dc93038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 454.913330][T14040] RAX: ffffffffffffffda RBX: 00007ff45cfe6090 RCX: 00007ff45cd8f7c9 [ 454.913348][T14040] RDX: 0000000000000066 RSI: 0000200000000040 RDI: 0000000000000006 [ 454.913364][T14040] RBP: 00007ff45ce13f91 R08: 0000000000000000 R09: 0000000000000000 [ 454.913380][T14040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 454.913396][T14040] R13: 00007ff45cfe6128 R14: 00007ff45cfe6090 R15: 00007ffd2a275328 [ 454.913434][T14040] [ 455.140961][T14040] tipc: Failed to bind to 65,0,0 [ 455.923488][T14067] usb usb15: usbfs: process 14067 (syz.1.1825) did not claim interface 0 before use [ 457.450133][T14091] FAULT_INJECTION: forcing a failure. [ 457.450133][T14091] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 457.507952][T14091] CPU: 1 UID: 0 PID: 14091 Comm: syz.0.1831 Tainted: G U L syzkaller #0 PREEMPT(full) [ 457.507996][T14091] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 457.508007][T14091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 457.508023][T14091] Call Trace: [ 457.508032][T14091] [ 457.508043][T14091] dump_stack_lvl+0x16c/0x1f0 [ 457.508085][T14091] should_fail_ex+0x512/0x640 [ 457.508121][T14091] should_fail_alloc_page+0xe7/0x130 [ 457.508162][T14091] prepare_alloc_pages+0x401/0x670 [ 457.508196][T14091] ? stack_depot_save_flags+0x29/0x9b0 [ 457.508224][T14091] ? rcu_is_watching+0x12/0xc0 [ 457.508260][T14091] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 457.508291][T14091] ? kasan_save_stack+0x42/0x60 [ 457.508322][T14091] ? kasan_save_track+0x14/0x30 [ 457.508351][T14091] ? __kasan_slab_alloc+0x89/0x90 [ 457.508382][T14091] ? kmem_cache_alloc_noprof+0x25e/0x770 [ 457.508409][T14091] ? ptlock_alloc+0x1f/0x70 [ 457.508432][T14091] ? pte_alloc_one+0x84/0x3d0 [ 457.508465][T14091] ? __pte_alloc+0x6d/0x3f0 [ 457.508496][T14091] ? copy_page_range+0x3f3e/0x6780 [ 457.508517][T14091] ? dup_mmap+0xbea/0x20e0 [ 457.508536][T14091] ? copy_process+0x3b9f/0x7430 [ 457.508567][T14091] ? kernel_clone+0xfc/0x910 [ 457.508598][T14091] ? __do_sys_clone+0xce/0x120 [ 457.508629][T14091] ? do_syscall_64+0xcd/0xf80 [ 457.508660][T14091] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 457.508692][T14091] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 457.508729][T14091] ? look_up_lock_class+0x59/0x130 [ 457.508770][T14091] ? look_up_lock_class+0x6b/0x130 [ 457.508805][T14091] ? register_lock_class+0x41/0x4b0 [ 457.508830][T14091] ? __lock_acquire+0x436/0x2890 [ 457.508850][T14091] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 457.508888][T14091] ? policy_nodemask+0xea/0x4e0 [ 457.508933][T14091] alloc_pages_mpol+0x1fb/0x550 [ 457.508971][T14091] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 457.509016][T14091] alloc_pages_noprof+0x131/0x390 [ 457.509052][T14091] pte_alloc_one+0x1e/0x3d0 [ 457.509084][T14091] __pte_alloc+0x6d/0x3f0 [ 457.509115][T14091] ? __pfx___pte_alloc+0x10/0x10 [ 457.509145][T14091] ? __pfx___might_resched+0x10/0x10 [ 457.509177][T14091] ? copy_page_range+0x22fb/0x6780 [ 457.509208][T14091] copy_page_range+0x3f3e/0x6780 [ 457.509275][T14091] ? __pfx_copy_page_range+0x10/0x10 [ 457.509313][T14091] ? __pfx___might_resched+0x10/0x10 [ 457.509341][T14091] ? __pfx_mas_store+0x10/0x10 [ 457.509369][T14091] ? dup_mmap+0xba4/0x20e0 [ 457.509390][T14091] ? down_write+0x14d/0x200 [ 457.509419][T14091] ? up_write+0x282/0x4e0 [ 457.509450][T14091] dup_mmap+0xbea/0x20e0 [ 457.509487][T14091] ? __pfx_dup_mmap+0x10/0x10 [ 457.509548][T14091] copy_process+0x3b9f/0x7430 [ 457.509582][T14091] ? __pfx___futex_wait+0x10/0x10 [ 457.509629][T14091] ? __pfx_copy_process+0x10/0x10 [ 457.509670][T14091] ? futex_private_hash_put+0x160/0x1b0 [ 457.509704][T14091] kernel_clone+0xfc/0x910 [ 457.509742][T14091] ? __pfx_kernel_clone+0x10/0x10 [ 457.509795][T14091] __do_sys_clone+0xce/0x120 [ 457.509828][T14091] ? __pfx___do_sys_clone+0x10/0x10 [ 457.509879][T14091] ? xfd_validate_state+0x61/0x180 [ 457.509908][T14091] ? __pfx_do_writev+0x10/0x10 [ 457.509953][T14091] do_syscall_64+0xcd/0xf80 [ 457.509991][T14091] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 457.510017][T14091] RIP: 0033:0x7fdcb718f7c9 [ 457.510039][T14091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 457.510064][T14091] RSP: 002b:00007fdcb8013fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 457.510088][T14091] RAX: ffffffffffffffda RBX: 00007fdcb73e6090 RCX: 00007fdcb718f7c9 [ 457.510107][T14091] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000002360411 [ 457.510123][T14091] RBP: 00007fdcb7213f91 R08: 0000000000000000 R09: 0000000000000000 [ 457.510139][T14091] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 [ 457.510155][T14091] R13: 00007fdcb73e6128 R14: 00007fdcb73e6090 R15: 00007fffd5191438 [ 457.510194][T14091] [ 458.635161][T14122] usb usb15: usbfs: process 14122 (syz.1.1836) did not claim interface 0 before use [ 459.153953][T14134] Invalid ELF header magic: != ELF [ 459.480004][T14142] zswap: compressor not available [ 460.072023][T14146] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 460.526786][T14147] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 460.663383][T14184] usb usb13: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 461.198442][T14195] usb usb15: usbfs: process 14195 (syz.2.1851) did not claim interface 0 before use [ 461.611880][ T5842] Bluetooth: hci3: unexpected subevent 0x01 length: 123 > 18 [ 461.802450][T14207] snd_aloop snd_aloop.0: snd_timer_open (10,0,0) failed with -19 [ 462.061773][T14222] FAULT_INJECTION: forcing a failure. [ 462.061773][T14222] name failslab, interval 1, probability 0, space 0, times 0 [ 462.083690][T14218] zswap: compressor not available [ 462.101528][T14220] Kernel: The 'panic_print' parameter is now deprecated. Please use 'panic_sys_info' and 'panic_console_replay' instead. [ 462.121336][T14222] CPU: 1 UID: 0 PID: 14222 Comm: syz.1.1859 Tainted: G U L syzkaller #0 PREEMPT(full) [ 462.121379][T14222] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 462.121389][T14222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 462.121405][T14222] Call Trace: [ 462.121414][T14222] [ 462.121424][T14222] dump_stack_lvl+0x16c/0x1f0 [ 462.121472][T14222] should_fail_ex+0x512/0x640 [ 462.121499][T14222] ? fs_reclaim_acquire+0xae/0x150 [ 462.121535][T14222] should_failslab+0xc2/0x120 [ 462.121570][T14222] __kmalloc_noprof+0xeb/0x910 [ 462.121597][T14222] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 462.121634][T14222] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 462.121664][T14222] tomoyo_realpath_from_path+0xc2/0x6e0 [ 462.121711][T14222] tomoyo_check_open_permission+0x2ab/0x3c0 [ 462.121744][T14222] ? __pfx_tomoyo_check_open_permission+0x10/0x10 [ 462.121815][T14222] ? do_raw_spin_lock+0x12c/0x2b0 [ 462.121854][T14222] tomoyo_file_open+0x6b/0x90 [ 462.121891][T14222] security_file_open+0x84/0x1e0 [ 462.121924][T14222] do_dentry_open+0x597/0x1590 [ 462.121960][T14222] ? security_inode_permission+0xbf/0x260 [ 462.121991][T14222] vfs_open+0x82/0x3f0 [ 462.122020][T14222] path_openat+0x2078/0x3140 [ 462.122065][T14222] ? __pfx_path_openat+0x10/0x10 [ 462.122112][T14222] do_filp_open+0x3c6/0x470 [ 462.122147][T14222] ? __pfx_do_filp_open+0x10/0x10 [ 462.122206][T14222] ? alloc_fd+0x471/0x7d0 [ 462.122249][T14222] do_sys_openat2+0x121/0x290 [ 462.122275][T14222] ? __pfx_do_sys_openat2+0x10/0x10 [ 462.122317][T14222] __x64_sys_openat+0x174/0x210 [ 462.122345][T14222] ? __pfx___x64_sys_openat+0x10/0x10 [ 462.122386][T14222] do_syscall_64+0xcd/0xf80 [ 462.122421][T14222] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 462.122454][T14222] RIP: 0033:0x7f2fe878f7c9 [ 462.122475][T14222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 462.122501][T14222] RSP: 002b:00007f2fe969d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 462.122526][T14222] RAX: ffffffffffffffda RBX: 00007f2fe89e5fa0 RCX: 00007f2fe878f7c9 [ 462.122544][T14222] RDX: 0000000000181041 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 462.122561][T14222] RBP: 00007f2fe8813f91 R08: 0000000000000000 R09: 0000000000000000 [ 462.122576][T14222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 462.122592][T14222] R13: 00007f2fe89e6038 R14: 00007f2fe89e5fa0 R15: 00007ffd12a38338 [ 462.122630][T14222] [ 462.122640][T14222] ERROR: Out of memory at tomoyo_realpath_from_path. [ 463.113021][T14251] usb usb15: usbfs: process 14251 (syz.0.1865) did not claim interface 0 before use [ 463.447697][T14260] snd_aloop snd_aloop.0: snd_timer_open (10,0,0) failed with -19 [ 463.534930][T14260] snd_aloop snd_aloop.0: snd_timer_open (10,0,0) failed with -19 [ 463.659800][T14263] netlink: 'syz.3.1867': attribute type 1 has an invalid length. [ 464.084904][T14275] FAULT_INJECTION: forcing a failure. [ 464.084904][T14275] name failslab, interval 1, probability 0, space 0, times 0 [ 464.108589][T14275] CPU: 0 UID: 0 PID: 14275 Comm: syz.1.1871 Tainted: G U L syzkaller #0 PREEMPT(full) [ 464.108615][T14275] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 464.108621][T14275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 464.108630][T14275] Call Trace: [ 464.108635][T14275] [ 464.108641][T14275] dump_stack_lvl+0x16c/0x1f0 [ 464.108666][T14275] should_fail_ex+0x512/0x640 [ 464.108682][T14275] ? __kmalloc_cache_noprof+0x5f/0x800 [ 464.108699][T14275] should_failslab+0xc2/0x120 [ 464.108720][T14275] __kmalloc_cache_noprof+0x80/0x800 [ 464.108735][T14275] ? fuse_dev_alloc+0x48/0x280 [ 464.108757][T14275] ? fuse_dev_alloc+0x48/0x280 [ 464.108774][T14275] fuse_dev_alloc+0x48/0x280 [ 464.108794][T14275] fuse_dev_alloc_install+0x13/0x40 [ 464.108813][T14275] cuse_channel_open+0x100/0x7f0 [ 464.108831][T14275] ? __pfx_cuse_channel_open+0x10/0x10 [ 464.108850][T14275] misc_open+0x26d/0x450 [ 464.108866][T14275] ? __pfx_misc_open+0x10/0x10 [ 464.108880][T14275] chrdev_open+0x234/0x6a0 [ 464.108899][T14275] ? __pfx_apparmor_file_open+0x10/0x10 [ 464.108912][T14275] ? __pfx_chrdev_open+0x10/0x10 [ 464.108932][T14275] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 464.108956][T14275] do_dentry_open+0x748/0x1590 [ 464.108973][T14275] ? __pfx_chrdev_open+0x10/0x10 [ 464.108996][T14275] vfs_open+0x82/0x3f0 [ 464.109015][T14275] path_openat+0x2078/0x3140 [ 464.109041][T14275] ? __pfx_path_openat+0x10/0x10 [ 464.109066][T14275] do_filp_open+0x20b/0x470 [ 464.109085][T14275] ? __pfx_do_filp_open+0x10/0x10 [ 464.109117][T14275] ? alloc_fd+0x471/0x7d0 [ 464.109141][T14275] do_sys_openat2+0x121/0x290 [ 464.109155][T14275] ? __pfx_do_sys_openat2+0x10/0x10 [ 464.109177][T14275] __x64_sys_openat+0x174/0x210 [ 464.109192][T14275] ? __pfx___x64_sys_openat+0x10/0x10 [ 464.109214][T14275] do_syscall_64+0xcd/0xf80 [ 464.109235][T14275] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 464.109254][T14275] RIP: 0033:0x7f2fe878f7c9 [ 464.109274][T14275] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 464.109288][T14275] RSP: 002b:00007f2fe969d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 464.109303][T14275] RAX: ffffffffffffffda RBX: 00007f2fe89e5fa0 RCX: 00007f2fe878f7c9 [ 464.109313][T14275] RDX: 0000000000181041 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 464.109322][T14275] RBP: 00007f2fe8813f91 R08: 0000000000000000 R09: 0000000000000000 [ 464.109330][T14275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 464.109339][T14275] R13: 00007f2fe89e6038 R14: 00007f2fe89e5fa0 R15: 00007ffd12a38338 [ 464.109358][T14275] [ 464.622709][T14280] vivid-007: ================= START STATUS ================= [ 464.631504][T14280] vivid-007: Generate PTS: true [ 464.636398][T14280] vivid-007: Generate SCR: true [ 464.642158][T14280] tpg source WxH: 320x240 (Y'CbCr) [ 464.647302][T14280] tpg field: 1 [ 464.650728][T14280] tpg crop: (0,0)/320x240 [ 464.655100][T14280] tpg compose: (0,0)/320x240 [ 464.660003][T14280] tpg colorspace: 8 [ 464.667875][T14280] tpg transfer function: 0/0 [ 464.672477][T14280] tpg Y'CbCr encoding: 0/0 [ 464.676869][T14280] tpg quantization: 0/0 [ 464.686749][T14280] tpg RGB range: 0/2 [ 464.690694][T14280] vivid-007: ================== END STATUS ================== [ 464.830664][T14285] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1873'. [ 464.841259][T14291] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1873'. [ 466.193026][T14332] usb usb15: usbfs: process 14332 (syz.3.1878) did not claim interface 0 before use [ 467.281720][T14370] FAULT_INJECTION: forcing a failure. [ 467.281720][T14370] name failslab, interval 1, probability 0, space 0, times 0 [ 467.490627][T14370] CPU: 1 UID: 0 PID: 14370 Comm: syz.3.1891 Tainted: G U L syzkaller #0 PREEMPT(full) [ 467.490679][T14370] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 467.490691][T14370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 467.490709][T14370] Call Trace: [ 467.490719][T14370] [ 467.490731][T14370] dump_stack_lvl+0x16c/0x1f0 [ 467.490773][T14370] should_fail_ex+0x512/0x640 [ 467.490801][T14370] ? __kmalloc_cache_noprof+0x5f/0x800 [ 467.490835][T14370] should_failslab+0xc2/0x120 [ 467.490878][T14370] __kmalloc_cache_noprof+0x80/0x800 [ 467.490907][T14370] ? snd_seq_port_connect+0x61/0x580 [ 467.490948][T14370] ? snd_seq_port_connect+0x61/0x580 [ 467.490983][T14370] snd_seq_port_connect+0x61/0x580 [ 467.491016][T14370] ? _raw_read_unlock+0x28/0x50 [ 467.491047][T14370] ? check_subscription_permission.isra.0+0xf5/0x240 [ 467.491088][T14370] snd_seq_ioctl_subscribe_port+0x209/0x4b0 [ 467.491129][T14370] ? __pfx_snd_seq_ioctl_subscribe_port+0x10/0x10 [ 467.491167][T14370] ? do_raw_spin_lock+0x12c/0x2b0 [ 467.491207][T14370] call_seq_client_ctl+0xa3/0x130 [ 467.491240][T14370] snd_seq_kernel_client_ctl+0x7a/0xc0 [ 467.491274][T14370] snd_seq_oss_midi_open+0x489/0x6a0 [ 467.491304][T14370] ? __pfx_snd_seq_oss_midi_open+0x10/0x10 [ 467.491329][T14370] ? snd_seq_oss_midi_reset+0x11a/0x4c0 [ 467.491367][T14370] ? __mutex_lock+0x27b/0x1ca0 [ 467.491408][T14370] snd_seq_oss_synth_reset+0x437/0x900 [ 467.491435][T14370] ? __pfx___mutex_lock+0x10/0x10 [ 467.491470][T14370] ? __pfx_snd_seq_oss_synth_reset+0x10/0x10 [ 467.491500][T14370] ? __pfx___fsnotify_parent+0x10/0x10 [ 467.491542][T14370] snd_seq_oss_reset+0x73/0x290 [ 467.491577][T14370] ? __pfx_odev_release+0x10/0x10 [ 467.491607][T14370] snd_seq_oss_release+0x7c/0x180 [ 467.491642][T14370] odev_release+0x56/0xa0 [ 467.491673][T14370] __fput+0x402/0xb70 [ 467.491707][T14370] task_work_run+0x150/0x240 [ 467.491736][T14370] ? __pfx_task_work_run+0x10/0x10 [ 467.491760][T14370] ? __do_sys_close_range+0x278/0x730 [ 467.491805][T14370] exit_to_user_mode_loop+0xfb/0x540 [ 467.491840][T14370] do_syscall_64+0x4ee/0xf80 [ 467.491885][T14370] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 467.491912][T14370] RIP: 0033:0x7fca4b58f7c9 [ 467.491933][T14370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 467.491958][T14370] RSP: 002b:00007fca4c3e2038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 467.491983][T14370] RAX: 0000000000000000 RBX: 00007fca4b7e5fa0 RCX: 00007fca4b58f7c9 [ 467.492000][T14370] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000002 [ 467.492016][T14370] RBP: 00007fca4b613f91 R08: 0000000000000000 R09: 0000000000000000 [ 467.492033][T14370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 467.492050][T14370] R13: 00007fca4b7e6038 R14: 00007fca4b7e5fa0 R15: 00007ffd3eb2d128 [ 467.492088][T14370] [ 467.822071][T14366] zswap: compressor not available [ 467.919263][T14366] FAULT_INJECTION: forcing a failure. [ 467.919263][T14366] name fail_futex, interval 1, probability 0, space 0, times 0 [ 467.953034][T14366] CPU: 0 UID: 0 PID: 14366 Comm: syz.2.1892 Tainted: G U L syzkaller #0 PREEMPT(full) [ 467.953075][T14366] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 467.953084][T14366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 467.953098][T14366] Call Trace: [ 467.953106][T14366] [ 467.953114][T14366] dump_stack_lvl+0x16c/0x1f0 [ 467.953152][T14366] should_fail_ex+0x512/0x640 [ 467.953179][T14366] get_futex_key+0x1085/0x15f0 [ 467.953208][T14366] ? __pfx_get_futex_key+0x10/0x10 [ 467.953242][T14366] futex_wake+0xea/0x530 [ 467.953274][T14366] ? __pfx_futex_wake+0x10/0x10 [ 467.953315][T14366] do_futex+0x1e3/0x350 [ 467.953339][T14366] ? __pfx_do_futex+0x10/0x10 [ 467.953362][T14366] ? __might_fault+0xe3/0x190 [ 467.953396][T14366] mm_release+0x24e/0x300 [ 467.953426][T14366] do_exit+0x69e/0x2bd0 [ 467.953455][T14366] ? __pfx_do_exit+0x10/0x10 [ 467.953476][T14366] ? do_raw_spin_lock+0x12c/0x2b0 [ 467.953502][T14366] ? find_held_lock+0x2b/0x80 [ 467.953535][T14366] do_group_exit+0xd3/0x2a0 [ 467.953561][T14366] get_signal+0x2671/0x26d0 [ 467.953605][T14366] ? __pfx_get_signal+0x10/0x10 [ 467.953637][T14366] ? do_futex+0x122/0x350 [ 467.953674][T14366] arch_do_signal_or_restart+0x8f/0x7a0 [ 467.953708][T14366] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 467.953747][T14366] ? fput+0x70/0xf0 [ 467.953769][T14366] ? __pfx___x64_sys_futex+0x10/0x10 [ 467.953801][T14366] exit_to_user_mode_loop+0x8c/0x540 [ 467.953834][T14366] do_syscall_64+0x4ee/0xf80 [ 467.953869][T14366] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 467.953892][T14366] RIP: 0033:0x7ff45cd8f7c9 [ 467.953912][T14366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 467.953935][T14366] RSP: 002b:00007ff45dcb40e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 467.953959][T14366] RAX: fffffffffffffe00 RBX: 00007ff45cfe5fa8 RCX: 00007ff45cd8f7c9 [ 467.953977][T14366] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007ff45cfe5fa8 [ 467.953994][T14366] RBP: 00007ff45cfe5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 467.954009][T14366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 467.954021][T14366] R13: 00007ff45cfe6038 R14: 00007ffd2a275240 R15: 00007ffd2a275328 [ 467.954051][T14366] [ 468.245330][T14383] snd_aloop snd_aloop.0: snd_timer_open (10,0,0) failed with -19 [ 468.863377][T14393] FAULT_INJECTION: forcing a failure. [ 468.863377][T14393] name failslab, interval 1, probability 0, space 0, times 0 [ 468.876479][T14393] CPU: 1 UID: 0 PID: 14393 Comm: syz.3.1897 Tainted: G U L syzkaller #0 PREEMPT(full) [ 468.876522][T14393] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 468.876532][T14393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 468.876549][T14393] Call Trace: [ 468.876558][T14393] [ 468.876569][T14393] dump_stack_lvl+0x116/0x1f0 [ 468.876611][T14393] should_fail_ex+0x512/0x640 [ 468.876643][T14393] should_failslab+0xc2/0x120 [ 468.876681][T14393] kmem_cache_alloc_noprof+0x83/0x770 [ 468.876711][T14393] ? __send_signal_locked+0x159/0x12c0 [ 468.876752][T14393] ? __send_signal_locked+0x159/0x12c0 [ 468.876778][T14393] __send_signal_locked+0x159/0x12c0 [ 468.876805][T14393] ? __lock_task_sighand+0x146/0x340 [ 468.876833][T14393] do_send_specific+0x1e8/0x370 [ 468.876867][T14393] ? __pfx_do_send_specific+0x10/0x10 [ 468.876897][T14393] ? __task_pid_nr_ns+0x1f5/0x500 [ 468.876930][T14393] do_rt_tgsigqueueinfo+0xa9/0x100 [ 468.876965][T14393] __x64_sys_rt_tgsigqueueinfo+0x17a/0x210 [ 468.876991][T14393] ? __pfx___x64_sys_rt_tgsigqueueinfo+0x10/0x10 [ 468.877043][T14393] do_syscall_64+0xcd/0xf80 [ 468.877079][T14393] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 468.877104][T14393] RIP: 0033:0x7fca4b58f7c9 [ 468.877125][T14393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 468.877149][T14393] RSP: 002b:00007fca4c3e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000129 [ 468.877174][T14393] RAX: ffffffffffffffda RBX: 00007fca4b7e5fa0 RCX: 00007fca4b58f7c9 [ 468.877190][T14393] RDX: 0000000000000021 RSI: 000000000000071d RDI: 000000000000071c [ 468.877205][T14393] RBP: 00007fca4b613f91 R08: 0000000000000000 R09: 0000000000000000 [ 468.877220][T14393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 468.877235][T14393] R13: 00007fca4b7e6038 R14: 00007fca4b7e5fa0 R15: 00007ffd3eb2d128 [ 468.877273][T14393] [ 469.190786][T14402] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1899'. [ 469.219073][T14402] FAULT_INJECTION: forcing a failure. [ 469.219073][T14402] name failslab, interval 1, probability 0, space 0, times 0 [ 469.336296][T14402] CPU: 1 UID: 0 PID: 14402 Comm: syz.0.1899 Tainted: G U L syzkaller #0 PREEMPT(full) [ 469.336336][T14402] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 469.336344][T14402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 469.336357][T14402] Call Trace: [ 469.336365][T14402] [ 469.336374][T14402] dump_stack_lvl+0x16c/0x1f0 [ 469.336409][T14402] should_fail_ex+0x512/0x640 [ 469.336433][T14402] ? kmem_cache_alloc_lru_noprof+0x66/0x770 [ 469.336462][T14402] should_failslab+0xc2/0x120 [ 469.336492][T14402] kmem_cache_alloc_lru_noprof+0x87/0x770 [ 469.336520][T14402] ? __d_alloc+0x35/0xa80 [ 469.336546][T14402] ? __d_alloc+0x35/0xa80 [ 469.336563][T14402] __d_alloc+0x35/0xa80 [ 469.336581][T14402] ? stack_depot_save_flags+0x29/0x9b0 [ 469.336604][T14402] ? stack_trace_save+0x8e/0xc0 [ 469.336637][T14402] d_alloc_parallel+0x111/0x1510 [ 469.336667][T14402] ? kmem_cache_alloc_noprof+0x25e/0x770 [ 469.336690][T14402] ? security_file_alloc+0x34/0x2b0 [ 469.336723][T14402] ? init_file+0x93/0x4c0 [ 469.336742][T14402] ? path_openat+0xde/0x3140 [ 469.336768][T14402] ? do_sys_openat2+0x121/0x290 [ 469.336788][T14402] ? __x64_sys_openat+0x174/0x210 [ 469.336813][T14402] ? __pfx_d_alloc_parallel+0x10/0x10 [ 469.336841][T14402] ? lockdep_init_map_type+0x5c/0x270 [ 469.336864][T14402] ? lockdep_init_map_type+0x5c/0x270 [ 469.336892][T14402] __lookup_slow+0x193/0x460 [ 469.336918][T14402] ? __pfx___lookup_slow+0x10/0x10 [ 469.336975][T14402] lookup_slow+0x50/0x70 [ 469.337000][T14402] path_lookupat+0x5e9/0xc40 [ 469.337036][T14402] path_openat+0x1dfc/0x3140 [ 469.337065][T14402] ? do_syscall_64+0xcd/0xf80 [ 469.337095][T14402] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 469.337131][T14402] ? __pfx_path_openat+0x10/0x10 [ 469.337175][T14402] do_filp_open+0x20b/0x470 [ 469.337208][T14402] ? __pfx_do_filp_open+0x10/0x10 [ 469.337266][T14402] ? alloc_fd+0x471/0x7d0 [ 469.337308][T14402] do_sys_openat2+0x121/0x290 [ 469.337333][T14402] ? __pfx_do_sys_openat2+0x10/0x10 [ 469.337373][T14402] __x64_sys_openat+0x174/0x210 [ 469.337397][T14402] ? __pfx___x64_sys_openat+0x10/0x10 [ 469.337433][T14402] do_syscall_64+0xcd/0xf80 [ 469.337465][T14402] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 469.337486][T14402] RIP: 0033:0x7fdcb718f7c9 [ 469.337505][T14402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 469.337526][T14402] RSP: 002b:00007fdcb8035038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 469.337549][T14402] RAX: ffffffffffffffda RBX: 00007fdcb73e5fa0 RCX: 00007fdcb718f7c9 [ 469.337565][T14402] RDX: 000000000028ad00 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 469.337581][T14402] RBP: 00007fdcb7213f91 R08: 0000000000000000 R09: 0000000000000000 [ 469.337595][T14402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 469.337609][T14402] R13: 00007fdcb73e6038 R14: 00007fdcb73e5fa0 R15: 00007fffd5191438 [ 469.337645][T14402] [ 470.299029][T14420] netlink: 'syz.2.1902': attribute type 2 has an invalid length. [ 470.375688][T14421] usb usb15: usbfs: process 14421 (syz.3.1900) did not claim interface 0 before use [ 470.413481][T14423] FAULT_INJECTION: forcing a failure. [ 470.413481][T14423] name failslab, interval 1, probability 0, space 0, times 0 [ 470.442734][T14425] FAULT_INJECTION: forcing a failure. [ 470.442734][T14425] name failslab, interval 1, probability 0, space 0, times 0 [ 470.475122][T14423] CPU: 1 UID: 0 PID: 14423 Comm: syz.0.1903 Tainted: G U L syzkaller #0 PREEMPT(full) [ 470.475170][T14423] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 470.475183][T14423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 470.475197][T14423] Call Trace: [ 470.475206][T14423] [ 470.475216][T14423] dump_stack_lvl+0x16c/0x1f0 [ 470.475255][T14423] should_fail_ex+0x512/0x640 [ 470.475280][T14423] ? __kmalloc_cache_noprof+0x5f/0x800 [ 470.475308][T14423] should_failslab+0xc2/0x120 [ 470.475344][T14423] __kmalloc_cache_noprof+0x80/0x800 [ 470.475382][T14423] ? fuse_dev_alloc+0x48/0x280 [ 470.475418][T14423] ? fuse_dev_alloc+0x48/0x280 [ 470.475449][T14423] fuse_dev_alloc+0x48/0x280 [ 470.475481][T14423] fuse_dev_alloc_install+0x13/0x40 [ 470.475514][T14423] cuse_channel_open+0x100/0x7f0 [ 470.475541][T14423] ? __pfx_cuse_channel_open+0x10/0x10 [ 470.475569][T14423] misc_open+0x26d/0x450 [ 470.475593][T14423] ? __pfx_misc_open+0x10/0x10 [ 470.475617][T14423] chrdev_open+0x234/0x6a0 [ 470.475648][T14423] ? __pfx_apparmor_file_open+0x10/0x10 [ 470.475670][T14423] ? __pfx_chrdev_open+0x10/0x10 [ 470.475705][T14423] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 470.475749][T14423] do_dentry_open+0x748/0x1590 [ 470.475781][T14423] ? __pfx_chrdev_open+0x10/0x10 [ 470.475825][T14423] vfs_open+0x82/0x3f0 [ 470.475852][T14423] path_openat+0x2078/0x3140 [ 470.475890][T14423] ? __pfx_path_openat+0x10/0x10 [ 470.475931][T14423] do_filp_open+0x20b/0x470 [ 470.475966][T14423] ? __pfx_do_filp_open+0x10/0x10 [ 470.476024][T14423] ? alloc_fd+0x471/0x7d0 [ 470.476067][T14423] do_sys_openat2+0x121/0x290 [ 470.476094][T14423] ? __pfx_do_sys_openat2+0x10/0x10 [ 470.476135][T14423] __x64_sys_openat+0x174/0x210 [ 470.476163][T14423] ? __pfx___x64_sys_openat+0x10/0x10 [ 470.476206][T14423] do_syscall_64+0xcd/0xf80 [ 470.476243][T14423] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 470.476268][T14423] RIP: 0033:0x7fdcb718f7c9 [ 470.476290][T14423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 470.476314][T14423] RSP: 002b:00007fdcb8035038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 470.476338][T14423] RAX: ffffffffffffffda RBX: 00007fdcb73e5fa0 RCX: 00007fdcb718f7c9 [ 470.476353][T14423] RDX: 0000000000181041 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 470.476378][T14423] RBP: 00007fdcb7213f91 R08: 0000000000000000 R09: 0000000000000000 [ 470.476394][T14423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 470.476410][T14423] R13: 00007fdcb73e6038 R14: 00007fdcb73e5fa0 R15: 00007fffd5191438 [ 470.476444][T14423] [ 470.480855][T14425] CPU: 0 UID: 0 PID: 14425 Comm: syz.2.1904 Tainted: G U L syzkaller #0 PREEMPT(full) [ 470.480900][T14425] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 470.480910][T14425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 470.480926][T14425] Call Trace: [ 470.480935][T14425] [ 470.480946][T14425] dump_stack_lvl+0x16c/0x1f0 [ 470.480987][T14425] should_fail_ex+0x512/0x640 [ 470.481014][T14425] ? kmem_cache_alloc_noprof+0x62/0x770 [ 470.481049][T14425] should_failslab+0xc2/0x120 [ 470.481085][T14425] kmem_cache_alloc_noprof+0x83/0x770 [ 470.481114][T14425] ? security_file_alloc+0x34/0x2b0 [ 470.481150][T14425] ? security_file_alloc+0x34/0x2b0 [ 470.481176][T14425] security_file_alloc+0x34/0x2b0 [ 470.481207][T14425] init_file+0x93/0x4c0 [ 470.481233][T14425] alloc_empty_file+0x73/0x1e0 [ 470.481264][T14425] alloc_file_pseudo+0x13a/0x230 [ 470.481293][T14425] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 470.481320][T14425] ? tipc_sk_finish_conn+0x580/0x790 [ 470.481358][T14425] sock_alloc_file+0x50/0x210 [ 470.481391][T14425] __sys_socketpair+0x34e/0x5a0 [ 470.481418][T14425] ? __pfx___sys_socketpair+0x10/0x10 [ 470.481440][T14425] ? fput+0x70/0xf0 [ 470.481465][T14425] ? xfd_validate_state+0x61/0x180 [ 470.481488][T14425] ? __pfx_do_writev+0x10/0x10 [ 470.481522][T14425] __x64_sys_socketpair+0x96/0x100 [ 470.481543][T14425] ? lockdep_hardirqs_on+0x7c/0x110 [ 470.481574][T14425] do_syscall_64+0xcd/0xf80 [ 470.481607][T14425] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 470.481637][T14425] RIP: 0033:0x7ff45cd8f7c9 [ 470.481657][T14425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 470.481682][T14425] RSP: 002b:00007ff45dcb4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 470.481705][T14425] RAX: ffffffffffffffda RBX: 00007ff45cfe5fa0 RCX: 00007ff45cd8f7c9 [ 470.481720][T14425] RDX: 8000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 470.481734][T14425] RBP: 00007ff45ce13f91 R08: 0000000000000000 R09: 0000000000000000 [ 470.481748][T14425] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 470.481762][T14425] R13: 00007ff45cfe6038 R14: 00007ff45cfe5fa0 R15: 00007ffd2a275328 [ 470.481795][T14425] [ 471.122993][T14425] netlink: 'syz.2.1904': attribute type 1 has an invalid length. [ 471.191655][ T5842] Bluetooth: hci3: unexpected event 0x2c length: 42 > 17 [ 471.191700][ T5842] Bluetooth: hci3: Ignoring connect complete event for invalid link type [ 471.828625][T14443] Invalid ELF header magic: != ELF [ 472.511248][T14466] FAULT_INJECTION: forcing a failure. [ 472.511248][T14466] name failslab, interval 1, probability 0, space 0, times 0 [ 472.545578][T14466] CPU: 1 UID: 0 PID: 14466 Comm: syz.2.1914 Tainted: G U L syzkaller #0 PREEMPT(full) [ 472.545625][T14466] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 472.545636][T14466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 472.545651][T14466] Call Trace: [ 472.545661][T14466] [ 472.545672][T14466] dump_stack_lvl+0x16c/0x1f0 [ 472.545712][T14466] should_fail_ex+0x512/0x640 [ 472.545740][T14466] ? __kmalloc_cache_noprof+0x5f/0x800 [ 472.545773][T14466] should_failslab+0xc2/0x120 [ 472.545810][T14466] __kmalloc_cache_noprof+0x80/0x800 [ 472.545838][T14466] ? fuse_dev_alloc+0x48/0x280 [ 472.545879][T14466] ? fuse_dev_alloc+0x48/0x280 [ 472.545912][T14466] fuse_dev_alloc+0x48/0x280 [ 472.545949][T14466] fuse_dev_alloc_install+0x13/0x40 [ 472.545984][T14466] cuse_channel_open+0x100/0x7f0 [ 472.546018][T14466] ? __pfx_cuse_channel_open+0x10/0x10 [ 472.546052][T14466] misc_open+0x26d/0x450 [ 472.546080][T14466] ? __pfx_misc_open+0x10/0x10 [ 472.546106][T14466] chrdev_open+0x234/0x6a0 [ 472.546138][T14466] ? __pfx_apparmor_file_open+0x10/0x10 [ 472.546165][T14466] ? __pfx_chrdev_open+0x10/0x10 [ 472.546201][T14466] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 472.546244][T14466] do_dentry_open+0x748/0x1590 [ 472.546277][T14466] ? __pfx_chrdev_open+0x10/0x10 [ 472.546322][T14466] vfs_open+0x82/0x3f0 [ 472.546353][T14466] path_openat+0x2078/0x3140 [ 472.546409][T14466] ? __pfx_path_openat+0x10/0x10 [ 472.546459][T14466] do_filp_open+0x20b/0x470 [ 472.546497][T14466] ? __pfx_do_filp_open+0x10/0x10 [ 472.546564][T14466] ? alloc_fd+0x471/0x7d0 [ 472.546609][T14466] do_sys_openat2+0x121/0x290 [ 472.546637][T14466] ? __pfx_do_sys_openat2+0x10/0x10 [ 472.546679][T14466] __x64_sys_openat+0x174/0x210 [ 472.546707][T14466] ? __pfx___x64_sys_openat+0x10/0x10 [ 472.546750][T14466] do_syscall_64+0xcd/0xf80 [ 472.546788][T14466] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 472.546814][T14466] RIP: 0033:0x7ff45cd8f7c9 [ 472.546835][T14466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 472.546860][T14466] RSP: 002b:00007ff45dcb4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 472.546885][T14466] RAX: ffffffffffffffda RBX: 00007ff45cfe5fa0 RCX: 00007ff45cd8f7c9 [ 472.546903][T14466] RDX: 0000000000181041 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 472.546921][T14466] RBP: 00007ff45ce13f91 R08: 0000000000000000 R09: 0000000000000000 [ 472.546938][T14466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 472.546953][T14466] R13: 00007ff45cfe6038 R14: 00007ff45cfe5fa0 R15: 00007ffd2a275328 [ 472.546991][T14466] [ 474.113898][T14490] bond0: no command found in slaves file - use +ifname or -ifname [ 474.251857][T14484] usb usb15: usbfs: process 14484 (syz.0.1919) did not claim interface 0 before use [ 474.386818][T14502] snd_aloop snd_aloop.0: snd_timer_open (10,0,0) failed with -19 [ 474.668039][T14510] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1924'. [ 475.910440][T14517] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 475.927065][T14517] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 475.952288][T14517] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 475.962278][T14517] Bluetooth: hci3: Opcode 0x0406 failed: -4 [ 476.113918][T14517] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 476.698833][T14553] random: crng reseeded on system resumption [ 476.966935][T14556] ovs_: entered promiscuous mode [ 477.212294][ T5842] Bluetooth: hci2: command 0x0c1a tx timeout [ 477.715587][T14574] zswap: compressor q}qHvwdʦ>ĻBiJvSjHFm not available [ 477.785150][T14580] usb usb15: usbfs: process 14580 (syz.3.1936) did not claim interface 0 before use [ 477.931179][ T5842] Bluetooth: hci1: command 0x0c1a tx timeout [ 478.011202][ T5842] Bluetooth: hci3: command 0x0c1a tx timeout [ 478.152819][T14596] snd_aloop snd_aloop.0: snd_timer_open (10,0,0) failed with -19 [ 478.171162][ T5842] Bluetooth: hci0: command 0x0c1a tx timeout [ 478.891123][T14617] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input64 [ 480.029903][ T5842] Bluetooth: hci1: unexpected event 0x31 length: 19 > 6 [ 480.092685][ T5842] Bluetooth: hci3: command 0x0c1a tx timeout [ 480.981518][T14657] usb usb15: usbfs: process 14657 (syz.2.1957) did not claim interface 0 before use [ 481.532184][T14671] random: crng reseeded on system resumption [ 482.277085][T14691] FAULT_INJECTION: forcing a failure. [ 482.277085][T14691] name failslab, interval 1, probability 0, space 0, times 0 [ 482.289840][T14691] CPU: 0 UID: 0 PID: 14691 Comm: syz.3.1967 Tainted: G U L syzkaller #0 PREEMPT(full) [ 482.289883][T14691] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 482.289895][T14691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 482.289910][T14691] Call Trace: [ 482.289920][T14691] [ 482.289930][T14691] dump_stack_lvl+0x16c/0x1f0 [ 482.289971][T14691] should_fail_ex+0x512/0x640 [ 482.289998][T14691] ? __kmalloc_cache_noprof+0x5f/0x800 [ 482.290030][T14691] should_failslab+0xc2/0x120 [ 482.290068][T14691] __kmalloc_cache_noprof+0x80/0x800 [ 482.290097][T14691] ? fuse_dev_alloc+0x48/0x280 [ 482.290136][T14691] ? fuse_dev_alloc+0x48/0x280 [ 482.290168][T14691] fuse_dev_alloc+0x48/0x280 [ 482.290204][T14691] fuse_dev_alloc_install+0x13/0x40 [ 482.290239][T14691] cuse_channel_open+0x100/0x7f0 [ 482.290271][T14691] ? __pfx_cuse_channel_open+0x10/0x10 [ 482.290305][T14691] misc_open+0x26d/0x450 [ 482.290333][T14691] ? __pfx_misc_open+0x10/0x10 [ 482.290359][T14691] chrdev_open+0x234/0x6a0 [ 482.290392][T14691] ? __pfx_apparmor_file_open+0x10/0x10 [ 482.290418][T14691] ? __pfx_chrdev_open+0x10/0x10 [ 482.290454][T14691] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 482.290498][T14691] do_dentry_open+0x748/0x1590 [ 482.290539][T14691] ? __pfx_chrdev_open+0x10/0x10 [ 482.290585][T14691] vfs_open+0x82/0x3f0 [ 482.290616][T14691] path_openat+0x2078/0x3140 [ 482.290661][T14691] ? __pfx_path_openat+0x10/0x10 [ 482.290709][T14691] do_filp_open+0x20b/0x470 [ 482.290743][T14691] ? __pfx_do_filp_open+0x10/0x10 [ 482.290802][T14691] ? alloc_fd+0x471/0x7d0 [ 482.290845][T14691] do_sys_openat2+0x121/0x290 [ 482.290871][T14691] ? __pfx_do_sys_openat2+0x10/0x10 [ 482.290911][T14691] __x64_sys_openat+0x174/0x210 [ 482.290938][T14691] ? __pfx___x64_sys_openat+0x10/0x10 [ 482.290979][T14691] do_syscall_64+0xcd/0xf80 [ 482.291016][T14691] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 482.291042][T14691] RIP: 0033:0x7fca4b58f7c9 [ 482.291065][T14691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 482.291089][T14691] RSP: 002b:00007fca4c3e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 482.291113][T14691] RAX: ffffffffffffffda RBX: 00007fca4b7e5fa0 RCX: 00007fca4b58f7c9 [ 482.291131][T14691] RDX: 0000000000181041 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 482.291149][T14691] RBP: 00007fca4b613f91 R08: 0000000000000000 R09: 0000000000000000 [ 482.291165][T14691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 482.291181][T14691] R13: 00007fca4b7e6038 R14: 00007fca4b7e5fa0 R15: 00007ffd3eb2d128 [ 482.291219][T14691] [ 482.572740][T14693] random: crng reseeded on system resumption [ 483.742053][T14726] usb usb15: usbfs: process 14726 (syz.0.1974) did not claim interface 0 before use [ 484.568497][T14754] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1978'. [ 484.713192][T14759] dlm: non-version read from control device 4105 [ 484.864881][T14765] FAULT_INJECTION: forcing a failure. [ 484.864881][T14765] name failslab, interval 1, probability 0, space 0, times 0 [ 484.884336][T14765] CPU: 1 UID: 0 PID: 14765 Comm: syz.2.1981 Tainted: G U L syzkaller #0 PREEMPT(full) [ 484.884378][T14765] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 484.884390][T14765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 484.884405][T14765] Call Trace: [ 484.884415][T14765] [ 484.884426][T14765] dump_stack_lvl+0x16c/0x1f0 [ 484.884468][T14765] should_fail_ex+0x512/0x640 [ 484.884496][T14765] ? __kmalloc_node_track_caller_noprof+0xcb/0x930 [ 484.884536][T14765] should_failslab+0xc2/0x120 [ 484.884572][T14765] __kmalloc_node_track_caller_noprof+0xec/0x930 [ 484.884606][T14765] ? kstrdup_const+0x63/0x80 [ 484.884637][T14765] ? kstrdup+0x53/0x100 [ 484.884663][T14765] kstrdup+0x53/0x100 [ 484.884694][T14765] kstrdup_const+0x63/0x80 [ 484.884723][T14765] __kmem_cache_create_args+0x166/0x3b0 [ 484.884756][T14765] mon_text_open+0x333/0x510 [ 484.884789][T14765] ? __pfx_mon_text_open+0x10/0x10 [ 484.884824][T14765] ? __pfx_mon_text_ctor+0x10/0x10 [ 484.884856][T14765] ? __pfx_apparmor_file_open+0x10/0x10 [ 484.884880][T14765] ? lockdown_is_locked_down+0x3f/0x130 [ 484.884914][T14765] ? bpf_lsm_locked_down+0x9/0x10 [ 484.884950][T14765] ? __pfx_mon_text_open+0x10/0x10 [ 484.884979][T14765] full_proxy_open_regular+0x1b9/0x350 [ 484.885017][T14765] do_dentry_open+0x748/0x1590 [ 484.885049][T14765] ? __pfx_full_proxy_open_regular+0x10/0x10 [ 484.885094][T14765] vfs_open+0x82/0x3f0 [ 484.885125][T14765] path_openat+0x2078/0x3140 [ 484.885179][T14765] ? __pfx_path_openat+0x10/0x10 [ 484.885235][T14765] do_filp_open+0x20b/0x470 [ 484.885273][T14765] ? __pfx_do_filp_open+0x10/0x10 [ 484.885336][T14765] ? alloc_fd+0x471/0x7d0 [ 484.885381][T14765] do_sys_openat2+0x121/0x290 [ 484.885408][T14765] ? __pfx_do_sys_openat2+0x10/0x10 [ 484.885449][T14765] __x64_sys_openat+0x174/0x210 [ 484.885478][T14765] ? __pfx___x64_sys_openat+0x10/0x10 [ 484.885520][T14765] do_syscall_64+0xcd/0xf80 [ 484.885557][T14765] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 484.885584][T14765] RIP: 0033:0x7ff45cd8f7c9 [ 484.885606][T14765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 484.885631][T14765] RSP: 002b:00007ff45dcb4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 484.885656][T14765] RAX: ffffffffffffffda RBX: 00007ff45cfe5fa0 RCX: 00007ff45cd8f7c9 [ 484.885674][T14765] RDX: 0000000000020443 RSI: 0000200000001140 RDI: ffffffffffffff9c [ 484.885692][T14765] RBP: 00007ff45ce13f91 R08: 0000000000000000 R09: 0000000000000000 [ 484.885708][T14765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 484.885725][T14765] R13: 00007ff45cfe6038 R14: 00007ff45cfe5fa0 R15: 00007ffd2a275328 [ 484.885764][T14765] [ 484.885892][T14765] __kmem_cache_create_args(mon_text_ffff888059be7000) failed with error -12 [ 485.169319][T14765] CPU: 1 UID: 0 PID: 14765 Comm: syz.2.1981 Tainted: G U L syzkaller #0 PREEMPT(full) [ 485.169358][T14765] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 485.169367][T14765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 485.169382][T14765] Call Trace: [ 485.169390][T14765] [ 485.169400][T14765] dump_stack_lvl+0x16c/0x1f0 [ 485.169433][T14765] __kmem_cache_create_args+0x122/0x3b0 [ 485.169452][T14765] mon_text_open+0x333/0x510 [ 485.169471][T14765] ? __pfx_mon_text_open+0x10/0x10 [ 485.169491][T14765] ? __pfx_mon_text_ctor+0x10/0x10 [ 485.169509][T14765] ? __pfx_apparmor_file_open+0x10/0x10 [ 485.169523][T14765] ? lockdown_is_locked_down+0x3f/0x130 [ 485.169543][T14765] ? bpf_lsm_locked_down+0x9/0x10 [ 485.169564][T14765] ? __pfx_mon_text_open+0x10/0x10 [ 485.169581][T14765] full_proxy_open_regular+0x1b9/0x350 [ 485.169602][T14765] do_dentry_open+0x748/0x1590 [ 485.169622][T14765] ? __pfx_full_proxy_open_regular+0x10/0x10 [ 485.169647][T14765] vfs_open+0x82/0x3f0 [ 485.169664][T14765] path_openat+0x2078/0x3140 [ 485.169691][T14765] ? __pfx_path_openat+0x10/0x10 [ 485.169718][T14765] do_filp_open+0x20b/0x470 [ 485.169738][T14765] ? __pfx_do_filp_open+0x10/0x10 [ 485.169774][T14765] ? alloc_fd+0x471/0x7d0 [ 485.169818][T14765] do_sys_openat2+0x121/0x290 [ 485.169837][T14765] ? __pfx_do_sys_openat2+0x10/0x10 [ 485.169859][T14765] __x64_sys_openat+0x174/0x210 [ 485.169875][T14765] ? __pfx___x64_sys_openat+0x10/0x10 [ 485.169904][T14765] do_syscall_64+0xcd/0xf80 [ 485.169927][T14765] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 485.169941][T14765] RIP: 0033:0x7ff45cd8f7c9 [ 485.169954][T14765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 485.169967][T14765] RSP: 002b:00007ff45dcb4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 485.169981][T14765] RAX: ffffffffffffffda RBX: 00007ff45cfe5fa0 RCX: 00007ff45cd8f7c9 [ 485.169991][T14765] RDX: 0000000000020443 RSI: 0000200000001140 RDI: ffffffffffffff9c [ 485.169999][T14765] RBP: 00007ff45ce13f91 R08: 0000000000000000 R09: 0000000000000000 [ 485.170008][T14765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 485.170016][T14765] R13: 00007ff45cfe6038 R14: 00007ff45cfe5fa0 R15: 00007ffd2a275328 [ 485.170035][T14765] [ 485.542805][T14769] snd_aloop snd_aloop.0: Parsing timer source '' failed with -22 [ 486.125733][T14785] snd_aloop snd_aloop.0: Parsing timer source '' failed with -22 [ 486.575033][ T5912] smpboot: CPU 0 is now offline [ 486.716854][T14805] usb usb15: usbfs: process 14805 (syz.1.1987) did not claim interface 0 before use [ 488.289390][T14850] bdi mtd-0: the stable_pages_required attribute has been removed. Use the stable_writes queue attribute instead. [ 488.447080][T14845] netlink: 16 bytes leftover after parsing attributes in process `syz.1.1998'. [ 489.921241][T14885] usb usb15: usbfs: process 14885 (syz.1.2005) did not claim interface 0 before use [ 490.646580][T14892] zswap: compressor not available [ 490.708695][T14896] ACPI: EC: Assuming SCI_EVT clearing on QR_EC writes [ 492.369053][T14950] FAULT_INJECTION: forcing a failure. [ 492.369053][T14950] name failslab, interval 1, probability 0, space 0, times 0 [ 492.412713][T14950] CPU: 1 UID: 0 PID: 14950 Comm: syz.1.2021 Tainted: G U L syzkaller #0 PREEMPT(full) [ 492.412739][T14950] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 492.412746][T14950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 492.412755][T14950] Call Trace: [ 492.412761][T14950] [ 492.412767][T14950] dump_stack_lvl+0x16c/0x1f0 [ 492.412792][T14950] should_fail_ex+0x512/0x640 [ 492.412807][T14950] ? __kmalloc_cache_noprof+0x5f/0x800 [ 492.412824][T14950] should_failslab+0xc2/0x120 [ 492.412844][T14950] __kmalloc_cache_noprof+0x80/0x800 [ 492.412860][T14950] ? fuse_dev_alloc+0x48/0x280 [ 492.412882][T14950] ? fuse_dev_alloc+0x48/0x280 [ 492.412899][T14950] fuse_dev_alloc+0x48/0x280 [ 492.412927][T14950] fuse_dev_alloc_install+0x13/0x40 [ 492.412948][T14950] cuse_channel_open+0x100/0x7f0 [ 492.412967][T14950] ? __pfx_cuse_channel_open+0x10/0x10 [ 492.412987][T14950] misc_open+0x26d/0x450 [ 492.413002][T14950] ? __pfx_misc_open+0x10/0x10 [ 492.413015][T14950] chrdev_open+0x234/0x6a0 [ 492.413035][T14950] ? __pfx_apparmor_file_open+0x10/0x10 [ 492.413048][T14950] ? __pfx_chrdev_open+0x10/0x10 [ 492.413072][T14950] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 492.413095][T14950] do_dentry_open+0x748/0x1590 [ 492.413113][T14950] ? __pfx_chrdev_open+0x10/0x10 [ 492.413136][T14950] vfs_open+0x82/0x3f0 [ 492.413153][T14950] path_openat+0x2078/0x3140 [ 492.413178][T14950] ? __pfx_path_openat+0x10/0x10 [ 492.413203][T14950] do_filp_open+0x20b/0x470 [ 492.413223][T14950] ? __pfx_do_filp_open+0x10/0x10 [ 492.413254][T14950] ? alloc_fd+0x471/0x7d0 [ 492.413278][T14950] do_sys_openat2+0x121/0x290 [ 492.413293][T14950] ? __pfx_do_sys_openat2+0x10/0x10 [ 492.413314][T14950] __x64_sys_openat+0x174/0x210 [ 492.413329][T14950] ? __pfx___x64_sys_openat+0x10/0x10 [ 492.413351][T14950] do_syscall_64+0xcd/0xf80 [ 492.413372][T14950] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 492.413386][T14950] RIP: 0033:0x7f2fe878f7c9 [ 492.413398][T14950] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 492.413412][T14950] RSP: 002b:00007f2fe969d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 492.413426][T14950] RAX: ffffffffffffffda RBX: 00007f2fe89e5fa0 RCX: 00007f2fe878f7c9 [ 492.413435][T14950] RDX: 0000000000181041 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 492.413445][T14950] RBP: 00007f2fe8813f91 R08: 0000000000000000 R09: 0000000000000000 [ 492.413454][T14950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 492.413463][T14950] R13: 00007f2fe89e6038 R14: 00007f2fe89e5fa0 R15: 00007ffd12a38338 [ 492.413483][T14950] [ 492.880945][T14961] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2023'. [ 493.410772][T14949] usb usb15: usbfs: process 14949 (syz.3.2020) did not claim interface 0 before use [ 493.875990][T14983] netlink: 342 bytes leftover after parsing attributes in process `syz.0.2027'. [ 495.188209][T15023] openvswitch: netlink: Message has 4 unknown bytes. [ 495.424906][T15034] device-mapper: ioctl: ioctl interface mismatch: kernel(4.50.0), user(0.0.0), cmd(5) [ 495.702755][T15044] usb usb15: usbfs: process 15044 (syz.1.2038) did not claim interface 0 before use [ 495.922914][T15041] zswap: compressor not available [ 496.493151][T15053] FAULT_INJECTION: forcing a failure. [ 496.493151][T15053] name failslab, interval 1, probability 0, space 0, times 0 [ 496.546123][T15053] CPU: 1 UID: 0 PID: 15053 Comm: syz.1.2042 Tainted: G U L syzkaller #0 PREEMPT(full) [ 496.546150][T15053] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 496.546156][T15053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 496.546165][T15053] Call Trace: [ 496.546171][T15053] [ 496.546177][T15053] dump_stack_lvl+0x16c/0x1f0 [ 496.546203][T15053] should_fail_ex+0x512/0x640 [ 496.546218][T15053] ? __kmalloc_cache_noprof+0x5f/0x800 [ 496.546237][T15053] should_failslab+0xc2/0x120 [ 496.546260][T15053] __kmalloc_cache_noprof+0x80/0x800 [ 496.546276][T15053] ? fuse_dev_alloc+0x48/0x280 [ 496.546298][T15053] ? fuse_dev_alloc+0x48/0x280 [ 496.546316][T15053] fuse_dev_alloc+0x48/0x280 [ 496.546335][T15053] fuse_dev_alloc_install+0x13/0x40 [ 496.546355][T15053] cuse_channel_open+0x100/0x7f0 [ 496.546373][T15053] ? __pfx_cuse_channel_open+0x10/0x10 [ 496.546391][T15053] misc_open+0x26d/0x450 [ 496.546406][T15053] ? __pfx_misc_open+0x10/0x10 [ 496.546420][T15053] chrdev_open+0x234/0x6a0 [ 496.546439][T15053] ? __pfx_apparmor_file_open+0x10/0x10 [ 496.546453][T15053] ? __pfx_chrdev_open+0x10/0x10 [ 496.546472][T15053] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 496.546496][T15053] do_dentry_open+0x748/0x1590 [ 496.546514][T15053] ? __pfx_chrdev_open+0x10/0x10 [ 496.546539][T15053] vfs_open+0x82/0x3f0 [ 496.546556][T15053] path_openat+0x2078/0x3140 [ 496.546582][T15053] ? __pfx_path_openat+0x10/0x10 [ 496.546607][T15053] do_filp_open+0x20b/0x470 [ 496.546626][T15053] ? __pfx_do_filp_open+0x10/0x10 [ 496.546659][T15053] ? alloc_fd+0x471/0x7d0 [ 496.546683][T15053] do_sys_openat2+0x121/0x290 [ 496.546698][T15053] ? __pfx_do_sys_openat2+0x10/0x10 [ 496.546720][T15053] __x64_sys_openat+0x174/0x210 [ 496.546735][T15053] ? __pfx___x64_sys_openat+0x10/0x10 [ 496.546758][T15053] do_syscall_64+0xcd/0xf80 [ 496.546779][T15053] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 496.546793][T15053] RIP: 0033:0x7f2fe878f7c9 [ 496.546816][T15053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 496.546830][T15053] RSP: 002b:00007f2fe969d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 496.546845][T15053] RAX: ffffffffffffffda RBX: 00007f2fe89e5fa0 RCX: 00007f2fe878f7c9 [ 496.546856][T15053] RDX: 0000000000181041 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 496.546866][T15053] RBP: 00007f2fe8813f91 R08: 0000000000000000 R09: 0000000000000000 [ 496.546875][T15053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 496.546883][T15053] R13: 00007f2fe89e6038 R14: 00007f2fe89e5fa0 R15: 00007ffd12a38338 [ 496.546902][T15053] [ 497.264702][T15059] snd_aloop snd_aloop.0: Parsing timer source '' failed with -22 [ 498.551890][T15092] usb usb15: usbfs: process 15092 (syz.3.2051) did not claim interface 0 before use [ 499.053479][T15102] FAULT_INJECTION: forcing a failure. [ 499.053479][T15102] name failslab, interval 1, probability 0, space 0, times 0 [ 499.096053][T15102] CPU: 1 UID: 0 PID: 15102 Comm: syz.1.2052 Tainted: G U L syzkaller #0 PREEMPT(full) [ 499.096081][T15102] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 499.096087][T15102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 499.096097][T15102] Call Trace: [ 499.096102][T15102] [ 499.096109][T15102] dump_stack_lvl+0x16c/0x1f0 [ 499.096134][T15102] should_fail_ex+0x512/0x640 [ 499.096149][T15102] ? __kmalloc_cache_noprof+0x5f/0x800 [ 499.096169][T15102] should_failslab+0xc2/0x120 [ 499.096190][T15102] __kmalloc_cache_noprof+0x80/0x800 [ 499.096206][T15102] ? fuse_dev_alloc+0x48/0x280 [ 499.096228][T15102] ? fuse_dev_alloc+0x48/0x280 [ 499.096246][T15102] fuse_dev_alloc+0x48/0x280 [ 499.096265][T15102] fuse_dev_alloc_install+0x13/0x40 [ 499.096288][T15102] cuse_channel_open+0x100/0x7f0 [ 499.096306][T15102] ? __pfx_cuse_channel_open+0x10/0x10 [ 499.096325][T15102] misc_open+0x26d/0x450 [ 499.096340][T15102] ? __pfx_misc_open+0x10/0x10 [ 499.096354][T15102] chrdev_open+0x234/0x6a0 [ 499.096373][T15102] ? __pfx_apparmor_file_open+0x10/0x10 [ 499.096387][T15102] ? __pfx_chrdev_open+0x10/0x10 [ 499.096407][T15102] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 499.096431][T15102] do_dentry_open+0x748/0x1590 [ 499.096448][T15102] ? __pfx_chrdev_open+0x10/0x10 [ 499.096472][T15102] vfs_open+0x82/0x3f0 [ 499.096489][T15102] path_openat+0x2078/0x3140 [ 499.096514][T15102] ? __pfx_path_openat+0x10/0x10 [ 499.096539][T15102] do_filp_open+0x20b/0x470 [ 499.096566][T15102] ? __pfx_do_filp_open+0x10/0x10 [ 499.096600][T15102] ? alloc_fd+0x471/0x7d0 [ 499.096625][T15102] do_sys_openat2+0x121/0x290 [ 499.096641][T15102] ? __pfx_do_sys_openat2+0x10/0x10 [ 499.096663][T15102] __x64_sys_openat+0x174/0x210 [ 499.096678][T15102] ? __pfx___x64_sys_openat+0x10/0x10 [ 499.096701][T15102] do_syscall_64+0xcd/0xf80 [ 499.096722][T15102] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 499.096736][T15102] RIP: 0033:0x7f2fe878f7c9 [ 499.096749][T15102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 499.096763][T15102] RSP: 002b:00007f2fe969d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 499.096777][T15102] RAX: ffffffffffffffda RBX: 00007f2fe89e5fa0 RCX: 00007f2fe878f7c9 [ 499.096786][T15102] RDX: 0000000000181041 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 499.096795][T15102] RBP: 00007f2fe8813f91 R08: 0000000000000000 R09: 0000000000000000 [ 499.096803][T15102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 499.096811][T15102] R13: 00007f2fe89e6038 R14: 00007f2fe89e5fa0 R15: 00007ffd12a38338 [ 499.096831][T15102] [ 500.083379][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 500.089677][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 500.571227][T15127] random: crng reseeded on system resumption [ 500.990838][T15139] random: crng reseeded on system resumption [ 501.352602][T15144] FAULT_INJECTION: forcing a failure. [ 501.352602][T15144] name failslab, interval 1, probability 0, space 0, times 0 [ 501.407044][T15144] CPU: 1 UID: 0 PID: 15144 Comm: syz.3.2064 Tainted: G U L syzkaller #0 PREEMPT(full) [ 501.407071][T15144] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 501.407077][T15144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 501.407085][T15144] Call Trace: [ 501.407091][T15144] [ 501.407097][T15144] dump_stack_lvl+0x16c/0x1f0 [ 501.407122][T15144] should_fail_ex+0x512/0x640 [ 501.407138][T15144] ? __kmalloc_cache_noprof+0x5f/0x800 [ 501.407156][T15144] should_failslab+0xc2/0x120 [ 501.407176][T15144] __kmalloc_cache_noprof+0x80/0x800 [ 501.407192][T15144] ? fuse_dev_alloc+0x48/0x280 [ 501.407215][T15144] ? fuse_dev_alloc+0x48/0x280 [ 501.407232][T15144] fuse_dev_alloc+0x48/0x280 [ 501.407252][T15144] fuse_dev_alloc_install+0x13/0x40 [ 501.407271][T15144] cuse_channel_open+0x100/0x7f0 [ 501.407290][T15144] ? __pfx_cuse_channel_open+0x10/0x10 [ 501.407308][T15144] misc_open+0x26d/0x450 [ 501.407324][T15144] ? __pfx_misc_open+0x10/0x10 [ 501.407337][T15144] chrdev_open+0x234/0x6a0 [ 501.407364][T15144] ? __pfx_apparmor_file_open+0x10/0x10 [ 501.407378][T15144] ? __pfx_chrdev_open+0x10/0x10 [ 501.407399][T15144] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 501.407423][T15144] do_dentry_open+0x748/0x1590 [ 501.407441][T15144] ? __pfx_chrdev_open+0x10/0x10 [ 501.407465][T15144] vfs_open+0x82/0x3f0 [ 501.407482][T15144] path_openat+0x2078/0x3140 [ 501.407506][T15144] ? __pfx_path_openat+0x10/0x10 [ 501.407531][T15144] do_filp_open+0x20b/0x470 [ 501.407550][T15144] ? __pfx_do_filp_open+0x10/0x10 [ 501.407582][T15144] ? alloc_fd+0x471/0x7d0 [ 501.407606][T15144] do_sys_openat2+0x121/0x290 [ 501.407621][T15144] ? __pfx_do_sys_openat2+0x10/0x10 [ 501.407643][T15144] __x64_sys_openat+0x174/0x210 [ 501.407658][T15144] ? __pfx___x64_sys_openat+0x10/0x10 [ 501.407680][T15144] do_syscall_64+0xcd/0xf80 [ 501.407701][T15144] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 501.407715][T15144] RIP: 0033:0x7fca4b58f7c9 [ 501.407728][T15144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 501.407741][T15144] RSP: 002b:00007fca4c3e2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 501.407756][T15144] RAX: ffffffffffffffda RBX: 00007fca4b7e5fa0 RCX: 00007fca4b58f7c9 [ 501.407766][T15144] RDX: 0000000000181041 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 501.407775][T15144] RBP: 00007fca4b613f91 R08: 0000000000000000 R09: 0000000000000000 [ 501.407784][T15144] R10: 000000000000ff0f R11: 0000000000000246 R12: 0000000000000000 [ 501.407793][T15144] R13: 00007fca4b7e6038 R14: 00007fca4b7e5fa0 R15: 00007ffd3eb2d128 [ 501.407812][T15144] [ 502.092392][T15152] Invalid ELF header magic: != ELF [ 502.169556][T15153] usb usb15: usbfs: process 15153 (syz.1.2065) did not claim interface 0 before use [ 502.510318][T15158] ovs_: entered promiscuous mode [ 502.841599][T15164] random: crng reseeded on system resumption [ 504.114118][T15189] random: crng reseeded on system resumption [ 504.239130][ T5842] Bluetooth: hci2: unexpected event 0x1c length: 725 > 5 [ 504.530982][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.543678][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.556302][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.568523][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.580726][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.592916][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.605132][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.617364][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.629588][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 504.641779][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 509.535487][ C1] net_ratelimit: 20735 callbacks suppressed [ 509.535504][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 509.553657][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 509.565871][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 509.578071][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 509.590252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 509.602485][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 509.614686][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 509.626909][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 509.639109][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 509.651317][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 514.542831][ C1] net_ratelimit: 21190 callbacks suppressed [ 514.542856][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 514.561082][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 514.573424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 514.585674][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 514.597890][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 514.610115][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 514.622308][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 514.634559][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 514.646751][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 514.658992][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 519.550814][ C1] net_ratelimit: 19248 callbacks suppressed [ 519.550833][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 519.569130][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 519.581920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 519.594368][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 519.607280][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 519.619510][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 519.632297][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 519.644508][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 519.657269][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 519.669478][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 519.715408][ C1] sched: DL replenish lagged too much [ 524.558487][ C1] net_ratelimit: 9452 callbacks suppressed [ 524.558505][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 524.576594][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 524.589404][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 524.601609][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 524.614397][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 524.626662][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 524.639606][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 524.651903][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 524.664690][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 524.676886][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.565425][ C1] net_ratelimit: 9573 callbacks suppressed [ 529.565443][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.584216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.596480][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.609288][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.621517][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.634285][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.646532][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.659299][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.671495][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 529.684270][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.573034][ C1] net_ratelimit: 9421 callbacks suppressed [ 534.573051][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.591222][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.604007][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.616232][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.628999][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.641224][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.654029][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.666272][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.679039][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 534.691378][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.580742][ C1] net_ratelimit: 9326 callbacks suppressed [ 539.580758][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.598936][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.611846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.624133][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.637005][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.649297][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.662206][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.674445][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.687423][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 539.699695][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.587845][ C1] net_ratelimit: 9392 callbacks suppressed [ 544.587862][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.605936][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.618717][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.630930][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.643700][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.655944][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.668727][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.680951][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.693694][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 544.705943][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.595308][ C1] net_ratelimit: 9371 callbacks suppressed [ 549.595325][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.614149][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.626449][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.639264][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.651506][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.664327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.676618][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.689448][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.701702][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 549.714591][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 554.603428][ C1] net_ratelimit: 9067 callbacks suppressed [ 554.603446][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 554.621538][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 554.634429][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 554.646668][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 554.659520][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 554.671757][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 554.685340][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 554.697573][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 554.710402][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 554.722636][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 559.610875][ C1] net_ratelimit: 9316 callbacks suppressed [ 559.610895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 559.628964][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 559.641775][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 559.653973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 559.666744][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 559.678955][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 559.691704][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 559.703957][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 559.716680][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 559.728880][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 562.916133][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.930256][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 564.618008][ C1] net_ratelimit: 9586 callbacks suppressed [ 564.618024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 564.636099][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 564.648928][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 564.661163][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 564.673920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 564.686129][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 564.698877][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 564.711101][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 564.723858][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 564.736091][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.625611][ C1] net_ratelimit: 9384 callbacks suppressed [ 569.625627][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.643737][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.656584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.668820][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.681790][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.694094][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.707048][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.719357][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.732226][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 569.744477][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.633244][ C1] net_ratelimit: 9218 callbacks suppressed [ 574.633262][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.651347][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.664195][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.676444][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.689284][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.701510][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.714329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.726573][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.739384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 574.751620][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.640479][ C1] net_ratelimit: 9294 callbacks suppressed [ 579.640496][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.658581][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.671414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.683637][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.696619][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.708896][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.721789][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.734128][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.747076][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 579.759389][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 584.648151][ C1] net_ratelimit: 9040 callbacks suppressed [ 584.648167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 584.666289][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 584.679218][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 584.691502][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 584.704462][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 584.716857][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 584.729934][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 584.742210][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 584.755212][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 584.767604][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 589.656052][ C1] net_ratelimit: 9765 callbacks suppressed [ 589.656069][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 589.674329][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 589.686575][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 589.699474][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 589.711773][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 589.724050][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 589.736963][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 589.749303][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 589.761560][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 589.774634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 594.662878][ C1] net_ratelimit: 11148 callbacks suppressed [ 594.662899][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 594.681026][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 594.693909][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 594.706138][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 594.721144][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 594.734087][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 594.746357][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 594.758631][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 594.771551][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 594.783771][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 599.670255][ C1] net_ratelimit: 11787 callbacks suppressed [ 599.670273][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 599.689099][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 599.701394][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 599.713605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 599.726493][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 599.738756][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 599.750970][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 599.763907][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 599.776185][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 599.788392][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 604.677814][ C1] net_ratelimit: 11070 callbacks suppressed [ 604.677831][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 604.696191][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 604.708458][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 604.721383][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 604.733707][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 604.745973][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 604.758971][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 604.771239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 604.783503][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 604.796384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 609.485332][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 609.492301][ C1] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P15198/1:b..l [ 609.500736][ C1] rcu: (detected by 1, t=10502 jiffies, g=66961, q=1594 ncpus=1) [ 609.508519][ C1] task:syz.1.2077 state:R running task stack:26168 pid:15198 tgid:15193 ppid:5829 task_flags:0x400140 flags:0x00080002 [ 609.522736][ C1] Call Trace: [ 609.526005][ C1] [ 609.528922][ C1] ? __schedule+0x10b9/0x6150 [ 609.533589][ C1] __schedule+0x1139/0x6150 [ 609.538079][ C1] ? __kernel_text_address+0xd/0x40 [ 609.543552][ C1] ? arch_stack_walk+0xa6/0x100 [ 609.548389][ C1] ? __pfx___schedule+0x10/0x10 [ 609.553223][ C1] ? mark_held_locks+0x49/0x80 [ 609.557967][ C1] preempt_schedule_irq+0x51/0x90 [ 609.562976][ C1] irqentry_exit+0x1d8/0x8c0 [ 609.567559][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 609.573519][ C1] RIP: 0010:unwind_next_frame+0x522/0x20b0 [ 609.579310][ C1] Code: 00 00 fc ff df 4c 8d 79 05 4c 89 fa 48 c1 ea 03 0f b6 04 02 4c 89 fa 83 e2 07 38 d0 7f 08 84 c0 0f 85 28 15 00 00 0f b6 41 05 <83> e0 07 0f 84 53 fe ff ff 3c 01 0f 84 7b fe ff ff 4c 8d 41 04 4c [ 609.598910][ C1] RSP: 0018:ffffc90004ecefc8 EFLAGS: 00000246 [ 609.604966][ C1] RAX: 0000000000000002 RBX: 0000000000000001 RCX: ffffffff9132df00 [ 609.612926][ C1] RDX: 0000000000000005 RSI: 0000000000000000 RDI: ffffffff90a9c384 [ 609.620890][ C1] RBP: ffffc90004ecf080 R08: ffffffff9132df06 R09: 00000000b09a4244 [ 609.628843][ C1] R10: 0000000000000002 R11: 0000000000014bc8 R12: ffffc90004ecf088 [ 609.636795][ C1] R13: ffffc90004ecf038 R14: ffffc90004ecf06d R15: ffffffff9132df05 [ 609.644762][ C1] ? unwind_next_frame+0x2ec/0x20b0 [ 609.649950][ C1] ? iter_file_splice_write+0xa24/0x12b0 [ 609.655575][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 609.661720][ C1] arch_stack_walk+0x94/0x100 [ 609.666385][ C1] ? iter_file_splice_write+0xa24/0x12b0 [ 609.672010][ C1] stack_trace_save+0x8e/0xc0 [ 609.676675][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 609.682038][ C1] ? do_raw_spin_lock+0x12c/0x2b0 [ 609.687043][ C1] kasan_save_stack+0x33/0x60 [ 609.691704][ C1] ? kasan_save_stack+0x33/0x60 [ 609.696537][ C1] ? kasan_save_track+0x14/0x30 [ 609.701369][ C1] ? __kasan_slab_alloc+0x89/0x90 [ 609.706377][ C1] ? kmem_cache_alloc_node_noprof+0x298/0x800 [ 609.712426][ C1] ? __alloc_skb+0x156/0x410 [ 609.716997][ C1] ? inet6_ifacaddr_notify+0xd1/0x1c0 [ 609.722354][ C1] ? __ipv6_dev_ac_inc+0x963/0xdc0 [ 609.727448][ C1] ? dev_forward_change+0x987/0xba0 [ 609.732632][ C1] ? addrconf_sysctl_forward+0x5bc/0x880 [ 609.738248][ C1] ? proc_sys_call_handler+0x493/0x5b0 [ 609.743690][ C1] ? iter_file_splice_write+0xa24/0x12b0 [ 609.749333][ C1] kasan_save_track+0x14/0x30 [ 609.753994][ C1] __kasan_slab_alloc+0x89/0x90 [ 609.758830][ C1] kmem_cache_alloc_node_noprof+0x298/0x800 [ 609.764707][ C1] ? __alloc_skb+0x156/0x410 [ 609.769286][ C1] ? __alloc_skb+0x156/0x410 [ 609.773854][ C1] __alloc_skb+0x156/0x410 [ 609.778254][ C1] ? __alloc_skb+0x35d/0x410 [ 609.782833][ C1] ? __pfx___alloc_skb+0x10/0x10 [ 609.787754][ C1] ? __ipv6_dev_mc_inc+0x718/0xbc0 [ 609.792858][ C1] inet6_ifacaddr_notify+0xd1/0x1c0 [ 609.798047][ C1] ? __pfx_inet6_ifacaddr_notify+0x10/0x10 [ 609.803837][ C1] ? addrconf_join_solict+0x10e/0x160 [ 609.809195][ C1] __ipv6_dev_ac_inc+0x963/0xdc0 [ 609.814126][ C1] dev_forward_change+0x987/0xba0 [ 609.819145][ C1] ? __pfx_dev_forward_change+0x10/0x10 [ 609.824678][ C1] ? nlmsg_notify+0xac/0x220 [ 609.829252][ C1] ? nlmsg_notify+0x11e/0x220 [ 609.833917][ C1] addrconf_sysctl_forward+0x5bc/0x880 [ 609.839364][ C1] ? __pfx_addrconf_sysctl_forward+0x10/0x10 [ 609.845335][ C1] ? __pfx_addrconf_sysctl_forward+0x10/0x10 [ 609.851300][ C1] ? proc_sys_call_handler+0x2d6/0x5b0 [ 609.856742][ C1] ? ns_capable_noaudit+0xda/0x110 [ 609.861842][ C1] proc_sys_call_handler+0x493/0x5b0 [ 609.867117][ C1] ? __pfx_proc_sys_call_handler+0x10/0x10 [ 609.872910][ C1] ? splice_from_pipe_next+0x1f7/0x5d0 [ 609.878358][ C1] iter_file_splice_write+0xa24/0x12b0 [ 609.883814][ C1] ? __pfx_iter_file_splice_write+0x10/0x10 [ 609.889697][ C1] ? __pfx_copy_splice_read+0x10/0x10 [ 609.895074][ C1] ? __pfx_iter_file_splice_write+0x10/0x10 [ 609.900951][ C1] direct_splice_actor+0x192/0x6c0 [ 609.906050][ C1] splice_direct_to_actor+0x345/0xa30 [ 609.911409][ C1] ? __pfx_direct_splice_actor+0x10/0x10 [ 609.917036][ C1] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 609.922930][ C1] do_splice_direct+0x174/0x240 [ 609.927788][ C1] ? __pfx_do_splice_direct+0x10/0x10 [ 609.933167][ C1] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 609.939054][ C1] ? rw_verify_area+0xcf/0x6c0 [ 609.943808][ C1] do_sendfile+0xb06/0xe50 [ 609.948215][ C1] ? __pfx_do_sendfile+0x10/0x10 [ 609.953143][ C1] ? __x64_sys_futex+0x1e0/0x4c0 [ 609.958063][ C1] ? __x64_sys_futex+0x1e9/0x4c0 [ 609.962988][ C1] __x64_sys_sendfile64+0x1d8/0x220 [ 609.968166][ C1] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 609.973869][ C1] do_syscall_64+0xcd/0xf80 [ 609.978365][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 609.984245][ C1] RIP: 0033:0x7f2fe878f7c9 [ 609.988640][ C1] RSP: 002b:00007f2fe965b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 609.997033][ C1] RAX: ffffffffffffffda RBX: 00007f2fe89e6180 RCX: 00007f2fe878f7c9 [ 610.004987][ C1] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 [ 610.012937][ C1] RBP: 00007f2fe8813f91 R08: 0000000000000000 R09: 0000000000000000 [ 610.020887][ C1] R10: 0000000001000200 R11: 0000000000000246 R12: 0000000000000000 [ 610.028836][ C1] R13: 00007f2fe89e6218 R14: 00007f2fe89e6180 R15: 00007ffd12a38338 [ 610.036798][ C1] [ 610.040380][ C1] net_ratelimit: 10661 callbacks suppressed [ 610.040393][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.058519][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.070689][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 610.083541][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.095861][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.108106][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 610.120964][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.133219][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 610.145418][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 610.158291][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.042627][ C1] net_ratelimit: 11941 callbacks suppressed [ 615.042645][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 615.061497][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.073764][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.085971][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 615.098895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.111136][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.123510][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0) [ 615.136415][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.148694][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 615.160925][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:66:c2:dd:ff:95:42, vlan:0)