===================================================== BUG: KMSAN: uninit-value in __flush_smp_call_function_queue+0x343/0x1710 kernel/smp.c:535 __flush_smp_call_function_queue+0x343/0x1710 kernel/smp.c:535 generic_smp_call_function_single_interrupt+0x1c/0x30 kernel/smp.c:463 __sysvec_call_function_single+0x45/0x310 arch/x86/kernel/smp.c:271 instr_sysvec_call_function_single arch/x86/kernel/smp.c:266 [inline] sysvec_call_function_single+0x7c/0x90 arch/x86/kernel/smp.c:266 asm_sysvec_call_function_single+0x1f/0x30 arch/x86/include/asm/idtentry.h:704 __nr_to_section include/linux/mmzone.h:1963 [inline] __pfn_to_section include/linux/mmzone.h:2101 [inline] pfn_valid include/linux/mmzone.h:2183 [inline] kmsan_virt_addr_valid arch/x86/include/asm/kmsan.h:94 [inline] virt_to_page_or_null+0x99/0x170 mm/kmsan/shadow.c:75 kmsan_get_metadata+0xf1/0x160 mm/kmsan/shadow.c:141 kmsan_get_shadow_origin_ptr+0x4a/0xb0 mm/kmsan/shadow.c:102 get_shadow_origin_ptr mm/kmsan/instrumentation.c:38 [inline] __msan_metadata_ptr_for_load_8+0x24/0x40 mm/kmsan/instrumentation.c:94 __unwind_start+0x35c/0x530 arch/x86/kernel/unwind_frame.c:416 unwind_start arch/x86/include/asm/unwind.h:64 [inline] arch_stack_walk+0xfc/0x280 arch/x86/kernel/stacktrace.c:24 stack_trace_save+0xc2/0x100 kernel/stacktrace.c:122 kmsan_save_stack_with_flags mm/kmsan/core.c:73 [inline] kmsan_internal_poison_memory+0x4a/0x90 mm/kmsan/core.c:57 kmsan_slab_free+0xce/0x140 mm/kmsan/hooks.c:87 slab_free_hook mm/slub.c:2466 [inline] slab_free mm/slub.c:6674 [inline] kfree+0x32b/0x1400 mm/slub.c:6886 tomoyo_path_perm+0x7e2/0x9a0 security/tomoyo/file.c:847 tomoyo_inode_getattr+0x35/0x40 security/tomoyo/tomoyo.c:123 security_inode_getattr+0x16e/0x590 security/security.c:1869 vfs_getattr+0x41/0xf0 fs/stat.c:259 vfs_statx_path+0x49/0x380 fs/stat.c:299 vfs_statx+0x142/0x290 fs/stat.c:356 vfs_fstatat+0x2dc/0x400 fs/stat.c:373 __do_sys_newfstatat fs/stat.c:538 [inline] __se_sys_newfstatat+0x64/0x870 fs/stat.c:532 __x64_sys_newfstatat+0xbd/0x120 fs/stat.c:532 x64_sys_call+0x3824/0x3ea0 arch/x86/include/generated/asm/syscalls_64.h:263 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x134/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f Local variable warn created at: __dquot_alloc_space+0x4d/0x1cd0 fs/quota/dquot.c:1687 dquot_alloc_space_nodirty include/linux/quotaops.h:299 [inline] dquot_alloc_block_nodirty include/linux/quotaops.h:326 [inline] shmem_inode_acct_blocks+0x376/0x5d0 mm/shmem.c:243 CPU: 0 UID: 0 PID: 19652 Comm: udevd Tainted: G W L syzkaller #0 PREEMPT(full) Tainted: [W]=WARN, [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 =====================================================