DUID 00:04:76:88:70:88:c5:a2:06:f4:af:a5:1b:0f:a5:b0:65:ae
forked to background, child pid 3207
[   12.306283][ T3208] 8021q: adding VLAN 0 to HW filter on device bond0
[   12.308080][ T3208] eql: remember to turn off Van-Jacobson compression on your slave devices
Starting sshd: OK

syzkaller
syzkaller login: [   69.871148][   T24] cfg80211: failed to load regulatory.db
Warning: Permanently added '10.128.1.107' (ECDSA) to the list of known hosts.
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[  238.111259][ T3645] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
[  244.930043][ T3646] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff888105e4f780 (size 176):
  comm "syz-executor103", pid 3670, jiffies 4294961090 (age 21.020s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff812a1ba7>] prepare_creds+0x27/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105fcd840 (size 32):
  comm "syz-executor103", pid 3670, jiffies 4294961090 (age 21.020s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff  .........r......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ee076>] __kmalloc+0x46/0x120
    [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0
    [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105edb480 (size 176):
  comm "syz-executor103", pid 3671, jiffies 4294961090 (age 21.020s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff812a1ba7>] prepare_creds+0x27/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105b33940 (size 32):
  comm "syz-executor103", pid 3671, jiffies 4294961090 (age 21.020s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff  .........r......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ee076>] __kmalloc+0x46/0x120
    [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0
    [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105e4f780 (size 176):
  comm "syz-executor103", pid 3670, jiffies 4294961090 (age 22.140s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff812a1ba7>] prepare_creds+0x27/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105fcd840 (size 32):
  comm "syz-executor103", pid 3670, jiffies 4294961090 (age 22.140s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff  .........r......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ee076>] __kmalloc+0x46/0x120
    [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0
    [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105edb480 (size 176):
  comm "syz-executor103", pid 3671, jiffies 4294961090 (age 22.140s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff812a1ba7>] prepare_creds+0x27/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105b33940 (size 32):
  comm "syz-executor103", pid 3671, jiffies 4294961090 (age 22.140s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff  .........r......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ee076>] __kmalloc+0x46/0x120
    [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0
    [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105e4f780 (size 176):
  comm "syz-executor103", pid 3670, jiffies 4294961090 (age 23.250s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff812a1ba7>] prepare_creds+0x27/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105fcd840 (size 32):
  comm "syz-executor103", pid 3670, jiffies 4294961090 (age 23.250s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff  .........r......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ee076>] __kmalloc+0x46/0x120
    [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0
    [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105edb480 (size 176):
  comm "syz-executor103", pid 3671, jiffies 4294961090 (age 23.250s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff812a1ba7>] prepare_creds+0x27/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105b33940 (size 32):
  comm "syz-executor103", pid 3671, jiffies 4294961090 (age 23.250s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff  .........r......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ee076>] __kmalloc+0x46/0x120
    [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0
    [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105e4f780 (size 176):
  comm "syz-executor103", pid 3670, jiffies 4294961090 (age 27.700s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff812a1ba7>] prepare_creds+0x27/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105fcd840 (size 32):
  comm "syz-executor103", pid 3670, jiffies 4294961090 (age 27.700s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff  .........r......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ee076>] __kmalloc+0x46/0x120
    [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0
    [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105edb480 (size 176):
  comm "syz-executor103", pid 3671, jiffies 4294961090 (age 27.700s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff812a1ba7>] prepare_creds+0x27/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105b33940 (size 32):
  comm "syz-executor103", pid 3671, jiffies 4294961090 (age 27.700s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff  .........r......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ee076>] __kmalloc+0x46/0x120
    [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0
    [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105e4f780 (size 176):
  comm "syz-executor103", pid 3670, jiffies 4294961090 (age 27.740s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff812a1ba7>] prepare_creds+0x27/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105fcd840 (size 32):
  comm "syz-executor103", pid 3670, jiffies 4294961090 (age 27.740s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff  .........r......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ee076>] __kmalloc+0x46/0x120
    [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0
    [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105edb480 (size 176):
  comm "syz-executor103", pid 3671, jiffies 4294961090 (age 27.740s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff812a1ba7>] prepare_creds+0x27/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

BUG: memory leak
unreferenced object 0xffff888105b33940 (size 32):
  comm "syz-executor103", pid 3671, jiffies 4294961090 (age 27.740s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 b0 72 bc 00 81 88 ff ff  .........r......
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff814ee076>] __kmalloc+0x46/0x120
    [<ffffffff8223aad5>] security_prepare_creds+0xa5/0xd0
    [<ffffffff812a1e66>] prepare_creds+0x2e6/0x470
    [<ffffffff81c02bdd>] ovl_fill_super+0xad/0x2730
    [<ffffffff815fecec>] mount_nodev+0x5c/0xc0
    [<ffffffff8166299b>] legacy_get_tree+0x2b/0x90
    [<ffffffff815fc7d8>] vfs_get_tree+0x28/0x100
    [<ffffffff81640317>] path_mount+0xc37/0x10d0
    [<ffffffff81640efe>] __x64_sys_mount+0x18e/0x1d0
    [<ffffffff848802b5>] do_syscall_64+0x35/0xb0
    [<ffffffff84a00087>] entry_SYSCALL_64_after_hwframe+0x63/0xcd

executing program
executing program
executing program
[  266.293849][ T3688] syz-executor103 (3688) used greatest stack depth: 10920 bytes left