last executing test programs: 12.032854618s ago: executing program 2 (id=456): r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$getregset(0x4204, r4, 0x405, &(0x7f0000000000)={0x0}) 6.772983455s ago: executing program 1 (id=473): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) sched_setparam(0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) capset(0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="130000001000000008"], 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000005000000b70000000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYRES32=r5], 0x20) 5.62809631s ago: executing program 3 (id=478): syz_emit_vhci(&(0x7f00000000c0)=@HCI_EVENT_PKT={0x4, @hci_ev_disconn_complete={{0x5, 0xd}, {0x8, 0xc8, 0x10}}}, 0x7) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0xfffe, @local, 'geneve0\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0xfffe, @broadcast, 'geneve1\x00'}}, 0x1e) socket$pppoe(0x18, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x70bd2d, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x6}]}, {0x4}, {0xc, 0x7, {0x1}}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = io_uring_setup(0x5b42, &(0x7f0000000640)={0x0, 0xfffffffe, 0x800, 0x103fc, 0x159}) r4 = socket$rds(0x15, 0x5, 0x0) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x2b) sendmsg$rds(r4, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) 5.510352028s ago: executing program 4 (id=479): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600000000000000", @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="a4280400000000001400350076657468305f746f5f626f6e6400000008000a00", @ANYRES32=r1], 0x3c}, 0x1, 0x0, 0x0, 0x4008800}, 0x8000) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x600}, 0x0) 5.27914121s ago: executing program 4 (id=480): syz_mount_image$f2fs(&(0x7f0000000040), &(0x7f00000000c0)='./file4\x00', 0x0, &(0x7f00000004c0)={[{@fsync_mode_strict}, {@discard_unit_section}, {@adaptive_mode}, {@barrier}, {@lfs_mode}, {@fault_type={'fault_type', 0x3d, 0x302}}, {@discard}, {@inline_xattr}, {@four_active_logs}, {@two_active_logs}]}, 0x21, 0x5548, &(0x7f00000058c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000040)={0x0, 0x1, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(0xffffffffffffffff, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r5, 0x1}}, 0x18) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000080), 0x62}, {&(0x7f0000000100)="16000000246837f73199aee6fdb9291b3091ec1a2d41d227975ad8ec300059191b00867997f9c0efa9c9092a31cdbb98ea272787afda0af59a320709c3a59ef05c6f40ceafec53f48d6186e7d8409e35306221caf67b370d875eff3191932728e5ab6c9a3acf6ccee3e352c898f5744abaedfb53f92c37acb126bd143f3e9cdfcf25a8d6129fcc3a141c3f5ab6db772f87c787817a9b699dd60732d952716b103bc1e91ac5b1ed92f35389580994bb0df9bce07e7a80921888f984139f488d256a67fec0cbb5c4e93d5c151d97f676ab93b1efbd46f600dc964231e3257bf358448fddf894c0cdfa9115adbe5b19bc912fcbc8aac7719b649b1ff1267491da", 0x682c}, {&(0x7f0000001480)="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", 0x1001}], 0x3) pipe2$watch_queue(0x0, 0x80) r6 = add_key(&(0x7f0000000480)='id_resolver\x00', 0x0, &(0x7f0000000080)="f8", 0x1, 0xfffffffffffffffe) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$KEYCTL_WATCH_KEY(0x20, r6, r7, 0x7) keyctl$KEYCTL_WATCH_KEY(0x20, r6, 0xffffffffffffffff, 0xf9) keyctl$setperm(0x5, r6, 0x8082008) open_by_handle_at(r0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0800000001000000"], 0x204) 5.152294963s ago: executing program 1 (id=481): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@abs={0x0, 0x0, 0x4e22}, 0x6e) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r7, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route(r5, 0x0, 0x0) sendmsg$TIPC_NL_KEY_SET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x54, r4, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x100, @dev={0xac, 0x14, 0x14, 0x41}}}, {0x14, 0x2, @in={0x2, 0x0, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0x54}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'syzkaller0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000340)={r8, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r2, 0x107, 0x1, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 5.011034979s ago: executing program 2 (id=482): syz_mount_image$f2fs(&(0x7f00000002c0), &(0x7f0000000000)='./file1\x00', 0x0, &(0x7f00000005c0)=ANY=[], 0x1, 0x5508, &(0x7f0000000740)="$eJzs3M1rI2UYAPAn7Xa/XYt48LYDi9jCJjT9WPRWdRc/sEtZ9eBJ0yQN2U0ypUnT2pMHj+LB/0QUPHn0b/Dg2Zt4ULwJSmamuvUDhKaJ3f5+MHnmffPmmecNy8IzUxLAuTWf/PJTKW7ElYiYjYjrEdl5qTgy63l4LiJuRsTMY0epmP9j4mJEXI2IG6Pkec5S8dZnt4e31n588+evv7104drnX303vV0D0/Z8RHR38vP9bh7TVh4fFvO1YTuL3dVhEfM3uo+KcZrH/eZWlmG/drSulsWVVr4+3dnrj+J2p1YfxVZ7O5vf6eUX7A9bR3myDzys7WbjRnMri+1+msXWYV7XwWH+f9thf5DnaRT5PszSx2BwFPP55kEz38/OoyzWe4NiPs+bNpoHozgsYnG5qKedRlbH1km+6f+3t9q9vYNk2Nztt9Neslapvlip3ilXd9NGc9BcLde6jTuryUKrM1pWHjRr3fVWmrY6zUo97S4mC616vVytJgt3m1vtWi+pVisrlaXy2mJxdjt57f67SaeRLIziK+3e3qDd6Sfb6W6Sf2IxWa6svLSY3Komb29sJpsP7t3b2Hzn/bvv3X95441Xi0V/KytZWF5aXi5Xl8rL1cVztP+Pi6LHuH84kdK0CwA4e/T/wDScXv+/+yDi9Pv/0P+PxZnqfyfY/79wTvYPJ6L/BwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4t76f++L17GQ+H18r5p8qpp4pxqWImImI3/7BbFw8lnO2yDP3L+vn/lLDN6XIMoyucak4rkbEenH8+vRpfwsAAADw5Pryo5uf5t16/jI/7YKYpPymzcz1D8aUrxQRc/M/jCnbzOjl2TEly/59X4iDMWXLbmBdHlOy/JbbhXFl+09mj4XLj4VSHmYmWg4AADARxzuByXYhAAAATNIn0y6A6SjF0aPMo2fB2V/e//lA8MqxEQAAAHAGlaZdAAAAAHDqsv7f7/8BAADAky3//T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB+Z+d+bhMHojgAPxu8sP+0aLX3bWVvUMaWsMc9RhSQJiggB9JCGqAGcksJEUR4HAIRh0ge20r0fZIzGcv8eIPgMDPSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdOm+Wi9ur35ft83Z7dvJMxoAAADgkm21XtT/zFL/a3P/e3PrZ9MvIqKMiEtz91F8OsscNTnVy/M3p89Xr2q4i6gTDu8xaa4vEfGnuR5/dP0pAAAAwMe1Wa7mabae/syGLog+pUWb8tvfTHlFRFSzh0xp5SHvV6aw+vs9jv+Z0uoFrGmmsLTkNs6V9ib1z/24ajc9aYrUlBdfdiwy29gBAIAejc6afmchAAAA9Onf0AUwjCKetzKPW4GT1DTbe5/PegAAAMA7VAxdAAAAANC5ev7f0/l/e+f/AQAAwDDS+X8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB0aVutF5vlat42Z7dvJ89oAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeGJ/3lEgBMIgDPau70zm/oeVBk1NTapA+PgbgwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAN787i//J6bGmWTutbH0PJKsnRpbp8beuXH0h/H1awAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAi/15SYEQCIIomDP+d9L3P6wk6BlEiICGRxW1aAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAL/rdL/8npsaZZO60sXQ8kqxdNbauGnsPGkcPxtu/AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAi527542jCAMAPLt7eyHh6zDoCiMEEgU05HIJCekQBcii4CcgWc4lmFz4SFyQKEK4oUOu0yAoEUICmS7/IXUipQldiiuCRA2avV3fJrHk42v3bD+PNDvvrVY77+xJlt+dsQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKAyeWcWZ/HQm8Zpee72g+trsb/zSB/d3Lq7HFuMkyaT3h9eqn9I+u0lAgAAwOGRVfV9COFevr0S+7RX1P95dU2s+b97ehpX9fyjdX/VV7V/bL/+cv+FnYF603HiTc+vj0cnHk+l8//NcrE9u+cVneLJF+9esuILSd/ffH6SF88z+ebWrXe7RXikiWwBgH/ieNWXQfX7UOyHbSYGwKHRqRXeVf2f9drNCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKAJk83wZBUnIYTlziyO7jy4vrZbf3Pr7nLVzty4sRW+mt0z3iIPIZxfH49ONDqbxXbl6rWLq+Px6HLzwcshhLZGf7uc/sUPx8/seXEIrTwfwX8UpOWXvSj57I+gxR9KAAAcSHnZYl1/L99eieeSpRD+/P7h+v+1WhzmrP/vf3Tmdn2sev0/bGyGi2+wcemzwZWr195Yv7R6YXRh9MmbJ4dvDU+dPX367KB4VzLwxgQAAIB/p1u2ev2fLj2+/n+sFoc56//Pvx1+WR8rU//varbo13YmAAAAh9tzr/zxe7LL+aTbDV+sbmxc7oR4HO58Pjk9tpDq33akbPX6P1tqOysAAACgCZPN5KH1/3O1OMy5/v/UDy/+VL9nFkI4Wq7/H1/7dHyuuekstCb+nLjtOQIAANCuo2Wrr//nxf7/dGfLQxpCeP3VaVz+G8C56v/sva9/rI9V3/9/qrkpLqS0P30eRd8PodNvOyMAAAAOsifKFov93/LtlY9/PvZB1/5/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgKb9FQAA//+AcD1H") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) socket$l2tp6(0xa, 0x2, 0x73) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0xc000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x183341, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x30, r4, 0x1, 0x70bd28, 0x4, {0x5}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x124}, @L2TP_ATTR_SEND_SEQ={0x5}, @L2TP_ATTR_UDP_CSUM={0x5}]}, 0x30}}, 0xa0) fgetxattr(r1, &(0x7f0000000280)=@random={'security.', '\x00'}, &(0x7f0000000380)=""/238, 0xee) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r3, 0xf502, 0x0) ioctl$EVIOCGSND(r3, 0x8040451a, &(0x7f0000000040)=""/51) 4.986369572s ago: executing program 3 (id=483): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x2) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x1, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="a4280400000000001400350076657468305f746f5f626f6e6400000008000a00", @ANYRES32=r4], 0x3c}, 0x1, 0x0, 0x0, 0x4008800}, 0x8000) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r9 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'veth1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}]}}}, @IFLA_LINK={0x8, 0x5, r10}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x600}, 0x0) 4.627594914s ago: executing program 0 (id=484): socket$inet_tcp(0x2, 0x1, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x2a, 0xa9}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) landlock_add_rule$LANDLOCK_RULE_NET_PORT(0xffffffffffffffff, 0x2, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) madvise(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x16) r3 = openat$sw_sync(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r3, 0xc0285700, &(0x7f0000000400)={0x1b, "5660359c3245d1c42317afad7d48ed510000000000000100"}) r4 = shmget$private(0x0, 0x3000, 0x400, &(0x7f0000ffd000/0x3000)=nil) r5 = shmat(r4, &(0x7f0000fec000/0x4000)=nil, 0x600c) mremap(&(0x7f0000fec000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ff9000/0x3000)=nil) shmdt(r5) 4.5958332s ago: executing program 3 (id=485): setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x800) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000180)={0x80, 0x24000000, 0x0, 0x5, 0x1c27, 0x4000000}) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000180)={0x3, {{0xa, 0x4e20, 0xa3f, @mcast1, 0xbfd}}, {{0xa, 0x4625, 0x0, @remote, 0xfffffe01}}}, 0x108) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) ptrace$setsig(0x4203, r2, 0x5, &(0x7f0000000140)={0x3, 0x4, 0xffffffc4}) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000080)={@private2, 0x0}, &(0x7f00000000c0)=0x14) r4 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r5 = add_key$user(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f00000000c0), 0x5ba8, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000880), 0x0, r5) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000640)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x0, '\x00', r3, r4, 0x3, 0x0, 0x2}, 0x50) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000000)='./bus\x00', 0x2840098, &(0x7f0000000240)=ANY=[], 0x21, 0x2d7, &(0x7f00000002c0)="$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") r6 = syz_open_procfs(0x0, &(0x7f0000002180)='projid_map\x00') read$char_usb(r6, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) 4.524898585s ago: executing program 3 (id=486): syz_mount_image$hfs(&(0x7f0000002c80), &(0x7f00000000c0)='./file1\x00', 0x4490, &(0x7f0000000200)=ANY=[], 0xfd, 0x2b6, &(0x7f0000000740)="$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") r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) r1 = fspick(r0, &(0x7f0000000000)='.\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r1, 0x0, &(0x7f0000000080)='ro\x00', 0x0, 0x0) r2 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r2, &(0x7f0000000180)={0xa, 0x0, 0x404000, @loopback, 0x7cfd1f0f}, 0x20) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TLS_RX(r4, 0x11a, 0x2, &(0x7f0000000040)=@gcm_256={{}, "360859a3602d0594", "45acc2da11fa8afb11d5e244b735a0067b879f7656573d737798de685b928ee8", "489a2f9e", "6361ceb622c2b0b9"}, 0x38) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x200000087}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=@base={0x6, 0x4, 0x1010, 0x89}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000380), &(0x7f0000000000), 0x80, r8, 0x0, 0x7}, 0x38) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x1a0}}, 0x0) 4.228328526s ago: executing program 4 (id=487): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="2c385aa3d49100dc6626c892b6bc436a", 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendto$llc(0xffffffffffffffff, 0x0, 0x0, 0x8005, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x85, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0x3, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x2}}, 0x0, 0x9}, &(0x7f0000000080)=0x90) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socketpair$unix(0x1, 0x5, 0x0, 0x0) shmdt(0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000240)={'vlan0\x00', &(0x7f0000000200)=@ethtool_cmd={0x4f, 0x8001, 0x1a9, 0x0, 0x8, 0x7, 0x3, 0x40, 0x4, 0x1, 0x1, 0x1, 0x7, 0x10, 0xf, 0x1ff, [0x1a121cef, 0x3]}}) r6 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[], 0x63}, 0x1, 0x0, 0x0, 0x20000045}, 0x40046) syz_genetlink_get_family_id$batadv(&(0x7f00000000c0), r6) 4.057112864s ago: executing program 1 (id=488): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) sched_setparam(0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) capset(0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="130000001000000008"], 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000005000000b70000000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYRES32=r5], 0x20) 3.696509142s ago: executing program 0 (id=489): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, 0x0, 0x4000) landlock_create_ruleset(&(0x7f0000000200)={0x5048, 0x1, 0x2}, 0x18, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) socket(0x40000000015, 0x5, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = syz_io_uring_setup(0x643e, &(0x7f0000000500)={0x0, 0x4000d52b, 0x10100, 0x0, 0x96}, &(0x7f0000000340)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r5, 0x0, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x3, 0x1, 0x0, 0xce, 0x0, 0x1}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r7, &(0x7f00000001c0)=ANY=[@ANYBLOB='.'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r7, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40000001, 0x1}) io_uring_enter(r4, 0x2d3a, 0x8088, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) read$FUSE(0xffffffffffffffff, 0x0, 0x0) 3.688709407s ago: executing program 2 (id=490): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600000000000000", @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="a4280400000000001400350076657468305f746f5f626f6e6400000008000a00", @ANYRES32=r1], 0x3c}, 0x1, 0x0, 0x0, 0x4008800}, 0x8000) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x600}, 0x0) 3.282571968s ago: executing program 3 (id=491): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) sched_setparam(0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) capset(0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="130000001000000008"], 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000005000000b70000000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYRES32=r5], 0x20) 3.274596263s ago: executing program 4 (id=492): socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000100), 0x0, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f0000000200)=0x48, 0x4) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000340)={{0xfffffffe, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x6, 0x2, 0x4, 0x0, 0x0, 0x0, 'syz1\x00', 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f00000006c0)={{0x5, 0x0, 0x1, 0x6, 'syz1\x00', 0x10001}, 0x1, [0x7, 0x800, 0x800000000, 0xd, 0xd18, 0x6, 0x9, 0x3, 0xfffffffffffff000, 0x9, 0x2, 0xffffffffffffffff, 0x1, 0x400, 0x2, 0x1, 0x9, 0x9, 0x2, 0x146bf227, 0x7, 0x5, 0xa, 0x1, 0xfffffffffffffffb, 0x9, 0x7, 0x5, 0x6903fcd9, 0x7ff, 0x6, 0x7, 0x8, 0xf, 0x2, 0x7fff, 0x6, 0x7e, 0x37, 0x0, 0x100000001, 0x4, 0x7, 0x401, 0x6, 0x2, 0x0, 0x9, 0x400, 0x7f6aaa55, 0x5, 0x2, 0x7, 0x6, 0x5, 0x7fffffffffffffff, 0x0, 0x9, 0x0, 0x8000000000fff, 0x6, 0x2, 0x7, 0x2, 0x0, 0x9, 0x1695b04f, 0xc, 0x98f, 0x800, 0x7, 0x4, 0x1, 0x6, 0x1, 0x0, 0x100000002, 0x7, 0x6, 0x45a, 0x2, 0xb, 0x4, 0x2, 0x3, 0x10001, 0x40, 0x0, 0xfffffffffffffff8, 0x9, 0x1000, 0x48, 0xb687, 0x1, 0xe1, 0xaf31, 0x6, 0xffff, 0x615, 0xe8, 0xffffffff, 0x3ab0, 0x7, 0xd904, 0x8000000000000000, 0x3, 0x600, 0x4, 0x5, 0x8001, 0x7f, 0xfffffffffffffff8, 0x10001, 0xf, 0x0, 0x1, 0xb, 0x9, 0x78, 0x9, 0x5, 0xfffffffffffffffc, 0x80, 0x0, 0x8000, 0x2, 0x7ff, 0x800001]}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @dev}, {0x2, 0x4e20, @remote}, {0x2, 0x4, @multicast1}, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x200}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x0, @empty}, {0x4, 0x4e20, @loopback}, {0x2, 0x4e22, @remote}, 0x10c, 0x0, 0x0, 0xfdffffffffffffff, 0x0, &(0x7f0000000180)='lo\x00', 0x0, 0xa00, 0x1000}) 3.249579087s ago: executing program 2 (id=493): r0 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$getregset(0x4204, r4, 0x405, &(0x7f0000000000)={0x0}) 2.756129655s ago: executing program 0 (id=494): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000c80)='./file1\x00', 0x210000, &(0x7f0000000240)={[{@dioread_nolock}, {@resgid}, {@orlov}, {@acl}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x100000}}, {@errors_remount}, {@noinit_itable}, {@orlov}]}, 0xfc, 0x575, &(0x7f0000000640)="$eJzs3d9rW1UcAPDvTdPup66DMdQHGezByVy6tv6YIDgfRYcDfZ+hvSuj6TKadKx14PbgXnyRIYg4EP8A330c/gP+FQMdDBlFH0So3PSmy9qkv5aZbPl84Lbn5N7bc78593t7Tm5CAhhYx7IfhYiXI+KbJOJQy7pi5CuPrW63/PD6VLYksbLy6Z9JJPljze2T/PeBvPJSRPz6VcTJwsZ2a4tLs+VKJZ3P62P1uStjtcWlU5fmyjPpTHp5YnLyzFuTE+++83bXYn39/N/ff3L3wzNfH1/+7uf7h28ncTYO5uta43gCN1orx8r/5qXhOLtuw/EuNNZPkl4fALsylOf5cGTXgEMxlGc98Pz7MiJWgAGVyH8YUM1xQHNu36V58DPjwQerE6BG7COt8RdXXxuJvY250f7l5LGZUTbfHe1C+1kbv/xx53a2xOavQ+zbog6wIzduRsTpYnHj9T/Jr3+7d7rx4vHm1rcxaP9/oJfuZuOfN9qN/wpr459oM/450CZ3d2Pr/C/c70IzHWXjv/fajn/XLl2jQ3nthcaYbzi5eKmSno6IFyPiRAzvyeqb3c85s3xvpdO61vFftmTtN8eC+XHcL+55fJ/pcr0cESNPEnfTg5sRrxTbxZ+s9X/Spv+z5+P8Nts4mt55da2ybtC8dfxP18pPEa+17f9Hd7SSze9PjjXOh7HmWbHRX7eO/tap/V7Hn/X//s3jH01a79fWdt7Gj3v/STut2+35P5J81ig3k+BauV6fH48YST7e+PjEo32b9eb2Wfwnjm9+/Wt3/meTr8+3Gf+tI7c6btoP/T+9o/7feeHeR1/80Kn97fX/m43SifyR/PrXXn6ubPcAn/T5AwAAAAAAgH5SiIiDkRRKa+VCoVRafX/HkdhfqFRr9ZMXqwuXp6PxWdnRGC4073Qfank/xHh+a79Zn1hXn4yIwxHx7dC+Rr00Va1M9zp4AAAAAAAAAAAAAAAAAAAA6BMHOnz+P/P7UK+PDnjqGl9ssKfXRwH0wpZf+d+Nb3oC+tKW+Q88t+Q/DC75D4NL/sPgkv8wuOQ/DC75D4NL/gMAAAAAAAAAAAAAAAAAAAAAAAAAAEBXnT93LltWlh9en8rq01cXF2arV09Np7XZ0tzCVGmqOn+lNFOtzlTS0lR1bqu/V6lWr4xPxMK1sXpaq4/VFpcuzFUXLtcvXJorz6QX0uH/JSoAAAAAAAAAAAAAAAAAAAB4ttQWl2bLlUo6r9Cx8H70xWE8zQBX7Wr3Yr9EodChcDPv3p3t1cOLEgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACs818AAAD///AKMoc=") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000280)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000200)='nv', 0x2) keyctl$clear(0x5, 0xffffffffffffffff) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff94, 0x12, 0x0, 0x12) recvfrom$inet(r3, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0xc9100120, 0x0, 0xfffffffffffffd25) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000700)=""/166}, 0x20) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @private=0xa010100}, 0x10) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 2.361947573s ago: executing program 4 (id=495): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f00000000c0)=0x7) shmget(0x1, 0x1000, 0x1000, &(0x7f0000ffd000/0x1000)=nil) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x40001e0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) sendmsg$nl_xfrm(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=@acquire={0x16c, 0x17, 0x1, 0x0, 0x0, {{@in6=@private0}, @in6=@mcast2, {@in6=@private0, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0xa}, {{@in6=@mcast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0xffff, 0x0, 0x0, 0xfffe, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}, {0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x4}}}, [@tmpl={0x44, 0x5, [{{@in6=@private2, 0x0, 0x3c}, 0x0, @in=@multicast2}]}]}, 0x16c}}, 0x40000) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) shmget(0x1, 0x3000, 0x10, &(0x7f000091a000/0x3000)=nil) futex(&(0x7f0000000140)=0x1, 0xb, 0x1, &(0x7f0000000240), &(0x7f00000002c0), 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_OPENQRY(r4, 0x4b4c, &(0x7f0000000080)) connect$qrtr(0xffffffffffffffff, &(0x7f0000000180)={0x2a, 0x3}, 0xc) 1.890866985s ago: executing program 1 (id=496): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x2) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[], 0x3c}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x1, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @veth={{0x9}, {0x4, 0x2, 0x0, 0x1, @void}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="a4280400000000001400350076657468305f746f5f626f6e6400000008000a00", @ANYRES32=r4], 0x3c}, 0x1, 0x0, 0x0, 0x4008800}, 0x8000) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x1, 0x803, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r9 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'veth1\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}]}}}, @IFLA_LINK={0x8, 0x5, r10}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x600}, 0x0) 1.417999317s ago: executing program 0 (id=497): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) mount$fuse(0x0, 0x0, 0x0, 0x2b38094, &(0x7f0000000400)=ANY=[@ANYRESHEX=0x0]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x74}}, 0x0) mount$bpf(0x0, 0x0, 0x0, 0xc4062, &(0x7f0000000300)={[{}]}) listen(r3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000ac0)=ANY=[@ANYRES32=r6, @ANYRES32=r5, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000048c0)={r6, &(0x7f00000047c0), &(0x7f0000004880)=@udp=r3}, 0x20) recvmmsg(r3, &(0x7f0000000b80)=[{{0x0, 0xffffffffffffff6c, 0x0, 0x0, 0x0, 0x52}, 0xa}], 0x360, 0x120, 0x0) recvfrom$inet6(r3, &(0x7f00000000c0)=""/53, 0x35, 0x40010102, 0x0, 0x0) 1.311437278s ago: executing program 2 (id=498): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000400)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) syz_pidfd_open(r0, 0x0) keyctl$session_to_parent(0x12) r3 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r3, 0xc008561b, &(0x7f0000000000)={0x9, 0xffff}) add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) keyctl$session_to_parent(0x12) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_buf(r4, 0x6, 0x21, &(0x7f0000000000), 0x0) getsockopt$inet6_tcp_buf(r4, 0x6, 0x21, 0x0, 0x0) listxattr(&(0x7f0000004680)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2008c16, &(0x7f0000000100)={[{@data_writeback}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x8000}}]}, 0xff, 0x240, &(0x7f00000002c0)="$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") socket(0x29, 0x5, 0x3) r5 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x45) ioctl$EXT4_IOC_MIGRATE(r5, 0x6609) 1.223539132s ago: executing program 1 (id=499): sendmsg$kcm(0xffffffffffffffff, 0x0, 0x24000084) r0 = openat(0xffffffffffffff9c, &(0x7f0000000300)='.\x00', 0x100, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40086610, &(0x7f00000004c0)={@id={0x2, 0x0, @b}}) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x802053, 0x0, 0xfc, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x1000006, 0x80010, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x1c, 0x0, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x9}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40) r4 = socket$rxrpc(0x21, 0x2, 0xa) fcntl$getownex(r4, 0x6, 0xffffffffffffffff) r5 = syz_open_dev$vim2m(&(0x7f0000000680), 0x8, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r5, 0xc0145608, &(0x7f00000000c0)={0x1, 0x2, 0x1}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r5, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) 957.392677ms ago: executing program 4 (id=500): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000100)={0x0, 'erspan0\x00', {0x1}, 0x26}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) timer_settime(0x0, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008091}, 0x4000000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) mount(0x0, &(0x7f0000000040)='./cgroup\x00', 0x0, 0x2208004, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, 0x0) mount$cgroup(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x2010042, &(0x7f0000000000)={[{@subsystem='hugetlb'}, {@subsystem='memory'}, {@subsystem='cpuacct'}]}) 954.320571ms ago: executing program 3 (id=510): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) sched_setparam(0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) capset(0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="130000001000000008"], 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000a80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7020000000000008500000051000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000005000000b70000000000000095"], &(0x7f0000000000)='GPL\x00'}, 0x94) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)=ANY=[@ANYRES32=r3, @ANYRES32=r5], 0x20) 952.25598ms ago: executing program 1 (id=501): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) keyctl$clear(0x7, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) keyctl$set_reqkey_keyring(0xf, 0xfffffffa) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, &(0x7f0000000100)) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) socket$inet6(0x10, 0x2, 0x4) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, 0x0, 0x8090) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x40980, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000000c0)=0xf) ioctl$TCFLSH(r3, 0x400455c8, 0x4) ioctl$AUTOFS_IOC_SETTIMEOUT(r3, 0x80049367, &(0x7f0000000040)) unshare(0x26020480) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={@map, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 448.231209ms ago: executing program 0 (id=502): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) userfaultfd(0x80001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) socket$alg(0x26, 0x5, 0x0) fanotify_init(0x200, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) socket$vsock_stream(0x28, 0x1, 0x0) pipe2(&(0x7f0000000040), 0x0) epoll_create1(0x0) epoll_create1(0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) epoll_create1(0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_sctp(0x2, 0x1, 0x84) pipe2$9p(&(0x7f0000000180), 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16, @ANYBLOB="010004"], 0x38}, 0x1, 0x0, 0x0, 0x400}, 0x0) ppoll(&(0x7f0000000300)=[{r1, 0x4236}], 0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0xfffb, 0x5, @empty, 0xa098}, {0xa, 0x4e21, 0x9, @mcast1, 0x9}, r2, 0x8001}}, 0x48) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) 133.274236ms ago: executing program 2 (id=503): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) syz_open_dev$sndctrl(&(0x7f0000000000), 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/18, @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="3c0000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="a4280400000000001400350076657468305f746f5f626f6e6400000008000a00", @ANYRES32=r1], 0x3c}, 0x1, 0x0, 0x0, 0x4008800}, 0x8000) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'bond_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=@newlink={0x4c, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x4}]}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x600}, 0x0) 0s ago: executing program 0 (id=504): r0 = socket$inet_sctp(0x2, 0x5, 0x84) io_getevents(0x0, 0xfffe, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000380)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) preadv(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x5c, 0x0) ftruncate(0xffffffffffffffff, 0xffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x7) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001680)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x40001}, 0x4040850) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000100000a64000000030a0fdb00000000000000000a0000050900030073797a30000000000900010073797a310000000014000480080002403cb140bb080001400000000308000540000000001c0008800c00014000000000000001ff0c000240000000000000ae6014000000110001"], 0x8c}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) close_range(r0, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): [ 141.651718][ T8204] Memory failure: 0x122b7e: recovery action for dirty LRU page: Recovered [ 141.651723][ T8204] Injecting memory failure for pfn 0x122b7d at process virtual address 0x209d4000 [ 141.651739][ T8204] Memory failure: 0x122b7d: recovery action for dirty LRU page: Recovered [ 141.651744][ T8204] Injecting memory failure for pfn 0x15103f at process virtual address 0x209d5000 [ 141.651760][ T8204] Memory failure: 0x15103f: recovery action for dirty LRU page: Recovered [ 141.651766][ T8204] Injecting memory failure for pfn 0x125edc at process virtual address 0x209d6000 [ 141.651782][ T8204] Memory failure: 0x125edc: recovery action for dirty LRU page: Recovered [ 141.651788][ T8204] Injecting memory failure for pfn 0x125edd at process virtual address 0x209d7000 [ 141.651803][ T8204] Memory failure: 0x125edd: recovery action for dirty LRU page: Recovered [ 141.651809][ T8204] Injecting memory failure for pfn 0x15f945 at process virtual address 0x209d8000 [ 141.651824][ T8204] Memory failure: 0x15f945: recovery action for dirty LRU page: Recovered [ 141.651830][ T8204] Injecting memory failure for pfn 0x15103b at process virtual address 0x209d9000 [ 141.651846][ T8204] Memory failure: 0x15103b: recovery action for dirty LRU page: Recovered [ 141.651851][ T8204] Injecting memory failure for pfn 0x15103c at process virtual address 0x209da000 [ 141.651867][ T8204] Memory failure: 0x15103c: recovery action for dirty LRU page: Recovered [ 141.651873][ T8204] Injecting memory failure for pfn 0x15103e at process virtual address 0x209db000 [ 141.651889][ T8204] Memory failure: 0x15103e: recovery action for dirty LRU page: Recovered [ 141.651895][ T8204] Injecting memory failure for pfn 0x15f946 at process virtual address 0x209dc000 [ 141.651911][ T8204] Memory failure: 0x15f946: recovery action for dirty LRU page: Recovered [ 141.651916][ T8204] Injecting memory failure for pfn 0x125edf at process virtual address 0x209dd000 [ 141.651932][ T8204] Memory failure: 0x125edf: recovery action for dirty LRU page: Recovered [ 141.651938][ T8204] Injecting memory failure for pfn 0x127a59 at process virtual address 0x209de000 [ 141.651954][ T8204] Memory failure: 0x127a59: recovery action for dirty LRU page: Recovered [ 141.651960][ T8204] Injecting memory failure for pfn 0x126dcd at process virtual address 0x209df000 [ 141.651976][ T8204] Memory failure: 0x126dcd: recovery action for dirty LRU page: Recovered [ 141.651981][ T8204] Injecting memory failure for pfn 0x12412a at process virtual address 0x209e0000 [ 141.651997][ T8204] Memory failure: 0x12412a: recovery action for dirty LRU page: Recovered [ 141.652003][ T8204] Injecting memory failure for pfn 0x12ade0 at process virtual address 0x209e1000 [ 141.652019][ T8204] Memory failure: 0x12ade0: recovery action for dirty LRU page: Recovered [ 141.652024][ T8204] Injecting memory failure for pfn 0x15ec98 at process virtual address 0x209e2000 [ 141.652040][ T8204] Memory failure: 0x15ec98: recovery action for dirty LRU page: Recovered [ 141.652046][ T8204] Injecting memory failure for pfn 0x15ec9d at process virtual address 0x209e3000 [ 141.652061][ T8204] Memory failure: 0x15ec9d: recovery action for dirty LRU page: Recovered [ 141.652067][ T8204] Injecting memory failure for pfn 0x15ec9e at process virtual address 0x209e4000 [ 141.652083][ T8204] Memory failure: 0x15ec9e: recovery action for dirty LRU page: Recovered [ 141.652088][ T8204] Injecting memory failure for pfn 0x15ec9c at process virtual address 0x209e5000 [ 141.652104][ T8204] Memory failure: 0x15ec9c: recovery action for dirty LRU page: Recovered [ 141.652110][ T8204] Injecting memory failure for pfn 0x12ade2 at process virtual address 0x209e6000 [ 141.652125][ T8204] Memory failure: 0x12ade2: recovery action for dirty LRU page: Recovered [ 141.652131][ T8204] Injecting memory failure for pfn 0x12ade1 at process virtual address 0x209e7000 [ 141.652146][ T8204] Memory failure: 0x12ade1: recovery action for dirty LRU page: Recovered [ 141.652152][ T8204] Injecting memory failure for pfn 0x15ec9b at process virtual address 0x209e8000 [ 141.652168][ T8204] Memory failure: 0x15ec9b: recovery action for dirty LRU page: Recovered [ 141.652173][ T8204] Injecting memory failure for pfn 0x15ec9a at process virtual address 0x209e9000 [ 141.652189][ T8204] Memory failure: 0x15ec9a: recovery action for dirty LRU page: Recovered [ 141.652195][ T8204] Injecting memory failure for pfn 0x15ec96 at process virtual address 0x209ea000 [ 141.652211][ T8204] Memory failure: 0x15ec96: recovery action for dirty LRU page: Recovered [ 141.652217][ T8204] Injecting memory failure for pfn 0x15ec9f at process virtual address 0x209eb000 [ 141.652232][ T8204] Memory failure: 0x15ec9f: recovery action for dirty LRU page: Recovered [ 141.652238][ T8204] Injecting memory failure for pfn 0x15ec94 at process virtual address 0x209ec000 [ 141.652254][ T8204] Memory failure: 0x15ec94: recovery action for dirty LRU page: Recovered [ 141.652259][ T8204] Injecting memory failure for pfn 0x15ec99 at process virtual address 0x209ed000 [ 141.652275][ T8204] Memory failure: 0x15ec99: recovery action for dirty LRU page: Recovered [ 141.652281][ T8204] Injecting memory failure for pfn 0x15ec95 at process virtual address 0x209ee000 [ 141.652296][ T8204] Memory failure: 0x15ec95: recovery action for dirty LRU page: Recovered [ 141.652302][ T8204] Injecting memory failure for pfn 0x15ec92 at process virtual address 0x209ef000 [ 141.652317][ T8204] Memory failure: 0x15ec92: recovery action for dirty LRU page: Recovered [ 141.652323][ T8204] Injecting memory failure for pfn 0x15ec97 at process virtual address 0x209f0000 [ 141.652339][ T8204] Memory failure: 0x15ec97: recovery action for dirty LRU page: Recovered [ 141.652345][ T8204] Injecting memory failure for pfn 0x15ec93 at process virtual address 0x209f1000 [ 141.652360][ T8204] Memory failure: 0x15ec93: recovery action for dirty LRU page: Recovered [ 141.652366][ T8204] Injecting memory failure for pfn 0x15ec91 at process virtual address 0x209f2000 [ 141.652382][ T8204] Memory failure: 0x15ec91: recovery action for dirty LRU page: Recovered [ 141.652387][ T8204] Injecting memory failure for pfn 0x124129 at process virtual address 0x209f3000 [ 141.652403][ T8204] Memory failure: 0x124129: recovery action for dirty LRU page: Recovered [ 141.652409][ T8204] Injecting memory failure for pfn 0x15d860 at process virtual address 0x209f4000 [ 141.652425][ T8204] Memory failure: 0x15d860: recovery action for dirty LRU page: Recovered [ 141.652430][ T8204] Injecting memory failure for pfn 0x15d852 at process virtual address 0x209f5000 [ 141.652446][ T8204] Memory failure: 0x15d852: recovery action for dirty LRU page: Recovered [ 141.652452][ T8204] Injecting memory failure for pfn 0x126dcc at process virtual address 0x209f6000 [ 141.652468][ T8204] Memory failure: 0x126dcc: recovery action for dirty LRU page: Recovered [ 141.652474][ T8204] Injecting memory failure for pfn 0x12a049 at process virtual address 0x209f7000 [ 141.652489][ T8204] Memory failure: 0x12a049: recovery action for dirty LRU page: Recovered [ 141.652495][ T8204] Injecting memory failure for pfn 0x15f0f8 at process virtual address 0x209f8000 [ 141.652510][ T8204] Memory failure: 0x15f0f8: recovery action for dirty LRU page: Recovered [ 141.652516][ T8204] Injecting memory failure for pfn 0x15d4ba at process virtual address 0x209f9000 [ 141.652532][ T8204] Memory failure: 0x15d4ba: recovery action for dirty LRU page: Recovered [ 141.652537][ T8204] Injecting memory failure for pfn 0x121ef9 at process virtual address 0x209fa000 [ 141.652553][ T8204] Memory failure: 0x121ef9: recovery action for dirty LRU page: Recovered [ 141.652559][ T8204] Injecting memory failure for pfn 0x15ec8f at process virtual address 0x209fb000 [ 141.652574][ T8204] Memory failure: 0x15ec8f: recovery action for dirty LRU page: Recovered [ 141.652580][ T8204] Injecting memory failure for pfn 0x15ec90 at process virtual address 0x209fc000 [ 141.652596][ T8204] Memory failure: 0x15ec90: recovery action for dirty LRU page: Recovered [ 141.652601][ T8204] Injecting memory failure for pfn 0x126dcb at process virtual address 0x209fd000 [ 141.652617][ T8204] Memory failure: 0x126dcb: recovery action for dirty LRU page: Recovered [ 141.652623][ T8204] Injecting memory failure for pfn 0x124128 at process virtual address 0x209fe000 [ 141.652638][ T8204] Memory failure: 0x124128: recovery action for dirty LRU page: Recovered [ 141.652644][ T8204] Injecting memory failure for pfn 0x12b082 at process virtual address 0x209ff000 [ 141.652662][ T8204] Memory failure: 0x12b082: recovery action for dirty LRU page: Recovered [ 141.652668][ T8204] Injecting memory failure for pfn 0x15d86f at process virtual address 0x20a00000 [ 141.652684][ T8204] Memory failure: 0x15d86f: recovery action for dirty LRU page: Recovered [ 141.652690][ T8204] Injecting memory failure for pfn 0x15ec8d at process virtual address 0x20a01000 [ 141.652706][ T8204] Memory failure: 0x15ec8d: recovery action for dirty LRU page: Recovered [ 141.652712][ T8204] Injecting memory failure for pfn 0x15ec8c at process virtual address 0x20a02000 [ 141.652727][ T8204] Memory failure: 0x15ec8c: recovery action for dirty LRU page: Recovered [ 141.652733][ T8204] Injecting memory failure for pfn 0x15ec8b at process virtual address 0x20a03000 [ 141.652749][ T8204] Memory failure: 0x15ec8b: recovery action for dirty LRU page: Recovered [ 141.652755][ T8204] Injecting memory failure for pfn 0x15ec8a at process virtual address 0x20a04000 [ 141.652770][ T8204] Memory failure: 0x15ec8a: recovery action for dirty LRU page: Recovered [ 141.652776][ T8204] Injecting memory failure for pfn 0x15ec46 at process virtual address 0x20a05000 [ 141.652791][ T8204] Memory failure: 0x15ec46: recovery action for dirty LRU page: Recovered [ 141.652797][ T8204] Injecting memory failure for pfn 0x15ec45 at process virtual address 0x20a06000 [ 141.652813][ T8204] Memory failure: 0x15ec45: recovery action for dirty LRU page: Recovered [ 141.652819][ T8204] Injecting memory failure for pfn 0x15ec44 at process virtual address 0x20a07000 [ 141.652834][ T8204] Memory failure: 0x15ec44: recovery action for dirty LRU page: Recovered [ 141.652840][ T8204] Injecting memory failure for pfn 0x15ec43 at process virtual address 0x20a08000 [ 141.652856][ T8204] Memory failure: 0x15ec43: recovery action for dirty LRU page: Recovered [ 141.652861][ T8204] Injecting memory failure for pfn 0x15ec42 at process virtual address 0x20a09000 [ 141.652877][ T8204] Memory failure: 0x15ec42: recovery action for dirty LRU page: Recovered [ 141.652883][ T8204] Injecting memory failure for pfn 0x15ec41 at process virtual address 0x20a0a000 [ 141.652898][ T8204] Memory failure: 0x15ec41: recovery action for dirty LRU page: Recovered [ 141.652904][ T8204] Injecting memory failure for pfn 0x15ec40 at process virtual address 0x20a0b000 [ 141.652919][ T8204] Memory failure: 0x15ec40: recovery action for dirty LRU page: Recovered [ 141.652925][ T8204] Injecting memory failure for pfn 0x12a41f at process virtual address 0x20a0c000 [ 141.652941][ T8204] Memory failure: 0x12a41f: recovery action for dirty LRU page: Recovered [ 141.652947][ T8204] Injecting memory failure for pfn 0x12a41e at process virtual address 0x20a0d000 [ 141.652963][ T8204] Memory failure: 0x12a41e: recovery action for dirty LRU page: Recovered [ 141.652969][ T8204] Injecting memory failure for pfn 0x12a41d at process virtual address 0x20a0e000 [ 141.652984][ T8204] Memory failure: 0x12a41d: recovery action for dirty LRU page: Recovered [ 141.652990][ T8204] Injecting memory failure for pfn 0x12a41c at process virtual address 0x20a0f000 [ 141.653006][ T8204] Memory failure: 0x12a41c: recovery action for dirty LRU page: Recovered [ 141.653012][ T8204] Injecting memory failure for pfn 0x12a41b at process virtual address 0x20a10000 [ 141.653028][ T8204] Memory failure: 0x12a41b: recovery action for dirty LRU page: Recovered [ 141.653034][ T8204] Injecting memory failure for pfn 0x12a41a at process virtual address 0x20a11000 [ 141.653050][ T8204] Memory failure: 0x12a41a: recovery action for dirty LRU page: Recovered [ 141.653056][ T8204] Injecting memory failure for pfn 0x12a419 at process virtual address 0x20a12000 [ 141.653071][ T8204] Memory failure: 0x12a419: recovery action for dirty LRU page: Recovered [ 141.653077][ T8204] Injecting memory failure for pfn 0x12a418 at process virtual address 0x20a13000 [ 141.653092][ T8204] Memory failure: 0x12a418: recovery action for dirty LRU page: Recovered [ 141.653098][ T8204] Injecting memory failure for pfn 0x12a417 at process virtual address 0x20a14000 [ 141.653114][ T8204] Memory failure: 0x12a417: recovery action for dirty LRU page: Recovered [ 141.653119][ T8204] Injecting memory failure for pfn 0x12a416 at process virtual address 0x20a15000 [ 141.653135][ T8204] Memory failure: 0x12a416: recovery action for dirty LRU page: Recovered [ 141.653141][ T8204] Injecting memory failure for pfn 0x12a415 at process virtual address 0x20a16000 [ 141.653157][ T8204] Memory failure: 0x12a415: recovery action for dirty LRU page: Recovered [ 141.653163][ T8204] Injecting memory failure for pfn 0x12a414 at process virtual address 0x20a17000 [ 141.653178][ T8204] Memory failure: 0x12a414: recovery action for dirty LRU page: Recovered [ 141.653184][ T8204] Injecting memory failure for pfn 0x12a413 at process virtual address 0x20a18000 [ 141.653199][ T8204] Memory failure: 0x12a413: recovery action for dirty LRU page: Recovered [ 141.653205][ T8204] Injecting memory failure for pfn 0x12a412 at process virtual address 0x20a19000 [ 141.653221][ T8204] Memory failure: 0x12a412: recovery action for dirty LRU page: Recovered [ 141.653227][ T8204] Injecting memory failure for pfn 0x12a411 at process virtual address 0x20a1a000 [ 141.653242][ T8204] Memory failure: 0x12a411: recovery action for dirty LRU page: Recovered [ 141.653248][ T8204] Injecting memory failure for pfn 0x12a410 at process virtual address 0x20a1b000 [ 141.653264][ T8204] Memory failure: 0x12a410: recovery action for dirty LRU page: Recovered [ 141.653269][ T8204] Injecting memory failure for pfn 0x12a40f at process virtual address 0x20a1c000 [ 141.653285][ T8204] Memory failure: 0x12a40f: recovery action for dirty LRU page: Recovered [ 141.653291][ T8204] Injecting memory failure for pfn 0x12a40e at process virtual address 0x20a1d000 [ 141.653306][ T8204] Memory failure: 0x12a40e: recovery action for dirty LRU page: Recovered [ 141.653312][ T8204] Injecting memory failure for pfn 0x12a40d at process virtual address 0x20a1e000 [ 141.653327][ T8204] Memory failure: 0x12a40d: recovery action for dirty LRU page: Recovered [ 141.653333][ T8204] Injecting memory failure for pfn 0x12a40c at process virtual address 0x20a1f000 [ 141.653348][ T8204] Memory failure: 0x12a40c: recovery action for dirty LRU page: Recovered [ 141.653354][ T8204] Injecting memory failure for pfn 0x12aedc at process virtual address 0x20a20000 [ 141.653370][ T8204] Memory failure: 0x12aedc: recovery action for dirty LRU page: Recovered [ 141.653375][ T8204] Injecting memory failure for pfn 0x12aedd at process virtual address 0x20a21000 [ 141.653391][ T8204] Memory failure: 0x12aedd: recovery action for dirty LRU page: Recovered [ 141.653397][ T8204] Injecting memory failure for pfn 0x12aede at process virtual address 0x20a22000 [ 141.653412][ T8204] Memory failure: 0x12aede: recovery action for dirty LRU page: Recovered [ 141.653418][ T8204] Injecting memory failure for pfn 0x12aedf at process virtual address 0x20a23000 [ 141.653434][ T8204] Memory failure: 0x12aedf: recovery action for dirty LRU page: Recovered [ 141.653440][ T8204] Injecting memory failure for pfn 0x123d00 at process virtual address 0x20a24000 [ 141.653455][ T8204] Memory failure: 0x123d00: recovery action for dirty LRU page: Recovered [ 141.653461][ T8204] Injecting memory failure for pfn 0x123d01 at process virtual address 0x20a25000 [ 141.653476][ T8204] Memory failure: 0x123d01: recovery action for dirty LRU page: Recovered [ 141.653482][ T8204] Injecting memory failure for pfn 0x123d02 at process virtual address 0x20a26000 [ 141.653498][ T8204] Memory failure: 0x123d02: recovery action for dirty LRU page: Recovered [ 141.653503][ T8204] Injecting memory failure for pfn 0x123d03 at process virtual address 0x20a27000 [ 141.653519][ T8204] Memory failure: 0x123d03: recovery action for dirty LRU page: Recovered [ 141.653525][ T8204] Injecting memory failure for pfn 0x12a40b at process virtual address 0x20a28000 [ 141.653541][ T8204] Memory failure: 0x12a40b: recovery action for dirty LRU page: Recovered [ 141.653546][ T8204] Injecting memory failure for pfn 0x12a40a at process virtual address 0x20a29000 [ 141.653562][ T8204] Memory failure: 0x12a40a: recovery action for dirty LRU page: Recovered [ 141.653568][ T8204] Injecting memory failure for pfn 0x12a409 at process virtual address 0x20a2a000 [ 141.653583][ T8204] Memory failure: 0x12a409: recovery action for dirty LRU page: Recovered [ 141.653589][ T8204] Injecting memory failure for pfn 0x12a408 at process virtual address 0x20a2b000 [ 141.653604][ T8204] Memory failure: 0x12a408: recovery action for dirty LRU page: Recovered [ 141.653610][ T8204] Injecting memory failure for pfn 0x12a407 at process virtual address 0x20a2c000 [ 141.653626][ T8204] Memory failure: 0x12a407: recovery action for dirty LRU page: Recovered [ 141.653632][ T8204] Injecting memory failure for pfn 0x12a406 at process virtual address 0x20a2d000 [ 141.653647][ T8204] Memory failure: 0x12a406: recovery action for dirty LRU page: Recovered [ 141.653653][ T8204] Injecting memory failure for pfn 0x12a405 at process virtual address 0x20a2e000 [ 141.653672][ T8204] Memory failure: 0x12a405: recovery action for dirty LRU page: Recovered [ 141.653679][ T8204] Injecting memory failure for pfn 0x12a404 at process virtual address 0x20a2f000 [ 141.653697][ T8204] Memory failure: 0x12a404: recovery action for dirty LRU page: Recovered [ 141.653704][ T8204] Injecting memory failure for pfn 0x12a403 at process virtual address 0x20a30000 [ 141.653721][ T8204] Memory failure: 0x12a403: recovery action for dirty LRU page: Recovered [ 141.653727][ T8204] Injecting memory failure for pfn 0x12a402 at process virtual address 0x20a31000 [ 141.653743][ T8204] Memory failure: 0x12a402: recovery action for dirty LRU page: Recovered [ 141.653749][ T8204] Injecting memory failure for pfn 0x12a401 at process virtual address 0x20a32000 [ 141.653764][ T8204] Memory failure: 0x12a401: recovery action for dirty LRU page: Recovered [ 141.653770][ T8204] Injecting memory failure for pfn 0x12a400 at process virtual address 0x20a33000 [ 141.653786][ T8204] Memory failure: 0x12a400: recovery action for dirty LRU page: Recovered [ 141.653791][ T8204] Injecting memory failure for pfn 0x123d1f at process virtual address 0x20a34000 [ 141.653807][ T8204] Memory failure: 0x123d1f: recovery action for dirty LRU page: Recovered [ 141.653813][ T8204] Injecting memory failure for pfn 0x123d0d at process virtual address 0x20a35000 [ 141.653828][ T8204] Memory failure: 0x123d0d: recovery action for dirty LRU page: Recovered [ 141.653834][ T8204] Injecting memory failure for pfn 0x123d0c at process virtual address 0x20a36000 [ 141.653851][ T8204] Memory failure: 0x123d0c: recovery action for dirty LRU page: Recovered [ 141.653856][ T8204] Injecting memory failure for pfn 0x123d0b at process virtual address 0x20a37000 [ 141.653872][ T8204] Memory failure: 0x123d0b: recovery action for dirty LRU page: Recovered [ 141.653877][ T8204] Injecting memory failure for pfn 0x123d09 at process virtual address 0x20a38000 [ 141.653893][ T8204] Memory failure: 0x123d09: recovery action for dirty LRU page: Recovered [ 141.653899][ T8204] Injecting memory failure for pfn 0x123d08 at process virtual address 0x20a39000 [ 141.653915][ T8204] Memory failure: 0x123d08: recovery action for dirty LRU page: Recovered [ 141.653921][ T8204] Injecting memory failure for pfn 0x123d07 at process virtual address 0x20a3a000 [ 141.653936][ T8204] Memory failure: 0x123d07: recovery action for dirty LRU page: Recovered [ 141.653942][ T8204] Injecting memory failure for pfn 0x123d06 at process virtual address 0x20a3b000 [ 141.653958][ T8204] Memory failure: 0x123d06: recovery action for dirty LRU page: Recovered [ 141.653963][ T8204] Injecting memory failure for pfn 0x123d05 at process virtual address 0x20a3c000 [ 141.653979][ T8204] Memory failure: 0x123d05: recovery action for dirty LRU page: Recovered [ 141.653985][ T8204] Injecting memory failure for pfn 0x123d04 at process virtual address 0x20a3d000 [ 141.654000][ T8204] Memory failure: 0x123d04: recovery action for dirty LRU page: Recovered [ 141.654006][ T8204] Injecting memory failure for pfn 0x12aaae at process virtual address 0x20a3e000 [ 141.654022][ T8204] Memory failure: 0x12aaae: recovery action for dirty LRU page: Recovered [ 141.654027][ T8204] Injecting memory failure for pfn 0x12aaaa at process virtual address 0x20a3f000 [ 141.654043][ T8204] Memory failure: 0x12aaaa: recovery action for dirty LRU page: Recovered [ 141.654049][ T8204] Injecting memory failure for pfn 0x12aaa9 at process virtual address 0x20a40000 [ 141.654064][ T8204] Memory failure: 0x12aaa9: recovery action for dirty LRU page: Recovered [ 141.654070][ T8204] Injecting memory failure for pfn 0x12aaa8 at process virtual address 0x20a41000 [ 141.654086][ T8204] Memory failure: 0x12aaa8: recovery action for dirty LRU page: Recovered [ 141.654092][ T8204] Injecting memory failure for pfn 0x12aaa7 at process virtual address 0x20a42000 [ 141.654107][ T8204] Memory failure: 0x12aaa7: recovery action for dirty LRU page: Recovered [ 141.654113][ T8204] Injecting memory failure for pfn 0x12aaa6 at process virtual address 0x20a43000 [ 141.654129][ T8204] Memory failure: 0x12aaa6: recovery action for dirty LRU page: Recovered [ 141.654134][ T8204] Injecting memory failure for pfn 0x12aaa5 at process virtual address 0x20a44000 [ 141.654151][ T8204] Memory failure: 0x12aaa5: recovery action for dirty LRU page: Recovered [ 141.654157][ T8204] Injecting memory failure for pfn 0x12aaa4 at process virtual address 0x20a45000 [ 141.654173][ T8204] Memory failure: 0x12aaa4: recovery action for dirty LRU page: Recovered [ 141.654178][ T8204] Injecting memory failure for pfn 0x12aaa3 at process virtual address 0x20a46000 [ 141.654194][ T8204] Memory failure: 0x12aaa3: recovery action for dirty LRU page: Recovered [ 141.654200][ T8204] Injecting memory failure for pfn 0x12aaa2 at process virtual address 0x20a47000 [ 141.654215][ T8204] Memory failure: 0x12aaa2: recovery action for dirty LRU page: Recovered [ 141.654221][ T8204] Injecting memory failure for pfn 0x12aaa1 at process virtual address 0x20a48000 [ 141.654236][ T8204] Memory failure: 0x12aaa1: recovery action for dirty LRU page: Recovered [ 141.654242][ T8204] Injecting memory failure for pfn 0x12aaa0 at process virtual address 0x20a49000 [ 141.654258][ T8204] Memory failure: 0x12aaa0: recovery action for dirty LRU page: Recovered [ 141.654264][ T8204] Injecting memory failure for pfn 0x12aa9f at process virtual address 0x20a4a000 [ 141.654280][ T8204] Memory failure: 0x12aa9f: recovery action for dirty LRU page: Recovered [ 141.654285][ T8204] Injecting memory failure for pfn 0x12aa9e at process virtual address 0x20a4b000 [ 141.654301][ T8204] Memory failure: 0x12aa9e: recovery action for dirty LRU page: Recovered [ 141.654306][ T8204] Injecting memory failure for pfn 0x12aa9d at process virtual address 0x20a4c000 [ 141.654322][ T8204] Memory failure: 0x12aa9d: recovery action for dirty LRU page: Recovered [ 141.654328][ T8204] Injecting memory failure for pfn 0x12aa9c at process virtual address 0x20a4d000 [ 141.654343][ T8204] Memory failure: 0x12aa9c: recovery action for dirty LRU page: Recovered [ 141.654349][ T8204] Injecting memory failure for pfn 0x12aa9b at process virtual address 0x20a4e000 [ 141.654365][ T8204] Memory failure: 0x12aa9b: recovery action for dirty LRU page: Recovered [ 141.654371][ T8204] Injecting memory failure for pfn 0x12aa9a at process virtual address 0x20a4f000 [ 141.654386][ T8204] Memory failure: 0x12aa9a: recovery action for dirty LRU page: Recovered [ 141.654392][ T8204] Injecting memory failure for pfn 0x12aa99 at process virtual address 0x20a50000 [ 141.654407][ T8204] Memory failure: 0x12aa99: recovery action for dirty LRU page: Recovered [ 141.654413][ T8204] Injecting memory failure for pfn 0x12aa98 at process virtual address 0x20a51000 [ 141.654429][ T8204] Memory failure: 0x12aa98: recovery action for dirty LRU page: Recovered [ 141.654435][ T8204] Injecting memory failure for pfn 0x12aa97 at process virtual address 0x20a52000 [ 141.654450][ T8204] Memory failure: 0x12aa97: recovery action for dirty LRU page: Recovered [ 141.654456][ T8204] Injecting memory failure for pfn 0x12aa96 at process virtual address 0x20a53000 [ 141.654471][ T8204] Memory failure: 0x12aa96: recovery action for dirty LRU page: Recovered [ 141.654477][ T8204] Injecting memory failure for pfn 0x12aa95 at process virtual address 0x20a54000 [ 141.654492][ T8204] Memory failure: 0x12aa95: recovery action for dirty LRU page: Recovered [ 141.654498][ T8204] Injecting memory failure for pfn 0x12aa94 at process virtual address 0x20a55000 [ 141.654514][ T8204] Memory failure: 0x12aa94: recovery action for dirty LRU page: Recovered [ 141.654519][ T8204] Injecting memory failure for pfn 0x12aa93 at process virtual address 0x20a56000 [ 141.654536][ T8204] Memory failure: 0x12aa93: recovery action for dirty LRU page: Recovered [ 141.654541][ T8204] Injecting memory failure for pfn 0x12aa92 at process virtual address 0x20a57000 [ 141.654557][ T8204] Memory failure: 0x12aa92: recovery action for dirty LRU page: Recovered [ 141.654562][ T8204] Injecting memory failure for pfn 0x12aa91 at process virtual address 0x20a58000 [ 141.654578][ T8204] Memory failure: 0x12aa91: recovery action for dirty LRU page: Recovered [ 141.654584][ T8204] Injecting memory failure for pfn 0x12aa90 at process virtual address 0x20a59000 [ 141.654599][ T8204] Memory failure: 0x12aa90: recovery action for dirty LRU page: Recovered [ 141.654605][ T8204] Injecting memory failure for pfn 0x12aa8f at process virtual address 0x20a5a000 [ 141.654621][ T8204] Memory failure: 0x12aa8f: recovery action for dirty LRU page: Recovered [ 141.654627][ T8204] Injecting memory failure for pfn 0x12aa8e at process virtual address 0x20a5b000 [ 141.654642][ T8204] Memory failure: 0x12aa8e: recovery action for dirty LRU page: Recovered [ 141.654648][ T8204] Injecting memory failure for pfn 0x12aa8d at process virtual address 0x20a5c000 [ 141.654665][ T8204] Memory failure: 0x12aa8d: recovery action for dirty LRU page: Recovered [ 141.654671][ T8204] Injecting memory failure for pfn 0x12aa8c at process virtual address 0x20a5d000 [ 141.654687][ T8204] Memory failure: 0x12aa8c: recovery action for dirty LRU page: Recovered [ 141.654693][ T8204] Injecting memory failure for pfn 0x12aa8b at process virtual address 0x20a5e000 [ 141.654708][ T8204] Memory failure: 0x12aa8b: recovery action for dirty LRU page: Recovered [ 141.654714][ T8204] Injecting memory failure for pfn 0x12aa8a at process virtual address 0x20a5f000 [ 141.654730][ T8204] Memory failure: 0x12aa8a: recovery action for dirty LRU page: Recovered [ 141.654735][ T8204] Injecting memory failure for pfn 0x12aa89 at process virtual address 0x20a60000 [ 141.654751][ T8204] Memory failure: 0x12aa89: recovery action for dirty LRU page: Recovered [ 141.654757][ T8204] Injecting memory failure for pfn 0x12aa88 at process virtual address 0x20a61000 [ 141.654773][ T8204] Memory failure: 0x12aa88: recovery action for dirty LRU page: Recovered [ 141.654779][ T8204] Injecting memory failure for pfn 0x12aa87 at process virtual address 0x20a62000 [ 141.654795][ T8204] Memory failure: 0x12aa87: recovery action for dirty LRU page: Recovered [ 141.654801][ T8204] Injecting memory failure for pfn 0x12aa86 at process virtual address 0x20a63000 [ 141.654816][ T8204] Memory failure: 0x12aa86: recovery action for dirty LRU page: Recovered [ 141.654822][ T8204] Injecting memory failure for pfn 0x12aa85 at process virtual address 0x20a64000 [ 141.654838][ T8204] Memory failure: 0x12aa85: recovery action for dirty LRU page: Recovered [ 141.654843][ T8204] Injecting memory failure for pfn 0x12aa84 at process virtual address 0x20a65000 [ 141.654859][ T8204] Memory failure: 0x12aa84: recovery action for dirty LRU page: Recovered [ 141.654865][ T8204] Injecting memory failure for pfn 0x12aa83 at process virtual address 0x20a66000 [ 141.654880][ T8204] Memory failure: 0x12aa83: recovery action for dirty LRU page: Recovered [ 141.654886][ T8204] Injecting memory failure for pfn 0x12aa82 at process virtual address 0x20a67000 [ 141.654902][ T8204] Memory failure: 0x12aa82: recovery action for dirty LRU page: Recovered [ 141.654907][ T8204] Injecting memory failure for pfn 0x12aa81 at process virtual address 0x20a68000 [ 141.654923][ T8204] Memory failure: 0x12aa81: recovery action for dirty LRU page: Recovered [ 141.654929][ T8204] Injecting memory failure for pfn 0x12aa80 at process virtual address 0x20a69000 [ 141.654945][ T8204] Memory failure: 0x12aa80: recovery action for dirty LRU page: Recovered [ 141.654950][ T8204] Injecting memory failure for pfn 0x1274ff at process virtual address 0x20a6a000 [ 141.654966][ T8204] Memory failure: 0x1274ff: recovery action for dirty LRU page: Recovered [ 141.654972][ T8204] Injecting memory failure for pfn 0x1274fe at process virtual address 0x20a6b000 [ 141.654988][ T8204] Memory failure: 0x1274fe: recovery action for dirty LRU page: Recovered [ 141.654994][ T8204] Injecting memory failure for pfn 0x1274fd at process virtual address 0x20a6c000 [ 141.655009][ T8204] Memory failure: 0x1274fd: recovery action for dirty LRU page: Recovered [ 141.655015][ T8204] Injecting memory failure for pfn 0x1274fc at process virtual address 0x20a6d000 [ 141.655030][ T8204] Memory failure: 0x1274fc: recovery action for dirty LRU page: Recovered [ 141.655036][ T8204] Injecting memory failure for pfn 0x1274fb at process virtual address 0x20a6e000 [ 141.655051][ T8204] Memory failure: 0x1274fb: recovery action for dirty LRU page: Recovered [ 141.655057][ T8204] Injecting memory failure for pfn 0x1274fa at process virtual address 0x20a6f000 [ 141.655073][ T8204] Memory failure: 0x1274fa: recovery action for dirty LRU page: Recovered [ 141.655079][ T8204] Injecting memory failure for pfn 0x1274f9 at process virtual address 0x20a70000 [ 141.655094][ T8204] Memory failure: 0x1274f9: recovery action for dirty LRU page: Recovered [ 141.655100][ T8204] Injecting memory failure for pfn 0x1274f8 at process virtual address 0x20a71000 [ 141.655115][ T8204] Memory failure: 0x1274f8: recovery action for dirty LRU page: Recovered [ 141.655121][ T8204] Injecting memory failure for pfn 0x1274f7 at process virtual address 0x20a72000 [ 141.655136][ T8204] Memory failure: 0x1274f7: recovery action for dirty LRU page: Recovered [ 141.655142][ T8204] Injecting memory failure for pfn 0x1274f6 at process virtual address 0x20a73000 [ 141.655158][ T8204] Memory failure: 0x1274f6: recovery action for dirty LRU page: Recovered [ 141.655163][ T8204] Injecting memory failure for pfn 0x1274f5 at process virtual address 0x20a74000 [ 141.655179][ T8204] Memory failure: 0x1274f5: recovery action for dirty LRU page: Recovered [ 141.655185][ T8204] Injecting memory failure for pfn 0x1274f4 at process virtual address 0x20a75000 [ 141.655200][ T8204] Memory failure: 0x1274f4: recovery action for dirty LRU page: Recovered [ 141.655206][ T8204] Injecting memory failure for pfn 0x1274f3 at process virtual address 0x20a76000 [ 141.655222][ T8204] Memory failure: 0x1274f3: recovery action for dirty LRU page: Recovered [ 141.655228][ T8204] Injecting memory failure for pfn 0x1274f2 at process virtual address 0x20a77000 [ 141.655244][ T8204] Memory failure: 0x1274f2: recovery action for dirty LRU page: Recovered [ 141.655249][ T8204] Injecting memory failure for pfn 0x1274f1 at process virtual address 0x20a78000 [ 141.655265][ T8204] Memory failure: 0x1274f1: recovery action for dirty LRU page: Recovered [ 141.655271][ T8204] Injecting memory failure for pfn 0x1274f0 at process virtual address 0x20a79000 [ 141.655286][ T8204] Memory failure: 0x1274f0: recovery action for dirty LRU page: Recovered [ 141.655292][ T8204] Injecting memory failure for pfn 0x1274ef at process virtual address 0x20a7a000 [ 141.655307][ T8204] Memory failure: 0x1274ef: recovery action for dirty LRU page: Recovered [ 141.655313][ T8204] Injecting memory failure for pfn 0x1274ee at process virtual address 0x20a7b000 [ 141.655328][ T8204] Memory failure: 0x1274ee: recovery action for dirty LRU page: Recovered [ 141.655334][ T8204] Injecting memory failure for pfn 0x1274ed at process virtual address 0x20a7c000 [ 141.655350][ T8204] Memory failure: 0x1274ed: recovery action for dirty LRU page: Recovered [ 141.655355][ T8204] Injecting memory failure for pfn 0x1274ec at process virtual address 0x20a7d000 [ 141.655371][ T8204] Memory failure: 0x1274ec: recovery action for dirty LRU page: Recovered [ 141.655377][ T8204] Injecting memory failure for pfn 0x1274eb at process virtual address 0x20a7e000 [ 141.655392][ T8204] Memory failure: 0x1274eb: recovery action for dirty LRU page: Recovered [ 141.655398][ T8204] Injecting memory failure for pfn 0x1274ea at process virtual address 0x20a7f000 [ 141.655413][ T8204] Memory failure: 0x1274ea: recovery action for dirty LRU page: Recovered [ 141.655419][ T8204] Injecting memory failure for pfn 0x1274e9 at process virtual address 0x20a80000 [ 141.655434][ T8204] Memory failure: 0x1274e9: recovery action for dirty LRU page: Recovered [ 141.655440][ T8204] Injecting memory failure for pfn 0x1274e8 at process virtual address 0x20a81000 [ 141.655455][ T8204] Memory failure: 0x1274e8: recovery action for dirty LRU page: Recovered [ 141.655461][ T8204] Injecting memory failure for pfn 0x1274e7 at process virtual address 0x20a82000 [ 141.655477][ T8204] Memory failure: 0x1274e7: recovery action for dirty LRU page: Recovered [ 141.655482][ T8204] Injecting memory failure for pfn 0x1274e6 at process virtual address 0x20a83000 [ 141.655498][ T8204] Memory failure: 0x1274e6: recovery action for dirty LRU page: Recovered [ 141.655503][ T8204] Injecting memory failure for pfn 0x1274e5 at process virtual address 0x20a84000 [ 141.655519][ T8204] Memory failure: 0x1274e5: recovery action for dirty LRU page: Recovered [ 141.655525][ T8204] Injecting memory failure for pfn 0x1274e4 at process virtual address 0x20a85000 [ 141.655541][ T8204] Memory failure: 0x1274e4: recovery action for dirty LRU page: Recovered [ 141.655546][ T8204] Injecting memory failure for pfn 0x1274e3 at process virtual address 0x20a86000 [ 141.655562][ T8204] Memory failure: 0x1274e3: recovery action for dirty LRU page: Recovered [ 141.655567][ T8204] Injecting memory failure for pfn 0x1274e2 at process virtual address 0x20a87000 [ 141.655583][ T8204] Memory failure: 0x1274e2: recovery action for dirty LRU page: Recovered [ 141.655589][ T8204] Injecting memory failure for pfn 0x1274e1 at process virtual address 0x20a88000 [ 141.655605][ T8204] Memory failure: 0x1274e1: recovery action for dirty LRU page: Recovered [ 141.655611][ T8204] Injecting memory failure for pfn 0x1274e0 at process virtual address 0x20a89000 [ 141.655626][ T8204] Memory failure: 0x1274e0: recovery action for dirty LRU page: Recovered [ 141.655632][ T8204] Injecting memory failure for pfn 0x1274df at process virtual address 0x20a8a000 [ 141.655647][ T8204] Memory failure: 0x1274df: recovery action for dirty LRU page: Recovered [ 141.655653][ T8204] Injecting memory failure for pfn 0x1274de at process virtual address 0x20a8b000 [ 141.655671][ T8204] Memory failure: 0x1274de: recovery action for dirty LRU page: Recovered [ 141.655676][ T8204] Injecting memory failure for pfn 0x1274dd at process virtual address 0x20a8c000 [ 141.655692][ T8204] Memory failure: 0x1274dd: recovery action for dirty LRU page: Recovered [ 141.655698][ T8204] Injecting memory failure for pfn 0x1274dc at process virtual address 0x20a8d000 [ 141.655714][ T8204] Memory failure: 0x1274dc: recovery action for dirty LRU page: Recovered [ 141.655719][ T8204] Injecting memory failure for pfn 0x1274db at process virtual address 0x20a8e000 [ 141.655735][ T8204] Memory failure: 0x1274db: recovery action for dirty LRU page: Recovered [ 141.655741][ T8204] Injecting memory failure for pfn 0x1274da at process virtual address 0x20a8f000 [ 141.655756][ T8204] Memory failure: 0x1274da: recovery action for dirty LRU page: Recovered [ 141.655762][ T8204] Injecting memory failure for pfn 0x1274d9 at process virtual address 0x20a90000 [ 141.655778][ T8204] Memory failure: 0x1274d9: recovery action for dirty LRU page: Recovered [ 141.655783][ T8204] Injecting memory failure for pfn 0x1274d8 at process virtual address 0x20a91000 [ 141.655800][ T8204] Memory failure: 0x1274d8: recovery action for dirty LRU page: Recovered [ 141.655805][ T8204] Injecting memory failure for pfn 0x1274d7 at process virtual address 0x20a92000 [ 141.655821][ T8204] Memory failure: 0x1274d7: recovery action for dirty LRU page: Recovered [ 141.655827][ T8204] Injecting memory failure for pfn 0x1274d6 at process virtual address 0x20a93000 [ 141.655843][ T8204] Memory failure: 0x1274d6: recovery action for dirty LRU page: Recovered [ 141.655848][ T8204] Injecting memory failure for pfn 0x1274d5 at process virtual address 0x20a94000 [ 141.655864][ T8204] Memory failure: 0x1274d5: recovery action for dirty LRU page: Recovered [ 141.655870][ T8204] Injecting memory failure for pfn 0x1274d4 at process virtual address 0x20a95000 [ 141.655886][ T8204] Memory failure: 0x1274d4: recovery action for dirty LRU page: Recovered [ 141.655891][ T8204] Injecting memory failure for pfn 0x1274d3 at process virtual address 0x20a96000 [ 141.655907][ T8204] Memory failure: 0x1274d3: recovery action for dirty LRU page: Recovered [ 141.655913][ T8204] Injecting memory failure for pfn 0x1274d2 at process virtual address 0x20a97000 [ 141.655929][ T8204] Memory failure: 0x1274d2: recovery action for dirty LRU page: Recovered [ 141.655934][ T8204] Injecting memory failure for pfn 0x1274d1 at process virtual address 0x20a98000 [ 141.655950][ T8204] Memory failure: 0x1274d1: recovery action for dirty LRU page: Recovered [ 141.655956][ T8204] Injecting memory failure for pfn 0x1274d0 at process virtual address 0x20a99000 [ 141.655972][ T8204] Memory failure: 0x1274d0: recovery action for dirty LRU page: Recovered [ 141.655978][ T8204] Injecting memory failure for pfn 0x1274cf at process virtual address 0x20a9a000 [ 141.655993][ T8204] Memory failure: 0x1274cf: recovery action for dirty LRU page: Recovered [ 141.655999][ T8204] Injecting memory failure for pfn 0x1274ce at process virtual address 0x20a9b000 [ 141.656015][ T8204] Memory failure: 0x1274ce: recovery action for dirty LRU page: Recovered [ 141.656020][ T8204] Injecting memory failure for pfn 0x1274cd at process virtual address 0x20a9c000 [ 141.656036][ T8204] Memory failure: 0x1274cd: recovery action for dirty LRU page: Recovered [ 141.656042][ T8204] Injecting memory failure for pfn 0x1274cc at process virtual address 0x20a9d000 [ 141.656057][ T8204] Memory failure: 0x1274cc: recovery action for dirty LRU page: Recovered [ 141.656063][ T8204] Injecting memory failure for pfn 0x1274cb at process virtual address 0x20a9e000 [ 141.656078][ T8204] Memory failure: 0x1274cb: recovery action for dirty LRU page: Recovered [ 141.656084][ T8204] Injecting memory failure for pfn 0x1274ca at process virtual address 0x20a9f000 [ 141.656100][ T8204] Memory failure: 0x1274ca: recovery action for dirty LRU page: Recovered [ 141.656106][ T8204] Injecting memory failure for pfn 0x1274c9 at process virtual address 0x20aa0000 [ 141.656121][ T8204] Memory failure: 0x1274c9: recovery action for dirty LRU page: Recovered [ 141.656127][ T8204] Injecting memory failure for pfn 0x1274c8 at process virtual address 0x20aa1000 [ 141.656143][ T8204] Memory failure: 0x1274c8: recovery action for dirty LRU page: Recovered [ 141.656149][ T8204] Injecting memory failure for pfn 0x1274c7 at process virtual address 0x20aa2000 [ 141.656166][ T8204] Memory failure: 0x1274c7: recovery action for dirty LRU page: Recovered [ 141.656172][ T8204] Injecting memory failure for pfn 0x1274c6 at process virtual address 0x20aa3000 [ 141.656190][ T8204] Memory failure: 0x1274c6: recovery action for dirty LRU page: Recovered [ 141.656196][ T8204] Injecting memory failure for pfn 0x1274c5 at process virtual address 0x20aa4000 [ 141.656211][ T8204] Memory failure: 0x1274c5: recovery action for dirty LRU page: Recovered [ 141.656217][ T8204] Injecting memory failure for pfn 0x1274c4 at process virtual address 0x20aa5000 [ 141.656233][ T8204] Memory failure: 0x1274c4: recovery action for dirty LRU page: Recovered [ 141.656239][ T8204] Injecting memory failure for pfn 0x1274c3 at process virtual address 0x20aa6000 [ 141.656255][ T8204] Memory failure: 0x1274c3: recovery action for dirty LRU page: Recovered [ 141.656260][ T8204] Injecting memory failure for pfn 0x1274c2 at process virtual address 0x20aa7000 [ 141.656276][ T8204] Memory failure: 0x1274c2: recovery action for dirty LRU page: Recovered [ 141.656282][ T8204] Injecting memory failure for pfn 0x1274c1 at process virtual address 0x20aa8000 [ 141.656297][ T8204] Memory failure: 0x1274c1: recovery action for dirty LRU page: Recovered [ 141.656303][ T8204] Injecting memory failure for pfn 0x1274c0 at process virtual address 0x20aa9000 [ 141.656319][ T8204] Memory failure: 0x1274c0: recovery action for dirty LRU page: Recovered [ 141.656324][ T8204] Injecting memory failure for pfn 0x1274bf at process virtual address 0x20aaa000 [ 141.656340][ T8204] Memory failure: 0x1274bf: recovery action for dirty LRU page: Recovered [ 141.656346][ T8204] Injecting memory failure for pfn 0x1274be at process virtual address 0x20aab000 [ 141.656362][ T8204] Memory failure: 0x1274be: recovery action for dirty LRU page: Recovered [ 141.656367][ T8204] Injecting memory failure for pfn 0x1274bd at process virtual address 0x20aac000 [ 141.656383][ T8204] Memory failure: 0x1274bd: recovery action for dirty LRU page: Recovered [ 141.656388][ T8204] Injecting memory failure for pfn 0x1274bc at process virtual address 0x20aad000 [ 141.656404][ T8204] Memory failure: 0x1274bc: recovery action for dirty LRU page: Recovered [ 141.656410][ T8204] Injecting memory failure for pfn 0x1274bb at process virtual address 0x20aae000 [ 141.656425][ T8204] Memory failure: 0x1274bb: recovery action for dirty LRU page: Recovered [ 141.656431][ T8204] Injecting memory failure for pfn 0x1274ba at process virtual address 0x20aaf000 [ 141.656446][ T8204] Memory failure: 0x1274ba: recovery action for dirty LRU page: Recovered [ 141.656452][ T8204] Injecting memory failure for pfn 0x1274b9 at process virtual address 0x20ab0000 [ 141.656468][ T8204] Memory failure: 0x1274b9: recovery action for dirty LRU page: Recovered [ 141.656474][ T8204] Injecting memory failure for pfn 0x1274b8 at process virtual address 0x20ab1000 [ 141.656489][ T8204] Memory failure: 0x1274b8: recovery action for dirty LRU page: Recovered [ 141.656494][ T8204] Injecting memory failure for pfn 0x1274b7 at process virtual address 0x20ab2000 [ 141.656510][ T8204] Memory failure: 0x1274b7: recovery action for dirty LRU page: Recovered [ 141.656516][ T8204] Injecting memory failure for pfn 0x1274a0 at process virtual address 0x20ab3000 [ 141.656531][ T8204] Memory failure: 0x1274a0: recovery action for dirty LRU page: Recovered [ 141.656537][ T8204] Injecting memory failure for pfn 0x1274a1 at process virtual address 0x20ab4000 [ 141.656553][ T8204] Memory failure: 0x1274a1: recovery action for dirty LRU page: Recovered [ 141.656558][ T8204] Injecting memory failure for pfn 0x1274a2 at process virtual address 0x20ab5000 [ 141.656574][ T8204] Memory failure: 0x1274a2: recovery action for dirty LRU page: Recovered [ 141.656580][ T8204] Injecting memory failure for pfn 0x1274a3 at process virtual address 0x20ab6000 [ 141.656598][ T8204] Memory failure: 0x1274a3: recovery action for dirty LRU page: Recovered [ 141.656604][ T8204] Injecting memory failure for pfn 0x1274a4 at process virtual address 0x20ab7000 [ 141.656620][ T8204] Memory failure: 0x1274a4: recovery action for dirty LRU page: Recovered [ 141.656626][ T8204] Injecting memory failure for pfn 0x1274a5 at process virtual address 0x20ab8000 [ 141.656641][ T8204] Memory failure: 0x1274a5: recovery action for dirty LRU page: Recovered [ 141.656647][ T8204] Injecting memory failure for pfn 0x1274a6 at process virtual address 0x20ab9000 [ 141.656664][ T8204] Memory failure: 0x1274a6: recovery action for dirty LRU page: Recovered [ 141.656670][ T8204] Injecting memory failure for pfn 0x152761 at process virtual address 0x20aba000 [ 141.656686][ T8204] Memory failure: 0x152761: recovery action for dirty LRU page: Recovered [ 141.656692][ T8204] Injecting memory failure for pfn 0x15e53a at process virtual address 0x20abb000 [ 141.656707][ T8204] Memory failure: 0x15e53a: recovery action for dirty LRU page: Recovered [ 141.656713][ T8204] Injecting memory failure for pfn 0x15e53b at process virtual address 0x20abc000 [ 141.656728][ T8204] Memory failure: 0x15e53b: recovery action for dirty LRU page: Recovered [ 141.656734][ T8204] Injecting memory failure for pfn 0x15e510 at process virtual address 0x20abd000 [ 141.656750][ T8204] Memory failure: 0x15e510: recovery action for dirty LRU page: Recovered [ 141.656755][ T8204] Injecting memory failure for pfn 0x15e511 at process virtual address 0x20abe000 [ 141.656771][ T8204] Memory failure: 0x15e511: recovery action for dirty LRU page: Recovered [ 141.656777][ T8204] Injecting memory failure for pfn 0x15e50c at process virtual address 0x20abf000 [ 141.656792][ T8204] Memory failure: 0x15e50c: recovery action for dirty LRU page: Recovered [ 141.656798][ T8204] Injecting memory failure for pfn 0x15e50d at process virtual address 0x20ac0000 [ 141.656814][ T8204] Memory failure: 0x15e50d: recovery action for dirty LRU page: Recovered [ 141.656820][ T8204] Injecting memory failure for pfn 0x1243b0 at process virtual address 0x20ac1000 [ 141.656835][ T8204] Memory failure: 0x1243b0: recovery action for dirty LRU page: Recovered [ 141.656841][ T8204] Injecting memory failure for pfn 0x1243b1 at process virtual address 0x20ac2000 [ 141.656857][ T8204] Memory failure: 0x1243b1: recovery action for dirty LRU page: Recovered [ 141.656862][ T8204] Injecting memory failure for pfn 0x124d9c at process virtual address 0x20ac3000 [ 141.656878][ T8204] Memory failure: 0x124d9c: recovery action for dirty LRU page: Recovered [ 141.656884][ T8204] Injecting memory failure for pfn 0x124d9d at process virtual address 0x20ac4000 [ 141.656899][ T8204] Memory failure: 0x124d9d: recovery action for dirty LRU page: Recovered [ 141.656905][ T8204] Injecting memory failure for pfn 0x15d840 at process virtual address 0x20ac5000 [ 141.656921][ T8204] Memory failure: 0x15d840: recovery action for dirty LRU page: Recovered [ 141.656927][ T8204] Injecting memory failure for pfn 0x15d841 at process virtual address 0x20ac6000 [ 141.656943][ T8204] Memory failure: 0x15d841: recovery action for dirty LRU page: Recovered [ 141.656949][ T8204] Injecting memory failure for pfn 0x15253a at process virtual address 0x20ac7000 [ 141.656964][ T8204] Memory failure: 0x15253a: recovery action for dirty LRU page: Recovered [ 141.656970][ T8204] Injecting memory failure for pfn 0x15253b at process virtual address 0x20ac8000 [ 141.656986][ T8204] Memory failure: 0x15253b: recovery action for dirty LRU page: Recovered [ 141.656992][ T8204] Injecting memory failure for pfn 0x127a42 at process virtual address 0x20ac9000 [ 141.657008][ T8204] Memory failure: 0x127a42: recovery action for dirty LRU page: Recovered [ 141.657014][ T8204] Injecting memory failure for pfn 0x127a43 at process virtual address 0x20aca000 [ 141.657029][ T8204] Memory failure: 0x127a43: recovery action for dirty LRU page: Recovered [ 141.657035][ T8204] Injecting memory failure for pfn 0x15e0d2 at process virtual address 0x20acb000 [ 141.657051][ T8204] Memory failure: 0x15e0d2: recovery action for dirty LRU page: Recovered [ 141.657056][ T8204] Injecting memory failure for pfn 0x15e0d3 at process virtual address 0x20acc000 [ 141.657072][ T8204] Memory failure: 0x15e0d3: recovery action for dirty LRU page: Recovered [ 141.657078][ T8204] Injecting memory failure for pfn 0x15d934 at process virtual address 0x20acd000 [ 141.657094][ T8204] Memory failure: 0x15d934: recovery action for dirty LRU page: Recovered [ 141.657100][ T8204] Injecting memory failure for pfn 0x15d935 at process virtual address 0x20ace000 [ 141.657115][ T8204] Memory failure: 0x15d935: recovery action for dirty LRU page: Recovered [ 141.657121][ T8204] Injecting memory failure for pfn 0x12b346 at process virtual address 0x20acf000 [ 141.657137][ T8204] Memory failure: 0x12b346: recovery action for dirty LRU page: Recovered [ 141.657142][ T8204] Injecting memory failure for pfn 0x12b347 at process virtual address 0x20ad0000 [ 141.657158][ T8204] Memory failure: 0x12b347: recovery action for dirty LRU page: Recovered [ 141.657164][ T8204] Injecting memory failure for pfn 0x12b350 at process virtual address 0x20ad1000 [ 141.657180][ T8204] Memory failure: 0x12b350: recovery action for dirty LRU page: Recovered [ 141.657185][ T8204] Injecting memory failure for pfn 0x12b351 at process virtual address 0x20ad2000 [ 141.657201][ T8204] Memory failure: 0x12b351: recovery action for dirty LRU page: Recovered [ 141.657207][ T8204] Injecting memory failure for pfn 0x125590 at process virtual address 0x20ad3000 [ 141.657222][ T8204] Memory failure: 0x125590: recovery action for dirty LRU page: Recovered [ 141.657228][ T8204] Injecting memory failure for pfn 0x125591 at process virtual address 0x20ad4000 [ 141.657244][ T8204] Memory failure: 0x125591: recovery action for dirty LRU page: Recovered [ 141.657250][ T8204] Injecting memory failure for pfn 0x124ede at process virtual address 0x20ad5000 [ 141.657265][ T8204] Memory failure: 0x124ede: recovery action for dirty LRU page: Recovered [ 141.657271][ T8204] Injecting memory failure for pfn 0x124edf at process virtual address 0x20ad6000 [ 141.657287][ T8204] Memory failure: 0x124edf: recovery action for dirty LRU page: Recovered [ 141.657293][ T8204] Injecting memory failure for pfn 0x15ec02 at process virtual address 0x20ad7000 [ 141.657308][ T8204] Memory failure: 0x15ec02: recovery action for dirty LRU page: Recovered [ 141.657314][ T8204] Injecting memory failure for pfn 0x15ec03 at process virtual address 0x20ad8000 [ 141.657330][ T8204] Memory failure: 0x15ec03: recovery action for dirty LRU page: Recovered [ 141.657336][ T8204] Injecting memory failure for pfn 0x1221fe at process virtual address 0x20ad9000 [ 141.657351][ T8204] Memory failure: 0x1221fe: recovery action for dirty LRU page: Recovered [ 141.657357][ T8204] Injecting memory failure for pfn 0x1221ff at process virtual address 0x20ada000 [ 141.657373][ T8204] Memory failure: 0x1221ff: recovery action for dirty LRU page: Recovered [ 141.657378][ T8204] Injecting memory failure for pfn 0x15d862 at process virtual address 0x20adb000 [ 141.657394][ T8204] Memory failure: 0x15d862: recovery action for dirty LRU page: Recovered [ 141.657399][ T8204] Injecting memory failure for pfn 0x15d863 at process virtual address 0x20adc000 [ 141.657415][ T8204] Memory failure: 0x15d863: recovery action for dirty LRU page: Recovered [ 141.657421][ T8204] Injecting memory failure for pfn 0x160096 at process virtual address 0x20add000 [ 141.657437][ T8204] Memory failure: 0x160096: recovery action for dirty LRU page: Recovered [ 141.657443][ T8204] Injecting memory failure for pfn 0x160097 at process virtual address 0x20ade000 [ 141.657459][ T8204] Memory failure: 0x160097: recovery action for dirty LRU page: Recovered [ 141.657465][ T8204] Injecting memory failure for pfn 0x12b080 at process virtual address 0x20adf000 [ 141.657480][ T8204] Memory failure: 0x12b080: recovery action for dirty LRU page: Recovered [ 141.657486][ T8204] Injecting memory failure for pfn 0x12b081 at process virtual address 0x20ae0000 [ 141.657502][ T8204] Memory failure: 0x12b081: recovery action for dirty LRU page: Recovered [ 141.657507][ T8204] Injecting memory failure for pfn 0x121f22 at process virtual address 0x20ae1000 [ 141.657523][ T8204] Memory failure: 0x121f22: recovery action for dirty LRU page: Recovered [ 141.657529][ T8204] Injecting memory failure for pfn 0x121f23 at process virtual address 0x20ae2000 [ 141.657544][ T8204] Memory failure: 0x121f23: recovery action for dirty LRU page: Recovered [ 141.657550][ T8204] Injecting memory failure for pfn 0x121f2c at process virtual address 0x20ae3000 [ 141.657565][ T8204] Memory failure: 0x121f2c: recovery action for dirty LRU page: Recovered [ 141.657571][ T8204] Injecting memory failure for pfn 0x121f2d at process virtual address 0x20ae4000 [ 141.657587][ T8204] Memory failure: 0x121f2d: recovery action for dirty LRU page: Recovered [ 141.657593][ T8204] Injecting memory failure for pfn 0x121f24 at process virtual address 0x20ae5000 [ 141.657608][ T8204] Memory failure: 0x121f24: recovery action for dirty LRU page: Recovered [ 141.657614][ T8204] Injecting memory failure for pfn 0x121f25 at process virtual address 0x20ae6000 [ 141.657629][ T8204] Memory failure: 0x121f25: recovery action for dirty LRU page: Recovered [ 141.657635][ T8204] Injecting memory failure for pfn 0x121f30 at process virtual address 0x20ae7000 [ 141.657651][ T8204] Memory failure: 0x121f30: recovery action for dirty LRU page: Recovered [ 141.657659][ T8204] Injecting memory failure for pfn 0x121f31 at process virtual address 0x20ae8000 [ 141.657675][ T8204] Memory failure: 0x121f31: recovery action for dirty LRU page: Recovered [ 141.657681][ T8204] Injecting memory failure for pfn 0x15f0e6 at process virtual address 0x20ae9000 [ 141.657697][ T8204] Memory failure: 0x15f0e6: recovery action for dirty LRU page: Recovered [ 141.657703][ T8204] Injecting memory failure for pfn 0x15f0e7 at process virtual address 0x20aea000 [ 141.657718][ T8204] Memory failure: 0x15f0e7: recovery action for dirty LRU page: Recovered [ 141.657724][ T8204] Injecting memory failure for pfn 0x1271a4 at process virtual address 0x20aeb000 [ 141.657740][ T8204] Memory failure: 0x1271a4: recovery action for dirty LRU page: Recovered [ 141.657746][ T8204] Injecting memory failure for pfn 0x1271a5 at process virtual address 0x20aec000 [ 141.657761][ T8204] Memory failure: 0x1271a5: recovery action for dirty LRU page: Recovered [ 141.657767][ T8204] Injecting memory failure for pfn 0x128206 at process virtual address 0x20aed000 [ 141.657782][ T8204] Memory failure: 0x128206: recovery action for dirty LRU page: Recovered [ 141.657788][ T8204] Injecting memory failure for pfn 0x128207 at process virtual address 0x20aee000 [ 141.657804][ T8204] Memory failure: 0x128207: recovery action for dirty LRU page: Recovered [ 141.657809][ T8204] Injecting memory failure for pfn 0x124850 at process virtual address 0x20aef000 [ 141.657825][ T8204] Memory failure: 0x124850: recovery action for dirty LRU page: Recovered [ 141.657831][ T8204] Injecting memory failure for pfn 0x124851 at process virtual address 0x20af0000 [ 141.657847][ T8204] Memory failure: 0x124851: recovery action for dirty LRU page: Recovered [ 141.657852][ T8204] Injecting memory failure for pfn 0x121f2a at process virtual address 0x20af1000 [ 141.657868][ T8204] Memory failure: 0x121f2a: recovery action for dirty LRU page: Recovered [ 141.657874][ T8204] Injecting memory failure for pfn 0x121f2b at process virtual address 0x20af2000 [ 141.657889][ T8204] Memory failure: 0x121f2b: recovery action for dirty LRU page: Recovered [ 141.657895][ T8204] Injecting memory failure for pfn 0x1271a0 at process virtual address 0x20af3000 [ 141.657911][ T8204] Memory failure: 0x1271a0: recovery action for dirty LRU page: Recovered [ 141.657917][ T8204] Injecting memory failure for pfn 0x1271a1 at process virtual address 0x20af4000 [ 141.657932][ T8204] Memory failure: 0x1271a1: recovery action for dirty LRU page: Recovered [ 141.657938][ T8204] Injecting memory failure for pfn 0x126dd2 at process virtual address 0x20af5000 [ 141.657954][ T8204] Memory failure: 0x126dd2: recovery action for dirty LRU page: Recovered [ 141.657960][ T8204] Injecting memory failure for pfn 0x126dd3 at process virtual address 0x20af6000 [ 141.657976][ T8204] Memory failure: 0x126dd3: recovery action for dirty LRU page: Recovered [ 141.657982][ T8204] Injecting memory failure for pfn 0x127a8e at process virtual address 0x20af7000 [ 141.657998][ T8204] Memory failure: 0x127a8e: recovery action for dirty LRU page: Recovered [ 141.658003][ T8204] Injecting memory failure for pfn 0x127a8f at process virtual address 0x20af8000 [ 141.658019][ T8204] Memory failure: 0x127a8f: recovery action for dirty LRU page: Recovered [ 141.658025][ T8204] Injecting memory failure for pfn 0x1244ee at process virtual address 0x20af9000 [ 141.658040][ T8204] Memory failure: 0x1244ee: recovery action for dirty LRU page: Recovered [ 141.658046][ T8204] Injecting memory failure for pfn 0x1244ef at process virtual address 0x20afa000 [ 141.658061][ T8204] Memory failure: 0x1244ef: recovery action for dirty LRU page: Recovered [ 141.658067][ T8204] Injecting memory failure for pfn 0x1244e6 at process virtual address 0x20afb000 [ 141.658083][ T8204] Memory failure: 0x1244e6: recovery action for dirty LRU page: Recovered [ 141.658088][ T8204] Injecting memory failure for pfn 0x1244e7 at process virtual address 0x20afc000 [ 141.658106][ T8204] Memory failure: 0x1244e7: recovery action for dirty LRU page: Recovered [ 141.658112][ T8204] Injecting memory failure for pfn 0x12a9a6 at process virtual address 0x20afd000 [ 141.658128][ T8204] Memory failure: 0x12a9a6: recovery action for dirty LRU page: Recovered [ 141.658134][ T8204] Injecting memory failure for pfn 0x12a9a7 at process virtual address 0x20afe000 [ 141.658149][ T8204] Memory failure: 0x12a9a7: recovery action for dirty LRU page: Recovered [ 141.658155][ T8204] Injecting memory failure for pfn 0x12218a at process virtual address 0x20aff000 [ 141.658171][ T8204] Memory failure: 0x12218a: recovery action for dirty LRU page: Recovered [ 141.658177][ T8204] Injecting memory failure for pfn 0x12218b at process virtual address 0x20b00000 [ 141.658192][ T8204] Memory failure: 0x12218b: recovery action for dirty LRU page: Recovered [ 141.658198][ T8204] Injecting memory failure for pfn 0x127738 at process virtual address 0x20b01000 [ 141.658213][ T8204] Memory failure: 0x127738: recovery action for dirty LRU page: Recovered [ 141.658219][ T8204] Injecting memory failure for pfn 0x127739 at process virtual address 0x20b02000 [ 141.658235][ T8204] Memory failure: 0x127739: recovery action for dirty LRU page: Recovered [ 141.658241][ T8204] Injecting memory failure for pfn 0x125964 at process virtual address 0x20b03000 [ 141.658256][ T8204] Memory failure: 0x125964: recovery action for dirty LRU page: Recovered [ 141.658262][ T8204] Injecting memory failure for pfn 0x125965 at process virtual address 0x20b04000 [ 141.658278][ T8204] Memory failure: 0x125965: recovery action for dirty LRU page: Recovered [ 141.658283][ T8204] Injecting memory failure for pfn 0x15d27e at process virtual address 0x20b05000 [ 141.658299][ T8204] Memory failure: 0x15d27e: recovery action for dirty LRU page: Recovered [ 141.658305][ T8204] Injecting memory failure for pfn 0x15d27f at process virtual address 0x20b06000 [ 141.658320][ T8204] Memory failure: 0x15d27f: recovery action for dirty LRU page: Recovered [ 141.658326][ T8204] Injecting memory failure for pfn 0x123f62 at process virtual address 0x20b07000 [ 141.658342][ T8204] Memory failure: 0x123f62: recovery action for dirty LRU page: Recovered [ 141.658347][ T8204] Injecting memory failure for pfn 0x123f63 at process virtual address 0x20b08000 [ 141.658364][ T8204] Memory failure: 0x123f63: recovery action for dirty LRU page: Recovered [ 141.658370][ T8204] Injecting memory failure for pfn 0x123f5c at process virtual address 0x20b09000 [ 141.658385][ T8204] Memory failure: 0x123f5c: recovery action for dirty LRU page: Recovered [ 141.658391][ T8204] Injecting memory failure for pfn 0x123f5d at process virtual address 0x20b0a000 [ 141.658406][ T8204] Memory failure: 0x123f5d: recovery action for dirty LRU page: Recovered [ 141.658412][ T8204] Injecting memory failure for pfn 0x122b94 at process virtual address 0x20b0b000 [ 141.658428][ T8204] Memory failure: 0x122b94: recovery action for dirty LRU page: Recovered [ 141.658434][ T8204] Injecting memory failure for pfn 0x122b95 at process virtual address 0x20b0c000 [ 141.658450][ T8204] Memory failure: 0x122b95: recovery action for dirty LRU page: Recovered [ 141.658455][ T8204] Injecting memory failure for pfn 0x15d514 at process virtual address 0x20b0d000 [ 141.658471][ T8204] Memory failure: 0x15d514: recovery action for dirty LRU page: Recovered [ 141.658477][ T8204] Injecting memory failure for pfn 0x15d515 at process virtual address 0x20b0e000 [ 141.658492][ T8204] Memory failure: 0x15d515: recovery action for dirty LRU page: Recovered [ 141.658498][ T8204] Injecting memory failure for pfn 0x1242ea at process virtual address 0x20b0f000 [ 141.658513][ T8204] Memory failure: 0x1242ea: recovery action for dirty LRU page: Recovered [ 141.658519][ T8204] Injecting memory failure for pfn 0x1242eb at process virtual address 0x20b10000 [ 141.658535][ T8204] Memory failure: 0x1242eb: recovery action for dirty LRU page: Recovered [ 141.658541][ T8204] Injecting memory failure for pfn 0x151024 at process virtual address 0x20b11000 [ 141.658556][ T8204] Memory failure: 0x151024: recovery action for dirty LRU page: Recovered [ 141.658562][ T8204] Injecting memory failure for pfn 0x151025 at process virtual address 0x20b12000 [ 141.658578][ T8204] Memory failure: 0x151025: recovery action for dirty LRU page: Recovered [ 141.658584][ T8204] Injecting memory failure for pfn 0x12a58e at process virtual address 0x20b13000 [ 141.658600][ T8204] Memory failure: 0x12a58e: recovery action for dirty LRU page: Recovered [ 141.658606][ T8204] Injecting memory failure for pfn 0x12a58f at process virtual address 0x20b14000 [ 141.658622][ T8204] Memory failure: 0x12a58f: recovery action for dirty LRU page: Recovered [ 141.658627][ T8204] Injecting memory failure for pfn 0x127dda at process virtual address 0x20b15000 [ 141.658643][ T8204] Memory failure: 0x127dda: recovery action for dirty LRU page: Recovered [ 141.658649][ T8204] Injecting memory failure for pfn 0x127ddb at process virtual address 0x20b16000 [ 141.658668][ T8204] Memory failure: 0x127ddb: recovery action for dirty LRU page: Recovered [ 141.658673][ T8204] Injecting memory failure for pfn 0x15eddc at process virtual address 0x20b17000 [ 141.658689][ T8204] Memory failure: 0x15eddc: recovery action for dirty LRU page: Recovered [ 141.658695][ T8204] Injecting memory failure for pfn 0x15eddd at process virtual address 0x20b18000 [ 141.658710][ T8204] Memory failure: 0x15eddd: recovery action for dirty LRU page: Recovered [ 141.658716][ T8204] Injecting memory failure for pfn 0x12ac8a at process virtual address 0x20b19000 [ 141.658732][ T8204] Memory failure: 0x12ac8a: recovery action for dirty LRU page: Recovered [ 141.658738][ T8204] Injecting memory failure for pfn 0x12ac8b at process virtual address 0x20b1a000 [ 141.658755][ T8204] Memory failure: 0x12ac8b: recovery action for dirty LRU page: Recovered [ 141.658761][ T8204] Injecting memory failure for pfn 0x12ad92 at process virtual address 0x20b1b000 [ 141.658776][ T8204] Memory failure: 0x12ad92: recovery action for dirty LRU page: Recovered [ 141.658782][ T8204] Injecting memory failure for pfn 0x12ad93 at process virtual address 0x20b1c000 [ 141.658798][ T8204] Memory failure: 0x12ad93: recovery action for dirty LRU page: Recovered [ 141.658804][ T8204] Injecting memory failure for pfn 0x12a610 at process virtual address 0x20b1d000 [ 141.658820][ T8204] Memory failure: 0x12a610: recovery action for dirty LRU page: Recovered [ 141.658825][ T8204] Injecting memory failure for pfn 0x12a611 at process virtual address 0x20b1e000 [ 141.658841][ T8204] Memory failure: 0x12a611: recovery action for dirty LRU page: Recovered [ 141.658847][ T8204] Injecting memory failure for pfn 0x12a612 at process virtual address 0x20b1f000 [ 141.658862][ T8204] Memory failure: 0x12a612: recovery action for dirty LRU page: Recovered [ 141.658868][ T8204] Injecting memory failure for pfn 0x12a613 at process virtual address 0x20b20000 [ 141.658885][ T8204] Memory failure: 0x12a613: recovery action for dirty LRU page: Recovered [ 141.658891][ T8204] Injecting memory failure for pfn 0x12ab18 at process virtual address 0x20b21000 [ 141.658906][ T8204] Memory failure: 0x12ab18: recovery action for dirty LRU page: Recovered [ 141.658912][ T8204] Injecting memory failure for pfn 0x12ab19 at process virtual address 0x20b22000 [ 141.658927][ T8204] Memory failure: 0x12ab19: recovery action for dirty LRU page: Recovered [ 141.658933][ T8204] Injecting memory failure for pfn 0x12ab1a at process virtual address 0x20b23000 [ 141.658949][ T8204] Memory failure: 0x12ab1a: recovery action for dirty LRU page: Recovered [ 141.658954][ T8204] Injecting memory failure for pfn 0x12ab1b at process virtual address 0x20b24000 [ 141.658970][ T8204] Memory failure: 0x12ab1b: recovery action for dirty LRU page: Recovered [ 141.658976][ T8204] Injecting memory failure for pfn 0x127ddc at process virtual address 0x20b25000 [ 141.658992][ T8204] Memory failure: 0x127ddc: recovery action for dirty LRU page: Recovered [ 141.658997][ T8204] Injecting memory failure for pfn 0x127ddd at process virtual address 0x20b26000 [ 141.659013][ T8204] Memory failure: 0x127ddd: recovery action for dirty LRU page: Recovered [ 141.659019][ T8204] Injecting memory failure for pfn 0x127dde at process virtual address 0x20b27000 [ 141.659034][ T8204] Memory failure: 0x127dde: recovery action for dirty LRU page: Recovered [ 141.659040][ T8204] Injecting memory failure for pfn 0x127ddf at process virtual address 0x20b28000 [ 141.659056][ T8204] Memory failure: 0x127ddf: recovery action for dirty LRU page: Recovered [ 141.659061][ T8204] Injecting memory failure for pfn 0x15dc34 at process virtual address 0x20b29000 [ 141.659077][ T8204] Memory failure: 0x15dc34: recovery action for dirty LRU page: Recovered [ 141.659083][ T8204] Injecting memory failure for pfn 0x15dc35 at process virtual address 0x20b2a000 [ 141.659100][ T8204] Memory failure: 0x15dc35: recovery action for dirty LRU page: Recovered [ 141.659106][ T8204] Injecting memory failure for pfn 0x15dc36 at process virtual address 0x20b2b000 [ 141.659122][ T8204] Memory failure: 0x15dc36: recovery action for dirty LRU page: Recovered [ 141.659127][ T8204] Injecting memory failure for pfn 0x15dc37 at process virtual address 0x20b2c000 [ 141.659143][ T8204] Memory failure: 0x15dc37: recovery action for dirty LRU page: Recovered [ 141.659149][ T8204] Injecting memory failure for pfn 0x127c24 at process virtual address 0x20b2d000 [ 141.659164][ T8204] Memory failure: 0x127c24: recovery action for dirty LRU page: Recovered [ 141.659170][ T8204] Injecting memory failure for pfn 0x127c25 at process virtual address 0x20b2e000 [ 141.659186][ T8204] Memory failure: 0x127c25: recovery action for dirty LRU page: Recovered [ 141.659191][ T8204] Injecting memory failure for pfn 0x127c26 at process virtual address 0x20b2f000 [ 141.659207][ T8204] Memory failure: 0x127c26: recovery action for dirty LRU page: Recovered [ 141.659213][ T8204] Injecting memory failure for pfn 0x127c27 at process virtual address 0x20b30000 [ 141.659228][ T8204] Memory failure: 0x127c27: recovery action for dirty LRU page: Recovered [ 141.659234][ T8204] Injecting memory failure for pfn 0x151020 at process virtual address 0x20b31000 [ 141.659250][ T8204] Memory failure: 0x151020: recovery action for dirty LRU page: Recovered [ 141.659256][ T8204] Injecting memory failure for pfn 0x151021 at process virtual address 0x20b32000 [ 141.659271][ T8204] Memory failure: 0x151021: recovery action for dirty LRU page: Recovered [ 141.659277][ T8204] Injecting memory failure for pfn 0x151022 at process virtual address 0x20b33000 [ 141.659293][ T8204] Memory failure: 0x151022: recovery action for dirty LRU page: Recovered [ 141.659298][ T8204] Injecting memory failure for pfn 0x151023 at process virtual address 0x20b34000 [ 141.659314][ T8204] Memory failure: 0x151023: recovery action for dirty LRU page: Recovered [ 141.659320][ T8204] Injecting memory failure for pfn 0x1243dc at process virtual address 0x20b35000 [ 141.659335][ T8204] Memory failure: 0x1243dc: recovery action for dirty LRU page: Recovered [ 141.659341][ T8204] Injecting memory failure for pfn 0x12b1ed at process virtual address 0x20b36000 [ 141.659747][ T8204] Memory failure: 0x12b1ed: recovery action for dirty LRU page: Recovered [ 141.659755][ T8204] Injecting memory failure for pfn 0x15fa8b at process virtual address 0x20b37000 [ 141.659780][ T8204] Memory failure: 0x15fa8b: recovery action for dirty LRU page: Recovered [ 141.659786][ T8204] Injecting memory failure for pfn 0x15fa8a at process virtual address 0x20b38000 [ 141.659803][ T8204] Memory failure: 0x15fa8a: recovery action for dirty LRU page: Recovered [ 141.659808][ T8204] Injecting memory failure for pfn 0x15fa89 at process virtual address 0x20b39000 [ 141.659825][ T8204] Memory failure: 0x15fa89: recovery action for dirty LRU page: Recovered [ 141.659830][ T8204] Injecting memory failure for pfn 0x15fa88 at process virtual address 0x20b3a000 [ 141.659846][ T8204] Memory failure: 0x15fa88: recovery action for dirty LRU page: Recovered [ 141.659852][ T8204] Injecting memory failure for pfn 0x15fa87 at process virtual address 0x20b3b000 [ 141.659868][ T8204] Memory failure: 0x15fa87: recovery action for dirty LRU page: Recovered [ 141.659874][ T8204] Injecting memory failure for pfn 0x15fa86 at process virtual address 0x20b3c000 [ 141.659889][ T8204] Memory failure: 0x15fa86: recovery action for dirty LRU page: Recovered [ 141.659895][ T8204] Injecting memory failure for pfn 0x15fa85 at process virtual address 0x20b3d000 [ 141.659911][ T8204] Memory failure: 0x15fa85: recovery action for dirty LRU page: Recovered [ 141.659917][ T8204] Injecting memory failure for pfn 0x15fa84 at process virtual address 0x20b3e000 [ 141.659932][ T8204] Memory failure: 0x15fa84: recovery action for dirty LRU page: Recovered [ 141.659938][ T8204] Injecting memory failure for pfn 0x15fa83 at process virtual address 0x20b3f000 [ 141.659954][ T8204] Memory failure: 0x15fa83: recovery action for dirty LRU page: Recovered [ 141.659960][ T8204] Injecting memory failure for pfn 0x15fa82 at process virtual address 0x20b40000 [ 141.660017][ T8204] Memory failure: 0x15fa82: recovery action for dirty LRU page: Recovered [ 141.660025][ T8204] Injecting memory failure for pfn 0x15fa81 at process virtual address 0x20b41000 [ 141.660041][ T8204] Memory failure: 0x15fa81: recovery action for dirty LRU page: Recovered [ 141.660047][ T8204] Injecting memory failure for pfn 0x15fa80 at process virtual address 0x20b42000 [ 141.660062][ T8204] Memory failure: 0x15fa80: recovery action for dirty LRU page: Recovered [ 141.660068][ T8204] Injecting memory failure for pfn 0x15d98f at process virtual address 0x20b43000 [ 141.660084][ T8204] Memory failure: 0x15d98f: recovery action for dirty LRU page: Recovered [ 141.660090][ T8204] Injecting memory failure for pfn 0x15d98e at process virtual address 0x20b44000 [ 141.660106][ T8204] Memory failure: 0x15d98e: recovery action for dirty LRU page: Recovered [ 141.660111][ T8204] Injecting memory failure for pfn 0x15d983 at process virtual address 0x20b45000 [ 141.660127][ T8204] Memory failure: 0x15d983: recovery action for dirty LRU page: Recovered [ 141.660133][ T8204] Injecting memory failure for pfn 0x15d982 at process virtual address 0x20b46000 [ 141.660148][ T8204] Memory failure: 0x15d982: recovery action for dirty LRU page: Recovered [ 141.660154][ T8204] Injecting memory failure for pfn 0x15d981 at process virtual address 0x20b47000 [ 141.660170][ T8204] Memory failure: 0x15d981: recovery action for dirty LRU page: Recovered [ 141.660176][ T8204] Injecting memory failure for pfn 0x15d980 at process virtual address 0x20b48000 [ 141.660191][ T8204] Memory failure: 0x15d980: recovery action for dirty LRU page: Recovered [ 141.660197][ T8204] Injecting memory failure for pfn 0x15ec1f at process virtual address 0x20b49000 [ 141.660213][ T8204] Memory failure: 0x15ec1f: recovery action for dirty LRU page: Recovered [ 141.660218][ T8204] Injecting memory failure for pfn 0x15ec1e at process virtual address 0x20b4a000 [ 141.660234][ T8204] Memory failure: 0x15ec1e: recovery action for dirty LRU page: Recovered [ 141.660240][ T8204] Injecting memory failure for pfn 0x15ec1d at process virtual address 0x20b4b000 [ 141.660255][ T8204] Memory failure: 0x15ec1d: recovery action for dirty LRU page: Recovered [ 141.660261][ T8204] Injecting memory failure for pfn 0x15ec1c at process virtual address 0x20b4c000 [ 141.660276][ T8204] Memory failure: 0x15ec1c: recovery action for dirty LRU page: Recovered [ 141.660282][ T8204] Injecting memory failure for pfn 0x15ec1b at process virtual address 0x20b4d000 [ 141.660298][ T8204] Memory failure: 0x15ec1b: recovery action for dirty LRU page: Recovered [ 141.660304][ T8204] Injecting memory failure for pfn 0x15ec19 at process virtual address 0x20b4e000 [ 141.660319][ T8204] Memory failure: 0x15ec19: recovery action for dirty LRU page: Recovered [ 141.660325][ T8204] Injecting memory failure for pfn 0x15ec18 at process virtual address 0x20b4f000 [ 141.660341][ T8204] Memory failure: 0x15ec18: recovery action for dirty LRU page: Recovered [ 141.660346][ T8204] Injecting memory failure for pfn 0x15ec17 at process virtual address 0x20b50000 [ 141.660362][ T8204] Memory failure: 0x15ec17: recovery action for dirty LRU page: Recovered [ 141.660368][ T8204] Injecting memory failure for pfn 0x15ec16 at process virtual address 0x20b51000 [ 141.660384][ T8204] Memory failure: 0x15ec16: recovery action for dirty LRU page: Recovered [ 141.660389][ T8204] Injecting memory failure for pfn 0x15ec15 at process virtual address 0x20b52000 [ 141.660405][ T8204] Memory failure: 0x15ec15: recovery action for dirty LRU page: Recovered [ 141.660411][ T8204] Injecting memory failure for pfn 0x15ec14 at process virtual address 0x20b53000 [ 141.660427][ T8204] Memory failure: 0x15ec14: recovery action for dirty LRU page: Recovered [ 141.660433][ T8204] Injecting memory failure for pfn 0x15ec13 at process virtual address 0x20b54000 [ 141.660449][ T8204] Memory failure: 0x15ec13: recovery action for dirty LRU page: Recovered [ 141.660454][ T8204] Injecting memory failure for pfn 0x15ec12 at process virtual address 0x20b55000 [ 141.660470][ T8204] Memory failure: 0x15ec12: recovery action for dirty LRU page: Recovered [ 141.660476][ T8204] Injecting memory failure for pfn 0x15d92f at process virtual address 0x20b56000 [ 141.660491][ T8204] Memory failure: 0x15d92f: recovery action for dirty LRU page: Recovered [ 141.660497][ T8204] Injecting memory failure for pfn 0x15d92e at process virtual address 0x20b57000 [ 141.660513][ T8204] Memory failure: 0x15d92e: recovery action for dirty LRU page: Recovered [ 141.660518][ T8204] Injecting memory failure for pfn 0x15d92c at process virtual address 0x20b58000 [ 141.660534][ T8204] Memory failure: 0x15d92c: recovery action for dirty LRU page: Recovered [ 141.660540][ T8204] Injecting memory failure for pfn 0x15d92b at process virtual address 0x20b59000 [ 141.660555][ T8204] Memory failure: 0x15d92b: recovery action for dirty LRU page: Recovered [ 141.660561][ T8204] Injecting memory failure for pfn 0x15d92a at process virtual address 0x20b5a000 [ 141.660577][ T8204] Memory failure: 0x15d92a: recovery action for dirty LRU page: Recovered [ 141.660582][ T8204] Injecting memory failure for pfn 0x15d929 at process virtual address 0x20b5b000 [ 141.660598][ T8204] Memory failure: 0x15d929: recovery action for dirty LRU page: Recovered [ 141.660604][ T8204] Injecting memory failure for pfn 0x15d928 at process virtual address 0x20b5c000 [ 141.660620][ T8204] Memory failure: 0x15d928: recovery action for dirty LRU page: Recovered [ 141.660626][ T8204] Injecting memory failure for pfn 0x15d927 at process virtual address 0x20b5d000 [ 141.660642][ T8204] Memory failure: 0x15d927: recovery action for dirty LRU page: Recovered [ 141.660648][ T8204] Injecting memory failure for pfn 0x15d926 at process virtual address 0x20b5e000 [ 141.660667][ T8204] Memory failure: 0x15d926: recovery action for dirty LRU page: Recovered [ 141.660672][ T8204] Injecting memory failure for pfn 0x15d925 at process virtual address 0x20b5f000 [ 141.660688][ T8204] Memory failure: 0x15d925: recovery action for dirty LRU page: Recovered [ 141.660694][ T8204] Injecting memory failure for pfn 0x15d924 at process virtual address 0x20b60000 [ 141.660751][ T8204] Memory failure: 0x15d924: recovery action for dirty LRU page: Recovered [ 141.660757][ T8204] Injecting memory failure for pfn 0x128744 at process virtual address 0x20b61000 [ 141.660773][ T8204] Memory failure: 0x128744: recovery action for dirty LRU page: Recovered [ 141.660778][ T8204] Injecting memory failure for pfn 0x128743 at process virtual address 0x20b62000 [ 141.660794][ T8204] Memory failure: 0x128743: recovery action for dirty LRU page: Recovered [ 141.660800][ T8204] Injecting memory failure for pfn 0x128742 at process virtual address 0x20b63000 [ 141.660816][ T8204] Memory failure: 0x128742: recovery action for dirty LRU page: Recovered [ 141.660822][ T8204] Injecting memory failure for pfn 0x128741 at process virtual address 0x20b64000 [ 141.660838][ T8204] Memory failure: 0x128741: recovery action for dirty LRU page: Recovered [ 141.660844][ T8204] Injecting memory failure for pfn 0x128740 at process virtual address 0x20b65000 [ 141.660859][ T8204] Memory failure: 0x128740: recovery action for dirty LRU page: Recovered [ 141.660865][ T8204] Injecting memory failure for pfn 0x12671f at process virtual address 0x20b66000 [ 141.660881][ T8204] Memory failure: 0x12671f: recovery action for dirty LRU page: Recovered [ 141.660886][ T8204] Injecting memory failure for pfn 0x12671e at process virtual address 0x20b67000 [ 141.660902][ T8204] Memory failure: 0x12671e: recovery action for dirty LRU page: Recovered [ 141.660908][ T8204] Injecting memory failure for pfn 0x12671d at process virtual address 0x20b68000 [ 141.660923][ T8204] Memory failure: 0x12671d: recovery action for dirty LRU page: Recovered [ 141.660929][ T8204] Injecting memory failure for pfn 0x12671c at process virtual address 0x20b69000 [ 141.660945][ T8204] Memory failure: 0x12671c: recovery action for dirty LRU page: Recovered [ 141.660951][ T8204] Injecting memory failure for pfn 0x12671b at process virtual address 0x20b6a000 [ 141.660966][ T8204] Memory failure: 0x12671b: recovery action for dirty LRU page: Recovered [ 141.660972][ T8204] Injecting memory failure for pfn 0x12671a at process virtual address 0x20b6b000 [ 141.660988][ T8204] Memory failure: 0x12671a: recovery action for dirty LRU page: Recovered [ 141.660994][ T8204] Injecting memory failure for pfn 0x126719 at process virtual address 0x20b6c000 [ 141.661009][ T8204] Memory failure: 0x126719: recovery action for dirty LRU page: Recovered [ 141.661015][ T8204] Injecting memory failure for pfn 0x126718 at process virtual address 0x20b6d000 [ 141.661031][ T8204] Memory failure: 0x126718: recovery action for dirty LRU page: Recovered [ 141.661037][ T8204] Injecting memory failure for pfn 0x126717 at process virtual address 0x20b6e000 [ 141.661052][ T8204] Memory failure: 0x126717: recovery action for dirty LRU page: Recovered [ 141.661058][ T8204] Injecting memory failure for pfn 0x126716 at process virtual address 0x20b6f000 [ 141.661074][ T8204] Memory failure: 0x126716: recovery action for dirty LRU page: Recovered [ 141.661080][ T8204] Injecting memory failure for pfn 0x126715 at process virtual address 0x20b70000 [ 141.661095][ T8204] Memory failure: 0x126715: recovery action for dirty LRU page: Recovered [ 141.661101][ T8204] Injecting memory failure for pfn 0x126714 at process virtual address 0x20b71000 [ 141.661117][ T8204] Memory failure: 0x126714: recovery action for dirty LRU page: Recovered [ 141.661123][ T8204] Injecting memory failure for pfn 0x126713 at process virtual address 0x20b72000 [ 141.661139][ T8204] Memory failure: 0x126713: recovery action for dirty LRU page: Recovered [ 141.661144][ T8204] Injecting memory failure for pfn 0x126712 at process virtual address 0x20b73000 [ 141.661160][ T8204] Memory failure: 0x126712: recovery action for dirty LRU page: Recovered [ 141.661166][ T8204] Injecting memory failure for pfn 0x126711 at process virtual address 0x20b74000 [ 141.661182][ T8204] Memory failure: 0x126711: recovery action for dirty LRU page: Recovered [ 141.661188][ T8204] Injecting memory failure for pfn 0x126710 at process virtual address 0x20b75000 [ 141.661204][ T8204] Memory failure: 0x126710: recovery action for dirty LRU page: Recovered [ 141.661209][ T8204] Injecting memory failure for pfn 0x123dff at process virtual address 0x20b76000 [ 141.661225][ T8204] Memory failure: 0x123dff: recovery action for dirty LRU page: Recovered [ 141.661231][ T8204] Injecting memory failure for pfn 0x128689 at process virtual address 0x20b77000 [ 141.661247][ T8204] Memory failure: 0x128689: recovery action for dirty LRU page: Recovered [ 141.661253][ T8204] Injecting memory failure for pfn 0x128688 at process virtual address 0x20b78000 [ 141.661269][ T8204] Memory failure: 0x128688: recovery action for dirty LRU page: Recovered [ 141.661274][ T8204] Injecting memory failure for pfn 0x128687 at process virtual address 0x20b79000 [ 141.661290][ T8204] Memory failure: 0x128687: recovery action for dirty LRU page: Recovered [ 141.661296][ T8204] Injecting memory failure for pfn 0x128686 at process virtual address 0x20b7a000 [ 141.661312][ T8204] Memory failure: 0x128686: recovery action for dirty LRU page: Recovered [ 141.661317][ T8204] Injecting memory failure for pfn 0x128685 at process virtual address 0x20b7b000 [ 141.661333][ T8204] Memory failure: 0x128685: recovery action for dirty LRU page: Recovered [ 141.661339][ T8204] Injecting memory failure for pfn 0x128684 at process virtual address 0x20b7c000 [ 141.661354][ T8204] Memory failure: 0x128684: recovery action for dirty LRU page: Recovered [ 141.661360][ T8204] Injecting memory failure for pfn 0x128683 at process virtual address 0x20b7d000 [ 141.661376][ T8204] Memory failure: 0x128683: recovery action for dirty LRU page: Recovered [ 141.661382][ T8204] Injecting memory failure for pfn 0x128682 at process virtual address 0x20b7e000 [ 141.661397][ T8204] Memory failure: 0x128682: recovery action for dirty LRU page: Recovered [ 141.661403][ T8204] Injecting memory failure for pfn 0x128681 at process virtual address 0x20b7f000 [ 141.661419][ T8204] Memory failure: 0x128681: recovery action for dirty LRU page: Recovered [ 141.661425][ T8204] Injecting memory failure for pfn 0x128680 at process virtual address 0x20b80000 [ 141.661441][ T8204] Memory failure: 0x128680: recovery action for dirty LRU page: Recovered [ 141.661447][ T8204] Injecting memory failure for pfn 0x12ac9f at process virtual address 0x20b81000 [ 141.661463][ T8204] Memory failure: 0x12ac9f: recovery action for dirty LRU page: Recovered [ 141.661468][ T8204] Injecting memory failure for pfn 0x12ac9e at process virtual address 0x20b82000 [ 141.661484][ T8204] Memory failure: 0x12ac9e: recovery action for dirty LRU page: Recovered [ 141.661490][ T8204] Injecting memory failure for pfn 0x12ac9d at process virtual address 0x20b83000 [ 141.661505][ T8204] Memory failure: 0x12ac9d: recovery action for dirty LRU page: Recovered [ 141.661511][ T8204] Injecting memory failure for pfn 0x12ac9c at process virtual address 0x20b84000 [ 141.661527][ T8204] Memory failure: 0x12ac9c: recovery action for dirty LRU page: Recovered [ 141.661533][ T8204] Injecting memory failure for pfn 0x12ac9b at process virtual address 0x20b85000 [ 141.661549][ T8204] Memory failure: 0x12ac9b: recovery action for dirty LRU page: Recovered [ 141.661554][ T8204] Injecting memory failure for pfn 0x12ac9a at process virtual address 0x20b86000 [ 141.661570][ T8204] Memory failure: 0x12ac9a: recovery action for dirty LRU page: Recovered [ 141.661576][ T8204] Injecting memory failure for pfn 0x12ac99 at process virtual address 0x20b87000 [ 141.661592][ T8204] Memory failure: 0x12ac99: recovery action for dirty LRU page: Recovered [ 141.661598][ T8204] Injecting memory failure for pfn 0x15ed5e at process virtual address 0x20b88000 [ 141.661613][ T8204] Memory failure: 0x15ed5e: recovery action for dirty LRU page: Recovered [ 141.661619][ T8204] Injecting memory failure for pfn 0x15ed5d at process virtual address 0x20b89000 [ 141.661635][ T8204] Memory failure: 0x15ed5d: recovery action for dirty LRU page: Recovered [ 141.661640][ T8204] Injecting memory failure for pfn 0x15ed5c at process virtual address 0x20b8a000 [ 141.661660][ T8204] Memory failure: 0x15ed5c: recovery action for dirty LRU page: Recovered [ 141.661666][ T8204] Injecting memory failure for pfn 0x15ed5b at process virtual address 0x20b8b000 [ 141.661682][ T8204] Memory failure: 0x15ed5b: recovery action for dirty LRU page: Recovered [ 141.661687][ T8204] Injecting memory failure for pfn 0x15ed5a at process virtual address 0x20b8c000 [ 141.661703][ T8204] Memory failure: 0x15ed5a: recovery action for dirty LRU page: Recovered [ 141.661709][ T8204] Injecting memory failure for pfn 0x15ed59 at process virtual address 0x20b8d000 [ 141.661725][ T8204] Memory failure: 0x15ed59: recovery action for dirty LRU page: Recovered [ 141.661730][ T8204] Injecting memory failure for pfn 0x15ed58 at process virtual address 0x20b8e000 [ 141.661746][ T8204] Memory failure: 0x15ed58: recovery action for dirty LRU page: Recovered [ 141.661752][ T8204] Injecting memory failure for pfn 0x15ed57 at process virtual address 0x20b8f000 [ 141.661768][ T8204] Memory failure: 0x15ed57: recovery action for dirty LRU page: Recovered [ 141.661774][ T8204] Injecting memory failure for pfn 0x15ed56 at process virtual address 0x20b90000 [ 141.661789][ T8204] Memory failure: 0x15ed56: recovery action for dirty LRU page: Recovered [ 141.661795][ T8204] Injecting memory failure for pfn 0x15ed55 at process virtual address 0x20b91000 [ 141.661811][ T8204] Memory failure: 0x15ed55: recovery action for dirty LRU page: Recovered [ 141.661817][ T8204] Injecting memory failure for pfn 0x15ed54 at process virtual address 0x20b92000 [ 141.661832][ T8204] Memory failure: 0x15ed54: recovery action for dirty LRU page: Recovered [ 141.661838][ T8204] Injecting memory failure for pfn 0x15ed53 at process virtual address 0x20b93000 [ 141.661855][ T8204] Memory failure: 0x15ed53: recovery action for dirty LRU page: Recovered [ 141.661861][ T8204] Injecting memory failure for pfn 0x15ed52 at process virtual address 0x20b94000 [ 141.661877][ T8204] Memory failure: 0x15ed52: recovery action for dirty LRU page: Recovered [ 141.661883][ T8204] Injecting memory failure for pfn 0x15ed51 at process virtual address 0x20b95000 [ 141.661899][ T8204] Memory failure: 0x15ed51: recovery action for dirty LRU page: Recovered [ 141.661905][ T8204] Injecting memory failure for pfn 0x15ed50 at process virtual address 0x20b96000 [ 141.661921][ T8204] Memory failure: 0x15ed50: recovery action for dirty LRU page: Recovered [ 141.661926][ T8204] Injecting memory failure for pfn 0x12466f at process virtual address 0x20b97000 [ 141.661942][ T8204] Memory failure: 0x12466f: recovery action for dirty LRU page: Recovered [ 141.661948][ T8204] Injecting memory failure for pfn 0x124662 at process virtual address 0x20b98000 [ 141.661964][ T8204] Memory failure: 0x124662: recovery action for dirty LRU page: Recovered [ 141.661970][ T8204] Injecting memory failure for pfn 0x124661 at process virtual address 0x20b99000 [ 141.661985][ T8204] Memory failure: 0x124661: recovery action for dirty LRU page: Recovered [ 141.661991][ T8204] Injecting memory failure for pfn 0x124660 at process virtual address 0x20b9a000 [ 141.662007][ T8204] Memory failure: 0x124660: recovery action for dirty LRU page: Recovered [ 141.662013][ T8204] Injecting memory failure for pfn 0x15155f at process virtual address 0x20b9b000 [ 141.662028][ T8204] Memory failure: 0x15155f: recovery action for dirty LRU page: Recovered [ 141.662034][ T8204] Injecting memory failure for pfn 0x15155e at process virtual address 0x20b9c000 [ 141.662050][ T8204] Memory failure: 0x15155e: recovery action for dirty LRU page: Recovered [ 141.662055][ T8204] Injecting memory failure for pfn 0x15155d at process virtual address 0x20b9d000 [ 141.662071][ T8204] Memory failure: 0x15155d: recovery action for dirty LRU page: Recovered [ 141.662077][ T8204] Injecting memory failure for pfn 0x15155c at process virtual address 0x20b9e000 [ 141.662093][ T8204] Memory failure: 0x15155c: recovery action for dirty LRU page: Recovered [ 141.662098][ T8204] Injecting memory failure for pfn 0x15155b at process virtual address 0x20b9f000 [ 141.662114][ T8204] Memory failure: 0x15155b: recovery action for dirty LRU page: Recovered [ 141.662120][ T8204] Injecting memory failure for pfn 0x15155a at process virtual address 0x20ba0000 [ 141.662136][ T8204] Memory failure: 0x15155a: recovery action for dirty LRU page: Recovered [ 141.662142][ T8204] Injecting memory failure for pfn 0x151559 at process virtual address 0x20ba1000 [ 141.662158][ T8204] Memory failure: 0x151559: recovery action for dirty LRU page: Recovered [ 141.662163][ T8204] Injecting memory failure for pfn 0x151558 at process virtual address 0x20ba2000 [ 141.662180][ T8204] Memory failure: 0x151558: recovery action for dirty LRU page: Recovered [ 141.662186][ T8204] Injecting memory failure for pfn 0x151556 at process virtual address 0x20ba3000 [ 141.662202][ T8204] Memory failure: 0x151556: recovery action for dirty LRU page: Recovered [ 141.662208][ T8204] Injecting memory failure for pfn 0x151555 at process virtual address 0x20ba4000 [ 141.662223][ T8204] Memory failure: 0x151555: recovery action for dirty LRU page: Recovered [ 141.662229][ T8204] Injecting memory failure for pfn 0x151554 at process virtual address 0x20ba5000 [ 141.662245][ T8204] Memory failure: 0x151554: recovery action for dirty LRU page: Recovered [ 141.662251][ T8204] Injecting memory failure for pfn 0x151553 at process virtual address 0x20ba6000 [ 141.662267][ T8204] Memory failure: 0x151553: recovery action for dirty LRU page: Recovered [ 141.662272][ T8204] Injecting memory failure for pfn 0x151552 at process virtual address 0x20ba7000 [ 141.662288][ T8204] Memory failure: 0x151552: recovery action for dirty LRU page: Recovered [ 141.662294][ T8204] Injecting memory failure for pfn 0x151551 at process virtual address 0x20ba8000 [ 141.662309][ T8204] Memory failure: 0x151551: recovery action for dirty LRU page: Recovered [ 141.662315][ T8204] Injecting memory failure for pfn 0x151550 at process virtual address 0x20ba9000 [ 141.662331][ T8204] Memory failure: 0x151550: recovery action for dirty LRU page: Recovered [ 141.662336][ T8204] Injecting memory failure for pfn 0x123ecf at process virtual address 0x20baa000 [ 141.662352][ T8204] Memory failure: 0x123ecf: recovery action for dirty LRU page: Recovered [ 141.662358][ T8204] Injecting memory failure for pfn 0x123ece at process virtual address 0x20bab000 [ 141.662374][ T8204] Memory failure: 0x123ece: recovery action for dirty LRU page: Recovered [ 141.662379][ T8204] Injecting memory failure for pfn 0x123ecd at process virtual address 0x20bac000 [ 141.662395][ T8204] Memory failure: 0x123ecd: recovery action for dirty LRU page: Recovered [ 141.662401][ T8204] Injecting memory failure for pfn 0x123ecc at process virtual address 0x20bad000 [ 141.662417][ T8204] Memory failure: 0x123ecc: recovery action for dirty LRU page: Recovered [ 141.662423][ T8204] Injecting memory failure for pfn 0x123ecb at process virtual address 0x20bae000 [ 141.662438][ T8204] Memory failure: 0x123ecb: recovery action for dirty LRU page: Recovered [ 141.662444][ T8204] Injecting memory failure for pfn 0x123eca at process virtual address 0x20baf000 [ 141.662460][ T8204] Memory failure: 0x123eca: recovery action for dirty LRU page: Recovered [ 141.662466][ T8204] Injecting memory failure for pfn 0x123ec9 at process virtual address 0x20bb0000 [ 141.662481][ T8204] Memory failure: 0x123ec9: recovery action for dirty LRU page: Recovered [ 141.662487][ T8204] Injecting memory failure for pfn 0x123ec8 at process virtual address 0x20bb1000 [ 141.662503][ T8204] Memory failure: 0x123ec8: recovery action for dirty LRU page: Recovered [ 141.662508][ T8204] Injecting memory failure for pfn 0x123ec7 at process virtual address 0x20bb2000 [ 141.662524][ T8204] Memory failure: 0x123ec7: recovery action for dirty LRU page: Recovered [ 141.662530][ T8204] Injecting memory failure for pfn 0x123ec6 at process virtual address 0x20bb3000 [ 141.662545][ T8204] Memory failure: 0x123ec6: recovery action for dirty LRU page: Recovered [ 141.662551][ T8204] Injecting memory failure for pfn 0x125e4b at process virtual address 0x20bb4000 [ 141.662567][ T8204] Memory failure: 0x125e4b: recovery action for dirty LRU page: Recovered [ 141.662573][ T8204] Injecting memory failure for pfn 0x15dbff at process virtual address 0x20bb5000 [ 141.662588][ T8204] Memory failure: 0x15dbff: recovery action for dirty LRU page: Recovered [ 141.662594][ T8204] Injecting memory failure for pfn 0x15dbfe at process virtual address 0x20bb6000 [ 141.662610][ T8204] Memory failure: 0x15dbfe: recovery action for dirty LRU page: Recovered [ 141.662615][ T8204] Injecting memory failure for pfn 0x15dbfd at process virtual address 0x20bb7000 [ 141.662631][ T8204] Memory failure: 0x15dbfd: recovery action for dirty LRU page: Recovered [ 141.662637][ T8204] Injecting memory failure for pfn 0x15dbfc at process virtual address 0x20bb8000 [ 141.662652][ T8204] Memory failure: 0x15dbfc: recovery action for dirty LRU page: Recovered [ 141.662661][ T8204] Injecting memory failure for pfn 0x15dbfb at process virtual address 0x20bb9000 [ 141.662679][ T8204] Memory failure: 0x15dbfb: recovery action for dirty LRU page: Recovered [ 141.662685][ T8204] Injecting memory failure for pfn 0x15dbfa at process virtual address 0x20bba000 [ 141.662702][ T8204] Memory failure: 0x15dbfa: recovery action for dirty LRU page: Recovered [ 141.662708][ T8204] Injecting memory failure for pfn 0x15dbf9 at process virtual address 0x20bbb000 [ 141.662723][ T8204] Memory failure: 0x15dbf9: recovery action for dirty LRU page: Recovered [ 141.662729][ T8204] Injecting memory failure for pfn 0x15dbf8 at process virtual address 0x20bbc000 [ 141.662744][ T8204] Memory failure: 0x15dbf8: recovery action for dirty LRU page: Recovered [ 141.662750][ T8204] Injecting memory failure for pfn 0x15dbf7 at process virtual address 0x20bbd000 [ 141.662766][ T8204] Memory failure: 0x15dbf7: recovery action for dirty LRU page: Recovered [ 141.662772][ T8204] Injecting memory failure for pfn 0x15dbf6 at process virtual address 0x20bbe000 [ 141.662787][ T8204] Memory failure: 0x15dbf6: recovery action for dirty LRU page: Recovered [ 141.662793][ T8204] Injecting memory failure for pfn 0x15dbf5 at process virtual address 0x20bbf000 [ 141.662809][ T8204] Memory failure: 0x15dbf5: recovery action for dirty LRU page: Recovered [ 141.662815][ T8204] Injecting memory failure for pfn 0x15dbf4 at process virtual address 0x20bc0000 [ 141.662831][ T8204] Memory failure: 0x15dbf4: recovery action for dirty LRU page: Recovered [ 141.662837][ T8204] Injecting memory failure for pfn 0x15dbf2 at process virtual address 0x20bc1000 [ 141.662852][ T8204] Memory failure: 0x15dbf2: recovery action for dirty LRU page: Recovered [ 141.662858][ T8204] Injecting memory failure for pfn 0x15dbf1 at process virtual address 0x20bc2000 [ 141.662874][ T8204] Memory failure: 0x15dbf1: recovery action for dirty LRU page: Recovered [ 141.662879][ T8204] Injecting memory failure for pfn 0x15dbf0 at process virtual address 0x20bc3000 [ 141.662895][ T8204] Memory failure: 0x15dbf0: recovery action for dirty LRU page: Recovered [ 141.662901][ T8204] Injecting memory failure for pfn 0x15252f at process virtual address 0x20bc4000 [ 141.662916][ T8204] Memory failure: 0x15252f: recovery action for dirty LRU page: Recovered [ 141.662922][ T8204] Injecting memory failure for pfn 0x15252e at process virtual address 0x20bc5000 [ 141.662938][ T8204] Memory failure: 0x15252e: recovery action for dirty LRU page: Recovered [ 141.662944][ T8204] Injecting memory failure for pfn 0x15252d at process virtual address 0x20bc6000 [ 141.662959][ T8204] Memory failure: 0x15252d: recovery action for dirty LRU page: Recovered [ 141.662965][ T8204] Injecting memory failure for pfn 0x15252c at process virtual address 0x20bc7000 [ 141.662981][ T8204] Memory failure: 0x15252c: recovery action for dirty LRU page: Recovered [ 141.662987][ T8204] Injecting memory failure for pfn 0x15252b at process virtual address 0x20bc8000 [ 141.663003][ T8204] Memory failure: 0x15252b: recovery action for dirty LRU page: Recovered [ 141.663008][ T8204] Injecting memory failure for pfn 0x15252a at process virtual address 0x20bc9000 [ 141.663024][ T8204] Memory failure: 0x15252a: recovery action for dirty LRU page: Recovered [ 141.663030][ T8204] Injecting memory failure for pfn 0x152529 at process virtual address 0x20bca000 [ 141.663045][ T8204] Memory failure: 0x152529: recovery action for dirty LRU page: Recovered [ 141.663051][ T8204] Injecting memory failure for pfn 0x152528 at process virtual address 0x20bcb000 [ 141.663067][ T8204] Memory failure: 0x152528: recovery action for dirty LRU page: Recovered [ 141.663072][ T8204] Injecting memory failure for pfn 0x152527 at process virtual address 0x20bcc000 [ 141.663088][ T8204] Memory failure: 0x152527: recovery action for dirty LRU page: Recovered [ 141.663094][ T8204] Injecting memory failure for pfn 0x152526 at process virtual address 0x20bcd000 [ 141.663110][ T8204] Memory failure: 0x152526: recovery action for dirty LRU page: Recovered [ 141.663116][ T8204] Injecting memory failure for pfn 0x152525 at process virtual address 0x20bce000 [ 141.663131][ T8204] Memory failure: 0x152525: recovery action for dirty LRU page: Recovered [ 141.663137][ T8204] Injecting memory failure for pfn 0x152524 at process virtual address 0x20bcf000 [ 141.663153][ T8204] Memory failure: 0x152524: recovery action for dirty LRU page: Recovered [ 141.663158][ T8204] Injecting memory failure for pfn 0x152523 at process virtual address 0x20bd0000 [ 141.663174][ T8204] Memory failure: 0x152523: recovery action for dirty LRU page: Recovered [ 141.663180][ T8204] Injecting memory failure for pfn 0x152522 at process virtual address 0x20bd1000 [ 141.663196][ T8204] Memory failure: 0x152522: recovery action for dirty LRU page: Recovered [ 141.663202][ T8204] Injecting memory failure for pfn 0x152521 at process virtual address 0x20bd2000 [ 141.663217][ T8204] Memory failure: 0x152521: recovery action for dirty LRU page: Recovered [ 141.663223][ T8204] Injecting memory failure for pfn 0x1242f7 at process virtual address 0x20bd3000 [ 141.663239][ T8204] Memory failure: 0x1242f7: recovery action for dirty LRU page: Recovered [ 141.663245][ T8204] Injecting memory failure for pfn 0x1242f0 at process virtual address 0x20bd4000 [ 141.663260][ T8204] Memory failure: 0x1242f0: recovery action for dirty LRU page: Recovered [ 141.663266][ T8204] Injecting memory failure for pfn 0x15e41f at process virtual address 0x20bd5000 [ 141.663282][ T8204] Memory failure: 0x15e41f: recovery action for dirty LRU page: Recovered [ 141.663288][ T8204] Injecting memory failure for pfn 0x15e41e at process virtual address 0x20bd6000 [ 141.663303][ T8204] Memory failure: 0x15e41e: recovery action for dirty LRU page: Recovered [ 141.663309][ T8204] Injecting memory failure for pfn 0x15e41d at process virtual address 0x20bd7000 [ 141.663325][ T8204] Memory failure: 0x15e41d: recovery action for dirty LRU page: Recovered [ 141.663331][ T8204] Injecting memory failure for pfn 0x15e41c at process virtual address 0x20bd8000 [ 141.663346][ T8204] Memory failure: 0x15e41c: recovery action for dirty LRU page: Recovered [ 141.663352][ T8204] Injecting memory failure for pfn 0x15e41b at process virtual address 0x20bd9000 [ 141.663367][ T8204] Memory failure: 0x15e41b: recovery action for dirty LRU page: Recovered [ 141.663373][ T8204] Injecting memory failure for pfn 0x15e41a at process virtual address 0x20bda000 [ 141.663389][ T8204] Memory failure: 0x15e41a: recovery action for dirty LRU page: Recovered [ 141.663395][ T8204] Injecting memory failure for pfn 0x15e419 at process virtual address 0x20bdb000 [ 141.663410][ T8204] Memory failure: 0x15e419: recovery action for dirty LRU page: Recovered [ 141.663416][ T8204] Injecting memory failure for pfn 0x15e418 at process virtual address 0x20bdc000 [ 141.663432][ T8204] Memory failure: 0x15e418: recovery action for dirty LRU page: Recovered [ 141.663438][ T8204] Injecting memory failure for pfn 0x15e417 at process virtual address 0x20bdd000 [ 141.663454][ T8204] Memory failure: 0x15e417: recovery action for dirty LRU page: Recovered [ 141.663459][ T8204] Injecting memory failure for pfn 0x15e416 at process virtual address 0x20bde000 [ 141.663477][ T8204] Memory failure: 0x15e416: recovery action for dirty LRU page: Recovered [ 141.663483][ T8204] Injecting memory failure for pfn 0x15e415 at process virtual address 0x20bdf000 [ 141.663498][ T8204] Memory failure: 0x15e415: recovery action for dirty LRU page: Recovered [ 141.663504][ T8204] Injecting memory failure for pfn 0x15e414 at process virtual address 0x20be0000 [ 141.663520][ T8204] Memory failure: 0x15e414: recovery action for dirty LRU page: Recovered [ 141.663526][ T8204] Injecting memory failure for pfn 0x15e413 at process virtual address 0x20be1000 [ 141.663541][ T8204] Memory failure: 0x15e413: recovery action for dirty LRU page: Recovered [ 141.663547][ T8204] Injecting memory failure for pfn 0x15e412 at process virtual address 0x20be2000 [ 141.663563][ T8204] Memory failure: 0x15e412: recovery action for dirty LRU page: Recovered [ 141.663568][ T8204] Injecting memory failure for pfn 0x15e411 at process virtual address 0x20be3000 [ 141.663584][ T8204] Memory failure: 0x15e411: recovery action for dirty LRU page: Recovered [ 141.663590][ T8204] Injecting memory failure for pfn 0x12a0b7 at process virtual address 0x20be4000 [ 141.663606][ T8204] Memory failure: 0x12a0b7: recovery action for dirty LRU page: Recovered [ 141.663611][ T8204] Injecting memory failure for pfn 0x12a0b6 at process virtual address 0x20be5000 [ 141.663627][ T8204] Memory failure: 0x12a0b6: recovery action for dirty LRU page: Recovered [ 141.663633][ T8204] Injecting memory failure for pfn 0x12a0b5 at process virtual address 0x20be6000 [ 141.663648][ T8204] Memory failure: 0x12a0b5: recovery action for dirty LRU page: Recovered [ 141.663654][ T8204] Injecting memory failure for pfn 0x12a0b4 at process virtual address 0x20be7000 [ 141.663673][ T8204] Memory failure: 0x12a0b4: recovery action for dirty LRU page: Recovered [ 141.663678][ T8204] Injecting memory failure for pfn 0x12a0b3 at process virtual address 0x20be8000 [ 141.663694][ T8204] Memory failure: 0x12a0b3: recovery action for dirty LRU page: Recovered [ 141.663700][ T8204] Injecting memory failure for pfn 0x12a0b2 at process virtual address 0x20be9000 [ 141.663716][ T8204] Memory failure: 0x12a0b2: recovery action for dirty LRU page: Recovered [ 141.663722][ T8204] Injecting memory failure for pfn 0x12a0b1 at process virtual address 0x20bea000 [ 141.663738][ T8204] Memory failure: 0x12a0b1: recovery action for dirty LRU page: Recovered [ 141.663743][ T8204] Injecting memory failure for pfn 0x12a0b0 at process virtual address 0x20beb000 [ 141.663759][ T8204] Memory failure: 0x12a0b0: recovery action for dirty LRU page: Recovered [ 141.663765][ T8204] Injecting memory failure for pfn 0x12a0df at process virtual address 0x20bec000 [ 141.663781][ T8204] Memory failure: 0x12a0df: recovery action for dirty LRU page: Recovered [ 141.663787][ T8204] Injecting memory failure for pfn 0x12a0de at process virtual address 0x20bed000 [ 141.663803][ T8204] Memory failure: 0x12a0de: recovery action for dirty LRU page: Recovered [ 141.663808][ T8204] Injecting memory failure for pfn 0x12a0dd at process virtual address 0x20bee000 [ 141.663824][ T8204] Memory failure: 0x12a0dd: recovery action for dirty LRU page: Recovered [ 141.663830][ T8204] Injecting memory failure for pfn 0x12a0dc at process virtual address 0x20bef000 [ 141.663845][ T8204] Memory failure: 0x12a0dc: recovery action for dirty LRU page: Recovered [ 141.663851][ T8204] Injecting memory failure for pfn 0x12a0db at process virtual address 0x20bf0000 [ 141.663867][ T8204] Memory failure: 0x12a0db: recovery action for dirty LRU page: Recovered [ 141.663873][ T8204] Injecting memory failure for pfn 0x12a0da at process virtual address 0x20bf1000 [ 141.663888][ T8204] Memory failure: 0x12a0da: recovery action for dirty LRU page: Recovered [ 141.663894][ T8204] Injecting memory failure for pfn 0x12a0d9 at process virtual address 0x20bf2000 [ 141.663909][ T8204] Memory failure: 0x12a0d9: recovery action for dirty LRU page: Recovered [ 141.663915][ T8204] Injecting memory failure for pfn 0x12a0d8 at process virtual address 0x20bf3000 [ 141.663932][ T8204] Memory failure: 0x12a0d8: recovery action for dirty LRU page: Recovered [ 141.663938][ T8204] Injecting memory failure for pfn 0x12a0d7 at process virtual address 0x20bf4000 [ 141.663953][ T8204] Memory failure: 0x12a0d7: recovery action for dirty LRU page: Recovered [ 141.663959][ T8204] Injecting memory failure for pfn 0x12a0d6 at process virtual address 0x20bf5000 [ 141.663975][ T8204] Memory failure: 0x12a0d6: recovery action for dirty LRU page: Recovered [ 141.663981][ T8204] Injecting memory failure for pfn 0x12a0d5 at process virtual address 0x20bf6000 [ 141.663997][ T8204] Memory failure: 0x12a0d5: recovery action for dirty LRU page: Recovered [ 141.664002][ T8204] Injecting memory failure for pfn 0x12a0d4 at process virtual address 0x20bf7000 [ 141.664018][ T8204] Memory failure: 0x12a0d4: recovery action for dirty LRU page: Recovered [ 141.664024][ T8204] Injecting memory failure for pfn 0x12a0f7 at process virtual address 0x20bf8000 [ 141.664040][ T8204] Memory failure: 0x12a0f7: recovery action for dirty LRU page: Recovered [ 141.664045][ T8204] Injecting memory failure for pfn 0x12a0f6 at process virtual address 0x20bf9000 [ 141.664061][ T8204] Memory failure: 0x12a0f6: recovery action for dirty LRU page: Recovered [ 141.664067][ T8204] Injecting memory failure for pfn 0x12a0f5 at process virtual address 0x20bfa000 [ 141.664083][ T8204] Memory failure: 0x12a0f5: recovery action for dirty LRU page: Recovered [ 141.664089][ T8204] Injecting memory failure for pfn 0x12a0f4 at process virtual address 0x20bfb000 [ 141.664104][ T8204] Memory failure: 0x12a0f4: recovery action for dirty LRU page: Recovered [ 141.664110][ T8204] Injecting memory failure for pfn 0x12a0f3 at process virtual address 0x20bfc000 [ 141.664126][ T8204] Memory failure: 0x12a0f3: recovery action for dirty LRU page: Recovered [ 141.664131][ T8204] Injecting memory failure for pfn 0x12a0f2 at process virtual address 0x20bfd000 [ 141.664147][ T8204] Memory failure: 0x12a0f2: recovery action for dirty LRU page: Recovered [ 141.664153][ T8204] Injecting memory failure for pfn 0x12a0f1 at process virtual address 0x20bfe000 [ 141.664168][ T8204] Memory failure: 0x12a0f1: recovery action for dirty LRU page: Recovered [ 141.664174][ T8204] Injecting memory failure for pfn 0x12a0f0 at process virtual address 0x20bff000 [ 141.664190][ T8204] Memory failure: 0x12a0f0: recovery action for dirty LRU page: Recovered [ 142.566080][ T8222] loop3: detected capacity change from 0 to 32768 [ 142.631767][ T8222] ocfs2: Slot 0 on device (7,3) was already allocated to this node! [ 142.632135][ T8222] OCFS2: ERROR (device loop3): int ocfs2_validate_inode_block(struct super_block *, struct buffer_head *): Invalid dinode 73: bits per cluster 32 [ 142.632146][ T8222] On-disk corruption discovered. Please run fsck.ocfs2 once the filesystem is unmounted. [ 142.632151][ T8222] OCFS2: File system is now read-only. [ 142.632155][ T8222] (syz.3.323,8222,0):ocfs2_read_locked_inode:599 ERROR: status = -30 [ 142.632200][ T8222] (syz.3.323,8222,0):_ocfs2_get_system_file_inode:144 ERROR: status = -30 [ 142.632373][ T8222] (syz.3.323,8222,0):ocfs2_init_local_system_inodes:496 ERROR: status=-30, sysfile=8, slot=0 [ 142.632382][ T8222] (syz.3.323,8222,0):ocfs2_init_local_system_inodes:505 ERROR: status = -30 [ 142.632389][ T8222] (syz.3.323,8222,0):ocfs2_mount_volume:1758 ERROR: status = -30 [ 142.637942][ T8222] (syz.3.323,8222,0):ocfs2_fill_super:1177 ERROR: status = -30 [ 142.968205][ T8220] loop0: detected capacity change from 0 to 65536 [ 143.720375][ T8220] XFS (loop0): Mounting V5 Filesystem 9b7348e5-2fa0-41a5-9526-c53a678b01f3 [ 143.999383][ T8220] XFS (loop0): Ending clean mount [ 144.004561][ T8220] XFS (loop0): Quotacheck needed: Please wait. [ 144.017990][ T8220] XFS (loop0): Quotacheck: Done. [ 144.221707][ T8252] loop3: detected capacity change from 0 to 32768 [ 144.295633][ T8252] XFS (loop3): Mounting V5 Filesystem d7dc424e-7990-42cb-9f91-9cb7200a101d [ 144.301541][ T6568] XFS (loop0): Unmounting Filesystem 9b7348e5-2fa0-41a5-9526-c53a678b01f3 [ 144.315200][ T8252] XFS (loop3): Ending clean mount [ 144.869526][ T8280] trusted_key: syz.0.332 sent an empty control message without MSG_MORE. [ 145.912655][ T6575] XFS (loop3): Unmounting Filesystem d7dc424e-7990-42cb-9f91-9cb7200a101d [ 148.226020][ T8316] netlink: 260 bytes leftover after parsing attributes in process `syz.3.344'. [ 148.227970][ T8316] Invalid ELF header magic: != ELF [ 149.058438][ T8331] netlink: 24 bytes leftover after parsing attributes in process `syz.1.348'. [ 149.526224][ T8340] netlink: 4 bytes leftover after parsing attributes in process `syz.3.351'. [ 150.344837][ T8343] vlan2: entered allmulticast mode [ 150.345727][ T8343] bond_slave_1: entered allmulticast mode [ 151.808992][ T8376] vlan2: entered allmulticast mode [ 151.972877][ T8380] netlink: 24 bytes leftover after parsing attributes in process `syz.4.360'. [ 152.098451][ T8383] loop2: detected capacity change from 0 to 4096 [ 152.105551][ T8383] ntfs3(loop2): Different NTFS sector size (2048) and media sector size (512). [ 152.206691][ T8383] ntfs3(loop2): Failed to load root (-22). [ 152.798827][ T8386] loop3: detected capacity change from 0 to 65536 [ 152.852728][ T8386] XFS (loop3): Mounting V5 Filesystem 9b7348e5-2fa0-41a5-9526-c53a678b01f3 [ 152.870302][ T8386] XFS (loop3): Ending clean mount [ 152.874170][ T8386] XFS (loop3): Quotacheck needed: Please wait. [ 152.888195][ T8386] XFS (loop3): Quotacheck: Done. [ 152.912333][ T6575] XFS (loop3): Unmounting Filesystem 9b7348e5-2fa0-41a5-9526-c53a678b01f3 [ 153.883006][ T8419] loop0: detected capacity change from 0 to 32768 [ 153.883429][ T8419] BTRFS warning: excessive commit interval 2147483647, use with care [ 153.883890][ T8419] BTRFS: device fsid c9fe44da-de57-406a-8241-57ec7d4412cf devid 1 transid 8 /dev/loop0 (7:0) scanned by syz.0.368 (8419) [ 153.886045][ T8419] BTRFS info (device loop0): first mount of filesystem c9fe44da-de57-406a-8241-57ec7d4412cf [ 153.886088][ T8419] BTRFS info (device loop0): using crc32c (crc32c-lib) checksum algorithm [ 153.886103][ T8419] BTRFS error (device loop0): superblock checksum mismatch [ 153.886154][ T8419] BTRFS error (device loop0): open_ctree failed: -22 [ 153.994153][ T8420] loop2: detected capacity change from 0 to 32768 [ 153.999159][ T8420] btrfs: Deprecated parameter 'usebackuproot' [ 153.999421][ T8420] BTRFS warning: 'usebackuproot' is deprecated, use 'rescue=usebackuproot' instead [ 154.003353][ T8420] BTRFS: device fsid c9fe44da-de57-406a-8241-57ec7d4412cf devid 1 transid 8 /dev/loop2 (7:2) scanned by syz.2.369 (8420) [ 154.009443][ T8420] BTRFS info (device loop2): first mount of filesystem c9fe44da-de57-406a-8241-57ec7d4412cf [ 154.009743][ T8420] BTRFS info (device loop2): using crc32c (crc32c-lib) checksum algorithm [ 154.078514][ T8422] loop3: detected capacity change from 0 to 128 [ 154.093775][ T8422] hpfs: filesystem error: invalid number of hotfixes: 2066844986, used: 2066844985; already mounted read-only [ 154.096379][ T8422] hpfs: filesystem error: improperly stopped [ 154.097622][ T8422] hpfs: filesystem error: warning: spare dnodes used, try chkdsk [ 154.099145][ T8422] hpfs: You really don't want any checks? You are crazy... [ 154.102395][ T8422] hpfs: hpfs_map_sector(): read error [ 154.103036][ T8422] hpfs: code page support is disabled [ 154.103695][ T8422] hpfs: hpfs_map_4sectors(): unaligned read [ 154.103744][ T8422] hpfs: hpfs_map_4sectors(): unaligned read [ 154.103752][ T8422] hpfs: filesystem error: unable to find root dir [ 154.133451][ T7290] BTRFS warning (device loop2): checksum verify failed on logical 5337088 mirror 1 wanted 0xe63dbdda found 0xc926492d level 0 [ 154.133548][ T8420] BTRFS error (device loop2): failed to load root extent [ 154.133837][ T8420] BTRFS warning (device loop2): try to load backup roots slot 1 [ 154.134220][ T7290] BTRFS warning (device loop2): checksum verify failed on logical 5324800 mirror 1 wanted 0x9f73850b found 0x80379423 level 0 [ 154.135412][ T8420] BTRFS warning (device loop2): couldn't read tree root [ 154.135626][ T8420] BTRFS warning (device loop2): try to load backup roots slot 2 [ 154.136032][ T7290] BTRFS error (device loop2): level verify failed on logical 5255168 mirror 1 wanted 0 found 1 [ 154.136409][ T8420] BTRFS warning (device loop2): couldn't read tree root [ 154.136433][ T8420] BTRFS warning (device loop2): try to load backup roots slot 3 [ 154.141989][ T8420] BTRFS info (device loop2): rebuilding free space tree [ 154.150935][ T8420] BTRFS info (device loop2): checking UUID tree [ 154.151614][ T8420] BTRFS info (device loop2): setting nodatasum [ 154.151845][ T8420] BTRFS info (device loop2): setting nodatacow [ 154.151877][ T8420] BTRFS info (device loop2): enabling ssd optimizations [ 154.151908][ T8420] BTRFS info (device loop2): turning on async discard [ 154.151928][ T8420] BTRFS info (device loop2): enabling free space tree [ 154.151939][ T8420] BTRFS info (device loop2): force clearing of disk cache [ 154.151948][ T8420] BTRFS info (device loop2): trying to use backup root at mount time [ 154.151958][ T8420] BTRFS info (device loop2): max_inline set to 4096 [ 154.291987][ T8444] ptrace attach of "./syz-executor exec"[6575] was attempted by "./syz-executor exec"[8444] [ 154.315302][ T8444] hpfs: hpfs_map_4sectors(): unaligned read [ 155.216633][ T8454] netlink: 24 bytes leftover after parsing attributes in process `syz.3.372'. [ 155.304273][ T6571] BTRFS info (device loop2): last unmount of filesystem c9fe44da-de57-406a-8241-57ec7d4412cf [ 155.618150][ T31] audit: type=1326 audit(155.590:3): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=8460 comm="syz.2.375" exe="/root/syz-executor" sig=31 arch=c00000b7 syscall=98 compat=0 ip=0xffff8ef5b9e8 code=0x0 [ 156.287198][ T8472] capability: warning: `syz.3.377' uses 32-bit capabilities (legacy support in use) [ 158.362938][ T8508] netlink: 12 bytes leftover after parsing attributes in process `syz.2.386'. [ 158.736448][ T6162] Bluetooth: hci3: command 0x0406 tx timeout [ 158.737817][ T6162] Bluetooth: hci0: command 0x0406 tx timeout [ 158.739015][ T6162] Bluetooth: hci4: command 0x0406 tx timeout [ 158.741659][ T6162] Bluetooth: hci1: command 0x0406 tx timeout [ 159.226524][ T8523] loop0: detected capacity change from 0 to 65536 [ 159.490120][ T8523] XFS (loop0): Mounting V5 Filesystem 9b7348e5-2fa0-41a5-9526-c53a678b01f3 [ 159.499410][ T8523] XFS (loop0): Ending clean mount [ 159.505336][ T8523] XFS (loop0): Quotacheck needed: Please wait. [ 159.817852][ T8523] XFS (loop0): Quotacheck: Done. [ 159.957393][ T8545] netlink: 4 bytes leftover after parsing attributes in process `syz.4.393'. [ 160.486084][ T8542] vlan2: entered allmulticast mode [ 160.691956][ T8551] affs: No valid root block on device nullb0 [ 162.162451][ T8566] netlink: 12 bytes leftover after parsing attributes in process `syz.3.399'. [ 162.211685][ T6568] XFS (loop0): Unmounting Filesystem 9b7348e5-2fa0-41a5-9526-c53a678b01f3 [ 163.172644][ T8589] loop2: detected capacity change from 0 to 4096 [ 163.173216][ T8589] EXT4-fs: Ignoring removed mblk_io_submit option [ 163.177311][ T8589] EXT4-fs (loop2): Test dummy encryption mode enabled [ 163.249640][ T8589] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 164.276819][ T8600] vlan2: entered allmulticast mode [ 164.308860][ T8604] vlan2: entered allmulticast mode [ 164.316942][ T6571] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 164.480987][ T8612] netlink: 12 bytes leftover after parsing attributes in process `syz.0.412'. [ 166.767512][ T8651] sctp: [Deprecated]: syz.2.419 (pid 8651) Use of struct sctp_assoc_value in delayed_ack socket option. [ 166.767512][ T8651] Use struct sctp_sack_info instead [ 166.872904][ T6765] IPVS: starting estimator thread 0... [ 167.020918][ T8658] IPVS: using max 60 ests per chain, 144000 per kthread [ 167.830752][ T8654] vlan2: entered allmulticast mode [ 167.907965][ T8661] loop2: detected capacity change from 0 to 764 [ 168.751140][ T8680] netlink: 12 bytes leftover after parsing attributes in process `syz.1.426'. [ 168.754036][ T8678] netlink: 12 bytes leftover after parsing attributes in process `syz.2.436'. [ 168.760618][ T8678] bridge0: port 3(batadv1) entered blocking state [ 168.763225][ T8678] bridge0: port 3(batadv1) entered disabled state [ 168.764740][ T8678] batadv1: entered allmulticast mode [ 168.766713][ T8678] batadv1: entered promiscuous mode [ 168.817858][ T8678] loop2: detected capacity change from 0 to 512 [ 169.270294][ T4169] batman_adv: batadv1: No IGMP Querier present - multicast optimizations disabled [ 169.270318][ T4169] batman_adv: batadv1: No MLD Querier present - multicast optimizations disabled [ 169.655051][ T8696] netlink: 28 bytes leftover after parsing attributes in process `syz.0.430'. [ 169.886674][ T8707] comedi comedi0: bad chanlist[0]=0xffffffff chan=65535 range length=2 [ 169.908146][ T8707] loop2: detected capacity change from 0 to 4096 [ 169.920919][ T8707] ntfs3: Unknown parameter '18446744073709551615' [ 171.029358][ T8716] infiniband syz2: set down [ 171.029402][ T8716] infiniband syz2: added ipvlan0 [ 171.968498][ T8709] fuse: Unknown parameter 'grou' [ 171.990603][ T8716] RDS/IB: syz2: added [ 171.990807][ T8716] smc: adding ib device syz2 with port count 1 [ 171.990862][ T8716] smc: ib device syz2 port 1 has no pnetid [ 172.479237][ T8729] vhci_hcd vhci_hcd.2: invalid port number 96 [ 172.479333][ T8729] vhci_hcd vhci_hcd.2: default hub control req: 2000 vfffc i0060 l7 [ 172.549208][ T8726] netlink: 12 bytes leftover after parsing attributes in process `syz.0.440'. [ 172.655724][ T8735] lo speed is unknown, defaulting to 1000 [ 173.728946][ T8748] netlink: 28 bytes leftover after parsing attributes in process `syz.0.443'. [ 174.282295][ T8757] loop2: detected capacity change from 0 to 4096 [ 175.031373][ T8769] xt_hashlimit: size too large, truncated to 1048576 [ 175.427136][ T8778] netlink: 28 bytes leftover after parsing attributes in process `syz.1.454'. [ 175.478770][ T8774] loop0: detected capacity change from 0 to 32768 [ 175.479454][ T8779] vlan2: entered allmulticast mode [ 175.479936][ T8774] BTRFS: device fsid 395ef67a-297e-477c-816d-cd80a5b93e5d devid 1 transid 8 /dev/loop0 (7:0) scanned by syz.0.451 (8774) [ 175.483952][ T8774] BTRFS info (device loop0): first mount of filesystem 395ef67a-297e-477c-816d-cd80a5b93e5d [ 175.483987][ T8774] BTRFS info (device loop0): using sha256 (sha256-lib) checksum algorithm [ 175.499394][ T8774] BTRFS info (device loop0): rebuilding free space tree [ 175.504646][ T8774] BTRFS info (device loop0): enabling ssd optimizations [ 175.504681][ T8774] BTRFS info (device loop0): using spread ssd allocation scheme [ 175.504691][ T8774] BTRFS info (device loop0): turning on async discard [ 175.504699][ T8774] BTRFS info (device loop0): enabling free space tree [ 175.504707][ T8774] BTRFS info (device loop0): force clearing of disk cache [ 175.519255][ T8794] vlan2: entered allmulticast mode [ 175.626119][ T8798] netlink: 12 bytes leftover after parsing attributes in process `syz.3.455'. [ 175.814380][ T8801] netlink: 'syz.0.451': attribute type 4 has an invalid length. [ 175.957873][ T8806] netlink: 28 bytes leftover after parsing attributes in process `syz.1.457'. [ 176.432335][ T6568] BTRFS info (device loop0): last unmount of filesystem 395ef67a-297e-477c-816d-cd80a5b93e5d [ 177.299126][ T8831] loop3: detected capacity change from 0 to 256 [ 177.311997][ T8831] exfat: Deprecated parameter 'utf8' [ 177.312024][ T8831] exfat: Deprecated parameter 'utf8' [ 177.340777][ T8831] exFAT-fs (loop3): failed to load upcase table (idx : 0x00010000, chksum : 0xf6e00961, utbl_chksum : 0xe619d30d) [ 179.953841][ T8853] netlink: 28 bytes leftover after parsing attributes in process `syz.1.468'. [ 179.964175][ T8850] vlan2: entered allmulticast mode [ 179.967567][ T8855] netlink: 28 bytes leftover after parsing attributes in process `syz.1.469'. [ 180.210772][ T8855] vlan2: entered allmulticast mode [ 181.401926][ T8889] overlayfs: failed to clone upperpath [ 181.453276][ T8893] loop0: detected capacity change from 0 to 128 [ 181.471641][ T8893] EXT4-fs (loop0): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 181.953594][ T6568] EXT4-fs (loop0): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 181.968389][ T8916] tipc: Enabling of bearer rejected, failed to enable media [ 182.115889][ T8916] warning: `syz.4.476' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 182.395277][ T8929] netlink: 28 bytes leftover after parsing attributes in process `syz.4.479'. [ 182.660839][ T8936] tipc: Enabling of bearer rejected, already enabled [ 182.662322][ T8936] syzkaller0: entered promiscuous mode [ 182.777537][ T8939] vlan2: entered allmulticast mode [ 183.172651][ T8941] loop2: detected capacity change from 0 to 40427 [ 183.176357][ T8941] F2FS-fs (loop2): invalid crc value [ 183.187020][ T8953] loop3: detected capacity change from 0 to 64 [ 183.471317][ T8941] F2FS-fs (loop2): f2fs_recover_fsync_data: recovery fsync data, check_only: 0 [ 183.480512][ T8934] syzkaller0: left promiscuous mode [ 183.482841][ T8941] F2FS-fs (loop2): Mounted with checkpoint version = 48b305e5 [ 183.583336][ T8958] hfs: filesystem was not cleanly unmounted, running fsck.hfs is recommended. leaving read-only. [ 184.003853][ T6571] syz-executor: attempt to access beyond end of device [ 184.003853][ T6571] loop2: rw=2049, sector=45096, nr_sectors = 8 limit=40427 [ 184.003914][ T6571] CPU: 0 UID: 0 PID: 6571 Comm: syz-executor Tainted: G L syzkaller #0 PREEMPT [ 184.003930][ T6571] Tainted: [L]=SOFTLOCKUP [ 184.003935][ T6571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 184.003939][ T6571] Call trace: [ 184.003942][ T6571] show_stack+0x2c/0x3c (C) [ 184.003958][ T6571] __dump_stack+0x30/0x40 [ 184.003965][ T6571] dump_stack_lvl+0xd8/0x12c [ 184.003971][ T6571] dump_stack+0x1c/0x28 [ 184.003977][ T6571] f2fs_handle_critical_error+0x34c/0x4b8 [ 184.003985][ T6571] f2fs_stop_checkpoint+0x5c/0x70 [ 184.003992][ T6571] f2fs_write_end_io+0x770/0xa78 [ 184.003998][ T6571] bio_endio+0x8d4/0x910 [ 184.004005][ T6571] submit_bio_noacct+0xd44/0x186c [ 184.004010][ T6571] submit_bio+0x3b4/0x550 [ 184.004016][ T6571] f2fs_submit_write_bio+0x124/0x324 [ 184.004021][ T6571] __submit_merged_bio+0x224/0x6d4 [ 184.004026][ T6571] __submit_merged_write_cond+0x250/0x4ac [ 184.004030][ T6571] f2fs_write_data_pages+0x1dd4/0x2878 [ 184.004036][ T6571] do_writepages+0x270/0x468 [ 184.004046][ T6571] filemap_fdatawrite+0x14c/0x1f4 [ 184.004053][ T6571] f2fs_sync_dirty_inodes+0x2a0/0x788 [ 184.004060][ T6571] f2fs_write_checkpoint+0x708/0x1c28 [ 184.004067][ T6571] kill_f2fs_super+0x230/0x580 [ 184.004072][ T6571] deactivate_locked_super+0xc4/0x12c [ 184.004079][ T6571] deactivate_super+0xe0/0x100 [ 184.004085][ T6571] cleanup_mnt+0x31c/0x3ac [ 184.004092][ T6571] __cleanup_mnt+0x20/0x30 [ 184.004098][ T6571] task_work_run+0x1dc/0x260 [ 184.004106][ T6571] exit_to_user_mode_loop+0x10c/0x18c [ 184.004111][ T6571] el0_svc+0x17c/0x26c [ 184.004118][ T6571] el0t_64_sync_handler+0x84/0x12c [ 184.004124][ T6571] el0t_64_sync+0x198/0x19c [ 184.004896][ T6571] F2FS-fs (loop2): Stopped filesystem due to reason: 3 [ 184.411749][ T8971] netlink: 28 bytes leftover after parsing attributes in process `syz.2.490'. [ 184.974074][ T8984] loop0: detected capacity change from 0 to 1024 [ 184.974474][ T8984] EXT4-fs: Ignoring removed orlov option [ 184.974506][ T8984] EXT4-fs: Ignoring removed orlov option [ 185.013666][ T8984] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 186.258602][ T8999] vlan2: entered allmulticast mode [ 186.273980][ T6568] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 186.739682][ T9007] loop2: detected capacity change from 0 to 128 [ 186.741955][ T9007] EXT4-fs (loop2): can't mount with data=, fs mounted w/o journal [ 187.454922][ T2466] ieee802154 phy0 wpan0: encryption failed: -22 [ 187.456279][ T2466] ieee802154 phy1 wpan1: encryption failed: -22 [ 187.648232][ T9027] netlink: 8 bytes leftover after parsing attributes in process `syz.2.503'. [ 188.548418][ T9039] netlink: 48 bytes leftover after parsing attributes in process `syz.3.507'. [ 188.716266][ T9039] loop3: detected capacity change from 0 to 32768 [ 188.732127][ T9039] BTRFS: device fsid c9fe44da-de57-406a-8241-57ec7d4412cf devid 1 transid 8 /dev/loop3 (7:3) scanned by syz.3.507 (9039) [ 201.953634][ T6569] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 201.956692][ T6569] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 201.958732][ T6569] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 201.960861][ T6569] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 201.962301][ T6569] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 202.027067][ T9052] lo speed is unknown, defaulting to 1000 [ 202.043605][ T6569] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 202.046234][ T6569] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 202.048267][ T6569] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 202.050608][ T6569] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 202.052023][ T6569] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 202.127238][ T9058] lo speed is unknown, defaulting to 1000 [ 202.210907][ T9052] chnl_net:caif_netlink_parms(): no params data found [ 202.966115][ T6583] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 202.968845][ T6583] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 202.971009][ T6583] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 202.972598][ T6583] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 202.974413][ T6583] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 203.982205][ T6583] Bluetooth: hci8: unexpected cc 0x0c03 length: 249 > 1 [ 203.985044][ T6583] Bluetooth: hci8: unexpected cc 0x1003 length: 249 > 9 [ 203.987067][ T6583] Bluetooth: hci8: unexpected cc 0x1001 length: 249 > 9 [ 203.989000][ T6583] Bluetooth: hci8: unexpected cc 0x0c23 length: 249 > 4 [ 203.991519][ T6583] Bluetooth: hci8: unexpected cc 0x0c38 length: 249 > 2 [ 204.010107][ T6583] Bluetooth: hci5: command tx timeout [ 204.090067][ T6583] Bluetooth: hci6: command tx timeout [ 205.050036][ T6583] Bluetooth: hci7: command tx timeout [ 206.011229][ T6583] Bluetooth: hci8: command tx timeout [ 206.090049][ T6583] Bluetooth: hci5: command tx timeout [ 206.170017][ T6583] Bluetooth: hci6: command tx timeout [ 207.130036][ T6583] Bluetooth: hci7: command tx timeout [ 208.090138][ T6583] Bluetooth: hci8: command tx timeout [ 208.149972][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [aoe_tx0:2466] [ 208.149987][ C1] Modules linked in: [ 208.149994][ C1] irq event stamp: 60657031 [ 208.152513][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 208.154063][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 208.155573][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 208.156883][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 208.158389][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G L syzkaller #0 PREEMPT [ 208.158407][ C1] Tainted: [L]=SOFTLOCKUP [ 208.158410][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.158416][ C1] pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.158424][ C1] pc : _raw_spin_unlock_irqrestore+0x44/0x98 [ 208.158432][ C1] lr : _raw_spin_unlock_irqrestore+0x38/0x98 [ 208.158438][ C1] sp : ffff8000a1ee7700 [ 208.158441][ C1] x29: ffff8000a1ee7700 x28: ffff0000d1d702f0 x27: 0000000000000000 [ 208.158450][ C1] x26: ffff0000d1d70280 x25: ffff0000dc09c238 x24: dfff800000000000 [ 208.158458][ C1] x23: 0000000000000003 x22: 0000000000000000 x21: ffff8000914d0520 [ 208.158465][ C1] x20: ffff80009794d920 x19: 0000000000000000 x18: 00000000ffffffff [ 208.158472][ C1] x17: ffff800093599000 x16: ffff800080538fe4 x15: 0000000000000001 [ 208.158479][ C1] x14: 1ffff00012f29b24 x13: 0000000000000000 x12: 0000000000000000 [ 208.158486][ C1] x11: ffff800093398d48 x10: 0000000000000003 x9 : 0000000000000000 [ 208.158493][ C1] x8 : 00000000000000c0 x7 : ffff800083bc4030 x6 : 0000000000000000 [ 208.158499][ C1] x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000010 [ 208.158506][ C1] x2 : 0000000000000002 x1 : ffff80008ee5c0d2 x0 : ffff80010c451000 [ 208.158513][ C1] Call trace: [ 208.158515][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.158523][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.158530][ C1] uart_write_room+0xa4/0x15c [ 208.158536][ C1] tty_write_room+0x6c/0x8c [ 208.158541][ C1] handle_tx+0x128/0x5fc [ 208.158547][ C1] caif_xmit+0x108/0x150 [ 208.158552][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.158559][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.158563][ C1] tx+0x9c/0x1cc [ 208.158570][ C1] kthread+0x164/0x354 [ 208.158575][ C1] kthread+0x5fc/0x75c [ 208.158581][ C1] ret_from_fork+0x10/0x20 [ 208.158589][ C1] Sending NMI from CPU 1 to CPUs 0: [ 208.158598][ C0] NMI backtrace for cpu 0 [ 208.158609][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G L syzkaller #0 PREEMPT [ 208.158618][ C0] Tainted: [L]=SOFTLOCKUP [ 208.158621][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.158625][ C0] pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.158630][ C0] pc : arch_local_irq_enable+0x8/0xc [ 208.158640][ C0] lr : default_idle_call+0xd0/0xfc [ 208.158647][ C0] sp : ffff80008f7e7d20 [ 208.158650][ C0] x29: ffff80008f7e7d20 x28: dfff800000000000 x27: ffff80008b04fd80 [ 208.158662][ C0] x26: 0000000000000000 x25: 0000000000000000 x24: 1ffff00011f0dd05 [ 208.158671][ C0] x23: 1ffff00011f12c90 x22: ffff80008f86e828 x21: 0000000000000001 [ 208.158680][ C0] x20: 0000000000000000 x19: ffff8000804d807c x18: 1fffe0003377d090 [ 208.158687][ C0] x17: ffff80008f86e000 x16: ffff8000804d7998 x15: 0000000000000001 [ 208.158694][ C0] x14: 1fffe0003377ed37 x13: 0000000000000000 x12: 0000000000000000 [ 208.158701][ C0] x11: ffff60003377ed38 x10: 0000000000000003 x9 : 0000000000000000 [ 208.158708][ C0] x8 : 00000000000eb703 x7 : ffff800080677148 x6 : 0000000000000000 [ 208.158715][ C0] x5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff80008af9a954 [ 208.158721][ C0] x2 : 0000000000000000 x1 : ffff80008ee5c0d2 x0 : ffff80010c42d000 [ 208.158728][ C0] Call trace: [ 208.158731][ C0] arch_local_irq_enable+0x8/0xc (P) [ 208.158737][ C0] do_idle+0x1e0/0x474 [ 208.158743][ C0] cpu_startup_entry+0x5c/0x74 [ 208.158748][ C0] rest_init+0x2d8/0x2f4 [ 208.158753][ C0] start_kernel+0x38c/0x3dc [ 208.158761][ C0] __primary_switched+0x8c/0x94 [ 208.159598][ C1] Kernel panic - not syncing: softlockup: hung tasks [ 208.211304][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G L syzkaller #0 PREEMPT [ 208.212874][ C1] Tainted: [L]=SOFTLOCKUP [ 208.213561][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.215082][ C1] Call trace: [ 208.215578][ C1] show_stack+0x2c/0x3c (C) [ 208.216303][ C1] __dump_stack+0x30/0x40 [ 208.216964][ C1] dump_stack_lvl+0x30/0x12c [ 208.217662][ C1] dump_stack+0x1c/0x28 [ 208.218293][ C1] vpanic+0x22c/0x6c0 [ 208.218921][ C1] vpanic+0x0/0x6c0 [ 208.219513][ C1] softlockup_fn+0x0/0x120 [ 208.220167][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.221067][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.221834][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.222629][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.223460][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.224290][ C1] gic_handle_irq+0x6c/0x18c [ 208.224980][ C1] call_on_irq_stack+0x30/0x48 [ 208.225709][ C1] do_interrupt_handler+0xd4/0x138 [ 208.226443][ C1] el1_interrupt+0x3c/0x60 [ 208.227121][ C1] el1h_64_irq_handler+0x18/0x24 [ 208.227902][ C1] el1h_64_irq+0x6c/0x70 [ 208.228546][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.229431][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.230322][ C1] uart_write_room+0xa4/0x15c [ 208.231095][ C1] tty_write_room+0x6c/0x8c [ 208.231778][ C1] handle_tx+0x128/0x5fc [ 208.232440][ C1] caif_xmit+0x108/0x150 [ 208.233064][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.233795][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.234587][ C1] tx+0x9c/0x1cc [ 208.235106][ C1] kthread+0x164/0x354 [ 208.235668][ C1] kthread+0x5fc/0x75c [ 208.236274][ C1] ret_from_fork+0x10/0x20 [ 208.236968][ C1] SMP: stopping secondary CPUs [ 208.237626][ C1] Kernel Offset: disabled [ 208.238285][ C1] CPU features: 0x400000,00078001,04e04501,5427fea7 [ 208.239350][ C1] Memory Limit: none [ 208.239968][ C1] [ 208.240293][ C1] ============================= [ 208.241049][ C1] [ BUG: Invalid wait context ] [ 208.241781][ C1] syzkaller #0 Tainted: G L [ 208.242713][ C1] ----------------------------- [ 208.243487][ C1] aoe_tx0/2466 is trying to lock: [ 208.244311][ C1] ffff0000c1b0b528 (&k->list_lock){+.+.}-{3:3}, at: bus_for_each_dev+0xa0/0x290 [ 208.245680][ C1] other info that might help us debug this: [ 208.246548][ C1] context-{2:2} [ 208.247094][ C1] 3 locks held by aoe_tx0/2466: [ 208.247811][ C1] #0: ffff80008fa5b740 (rcu_read_lock_bh){....}-{1:3}, at: rcu_lock_acquire+0x18/0x54 [ 208.249328][ C1] #1: ffff0000d34fcd58 (_xmit_NONE#2){+...}-{3:3}, at: __dev_queue_xmit+0xdc0/0x2a78 [ 208.250890][ C1] #2: ffff80008fa5b6e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire+0x10/0x4c [ 208.252395][ C1] stack backtrace: [ 208.252990][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G L syzkaller #0 PREEMPT [ 208.254590][ C1] Tainted: [L]=SOFTLOCKUP [ 208.255291][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.256895][ C1] Call trace: [ 208.257349][ C1] show_stack+0x2c/0x3c (C) [ 208.258025][ C1] __dump_stack+0x30/0x40 [ 208.258687][ C1] dump_stack_lvl+0x30/0x12c [ 208.259378][ C1] dump_stack+0x1c/0x28 [ 208.260030][ C1] __lock_acquire+0xaec/0x30a4 [ 208.260757][ C1] lock_acquire+0x140/0x2e0 [ 208.261479][ C1] _raw_spin_lock+0x48/0x60 [ 208.262135][ C1] bus_for_each_dev+0xa0/0x290 [ 208.262910][ C1] coresight_panic_cb+0x2c/0x3c [ 208.263641][ C1] notifier_call_chain+0x190/0x4cc [ 208.264414][ C1] atomic_notifier_call_chain+0xd0/0x180 [ 208.265324][ C1] vpanic+0x2c0/0x6c0 [ 208.265903][ C1] vpanic+0x0/0x6c0 [ 208.266506][ C1] softlockup_fn+0x0/0x120 [ 208.267163][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.267951][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.268710][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.269536][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.270342][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.271166][ C1] gic_handle_irq+0x6c/0x18c [ 208.271879][ C1] call_on_irq_stack+0x30/0x48 [ 208.272558][ C1] do_interrupt_handler+0xd4/0x138 [ 208.273333][ C1] el1_interrupt+0x3c/0x60 [ 208.273938][ C1] el1h_64_irq_handler+0x18/0x24 [ 208.274650][ C1] el1h_64_irq+0x6c/0x70 [ 208.275300][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.276186][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.276948][ C1] uart_write_room+0xa4/0x15c [ 208.277680][ C1] tty_write_room+0x6c/0x8c [ 208.278323][ C1] handle_tx+0x128/0x5fc [ 208.278958][ C1] caif_xmit+0x108/0x150 [ 208.279551][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.280322][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.281054][ C1] tx+0x9c/0x1cc [ 208.281592][ C1] kthread+0x164/0x354 [ 208.282178][ C1] kthread+0x5fc/0x75c [ 208.282797][ C1] ret_from_fork+0x10/0x20 [ 208.292426][ C1] Calling EFI runtime from hardirq context [ 208.293202][ C1] ------------[ cut here ]------------ [ 208.293982][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 208.295585][ C1] Modules linked in: [ 208.296159][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G L syzkaller #0 PREEMPT [ 208.297730][ C1] Tainted: [L]=SOFTLOCKUP [ 208.298340][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.299848][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.301015][ C1] pc : force_signal_inject+0x248/0x26c [ 208.301756][ C1] lr : force_signal_inject+0x248/0x26c [ 208.302549][ C1] sp : ffff800097bd7420 [ 208.303130][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 208.304287][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 208.305446][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 208.306640][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 208.307733][ C1] x17: 0000000000000000 x16: ffff800082e5ee8c x15: 0000000000000001 [ 208.308863][ C1] x14: 1fffe000337818fa x13: 0000000000000000 x12: 0000000000000000 [ 208.310114][ C1] x11: ffff6000337818fb x10: 0000000000ff0100 x9 : 0000000000010205 [ 208.311313][ C1] x8 : ffff0000cea80000 x7 : 0000000000164290 x6 : 0000000000164258 [ 208.312574][ C1] x5 : ffff800097bd6dd8 x4 : ffff80008f9538a8 x3 : 0000000000000000 [ 208.313719][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 208.314896][ C1] Call trace: [ 208.315409][ C1] force_signal_inject+0x248/0x26c (P) [ 208.316183][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 208.316886][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 208.317724][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 208.318496][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 208.319333][ C1] efi_pstore_write+0x2dc/0x3fc [ 208.319981][ C1] pstore_dump+0x538/0x880 [ 208.320604][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 208.321309][ C1] vpanic+0x2d4/0x6c0 [ 208.321931][ C1] vpanic+0x0/0x6c0 [ 208.322508][ C1] softlockup_fn+0x0/0x120 [ 208.323217][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.323960][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.324704][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.325523][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.326330][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.327172][ C1] gic_handle_irq+0x6c/0x18c [ 208.327846][ C1] call_on_irq_stack+0x30/0x48 [ 208.328534][ C1] do_interrupt_handler+0xd4/0x138 [ 208.329279][ C1] el1_interrupt+0x3c/0x60 [ 208.329960][ C1] el1h_64_irq_handler+0x18/0x24 [ 208.330705][ C1] el1h_64_irq+0x6c/0x70 [ 208.331329][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.332173][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.332950][ C1] uart_write_room+0xa4/0x15c [ 208.333637][ C1] tty_write_room+0x6c/0x8c [ 208.334268][ C1] handle_tx+0x128/0x5fc [ 208.334859][ C1] caif_xmit+0x108/0x150 [ 208.335478][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.336235][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.337053][ C1] tx+0x9c/0x1cc [ 208.337590][ C1] kthread+0x164/0x354 [ 208.338234][ C1] kthread+0x5fc/0x75c [ 208.338815][ C1] ret_from_fork+0x10/0x20 [ 208.339452][ C1] irq event stamp: 60657031 [ 208.340090][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 208.341588][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 208.343060][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 208.344462][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 208.345972][ C1] ---[ end trace 0000000000000000 ]--- [ 208.359987][ C1] Calling EFI runtime from hardirq context [ 208.360851][ C1] ------------[ cut here ]------------ [ 208.361687][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 208.363337][ C1] Modules linked in: [ 208.363949][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 208.365492][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 208.366304][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.367878][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.369001][ C1] pc : force_signal_inject+0x248/0x26c [ 208.369823][ C1] lr : force_signal_inject+0x248/0x26c [ 208.370594][ C1] sp : ffff800097bd7420 [ 208.371239][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 208.372423][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 208.373578][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 208.374772][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 208.375945][ C1] x17: 0000000000000000 x16: ffff800082e5ee8c x15: 0000000000000001 [ 208.377182][ C1] x14: 1fffe000337818fa x13: 0000000000000000 x12: 0000000000000000 [ 208.378377][ C1] x11: ffff6000337818fb x10: 0000000000ff0100 x9 : 0000000000010205 [ 208.379562][ C1] x8 : ffff0000cea80000 x7 : 0000000000164ff8 x6 : 0000000000164fc0 [ 208.380773][ C1] x5 : ffff800097bd6dd8 x4 : ffff80008f953e78 x3 : 0000000000000000 [ 208.381910][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 208.383093][ C1] Call trace: [ 208.383554][ C1] force_signal_inject+0x248/0x26c (P) [ 208.384425][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 208.385200][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 208.386017][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 208.386794][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 208.387681][ C1] efi_pstore_write+0x2dc/0x3fc [ 208.388439][ C1] pstore_dump+0x538/0x880 [ 208.389127][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 208.389819][ C1] vpanic+0x2d4/0x6c0 [ 208.390415][ C1] vpanic+0x0/0x6c0 [ 208.390951][ C1] softlockup_fn+0x0/0x120 [ 208.391650][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.392432][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.393162][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.393905][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.394734][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.395537][ C1] gic_handle_irq+0x6c/0x18c [ 208.396237][ C1] call_on_irq_stack+0x30/0x48 [ 208.396896][ C1] do_interrupt_handler+0xd4/0x138 [ 208.397620][ C1] el1_interrupt+0x3c/0x60 [ 208.398265][ C1] el1h_64_irq_handler+0x18/0x24 [ 208.399007][ C1] el1h_64_irq+0x6c/0x70 [ 208.399587][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.400456][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.401226][ C1] uart_write_room+0xa4/0x15c [ 208.401931][ C1] tty_write_room+0x6c/0x8c [ 208.402615][ C1] handle_tx+0x128/0x5fc [ 208.403196][ C1] caif_xmit+0x108/0x150 [ 208.403795][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.404534][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.405292][ C1] tx+0x9c/0x1cc [ 208.405761][ C1] kthread+0x164/0x354 [ 208.406378][ C1] kthread+0x5fc/0x75c [ 208.407005][ C1] ret_from_fork+0x10/0x20 [ 208.407633][ C1] irq event stamp: 60657031 [ 208.408324][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 208.409857][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 208.411387][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 208.412686][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 208.413964][ C1] ---[ end trace 0000000000000000 ]--- [ 208.427167][ C1] Calling EFI runtime from hardirq context [ 208.427974][ C1] ------------[ cut here ]------------ [ 208.428687][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 208.430184][ C1] Modules linked in: [ 208.430840][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 208.432238][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 208.432956][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.434505][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.435652][ C1] pc : force_signal_inject+0x248/0x26c [ 208.436449][ C1] lr : force_signal_inject+0x248/0x26c [ 208.437208][ C1] sp : ffff800097bd7420 [ 208.437774][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 208.438918][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 208.440102][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 208.441301][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 208.442460][ C1] x17: 0000000000000000 x16: ffff800082e5ee8c x15: 0000000000000001 [ 208.443590][ C1] x14: 1fffe000337818fa x13: 0000000000000000 x12: 0000000000000000 [ 208.444787][ C1] x11: ffff6000337818fb x10: 0000000000ff0100 x9 : 0000000000010205 [ 208.445973][ C1] x8 : ffff0000cea80000 x7 : 0000000000165d68 x6 : 0000000000165d30 [ 208.447162][ C1] x5 : ffff800097bd6dd8 x4 : ffff80008f954448 x3 : 0000000000000000 [ 208.448341][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 208.449498][ C1] Call trace: [ 208.449988][ C1] force_signal_inject+0x248/0x26c (P) [ 208.450799][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 208.451502][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 208.452288][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 208.453166][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 208.453991][ C1] efi_pstore_write+0x2dc/0x3fc [ 208.454698][ C1] pstore_dump+0x538/0x880 [ 208.455383][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 208.456013][ C1] vpanic+0x2d4/0x6c0 [ 208.456598][ C1] vpanic+0x0/0x6c0 [ 208.457163][ C1] softlockup_fn+0x0/0x120 [ 208.457864][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.458681][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.459450][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.460282][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.461080][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.461874][ C1] gic_handle_irq+0x6c/0x18c [ 208.462500][ C1] call_on_irq_stack+0x30/0x48 [ 208.463236][ C1] do_interrupt_handler+0xd4/0x138 [ 208.463973][ C1] el1_interrupt+0x3c/0x60 [ 208.464674][ C1] el1h_64_irq_handler+0x18/0x24 [ 208.465440][ C1] el1h_64_irq+0x6c/0x70 [ 208.466094][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.466923][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.467723][ C1] uart_write_room+0xa4/0x15c [ 208.468421][ C1] tty_write_room+0x6c/0x8c [ 208.469090][ C1] handle_tx+0x128/0x5fc [ 208.469674][ C1] caif_xmit+0x108/0x150 [ 208.470333][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.471116][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.471910][ C1] tx+0x9c/0x1cc [ 208.472452][ C1] kthread+0x164/0x354 [ 208.473038][ C1] kthread+0x5fc/0x75c [ 208.473657][ C1] ret_from_fork+0x10/0x20 [ 208.474310][ C1] irq event stamp: 60657031 [ 208.474970][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 208.476523][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 208.478055][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 208.479367][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 208.480912][ C1] ---[ end trace 0000000000000000 ]--- [ 208.494258][ C1] Calling EFI runtime from hardirq context [ 208.495064][ C1] ------------[ cut here ]------------ [ 208.495889][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 208.497475][ C1] Modules linked in: [ 208.498053][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 208.499521][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 208.500257][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.501759][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.502947][ C1] pc : force_signal_inject+0x248/0x26c [ 208.503801][ C1] lr : force_signal_inject+0x248/0x26c [ 208.504675][ C1] sp : ffff800097bd7420 [ 208.505303][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 208.506528][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 208.507782][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 208.509108][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 208.510320][ C1] x17: 0000000000000000 x16: ffff800082e5ee8c x15: 0000000000000001 [ 208.511503][ C1] x14: 1fffe000337818fa x13: 0000000000000000 x12: 0000000000000000 [ 208.512646][ C1] x11: ffff6000337818fb x10: 0000000000ff0100 x9 : 0000000000010205 [ 208.513857][ C1] x8 : ffff0000cea80000 x7 : 0000000000166ad8 x6 : 0000000000166aa0 [ 208.515114][ C1] x5 : ffff800097bd6dd8 x4 : ffff80008f954a18 x3 : 0000000000000000 [ 208.516305][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 208.517502][ C1] Call trace: [ 208.517958][ C1] force_signal_inject+0x248/0x26c (P) [ 208.518776][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 208.519495][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 208.520333][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 208.521148][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 208.522022][ C1] efi_pstore_write+0x2dc/0x3fc [ 208.522743][ C1] pstore_dump+0x538/0x880 [ 208.523383][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 208.524043][ C1] vpanic+0x2d4/0x6c0 [ 208.524629][ C1] vpanic+0x0/0x6c0 [ 208.525190][ C1] softlockup_fn+0x0/0x120 [ 208.525817][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.526525][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.527223][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.528011][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.528854][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.529660][ C1] gic_handle_irq+0x6c/0x18c [ 208.530354][ C1] call_on_irq_stack+0x30/0x48 [ 208.531112][ C1] do_interrupt_handler+0xd4/0x138 [ 208.531859][ C1] el1_interrupt+0x3c/0x60 [ 208.532509][ C1] el1h_64_irq_handler+0x18/0x24 [ 208.533254][ C1] el1h_64_irq+0x6c/0x70 [ 208.533937][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.534924][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.535817][ C1] uart_write_room+0xa4/0x15c [ 208.536534][ C1] tty_write_room+0x6c/0x8c [ 208.537268][ C1] handle_tx+0x128/0x5fc [ 208.537952][ C1] caif_xmit+0x108/0x150 [ 208.538564][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.539313][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.540145][ C1] tx+0x9c/0x1cc [ 208.540699][ C1] kthread+0x164/0x354 [ 208.541335][ C1] kthread+0x5fc/0x75c [ 208.541981][ C1] ret_from_fork+0x10/0x20 [ 208.542654][ C1] irq event stamp: 60657031 [ 208.543415][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 208.545048][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 208.546709][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 208.548059][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 208.549498][ C1] ---[ end trace 0000000000000000 ]--- [ 208.562924][ C1] Calling EFI runtime from hardirq context [ 208.563663][ C1] ------------[ cut here ]------------ [ 208.564473][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 208.565972][ C1] Modules linked in: [ 208.566629][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 208.568036][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 208.568690][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.569981][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.571318][ C1] pc : force_signal_inject+0x248/0x26c [ 208.572285][ C1] lr : force_signal_inject+0x248/0x26c [ 208.573118][ C1] sp : ffff800097bd7420 [ 208.573802][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 208.575052][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 208.576267][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 208.577428][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 208.578744][ C1] x17: 0000000000000000 x16: ffff800082e5ee8c x15: 0000000000000001 [ 208.580093][ C1] x14: 1fffe000337818fa x13: 0000000000000000 x12: 0000000000000000 [ 208.581456][ C1] x11: ffff6000337818fb x10: 0000000000ff0100 x9 : 0000000000010205 [ 208.582844][ C1] x8 : ffff0000cea80000 x7 : 0000000000167848 x6 : 0000000000167810 [ 208.584166][ C1] x5 : ffff800097bd6dd8 x4 : ffff80008f954fe8 x3 : 0000000000000000 [ 208.585445][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 208.586713][ C1] Call trace: [ 208.587194][ C1] force_signal_inject+0x248/0x26c (P) [ 208.588046][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 208.588883][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 208.589823][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 208.590605][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 208.591488][ C1] efi_pstore_write+0x2dc/0x3fc [ 208.592328][ C1] pstore_dump+0x538/0x880 [ 208.593017][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 208.593709][ C1] vpanic+0x2d4/0x6c0 [ 208.594273][ C1] vpanic+0x0/0x6c0 [ 208.594806][ C1] softlockup_fn+0x0/0x120 [ 208.595500][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.596236][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.596975][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.597779][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.598617][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.599435][ C1] gic_handle_irq+0x6c/0x18c [ 208.600090][ C1] call_on_irq_stack+0x30/0x48 [ 208.600826][ C1] do_interrupt_handler+0xd4/0x138 [ 208.601583][ C1] el1_interrupt+0x3c/0x60 [ 208.602216][ C1] el1h_64_irq_handler+0x18/0x24 [ 208.602986][ C1] el1h_64_irq+0x6c/0x70 [ 208.603578][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.604397][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.605178][ C1] uart_write_room+0xa4/0x15c [ 208.605873][ C1] tty_write_room+0x6c/0x8c [ 208.606574][ C1] handle_tx+0x128/0x5fc [ 208.607244][ C1] caif_xmit+0x108/0x150 [ 208.607893][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.608649][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.609413][ C1] tx+0x9c/0x1cc [ 208.609967][ C1] kthread+0x164/0x354 [ 208.610576][ C1] kthread+0x5fc/0x75c [ 208.611209][ C1] ret_from_fork+0x10/0x20 [ 208.611885][ C1] irq event stamp: 60657031 [ 208.612560][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 208.614146][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 208.615698][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 208.617092][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 208.618494][ C1] ---[ end trace 0000000000000000 ]--- [ 208.631047][ C1] Calling EFI runtime from hardirq context [ 208.631810][ C1] ------------[ cut here ]------------ [ 208.632632][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 208.634203][ C1] Modules linked in: [ 208.634773][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 208.636270][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 208.636991][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.638449][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.639737][ C1] pc : force_signal_inject+0x248/0x26c [ 208.640575][ C1] lr : force_signal_inject+0x248/0x26c [ 208.641443][ C1] sp : ffff800097bd7420 [ 208.642108][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 208.643368][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 208.644542][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 208.645719][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 208.646867][ C1] x17: 0000000000000000 x16: ffff800082e5ee8c x15: 0000000000000001 [ 208.648096][ C1] x14: 1fffe000337818fa x13: 0000000000000000 x12: 0000000000000000 [ 208.649264][ C1] x11: ffff6000337818fb x10: 0000000000ff0100 x9 : 0000000000010205 [ 208.650454][ C1] x8 : ffff0000cea80000 x7 : 00000000001685b8 x6 : 0000000000168580 [ 208.651681][ C1] x5 : ffff800097bd6dd8 x4 : ffff80008f9555b8 x3 : 0000000000000000 [ 208.652830][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 208.654014][ C1] Call trace: [ 208.654469][ C1] force_signal_inject+0x248/0x26c (P) [ 208.655281][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 208.656055][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 208.656822][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 208.657529][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 208.658302][ C1] efi_pstore_write+0x2dc/0x3fc [ 208.659044][ C1] pstore_dump+0x538/0x880 [ 208.659673][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 208.660355][ C1] vpanic+0x2d4/0x6c0 [ 208.660921][ C1] vpanic+0x0/0x6c0 [ 208.661485][ C1] softlockup_fn+0x0/0x120 [ 208.662187][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.662939][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.663689][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.664468][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.665305][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.666106][ C1] gic_handle_irq+0x6c/0x18c [ 208.666804][ C1] call_on_irq_stack+0x30/0x48 [ 208.667577][ C1] do_interrupt_handler+0xd4/0x138 [ 208.668392][ C1] el1_interrupt+0x3c/0x60 [ 208.669066][ C1] el1h_64_irq_handler+0x18/0x24 [ 208.669832][ C1] el1h_64_irq+0x6c/0x70 [ 208.670464][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.671363][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.672159][ C1] uart_write_room+0xa4/0x15c [ 208.672857][ C1] tty_write_room+0x6c/0x8c [ 208.673524][ C1] handle_tx+0x128/0x5fc [ 208.674202][ C1] caif_xmit+0x108/0x150 [ 208.674793][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.675523][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.676297][ C1] tx+0x9c/0x1cc [ 208.676820][ C1] kthread+0x164/0x354 [ 208.677458][ C1] kthread+0x5fc/0x75c [ 208.678086][ C1] ret_from_fork+0x10/0x20 [ 208.678741][ C1] irq event stamp: 60657031 [ 208.679399][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 208.680829][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 208.682315][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 208.683701][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 208.685318][ C1] ---[ end trace 0000000000000000 ]--- [ 208.697618][ C1] Calling EFI runtime from hardirq context [ 208.698409][ C1] ------------[ cut here ]------------ [ 208.699171][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 208.700737][ C1] Modules linked in: [ 208.701343][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 208.702874][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 208.703663][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.705118][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.706288][ C1] pc : force_signal_inject+0x248/0x26c [ 208.707061][ C1] lr : force_signal_inject+0x248/0x26c [ 208.707801][ C1] sp : ffff800097bd7420 [ 208.708405][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 208.709605][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 208.710809][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 208.712002][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 208.713132][ C1] x17: 0000000000000000 x16: ffff800082e5ee8c x15: 0000000000000001 [ 208.714257][ C1] x14: 1fffe000337818fa x13: 0000000000000000 x12: 0000000000000000 [ 208.715589][ C1] x11: ffff6000337818fb x10: 0000000000ff0100 x9 : 0000000000010205 [ 208.716901][ C1] x8 : ffff0000cea80000 x7 : 0000000000169328 x6 : 00000000001692f0 [ 208.718120][ C1] x5 : ffff800097bd6dd8 x4 : ffff80008f955b88 x3 : 0000000000000000 [ 208.719423][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 208.720676][ C1] Call trace: [ 208.721157][ C1] force_signal_inject+0x248/0x26c (P) [ 208.722054][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 208.722857][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 208.723678][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 208.724495][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 208.725463][ C1] efi_pstore_write+0x2dc/0x3fc [ 208.726186][ C1] pstore_dump+0x538/0x880 [ 208.726873][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 208.727594][ C1] vpanic+0x2d4/0x6c0 [ 208.728203][ C1] vpanic+0x0/0x6c0 [ 208.728753][ C1] softlockup_fn+0x0/0x120 [ 208.729427][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.730218][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.730967][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.731724][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.732544][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.733423][ C1] gic_handle_irq+0x6c/0x18c [ 208.734097][ C1] call_on_irq_stack+0x30/0x48 [ 208.734812][ C1] do_interrupt_handler+0xd4/0x138 [ 208.735571][ C1] el1_interrupt+0x3c/0x60 [ 208.736303][ C1] el1h_64_irq_handler+0x18/0x24 [ 208.737035][ C1] el1h_64_irq+0x6c/0x70 [ 208.737710][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.738608][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.739411][ C1] uart_write_room+0xa4/0x15c [ 208.740120][ C1] tty_write_room+0x6c/0x8c [ 208.740753][ C1] handle_tx+0x128/0x5fc [ 208.741437][ C1] caif_xmit+0x108/0x150 [ 208.742048][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.742826][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.743545][ C1] tx+0x9c/0x1cc [ 208.744077][ C1] kthread+0x164/0x354 [ 208.744816][ C1] kthread+0x5fc/0x75c [ 208.745407][ C1] ret_from_fork+0x10/0x20 [ 208.746041][ C1] irq event stamp: 60657031 [ 208.746654][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 208.748221][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 208.749837][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 208.751331][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 208.752764][ C1] ---[ end trace 0000000000000000 ]--- [ 208.765630][ C1] Calling EFI runtime from hardirq context [ 208.766483][ C1] ------------[ cut here ]------------ [ 208.767254][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 208.768857][ C1] Modules linked in: [ 208.769412][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 208.770922][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 208.771736][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.773199][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.774400][ C1] pc : force_signal_inject+0x248/0x26c [ 208.775275][ C1] lr : force_signal_inject+0x248/0x26c [ 208.776082][ C1] sp : ffff800097bd7420 [ 208.776676][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 208.777909][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 208.779248][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 208.780447][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 208.781719][ C1] x17: 0000000000000000 x16: ffff800082e5ee8c x15: 0000000000000001 [ 208.782806][ C1] x14: 1fffe000337818fa x13: 0000000000000000 x12: 0000000000000000 [ 208.783976][ C1] x11: ffff6000337818fb x10: 0000000000ff0100 x9 : 0000000000010205 [ 208.785175][ C1] x8 : ffff0000cea80000 x7 : 000000000016a098 x6 : 000000000016a060 [ 208.786500][ C1] x5 : ffff800097bd6dd8 x4 : ffff80008f956158 x3 : 0000000000000000 [ 208.787666][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 208.788815][ C1] Call trace: [ 208.789298][ C1] force_signal_inject+0x248/0x26c (P) [ 208.790046][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 208.790850][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 208.791704][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 208.792524][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 208.793305][ C1] efi_pstore_write+0x2dc/0x3fc [ 208.793959][ C1] pstore_dump+0x538/0x880 [ 208.794617][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 208.795279][ C1] vpanic+0x2d4/0x6c0 [ 208.795862][ C1] vpanic+0x0/0x6c0 [ 208.796375][ C1] softlockup_fn+0x0/0x120 [ 208.796983][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.797735][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.798427][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.799194][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.799963][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.800753][ C1] gic_handle_irq+0x6c/0x18c [ 208.801371][ C1] call_on_irq_stack+0x30/0x48 [ 208.802086][ C1] do_interrupt_handler+0xd4/0x138 [ 208.802811][ C1] el1_interrupt+0x3c/0x60 [ 208.803466][ C1] el1h_64_irq_handler+0x18/0x24 [ 208.804197][ C1] el1h_64_irq+0x6c/0x70 [ 208.804804][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.805698][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.806490][ C1] uart_write_room+0xa4/0x15c [ 208.807153][ C1] tty_write_room+0x6c/0x8c [ 208.807827][ C1] handle_tx+0x128/0x5fc [ 208.808468][ C1] caif_xmit+0x108/0x150 [ 208.809074][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.809869][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.810594][ C1] tx+0x9c/0x1cc [ 208.811143][ C1] kthread+0x164/0x354 [ 208.811743][ C1] kthread+0x5fc/0x75c [ 208.812382][ C1] ret_from_fork+0x10/0x20 [ 208.813013][ C1] irq event stamp: 60657031 [ 208.813694][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 208.815203][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 208.816673][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 208.818060][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 208.819466][ C1] ---[ end trace 0000000000000000 ]--- [ 208.831583][ C1] Calling EFI runtime from hardirq context [ 208.832354][ C1] ------------[ cut here ]------------ [ 208.833127][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 208.834500][ C1] Modules linked in: [ 208.835087][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 208.836566][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 208.837275][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.838641][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.839826][ C1] pc : force_signal_inject+0x248/0x26c [ 208.840621][ C1] lr : force_signal_inject+0x248/0x26c [ 208.841384][ C1] sp : ffff800097bd7420 [ 208.842032][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 208.843223][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 208.844408][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 208.845595][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 208.846749][ C1] x17: 0000000000000000 x16: ffff800082e5ee8c x15: 0000000000000001 [ 208.847938][ C1] x14: 1fffe000337818fa x13: 0000000000000000 x12: 0000000000000000 [ 208.849157][ C1] x11: ffff6000337818fb x10: 0000000000ff0100 x9 : 0000000000010205 [ 208.850320][ C1] x8 : ffff0000cea80000 x7 : 000000000016ae08 x6 : 000000000016add0 [ 208.851490][ C1] x5 : ffff800097bd6dd8 x4 : ffff80008f956728 x3 : 0000000000000000 [ 208.852662][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 208.853901][ C1] Call trace: [ 208.854339][ C1] force_signal_inject+0x248/0x26c (P) [ 208.855197][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 208.855882][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 208.856766][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 208.857559][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 208.858378][ C1] efi_pstore_write+0x2dc/0x3fc [ 208.859130][ C1] pstore_dump+0x538/0x880 [ 208.859834][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 208.860534][ C1] vpanic+0x2d4/0x6c0 [ 208.861143][ C1] vpanic+0x0/0x6c0 [ 208.861691][ C1] softlockup_fn+0x0/0x120 [ 208.862307][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.863094][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.863807][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.864658][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.865418][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.866135][ C1] gic_handle_irq+0x6c/0x18c [ 208.866772][ C1] call_on_irq_stack+0x30/0x48 [ 208.867455][ C1] do_interrupt_handler+0xd4/0x138 [ 208.868193][ C1] el1_interrupt+0x3c/0x60 [ 208.868853][ C1] el1h_64_irq_handler+0x18/0x24 [ 208.869545][ C1] el1h_64_irq+0x6c/0x70 [ 208.870129][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.870987][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.871805][ C1] uart_write_room+0xa4/0x15c [ 208.872501][ C1] tty_write_room+0x6c/0x8c [ 208.873164][ C1] handle_tx+0x128/0x5fc [ 208.873732][ C1] caif_xmit+0x108/0x150 [ 208.874438][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.875152][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.875910][ C1] tx+0x9c/0x1cc [ 208.876436][ C1] kthread+0x164/0x354 [ 208.877059][ C1] kthread+0x5fc/0x75c [ 208.877621][ C1] ret_from_fork+0x10/0x20 [ 208.878272][ C1] irq event stamp: 60657031 [ 208.878961][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 208.880531][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 208.882031][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 208.883296][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 208.884650][ C1] ---[ end trace 0000000000000000 ]--- [ 208.897433][ C1] Calling EFI runtime from hardirq context [ 208.898262][ C1] ------------[ cut here ]------------ [ 208.899072][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 208.900621][ C1] Modules linked in: [ 208.901207][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 208.902758][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 208.903505][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.904986][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.906176][ C1] pc : force_signal_inject+0x248/0x26c [ 208.906974][ C1] lr : force_signal_inject+0x248/0x26c [ 208.907819][ C1] sp : ffff800097bd7420 [ 208.908431][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 208.909647][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 208.910825][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 208.912002][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 208.913190][ C1] x17: 0000000000000000 x16: ffff800082e5ee8c x15: 0000000000000001 [ 208.914418][ C1] x14: 1fffe000337818fa x13: 0000000000000000 x12: 0000000000000000 [ 208.915579][ C1] x11: ffff6000337818fb x10: 0000000000ff0100 x9 : 0000000000010205 [ 208.916764][ C1] x8 : ffff0000cea80000 x7 : 000000000016bb78 x6 : 000000000016bb40 [ 208.917996][ C1] x5 : ffff800097bd6dd8 x4 : ffff80008f956cf8 x3 : 0000000000000000 [ 208.919132][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 208.920365][ C1] Call trace: [ 208.920860][ C1] force_signal_inject+0x248/0x26c (P) [ 208.921677][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 208.922424][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 208.923232][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 208.924040][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 208.924863][ C1] efi_pstore_write+0x2dc/0x3fc [ 208.925542][ C1] pstore_dump+0x538/0x880 [ 208.926191][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 208.926904][ C1] vpanic+0x2d4/0x6c0 [ 208.927459][ C1] vpanic+0x0/0x6c0 [ 208.928031][ C1] softlockup_fn+0x0/0x120 [ 208.928728][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.929547][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.930243][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.931063][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.931987][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.932836][ C1] gic_handle_irq+0x6c/0x18c [ 208.933791][ C1] call_on_irq_stack+0x30/0x48 [ 208.934500][ C1] do_interrupt_handler+0xd4/0x138 [ 208.935261][ C1] el1_interrupt+0x3c/0x60 [ 208.935933][ C1] el1h_64_irq_handler+0x18/0x24 [ 208.936605][ C1] el1h_64_irq+0x6c/0x70 [ 208.937318][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 208.938255][ C1] uart_port_unlock_deref+0x108/0x2ec [ 208.939097][ C1] uart_write_room+0xa4/0x15c [ 208.939779][ C1] tty_write_room+0x6c/0x8c [ 208.940442][ C1] handle_tx+0x128/0x5fc [ 208.941073][ C1] caif_xmit+0x108/0x150 [ 208.941770][ C1] dev_hard_start_xmit+0x298/0x890 [ 208.942585][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 208.943312][ C1] tx+0x9c/0x1cc [ 208.943804][ C1] kthread+0x164/0x354 [ 208.944387][ C1] kthread+0x5fc/0x75c [ 208.945022][ C1] ret_from_fork+0x10/0x20 [ 208.945650][ C1] irq event stamp: 60657031 [ 208.946379][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 208.947939][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 208.949388][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 208.950675][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 208.951954][ C1] ---[ end trace 0000000000000000 ]--- [ 208.964552][ C1] ------------[ cut here ]------------ [ 208.965341][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 208.966946][ C1] Modules linked in: [ 208.967478][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 208.969017][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 208.969883][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 208.971319][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 208.972477][ C1] pc : force_signal_inject+0x248/0x26c [ 208.973271][ C1] lr : force_signal_inject+0x248/0x26c [ 208.974112][ C1] sp : ffff800097bd7420 [ 208.974696][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 208.975919][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 208.977131][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 208.978334][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 208.979509][ C1] x17: 0000000000000000 x16: ffff80008054557c x15: 0000000000000001 [ 208.980714][ C1] x14: 1ffff00011f133b9 x13: 0000000000000000 x12: 0000000000000000 [ 208.981853][ C1] x11: ffff700011f133ba x10: 0000000000ff0100 x9 : 0000000000010205 [ 208.983129][ C1] x8 : ffff0000cea80000 x7 : 0000000000000000 x6 : ffff80008af64414 [ 208.984402][ C1] x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 [ 208.985701][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 208.986928][ C1] Call trace: [ 208.987443][ C1] force_signal_inject+0x248/0x26c (P) [ 208.988261][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 208.988992][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 208.989785][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 208.990590][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 208.991446][ C1] efi_pstore_write+0x2dc/0x3fc [ 208.992159][ C1] pstore_dump+0x538/0x880 [ 208.992719][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 208.993401][ C1] vpanic+0x2d4/0x6c0 [ 208.994006][ C1] vpanic+0x0/0x6c0 [ 208.994583][ C1] softlockup_fn+0x0/0x120 [ 208.995221][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 208.995991][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 208.996740][ C1] arch_timer_handler_virt+0x70/0x84 [ 208.997514][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 208.998248][ C1] generic_handle_domain_irq+0xe0/0x140 [ 208.999058][ C1] gic_handle_irq+0x6c/0x18c [ 208.999737][ C1] call_on_irq_stack+0x30/0x48 [ 209.000460][ C1] do_interrupt_handler+0xd4/0x138 [ 209.001240][ C1] el1_interrupt+0x3c/0x60 [ 209.001859][ C1] el1h_64_irq_handler+0x18/0x24 [ 209.002612][ C1] el1h_64_irq+0x6c/0x70 [ 209.003260][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 209.004092][ C1] uart_port_unlock_deref+0x108/0x2ec [ 209.004889][ C1] uart_write_room+0xa4/0x15c [ 209.005623][ C1] tty_write_room+0x6c/0x8c [ 209.006246][ C1] handle_tx+0x128/0x5fc [ 209.006850][ C1] caif_xmit+0x108/0x150 [ 209.007449][ C1] dev_hard_start_xmit+0x298/0x890 [ 209.008201][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 209.008911][ C1] tx+0x9c/0x1cc [ 209.009443][ C1] kthread+0x164/0x354 [ 209.010046][ C1] kthread+0x5fc/0x75c [ 209.010674][ C1] ret_from_fork+0x10/0x20 [ 209.011276][ C1] irq event stamp: 60657031 [ 209.011906][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 209.013390][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 209.014884][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 209.016266][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 209.017680][ C1] ---[ end trace 0000000000000000 ]--- [ 209.029470][ C1] ------------[ cut here ]------------ [ 209.030218][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 209.031755][ C1] Modules linked in: [ 209.032397][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 209.033802][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 209.034583][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 209.036133][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 209.037300][ C1] pc : force_signal_inject+0x248/0x26c [ 209.038169][ C1] lr : force_signal_inject+0x248/0x26c [ 209.039007][ C1] sp : ffff800097bd7420 [ 209.039662][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 209.040868][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 209.042143][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 209.043474][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 209.044662][ C1] x17: 0000000000000000 x16: ffff80008054557c x15: 0000000000000001 [ 209.045884][ C1] x14: 1ffff00011f133b9 x13: 0000000000000000 x12: 0000000000000000 [ 209.047155][ C1] x11: ffff700011f133ba x10: 0000000000ff0100 x9 : 0000000000010205 [ 209.048271][ C1] x8 : ffff0000cea80000 x7 : 0000000000000000 x6 : ffff80008af64414 [ 209.049444][ C1] x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 [ 209.050633][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 209.051878][ C1] Call trace: [ 209.052394][ C1] force_signal_inject+0x248/0x26c (P) [ 209.053144][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 209.053896][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 209.054692][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 209.055510][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 209.056264][ C1] efi_pstore_write+0x2dc/0x3fc [ 209.056941][ C1] pstore_dump+0x538/0x880 [ 209.057580][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 209.058293][ C1] vpanic+0x2d4/0x6c0 [ 209.058870][ C1] vpanic+0x0/0x6c0 [ 209.059400][ C1] softlockup_fn+0x0/0x120 [ 209.060065][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 209.060937][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 209.061647][ C1] arch_timer_handler_virt+0x70/0x84 [ 209.062432][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 209.063240][ C1] generic_handle_domain_irq+0xe0/0x140 [ 209.064096][ C1] gic_handle_irq+0x6c/0x18c [ 209.064777][ C1] call_on_irq_stack+0x30/0x48 [ 209.065459][ C1] do_interrupt_handler+0xd4/0x138 [ 209.066244][ C1] el1_interrupt+0x3c/0x60 [ 209.066900][ C1] el1h_64_irq_handler+0x18/0x24 [ 209.067680][ C1] el1h_64_irq+0x6c/0x70 [ 209.068339][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 209.069287][ C1] uart_port_unlock_deref+0x108/0x2ec [ 209.070077][ C1] uart_write_room+0xa4/0x15c [ 209.070732][ C1] tty_write_room+0x6c/0x8c [ 209.071368][ C1] handle_tx+0x128/0x5fc [ 209.072004][ C1] caif_xmit+0x108/0x150 [ 209.072676][ C1] dev_hard_start_xmit+0x298/0x890 [ 209.073431][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 209.074196][ C1] tx+0x9c/0x1cc [ 209.074806][ C1] kthread+0x164/0x354 [ 209.075453][ C1] kthread+0x5fc/0x75c [ 209.076104][ C1] ret_from_fork+0x10/0x20 [ 209.076767][ C1] irq event stamp: 60657031 [ 209.077452][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 209.078971][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 209.080456][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 209.081864][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 209.083185][ C1] ---[ end trace 0000000000000000 ]--- [ 209.095307][ C1] ------------[ cut here ]------------ [ 209.096050][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 209.097647][ C1] Modules linked in: [ 209.098260][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 209.099806][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 209.100586][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 209.102085][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 209.103260][ C1] pc : force_signal_inject+0x248/0x26c [ 209.104104][ C1] lr : force_signal_inject+0x248/0x26c [ 209.104852][ C1] sp : ffff800097bd7420 [ 209.105390][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 209.106466][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 209.107541][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 209.108706][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 209.109886][ C1] x17: 0000000000000000 x16: ffff80008054557c x15: 0000000000000001 [ 209.111116][ C1] x14: 1ffff00011f133b9 x13: 0000000000000000 x12: 0000000000000000 [ 209.112258][ C1] x11: ffff700011f133ba x10: 0000000000ff0100 x9 : 0000000000010205 [ 209.113331][ C1] x8 : ffff0000cea80000 x7 : 0000000000000000 x6 : ffff80008af64414 [ 209.114405][ C1] x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 [ 209.115584][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 209.116692][ C1] Call trace: [ 209.117113][ C1] force_signal_inject+0x248/0x26c (P) [ 209.117827][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 209.118548][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 209.119375][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 209.120129][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 209.121015][ C1] efi_pstore_write+0x2dc/0x3fc [ 209.121725][ C1] pstore_dump+0x538/0x880 [ 209.122299][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 209.122906][ C1] vpanic+0x2d4/0x6c0 [ 209.123428][ C1] vpanic+0x0/0x6c0 [ 209.123924][ C1] softlockup_fn+0x0/0x120 [ 209.124498][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 209.125184][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 209.125898][ C1] arch_timer_handler_virt+0x70/0x84 [ 209.126678][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 209.127531][ C1] generic_handle_domain_irq+0xe0/0x140 [ 209.128388][ C1] gic_handle_irq+0x6c/0x18c [ 209.129149][ C1] call_on_irq_stack+0x30/0x48 [ 209.129917][ C1] do_interrupt_handler+0xd4/0x138 [ 209.130707][ C1] el1_interrupt+0x3c/0x60 [ 209.131411][ C1] el1h_64_irq_handler+0x18/0x24 [ 209.132178][ C1] el1h_64_irq+0x6c/0x70 [ 209.132826][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 209.133672][ C1] uart_port_unlock_deref+0x108/0x2ec [ 209.134543][ C1] uart_write_room+0xa4/0x15c [ 209.135349][ C1] tty_write_room+0x6c/0x8c [ 209.136008][ C1] handle_tx+0x128/0x5fc [ 209.136703][ C1] caif_xmit+0x108/0x150 [ 209.137380][ C1] dev_hard_start_xmit+0x298/0x890 [ 209.138205][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 209.138957][ C1] tx+0x9c/0x1cc [ 209.139498][ C1] kthread+0x164/0x354 [ 209.140110][ C1] kthread+0x5fc/0x75c [ 209.140728][ C1] ret_from_fork+0x10/0x20 [ 209.141370][ C1] irq event stamp: 60657031 [ 209.141930][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 209.143439][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 209.144910][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 209.146327][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 209.147643][ C1] ---[ end trace 0000000000000000 ]--- [ 209.158672][ C1] ------------[ cut here ]------------ [ 209.159439][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 209.161016][ C1] Modules linked in: [ 209.161606][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 209.163157][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 209.163916][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 209.165509][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 209.166754][ C1] pc : force_signal_inject+0x248/0x26c [ 209.167585][ C1] lr : force_signal_inject+0x248/0x26c [ 209.168428][ C1] sp : ffff800097bd7420 [ 209.169097][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 209.170412][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 209.171606][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 209.172894][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 209.174009][ C1] x17: 6020737365636f72 x16: ffff80008054557c x15: 0000000000000001 [ 209.175103][ C1] x14: 1ffff00011f133b9 x13: 0000000000000000 x12: 0000000000000000 [ 209.176363][ C1] x11: ffff700011f133ba x10: 0000000000ff0100 x9 : 0000000000010205 [ 209.177617][ C1] x8 : ffff0000cea80000 x7 : 0000000000000000 x6 : ffff80008af64414 [ 209.178847][ C1] x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 [ 209.180080][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 209.181218][ C1] Call trace: [ 209.181718][ C1] force_signal_inject+0x248/0x26c (P) [ 209.182644][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 209.183398][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 209.184272][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 209.185018][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 209.185865][ C1] efi_pstore_write+0x2dc/0x3fc [ 209.186571][ C1] pstore_dump+0x538/0x880 [ 209.187211][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 209.187862][ C1] vpanic+0x2d4/0x6c0 [ 209.188433][ C1] vpanic+0x0/0x6c0 [ 209.188997][ C1] softlockup_fn+0x0/0x120 [ 209.189667][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 209.190490][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 209.191347][ C1] arch_timer_handler_virt+0x70/0x84 [ 209.192186][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 209.192968][ C1] generic_handle_domain_irq+0xe0/0x140 [ 209.193820][ C1] gic_handle_irq+0x6c/0x18c [ 209.194468][ C1] call_on_irq_stack+0x30/0x48 [ 209.195198][ C1] do_interrupt_handler+0xd4/0x138 [ 209.195979][ C1] el1_interrupt+0x3c/0x60 [ 209.196692][ C1] el1h_64_irq_handler+0x18/0x24 [ 209.197520][ C1] el1h_64_irq+0x6c/0x70 [ 209.198146][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 209.199042][ C1] uart_port_unlock_deref+0x108/0x2ec [ 209.199911][ C1] uart_write_room+0xa4/0x15c [ 209.200575][ C1] tty_write_room+0x6c/0x8c [ 209.201248][ C1] handle_tx+0x128/0x5fc [ 209.201905][ C1] caif_xmit+0x108/0x150 [ 209.202513][ C1] dev_hard_start_xmit+0x298/0x890 [ 209.203281][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 209.204043][ C1] tx+0x9c/0x1cc [ 209.204561][ C1] kthread+0x164/0x354 [ 209.205189][ C1] kthread+0x5fc/0x75c [ 209.205839][ C1] ret_from_fork+0x10/0x20 [ 209.206481][ C1] irq event stamp: 60657031 [ 209.207092][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 209.208840][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 209.210355][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 209.211705][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 209.213061][ C1] ---[ end trace 0000000000000000 ]--- [ 209.224282][ C1] ------------[ cut here ]------------ [ 209.225090][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 209.226699][ C1] Modules linked in: [ 209.227288][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 209.228788][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 209.229555][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 209.230947][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 209.232074][ C1] pc : force_signal_inject+0x248/0x26c [ 209.232851][ C1] lr : force_signal_inject+0x248/0x26c [ 209.233683][ C1] sp : ffff800097bd7420 [ 209.234310][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 209.235440][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 209.236647][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 209.237819][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 209.239108][ C1] x17: 0000000000000000 x16: ffff80008054557c x15: 0000000000000001 [ 209.240283][ C1] x14: 1ffff00011f133b9 x13: 0000000000000000 x12: 0000000000000000 [ 209.241444][ C1] x11: ffff700011f133ba x10: 0000000000ff0100 x9 : 0000000000010205 [ 209.242586][ C1] x8 : ffff0000cea80000 x7 : 0000000000000000 x6 : ffff80008af64414 [ 209.243709][ C1] x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 [ 209.244895][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 209.246108][ C1] Call trace: [ 209.246569][ C1] force_signal_inject+0x248/0x26c (P) [ 209.247338][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 209.248171][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 209.249020][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 209.249901][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 209.250735][ C1] efi_pstore_write+0x2dc/0x3fc [ 209.251430][ C1] pstore_dump+0x538/0x880 [ 209.252074][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 209.252816][ C1] vpanic+0x2d4/0x6c0 [ 209.253409][ C1] vpanic+0x0/0x6c0 [ 209.253967][ C1] softlockup_fn+0x0/0x120 [ 209.254613][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 209.255406][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 209.256173][ C1] arch_timer_handler_virt+0x70/0x84 [ 209.256924][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 209.257780][ C1] generic_handle_domain_irq+0xe0/0x140 [ 209.258645][ C1] gic_handle_irq+0x6c/0x18c [ 209.259379][ C1] call_on_irq_stack+0x30/0x48 [ 209.260080][ C1] do_interrupt_handler+0xd4/0x138 [ 209.260847][ C1] el1_interrupt+0x3c/0x60 [ 209.261492][ C1] el1h_64_irq_handler+0x18/0x24 [ 209.262220][ C1] el1h_64_irq+0x6c/0x70 [ 209.262817][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 209.263727][ C1] uart_port_unlock_deref+0x108/0x2ec [ 209.264505][ C1] uart_write_room+0xa4/0x15c [ 209.265282][ C1] tty_write_room+0x6c/0x8c [ 209.265901][ C1] handle_tx+0x128/0x5fc [ 209.266528][ C1] caif_xmit+0x108/0x150 [ 209.267209][ C1] dev_hard_start_xmit+0x298/0x890 [ 209.268004][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 209.268737][ C1] tx+0x9c/0x1cc [ 209.269281][ C1] kthread+0x164/0x354 [ 209.269932][ C1] kthread+0x5fc/0x75c [ 209.270528][ C1] ret_from_fork+0x10/0x20 [ 209.271188][ C1] irq event stamp: 60657031 [ 209.271877][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 209.273437][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 209.274997][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 209.276333][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 209.277727][ C1] ---[ end trace 0000000000000000 ]--- [ 209.289138][ C1] ------------[ cut here ]------------ [ 209.289858][ C1] WARNING: arch/arm64/kernel/traps.c:414 at force_signal_inject+0x248/0x26c, CPU#1: aoe_tx0/2466 [ 209.291479][ C1] Modules linked in: [ 209.292059][ C1] CPU: 1 UID: 0 PID: 2466 Comm: aoe_tx0 Tainted: G W L syzkaller #0 PREEMPT [ 209.293539][ C1] Tainted: [W]=WARN, [L]=SOFTLOCKUP [ 209.294285][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 [ 209.295797][ C1] pstate: 034000c5 (nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--) [ 209.296862][ C1] pc : force_signal_inject+0x248/0x26c [ 209.297660][ C1] lr : force_signal_inject+0x248/0x26c [ 209.298430][ C1] sp : ffff800097bd7420 [ 209.298939][ C1] x29: ffff800097bd7430 x28: ffff0000cea80000 x27: dfff800000000000 [ 209.300026][ C1] x26: 0000000000000000 x25: ffff8000a1ee7fc8 x24: ffff0000cea80020 [ 209.301284][ C1] x23: 0000000000000005 x22: 0000000000000009 x21: 1ffff000143dcff9 [ 209.302569][ C1] x20: 1fffe00019d50004 x19: ffff8000a1ee0000 x18: 00000000ffffffff [ 209.303713][ C1] x17: 636167656c282073 x16: ffff80008054557c x15: 0000000000000001 [ 209.304887][ C1] x14: 1ffff00011f133b9 x13: 0000000000000000 x12: 0000000000000000 [ 209.306050][ C1] x11: ffff700011f133ba x10: 0000000000ff0100 x9 : 0000000000010205 [ 209.307270][ C1] x8 : ffff0000cea80000 x7 : 0000000000000000 x6 : ffff80008af64414 [ 209.308482][ C1] x5 : 0000000000000000 x4 : 0000000000000001 x3 : 0000000000000000 [ 209.309681][ C1] x2 : 0000000000000000 x1 : 0000000000000005 x0 : 0000000000000000 [ 209.310839][ C1] Call trace: [ 209.311338][ C1] force_signal_inject+0x248/0x26c (P) [ 209.312153][ C1] __efi_fpsimd_begin+0xc4/0x1cc [ 209.312942][ C1] arch_efi_call_virt_setup+0x194/0x260 [ 209.313770][ C1] virt_efi_set_variable_nb+0x78/0x16c [ 209.314531][ C1] efivar_set_variable_locked+0x1d0/0x204 [ 209.315325][ C1] efi_pstore_write+0x2dc/0x3fc [ 209.316080][ C1] pstore_dump+0x538/0x880 [ 209.316751][ C1] kmsg_dump_desc+0x1cc/0x2f4 [ 209.317437][ C1] vpanic+0x2d4/0x6c0 [ 209.318022][ C1] vpanic+0x0/0x6c0 [ 209.318706][ C1] softlockup_fn+0x0/0x120 [ 209.319424][ C1] __hrtimer_run_queues+0x3d4/0xb78 [ 209.320259][ C1] hrtimer_interrupt+0x2b8/0xb50 [ 209.320996][ C1] arch_timer_handler_virt+0x70/0x84 [ 209.321857][ C1] handle_percpu_devid_irq+0x24c/0x4c0 [ 209.322754][ C1] generic_handle_domain_irq+0xe0/0x140 [ 209.323602][ C1] gic_handle_irq+0x6c/0x18c [ 209.324312][ C1] call_on_irq_stack+0x30/0x48 [ 209.325072][ C1] do_interrupt_handler+0xd4/0x138 [ 209.325791][ C1] el1_interrupt+0x3c/0x60 [ 209.326491][ C1] el1h_64_irq_handler+0x18/0x24 [ 209.327271][ C1] el1h_64_irq+0x6c/0x70 [ 209.327952][ C1] _raw_spin_unlock_irqrestore+0x44/0x98 (P) [ 209.328872][ C1] uart_port_unlock_deref+0x108/0x2ec [ 209.329713][ C1] uart_write_room+0xa4/0x15c [ 209.330398][ C1] tty_write_room+0x6c/0x8c [ 209.331077][ C1] handle_tx+0x128/0x5fc [ 209.331673][ C1] caif_xmit+0x108/0x150 [ 209.332265][ C1] dev_hard_start_xmit+0x298/0x890 [ 209.333059][ C1] __dev_queue_xmit+0x1070/0x2a78 [ 209.333773][ C1] tx+0x9c/0x1cc [ 209.334297][ C1] kthread+0x164/0x354 [ 209.334894][ C1] kthread+0x5fc/0x75c [ 209.335482][ C1] ret_from_fork+0x10/0x20 [ 209.336103][ C1] irq event stamp: 60657031 [ 209.336694][ C1] hardirqs last enabled at (60657030): [] _raw_spin_unlock_irqrestore+0x38/0x98 [ 209.338225][ C1] hardirqs last disabled at (60657031): [] enter_from_kernel_mode+0x14/0x34 [ 209.339772][ C1] softirqs last enabled at (2764): [] local_bh_enable+0x10/0x34 [ 209.341217][ C1] softirqs last disabled at (2768): [] local_bh_disable+0x10/0x34 [ 209.342584][ C1] ---[ end trace 0000000000000000 ]--- [ 209.350245][ C1] Rebooting in 86400 seconds..