last executing test programs: 6m21.945843575s ago: executing program 1 (id=443): r0 = syz_open_procfs$namespace(0x0, 0x0) fcntl$auto(r0, 0x402, 0xffffffffffffffff) (async) openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fb0\x00', 0x2, 0x0) (async) getpid() (async) r1 = openat$auto_vhci_fops_hci_vhci(0xffffffffffffff9c, &(0x7f0000000000), 0x8c80, 0x0) read$auto_vhci_fops_hci_vhci(r1, &(0x7f0000000100)=""/237, 0xed) (async) mmap$auto(0x0, 0x2020009, 0x100003, 0x9000000eb1, 0xfffffffffffffffa, 0x0) (async) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) (async) write$auto(r2, &(0x7f0000000180)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) (async) mmap$auto(0x0, 0x400005, 0x40df, 0x9b72, 0xffffffffffffffff, 0x8000) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) (async) openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, &(0x7f000000c340)='/proc/thread-self/pagemap\x00', 0x8000, 0x0) (async) r3 = socket(0x2c, 0x3, 0x0) (async) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x14be02, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) (async) sysfs$auto(0x2, 0xf, 0x0) (async) r4 = fsopen$auto(0x0, 0x7) fsconfig$auto(r4, 0x3, 0x0, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) (async) getsockopt$auto_SO_DEBUG(r3, 0x4, 0x1, 0x0, 0x0) (async) r5 = landlock_create_ruleset$auto(&(0x7f0000000000)={0x6, 0x3, 0x3}, 0x18, 0x0) (async) openat$auto_kmsg_fops_printk(0xffffffffffffff9c, 0x0, 0x2140, 0x0) pwrite64$auto(0xc8, &(0x7f0000000000)='\vX\xb5n\x91p\xe6\x1eRN8\x99\x88\xa8s\x1cJ\x99\x00:c\x14\r>\x94\x1a\xd3\xd3\x1d\xf8\xbebZ\xddL\'\x03\xf1`\x9f\x1e\xf9\xa4\xf8\x15\x02l@\x18*\xc0\xc1\xf2\x14^\x0fo\x84\xfc\x89\v\xea\x1b\x95\xafQ;CL\"\x01\x0e\xa4\xdf\xdav\x1cC\x8a\xeeq\xf0\xcdr\xfa\xa2@X\xb9_\xdd*\xd1\x14^\xbe\xa2', 0x1000000000004e, 0x3) (async) close_range$auto(0x0, 0xfffffffffffff000, 0x2) (async) openat$auto_vga_arb_device_fops_vgaarb(0xffffffffffffff9c, &(0x7f00000002c0), 0x8040, 0x0) r6 = epoll_create$auto(0x8) epoll_ctl$auto(r6, 0x1, 0x8000000000000000, 0x0) (async) bpf$auto(0x4, &(0x7f00000003c0)=@task_fd_query={0x5, r5, 0x454f, 0x5f, 0x0, 0xffffffff, r5, 0x80000001}, 0x6d4) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffff7, 0x8000) 6m20.794101614s ago: executing program 1 (id=444): syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000d80), 0xffffffffffffffff) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) setresuid$auto(0x0, 0x0, 0x0) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x40000008000) sendmsg$auto_NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x2404c800) sendmsg$auto_NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41811}, 0x20000000) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$auto_KVM_GET_MSRS(r2, 0x4068aea3, &(0x7f0000000080)={0xc0}) kexec_load$auto(0x5, 0x2, &(0x7f0000000040)={@kbuf=0x0, 0x800c000, 0x4800c000, 0x800c000}, 0x4) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/net/bond0/bonding/fail_over_mac\x00', 0x103b02, 0x0) sendfile$auto(r4, r4, 0x0, 0x8080000001) mmap$auto(0x0, 0x2000d, 0x4000000000df, 0x40000000000ebd, 0x401, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "ab06fdffff00fff500"}, 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xfdef) 6m19.068725594s ago: executing program 1 (id=451): openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/controlC0\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) bpf$auto(0xffffffff, &(0x7f00000001c0)=@task_fd_query={0x0, r0, 0x800, 0x10008, 0x7, 0x1000049, 0xffffffffffffffff, 0x9, 0x3}, 0x6f3) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x13, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES8=r1, @ANYBLOB="01eb"], 0x14}, 0x1, 0x0, 0x0, 0x20040800}, 0x4044800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1200"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0x1}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) unshare$auto(0x40000080) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r3 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) setresuid$auto(0xffffffffffffffff, 0x0, 0x0) write$auto(r2, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x2003f2, 0x15) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000040), 0xffffffffffffffff) ioctl$auto_VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000200)={0x4, 0x0, [{0x2, 0x7, 0x3c26}, {0x100000001, 0x2, 0xfffffffffffffffa}]}) sendmsg$auto_ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x24048084) madvise$auto(0x0, 0x200007, 0x19) syslog$auto(0x3, &(0x7f0000000080)='..\x00k\xac\x8c\x1d\x0e\x98\x80\xd2\xaf\xa1\xf2\x1e\xe1R1\xa2\x8e\xce\xa0\x17\bI3\'\xc5tw\xd7\x1d\xa6\xf4#+\xfa\xd7\x01\xb9j<\v\xf47\n\xa7\xd2\x8b\x11e1\xb3\xfdd\x04\xa9 1q\x97\xc4,\xa9^\xc1\xb6\xa1q\x0f\xd1\x013\x87l\xb9\x1e\x05\x90\xa2', 0x5) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x4000000000009b72, 0x2, 0x8000) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/tcp_available_congestion_control\x00', 0x0, 0x0) bpf$auto(0x0, 0x0, 0xaff6) openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, &(0x7f0000002040)='/dev/snd/pcmC1D1c\x00', 0x80, 0x0) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/devcoredump/disabled\x00', 0xe3102, 0x0) sendfile$auto(r5, r5, 0x0, 0x3) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x1, 0x0) 6m15.962046784s ago: executing program 1 (id=457): mmap$auto(0x0, 0x20009, 0x4000000001df, 0xeb1, 0x401, 0x8000) r0 = openat$auto_dvb_demux_fops_dmxdev(0xffffffffffffff9c, &(0x7f0000000140), 0xba8c3, 0x0) io_uring_setup$auto(0x14f, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty12\x00', 0x800, 0x0) socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/bus/usb/014/001\x00', 0x3010a1, 0x0) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snd/controlC2\x00', 0x60c843, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) r1 = socket(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bond0\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$auto_dvb_demux_fops_dmxdev(r0, 0x55, &(0x7f0000000080)) bpf$auto(0x0, &(0x7f00000000c0)=@bpf_attr_5={@target_ifindex=r3, r2, 0x4, 0x1ff, r1, @relative_id=0x13, 0xe600}, 0xf) bpf$auto(0x2, &(0x7f00000001c0)=@raw_tracepoint={0x6, r4, 0x0, 0x4}, 0xc) clone$auto(0x20003b46, 0x2, 0x0, 0x0, 0x2) open(0x0, 0x261c2, 0x84) socket$nl_generic(0x10, 0x3, 0x10) socket(0x11, 0x3, 0x84) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x101840, 0x0) socketpair$auto(0x1e, 0x400006, 0x8000000000000000, 0x0) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bus/usb/037/001\x00', 0x20882, 0x0) ioctl$auto(0x3, 0x80004508, 0x10000000000402) semctl$auto(0x1, 0xfffffffe, 0x3, 0x5) r5 = openat$auto_ucma_fops_ucma(0xffffffffffffff9c, &(0x7f0000000180), 0x101002, 0x0) write$auto(r5, 0x0, 0xc3) 6m15.699606827s ago: executing program 1 (id=458): r0 = socket(0x2, 0x1, 0x0) (async) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x4ea2, @remote}, 0x6a) (async) setreuid$auto(0x4, 0x8) (async) tkill$auto(0x80000000000001, 0x7) sendmmsg$auto(r0, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0x101}, 0x8}, 0x7, 0x20020000) write$auto(0x3, 0x0, 0x7fffffff) (async) getsockopt$auto(0x3, 0x6, 0xb, 0x0, 0x0) 6m13.358791085s ago: executing program 1 (id=465): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_ftrace_system_enable_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing/events/vmalloc/enable\x00', 0x181000, 0x0) r0 = io_uring_setup$auto(0x3, 0x0) close_range$auto(0x2, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x2, 0x5, 0x0) getcwd$auto(0x0, 0xffffffffffffffff) setsockopt$auto(0x3, 0x10000000084, 0x2, 0x0, 0x8) write$auto_tomoyo_operations_securityfs_if(0xffffffffffffffff, &(0x7f0000000180)="0a1b9a5c4000006e163bb154d7886d8edeea371cadb848770dc8f745", 0x1c) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) sendmmsg$auto(r2, &(0x7f0000000140)={{&(0x7f0000000040), 0x10, &(0x7f00000000c0)={0x0, 0x1fff8}, 0x7, 0x0, 0x2, 0xb}, 0xfff}, 0x5, 0x311) socket(0x848000000015, 0x5, 0x0) bind$auto(r1, 0x0, 0x0) socket(0xa, 0x1, 0x84) write$auto(0xffffffffffffffff, 0x0, 0xfffffdf1) open(&(0x7f0000000040)='&&\x00', 0x40202, 0x79) ioctl$auto(0x3, 0x89ed, 0xfffffffffffff4e0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/fs/ext4/sda1/journal_task\x00', 0x100, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) read$auto(0x3, 0x0, 0x7fffffff) syz_genetlink_get_family_id$auto_netdev(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'veth1_to_bridge\x00'}) socket$nl_generic(0x10, 0x3, 0x10) bind$auto(0x3, &(0x7f0000000000)=@ax25={0x3, @null, 0x4}, 0x7f35) close_range$auto(0x2, 0x8, 0x0) msgctl$auto_MSG_STAT_ANY(0x1, 0xd, &(0x7f0000000380)={{0xfffffff9, 0xee01, 0xffffffffffffffff, 0xfffffffe, 0x1, 0xdbf, 0x5}, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x5, 0x81, 0x6, 0x8, 0xfffffffffffffffb, 0x5, 0x7, 0x3, 0x100}) sendmsg$auto_IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000001200)=ANY=[@ANYBLOB="34040000", @ANYRES16=0x0, @ANYBLOB="080025bd7000fedbdf25040000001b04018008001d00", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="02000000"], 0x434}, 0x1, 0x0, 0x0, 0x4040084}, 0x4) semctl$auto_GETPID(0x101, 0x6, 0xb, 0x4) 6m12.645834085s ago: executing program 32 (id=465): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_ftrace_system_enable_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing/events/vmalloc/enable\x00', 0x181000, 0x0) r0 = io_uring_setup$auto(0x3, 0x0) close_range$auto(0x2, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x2, 0x5, 0x0) getcwd$auto(0x0, 0xffffffffffffffff) setsockopt$auto(0x3, 0x10000000084, 0x2, 0x0, 0x8) write$auto_tomoyo_operations_securityfs_if(0xffffffffffffffff, &(0x7f0000000180)="0a1b9a5c4000006e163bb154d7886d8edeea371cadb848770dc8f745", 0x1c) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) sendmmsg$auto(r2, &(0x7f0000000140)={{&(0x7f0000000040), 0x10, &(0x7f00000000c0)={0x0, 0x1fff8}, 0x7, 0x0, 0x2, 0xb}, 0xfff}, 0x5, 0x311) socket(0x848000000015, 0x5, 0x0) bind$auto(r1, 0x0, 0x0) socket(0xa, 0x1, 0x84) write$auto(0xffffffffffffffff, 0x0, 0xfffffdf1) open(&(0x7f0000000040)='&&\x00', 0x40202, 0x79) ioctl$auto(0x3, 0x89ed, 0xfffffffffffff4e0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/fs/ext4/sda1/journal_task\x00', 0x100, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) read$auto(0x3, 0x0, 0x7fffffff) syz_genetlink_get_family_id$auto_netdev(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'veth1_to_bridge\x00'}) socket$nl_generic(0x10, 0x3, 0x10) bind$auto(0x3, &(0x7f0000000000)=@ax25={0x3, @null, 0x4}, 0x7f35) close_range$auto(0x2, 0x8, 0x0) msgctl$auto_MSG_STAT_ANY(0x1, 0xd, &(0x7f0000000380)={{0xfffffff9, 0xee01, 0xffffffffffffffff, 0xfffffffe, 0x1, 0xdbf, 0x5}, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x5, 0x81, 0x6, 0x8, 0xfffffffffffffffb, 0x5, 0x7, 0x3, 0x100}) sendmsg$auto_IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000001200)=ANY=[@ANYBLOB="34040000", @ANYRES16=0x0, @ANYBLOB="080025bd7000fedbdf25040000001b04018008001d00", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="04008d8004001f80e01c8dd77d835f128e38784761edab0b4068e44d3502245cf69ff92abddbe9ce8657b12a5c515d26200422da8e9986ccba67b91c92fa4a9ea615c4cb4ae38cad7a00c55ffc014bfdadffe1b89857ca8c894224fd7f09747d88d36ef7ea0f757b0427c24ddf8a0a6062b1378d679d30a7dff7e2afa383c050304215f8746619e55242875fa10b1b2c39ead7679f082b44a6d6a37380f60554f9401d042b532399776f8a7e277efb4d31b7aa8be445e86445c6053a0f260ee80b9ee6322e7b2001e8efd6d34d334fa5a6b2c99188b050ee5f36d606cf01a25600166602c8e9a0266145424d040019800400ce8044b4b7ef88435cf09f5f05b78c80bc50326cce19ae6501542fc021da21f9bd3f047d37568edc5a42a10681e399691d268767dbe30c85c6995c2b43375cf166c2af1576659a8249af52bd2a1847fee5f8dd08298897d691b14dd200b523a6bc2557a75e775143fe8c42740f7a77db3169e4a9890069c43d17f659c16bf56a27e65e2061d1e0f00c5c7a019932af6a0c8ac9da380fd61b4c30c3b6da9d727d252ea911473d6b857d8e096dd281ad83da9ddf735614cf8f75c5d6642c52ec1d76fbff0cd9d5b8f5672a5599c55584688425bb5b1d566be63cf1504358fa8eedd00d523fd6f68965c807e32df4c8f94660e99795774a00aae3f4a5d72ca18ebcab0800b5000100000000ee002c8004004f000400208008008300050000000400ad80040082802ed5130f358144c2e846166f5414105f60392d6a07a9d063e7c65c9f7800b09f6baf73a2980d53b330e0b294218e741d79c58ed0f8c06d2bfd8206a719a7aef77bb5ef17775439d535184e7bc163d97f2a167cf9359a89616804870387f5a6f0a56dea125a787ed61c6f00cf37c7dd897a85132ca6ecd1b86799ebeaa5ca076a7cddeb3ea1ae5fdeca87480c7c7d43d1f68cd93897e5ad9afde5be0d382735e5fe72b30c310ce7d57fd261eff308e34c1aa0f04b66b61a2a60e6bb5345a98b38650f0800ce00", @ANYRES32=0x0, @ANYBLOB="02000000"], 0x434}, 0x1, 0x0, 0x0, 0x4040084}, 0x4) semctl$auto_GETPID(0x101, 0x6, 0xb, 0x4) 2m25.29933934s ago: executing program 0 (id=1211): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_ftrace_system_enable_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing/events/vmalloc/enable\x00', 0x181000, 0x0) r0 = io_uring_setup$auto(0x3, 0x0) close_range$auto(0x2, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x2, 0x5, 0x0) getcwd$auto(0x0, 0xffffffffffffffff) setsockopt$auto(0x3, 0x10000000084, 0x2, 0x0, 0x8) write$auto_tomoyo_operations_securityfs_if(0xffffffffffffffff, &(0x7f0000000180)="0a1b9a5c4000006e163bb154d7886d8edeea371cadb848770dc8f745d1c76eedba12b9f694dabdbcf3401910000000000060000023b5d40a", 0x38) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) sendmmsg$auto(r2, &(0x7f0000000140)={{&(0x7f0000000040), 0x10, &(0x7f00000000c0)={0x0, 0x1fff8}, 0x7, 0x0, 0x2, 0xb}, 0xfff}, 0x5, 0x311) socket(0x848000000015, 0x5, 0x0) bind$auto(r1, 0x0, 0x0) socket(0xa, 0x1, 0x84) write$auto(0xffffffffffffffff, 0x0, 0xfffffdf1) open(&(0x7f0000000040)='&&\x00', 0x40202, 0x79) ioctl$auto(0x3, 0x89ed, 0xfffffffffffff4e0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/fs/ext4/sda1/journal_task\x00', 0x100, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) read$auto(0x3, 0x0, 0x7fffffff) syz_genetlink_get_family_id$auto_netdev(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'veth1_to_bridge\x00'}) socket$nl_generic(0x10, 0x3, 0x10) bind$auto(0x3, &(0x7f0000000000)=@ax25={0x3, @null, 0x4}, 0x7f35) close_range$auto(0x2, 0x8, 0x0) msgctl$auto_MSG_STAT_ANY(0x1, 0xd, &(0x7f0000000380)={{0xfffffff9, 0xee01, 0xffffffffffffffff, 0xfffffffe, 0x1, 0xdbf, 0x5}, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x5, 0x81, 0x6, 0x8, 0xfffffffffffffffb, 0x5, 0x7, 0x3, 0x100}) sendmsg$auto_IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000001200)=ANY=[@ANYBLOB="34040000", @ANYRES16=0x0, @ANYBLOB="080025bd7000fedbdf25040000001b04018008001d00", @ANYRES32=0x0, @ANYBLOB="0800f30064010102d08334ce48737db13cc2c893c044f7a2908c4b4e7376f46c035d86a2ca24fcca8bf114852e156fffdae6113bec43e8207cef99df1a8f92bfc3df79a1e9202d92259cdb1dd5cb5251d1b5b776a7da6cbe4f93ebc701da8fc36a9afcef07c372fa991385649c7bc917cfb60b92b8ef58f682312901f82aacd77ed8e27f27f79255731f2984d9c5d022aabe7138924ec70a081bf9c4aeda1a8877cc2cb342bd98b320327a571fea46aee63004bb66cb701bc6f171732f62f04573b66d79c99ef28cdffc5582f6651d030f0854e73b077bca8e86072a2ff201142c5272f930fae6ceabd7239f65a0a66ce1ef95a11a67bc064fd56d8be1fe01915baf2908000a00ac1e00011302538004007380e1318457cb92152c08001700", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0], 0x434}, 0x1, 0x0, 0x0, 0x4040084}, 0x4) semctl$auto_GETPID(0x101, 0x6, 0xb, 0x4) 2m24.551910458s ago: executing program 0 (id=1215): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_ftrace_system_enable_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing/events/vmalloc/enable\x00', 0x181000, 0x0) r0 = io_uring_setup$auto(0x3, 0x0) close_range$auto(0x2, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x2, 0x5, 0x0) getcwd$auto(0x0, 0xffffffffffffffff) setsockopt$auto(0x3, 0x10000000084, 0x2, 0x0, 0x8) write$auto_tomoyo_operations_securityfs_if(0xffffffffffffffff, &(0x7f0000000180)="0a1b9a5c4000006e163bb154d7886d8edeea371cadb848770dc8f745d1c76eedba12b9f694dabdbcf3401910000000000060000023b5d40a", 0x38) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) sendmmsg$auto(r2, &(0x7f0000000140)={{&(0x7f0000000040), 0x10, &(0x7f00000000c0)={0x0, 0x1fff8}, 0x7, 0x0, 0x2, 0xb}, 0xfff}, 0x5, 0x311) socket(0x848000000015, 0x5, 0x0) bind$auto(r1, 0x0, 0x0) socket(0xa, 0x1, 0x84) write$auto(0xffffffffffffffff, 0x0, 0xfffffdf1) open(&(0x7f0000000040)='&&\x00', 0x40202, 0x79) ioctl$auto(0x3, 0x89ed, 0xfffffffffffff4e0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/fs/ext4/sda1/journal_task\x00', 0x100, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) read$auto(0x3, 0x0, 0x7fffffff) syz_genetlink_get_family_id$auto_netdev(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'veth1_to_bridge\x00'}) socket$nl_generic(0x10, 0x3, 0x10) bind$auto(0x3, &(0x7f0000000000)=@ax25={0x3, @null, 0x4}, 0x7f35) close_range$auto(0x2, 0x8, 0x0) msgctl$auto_MSG_STAT_ANY(0x1, 0xd, &(0x7f0000000380)={{0xfffffff9, 0xee01, 0xffffffffffffffff, 0xfffffffe, 0x1, 0xdbf, 0x5}, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x5, 0x81, 0x6, 0x8, 0xfffffffffffffffb, 0x5, 0x7, 0x3, 0x100}) sendmsg$auto_IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000001200)=ANY=[], 0x434}, 0x1, 0x0, 0x0, 0x4040084}, 0x4) semctl$auto_GETPID(0x101, 0x6, 0xb, 0x4) 2m23.638113873s ago: executing program 0 (id=1221): syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000d80), 0xffffffffffffffff) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) setresuid$auto(0x0, 0x0, 0x0) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x40000008000) sendmsg$auto_NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x2404c800) sendmsg$auto_NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41811}, 0x20000000) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$auto_KVM_GET_MSRS(r2, 0x4068aea3, &(0x7f0000000080)={0xc0}) kexec_load$auto(0x5, 0x2, &(0x7f0000000040)={@kbuf=0x0, 0x800c000, 0x4800c000, 0x800c000}, 0x4) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/net/bond0/bonding/fail_over_mac\x00', 0x103b02, 0x0) sendfile$auto(r4, r4, 0x0, 0x8080000001) mmap$auto(0x0, 0x2000d, 0x4000000000df, 0x40000000000ebd, 0x401, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "ab06fdffff00fff500"}, 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xfdef) 2m22.170111097s ago: executing program 0 (id=1226): syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000d80), 0xffffffffffffffff) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x40000008000) sendmsg$auto_NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x2404c800) sendmsg$auto_NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41811}, 0x20000000) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r1, 0xae01, 0x0) kexec_load$auto(0x5, 0x2, &(0x7f0000000040)={@kbuf=0x0, 0x800c000, 0x4800c000, 0x800c000}, 0x4) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/net/bond0/bonding/fail_over_mac\x00', 0x103b02, 0x0) sendfile$auto(r2, r2, 0x0, 0x8080000001) mmap$auto(0x0, 0x2000d, 0x4000000000df, 0x40000000000ebd, 0x401, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "ab06fdffff00fff500"}, 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xfdef) 2m21.058325402s ago: executing program 0 (id=1231): r0 = socket(0x23, 0x2, 0x0) ioctl$auto(r0, 0x89a2, 0x8) mmap$auto(0x0, 0x6df, 0x200000003, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000000000008000) clone$auto(0x3ffc, 0xad3, 0x0, 0x0, 0x2) pidfd_getfd$auto(0x3, 0x1, 0x100000000) getrandom$auto(0x0, 0x100000003b0, 0x9) r1 = socket(0x10, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_ETHTOOL_MSG_PLCA_GET_STATUS(r2, &(0x7f00000030c0)={0x0, 0x0, &(0x7f0000003080)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYBLOB="0456ed"], 0x14}, 0x1, 0x0, 0x0, 0x4854}, 0x40) syz_genetlink_get_family_id$auto_netdev(&(0x7f0000003900), r2) r3 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000040), r2) sendmsg$auto_ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000000080)=ANY=[@ANYBLOB="17000000", @ANYRES16=r3, @ANYBLOB="010027bd7000001400b223"], 0x2c}, 0x1, 0x0, 0x0, 0x4801}, 0x0) sendmmsg$auto(r1, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080), 0xfc2}, 0x2, &(0x7f00000001c0), 0x7, 0xa505}, 0x800}, 0x7, 0x4008) r4 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty12\x00', 0x800, 0x0) ioctl$auto(r4, 0x4b67, 0x1) 2m20.85869661s ago: executing program 0 (id=1233): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) openat$auto_debugfs_full_proxy_file_operations_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/ieee80211/phy5/netdev:wlan0/stations/08:02:11:00:00:01/aid\x00', 0x8082, 0x0) read$auto_debugfs_full_proxy_file_operations_internal(0xffffffffffffffff, 0x0, 0x60) mmap$auto(0x0, 0x2020009, 0x3, 0x10000000000eb1, 0xfffffffffffffffa, 0x1000000000008004) r0 = openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/pagemap\x00', 0x80240, 0x0) r1 = openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) move_pages$auto(0x1, 0x2000000000003, 0x0, 0x0, 0x0, 0x8000400000000000) ioctl$auto(0x3, 0x400454ca, 0x38) ioctl$auto_TUNSETVNETLE2(r1, 0x400454dc, 0x0) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/mtd/mtd0/subpagesize\x00', 0xa080, 0x0) read$auto(r2, 0x0, 0xe8) write$auto(0x3, 0x0, 0xfdf3) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) fanotify_init$auto(0x8, 0x2000000000002) open(&(0x7f0000000000)='./bus\x00', 0x12ba7e, 0x45) r3 = open(&(0x7f0000000000)='./cgroup\x00', 0x0, 0x64) bind$auto(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x6a) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800008}, 0x5, 0x20000000) r4 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000180), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000", @ANYRES16=r4, @ANYBLOB="01002d46820009002675a3000000000000721a9c782583a9616e17fe544f6ed2c8a3d14cf4"], 0x14}, 0x1, 0x68, 0x0, 0x24000000}, 0xd0) sendmsg$auto_NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYRESHEX=r4, @ANYBLOB="bade0043f7c29a599fa7fb65bb3c7ca4fec2f936bac0999387fa907cf3bad148a812ae6622e35cd33b5b9e544b8e1b58610b3c491ac85eb719370cd7a60e6c845fa31031505f0df51b52708c518f2efcd1ff9a50cb8123b6effdd8b3fa5ca63e9a77219ac7cbd011f262c7c99e5c6aba9235adea8f124afc", @ANYRES64=r4], 0x150}, 0x1, 0x0, 0x0, 0x40010}, 0x20048004) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x3, 0x7) umask$auto(0xa738) sendmsg$auto_NL80211_CMD_GET_PROTOCOL_FEATURES(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[], 0x34}}, 0x44004) mkdir$auto(&(0x7f0000000040)='./cgroup\x00', 0x6) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/cgroup.type\x00', 0x103042, 0x0) rmdir$auto(&(0x7f0000000080)='./cgroup\x00') 2m5.66641721s ago: executing program 33 (id=1233): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) openat$auto_debugfs_full_proxy_file_operations_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/ieee80211/phy5/netdev:wlan0/stations/08:02:11:00:00:01/aid\x00', 0x8082, 0x0) read$auto_debugfs_full_proxy_file_operations_internal(0xffffffffffffffff, 0x0, 0x60) mmap$auto(0x0, 0x2020009, 0x3, 0x10000000000eb1, 0xfffffffffffffffa, 0x1000000000008004) r0 = openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/pagemap\x00', 0x80240, 0x0) r1 = openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) move_pages$auto(0x1, 0x2000000000003, 0x0, 0x0, 0x0, 0x8000400000000000) ioctl$auto(0x3, 0x400454ca, 0x38) ioctl$auto_TUNSETVNETLE2(r1, 0x400454dc, 0x0) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/mtd/mtd0/subpagesize\x00', 0xa080, 0x0) read$auto(r2, 0x0, 0xe8) write$auto(0x3, 0x0, 0xfdf3) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) fanotify_init$auto(0x8, 0x2000000000002) open(&(0x7f0000000000)='./bus\x00', 0x12ba7e, 0x45) r3 = open(&(0x7f0000000000)='./cgroup\x00', 0x0, 0x64) bind$auto(0xffffffffffffffff, &(0x7f0000000040)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2b}}, 0x6a) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800008}, 0x5, 0x20000000) r4 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000180), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000", @ANYRES16=r4, @ANYBLOB="01002d46820009002675a3000000000000721a9c782583a9616e17fe544f6ed2c8a3d14cf4"], 0x14}, 0x1, 0x68, 0x0, 0x24000000}, 0xd0) sendmsg$auto_NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES16=r4, @ANYRESHEX=r4, @ANYBLOB="bade0043f7c29a599fa7fb65bb3c7ca4fec2f936bac0999387fa907cf3bad148a812ae6622e35cd33b5b9e544b8e1b58610b3c491ac85eb719370cd7a60e6c845fa31031505f0df51b52708c518f2efcd1ff9a50cb8123b6effdd8b3fa5ca63e9a77219ac7cbd011f262c7c99e5c6aba9235adea8f124afc", @ANYRES64=r4], 0x150}, 0x1, 0x0, 0x0, 0x40010}, 0x20048004) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x3, 0x7) umask$auto(0xa738) sendmsg$auto_NL80211_CMD_GET_PROTOCOL_FEATURES(r3, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[], 0x34}}, 0x44004) mkdir$auto(&(0x7f0000000040)='./cgroup\x00', 0x6) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/cgroup.type\x00', 0x103042, 0x0) rmdir$auto(&(0x7f0000000080)='./cgroup\x00') 1m8.235632735s ago: executing program 2 (id=1502): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/platform/dummy_hcd.7/usb8/authorized_default\x00', 0x20582, 0x0) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/hugetlb.2MB.rsvd.limit_in_bytes\x00', 0x0, 0x0) read$auto(r1, 0x0, 0x20) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual/mtd/mtd0/mtdblock0/queue/write_cache\x00', 0x182b02, 0x0) sendfile$auto(r2, r2, 0x0, 0x3) write$auto(r0, 0x0, 0x9) 1m7.825184093s ago: executing program 2 (id=1504): syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) setresuid$auto(0x0, 0x0, 0x0) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x40000008000) sendmsg$auto_NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x2404c800) sendmsg$auto_NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41811}, 0x20000000) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$auto_KVM_GET_MSRS(r2, 0x4068aea3, &(0x7f0000000080)={0xc0}) kexec_load$auto(0x5, 0x2, &(0x7f0000000040)={@kbuf=0x0, 0x800c000, 0x4800c000, 0x800c000}, 0x4) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/net/bond0/bonding/fail_over_mac\x00', 0x103b02, 0x0) sendfile$auto(r4, r4, 0x0, 0x8080000001) mmap$auto(0x0, 0x2000d, 0x4000000000df, 0x40000000000ebd, 0x401, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "ab06fdffff00fff500"}, 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xfdef) 1m7.285683057s ago: executing program 5 (id=1506): move_pages$auto(0x1, 0xf54, 0x0, 0x0, 0x0, 0x8000000000000000) close_range$auto(0x2, 0x8, 0x0) userfaultfd$auto(0x1) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0xc0400, 0x0) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, 0x0, 0x101000, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) sendmsg$auto_NL80211_CMD_SET_WIPHY(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x4000001) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="720100", @ANYBLOB="18"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) r1 = socketcall$auto_SYS_ACCEPT4(0x12, 0x0) sendmmsg$auto(r1, &(0x7f0000000340)={{&(0x7f0000000100), 0xe, &(0x7f0000000200)={&(0x7f0000000180)="e41ed3209e98b2fe2c817d736cdb93eb47650d5cc4d5201d3971bea51411b7d066a84e35442d9e009d278c37570450ed1292b1ca7391e1fe21550700f5b0782ef2e3ae75", 0x7}, 0x800, &(0x7f0000000240)="138796e34524dcaf89684c7283191f36021458743e20a581f0067577752c3f57f43c2ad842cc7f00b09a9c91ff47aaf6be2ac07aea633f9d21d96c3d10d6937bcfe6df54a5a7a3b7561706c768071dcd8087c1de58de0245200bb5680b4da17b64995673ba363de8bd9260dfd7e27aee0c65c86caee2c86c55ebe2d3b75e705b8cd96f87b4a5ccdffd3141ff579f1a0b5c7c4a97eb17976a88749f1e1be72b791fd5adba9d90303b56900ade95273053b036b02dd4aee8eeeebbc56818e15bde7b5dabf3522b1e18e3c943d0052847fcd249248f591ed80e14cb8f6cc92a11ec91cb8e61", 0x3, 0x200}, 0x9}, 0xffffff19, 0x3d0e8ac3) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r2) ioctl$auto_KVM_GET_MSRS(r0, 0x4008ae90, &(0x7f0000000140)={0x6}) close_range$auto(0x2, 0x8, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mtdblock0\x00', 0x14f602, 0x0) socket(0x18, 0x80004, 0x1) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/system/memory/memory15/online\x00', 0xa001, 0x0) write$auto(r3, &(0x7f0000000140)='0[.[\x00', 0xcd04) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0xa, 0x8000) r4 = socket(0xa, 0x1, 0x84) getsockopt$auto(r4, 0x0, 0x480, 0x0, &(0x7f0000000040)=0x83) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/tty/ttyve/power/runtime_active_time\x00', 0xb02, 0x0) sendfile$auto(r5, r5, 0x0, 0x1) ioctl$auto_SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, 0x0) openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000800)='/dev/tty0\x00', 0x102, 0x0) 1m6.882404169s ago: executing program 3 (id=1508): syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000d80), 0xffffffffffffffff) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) setresuid$auto(0x0, 0x0, 0x0) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x40000008000) sendmsg$auto_NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x2404c800) sendmsg$auto_NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41811}, 0x20000000) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r1, 0xae01, 0x0) kexec_load$auto(0x5, 0x2, &(0x7f0000000040)={@kbuf=0x0, 0x800c000, 0x4800c000, 0x800c000}, 0x4) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/net/bond0/bonding/fail_over_mac\x00', 0x103b02, 0x0) sendfile$auto(r2, r2, 0x0, 0x8080000001) mmap$auto(0x0, 0x2000d, 0x4000000000df, 0x40000000000ebd, 0x401, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "ab06fdffff00fff500"}, 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xfdef) 1m5.620468355s ago: executing program 2 (id=1510): r0 = syz_genetlink_get_family_id$auto_ovs_packet(&(0x7f0000001940), 0xffffffffffffffff) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x68080, 0x0) sendmsg$auto_IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x20000000) write$auto(0xffffffffffffffff, 0x0, 0xa5e) close_range$auto(0x2, 0x8, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket(0x28, 0x1, 0x0) connect$auto(0x3, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x55) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/virtual/net/bpq2/statistics/rx_missed_errors\x00', 0x48500, 0x0) r2 = socket(0x2, 0x1, 0x106) openat$auto_blk_mq_debugfs_fops_blk_mq_debugfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/block/nbd11/hctx0/busy\x00', 0x60000, 0x0) openat$auto_snd_timer_f_ops_timer(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r4 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) select$auto(0x9, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x1, 0x948b, 0xffffffffffffffff, 0x15f4da07, 0x6, 0x10, 0x64, 0x80000020, 0x1000, 0xb, 0x9, 0x4f4, 0x8]}, 0x0) r5 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop9\x00', 0x105202, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r5, 0x4c09, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x8000000000001fd, 0x20000000007, 0x1, 0xbc3, 0x800, 0x3, 0x2a, 0x8000c, 0x400000000003, 0x3, 0x0, 0xfffffffffffffffe, 0x6, 0x9, 0xffffffffffffff81, 0x4]}, 0x0) close_range$auto(0x2, 0x8, 0x0) sendmsg$auto_ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="f0020000", @ANYRES16, @ANYBLOB="01002dbd7000fedbdf2505000000da0203800800c000e000000204002a000400110008002e00", @ANYRES32, @ANYBLOB="d152e64e22695352dd73864415aa8a78c65e6ab752fb4d469a47a092ae7d5061cdd9690cac4138553ecfbb1b32dd7c33b1", @ANYBLOB], 0x2f0}, 0x1, 0x0, 0x0, 0x40000}, 0x50) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'veth0_vlan\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'ip6gretap0\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_MM_GET(r2, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="f8000000", @ANYRES16=0x0, @ANYBLOB="00082bbd7000fbdbdf252a0000002400018008000100", @ANYRES32=r6, @ANYBLOB="08000300010400000800030064c80000080003005b00840d4000018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="1400020076657468315f746f5f6272696467650008000300010001004400018008000300126d8251140002007465616d3000000000000000000000000800030045080000140002006e72300000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="2000018008000100", @ANYRES32=0x0, @ANYBLOB="1400020067656e657665310000000000000000001c592100000003000800000008000300019b73b44c000100", @ANYRES32=0x0, @ANYBLOB], 0xf8}, 0x1, 0x0, 0x0, 0x24008010}, 0x801) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="1b0026bd7000fddbdf2503000000040008000c00038008000c000400070012000100898771f1c19f17790485908286dd0000040002"], 0x40}, 0x1, 0x0, 0x0, 0x44000884}, 0xc880) sendmsg$auto_L2TP_CMD_SESSION_MODIFY(r9, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="300043db84a5e032870200", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf250700000006001a004e2200000c000f0003000000000000000500150000000000"], 0x30}}, 0x4000000) 1m5.580656795s ago: executing program 5 (id=1511): syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000d80), 0xffffffffffffffff) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x1eba02, 0x0) setresuid$auto(0x0, 0x0, 0x0) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x40000008000) sendmsg$auto_NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x2404c800) sendmsg$auto_NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41811}, 0x20000000) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$auto_KVM_GET_MSRS(r2, 0x4068aea3, &(0x7f0000000080)={0xc0}) kexec_load$auto(0x5, 0x2, &(0x7f0000000040)={@kbuf=0x0, 0x800c000, 0x4800c000, 0x800c000}, 0x4) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/net/bond0/bonding/fail_over_mac\x00', 0x103b02, 0x0) sendfile$auto(r4, r4, 0x0, 0x8080000001) mmap$auto(0x0, 0x2000d, 0x4000000000df, 0x40000000000ebd, 0x401, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "ab06fdffff00fff500"}, 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xfdef) 1m5.113812127s ago: executing program 3 (id=1513): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/bcache/register_quiet\x00', 0x401, 0x0) socket(0x25, 0x5, 0x3) mmap$auto(0x0, 0xe983, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x7f, 0x0) r1 = io_uring_setup$auto(0x1, 0x0) r2 = socketcall$auto(0x547, &(0x7f00000003c0)=0x8000000000000001) ioctl$auto_BLKSECTGET(r2, 0x1267, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0x800000000000eb1, 0xfffffffffffffffa, 0x8000) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptycf\x00', 0x800, 0x0) openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) socket(0x11, 0x80003, 0x300) socket(0x1d, 0x2, 0x7) socket(0x2, 0x3, 0x1) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) open(&(0x7f0000000100)='.\x00', 0x0, 0x408) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty12\x00', 0x800, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video43\x00', 0x129900, 0x0) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) sendmmsg$auto(0xffffffffffffffff, &(0x7f00000001c0)={{0x0, 0x1aa, 0x0, 0x6, 0x0, 0x5, 0x1001}, 0x5}, 0x2, 0x100) bpf$auto(0x9, &(0x7f0000000000)=@test={0xffffffffffffffff, 0x71c, 0xfaae, 0x468, 0x2, 0x8000000000000001, 0x80, 0x7, 0x1, 0x1fc, 0xff, 0xb5, 0x4, 0x40004, 0xd9ee}, 0xe3) writev$auto(0xca, &(0x7f0000000080)={&(0x7f0000000040), 0x1}, 0x7e) io_uring_register$auto(r1, 0x2, &(0x7f0000000040), 0x86) r3 = syz_genetlink_get_family_id$auto_nbd(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$auto_NBD_CMD_CONNECT(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2c00a001}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1ec, r3, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x837}, @NBD_ATTR_DEVICE_LIST={0x1b6, 0x9, 0x0, 0x1, [@typed={0x8, 0x13a, 0x0, 0x0, @u32=0x7}, @typed={0xc, 0xb2, 0x0, 0x0, @u64=0x1}, @typed={0x8, 0xab, 0x0, 0x0, @u32=0x1ff}, @nested={0x66, 0x33, 0x0, 0x1, [@typed={0xc, 0xa6, 0x0, 0x0, @u64=0x4}, @generic, @generic="9bdb0cc6f49bef87de3fbdbe62fe72f4bd48486a5d9e7d849e97d7b0283173b680fd2f7945ed20a5f03daabbf2045efa6b42b66a19ee7c46c4e00d63742f7b30148c3f62d66ae5f6662eb7b758663d8a9df3", @nested={0x4, 0xb6}]}, @typed={0x10, 0x4a, 0x0, 0x0, @str='-&\\/$@\\\xb7$}\'\x00'}, @nested={0x14, 0x130, 0x0, 0x1, [@typed={0xc, 0xb6, 0x0, 0x0, @u64=0x3}, @typed={0x4, 0x56}]}, @generic="446c35d056de9219172637b32080bbd57f8fe0606d79e9c384ec4d6e2377fe926a5f553cff8f5654eaaf549298006a8f3608071199e6e31aacea14d75ee5b3e027a63b2140ebf203d259e2d4b75f7b351cc995a5635a48435195f9d9ddf5", @typed={0x11, 0x62, 0x0, 0x0, @binary="af75c2c0e2b64af7a36a7eb342"}, @generic="0d0e98d0818f26dfe0bef22970ee80c2deb8be7e6f7f77857d976970f730684fb240466d4617c44c87bf547c6eccdf6ffafeee5e3e94460cb1a86a2ab69b1a252a1ad888087ffde7b287c9cc8150f33735d8caa9f7ed1ed90a25c2fab47180377ddc9f39cea8da52ded290454acb4a2f0d65c85f6067dbdc3504af89ad9e767a2596772fd75fcddf1f4ce45554d17ad2a9a9342dd4215396"]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xfffffffffffffffc}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x8}]}, 0x1ec}, 0x1, 0x0, 0x0, 0x40000}, 0x44801) pwrite64$auto(r0, &(0x7f0000000100)='/dev/sda1\x00', 0xe, 0x7) setsockopt$auto_SO_TIMESTAMPING_NEW(r0, 0x5, 0x41, &(0x7f0000000000)='/sys/fs/bcache/register_quiet\x00', 0x1) 1m4.484990178s ago: executing program 4 (id=1515): openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/adsp1\x00', 0x80502, 0x0) futex$auto(0x0, 0x0, 0x2948, 0x0, 0x0, 0x5) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, 0x0, 0xc800) sendmsg$auto_IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40014}, 0x0) bind$auto(0xffffffffffffffff, &(0x7f0000000040)=@l2tp={0x2, 0x0, @broadcast, 0x3}, 0x6a) mmap$auto(0x0, 0x2000a, 0x10000000000df, 0xeb2, 0x401, 0x8000) sendmsg$auto_SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x800) syz_genetlink_get_family_id$auto_macsec(&(0x7f00000001c0), 0xffffffffffffffff) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000000)={{0x0, 0x2, 0x0, 0x3, 0x0, 0xfffffffffffffffc, 0x696b}, 0xed7138c}, 0x2, 0x9) r0 = socket(0xa, 0x5, 0x84) sendto$auto(r0, 0x0, 0x401, 0x7f, &(0x7f0000000000)=@generic={0xa, "e2e18340cba8fe8000f5ffffffff"}, 0x1c) 1m4.484846302s ago: executing program 3 (id=1516): sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) (async) close_range$auto(0x2, 0x8, 0x0) r0 = openat$auto_xfs_dir_file_operations_xfs_file(0xffffffffffffff9c, &(0x7f0000000240)='/sys/devices/virtual/bluetooth/hci1/power\x00', 0x301000, 0x0) ioctl$auto_XFS_IOC_FREESP64(r0, 0x40305825, &(0x7f0000000100)={0xf, 0x850, 0x631e68c8, 0x1, 0x7}) (async, rerun: 32) timer_create$auto(0x3, &(0x7f0000000140)={@sival_int=0x6d9e99ff, @raw, 0x7}, &(0x7f0000000180)=0x2009) (async, rerun: 32) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) (async) io_uring_setup$auto(0x6, 0x0) (async) socket(0xa, 0x1, 0x84) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) (async) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) (async) close_range$auto(0x0, 0xffffeffe, 0x2) (async, rerun: 64) openat$auto_msr_fops_msr(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cpu/0/msr\x00', 0xf82, 0x0) (rerun: 64) pipe$auto(0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r1 = socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) bpf$auto(0x0, &(0x7f00000001c0)=@info={r1, 0x4, 0xffffffff}, 0x6d) (async, rerun: 64) open(0x0, 0x22240, 0x154) (async, rerun: 64) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) socket(0x2a, 0x2, 0x0) (async) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) (async, rerun: 64) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async, rerun: 64) getsockopt$auto(0x6, 0x1, 0x4d, 0xfffffffffffffffe, 0x0) (async) pidfd_open$auto(0x1, 0x0) (async, rerun: 32) setns(r1, 0x10020000) (rerun: 32) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) (async) syz_clone3(&(0x7f0000000300)={0x1301a4400, 0x0, 0x0, 0x0, {0x20}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) fadvise64$auto_POSIX_FADV_NOREUSE(r1, 0x7, 0x1, 0x5) (async) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0xffffffffffffffff, 0x8000) sendmmsg$auto(0x4, 0x0, 0x9a6, 0x6) (async) connect$auto(0x3, 0x0, 0x55) 1m4.391234355s ago: executing program 2 (id=1517): r0 = open(&(0x7f0000000000)='./file0\x00', 0x4242, 0xe1d2b27bdc14aabc) fallocate$auto(r0, 0x0, 0x7, 0x4cbd5d) r1 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/sctp/rto_max\x00', 0x101201, 0x0) write$auto_proc_sys_file_operations_proc_sysctl(r1, 0x0, 0x0) lchown$auto(&(0x7f0000000080)='./file0\x00', 0xee01, 0xee00) write$auto(0x3, 0x0, 0x100082) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x14fa02, 0x0) mmap$auto(0x0, 0x810004, 0x400000000ffb, 0x8000000008011, 0x3, 0x8000) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x101) lseek$auto(0x3, 0x2, 0x4) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x20000, 0x0) openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000100)='/proc/irq/0/effective_affinity_list\x00', 0x101040, 0x0) socket(0x1e, 0x1, 0x0) 1m3.918932199s ago: executing program 5 (id=1518): mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) mlock$auto(0x112, 0x80006) mlockall$auto(0x800000000000005) madvise$auto(0x0, 0x200007, 0x19) r0 = socket(0x2, 0x801, 0x100) listen$auto(r0, 0x200005) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_proc_mem_operations_base(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/mem\x00', 0x40001, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_tipcv2(&(0x7f0000000040), 0xffffffffffffffff) bpf$auto(0x400, &(0x7f0000000280)=@link_create={@map_fd=0xffffffffffffffff, @target_fd=r0, 0x8, 0x8, @kprobe_multi={0x10cd, 0x2, 0x3, 0x5, 0x3}}, 0x6f4) init_module$auto(0x0, 0xffff9, 0x0) madvise$auto(0x0, 0x2000000080000001, 0x3) close_range$auto(0x2, 0x8, 0x2) close_range$auto(r1, r3, 0x3) madvise$auto(0x0, 0xffffffffffff0005, 0x19) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/platform/vhci_hcd.12/usb33/33-0:1.0/usb33-port3/power/runtime_status\x00', 0x351200, 0x0) sendmsg$auto_NL80211_CMD_DEL_PMK(r2, &(0x7f0000000940)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40004}, 0xc, &(0x7f0000000240)={&(0x7f0000000980)=ANY=[@ANYBLOB="98000000", @ANYRES16, @ANYBLOB="100426bd7000fedbdf257c0000004f002280fc020ef97d5a0f306061c43e41c4579b2a519d6398699cfd9c6e85f4997c2678df8a208ae65b12888c5dc6bc864dfe3c1e394d0400a7000800e1000a0101", @ANYRES32=r0, @ANYBLOB="0400d700001a004e0176bf3469890194db588952aa8343b6d44579184f04c4000004004e011000b000d0708d9055775c12c8"], 0x98}, 0x1, 0x0, 0x0, 0x40000}, 0x4c804) madvise$auto(0x0, 0x2003ec, 0x14) mprotect$auto(0x0, 0xe6a, 0x6) 1m3.918139738s ago: executing program 4 (id=1519): syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000d80), 0xffffffffffffffff) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) setresuid$auto(0x0, 0x0, 0x0) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x40000008000) sendmsg$auto_NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x2404c800) sendmsg$auto_NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41811}, 0x20000000) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$auto_KVM_GET_MSRS(r2, 0x4068aea3, &(0x7f0000000080)={0xc0}) kexec_load$auto(0x5, 0x2, &(0x7f0000000040)={@kbuf=0x0, 0x800c000, 0x4800c000, 0x800c000}, 0x4) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/net/bond0/bonding/fail_over_mac\x00', 0x103b02, 0x0) sendfile$auto(r4, r4, 0x0, 0x8080000001) mmap$auto(0x0, 0x2000d, 0x4000000000df, 0x40000000000ebd, 0x401, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "ab06fdffff00fff500"}, 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xfdef) 1m3.770661719s ago: executing program 3 (id=1520): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_ftrace_system_enable_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing/events/vmalloc/enable\x00', 0x181000, 0x0) r0 = io_uring_setup$auto(0x3, 0x0) close_range$auto(0x2, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x2, 0x5, 0x0) getcwd$auto(0x0, 0xffffffffffffffff) setsockopt$auto(0x3, 0x10000000084, 0x2, 0x0, 0x8) write$auto_tomoyo_operations_securityfs_if(0xffffffffffffffff, &(0x7f0000000180)="0a1b9a5c4000006e163bb154d7886d8edeea371cadb848770dc8f745d1c76eedba12b9f694dabdbcf3401910000000000060000023b5d40a", 0x38) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) sendmmsg$auto(r2, &(0x7f0000000140)={{&(0x7f0000000040), 0x10, &(0x7f00000000c0)={0x0, 0x1fff8}, 0x7, 0x0, 0x2, 0xb}, 0xfff}, 0x5, 0x311) socket(0x848000000015, 0x5, 0x0) bind$auto(r1, 0x0, 0x0) socket(0xa, 0x1, 0x84) write$auto(0xffffffffffffffff, 0x0, 0xfffffdf1) open(&(0x7f0000000040)='&&\x00', 0x40202, 0x79) ioctl$auto(0x3, 0x89ed, 0xfffffffffffff4e0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/fs/ext4/sda1/journal_task\x00', 0x100, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) read$auto(0x3, 0x0, 0x7fffffff) syz_genetlink_get_family_id$auto_netdev(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'veth1_to_bridge\x00'}) socket$nl_generic(0x10, 0x3, 0x10) bind$auto(0x3, &(0x7f0000000000)=@ax25={0x3, @null, 0x4}, 0x7f35) close_range$auto(0x2, 0x8, 0x0) msgctl$auto_MSG_STAT_ANY(0x1, 0xd, &(0x7f0000000380)={{0xfffffff9, 0xee01, 0xffffffffffffffff, 0xfffffffe, 0x1, 0xdbf, 0x5}, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x5, 0x81, 0x6, 0x8, 0xfffffffffffffffb, 0x5, 0x7, 0x3, 0x100}) sendmsg$auto_IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000001200)=ANY=[@ANYBLOB="34040000", @ANYRES16=0x0, @ANYBLOB="080025bd7000fedbdf25040000001b04018008001d00", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="02000000"], 0x434}, 0x1, 0x0, 0x0, 0x4040084}, 0x4) semctl$auto_GETPID(0x101, 0x6, 0xb, 0x4) 1m3.25505768s ago: executing program 2 (id=1521): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_ftrace_system_enable_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing/events/vmalloc/enable\x00', 0x181000, 0x0) r0 = io_uring_setup$auto(0x3, 0x0) close_range$auto(0x2, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x2, 0x5, 0x0) getcwd$auto(0x0, 0xffffffffffffffff) setsockopt$auto(0x3, 0x10000000084, 0x2, 0x0, 0x8) write$auto_tomoyo_operations_securityfs_if(0xffffffffffffffff, &(0x7f0000000180)="0a1b9a5c4000006e163bb154d7886d8edeea371cadb848770dc8f745d1c76eedba12b9f694dabdbcf3401910000000000060000023b5d40a", 0x38) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) sendmmsg$auto(r2, &(0x7f0000000140)={{&(0x7f0000000040), 0x10, &(0x7f00000000c0)={0x0, 0x1fff8}, 0x7, 0x0, 0x2, 0xb}, 0xfff}, 0x5, 0x311) socket(0x848000000015, 0x5, 0x0) bind$auto(r1, 0x0, 0x0) socket(0xa, 0x1, 0x84) write$auto(0xffffffffffffffff, 0x0, 0xfffffdf1) open(&(0x7f0000000040)='&&\x00', 0x40202, 0x79) ioctl$auto(0x3, 0x89ed, 0xfffffffffffff4e0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/fs/ext4/sda1/journal_task\x00', 0x100, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) read$auto(0x3, 0x0, 0x7fffffff) syz_genetlink_get_family_id$auto_netdev(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'veth1_to_bridge\x00'}) socket$nl_generic(0x10, 0x3, 0x10) bind$auto(0x3, &(0x7f0000000000)=@ax25={0x3, @null, 0x4}, 0x7f35) close_range$auto(0x2, 0x8, 0x0) msgctl$auto_MSG_STAT_ANY(0x1, 0xd, &(0x7f0000000380)={{0xfffffff9, 0xee01, 0xffffffffffffffff, 0xfffffffe, 0x1, 0xdbf, 0x5}, &(0x7f0000000300)=0x8, &(0x7f0000000340)=0x5, 0x81, 0x6, 0x8, 0xfffffffffffffffb, 0x5, 0x7, 0x3, 0x100}) sendmsg$auto_IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f0000001200)=ANY=[@ANYBLOB="34040000", @ANYRES16=0x0, @ANYBLOB="080025bd7000fedbdf25040000001b04018008001d00", @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="02000000"], 0x434}, 0x1, 0x0, 0x0, 0x4040084}, 0x4) semctl$auto_GETPID(0x101, 0x6, 0xb, 0x4) 1m3.066477119s ago: executing program 4 (id=1522): r0 = socket(0x10, 0x2, 0x0) r1 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000000240)={0x2c, r1, 0x1, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_WOL_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x801}, 0x40) 1m2.970579409s ago: executing program 3 (id=1523): openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/adsp1\x00', 0x80502, 0x0) futex$auto(0x0, 0x0, 0x2948, 0x0, 0x0, 0x5) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, 0x0, 0xc800) sendmsg$auto_IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40014}, 0x0) bind$auto(0xffffffffffffffff, &(0x7f0000000040)=@l2tp={0x2, 0x0, @broadcast, 0x3}, 0x6a) mmap$auto(0x0, 0x2000a, 0x10000000000df, 0xeb2, 0x401, 0x8000) sendmsg$auto_SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x800) syz_genetlink_get_family_id$auto_macsec(&(0x7f00000001c0), 0xffffffffffffffff) sendmmsg$auto(0xffffffffffffffff, &(0x7f0000000000)={{0x0, 0x2, 0x0, 0x3, 0x0, 0xfffffffffffffffc, 0x696b}, 0xed7138c}, 0x2, 0x9) r0 = socket(0xa, 0x5, 0x84) sendto$auto(r0, 0x0, 0x401, 0x7f, &(0x7f0000000000)=@generic={0xa, "e2e18340cba8fe8000003f00"}, 0x1c) 1m2.900340583s ago: executing program 5 (id=1524): r0 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/kernel/perf_cpu_time_max_percent\x00', 0xa042, 0x0) r1 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv6/neigh/ip6_vti0/anycast_delay\x00', 0x800, 0x0) sendfile$auto(r0, r1, 0x0, 0x48) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x14be02, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) mmap$auto(0x0, 0x6, 0x7, 0xeb1, 0xffffffffffffffff, 0x10008000) madvise$auto(0x0, 0x400053, 0x9) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) 1m2.75712289s ago: executing program 4 (id=1525): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r1 = syz_genetlink_get_family_id$auto_vdpa(&(0x7f0000000040), r0) r2 = bpf$auto_BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)=@prog_bind_map={r0, r0}, 0x400) sendmsg$auto_VDPA_CMD_DEV_VSTATS_GET(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000005c0)={0x19c, r1, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@VDPA_ATTR_DEV_FEATURES={0xc, 0x14, 0x9c0}, @VDPA_ATTR_MGMTDEV_BUS_NAME={0xa7, 0x1, '\x00\x00\xdc]j\x16\xd3\xf6\b\x00\x00\x00\x00\x00\x00\x00\xee\x91\x81>\x16\x8f\xe1Z;\x00\x9f\x85t\x9dy\xbf\"\x86D\xcd\xd4\x1a\x0e\b\xe9\x8b\xcfw\xbe\xab^\x9c\x89\xacdD5\xf6\x18\xd2\"\xa6\\\x9f\xa8C\xc4\x02\x91\xed8V\xcb\"\x9b\xcda\xb0\xa3wi&\xce\x9bO\x8ehZ\xea\x858\v\x04D\xd3\xa9\x14\x8a\xe4t=\xe2\xbb\x1dBu\x06>xR\x0f4\x00\x00\x00\x00\x00\x00\x00\xa9\xd9/FJ\x17)d\xf53I\xc0B\x83\x7f\xa92w#H\x16\x8c\xa4(\xf7\xac\xda\xd2\xa8\x9a\x88\xa5\xbf\f\xeb\n\xf4\xee\t7\xa6\nc\xf7\xe0\xb1\x96\xe5'}, @VDPA_ATTR_DEV_NAME={0x14, 0x4, 'veth1\x00'}, @VDPA_ATTR_DEV_NAME={0x14, 0x4, 'caif0\x00'}, @VDPA_ATTR_DEV_FEATURES={0xc, 0x14, 0x8}, @VDPA_ATTR_DEV_NET_CFG_MAX_VQP={0x6, 0xc, 0x1ff}, @VDPA_ATTR_DEV_NET_CFG_MAX_VQP={0x6, 0xc, 0x8}, @VDPA_ATTR_DEV_NET_CFG_MAX_VQP={0x6}, @VDPA_ATTR_DEV_NET_CFG_MACADDR={0x7a, 0xa, "f168b10d4e4c7e42a7ce37cbcc7d969deb25e96ac8fed3ef8c25c00c8e29d033f64741fa2f996da6a3c842dccea49cb523e132049ccf119d139fcb0036e7364edf361503cbd4aa2d72fff8723ccb09a6b257895d349dd2266340251fb3da919ad3caef67fc200892ced4f157aad5badfe7bfcaf4e07f"}, @VDPA_ATTR_DEV_FEATURES={0xc, 0x14, 0x434c}]}, 0x19c}, 0x1, 0x0, 0x0, 0x80}, 0x400c861) close_range$auto(0x0, 0xfffffffffffff000, 0x2) socket(0x2, 0x801, 0x106) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket(0x10, 0x80002, 0x0) close_range$auto(0x2, 0x8000, 0x0) timerfd_create$auto(0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000540), 0xffffffffffffffff) sendmsg$auto_HWSIM_CMD_GET_RADIO(r4, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000000280)={0x14, r5, 0xf3e97f51700e57cf, 0x70bd28, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x884}, 0x8020) timerfd_settime$auto(r3, 0x3, 0x0, 0x0) 1m2.652482871s ago: executing program 5 (id=1526): r0 = syz_genetlink_get_family_id$auto_ovs_packet(&(0x7f0000001940), 0xffffffffffffffff) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x68080, 0x0) sendmsg$auto_IPVS_CMD_GET_SERVICE(0xffffffffffffffff, 0x0, 0x20000000) write$auto(0xffffffffffffffff, 0x0, 0xa5e) close_range$auto(0x2, 0x8, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket(0x28, 0x1, 0x0) connect$auto(0x3, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x55) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/virtual/net/bpq2/statistics/rx_missed_errors\x00', 0x48500, 0x0) r2 = socket(0x2, 0x1, 0x106) openat$auto_blk_mq_debugfs_fops_blk_mq_debugfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/block/nbd11/hctx0/busy\x00', 0x60000, 0x0) openat$auto_snd_timer_f_ops_timer(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r4 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) select$auto(0x9, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x1, 0x948b, 0xffffffffffffffff, 0x15f4da07, 0x6, 0x10, 0x64, 0x80000020, 0x1000, 0xb, 0x9, 0x4f4, 0x8]}, 0x0) r5 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop9\x00', 0x105202, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r5, 0x4c09, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x8000000000001fd, 0x20000000007, 0x1, 0xbc3, 0x800, 0x3, 0x2a, 0x8000c, 0x400000000003, 0x3, 0x0, 0xfffffffffffffffe, 0x6, 0x9, 0xffffffffffffff81, 0x4]}, 0x0) close_range$auto(0x2, 0x8, 0x0) sendmsg$auto_ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="f0020000", @ANYRES16, @ANYBLOB="01002dbd7000fedbdf2505000000da0203800800c000e000000204002a000400110008002e00", @ANYRES32, @ANYBLOB="d152e64e22695352dd73864415aa8a78c65e6ab752fb4d469a47a092ae7d5061cdd9690cac4138553ecfbb1b32dd7c33b1", @ANYBLOB], 0x2f0}, 0x1, 0x0, 0x0, 0x40000}, 0x50) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'veth0_vlan\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'ip6gretap0\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_MM_GET(r2, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000380)=ANY=[@ANYBLOB="f8000000", @ANYRES16=0x0, @ANYBLOB="00082bbd7000fbdbdf252a0000002400018008000100", @ANYRES32=r6, @ANYBLOB="08000300010400000800030064c80000080003005b00840d4000018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="1400020076657468315f746f5f6272696467650008000300010001004400018008000300126d8251140002007465616d3000000000000000000000000800030045080000140002006e72300000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="2000018008000100", @ANYRES32=0x0, @ANYBLOB="1400020067656e657665310000000000000000001c592100000003000800000008000300019b73b44c000100", @ANYRES32=0x0, @ANYBLOB], 0xf8}, 0x1, 0x0, 0x0, 0x24008010}, 0x801) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="1b0026bd7000fddbdf2503000000040008000c00038008000c000400070012000100898771f1c19f17790485908286dd0000040002"], 0x40}, 0x1, 0x0, 0x0, 0x44000884}, 0xc880) sendmsg$auto_L2TP_CMD_SESSION_MODIFY(r9, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="300043db84a5e032870200", @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf250700000006001a004e2200000c000f0003000000000000000500150000000000"], 0x30}}, 0x4000000) 1m2.623070611s ago: executing program 4 (id=1527): r0 = openat$auto_kmsg_fops_printk(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000001240)='/sys/devices/platform/vhci_hcd.12/usb33/33-0:1.0/usb33-port3/power/runtime_active_time\x00', 0x4400, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) r2 = socket(0xa, 0x2, 0x0) getsockopt$auto(r2, 0x1, 0x49, 0x0, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r1, &(0x7f0000000100)=""/4096, 0x1000) bpf$auto_BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=@bpf_attr_4={0x5, 0xffffffffffffffff, 0x3, r0}, 0x80) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r3 = socket(0x2, 0x1, 0x106) close_range$auto(0x0, 0xfffffffffffff000, 0x2) r4 = socket(0x2, 0xa, 0x1) r5 = bpf$auto(0x0, &(0x7f00000000c0)=@bpf_attr_4={0x1f, r4, 0x10000}, 0x10) mmap$auto(0x0, 0x200d, 0xfffffffffffffffd, 0x8000200088014, r6, 0x6) setitimer$auto(0x2, &(0x7f0000000040)={{0x0, 0x5}, {0x0, 0x8}}, 0x0) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) mincore$auto(0x1000, 0x4000000, 0x0) syz_clone3(&(0x7f0000000400)={0x148000400, 0x0, 0x0, 0x0, {0x10000027}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$auto_SNDRV_TIMER_IOCTL_PAUSE(r5, 0x54a3, 0x0) ioctl$auto_UI_SET_FFBIT(r6, 0x4004556b, &(0x7f0000001180)=0x9) bind$auto(r3, &(0x7f0000000040)=@in={0x2, 0x3, @multicast2}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) writev$auto(0x3, &(0x7f0000000080)={0x0, 0x1}, 0x3) ioctl$auto_CEC_TRANSMIT(0xffffffffffffffff, 0xc0386105, &(0x7f0000000080)={0x40000000001, 0x1, 0x7, 0x8, 0x2, 0xcb, "8a9750a07c00", 0x6, 0x6, 0x6, 0x9, 0x8, 0x5, 0x81}) ioctl$auto_MEMWRITEOOB(r5, 0xc0104d03, &(0x7f0000001140)={0x7f, 0x8, &(0x7f0000001100)='\\(\x00'}) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) ioctl$auto_FBIOPUTCMAP(0xffffffffffffffff, 0x4605, &(0x7f0000000080)="d786d318e2f67356a6bd48591c932386d5e8cdb0c7c62c479631cf644777a36a05e2dbcffb909b66cb918c2a30703fa6e9ecceedf37c4a2294f4ec72bb492753ad3494ea98ed13be78e35813c1d49158f6f059a098c54e1c2f064862bed9371fa0a566db5b99c57c5a53f9efbb1dabcba33455268e4ba9be49d6dd8ff5434f8f9b83624ab2fd47caad8170c89448ea0af7") capget$auto(0x0, 0xfffffffffffffffe) capset$auto(0x0, &(0x7f0000000100)={0x1ff, 0xfff, 0x1000}) bpf$auto(0x5, &(0x7f00000000c0)=@bpf_attr_0={0x5, 0xe, 0x100, 0x80000001, 0x6fca, r2, 0x5, "31b63adcc97aa60ffd8c28b17c06a76e", 0x0, 0xffffffffffffffff, 0x61, 0xffffffff, 0x4, 0x8}, 0x9) readv$auto(0x3, &(0x7f0000000040)={0x0, 0x36a}, 0x6) 1m2.532100511s ago: executing program 3 (id=1528): syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000d80), 0xffffffffffffffff) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x1eba02, 0x0) setresuid$auto(0x0, 0x0, 0x0) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x40000008000) sendmsg$auto_NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x2404c800) sendmsg$auto_NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41811}, 0x20000000) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$auto_KVM_GET_MSRS(r2, 0x4068aea3, &(0x7f0000000080)={0xc0}) kexec_load$auto(0x5, 0x2, &(0x7f0000000040)={@kbuf=0x0, 0x800c000, 0x4800c000, 0x800c000}, 0x4) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/net/bond0/bonding/fail_over_mac\x00', 0x103b02, 0x0) sendfile$auto(r4, r4, 0x0, 0x8080000001) mmap$auto(0x0, 0x2000d, 0x4000000000df, 0x40000000000ebd, 0x401, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "ab06fdffff00fff500"}, 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xfdef) 1m2.306602756s ago: executing program 4 (id=1529): syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000d80), 0xffffffffffffffff) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x1eba02, 0x0) setresuid$auto(0x0, 0x0, 0x0) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x40000008000) sendmsg$auto_NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x2404c800) sendmsg$auto_NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41811}, 0x20000000) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$auto_KVM_GET_MSRS(r2, 0x4068aea3, &(0x7f0000000080)={0xc0}) kexec_load$auto(0x5, 0x2, &(0x7f0000000040)={@kbuf=0x0, 0x800c000, 0x4800c000, 0x800c000}, 0x4) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/net/bond0/bonding/fail_over_mac\x00', 0x103b02, 0x0) sendfile$auto(r4, r4, 0x0, 0x8080000001) mmap$auto(0x0, 0x2000d, 0x4000000000df, 0x40000000000ebd, 0x401, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "ab06fdffff00fff500"}, 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xfdef) 1m1.97218885s ago: executing program 2 (id=1530): syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000d80), 0xffffffffffffffff) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) setresuid$auto(0x0, 0x0, 0x0) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x40000008000) sendmsg$auto_NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc000}, 0x2404c800) sendmsg$auto_NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x41811}, 0x20000000) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$auto_KVM_GET_MSRS(r2, 0x4068aea3, &(0x7f0000000080)={0xc0}) kexec_load$auto(0x5, 0x2, &(0x7f0000000040)={@kbuf=0x0, 0x800c000, 0x4800c000, 0x800c000}, 0x4) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/net/bond0/bonding/fail_over_mac\x00', 0x103b02, 0x0) sendfile$auto(r4, r4, 0x0, 0x8080000001) mmap$auto(0x0, 0x2000d, 0x4000000000df, 0x40000000000ebd, 0x401, 0x8000) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x0) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "ab06fdffff00fff500"}, 0x55) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xfdef) 1m1.588660439s ago: executing program 5 (id=1531): mmap$auto(0x0, 0x2020009, 0x3, 0x50, 0xffffffffffffffff, 0x8002) (async) getcwd$auto(0x0, 0x7) r0 = epoll_create$auto(0x4) epoll_pwait$auto(r0, 0x0, 0x800, 0x4d, 0x0, 0x8) sendmsg$auto_SMC_NETLINK_REMOVE_UEID(r0, 0x0, 0x14) (async) connect$auto(0x3, &(0x7f0000000080)=@qipcrtr={0x2a, 0x0, 0x8000}, 0x54) (async) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) (async) socket(0x1e, 0x0, 0xfffffeff) (async) socket(0xa, 0x801, 0x106) (async) mmap$auto(0x0, 0x40, 0x40000e2, 0xeb1, 0x401, 0x8000) (async) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) (async) write$auto(0x1, 0x0, 0x80000000) (async) r1 = fcntl$auto(0x0, 0x407, 0x0) mmap$auto(0x0, 0xe983, 0x3, 0xcb1, r1, 0x8000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) (async) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) (async) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, 0x0, 0x1, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async) close_range$auto(0x2, 0x8, 0x0) (async) r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000100)='/dev/tty51\x00', 0x80, 0x0) (async) close_range$auto(0x2, 0x8, 0x0) (async) socketpair$auto(0xef, 0x6, 0x8000000000000000, 0x0) (async) r3 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptyp6\x00', 0xa0102, 0x0) ioctl$auto_TIOCSETD2(r3, 0x5423, 0x0) read$auto(r2, 0x0, 0x6) ioctl$auto_TIOCVHANGUP2(r2, 0x5437, 0x0) (async) sendmsg$auto_IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000003b40)={0x0, 0x0, &(0x7f0000003b00)={0x0}, 0x1, 0x0, 0x0, 0x400c040}, 0x1000c0d5) io_uring_setup$auto(0x6, 0x0) (async) sendmsg$auto_NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x2404c800) (async) openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, 0x0, 0x84080, 0x0) 0s ago: executing program 34 (id=1531): mmap$auto(0x0, 0x2020009, 0x3, 0x50, 0xffffffffffffffff, 0x8002) (async) getcwd$auto(0x0, 0x7) r0 = epoll_create$auto(0x4) epoll_pwait$auto(r0, 0x0, 0x800, 0x4d, 0x0, 0x8) sendmsg$auto_SMC_NETLINK_REMOVE_UEID(r0, 0x0, 0x14) (async) connect$auto(0x3, &(0x7f0000000080)=@qipcrtr={0x2a, 0x0, 0x8000}, 0x54) (async) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) (async) socket(0x1e, 0x0, 0xfffffeff) (async) socket(0xa, 0x801, 0x106) (async) mmap$auto(0x0, 0x40, 0x40000e2, 0xeb1, 0x401, 0x8000) (async) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) (async) write$auto(0x1, 0x0, 0x80000000) (async) r1 = fcntl$auto(0x0, 0x407, 0x0) mmap$auto(0x0, 0xe983, 0x3, 0xcb1, r1, 0x8000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) (async) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) (async) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, 0x0, 0x1, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async) close_range$auto(0x2, 0x8, 0x0) (async) r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000100)='/dev/tty51\x00', 0x80, 0x0) (async) close_range$auto(0x2, 0x8, 0x0) (async) socketpair$auto(0xef, 0x6, 0x8000000000000000, 0x0) (async) r3 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptyp6\x00', 0xa0102, 0x0) ioctl$auto_TIOCSETD2(r3, 0x5423, 0x0) read$auto(r2, 0x0, 0x6) ioctl$auto_TIOCVHANGUP2(r2, 0x5437, 0x0) (async) sendmsg$auto_IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000003b40)={0x0, 0x0, &(0x7f0000003b00)={0x0}, 0x1, 0x0, 0x0, 0x400c040}, 0x1000c0d5) io_uring_setup$auto(0x6, 0x0) (async) sendmsg$auto_NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x2404c800) (async) openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, 0x0, 0x84080, 0x0) kernel console output (not intermixed with test programs): 0] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 263.441619][ T1130] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 263.457802][ T1130] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 263.688376][ T8366] netlink: 8 bytes leftover after parsing attributes in process `syz.0.490'. [ 265.033152][ T8393] netlink: 25 bytes leftover after parsing attributes in process `syz.3.503'. [ 265.362585][ T8402] NOTICE: Automounting of tracing to debugfs is deprecated and will be removed in 2030 [ 266.182007][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 266.188836][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 268.177776][ T5849] Bluetooth: hci4: Opcode 0x0c03 failed: -110 [ 268.369788][ T8445] Format for adding new device is "id port_count num_queues" (uint uint unit). [ 268.611542][ T8449] input: ¶š9ã%v”ûJ,6Ö‘ as /devices/virtual/input/input6 [ 271.110134][ T8488] nvme_fcloop: unknown parameter or missing value 'Ù›ª' [ 273.959304][ T8540] netlink: 28 bytes leftover after parsing attributes in process `syz.0.524'. [ 274.228969][ T8540] team0 (unregistering): Port device team_slave_0 removed [ 274.274273][ T8540] team0 (unregistering): Port device team_slave_1 removed [ 281.715329][ T8722] netlink: 8 bytes leftover after parsing attributes in process `syz.0.556'. [ 285.212146][ T8775] zswap: compressor not available [ 285.371982][ T8779] : renamed from gre0 (while UP) [ 286.983858][ T8791] : renamed from gre0 (while UP) [ 289.608206][ T8825] netlink: 28 bytes leftover after parsing attributes in process `syz.4.577'. [ 289.862790][ T8830] : renamed from gre0 (while UP) [ 289.932680][ T8818] kexec: Could not allocate control_code_buffer [ 290.462038][ T8837] zswap: compressor -] not available [ 290.510910][ T8845] Invalid ELF header magic: != ELF [ 291.600421][ T8868] FAULT_INJECTION: forcing a failure. [ 291.600421][ T8868] name failslab, interval 1, probability 0, space 0, times 0 [ 291.613343][ T8868] CPU: 1 UID: 0 PID: 8868 Comm: syz.0.591 Tainted: G L syzkaller #0 PREEMPT(full) [ 291.613381][ T8868] Tainted: [L]=SOFTLOCKUP [ 291.613389][ T8868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 291.613410][ T8868] Call Trace: [ 291.613418][ T8868] [ 291.613431][ T8868] dump_stack_lvl+0x116/0x1f0 [ 291.613463][ T8868] should_fail_ex+0x512/0x640 [ 291.613504][ T8868] should_failslab+0xc2/0x120 [ 291.613543][ T8868] kmem_cache_alloc_noprof+0x83/0x770 [ 291.613574][ T8868] ? __send_signal_locked+0x159/0x12c0 [ 291.613609][ T8868] ? __send_signal_locked+0x159/0x12c0 [ 291.613635][ T8868] __send_signal_locked+0x159/0x12c0 [ 291.613669][ T8868] do_notify_parent+0xd84/0xfa0 [ 291.613700][ T8868] ? __pfx_do_notify_parent+0x10/0x10 [ 291.613728][ T8868] ? do_raw_spin_lock+0x12c/0x2b0 [ 291.613766][ T8868] ? lockdep_hardirqs_on+0x7c/0x110 [ 291.613789][ T8868] ? will_become_orphaned_pgrp+0x2ac/0x340 [ 291.613820][ T8868] do_exit+0x1aac/0x2bd0 [ 291.613850][ T8868] ? __pfx_do_exit+0x10/0x10 [ 291.613881][ T8868] do_group_exit+0xd3/0x2a0 [ 291.613907][ T8868] __x64_sys_exit_group+0x3e/0x50 [ 291.613932][ T8868] x64_sys_call+0x151c/0x1740 [ 291.613968][ T8868] do_syscall_64+0xcd/0xf80 [ 291.613994][ T8868] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 291.614019][ T8868] RIP: 0033:0x7fe4ef18f7c9 [ 291.614037][ T8868] Code: Unable to access opcode bytes at 0x7fe4ef18f79f. [ 291.614047][ T8868] RSP: 002b:00007ffcdbf4d768 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 291.614070][ T8868] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe4ef18f7c9 [ 291.614085][ T8868] RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000 [ 291.614099][ T8868] RBP: 00007ffcdbf4d7cc R08: 00000010dbf4d85f R09: 00000000000927c0 [ 291.614114][ T8868] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000091 [ 291.614128][ T8868] R13: 00000000000927c0 R14: 000000000004710d R15: 00007ffcdbf4d820 [ 291.614161][ T8868] [ 293.261283][ T8884] FAULT_INJECTION: forcing a failure. [ 293.261283][ T8884] name failslab, interval 1, probability 0, space 0, times 0 [ 293.274442][ T8884] CPU: 0 UID: 0 PID: 8884 Comm: syz.3.594 Tainted: G L syzkaller #0 PREEMPT(full) [ 293.274491][ T8884] Tainted: [L]=SOFTLOCKUP [ 293.274502][ T8884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 293.274521][ T8884] Call Trace: [ 293.274530][ T8884] [ 293.274541][ T8884] dump_stack_lvl+0x16c/0x1f0 [ 293.274578][ T8884] should_fail_ex+0x512/0x640 [ 293.274614][ T8884] ? __kmalloc_cache_noprof+0x5f/0x800 [ 293.274656][ T8884] should_failslab+0xc2/0x120 [ 293.274709][ T8884] __kmalloc_cache_noprof+0x80/0x800 [ 293.274747][ T8884] ? pkcs7_parse_message+0x15d/0x720 [ 293.274798][ T8884] ? pkcs7_parse_message+0x15d/0x720 [ 293.274842][ T8884] pkcs7_parse_message+0x15d/0x720 [ 293.274892][ T8884] verify_pkcs7_signature+0x30/0xa0 [ 293.274939][ T8884] valid_regdb+0x211/0x590 [ 293.274978][ T8884] ? __pfx_valid_regdb+0x10/0x10 [ 293.275031][ T8884] reg_reload_regdb+0x11a/0x460 [ 293.275071][ T8884] ? __pfx_reg_reload_regdb+0x10/0x10 [ 293.275113][ T8884] ? __pfx_nl80211_pre_doit+0x10/0x10 [ 293.275159][ T8884] ? nl80211_pre_doit+0x1b0/0xb10 [ 293.275211][ T8884] genl_family_rcv_msg_doit+0x209/0x2f0 [ 293.275252][ T8884] ? __pfx_genl_family_rcv_msg_doit+0x10/0x10 [ 293.275289][ T8884] ? genl_get_cmd+0x194/0x580 [ 293.275332][ T8884] ? bpf_lsm_capable+0x9/0x10 [ 293.275375][ T8884] ? security_capable+0x7e/0x260 [ 293.275416][ T8884] genl_rcv_msg+0x55c/0x800 [ 293.275457][ T8884] ? __pfx_genl_rcv_msg+0x10/0x10 [ 293.275493][ T8884] ? __pfx_nl80211_pre_doit+0x10/0x10 [ 293.275537][ T8884] ? __pfx_nl80211_reload_regdb+0x10/0x10 [ 293.275573][ T8884] ? __pfx_nl80211_post_doit+0x10/0x10 [ 293.275635][ T8884] netlink_rcv_skb+0x158/0x420 [ 293.275665][ T8884] ? __pfx_genl_rcv_msg+0x10/0x10 [ 293.275701][ T8884] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 293.275746][ T8884] ? netlink_deliver_tap+0x1ae/0xd30 [ 293.275801][ T8884] genl_rcv+0x28/0x40 [ 293.275831][ T8884] netlink_unicast+0x5aa/0x870 [ 293.275888][ T8884] ? __pfx_netlink_unicast+0x10/0x10 [ 293.275957][ T8884] netlink_sendmsg+0x8c8/0xdd0 [ 293.276024][ T8884] ? __pfx_netlink_sendmsg+0x10/0x10 [ 293.276082][ T8884] ? aa_sock_msg_perm.constprop.0+0x100/0x1b0 [ 293.276124][ T8884] ____sys_sendmsg+0xa5d/0xc30 [ 293.276159][ T8884] ? copy_msghdr_from_user+0x10a/0x160 [ 293.276205][ T8884] ? __pfx_____sys_sendmsg+0x10/0x10 [ 293.276249][ T8884] ? __pfx_futex_wake_mark+0x10/0x10 [ 293.276302][ T8884] ___sys_sendmsg+0x134/0x1d0 [ 293.276351][ T8884] ? __pfx____sys_sendmsg+0x10/0x10 [ 293.276399][ T8884] ? futex_private_hash_put+0x160/0x1b0 [ 293.276479][ T8884] __sys_sendmsg+0x16d/0x220 [ 293.276520][ T8884] ? __pfx___sys_sendmsg+0x10/0x10 [ 293.276558][ T8884] ? __x64_sys_futex+0x1e0/0x4c0 [ 293.276610][ T8884] do_syscall_64+0xcd/0xf80 [ 293.276638][ T8884] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 293.276665][ T8884] RIP: 0033:0x7fbbc0b8f7c9 [ 293.276687][ T8884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.276713][ T8884] RSP: 002b:00007fbbbedf6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 293.276738][ T8884] RAX: ffffffffffffffda RBX: 00007fbbc0de5fa0 RCX: 00007fbbc0b8f7c9 [ 293.276756][ T8884] RDX: 00000000000000d0 RSI: 0000200000000580 RDI: 0000000000000006 [ 293.276771][ T8884] RBP: 00007fbbc0c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 293.276787][ T8884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 293.276802][ T8884] R13: 00007fbbc0de6038 R14: 00007fbbc0de5fa0 R15: 00007fffa2180728 [ 293.276837][ T8884] [ 299.336012][ T8948] netlink: 28 bytes leftover after parsing attributes in process `syz.4.609'. [ 299.968811][ T8948] veth1_macvtap: left promiscuous mode [ 300.137986][ T8954] netlink: 4 bytes leftover after parsing attributes in process `syz.2.610'. [ 301.122579][ T8963] netlink: 504 bytes leftover after parsing attributes in process `syz.4.612'. [ 303.569886][ T8999] Invalid ELF header magic: != ELF [ 303.981607][ T9011] netlink: 28 bytes leftover after parsing attributes in process `syz.3.621'. [ 304.059883][ T9011] veth1_macvtap: left promiscuous mode [ 305.291240][ T9032] Invalid ELF header magic: != ELF [ 307.122913][ T9051] cgroup: fork rejected by pids controller in /syz4 [ 309.152057][ T9119] netlink: 28 bytes leftover after parsing attributes in process `syz.0.635'. [ 309.191989][ T9119] veth1_macvtap: left promiscuous mode [ 310.737550][ T9138] vivid-007: ================= START STATUS ================= [ 310.800576][ T9138] vivid-007: Generate PTS: true [ 310.805712][ T9138] vivid-007: Generate SCR: true [ 310.831462][ T9138] tpg source WxH: 320x240 (Y'CbCr) [ 310.857691][ T9138] tpg field: 1 [ 310.872950][ T9138] tpg crop: (0,0)/320x240 [ 310.906292][ T9138] tpg compose: (0,0)/320x240 [ 310.959051][ T9138] tpg colorspace: 8 [ 310.962934][ T9138] tpg transfer function: 0/0 [ 311.037463][ T9138] tpg Y'CbCr encoding: 0/0 [ 311.092441][ T9138] tpg quantization: 0/0 [ 311.124129][ T9138] tpg RGB range: 0/2 [ 311.143964][ T9138] vivid-007: ================== END STATUS ================== [ 314.026874][ T9187] netlink: 28 bytes leftover after parsing attributes in process `syz.2.651'. [ 314.181700][ T9187] veth1_macvtap: left promiscuous mode [ 316.300458][ T9218] netlink: 4 bytes leftover after parsing attributes in process `syz.0.659'. [ 316.865728][ T9224] Invalid ELF header magic: != ELF [ 319.516515][ T31] audit: type=1800 audit(4294967419.600:4): pid=9269 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.665" name="lu_gp_id" dev="configfs" ino=31111 res=0 errno=0 [ 319.646425][ T31] audit: type=1804 audit(4294967419.670:5): pid=9263 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz.2.666" name="/newroot/168/file0" dev="tmpfs" ino=895 res=1 errno=0 [ 327.630880][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 327.638226][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 330.045950][ T9423] netlink: 'syz.0.708': attribute type 1 has an invalid length. [ 330.355210][ T9429] syz.4.710 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 334.396412][ T9474] netlink: 8 bytes leftover after parsing attributes in process `syz.3.719'. [ 336.187763][ T9497] netlink: 28 bytes leftover after parsing attributes in process `syz.3.723'. [ 336.242301][ T5849] Bluetooth: hci3: unexpected event 0x23 length: 127 > 13 [ 336.445290][ T9498] netlink: 4 bytes leftover after parsing attributes in process `syz.0.724'. [ 336.748940][ T9497] bond0: (slave bond_slave_1): Releasing backup interface [ 336.806030][ T9494] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 336.843845][ T9494] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 336.858246][ T9494] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 336.892673][ T9494] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 336.914302][ T9494] Bluetooth: hci1: Opcode 0x0406 failed: -4 [ 337.008880][ T9494] Bluetooth: hci1: Opcode 0x0406 failed: -4 [ 338.337713][ T5849] Bluetooth: hci0: command 0x0406 tx timeout [ 338.897772][ T52] Bluetooth: hci3: command 0x0406 tx timeout [ 338.898276][ T5845] Bluetooth: hci2: command 0x0406 tx timeout [ 338.904128][ T5849] Bluetooth: hci1: command 0x0c1a tx timeout [ 338.948673][ T9535] netlink: 8 bytes leftover after parsing attributes in process `syz.4.734'. [ 340.507344][ T9572] netlink: 4 bytes leftover after parsing attributes in process `syz.4.742'. [ 340.987760][ T5849] Bluetooth: hci1: command 0x0c1a tx timeout [ 343.057812][ T5849] Bluetooth: hci1: command 0x0c1a tx timeout [ 343.364632][ T9601] netlink: 4 bytes leftover after parsing attributes in process `syz.4.747'. [ 344.820512][ T9618] netlink: 4 bytes leftover after parsing attributes in process `syz.0.758'. [ 348.531530][ T9659] ubi0: attaching mtd0 [ 348.565513][ T9659] ubi0: scanning is finished [ 348.617724][ T9659] ubi0: empty MTD device detected [ 348.940470][ T9659] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 349.521623][ T9674] netlink: 4 bytes leftover after parsing attributes in process `syz.3.764'. [ 349.600113][ T9675] netlink: 4 bytes leftover after parsing attributes in process `syz.2.763'. [ 352.433771][ T9713] netlink: 8 bytes leftover after parsing attributes in process `syz.2.772'. [ 353.788258][ T9739] netlink: 4 bytes leftover after parsing attributes in process `syz.4.776'. [ 354.126727][ T9743] binder: 9742:9743 ioctl 400c620e 0 returned -14 [ 354.415407][ T9748] FAULT_INJECTION: forcing a failure. [ 354.415407][ T9748] name fail_futex, interval 1, probability 0, space 0, times 0 [ 354.507954][ T9748] CPU: 0 UID: 0 PID: 9748 Comm: syz.0.779 Tainted: G L syzkaller #0 PREEMPT(full) [ 354.508002][ T9748] Tainted: [L]=SOFTLOCKUP [ 354.508012][ T9748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 354.508043][ T9748] Call Trace: [ 354.508054][ T9748] [ 354.508065][ T9748] dump_stack_lvl+0x16c/0x1f0 [ 354.508100][ T9748] should_fail_ex+0x512/0x640 [ 354.508142][ T9748] get_futex_key+0x1d0/0x15f0 [ 354.508176][ T9748] ? __pfx_get_futex_key+0x10/0x10 [ 354.508204][ T9748] ? orangefs_debug_write+0x3bf/0x770 [ 354.508242][ T9748] ? lock_acquire+0x179/0x330 [ 354.508267][ T9748] ? __pfx_orangefs_debug_write+0x10/0x10 [ 354.508302][ T9748] ? __debugfs_file_get+0x1fe/0x840 [ 354.508343][ T9748] futex_wake+0xea/0x530 [ 354.508382][ T9748] ? __pfx_futex_wake+0x10/0x10 [ 354.508423][ T9748] ? ksys_write+0x190/0x250 [ 354.508467][ T9748] do_futex+0x1e3/0x350 [ 354.508498][ T9748] ? __pfx_do_futex+0x10/0x10 [ 354.508536][ T9748] __x64_sys_futex+0x1e0/0x4c0 [ 354.508575][ T9748] ? fput+0x70/0xf0 [ 354.508600][ T9748] ? __pfx___x64_sys_futex+0x10/0x10 [ 354.508630][ T9748] ? ksys_write+0x1ac/0x250 [ 354.508669][ T9748] ? __pfx_ksys_write+0x10/0x10 [ 354.508717][ T9748] do_syscall_64+0xcd/0xf80 [ 354.508745][ T9748] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 354.508772][ T9748] RIP: 0033:0x7fe4ef18f7c9 [ 354.508793][ T9748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 354.508817][ T9748] RSP: 002b:00007fe4eff4c0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 354.508842][ T9748] RAX: ffffffffffffffda RBX: 00007fe4ef3e6188 RCX: 00007fe4ef18f7c9 [ 354.508859][ T9748] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fe4ef3e618c [ 354.508874][ T9748] RBP: 00007fe4ef3e6180 R08: 00007fe4eff8f000 R09: 0000000000000000 [ 354.508890][ T9748] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 354.508905][ T9748] R13: 00007fe4ef3e6218 R14: 00007ffcdbf4d320 R15: 00007ffcdbf4d408 [ 354.508939][ T9748] [ 355.006322][ T9752] FAULT_INJECTION: forcing a failure. [ 355.006322][ T9752] name failslab, interval 1, probability 0, space 0, times 0 [ 355.101640][ T9752] CPU: 0 UID: 0 PID: 9752 Comm: syz.2.781 Tainted: G L syzkaller #0 PREEMPT(full) [ 355.101678][ T9752] Tainted: [L]=SOFTLOCKUP [ 355.101685][ T9752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 355.101698][ T9752] Call Trace: [ 355.101706][ T9752] [ 355.101714][ T9752] dump_stack_lvl+0x16c/0x1f0 [ 355.101741][ T9752] should_fail_ex+0x512/0x640 [ 355.101769][ T9752] ? __kmalloc_node_track_caller_noprof+0xcb/0x930 [ 355.101807][ T9752] should_failslab+0xc2/0x120 [ 355.101844][ T9752] __kmalloc_node_track_caller_noprof+0xec/0x930 [ 355.101880][ T9752] ? vidtv_psi_service_desc_init+0x30d/0x4c0 [ 355.101925][ T9752] ? kstrdup+0x53/0x100 [ 355.101950][ T9752] kstrdup+0x53/0x100 [ 355.101997][ T9752] vidtv_psi_service_desc_init+0x30d/0x4c0 [ 355.102041][ T9752] vidtv_channel_s302m_init+0x14f/0x970 [ 355.102073][ T9752] ? __pfx_vidtv_channel_s302m_init+0x10/0x10 [ 355.102101][ T9752] ? trace_kmalloc+0x2b/0xb0 [ 355.102135][ T9752] ? __kmalloc_node_track_caller_noprof+0x370/0x930 [ 355.102176][ T9752] ? __asan_memcpy+0x3c/0x60 [ 355.102208][ T9752] vidtv_channels_init+0x4c/0xb0 [ 355.102235][ T9752] vidtv_mux_init+0x9c8/0xbe0 [ 355.102268][ T9752] vidtv_start_feed+0x33e/0x4d0 [ 355.102312][ T9752] ? __pfx_vidtv_start_feed+0x10/0x10 [ 355.102349][ T9752] ? __pfx_vidtv_bridge_on_new_pkts_avail+0x10/0x10 [ 355.102392][ T9752] ? mark_held_locks+0x49/0x80 [ 355.102420][ T9752] ? __pfx_vidtv_start_feed+0x10/0x10 [ 355.102455][ T9752] dmx_ts_feed_start_filtering+0xf6/0x220 [ 355.102492][ T9752] dvb_dmxdev_start_feed+0x273/0x3f0 [ 355.102523][ T9752] dvb_dmxdev_filter_start+0x1b6/0xe10 [ 355.102557][ T9752] ? dvb_dmxdev_add_pid+0x2a1/0x380 [ 355.102589][ T9752] dvb_demux_do_ioctl+0x9de/0x12f0 [ 355.102628][ T9752] dvb_usercopy+0x167/0x340 [ 355.102651][ T9752] ? __pfx_dvb_demux_do_ioctl+0x10/0x10 [ 355.102711][ T9752] ? __pfx_dvb_usercopy+0x10/0x10 [ 355.102760][ T9752] ? __fget_files+0x20e/0x3c0 [ 355.102814][ T9752] dvb_demux_ioctl+0x29/0x40 [ 355.102844][ T9752] ? __pfx_dvb_demux_ioctl+0x10/0x10 [ 355.102875][ T9752] __x64_sys_ioctl+0x18e/0x210 [ 355.102915][ T9752] do_syscall_64+0xcd/0xf80 [ 355.102950][ T9752] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 355.102982][ T9752] RIP: 0033:0x7f376598f7c9 [ 355.103006][ T9752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 355.103036][ T9752] RSP: 002b:00007f3766904038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 355.103066][ T9752] RAX: ffffffffffffffda RBX: 00007f3765be5fa0 RCX: 00007f376598f7c9 [ 355.103086][ T9752] RDX: 0000000000000000 RSI: 0000000040146f2c RDI: 0000000000000003 [ 355.103104][ T9752] RBP: 00007f3765a13f91 R08: 0000000000000000 R09: 0000000000000000 [ 355.103129][ T9752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 355.103145][ T9752] R13: 00007f3765be6038 R14: 00007f3765be5fa0 R15: 00007ffc6082d448 [ 355.103187][ T9752] [ 355.612015][ T9764] syz.0.782(9764): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 356.288408][ T9776] netlink: 28 bytes leftover after parsing attributes in process `syz.0.785'. [ 356.447372][ T5849] Bluetooth: hci0: unexpected event 0x23 length: 127 > 13 [ 356.884069][ T9776] bond0: (slave bond_slave_1): Releasing backup interface [ 358.139350][ T9795] vhci_hcd vhci_hcd.2: default hub control req: 0000 v0000 i0000 l0 [ 358.251868][ T9796] vhci_hcd vhci_hcd.2: invalid port number 252 [ 358.258728][ T9796] vhci_hcd vhci_hcd.2: default hub control req: 040f v0772 i00fc l2 [ 359.054225][ T9809] netlink: 4 bytes leftover after parsing attributes in process `syz.3.789'. [ 362.147865][ T9853] FAULT_INJECTION: forcing a failure. [ 362.147865][ T9853] name failslab, interval 1, probability 0, space 0, times 0 [ 362.295601][ T9853] CPU: 0 UID: 0 PID: 9853 Comm: syz.0.802 Tainted: G L syzkaller #0 PREEMPT(full) [ 362.295721][ T9853] Tainted: [L]=SOFTLOCKUP [ 362.295730][ T9853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 362.295747][ T9853] Call Trace: [ 362.295757][ T9853] [ 362.295769][ T9853] dump_stack_lvl+0x16c/0x1f0 [ 362.295802][ T9853] should_fail_ex+0x512/0x640 [ 362.295837][ T9853] ? fs_reclaim_acquire+0xae/0x150 [ 362.295886][ T9853] should_failslab+0xc2/0x120 [ 362.295932][ T9853] __kmalloc_noprof+0xeb/0x910 [ 362.295965][ T9853] ? tomoyo_encode2+0x100/0x3e0 [ 362.296014][ T9853] ? tomoyo_encode2+0x100/0x3e0 [ 362.296055][ T9853] tomoyo_encode2+0x100/0x3e0 [ 362.296090][ T9853] tomoyo_encode+0x29/0x50 [ 362.296121][ T9853] tomoyo_realpath_from_path+0x18f/0x6e0 [ 362.296162][ T9853] tomoyo_path_number_perm+0x245/0x580 [ 362.296189][ T9853] ? tomoyo_path_number_perm+0x237/0x580 [ 362.296219][ T9853] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 362.296275][ T9853] ? find_held_lock+0x2b/0x80 [ 362.296304][ T9853] ? hook_file_ioctl_common+0x144/0x410 [ 362.296339][ T9853] ? __fget_files+0x20e/0x3c0 [ 362.296376][ T9853] security_file_ioctl+0x9b/0x240 [ 362.296406][ T9853] __x64_sys_ioctl+0xb7/0x210 [ 362.296437][ T9853] do_syscall_64+0xcd/0xf80 [ 362.296460][ T9853] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 362.296482][ T9853] RIP: 0033:0x7fe4ef18f7c9 [ 362.296504][ T9853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 362.296525][ T9853] RSP: 002b:00007fe4eff8e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 362.296545][ T9853] RAX: ffffffffffffffda RBX: 00007fe4ef3e5fa0 RCX: 00007fe4ef18f7c9 [ 362.296560][ T9853] RDX: 0000000000000000 RSI: 0000000040103d0b RDI: 0000000000000004 [ 362.296573][ T9853] RBP: 00007fe4ef213f91 R08: 0000000000000000 R09: 0000000000000000 [ 362.296586][ T9853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 362.296615][ T9853] R13: 00007fe4ef3e6038 R14: 00007fe4ef3e5fa0 R15: 00007ffcdbf4d408 [ 362.296668][ T9853] [ 362.296689][ T9853] ERROR: Out of memory at tomoyo_realpath_from_path. [ 362.596728][ T9853] FAULT_INJECTION: forcing a failure. [ 362.596728][ T9853] name failslab, interval 1, probability 0, space 0, times 0 [ 362.638725][ T9853] CPU: 0 UID: 0 PID: 9853 Comm: syz.0.802 Tainted: G L syzkaller #0 PREEMPT(full) [ 362.638761][ T9853] Tainted: [L]=SOFTLOCKUP [ 362.638769][ T9853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 362.638782][ T9853] Call Trace: [ 362.638789][ T9853] [ 362.638798][ T9853] dump_stack_lvl+0x16c/0x1f0 [ 362.638825][ T9853] should_fail_ex+0x512/0x640 [ 362.638852][ T9853] ? fs_reclaim_acquire+0xae/0x150 [ 362.638891][ T9853] should_failslab+0xc2/0x120 [ 362.638928][ T9853] __kmalloc_noprof+0xeb/0x910 [ 362.638967][ T9853] ? tomoyo_encode2+0x100/0x3e0 [ 362.639004][ T9853] ? tomoyo_encode2+0x100/0x3e0 [ 362.639036][ T9853] tomoyo_encode2+0x100/0x3e0 [ 362.639072][ T9853] tomoyo_encode+0x29/0x50 [ 362.639104][ T9853] tomoyo_realpath_from_path+0x18f/0x6e0 [ 362.639146][ T9853] tomoyo_path_number_perm+0x245/0x580 [ 362.639174][ T9853] ? tomoyo_path_number_perm+0x237/0x580 [ 362.639204][ T9853] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 362.639262][ T9853] ? find_held_lock+0x2b/0x80 [ 362.639292][ T9853] ? hook_file_ioctl_common+0x144/0x410 [ 362.639328][ T9853] ? __fget_files+0x20e/0x3c0 [ 362.639366][ T9853] security_file_ioctl+0x9b/0x240 [ 362.639396][ T9853] __x64_sys_ioctl+0xb7/0x210 [ 362.639428][ T9853] do_syscall_64+0xcd/0xf80 [ 362.639453][ T9853] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 362.639474][ T9853] RIP: 0033:0x7fe4ef18f7c9 [ 362.639492][ T9853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 362.639513][ T9853] RSP: 002b:00007fe4eff8e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 362.639534][ T9853] RAX: ffffffffffffffda RBX: 00007fe4ef3e5fa0 RCX: 00007fe4ef18f7c9 [ 362.639549][ T9853] RDX: 0000000000000000 RSI: 0000000040103d0b RDI: 0000000000000004 [ 362.639562][ T9853] RBP: 00007fe4ef213f91 R08: 0000000000000000 R09: 0000000000000000 [ 362.639576][ T9853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 362.639589][ T9853] R13: 00007fe4ef3e6038 R14: 00007fe4ef3e5fa0 R15: 00007ffcdbf4d408 [ 362.639619][ T9853] [ 363.702952][ T9851] netlink: 4 bytes leftover after parsing attributes in process `syz.3.800'. [ 363.772542][ T9851] netlink: 13 bytes leftover after parsing attributes in process `syz.3.800'. [ 365.793351][ T9905] dmxdev: DVB (dvb_dmxdev_filter_start): could not set feed [ 365.810092][ T9905] dvb_demux: dvb_demux_feed_del: feed not in list (type=1 state=0 pid=ffff) [ 367.862273][ T9944] vhci_hcd vhci_hcd.2: default hub control req: 0000 v0000 i0000 l0 [ 368.096134][ T9952] vhci_hcd vhci_hcd.2: invalid port number 252 [ 368.132202][ T9952] vhci_hcd vhci_hcd.2: default hub control req: 040f v0772 i00fc l2 [ 369.691270][ T9970] netlink: 93 bytes leftover after parsing attributes in process `syz.4.828'. [ 369.812835][ T9983] binder: 9980:9983 ioctl 400c620e 0 returned -14 [ 370.541723][T10000] netlink: 4 bytes leftover after parsing attributes in process `syz.0.834'. [ 371.082463][T10011] vhci_hcd vhci_hcd.2: default hub control req: 0000 v0000 i0000 l0 [ 371.269280][T10012] vhci_hcd vhci_hcd.2: invalid port number 252 [ 371.305666][T10012] vhci_hcd vhci_hcd.2: default hub control req: 040f v0772 i00fc l2 [ 372.118533][T10021] FAULT_INJECTION: forcing a failure. [ 372.118533][T10021] name failslab, interval 1, probability 0, space 0, times 0 [ 372.167328][T10021] CPU: 0 UID: 0 PID: 10021 Comm: syz.3.839 Tainted: G L syzkaller #0 PREEMPT(full) [ 372.167371][T10021] Tainted: [L]=SOFTLOCKUP [ 372.167379][T10021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 372.167393][T10021] Call Trace: [ 372.167400][T10021] [ 372.167408][T10021] dump_stack_lvl+0x16c/0x1f0 [ 372.167436][T10021] should_fail_ex+0x512/0x640 [ 372.167464][T10021] ? kmem_cache_alloc_noprof+0x62/0x770 [ 372.167494][T10021] ? __pfx_proc_net_ns_init+0x10/0x10 [ 372.167528][T10021] should_failslab+0xc2/0x120 [ 372.167565][T10021] kmem_cache_alloc_noprof+0x83/0x770 [ 372.167593][T10021] ? proc_net_ns_init+0x42/0x420 [ 372.167628][T10021] ? __pfx_proc_net_ns_init+0x10/0x10 [ 372.167661][T10021] ? proc_net_ns_init+0x42/0x420 [ 372.167710][T10021] proc_net_ns_init+0x42/0x420 [ 372.167750][T10021] ? __pfx_proc_net_ns_init+0x10/0x10 [ 372.167784][T10021] ops_init+0x1e2/0x5f0 [ 372.167823][T10021] setup_net+0x11d/0x3a0 [ 372.167859][T10021] ? __pfx_setup_net+0x10/0x10 [ 372.167893][T10021] ? lockdep_init_map_type+0x5c/0x270 [ 372.167919][T10021] ? mutex_init_lockep+0x110/0x150 [ 372.167947][T10021] copy_net_ns+0x351/0x7c0 [ 372.167972][T10021] create_new_namespaces+0x3ea/0xab0 [ 372.168019][T10021] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 372.168055][T10021] ksys_unshare+0x45b/0xa40 [ 372.168076][T10021] ? __pfx_ksys_unshare+0x10/0x10 [ 372.168099][T10021] ? xfd_validate_state+0x61/0x180 [ 372.168129][T10021] __x64_sys_unshare+0x31/0x40 [ 372.168150][T10021] do_syscall_64+0xcd/0xf80 [ 372.168175][T10021] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 372.168199][T10021] RIP: 0033:0x7fbbc0b8f7c9 [ 372.168217][T10021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 372.168239][T10021] RSP: 002b:00007fbbbedf6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 372.168260][T10021] RAX: ffffffffffffffda RBX: 00007fbbc0de5fa0 RCX: 00007fbbc0b8f7c9 [ 372.168307][T10021] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 372.168325][T10021] RBP: 00007fbbc0c13f91 R08: 0000000000000000 R09: 0000000000000000 [ 372.168344][T10021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 372.168367][T10021] R13: 00007fbbc0de6038 R14: 00007fbbc0de5fa0 R15: 00007fffa2180728 [ 372.168397][T10021] [ 373.592364][T10062] netlink: 4076 bytes leftover after parsing attributes in process `syz.4.845'. [ 374.016016][T10062] random: crng reseeded on system resumption [ 374.509606][T10081] netlink: 4 bytes leftover after parsing attributes in process `syz.4.847'. [ 375.450248][T10076] netlink: 4 bytes leftover after parsing attributes in process `syz.2.848'. [ 375.506023][T10082] netlink: 13 bytes leftover after parsing attributes in process `syz.2.848'. [ 376.955063][T10118] netlink: 4076 bytes leftover after parsing attributes in process `syz.0.857'. [ 377.346941][T10118] random: crng reseeded on system resumption [ 378.282558][T10142] FAULT_INJECTION: forcing a failure. [ 378.282558][T10142] name fail_futex, interval 1, probability 0, space 0, times 0 [ 378.330005][T10142] CPU: 0 UID: 0 PID: 10142 Comm: syz.3.864 Tainted: G L syzkaller #0 PREEMPT(full) [ 378.330042][T10142] Tainted: [L]=SOFTLOCKUP [ 378.330050][T10142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 378.330063][T10142] Call Trace: [ 378.330070][T10142] [ 378.330078][T10142] dump_stack_lvl+0x16c/0x1f0 [ 378.330105][T10142] should_fail_ex+0x512/0x640 [ 378.330137][T10142] get_futex_key+0x1d0/0x15f0 [ 378.330167][T10142] ? __pfx_get_futex_key+0x10/0x10 [ 378.330201][T10142] futex_wake+0xea/0x530 [ 378.330237][T10142] ? futex_wait+0x120/0x380 [ 378.330269][T10142] ? __pfx_futex_wait+0x10/0x10 [ 378.330301][T10142] ? __pfx_futex_wake+0x10/0x10 [ 378.330337][T10142] ? fdget+0x187/0x210 [ 378.330376][T10142] do_futex+0x1e3/0x350 [ 378.330402][T10142] ? __pfx_do_futex+0x10/0x10 [ 378.330428][T10142] ? __pfx_do_sys_openat2+0x10/0x10 [ 378.330460][T10142] __x64_sys_futex+0x1e0/0x4c0 [ 378.330491][T10142] ? __pfx___x64_sys_futex+0x10/0x10 [ 378.330517][T10142] ? __pfx___x64_sys_open+0x10/0x10 [ 378.330553][T10142] do_syscall_64+0xcd/0xf80 [ 378.330577][T10142] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 378.330600][T10142] RIP: 0033:0x7fbbc0b8f7c9 [ 378.330617][T10142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 378.330639][T10142] RSP: 002b:00007fbbbedf60e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 378.330659][T10142] RAX: ffffffffffffffda RBX: 00007fbbc0de5fa8 RCX: 00007fbbc0b8f7c9 [ 378.330674][T10142] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fbbc0de5fac [ 378.330688][T10142] RBP: 00007fbbc0de5fa0 R08: 00007fbbc1929000 R09: 0000000000000000 [ 378.330702][T10142] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 378.330715][T10142] R13: 00007fbbc0de6038 R14: 00007fffa2180640 R15: 00007fffa2180728 [ 378.330744][T10142] [ 379.084750][T10141] netlink: 4 bytes leftover after parsing attributes in process `syz.4.863'. [ 379.139233][T10141] netlink: 13 bytes leftover after parsing attributes in process `syz.4.863'. [ 381.636198][T10197] netlink: zone id is out of range [ 382.840046][T10215] netlink: 4 bytes leftover after parsing attributes in process `syz.3.881'. [ 384.109879][T10238] netlink: 4 bytes leftover after parsing attributes in process `syz.3.886'. [ 385.385860][T10265] netlink: 4076 bytes leftover after parsing attributes in process `syz.2.893'. [ 385.724177][T10265] random: crng reseeded on system resumption [ 385.868190][T10270] cgroup: fork rejected by pids controller in /syz0 [ 386.555453][T10454] __vm_enough_memory: pid: 10454, comm: syz.4.900, bytes: 4398046511104 not enough memory for the allocation [ 387.244334][T10469] netlink: 4 bytes leftover after parsing attributes in process `syz.2.901'. [ 389.076276][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 389.087508][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 390.040852][T10512] Invalid ELF header magic: != ELF [ 390.791770][T10524] netlink: 4 bytes leftover after parsing attributes in process `syz.4.912'. [ 393.338983][T10573] blktrace: Concurrent blktraces are not allowed on loop2 [ 394.137315][T10580] netlink: 4 bytes leftover after parsing attributes in process `syz.4.925'. [ 394.563065][T10586] netlink: zone id is out of range [ 396.266867][T10603] netlink: zone id is out of range [ 398.498768][T10641] blktrace: Concurrent blktraces are not allowed on loop2 [ 400.208018][T10662] netlink: 4 bytes leftover after parsing attributes in process `syz.2.944'. [ 401.296783][ T31] audit: type=1800 audit(4294969547.354:6): pid=10681 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.2.947" name="version" dev="configfs" ino=39492 res=0 errno=0 [ 402.827973][T10704] netlink: 4 bytes leftover after parsing attributes in process `syz.4.953'. [ 403.239816][T10708] netlink: 4 bytes leftover after parsing attributes in process `syz.0.955'. [ 404.181913][T10740] random: crng reseeded on system resumption [ 407.061270][T10776] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input7 [ 407.267369][T10785] netlink: 4 bytes leftover after parsing attributes in process `syz.3.971'. [ 407.288940][T10782] mkiss: ax0: crc mode is auto. [ 410.189385][T10833] netlink: 4 bytes leftover after parsing attributes in process `syz.3.982'. [ 411.707620][T10850] netlink: 4 bytes leftover after parsing attributes in process `syz.4.984'. [ 412.793750][T10869] netlink: 4 bytes leftover after parsing attributes in process `syz.3.990'. [ 413.869811][T10881] netlink: 4 bytes leftover after parsing attributes in process `syz.0.994'. [ 414.174396][T10888] binder: 10887:10888 ioctl 4018620d ffffffffffffffff returned -22 [ 416.641895][T10928] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1005'. [ 418.122855][T10950] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1008'. [ 419.052748][ T31] audit: type=1804 audit(4294969565.106:7): pid=10962 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz.4.1011" name="/newroot/sys/kernel/tracing/events/vmalloc/enable" dev="tracefs" ino=19680823 res=1 errno=0 [ 420.975356][T10987] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1017'. [ 421.989701][T11004] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1021'. [ 424.276004][T11012] kexec: Could not allocate control_code_buffer [ 425.030443][ T31] audit: type=1804 audit(4294969571.083:8): pid=11045 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz.0.1029" name="/newroot/sys/kernel/tracing/events/vmalloc/enable" dev="tracefs" ino=19680823 res=1 errno=0 [ 426.943270][T11073] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1035'. [ 427.051477][T11077] Format for deleting device is "id" (uint). [ 428.367141][T11083] kexec: Could not allocate control_code_buffer [ 429.501078][T11124] FAULT_INJECTION: forcing a failure. [ 429.501078][T11124] name fail_futex, interval 1, probability 0, space 0, times 0 [ 429.531931][T11124] CPU: 1 UID: 0 PID: 11124 Comm: syz.2.1046 Tainted: G L syzkaller #0 PREEMPT(full) [ 429.531970][T11124] Tainted: [L]=SOFTLOCKUP [ 429.531978][T11124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 429.531992][T11124] Call Trace: [ 429.531999][T11124] [ 429.532008][T11124] dump_stack_lvl+0x16c/0x1f0 [ 429.532036][T11124] should_fail_ex+0x512/0x640 [ 429.532066][T11124] ? rcu_is_watching+0x12/0xc0 [ 429.532103][T11124] get_futex_key+0x1d0/0x15f0 [ 429.532132][T11124] ? __pfx_get_futex_key+0x10/0x10 [ 429.532155][T11124] ? find_held_lock+0x2b/0x80 [ 429.532186][T11124] ? is_bpf_text_address+0x8a/0x1a0 [ 429.532218][T11124] ? bpf_ksym_find+0x124/0x1c0 [ 429.532247][T11124] futex_wait_setup+0x9d/0x570 [ 429.532289][T11124] __futex_wait+0x193/0x2f0 [ 429.532322][T11124] ? __pfx___futex_wait+0x10/0x10 [ 429.532360][T11124] ? __pfx_futex_wake_mark+0x10/0x10 [ 429.532397][T11124] ? futex_hash+0x2c5/0x380 [ 429.532425][T11124] ? futex_private_hash_put+0x160/0x1b0 [ 429.532459][T11124] futex_wait+0xe8/0x380 [ 429.532491][T11124] ? __pfx_futex_wait+0x10/0x10 [ 429.532540][T11124] do_futex+0x229/0x350 [ 429.532568][T11124] ? __pfx_do_futex+0x10/0x10 [ 429.532603][T11124] __x64_sys_futex+0x1e0/0x4c0 [ 429.532633][T11124] ? kfree+0x2f8/0x6e0 [ 429.532657][T11124] ? __pfx___x64_sys_futex+0x10/0x10 [ 429.532686][T11124] ? xfd_validate_state+0x61/0x180 [ 429.532717][T11124] do_syscall_64+0xcd/0xf80 [ 429.532742][T11124] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 429.532766][T11124] RIP: 0033:0x7f376598f7c9 [ 429.532784][T11124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.532806][T11124] RSP: 002b:00007f37669040e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 429.532828][T11124] RAX: ffffffffffffffda RBX: 00007f3765be5fa8 RCX: 00007f376598f7c9 [ 429.532843][T11124] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f3765be5fa8 [ 429.532857][T11124] RBP: 00007f3765be5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 429.532871][T11124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 429.532884][T11124] R13: 00007f3765be6038 R14: 00007ffc6082d360 R15: 00007ffc6082d448 [ 429.532914][T11124] [ 430.086989][T11128] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1049'. [ 433.211667][T11184] netlink: 88 bytes leftover after parsing attributes in process `syz.0.1060'. [ 433.222496][T11184] netlink: 306 bytes leftover after parsing attributes in process `syz.0.1060'. [ 433.235447][T11190] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1061'. [ 433.245040][T11184] netlink: 88 bytes leftover after parsing attributes in process `syz.0.1060'. [ 435.229574][T11198] kexec: Could not allocate control_code_buffer [ 436.547109][T11234] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1073'. [ 436.953986][T11239] Format for deleting device is "id" (uint). [ 437.239995][T11222] kexec: Could not allocate control_code_buffer [ 438.376357][T11259] zswap: compressor not available [ 439.309256][T11272] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1081'. [ 440.766420][T11278] IPVS: length: 131 != 8 [ 440.774224][ T5849] Bluetooth: hci1: Received unexpected HCI Event 0x00 [ 440.846953][ T5849] Bluetooth: hci1: Received unexpected HCI Event 0x00 [ 440.889545][T11291] netlink: 342 bytes leftover after parsing attributes in process `syz.2.1085'. [ 442.443527][T11312] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1089'. [ 443.406415][T11325] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1100'. [ 444.051941][T11311] kexec: Could not allocate control_code_buffer [ 447.499870][T11386] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1104'. [ 449.123879][T11403] FAULT_INJECTION: forcing a failure. [ 449.123879][T11403] name fail_futex, interval 1, probability 0, space 0, times 0 [ 449.291023][T11403] CPU: 1 UID: 0 PID: 11403 Comm: syz.4.1109 Tainted: G L syzkaller #0 PREEMPT(full) [ 449.291071][T11403] Tainted: [L]=SOFTLOCKUP [ 449.291082][T11403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 449.291101][T11403] Call Trace: [ 449.291111][T11403] [ 449.291122][T11403] dump_stack_lvl+0x16c/0x1f0 [ 449.291155][T11403] should_fail_ex+0x512/0x640 [ 449.291188][T11403] get_futex_key+0x1d0/0x15f0 [ 449.291217][T11403] ? __pfx_get_futex_key+0x10/0x10 [ 449.291251][T11403] futex_wake+0xea/0x530 [ 449.291282][T11403] ? kasan_quarantine_put+0x10a/0x240 [ 449.291315][T11403] ? __pfx_futex_wake+0x10/0x10 [ 449.291350][T11403] ? putname+0xf5/0x1a0 [ 449.291377][T11403] do_futex+0x1e3/0x350 [ 449.291403][T11403] ? __pfx_do_futex+0x10/0x10 [ 449.291438][T11403] __x64_sys_futex+0x1e0/0x4c0 [ 449.291470][T11403] ? __x64_sys_openat+0x174/0x210 [ 449.291497][T11403] ? __pfx___x64_sys_futex+0x10/0x10 [ 449.291535][T11403] do_syscall_64+0xcd/0xf80 [ 449.291559][T11403] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 449.291583][T11403] RIP: 0033:0x7f465f38f7c9 [ 449.291619][T11403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 449.291642][T11403] RSP: 002b:00007f465d5f60e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 449.291663][T11403] RAX: ffffffffffffffda RBX: 00007f465f5e5fa8 RCX: 00007f465f38f7c9 [ 449.291678][T11403] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f465f5e5fac [ 449.291693][T11403] RBP: 00007f465f5e5fa0 R08: 00007f4660127000 R09: 0000000000000000 [ 449.291707][T11403] R10: 0000000000000009 R11: 0000000000000246 R12: 0000000000000000 [ 449.291720][T11403] R13: 00007f465f5e6038 R14: 00007fff083fe5c0 R15: 00007fff083fe6a8 [ 449.291750][T11403] [ 450.546665][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 450.553352][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 451.624167][T11395] kexec: Could not allocate control_code_buffer [ 452.051767][T11461] random: crng reseeded on system resumption [ 452.534933][T11468] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1117'. [ 453.540974][T11479] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1119'. [ 453.674829][ T31] audit: type=1806 audit(4294969599.718:9): xattr="." res=0 [ 455.394311][T11544] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1127'. [ 455.728671][T11549] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1128'. [ 456.742311][T11565] vhci_hcd vhci_hcd.0: invalid port number 16 [ 456.742341][T11563] vhci_hcd vhci_hcd.0: invalid port number 16 [ 457.021957][T11523] kexec: Could not allocate control_code_buffer [ 457.513578][T11571] block nbd8: shutting down sockets [ 457.827871][T11584] sctp: [Deprecated]: syz.0.1138 (pid 11584) Use of struct sctp_assoc_value in delayed_ack socket option. [ 457.827871][T11584] Use struct sctp_sack_info instead [ 458.029836][T11593] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1139'. [ 458.601993][T11606] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1141'. [ 461.543807][T11644] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1152'. [ 462.978402][T11674] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1156'. [ 464.218786][T11685] Invalid ELF header magic: != ELF [ 464.770173][T11705] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1165'. [ 464.902071][T11706] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1173'. [ 467.716386][T11754] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1176'. [ 468.230814][T11764] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1177'. [ 470.469790][T11800] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1185'. [ 471.764638][T11823] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1188'. [ 473.018063][T11845] Invalid ELF header magic: != ELF [ 473.637720][T11857] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1198'. [ 476.154684][ T5849] Bluetooth: hci4: Opcode 0x0c03 failed: -110 [ 476.689686][T11898] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1205'. [ 477.732127][T11918] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1210'. [ 478.552853][T11929] __vm_enough_memory: pid: 11929, comm: syz.3.1217, bytes: 4398046511104 not enough memory for the allocation [ 480.493027][T11978] phram: parameter too long [ 480.500982][T11978] phram: not enough arguments [ 481.108120][T11994] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1227'. [ 487.160749][T12131] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1257'. [ 487.388521][T12137] sctp: [Deprecated]: syz.2.1259 (pid 12137) Use of struct sctp_assoc_value in delayed_ack socket option. [ 487.388521][T12137] Use struct sctp_sack_info instead [ 487.859322][T12146] block2mtd: error: cannot open device /sys/module/block2mtd/parameters/block2mtd [ 490.516880][T12189] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1272'. [ 495.391203][T12261] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1288'. [ 495.405337][T12261] nbd: must specify at least one socket [ 495.417999][T12261] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1288'. [ 495.427925][T12261] netlink: 354 bytes leftover after parsing attributes in process `syz.3.1288'. [ 495.444451][T12264] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1288'. [ 495.471692][T12264] nbd: must specify at least one socket [ 495.719962][T12271] netlink: 146 bytes leftover after parsing attributes in process `syz.4.1290'. [ 497.515478][ T5845] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 497.531533][ T5845] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 497.540147][ T5845] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 497.548382][ T5845] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 497.557883][ T5845] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 498.780270][T12314] chnl_net:caif_netlink_parms(): no params data found [ 499.140612][T12314] bridge0: port 1(bridge_slave_0) entered blocking state [ 499.156942][T12314] bridge0: port 1(bridge_slave_0) entered disabled state [ 499.164353][T12314] bridge_slave_0: entered allmulticast mode [ 499.172953][T12314] bridge_slave_0: entered promiscuous mode [ 499.301333][T12314] bridge0: port 2(bridge_slave_1) entered blocking state [ 499.309765][T12314] bridge0: port 2(bridge_slave_1) entered disabled state [ 499.317648][T12314] bridge_slave_1: entered allmulticast mode [ 499.329660][T12314] bridge_slave_1: entered promiscuous mode [ 499.431626][T12314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 499.446752][T12314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 499.510559][T12314] team0: Port device team_slave_0 added [ 499.528322][T12314] team0: Port device team_slave_1 added [ 499.565243][T12314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 499.576891][T12314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 499.606280][ T5845] Bluetooth: hci4: command tx timeout [ 499.624582][T12314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 499.691043][T12314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 499.719819][T12314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 499.798925][T12314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 499.909098][T12348] FAULT_INJECTION: forcing a failure. [ 499.909098][T12348] name failslab, interval 1, probability 0, space 0, times 0 [ 499.950220][T12348] CPU: 1 UID: 0 PID: 12348 Comm: syz.2.1304 Tainted: G L syzkaller #0 PREEMPT(full) [ 499.950273][T12348] Tainted: [L]=SOFTLOCKUP [ 499.950285][T12348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 499.950304][T12348] Call Trace: [ 499.950314][T12348] [ 499.950326][T12348] dump_stack_lvl+0x16c/0x1f0 [ 499.950365][T12348] should_fail_ex+0x512/0x640 [ 499.950404][T12348] ? kmem_cache_alloc_noprof+0x62/0x770 [ 499.950449][T12348] should_failslab+0xc2/0x120 [ 499.950501][T12348] kmem_cache_alloc_noprof+0x83/0x770 [ 499.950540][T12348] ? __kernfs_new_node+0xd2/0x9b0 [ 499.950586][T12348] ? __kernfs_new_node+0xd2/0x9b0 [ 499.950621][T12348] __kernfs_new_node+0xd2/0x9b0 [ 499.950664][T12348] ? __pfx___kernfs_new_node+0x10/0x10 [ 499.950714][T12348] ? find_held_lock+0x2b/0x80 [ 499.950770][T12348] ? kernfs_root+0xee/0x2a0 [ 499.950815][T12348] kernfs_new_node+0x13c/0x1e0 [ 499.950866][T12348] __kernfs_create_file+0x53/0x350 [ 499.950900][T12348] sysfs_add_file_mode_ns+0x207/0x3c0 [ 499.950953][T12348] sysfs_merge_group+0x1aa/0x340 [ 499.950995][T12348] ? __pfx_sysfs_merge_group+0x10/0x10 [ 499.951041][T12348] ? __pfx_dev_add_physical_location+0x10/0x10 [ 499.951090][T12348] ? bus_to_subsys+0x131/0x160 [ 499.951127][T12348] dpm_sysfs_add+0x237/0x280 [ 499.951174][T12348] device_add+0x9cc/0x1980 [ 499.951227][T12348] ? __pfx_device_add+0x10/0x10 [ 499.951272][T12348] ? lockdep_init_map_type+0x5c/0x270 [ 499.951304][T12348] ? __init_waitqueue_head+0xca/0x150 [ 499.951353][T12348] rfkill_register+0x1ad/0xb40 [ 499.951400][T12348] nfc_register_device+0x11f/0x410 [ 499.951475][T12348] nci_register_device+0x7f1/0xb80 [ 499.951533][T12348] ? __pfx_nci_register_device+0x10/0x10 [ 499.951580][T12348] ? lockdep_init_map_type+0x5c/0x270 [ 499.951639][T12348] virtual_ncidev_open+0x141/0x220 [ 499.951674][T12348] ? __pfx_virtual_ncidev_open+0x10/0x10 [ 499.951708][T12348] misc_open+0x26d/0x450 [ 499.951748][T12348] ? __pfx_misc_open+0x10/0x10 [ 499.951785][T12348] chrdev_open+0x234/0x6a0 [ 499.951813][T12348] ? __pfx_apparmor_file_open+0x10/0x10 [ 499.951848][T12348] ? __pfx_chrdev_open+0x10/0x10 [ 499.951901][T12348] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 499.951972][T12348] do_dentry_open+0x748/0x1590 [ 499.952021][T12348] ? __pfx_chrdev_open+0x10/0x10 [ 499.952085][T12348] vfs_open+0x82/0x3f0 [ 499.952127][T12348] path_openat+0x2078/0x3140 [ 499.952191][T12348] ? __pfx_path_openat+0x10/0x10 [ 499.952258][T12348] do_filp_open+0x20b/0x470 [ 499.952309][T12348] ? __pfx_do_filp_open+0x10/0x10 [ 499.952391][T12348] ? alloc_fd+0x471/0x7d0 [ 499.952452][T12348] do_sys_openat2+0x121/0x290 [ 499.952489][T12348] ? __pfx_do_sys_openat2+0x10/0x10 [ 499.952543][T12348] __x64_sys_openat+0x174/0x210 [ 499.952582][T12348] ? __pfx___x64_sys_openat+0x10/0x10 [ 499.952638][T12348] do_syscall_64+0xcd/0xf80 [ 499.952673][T12348] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 499.952705][T12348] RIP: 0033:0x7f376598f7c9 [ 499.952731][T12348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 499.952761][T12348] RSP: 002b:00007f3766904038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 499.952792][T12348] RAX: ffffffffffffffda RBX: 00007f3765be5fa0 RCX: 00007f376598f7c9 [ 499.952814][T12348] RDX: 0000000000000002 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 499.952834][T12348] RBP: 00007f3765a13f91 R08: 0000000000000000 R09: 0000000000000000 [ 499.952853][T12348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 499.952872][T12348] R13: 00007f3765be6038 R14: 00007f3765be5fa0 R15: 00007ffc6082d448 [ 499.952918][T12348] [ 500.165044][T12314] hsr_slave_0: entered promiscuous mode [ 500.360502][T12314] hsr_slave_1: entered promiscuous mode [ 500.369237][T12314] debugfs: 'hsr0' already exists in 'hsr' [ 500.375048][T12314] Cannot create hsr debugfs directory [ 500.689437][T12361] binder: 12358:12361 ioctl c00c620f 2000000000c0 returned -22 [ 500.887457][T12365] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1307'. [ 500.979654][T12369] netlink: 342 bytes leftover after parsing attributes in process `syz.2.1309'. [ 501.390725][T12314] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 501.503372][T12314] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 501.638313][T12314] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 501.681171][T12314] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 501.698315][ T5845] Bluetooth: hci4: command tx timeout [ 502.020886][T12314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 502.121086][T12314] 8021q: adding VLAN 0 to HW filter on device team0 [ 502.160262][ T3503] bridge0: port 1(bridge_slave_0) entered blocking state [ 502.167541][ T3503] bridge0: port 1(bridge_slave_0) entered forwarding state [ 502.236310][ T9107] bridge0: port 2(bridge_slave_1) entered blocking state [ 502.243570][ T9107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 502.321917][ T5845] Bluetooth: hci1: unexpected event 0x14 length: 16 > 6 [ 502.342660][T12404] netlink: 186 bytes leftover after parsing attributes in process `syz.4.1315'. [ 503.382178][T12314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 503.513822][T12420] netlink: 146 bytes leftover after parsing attributes in process `syz.3.1317'. [ 503.768385][ T5845] Bluetooth: hci4: command tx timeout [ 504.159774][T12439] FAULT_INJECTION: forcing a failure. [ 504.159774][T12439] name failslab, interval 1, probability 0, space 0, times 0 [ 504.187131][T12314] veth0_vlan: entered promiscuous mode [ 504.223863][T12314] veth1_vlan: entered promiscuous mode [ 504.232758][T12439] CPU: 0 UID: 0 PID: 12439 Comm: syz.2.1320 Tainted: G L syzkaller #0 PREEMPT(full) [ 504.232807][T12439] Tainted: [L]=SOFTLOCKUP [ 504.232818][T12439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 504.232836][T12439] Call Trace: [ 504.232854][T12439] [ 504.232867][T12439] dump_stack_lvl+0x16c/0x1f0 [ 504.232904][T12439] should_fail_ex+0x512/0x640 [ 504.232942][T12439] ? fs_reclaim_acquire+0xae/0x150 [ 504.232997][T12439] should_failslab+0xc2/0x120 [ 504.233050][T12439] kmem_cache_alloc_noprof+0x83/0x770 [ 504.233087][T12439] ? __pfx_map_id_range_down+0x10/0x10 [ 504.233134][T12439] ? rcu_is_watching+0x12/0xc0 [ 504.233182][T12439] ? security_inode_alloc+0x3b/0x2b0 [ 504.233227][T12439] ? security_inode_alloc+0x3b/0x2b0 [ 504.233262][T12439] security_inode_alloc+0x3b/0x2b0 [ 504.233298][T12439] inode_init_always_gfp+0xced/0x1040 [ 504.233355][T12439] alloc_inode+0x86/0x240 [ 504.233392][T12439] new_inode+0x22/0x1c0 [ 504.233433][T12439] hugetlbfs_get_inode+0x354/0x700 [ 504.233473][T12439] hugetlb_file_setup+0x15b/0x620 [ 504.233512][T12439] ksys_mmap_pgoff+0x189/0x5c0 [ 504.233568][T12439] __x64_sys_mmap+0x125/0x190 [ 504.233606][T12439] do_syscall_64+0xcd/0xf80 [ 504.233640][T12439] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 504.233672][T12439] RIP: 0033:0x7f376598f7c9 [ 504.233697][T12439] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 504.233730][T12439] RSP: 002b:00007f37668c2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 504.233760][T12439] RAX: ffffffffffffffda RBX: 00007f3765be6180 RCX: 00007f376598f7c9 [ 504.233782][T12439] RDX: ffffffffffffffff RSI: 0000000000000002 RDI: 0000000000000000 [ 504.233802][T12439] RBP: 00007f3765a13f91 R08: 0000000000000602 R09: 0000300000000000 [ 504.233823][T12439] R10: 0000000000044eb1 R11: 0000000000000246 R12: 0000000000000000 [ 504.233847][T12439] R13: 00007f3765be6218 R14: 00007f3765be6180 R15: 00007ffc6082d448 [ 504.233891][T12439] [ 504.567728][T12314] veth0_macvtap: entered promiscuous mode [ 504.581310][T12314] veth1_macvtap: entered promiscuous mode [ 504.609422][T12314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 504.678446][T12314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 504.728372][ T9105] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 504.774696][ T4540] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 504.801649][ T4540] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 504.847919][ T4540] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 504.883586][T12444] deleting an unspecified loop device is not supported. [ 505.377461][ T9107] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 505.385470][ T9107] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 505.572545][ T9085] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 505.618779][ T9085] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 505.862812][ T5845] Bluetooth: hci4: command tx timeout [ 506.385106][T12461] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1297'. [ 507.191447][T12472] netlink: 146 bytes leftover after parsing attributes in process `syz.5.1327'. [ 507.487932][T12479] raw_sendmsg: syz.5.1331 forgot to set AF_INET. Fix it! [ 507.636923][T12483] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 508.180124][T12493] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1335'. [ 510.344202][T12523] netlink: 146 bytes leftover after parsing attributes in process `syz.2.1340'. [ 510.603368][ T5845] Bluetooth: hci3: unexpected subevent 0x18 length: 123 > 19 [ 510.611742][ T5845] Bluetooth: hci3: Unable to find connection for dst f9:56:cc:cc:70:a9 sid 0x00 [ 511.062151][T12541] sctp: [Deprecated]: syz.5.1345 (pid 12541) Use of struct sctp_assoc_value in delayed_ack socket option. [ 511.062151][T12541] Use struct sctp_sack_info instead [ 512.018639][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 512.025197][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 512.911485][T12565] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1350'. [ 513.377204][T12568] zswap: compressor not available [ 516.192953][T12621] FAULT_INJECTION: forcing a failure. [ 516.192953][T12621] name failslab, interval 1, probability 0, space 0, times 0 [ 516.205930][T12621] CPU: 0 UID: 0 PID: 12621 Comm: syz.5.1363 Tainted: G L syzkaller #0 PREEMPT(full) [ 516.205962][T12621] Tainted: [L]=SOFTLOCKUP [ 516.205969][T12621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 516.205981][T12621] Call Trace: [ 516.205988][T12621] [ 516.205996][T12621] dump_stack_lvl+0x16c/0x1f0 [ 516.206022][T12621] should_fail_ex+0x512/0x640 [ 516.206048][T12621] ? __kvmalloc_node_noprof+0x129/0xa40 [ 516.206082][T12621] should_failslab+0xc2/0x120 [ 516.206117][T12621] __kvmalloc_node_noprof+0x14a/0xa40 [ 516.206150][T12621] ? io_alloc_cache_init+0x38/0x170 [ 516.206178][T12621] ? io_alloc_cache_init+0x38/0x170 [ 516.206198][T12621] ? __init_waitqueue_head+0xca/0x150 [ 516.206225][T12621] io_alloc_cache_init+0x38/0x170 [ 516.206248][T12621] io_uring_setup+0x578/0x1f80 [ 516.206282][T12621] ? __pfx_io_uring_setup+0x10/0x10 [ 516.206315][T12621] ? do_futex+0x122/0x350 [ 516.206352][T12621] ? __pfx_do_futex+0x10/0x10 [ 516.206386][T12621] ? fput+0x70/0xf0 [ 516.206408][T12621] ? xfd_validate_state+0x61/0x180 [ 516.206426][T12621] ? __pfx_ksys_write+0x10/0x10 [ 516.206466][T12621] __x64_sys_io_uring_setup+0xc2/0x170 [ 516.206498][T12621] do_syscall_64+0xcd/0xf80 [ 516.206520][T12621] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 516.206540][T12621] RIP: 0033:0x7fbd7858f7c9 [ 516.206555][T12621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 516.206575][T12621] RSP: 002b:00007fbd767f6038 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 516.206594][T12621] RAX: ffffffffffffffda RBX: 00007fbd787e5fa0 RCX: 00007fbd7858f7c9 [ 516.206607][T12621] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000059 [ 516.206620][T12621] RBP: 00007fbd78613f91 R08: 0000000000000000 R09: 0000000000000000 [ 516.206632][T12621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 516.206643][T12621] R13: 00007fbd787e6038 R14: 00007fbd787e5fa0 R15: 00007ffc4a19da28 [ 516.206670][T12621] [ 516.208657][T12622] FAULT_INJECTION: forcing a failure. [ 516.208657][T12622] name failslab, interval 1, probability 0, space 0, times 0 [ 516.536180][T12622] CPU: 1 UID: 0 PID: 12622 Comm: syz.5.1363 Tainted: G L syzkaller #0 PREEMPT(full) [ 516.536221][T12622] Tainted: [L]=SOFTLOCKUP [ 516.536230][T12622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 516.536244][T12622] Call Trace: [ 516.536252][T12622] [ 516.536262][T12622] dump_stack_lvl+0x16c/0x1f0 [ 516.536294][T12622] should_fail_ex+0x512/0x640 [ 516.536326][T12622] ? fs_reclaim_acquire+0xae/0x150 [ 516.536373][T12622] should_failslab+0xc2/0x120 [ 516.536416][T12622] kmem_cache_alloc_noprof+0x83/0x770 [ 516.536449][T12622] ? __pfx_map_id_range_down+0x10/0x10 [ 516.536488][T12622] ? security_inode_alloc+0x3b/0x2b0 [ 516.536524][T12622] ? security_inode_alloc+0x3b/0x2b0 [ 516.536554][T12622] security_inode_alloc+0x3b/0x2b0 [ 516.536586][T12622] inode_init_always_gfp+0xced/0x1040 [ 516.536633][T12622] alloc_inode+0x86/0x240 [ 516.536673][T12622] alloc_anon_inode+0x28/0x3e0 [ 516.536718][T12622] ioctx_alloc+0x4d1/0x2230 [ 516.536776][T12622] ? find_held_lock+0x2b/0x80 [ 516.536815][T12622] ? __pfx_ioctx_alloc+0x10/0x10 [ 516.536840][T12622] ? __might_fault+0x13b/0x190 [ 516.536885][T12622] __x64_sys_io_setup+0xc9/0x230 [ 516.536917][T12622] do_syscall_64+0xcd/0xf80 [ 516.536948][T12622] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 516.536977][T12622] RIP: 0033:0x7fbd7858f7c9 [ 516.536999][T12622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 516.537025][T12622] RSP: 002b:00007fbd767d5038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 516.537052][T12622] RAX: ffffffffffffffda RBX: 00007fbd787e6090 RCX: 00007fbd7858f7c9 [ 516.537070][T12622] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 000000000000000e [ 516.537087][T12622] RBP: 00007fbd78613f91 R08: 0000000000000000 R09: 0000000000000000 [ 516.537104][T12622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 516.537120][T12622] R13: 00007fbd787e6128 R14: 00007fbd787e6090 R15: 00007ffc4a19da28 [ 516.537159][T12622] [ 516.868805][T12629] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1365'. [ 517.417593][T12636] FAULT_INJECTION: forcing a failure. [ 517.417593][T12636] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 517.490510][T12636] CPU: 1 UID: 0 PID: 12636 Comm: syz.4.1367 Tainted: G L syzkaller #0 PREEMPT(full) [ 517.490547][T12636] Tainted: [L]=SOFTLOCKUP [ 517.490554][T12636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 517.490567][T12636] Call Trace: [ 517.490574][T12636] [ 517.490583][T12636] dump_stack_lvl+0x16c/0x1f0 [ 517.490610][T12636] should_fail_ex+0x512/0x640 [ 517.490648][T12636] should_fail_alloc_page+0xe7/0x130 [ 517.490687][T12636] prepare_alloc_pages+0x401/0x670 [ 517.490724][T12636] ? rcu_is_watching+0x12/0xc0 [ 517.490760][T12636] __alloc_frozen_pages_noprof+0x18b/0x2430 [ 517.490797][T12636] ? stack_trace_save+0x8e/0xc0 [ 517.490845][T12636] ? __pfx_stack_trace_save+0x10/0x10 [ 517.490879][T12636] ? stack_depot_save_flags+0x29/0x9b0 [ 517.490907][T12636] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 517.490937][T12636] ? kasan_save_stack+0x42/0x60 [ 517.490965][T12636] ? kasan_save_stack+0x33/0x60 [ 517.490993][T12636] ? kasan_save_track+0x14/0x30 [ 517.491021][T12636] ? __kasan_kmalloc+0xaa/0xb0 [ 517.491048][T12636] ? mon_bin_open+0x1a8/0x4a0 [ 517.491070][T12636] ? do_sys_openat2+0x121/0x290 [ 517.491092][T12636] ? __x64_sys_openat+0x174/0x210 [ 517.491116][T12636] ? do_syscall_64+0xcd/0xf80 [ 517.491135][T12636] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 517.491161][T12636] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 517.491196][T12636] ? policy_nodemask+0xea/0x4e0 [ 517.491231][T12636] alloc_pages_mpol+0x1fb/0x550 [ 517.491266][T12636] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 517.491307][T12636] alloc_pages_noprof+0x131/0x390 [ 517.491341][T12636] get_zeroed_page_noprof+0x18/0xb0 [ 517.491374][T12636] mon_alloc_buff+0xce/0x1b0 [ 517.491408][T12636] ? kasan_save_track+0x14/0x30 [ 517.491439][T12636] mon_bin_open+0x207/0x4a0 [ 517.491459][T12636] ? __pfx_mon_bin_open+0x10/0x10 [ 517.491478][T12636] chrdev_open+0x234/0x6a0 [ 517.491502][T12636] ? __pfx_chrdev_open+0x10/0x10 [ 517.491538][T12636] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 517.491579][T12636] do_dentry_open+0x748/0x1590 [ 517.491611][T12636] ? __pfx_chrdev_open+0x10/0x10 [ 517.491657][T12636] vfs_open+0x82/0x3f0 [ 517.491684][T12636] path_openat+0x2078/0x3140 [ 517.491727][T12636] ? __pfx_path_openat+0x10/0x10 [ 517.491769][T12636] do_filp_open+0x20b/0x470 [ 517.491803][T12636] ? __pfx_do_filp_open+0x10/0x10 [ 517.491855][T12636] ? alloc_fd+0x471/0x7d0 [ 517.491895][T12636] do_sys_openat2+0x121/0x290 [ 517.491919][T12636] ? __pfx_do_sys_openat2+0x10/0x10 [ 517.491945][T12636] ? __sys_sendmsg+0x18c/0x220 [ 517.491982][T12636] __x64_sys_openat+0x174/0x210 [ 517.492008][T12636] ? __pfx___x64_sys_openat+0x10/0x10 [ 517.492044][T12636] do_syscall_64+0xcd/0xf80 [ 517.492066][T12636] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 517.492087][T12636] RIP: 0033:0x7f465f38f7c9 [ 517.492104][T12636] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 517.492124][T12636] RSP: 002b:00007f465d5f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 517.492144][T12636] RAX: ffffffffffffffda RBX: 00007f465f5e5fa0 RCX: 00007f465f38f7c9 [ 517.492158][T12636] RDX: 0000000000086202 RSI: 00002000000000c0 RDI: ffffffffffffff9c [ 517.492171][T12636] RBP: 00007f465f413f91 R08: 0000000000000000 R09: 0000000000000000 [ 517.492183][T12636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 517.492196][T12636] R13: 00007f465f5e6038 R14: 00007f465f5e5fa0 R15: 00007fff083fe6a8 [ 517.492223][T12636] [ 518.236924][T12643] FAULT_INJECTION: forcing a failure. [ 518.236924][T12643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 518.325533][T12643] CPU: 1 UID: 0 PID: 12643 Comm: syz.4.1368 Tainted: G L syzkaller #0 PREEMPT(full) [ 518.325581][T12643] Tainted: [L]=SOFTLOCKUP [ 518.325590][T12643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 518.325624][T12643] Call Trace: [ 518.325634][T12643] [ 518.325645][T12643] dump_stack_lvl+0x16c/0x1f0 [ 518.325681][T12643] should_fail_ex+0x512/0x640 [ 518.325718][T12643] _copy_to_iter+0x463/0x1710 [ 518.325746][T12643] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 518.325776][T12643] ? __pfx__copy_to_iter+0x10/0x10 [ 518.325800][T12643] ? find_held_lock+0x2b/0x80 [ 518.325831][T12643] ? mark_held_locks+0x49/0x80 [ 518.325851][T12643] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 518.325886][T12643] ? lockdep_hardirqs_on+0x7c/0x110 [ 518.325910][T12643] simple_copy_to_iter+0x46/0x90 [ 518.325937][T12643] __skb_datagram_iter+0x5af/0x900 [ 518.325961][T12643] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 518.325995][T12643] skb_copy_datagram_iter+0xa6/0x220 [ 518.326022][T12643] mptcp_recvmsg+0x83d/0x1cf0 [ 518.326071][T12643] ? __pfx_mptcp_recvmsg+0x10/0x10 [ 518.326104][T12643] ? is_bpf_text_address+0x8a/0x1a0 [ 518.326148][T12643] ? __pfx_mptcp_recvmsg+0x10/0x10 [ 518.326179][T12643] inet_recvmsg+0x625/0x6a0 [ 518.326210][T12643] ? __pfx_inet_recvmsg+0x10/0x10 [ 518.326239][T12643] ? aa_sock_msg_perm.constprop.0+0x100/0x1b0 [ 518.326269][T12643] sock_recvmsg+0x1b2/0x250 [ 518.326311][T12643] sock_read_iter+0x2b9/0x3b0 [ 518.326334][T12643] ? __pfx_sock_read_iter+0x10/0x10 [ 518.326367][T12643] ? __lock_acquire+0x436/0x2890 [ 518.326389][T12643] ? copy_iovec_from_user+0x131/0x170 [ 518.326418][T12643] do_iter_readv_writev+0x743/0x9e0 [ 518.326453][T12643] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 518.326484][T12643] ? common_file_perm+0x1b1/0x500 [ 518.326516][T12643] ? bpf_lsm_file_permission+0x9/0x10 [ 518.326551][T12643] ? security_file_permission+0x71/0x210 [ 518.326584][T12643] ? rw_verify_area+0xcf/0x6c0 [ 518.326616][T12643] vfs_readv+0x4cb/0x8b0 [ 518.326653][T12643] ? __pfx_vfs_readv+0x10/0x10 [ 518.326703][T12643] ? __fget_files+0x20e/0x3c0 [ 518.326735][T12643] ? __fget_files+0x170/0x3c0 [ 518.326774][T12643] ? do_readv+0x28c/0x340 [ 518.326802][T12643] do_readv+0x28c/0x340 [ 518.326844][T12643] ? __pfx_do_readv+0x10/0x10 [ 518.326881][T12643] do_syscall_64+0xcd/0xf80 [ 518.326905][T12643] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 518.326926][T12643] RIP: 0033:0x7f465f38f7c9 [ 518.326942][T12643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 518.326963][T12643] RSP: 002b:00007f465d5f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 518.326983][T12643] RAX: ffffffffffffffda RBX: 00007f465f5e5fa0 RCX: 00007f465f38f7c9 [ 518.326998][T12643] RDX: 0000000000000006 RSI: 0000200000000040 RDI: 0000000000000003 [ 518.327011][T12643] RBP: 00007f465d5f6090 R08: 0000000000000000 R09: 0000000000000000 [ 518.327024][T12643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 518.327036][T12643] R13: 00007f465f5e6038 R14: 00007f465f5e5fa0 R15: 00007fff083fe6a8 [ 518.327065][T12643] [ 520.488106][T12681] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1375'. [ 521.600204][T12699] FAULT_INJECTION: forcing a failure. [ 521.600204][T12699] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 521.617243][T12699] CPU: 1 UID: 0 PID: 12699 Comm: syz.3.1381 Tainted: G L syzkaller #0 PREEMPT(full) [ 521.617290][T12699] Tainted: [L]=SOFTLOCKUP [ 521.617301][T12699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 521.617318][T12699] Call Trace: [ 521.617327][T12699] [ 521.617338][T12699] dump_stack_lvl+0x16c/0x1f0 [ 521.617373][T12699] should_fail_ex+0x512/0x640 [ 521.617416][T12699] _copy_to_iter+0x463/0x1710 [ 521.617462][T12699] ? __pfx__copy_to_iter+0x10/0x10 [ 521.617496][T12699] ? find_held_lock+0x2b/0x80 [ 521.617541][T12699] ? mark_held_locks+0x49/0x80 [ 521.617570][T12699] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 521.617619][T12699] ? lockdep_hardirqs_on+0x7c/0x110 [ 521.617656][T12699] simple_copy_to_iter+0x46/0x90 [ 521.617693][T12699] __skb_datagram_iter+0x5af/0x900 [ 521.617728][T12699] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 521.617779][T12699] skb_copy_datagram_iter+0xa6/0x220 [ 521.617820][T12699] mptcp_recvmsg+0x83d/0x1cf0 [ 521.617896][T12699] ? __pfx_mptcp_recvmsg+0x10/0x10 [ 521.617944][T12699] ? is_bpf_text_address+0x8a/0x1a0 [ 521.618007][T12699] ? __pfx_mptcp_recvmsg+0x10/0x10 [ 521.618050][T12699] inet_recvmsg+0x625/0x6a0 [ 521.618090][T12699] ? __pfx_inet_recvmsg+0x10/0x10 [ 521.618132][T12699] ? aa_sock_msg_perm.constprop.0+0x100/0x1b0 [ 521.618182][T12699] sock_recvmsg+0x1b2/0x250 [ 521.618215][T12699] sock_read_iter+0x2b9/0x3b0 [ 521.618246][T12699] ? __pfx_sock_read_iter+0x10/0x10 [ 521.618291][T12699] ? __lock_acquire+0x436/0x2890 [ 521.618321][T12699] ? copy_iovec_from_user+0x131/0x170 [ 521.618360][T12699] do_iter_readv_writev+0x743/0x9e0 [ 521.618404][T12699] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 521.618445][T12699] ? common_file_perm+0x1b1/0x500 [ 521.618488][T12699] ? bpf_lsm_file_permission+0x9/0x10 [ 521.618525][T12699] ? security_file_permission+0x71/0x210 [ 521.618569][T12699] ? rw_verify_area+0xcf/0x6c0 [ 521.618613][T12699] vfs_readv+0x4cb/0x8b0 [ 521.618664][T12699] ? __pfx_vfs_readv+0x10/0x10 [ 521.618736][T12699] ? __fget_files+0x20e/0x3c0 [ 521.618779][T12699] ? __fget_files+0x170/0x3c0 [ 521.618834][T12699] ? do_readv+0x28c/0x340 [ 521.618872][T12699] do_readv+0x28c/0x340 [ 521.618914][T12699] ? __pfx_do_readv+0x10/0x10 [ 521.618966][T12699] do_syscall_64+0xcd/0xf80 [ 521.619000][T12699] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 521.619031][T12699] RIP: 0033:0x7fbbc0b8f7c9 [ 521.619054][T12699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 521.619085][T12699] RSP: 002b:00007fbbbedf6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 521.619115][T12699] RAX: ffffffffffffffda RBX: 00007fbbc0de5fa0 RCX: 00007fbbc0b8f7c9 [ 521.619144][T12699] RDX: 0000000000000006 RSI: 0000200000000040 RDI: 0000000000000003 [ 521.619164][T12699] RBP: 00007fbbbedf6090 R08: 0000000000000000 R09: 0000000000000000 [ 521.619183][T12699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 521.619201][T12699] R13: 00007fbbc0de6038 R14: 00007fbbc0de5fa0 R15: 00007fffa2180728 [ 521.619243][T12699] [ 524.894824][T12753] FAULT_INJECTION: forcing a failure. [ 524.894824][T12753] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 524.969858][T12753] CPU: 1 UID: 0 PID: 12753 Comm: syz.3.1393 Tainted: G L syzkaller #0 PREEMPT(full) [ 524.969918][T12753] Tainted: [L]=SOFTLOCKUP [ 524.969928][T12753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 524.969947][T12753] Call Trace: [ 524.969956][T12753] [ 524.969967][T12753] dump_stack_lvl+0x16c/0x1f0 [ 524.970001][T12753] should_fail_ex+0x512/0x640 [ 524.970043][T12753] _copy_to_user+0x32/0xd0 [ 524.970084][T12753] simple_read_from_buffer+0xcb/0x170 [ 524.970131][T12753] proc_fail_nth_read+0x197/0x240 [ 524.970164][T12753] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 524.970199][T12753] ? rw_verify_area+0xcf/0x6c0 [ 524.970240][T12753] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 524.970272][T12753] vfs_read+0x1e4/0xcf0 [ 524.970318][T12753] ? __pfx___mutex_lock+0x10/0x10 [ 524.970354][T12753] ? __pfx_vfs_read+0x10/0x10 [ 524.970410][T12753] ? __fget_files+0x20e/0x3c0 [ 524.970468][T12753] ksys_read+0x12a/0x250 [ 524.970511][T12753] ? __pfx_ksys_read+0x10/0x10 [ 524.970566][T12753] do_syscall_64+0xcd/0xf80 [ 524.970601][T12753] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 524.970631][T12753] RIP: 0033:0x7fbbc0b8e1dc [ 524.970655][T12753] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 524.970700][T12753] RSP: 002b:00007fbbbedf6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 524.970729][T12753] RAX: ffffffffffffffda RBX: 00007fbbc0de5fa0 RCX: 00007fbbc0b8e1dc [ 524.970750][T12753] RDX: 000000000000000f RSI: 00007fbbbedf60a0 RDI: 0000000000000004 [ 524.970769][T12753] RBP: 00007fbbbedf6090 R08: 0000000000000000 R09: 0000000000000000 [ 524.970801][T12753] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 524.970819][T12753] R13: 00007fbbc0de6038 R14: 00007fbbc0de5fa0 R15: 00007fffa2180728 [ 524.970862][T12753] [ 526.667786][T12788] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1403'. [ 527.706716][ T3503] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 527.917909][ T3503] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 528.235587][ T3503] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 528.878937][ T3503] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 529.350207][T12831] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1414'. [ 529.586927][ T3503] bridge_slave_1: left allmulticast mode [ 529.594949][ T3503] bridge_slave_1: left promiscuous mode [ 529.602893][ T3503] bridge0: port 2(bridge_slave_1) entered disabled state [ 529.650422][ T3503] bridge_slave_0: left allmulticast mode [ 529.669611][ T3503] bridge_slave_0: left promiscuous mode [ 529.691675][ T3503] bridge0: port 1(bridge_slave_0) entered disabled state [ 530.117832][T12838] zswap: compressor not available [ 531.067216][ T3503] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 531.107330][ T3503] bond0 (unregistering): Released all slaves [ 533.072113][ T3503] hsr_slave_0: left promiscuous mode [ 533.156828][ T3503] hsr_slave_1: left promiscuous mode [ 533.222316][T12899] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1426'. [ 533.266051][ T3503] veth0_macvtap: left promiscuous mode [ 533.303168][ T3503] veth1_vlan: left promiscuous mode [ 533.308601][ T3503] veth0_vlan: left promiscuous mode [ 538.509925][T12971] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1437'. [ 540.835841][T13028] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1448'. [ 541.899556][T13054] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1450'. [ 543.106773][ T9086] netdevsim netdevsim10000 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 543.620642][T13089] netlink: 40 bytes leftover after parsing attributes in process `syz.2.1461'. [ 544.371762][T13101] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1462'. [ 544.574797][T13112] CIFS: No dialect specified on mount. Default has changed to a more secure dialect, SMB2.1 or later (e.g. SMB3.1.1), from CIFS (SMB1). To use the less secure SMB1 dialect to access old servers which do not support SMB3.1.1 (or even SMB3 or SMB2.1) specify vers=1.0 on mount. [ 544.668647][T13112] CIFS mount error: No usable UNC path provided in device string! [ 544.668647][T13112] [ 544.680177][T13108] nvme_fabrics: missing parameter 'transport=%s' [ 544.690853][T13112] CIFS: VFS: CIFS mount error: No usable UNC path provided in device string! [ 544.741434][T13114] device-mapper: ioctl: ioctl interface mismatch: kernel(4.50.0), user(1936091491.0.0), cmd(3) [ 544.811405][T13108] nvme_fabrics: missing parameter 'nqn=%s' [ 544.886474][T13108] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1465'. [ 548.385010][T13165] netlink: 342 bytes leftover after parsing attributes in process `syz.4.1487'. [ 548.944418][T13173] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1480'. [ 550.418832][T13189] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1481'. [ 550.890306][T13193] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1483'. [ 550.924099][T13181] kexec: Could not allocate control_code_buffer [ 551.180745][T13196] bcache: register_bcache() error : Not a bcache superblock (bad offset) [ 552.387142][T13220] netlink: 28 bytes leftover after parsing attributes in process `syz.2.1492'. [ 552.705836][T13223] bridge0: port 3(veth0_to_bridge) entered blocking state [ 552.786464][T13223] bridge0: port 3(veth0_to_bridge) entered disabled state [ 552.805903][T13223] veth0_to_bridge: entered allmulticast mode [ 552.861295][T13223] veth0_to_bridge: entered promiscuous mode [ 552.916524][T13223] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 552.985729][T13223] bridge0: port 3(veth0_to_bridge) entered blocking state [ 552.993477][T13223] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 553.698167][T13250] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1497'. [ 553.720311][T13238] Invalid ELF header magic: != ELF [ 553.763336][T13255] CIFS mount error: No usable UNC path provided in device string! [ 553.763336][T13255] [ 553.796399][T13255] CIFS: VFS: CIFS mount error: No usable UNC path provided in device string! [ 553.865513][T13252] nvme_fabrics: missing parameter 'transport=%s' [ 553.884275][T13252] nvme_fabrics: missing parameter 'nqn=%s' [ 553.935314][T13255] device-mapper: ioctl: ioctl interface mismatch: kernel(4.50.0), user(1936091491.0.0), cmd(3) [ 554.017793][T13252] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1498'. [ 554.195955][T13240] kexec: Could not allocate control_code_buffer [ 554.619342][T13269] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1499'. [ 554.654127][T13265] bcache: register_bcache() error : Not a bcache superblock (bad offset) [ 555.098697][T13285] netlink: 28 bytes leftover after parsing attributes in process `syz.4.1503'. [ 555.635603][T13297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x78000 [ 555.645637][T13297] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 555.683150][T13297] flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 555.727126][T13297] page_type: f5(slab) [ 555.754725][T13297] raw: 00fff00000000040 ffff8881404078c0 dead000000000122 0000000000000000 [ 555.804323][T13297] raw: 0000000000000000 0000000000190019 00000000f5000000 0000000000000000 [ 555.825732][T13297] head: 00fff00000000040 ffff8881404078c0 dead000000000122 0000000000000000 [ 555.865576][T13297] head: 0000000000000000 0000000000190019 00000000f5000000 0000000000000000 [ 555.888959][T13297] head: 00fff00000000003 ffffea0001e00001 00000000ffffffff 00000000ffffffff [ 555.901818][T13297] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 555.943849][T13297] page dumped because: unmovable page [ 555.977397][T13297] page_owner tracks the page as allocated [ 556.017335][T13297] page last allocated via order 3, migratetype Reclaimable, gfp_mask 0xd20d0(__GFP_RECLAIMABLE|__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 5216, tgid 5216 (udevadm), ts 45026425692, free_ts 37533046722 [ 556.104396][T13297] post_alloc_hook+0x1af/0x220 [ 556.134518][T13297] get_page_from_freelist+0xd0b/0x31a0 [ 556.146836][T13297] __alloc_frozen_pages_noprof+0x25f/0x2430 [ 556.224665][T13297] alloc_pages_mpol+0x1fb/0x550 [ 556.229629][T13297] new_slab+0x2c3/0x430 [ 556.233830][T13297] ___slab_alloc+0xe18/0x1c90 [ 556.320217][T13297] __slab_alloc.constprop.0+0x63/0x110 [ 556.350164][T13297] kmem_cache_alloc_lru_noprof+0x451/0x770 [ 556.370367][T13297] alloc_inode+0xc3/0x240 [ 556.409463][T13304] Invalid ELF header magic: != ELF [ 556.444211][T13297] iget_locked+0x1d9/0x6d0 [ 556.466702][T13297] kernfs_get_inode+0x46/0x470 [ 556.502743][T13297] kernfs_iop_lookup+0x1a7/0x2d0 [ 556.559301][T13297] __lookup_slow+0x251/0x460 [ 556.563994][T13297] lookup_slow+0x50/0x70 [ 556.678010][T13297] path_lookupat+0x5e9/0xc40 [ 556.761848][T13297] filename_lookup+0x224/0x5f0 [ 556.767305][T13297] page last free pid 1 tgid 1 stack trace: [ 556.779557][T13297] __free_frozen_pages+0x7df/0x1170 [ 556.800910][T13297] free_contig_range+0x183/0x4a0 [ 556.814696][T13297] destroy_args+0xb95/0x14e0 [ 556.829581][T13297] debug_vm_pgtable+0x2220/0x38d0 [ 556.864870][T13297] do_one_initcall+0x123/0x680 [ 556.869757][T13297] kernel_init_freeable+0x5c8/0x920 [ 556.900481][T13297] kernel_init+0x1c/0x2b0 [ 556.914855][T13297] ret_from_fork+0x983/0xb10 [ 556.927706][T13297] ret_from_fork_asm+0x1a/0x30 [ 557.372386][T13307] kexec: Could not allocate control_code_buffer [ 557.409749][T13328] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1510'. [ 557.866650][T13337] bcache: register_bcache() error : Not a bcache superblock (bad offset) [ 559.509390][T13373] Invalid ELF header magic: != ELF [ 559.887516][T13397] perf: Dynamic interrupt throttling disabled, can hang your system! [ 560.164701][T13407] netlink: 4 bytes leftover after parsing attributes in process `syz.5.1526'. [ 561.317654][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 561.330447][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 561.343101][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 561.355782][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 561.356280][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 561.356812][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 561.357328][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 561.357804][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 561.358322][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 561.358802][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 566.329795][ C0] net_ratelimit: 14555 callbacks suppressed [ 566.329821][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 566.330233][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.330245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.330791][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 566.330858][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.331200][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.331775][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 566.332199][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 566.332550][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 566.332778][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 568.970660][ C0] sched: DL replenish lagged too much [ 571.341918][ C1] net_ratelimit: 14682 callbacks suppressed [ 571.341946][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.342221][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 571.342568][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.342987][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 571.343582][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 571.343991][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 571.344162][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.344601][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 571.344755][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 571.344994][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 574.364716][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 574.380140][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 576.355065][ C0] net_ratelimit: 15013 callbacks suppressed [ 576.355091][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 576.355299][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.355677][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 576.355832][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.356067][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 576.356638][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 576.357044][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 576.357355][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 576.357600][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 576.357887][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.367205][ C0] net_ratelimit: 15401 callbacks suppressed [ 581.367229][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 581.367619][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 581.368177][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.368739][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.369106][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 581.369468][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 581.369973][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 581.370182][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 581.370370][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 581.370713][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.379648][ C0] net_ratelimit: 15102 callbacks suppressed [ 586.379673][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 586.380101][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 586.380382][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.380666][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 586.380967][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.381080][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 586.381641][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 586.382033][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 586.382582][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 586.382603][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 591.392168][ C1] net_ratelimit: 14680 callbacks suppressed [ 591.392194][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.392201][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 591.392643][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 591.392776][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.393247][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 591.393715][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 591.394344][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 591.394346][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 591.394794][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 591.394946][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.404680][ C0] net_ratelimit: 14687 callbacks suppressed [ 596.404706][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 596.405266][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 596.405535][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.405661][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 596.406130][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 596.406299][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 596.406688][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 596.407243][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 596.407680][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 596.407753][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 601.417023][ C0] net_ratelimit: 14649 callbacks suppressed [ 601.417047][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 601.417433][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 601.417464][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 601.418020][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 601.418091][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 601.418552][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 601.419190][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 601.419614][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 601.419624][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 601.420167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 606.429576][ C1] net_ratelimit: 14914 callbacks suppressed [ 606.429602][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 606.429617][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 606.430011][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 606.430465][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 606.430595][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 606.431046][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 606.431628][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 606.432087][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 606.432144][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 606.432694][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.442028][ C0] net_ratelimit: 15029 callbacks suppressed [ 611.442052][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 611.442679][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 611.443086][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 611.443368][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.443667][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 611.443988][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 611.444090][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 611.444694][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 611.445101][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 611.445595][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.454492][ C0] net_ratelimit: 14819 callbacks suppressed [ 616.454518][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 616.454980][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 616.455279][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.455568][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 616.455969][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 616.456057][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.456558][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 616.456996][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 616.457572][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 616.457607][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 621.466920][ C0] net_ratelimit: 14954 callbacks suppressed [ 621.466951][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 621.467444][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 621.467834][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 621.468008][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.468390][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 621.468635][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 621.468911][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 621.469318][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 621.469863][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 621.470339][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 622.906515][ T5845] Bluetooth: hci4: command 0x0406 tx timeout [ 626.479737][ C0] net_ratelimit: 14191 callbacks suppressed [ 626.479760][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 626.480559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 626.480748][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 626.480924][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.481433][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 626.481908][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 626.482281][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 626.482381][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 626.482797][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 626.483276][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 631.492196][ C1] net_ratelimit: 13698 callbacks suppressed [ 631.492222][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 631.492315][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 631.492825][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 631.492847][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 631.493213][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.493392][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 631.493708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 631.494276][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 631.494761][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 631.495120][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 636.504600][ C0] net_ratelimit: 15163 callbacks suppressed [ 636.504626][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 636.504815][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 636.505096][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 636.505354][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 636.505815][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 636.505974][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 636.506544][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 636.507024][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 636.507249][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 636.507478][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 640.186600][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 640.202063][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 641.517071][ C1] net_ratelimit: 14972 callbacks suppressed [ 641.517098][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 641.517253][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 641.517655][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 641.517858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 641.518142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 641.518400][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 641.518839][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 641.519383][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 641.519742][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 641.520065][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 646.529809][ C0] net_ratelimit: 14735 callbacks suppressed [ 646.529834][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 646.530291][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 646.530373][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 646.530848][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 646.530903][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 646.531365][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 646.531420][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 646.531972][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 646.532513][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 646.532959][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 651.542425][ C0] net_ratelimit: 14922 callbacks suppressed [ 651.542450][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 651.542900][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 651.542941][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 651.543384][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 651.543473][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 651.543949][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 651.544017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 651.544597][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 651.545142][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 651.545597][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 656.554473][ C0] net_ratelimit: 14655 callbacks suppressed [ 656.554500][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 656.555052][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 656.555535][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 656.555647][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 656.556186][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 656.556619][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 656.557136][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 656.557291][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 656.557757][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 656.557890][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 661.567140][ C0] net_ratelimit: 14650 callbacks suppressed [ 661.567168][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 661.567694][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 661.568275][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 661.568497][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 661.568787][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 661.569226][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 661.569711][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 661.570185][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 661.570313][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 661.570813][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 666.579817][ C0] net_ratelimit: 14595 callbacks suppressed [ 666.579855][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 666.580017][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 666.580421][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 666.580917][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 666.581317][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 666.581705][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 666.581802][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 666.582321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 666.582381][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 666.582833][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 671.592413][ C0] net_ratelimit: 14516 callbacks suppressed [ 671.592439][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 671.592487][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 671.592910][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 671.593471][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 671.594092][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 671.594232][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 671.594629][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 671.594846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 671.595054][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 671.595372][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 676.604486][ C1] net_ratelimit: 14433 callbacks suppressed [ 676.604512][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 676.604544][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 676.605034][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 676.605507][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 676.606039][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 676.606103][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 676.606624][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 676.606626][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 676.607079][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 676.607133][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 681.617437][ C0] net_ratelimit: 14626 callbacks suppressed [ 681.617460][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 681.617719][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 681.617943][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 681.618375][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 681.618883][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 681.619414][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 681.619487][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 681.620013][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 681.620023][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 681.620425][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 686.629577][ C0] net_ratelimit: 14612 callbacks suppressed [ 686.629603][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 686.630042][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 686.630491][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 686.630576][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 686.631105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 686.631216][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 686.631630][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 686.631743][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 686.632141][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 686.632679][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 691.642065][ C0] net_ratelimit: 14594 callbacks suppressed [ 691.642092][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 691.642237][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 691.642726][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 691.643248][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 691.643707][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 691.643869][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 691.644253][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 691.644848][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 691.645453][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 691.645661][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 696.654776][ C0] net_ratelimit: 14384 callbacks suppressed [ 696.654802][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 696.655332][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 696.655776][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 696.655780][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 696.656301][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 696.656924][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 696.657380][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 696.657492][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 696.657946][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 696.657962][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 697.162823][ T1301] ieee802154 phy0 wpan0: encryption failed: -22 [ 697.179477][ T1301] ieee802154 phy1 wpan1: encryption failed: -22 [ 701.667485][ C0] net_ratelimit: 14638 callbacks suppressed [ 701.667511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 701.668032][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 701.668371][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 701.668463][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 701.669323][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 701.669936][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 701.670128][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 701.670460][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 701.670679][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 701.670920][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.679553][ C0] net_ratelimit: 14850 callbacks suppressed [ 706.679578][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 706.680051][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 706.680105][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 706.680529][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.681079][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 706.681677][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 706.681832][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 706.682183][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 706.682391][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 706.682604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 711.691956][ C0] net_ratelimit: 14606 callbacks suppressed [ 711.691983][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 711.692555][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 711.692571][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 711.693101][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 711.693133][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 711.693526][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 711.693620][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 711.694035][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 711.694625][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 711.695150][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 716.704544][ C0] net_ratelimit: 14772 callbacks suppressed [ 716.704570][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 716.705067][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 716.705243][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.705643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 716.706179][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 716.706821][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.707174][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 716.707351][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 716.707678][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 716.707810][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.852270][ T32] INFO: task syz.5.1531:13425 blocked for more than 143 seconds. [ 718.852308][ T32] Tainted: G L syzkaller #0 [ 718.852328][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 718.852342][ T32] task:syz.5.1531 state:D stack:28360 pid:13425 tgid:13421 ppid:12314 task_flags:0x400040 flags:0x00080002 [ 718.852458][ T32] Call Trace: [ 718.852470][ T32] [ 718.852488][ T32] ? __schedule+0x10b9/0x5ee0 [ 718.852541][ T32] __schedule+0x1138/0x5ee0 [ 718.852634][ T32] ? __pfx___schedule+0x10/0x10 [ 718.852682][ T32] ? find_held_lock+0x2b/0x80 [ 718.852731][ T32] ? schedule+0x2d7/0x3a0 [ 718.852787][ T32] schedule+0xe7/0x3a0 [ 718.852839][ T32] schedule_preempt_disabled+0x13/0x30 [ 718.852891][ T32] __mutex_lock+0xc69/0x1ca0 [ 718.852931][ T32] ? tty_open+0x53d/0xf90 [ 718.852977][ T32] ? __pfx___mutex_lock+0x10/0x10 [ 718.853040][ T32] ? __pfx_tty_open+0x10/0x10 [ 718.853073][ T32] ? tty_open+0x53d/0xf90 [ 718.853102][ T32] ? __pfx_tty_open+0x10/0x10 [ 718.853130][ T32] tty_open+0x53d/0xf90 [ 718.853170][ T32] ? __pfx_tty_open+0x10/0x10 [ 718.853203][ T32] ? chrdev_open+0x58c/0x6a0 [ 718.853240][ T32] ? __pfx_tty_open+0x10/0x10 [ 718.853276][ T32] chrdev_open+0x234/0x6a0 [ 718.853309][ T32] ? __pfx_chrdev_open+0x10/0x10 [ 718.853366][ T32] ? fsnotify_open_perm_and_set_mode+0x17c/0xa60 [ 718.853430][ T32] do_dentry_open+0x748/0x1590 [ 718.853479][ T32] ? __pfx_chrdev_open+0x10/0x10 [ 718.853545][ T32] vfs_open+0x82/0x3f0 [ 718.853589][ T32] path_openat+0x2078/0x3140 [ 718.853655][ T32] ? __pfx_path_openat+0x10/0x10 [ 718.853726][ T32] do_filp_open+0x20b/0x470 [ 718.853780][ T32] ? __pfx_do_filp_open+0x10/0x10 [ 718.853876][ T32] ? alloc_fd+0x471/0x7d0 [ 718.853937][ T32] do_sys_openat2+0x121/0x290 [ 718.853981][ T32] ? __pfx_do_sys_openat2+0x10/0x10 [ 718.854036][ T32] __x64_sys_openat+0x174/0x210 [ 718.854078][ T32] ? __pfx___x64_sys_openat+0x10/0x10 [ 718.854135][ T32] do_syscall_64+0xcd/0xf80 [ 718.854171][ T32] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 718.854205][ T32] RIP: 0033:0x7fbd7858f7c9 [ 718.854231][ T32] RSP: 002b:00007fbd76793038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 718.854264][ T32] RAX: ffffffffffffffda RBX: 00007fbd787e6270 RCX: 00007fbd7858f7c9 [ 718.854288][ T32] RDX: 00000000000a0102 RSI: 0000200000000400 RDI: ffffffffffffff9c [ 718.854311][ T32] RBP: 00007fbd78613f91 R08: 0000000000000000 R09: 0000000000000000 [ 718.854332][ T32] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 718.854353][ T32] R13: 00007fbd787e6308 R14: 00007fbd787e6270 R15: 00007ffc4a19da28 [ 718.854399][ T32] [ 718.854414][ T32] [ 718.854414][ T32] Showing all locks held in the system: [ 718.854427][ T32] 2 locks held by kthreadd/2: [ 718.854447][ T32] 1 lock held by kworker/R-kvfre/6: [ 718.854476][ T32] #0: ffffffff8e27efa8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x27/0x420 [ 718.854556][ T32] 4 locks held by kworker/0:0/9: [ 718.854573][ T32] 4 locks held by kworker/0:1/10: [ 718.854591][ T32] #0: ffff88814cc9c948 ((wq_completion)wg-kex-wg0#4){+.+.}-{0:0}, at: process_one_work+0x128d/0x1b20 [ 718.854679][ T32] #1: ffffc900000f7c90 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((__typeof__(*((worker))) *)(( unsigned long)((worker))))); (typeof((__typeof__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x914/0x1b20 [ 718.854789][ T32] #2: ffff88802fcb5308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x1c2/0x880 [ 718.854870][ T32] #3: ffff888028d59708 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x5ac/0x880 [ 718.854952][ T32] 3 locks held by kworker/u8:1/13: [ 718.854976][ T32] #0: ffff888030425148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x128d/0x1b20 [ 718.855054][ T32] #1: ffffc90000127c90 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x914/0x1b20 [ 718.855159][ T32] #2: ffffffff90145e28 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x12/0x30 [ 718.855244][ T32] 1 lock held by kworker/R-mm_pe/14: [ 718.855263][ T32] #0: ffffffff8e27efa8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x27/0x420 [ 718.855347][ T32] 4 locks held by kworker/1:0/24: [ 718.855367][ T32] 5 locks held by kworker/u8:2/30: [ 718.855385][ T32] 1 lock held by khungtaskd/32: [ 718.855403][ T32] #0: ffffffff8e3c94a0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x36/0x1c0 [ 718.855485][ T32] 1 lock held by khugepaged/38: [ 718.855504][ T32] 4 locks held by kworker/1:1/43: [ 718.871201][ T32] 3 locks held by kworker/u8:3/50: [ 718.871229][ T32] 4 locks held by kworker/u8:5/74: [ 718.871248][ T32] #0: ffff8880594d2148 ((wq_completion)wg-kex-wg0#9){+.+.}-{0:0}, at: process_one_work+0x128d/0x1b20 [ 718.871347][ T32] #1: ffffc9000217fc90 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_one_work+0x914/0x1b20 [ 718.871434][ T32] #2: ffff888075ef5308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0xec/0x610 [ 718.871523][ T32] #3: ffff88805c64c890 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x100/0x610 [ 718.871611][ T32] 3 locks held by kworker/u8:6/139: [ 718.871632][ T32] 2 locks held by kworker/1:2/795: [ 718.871651][ T32] 4 locks held by kworker/0:2/815: [ 718.871673][ T32] 4 locks held by kworker/u8:7/1130: [ 718.871692][ T32] 6 locks held by kworker/u8:8/1143: [ 718.871710][ T32] #0: ffff888141af8148 ((wq_completion)writeback){+.+.}-{0:0}, at: process_one_work+0x128d/0x1b20 [ 718.871795][ T32] #1: ffffc90003f2fc90 ((work_completion)(&(&wb->dwork)->work)){+.+.}-{0:0}, at: process_one_work+0x914/0x1b20 [ 718.871881][ T32] #2: ffff888032ab40e0 (&type->s_umount_key#33){++++}-{4:4}, at: super_trylock_shared+0x1e/0xf0 [ 718.871992][ T32] #3: ffff888032ab6b98 (&sbi->s_writepages_rwsem){++++}-{0:0}, at: do_writepages+0x27a/0x600 [ 718.872088][ T32] #4: ffff8880332a8950 (jbd2_handle){++++}-{0:0}, at: start_this_handle+0x5e7/0x1410 [ 718.872187][ T32] #5: ffff88807659bc30 (&ei->i_data_sem){++++}-{4:4}, at: ext4_map_blocks+0x475/0x1350 [ 718.872270][ T32] 4 locks held by kworker/u8:9/2123: [ 718.872302][ T32] 4 locks held by kworker/u8:11/3448: [ 718.872322][ T32] 2 locks held by kworker/u8:12/3503: [ 718.872341][ T32] 4 locks held by kworker/u8:13/3556: [ 718.872360][ T32] 3 locks held by kworker/u8:14/4540: [ 718.872380][ T32] 3 locks held by kworker/u8:15/4841: [ 718.872400][ T32] 1 lock held by kworker/R-ext4-/5165: [ 718.872419][ T32] #0: ffffffff8e27efa8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x27/0x420 [ 718.872503][ T32] 1 lock held by klogd/5191: [ 718.872522][ T32] 3 locks held by udevd/5202: [ 718.872540][ T32] 2 locks held by dhcpcd/5496: [ 718.872560][ T32] 2 locks held by crond/5574: [ 718.872577][ T32] 2 locks held by getty/5592: [ 718.872596][ T32] #0: ffff88814dc8f0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 718.872684][ T32] #1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x41b/0x1510 [ 718.872769][ T32] 1 lock held by syz-executor/5819: [ 718.872789][ T32] 3 locks held by kworker/0:3/5820: [ 718.872809][ T32] 1 lock held by syz-executor/5840: [ 718.872828][ T32] 2 locks held by syz-executor/5841: [ 718.872847][ T32] 4 locks held by kworker/1:3/5843: [ 718.872867][ T32] 1 lock held by kworker/R-wg-cr/5872: [ 718.872886][ T32] #0: ffffffff8e27efa8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: rescuer_thread+0x69f/0xf10 [ 718.872978][ T32] 1 lock held by kworker/R-wg-cr/5877: [ 718.872997][ T32] #0: ffffffff8e27efa8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x27/0x420 [ 718.873080][ T32] 4 locks held by kworker/1:4/5921: [ 718.873099][ T32] #0: ffff88805c75dd48 ((wq_completion)wg-kex-wg0#10){+.+.}-{0:0}, at: process_one_work+0x128d/0x1b20 [ 718.873192][ T32] #1: ffffc9000499fc90 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((__typeof__(*((worker))) *)(( unsigned long)((worker))))); (typeof((__typeof__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x914/0x1b20 [ 718.873315][ T32] #2: ffff888075ef5308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_response+0xc5/0x5f0 [ 718.873399][ T32] #3: ffff88805c64c890 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_response+0xd8/0x5f0 [ 718.873484][ T32] 5 locks held by kworker/0:6/5922: [ 718.873504][ T32] 1 lock held by kworker/1:5/5923: [ 718.873523][ T32] 4 locks held by kworker/1:6/5930: [ 718.873542][ T32] #0: ffff88813ff56948 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x128d/0x1b20 [ 718.873627][ T32] #1: ffffc90004a4fc90 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x914/0x1b20 [ 718.873711][ T32] #2: ffffffff90145e28 (rtnl_mutex){+.+.}-{4:4}, at: reg_check_chans_work+0x91/0x1190 [ 718.873792][ T32] #3: ffff88807a270788 (&rdev->wiphy.mtx){+.+.}-{4:4}, at: reg_check_chans_work+0x11b/0x1190 [ 718.873874][ T32] 4 locks held by kworker/0:7/5944: [ 718.873894][ T32] 3 locks held by kworker/u8:16/6225: [ 718.873913][ T32] 3 locks held by kworker/u8:17/6343: [ 718.873933][ T32] 4 locks held by syz-executor/8165: [ 718.873960][ T32] 4 locks held by kworker/u8:18/9083: [ 718.873980][ T32] 3 locks held by kworker/u8:19/9085: [ 718.873999][ T32] 3 locks held by kworker/u8:20/9086: [ 718.874018][ T32] 4 locks held by kworker/u8:21/9088: [ 718.874037][ T32] 4 locks held by kworker/u8:22/9089: [ 718.874057][ T32] 3 locks held by kworker/u8:23/9090: [ 718.874076][ T32] 4 locks held by kworker/u8:24/9091: [ 718.874095][ T32] 2 locks held by kworker/u8:25/9104: [ 718.874115][ T32] 3 locks held by kworker/u8:26/9105: [ 718.874134][ T32] 4 locks held by kworker/u8:27/9106: [ 718.874154][ T32] 3 locks held by kworker/u8:28/9107: [ 718.874173][ T32] 4 locks held by kworker/u8:29/9108: [ 718.874192][ T32] #0: ffff888033cf6148 ((wq_completion)wg-kex-wg2#3){+.+.}-{0:0}, at: process_one_work+0x128d/0x1b20 [ 718.874287][ T32] #1: ffffc90003487c90 ((work_completion)(&peer->transmit_handshake_work)){+.+.}-{0:0}, at: process_one_work+0x914/0x1b20 [ 718.874373][ T32] #2: ffff8880346ad308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0xec/0x610 [ 718.874458][ T32] #3: ffff888028d5b4c0 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_create_initiation+0x100/0x610 [ 718.874545][ T32] 3 locks held by kworker/1:7/10241: [ 718.874566][ T32] 1 lock held by kworker/R-wg-cr/12337: [ 718.874585][ T32] #0: ffffffff8e27efa8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x27/0x420 [ 718.874667][ T32] 1 lock held by kworker/R-wg-cr/12338: [ 718.874686][ T32] #0: ffffffff8e27efa8 (wq_pool_attach_mutex){+.+.}-{4:4}, at: worker_attach_to_pool+0x27/0x420 [ 718.874769][ T32] 1 lock held by kworker/R-wg-cr/12339: [ 718.874790][ T32] 4 locks held by kworker/0:5/12639: [ 718.874808][ T32] #0: ffff888030d9a548 ((wq_completion)wg-kex-wg1#4){+.+.}-{0:0}, at: process_one_work+0x128d/0x1b20 [ 718.874901][ T32] #1: ffffc90003427c90 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((__typeof__(*((worker))) *)(( unsigned long)((worker))))); (typeof((__typeof__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x914/0x1b20 [ 718.875026][ T32] #2: ffff8880346a9308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x1c2/0x880 [ 718.892275][ T32] #3: ffff888028d5aad8 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x5ac/0x880 [ 718.892364][ T32] 1 lock held by syz.5.1531/13425: [ 718.892385][ T32] #0: ffffffff8f0725a8 (tty_mutex){+.+.}-{4:4}, at: tty_open+0x53d/0xf90 [ 718.892460][ T32] 4 locks held by syz.5.1531/13426: [ 718.892480][ T32] 3 locks held by kworker/1:8/13427: [ 718.892500][ T32] 3 locks held by kworker/0:8/13428: [ 718.892519][ T32] #0: ffff88805d10a948 ((wq_completion)wg-kex-wg0#8){+.+.}-{0:0}, at: process_one_work+0x128d/0x1b20 [ 718.892613][ T32] #1: ffffc90003a9fc90 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((__typeof__(*((worker))) *)(( unsigned long)((worker))))); (typeof((__typeof__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x914/0x1b20 [ 718.892755][ T32] #2: ffff888028d5f030 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_begin_session+0x30/0xe80 [ 718.892840][ T32] 4 locks held by kworker/1:9/13429: [ 718.892859][ T32] #0: ffff88805d10a948 ((wq_completion)wg-kex-wg0#8){+.+.}-{0:0}, at: process_one_work+0x128d/0x1b20 [ 718.892951][ T32] #1: ffffc90003e7fc90 ((work_completion)(&({ do { const void *__vpp_verify = (typeof((worker) + 0))((void *)0); (void)__vpp_verify; } while (0); ({ unsigned long __ptr; __asm__ ("" : "=r"(__ptr) : "0"((__typeof__(*((worker))) *)(( unsigned long)((worker))))); (typeof((__typeof__(*((worker))) *)(( unsigned long)((worker))))) (__ptr + (((__per_cpu_offset[(cpu)])))); }); })->work)){+.+.}-{0:0}, at: process_one_work+0x914/0x1b20 [ 718.893075][ T32] #2: ffff88807a289308 (&wg->static_identity.lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x1c2/0x880 [ 718.893162][ T32] #3: ffff888028d5f030 (&handshake->lock){++++}-{4:4}, at: wg_noise_handshake_consume_initiation+0x5ac/0x880 [ 718.893248][ T32] [ 718.893257][ T32] ============================================= [ 718.893257][ T32] [ 718.893276][ T32] NMI backtrace for cpu 0 [ 718.893316][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT(full) [ 718.893360][ T32] Tainted: [L]=SOFTLOCKUP [ 718.893370][ T32] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 718.893388][ T32] Call Trace: [ 718.893398][ T32] [ 718.893410][ T32] dump_stack_lvl+0x116/0x1f0 [ 718.893442][ T32] nmi_cpu_backtrace+0x27b/0x390 [ 718.893486][ T32] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 718.893518][ T32] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 718.893564][ T32] sys_info+0x133/0x180 [ 718.893597][ T32] watchdog+0xe66/0x1180 [ 718.893654][ T32] ? rcu_is_watching+0x12/0xc0 [ 718.893699][ T32] ? __pfx_watchdog+0x10/0x10 [ 718.893745][ T32] ? lockdep_hardirqs_on+0x7c/0x110 [ 718.893779][ T32] ? __kthread_parkme+0x19e/0x250 [ 718.893827][ T32] ? __pfx_watchdog+0x10/0x10 [ 718.893874][ T32] kthread+0x3c5/0x780 [ 718.893906][ T32] ? __pfx_kthread+0x10/0x10 [ 718.893940][ T32] ? rcu_is_watching+0x12/0xc0 [ 718.893991][ T32] ? __pfx_kthread+0x10/0x10 [ 718.894024][ T32] ret_from_fork+0x983/0xb10 [ 718.894058][ T32] ? __pfx_ret_from_fork+0x10/0x10 [ 718.894094][ T32] ? __switch_to+0x7af/0x10d0 [ 718.894134][ T32] ? __pfx_kthread+0x10/0x10 [ 718.894167][ T32] ret_from_fork_asm+0x1a/0x30 [ 718.894234][ T32] [ 718.894245][ T32] Sending NMI from CPU 0 to CPUs 1: [ 718.894298][ C1] NMI backtrace for cpu 1 [ 718.894316][ C1] CPU: 1 UID: 0 PID: 9091 Comm: kworker/u8:24 Tainted: G L syzkaller #0 PREEMPT(full) [ 718.894352][ C1] Tainted: [L]=SOFTLOCKUP [ 718.894360][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 718.894378][ C1] Workqueue: wg-kex-wg0 wg_packet_handshake_send_worker [ 718.894414][ C1] RIP: 0010:debug_lockdep_rcu_enabled+0x28/0x40 [ 718.894442][ C1] Code: 90 90 f3 0f 1e fa 8b 05 56 cc 12 05 85 c0 74 20 8b 05 e0 fb 12 05 85 c0 74 16 65 48 8b 05 98 68 3c 08 8b 80 2c 0b 00 00 85 c0 <0f> 94 c0 0f b6 c0 e9 8d 29 03 00 66 2e 0f 1f 84 00 00 00 00 00 0f [ 718.894466][ C1] RSP: 0018:ffffc90000a07ed0 EFLAGS: 00000246 [ 718.894484][ C1] RAX: 0000000000000000 RBX: ffffc90000a08c88 RCX: ffffc90000a09001 [ 718.894501][ C1] RDX: ffffc90000a08c90 RSI: ffffc90000a08c58 RDI: ffffc90000a07f58 [ 718.894518][ C1] RBP: 0000000000000001 R08: 0000000000000001 R09: 000000000ac0d5af [ 718.894533][ C1] R10: 0000000000000002 R11: 000000000008471e R12: ffffc90000a07f98 [ 718.894549][ C1] R13: ffffc90000a07f48 R14: ffffc90000a08c88 R15: ffffc90000a07f7c [ 718.894566][ C1] FS: 0000000000000000(0000) GS:ffff8881249f6000(0000) knlGS:0000000000000000 [ 718.894602][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 718.894618][ C1] CR2: 000055556313d5c8 CR3: 000000007d780000 CR4: 00000000003526f0 [ 718.894633][ C1] Call Trace: [ 718.894641][ C1] [ 718.894648][ C1] unwind_next_frame+0x3de/0x20b0 [ 718.894680][ C1] ? __netif_receive_skb_one_core+0xb0/0x1e0 [ 718.894721][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 718.894763][ C1] arch_stack_walk+0x94/0x100 [ 718.894795][ C1] ? __netif_receive_skb+0x1d/0x160 [ 718.894828][ C1] stack_trace_save+0x8e/0xc0 [ 718.894866][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 718.894905][ C1] ? __netif_receive_skb_core.constprop.0+0x6fd/0x35b0 [ 718.894942][ C1] kasan_save_stack+0x33/0x60 [ 718.894977][ C1] ? kasan_save_stack+0x33/0x60 [ 718.895008][ C1] ? kasan_save_track+0x14/0x30 [ 718.895040][ C1] ? __kasan_slab_alloc+0x89/0x90 [ 718.895075][ C1] ? kmem_cache_alloc_noprof+0x25e/0x770 [ 718.895104][ C1] ? skb_clone+0x190/0x3f0 [ 718.895136][ C1] ? maybe_deliver+0xd4/0x180 [ 718.895170][ C1] ? br_flood+0x17c/0x650 [ 718.895201][ C1] ? br_handle_frame_finish+0x1117/0x1f00 [ 718.895239][ C1] ? br_nf_hook_thresh+0x307/0x410 [ 718.895277][ C1] ? br_nf_pre_routing_finish_ipv6+0x76a/0xfc0 [ 718.895301][ C1] ? br_nf_pre_routing_ipv6+0x3cd/0x8c0 [ 718.895324][ C1] ? br_nf_pre_routing+0x860/0x15b0 [ 718.895344][ C1] ? br_handle_frame+0xb28/0x14e0 [ 718.895381][ C1] ? __netif_receive_skb_core.constprop.0+0x6b3/0x35b0 [ 718.895413][ C1] ? __netif_receive_skb_one_core+0xb0/0x1e0 [ 718.895468][ C1] kasan_save_track+0x14/0x30 [ 718.895501][ C1] __kasan_slab_alloc+0x89/0x90 [ 718.895547][ C1] kmem_cache_alloc_noprof+0x25e/0x770 [ 718.895593][ C1] ? skb_clone+0x190/0x3f0 [ 718.895633][ C1] ? skb_clone+0x190/0x3f0 [ 718.895668][ C1] skb_clone+0x190/0x3f0 [ 718.895712][ C1] maybe_deliver+0xd4/0x180 [ 718.895753][ C1] br_flood+0x17c/0x650 [ 718.895796][ C1] br_handle_frame_finish+0x1117/0x1f00 [ 718.895844][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 718.895896][ C1] ? ip6t_do_table+0xc25/0x1c30 [ 718.895930][ C1] ? __pfx_ip6t_do_table+0x10/0x10 [ 718.895964][ C1] ? nf_hook_slow+0x132/0x200 [ 718.896005][ C1] br_nf_hook_thresh+0x307/0x410 [ 718.896048][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 718.896095][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 718.896142][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 718.896187][ C1] ? __pfx_nf_nat_ipv6_in+0x10/0x10 [ 718.896240][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 718.896283][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 718.896330][ C1] br_nf_pre_routing_finish_ipv6+0x76a/0xfc0 [ 718.896360][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 718.896414][ C1] br_nf_pre_routing_ipv6+0x3cd/0x8c0 [ 718.896444][ C1] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 718.896472][ C1] ? lock_acquire+0x179/0x330 [ 718.896502][ C1] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 718.896532][ C1] ? net_generic+0xea/0x2a0 [ 718.896579][ C1] br_nf_pre_routing+0x860/0x15b0 [ 718.896610][ C1] br_handle_frame+0xb28/0x14e0 [ 718.896659][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 718.896714][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 718.896767][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 718.896813][ C1] __netif_receive_skb_core.constprop.0+0x6b3/0x35b0 [ 718.896860][ C1] ? kmem_cache_free+0x2d8/0x770 [ 718.896897][ C1] ? find_held_lock+0x2b/0x80 [ 718.896933][ C1] ? kfree_skbmem+0x1a4/0x1f0 [ 718.896966][ C1] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 718.897026][ C1] ? kfree_skbmem+0x1a4/0x1f0 [ 718.897056][ C1] ? kfree_skbmem+0x1a4/0x1f0 [ 718.897087][ C1] ? sk_skb_reason_drop+0x136/0x1a0 [ 718.897133][ C1] ? ip6_mc_input+0x515/0xf60 [ 718.897176][ C1] ? __pfx_ip6_mc_input+0x10/0x10 [ 718.897218][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 718.897261][ C1] ? __lock_acquire+0x436/0x2890 [ 718.897293][ C1] ? process_backlog+0x459/0x1650 [ 718.897330][ C1] __netif_receive_skb_one_core+0xb0/0x1e0 [ 718.897371][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 718.897412][ C1] ? lock_acquire+0x179/0x330 [ 718.897447][ C1] ? process_backlog+0x459/0x1650 [ 718.897483][ C1] __netif_receive_skb+0x1d/0x160 [ 718.897522][ C1] process_backlog+0x4ab/0x1650 [ 718.897566][ C1] __napi_poll.constprop.0+0xb3/0x540 [ 718.897608][ C1] net_rx_action+0x9f9/0xfa0 [ 718.897655][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 718.897695][ C1] ? mark_held_locks+0x49/0x80 [ 718.897730][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 718.897760][ C1] ? tmigr_handle_remote+0x132/0x380 [ 718.897812][ C1] ? run_timer_base+0x121/0x190 [ 718.897842][ C1] ? __pfx_run_timer_base+0x10/0x10 [ 718.897876][ C1] handle_softirqs+0x219/0x950 [ 718.897923][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 718.897968][ C1] ? kernel_fpu_end+0x59/0x70 [ 718.898004][ C1] do_softirq+0xb2/0xf0 [ 718.898044][ C1] [ 718.898053][ C1] [ 718.898063][ C1] __local_bh_enable_ip+0x100/0x120 [ 718.898107][ C1] kernel_fpu_end+0x5e/0x70 [ 718.898141][ C1] blake2s_compress+0x77/0xe0 [ 718.898180][ C1] blake2s_update+0xef/0x300 [ 718.898218][ C1] hmac.constprop.0+0x32a/0x420 [ 718.898260][ C1] ? __pfx_hmac.constprop.0+0x10/0x10 [ 718.898285][ C1] ? __asan_memcpy+0x3c/0x60 [ 718.898328][ C1] ? __pfx_encode_point+0x10/0x10 [ 718.898385][ C1] kdf.constprop.0+0x1a1/0x280 [ 718.898414][ C1] ? __pfx_kdf.constprop.0+0x10/0x10 [ 718.898441][ C1] ? __pfx_curve25519+0x10/0x10 [ 718.898484][ C1] ? kdf.constprop.0+0x223/0x280 [ 718.898514][ C1] ? __pfx_mix_hash+0x10/0x10 [ 718.898544][ C1] mix_dh+0xd2/0x130 [ 718.898569][ C1] ? __pfx_mix_dh+0x10/0x10 [ 718.898604][ C1] wg_noise_handshake_create_initiation+0x337/0x610 [ 718.898642][ C1] ? __pfx_wg_noise_handshake_create_initiation+0x10/0x10 [ 718.898677][ C1] ? find_held_lock+0x2b/0x80 [ 718.898723][ C1] ? ktime_get_coarse_with_offset+0x1af/0x240 [ 718.898754][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 718.898781][ C1] ? ktime_get_coarse_with_offset+0x1c1/0x240 [ 718.898829][ C1] ? ktime_get_coarse_with_offset+0x150/0x240 [ 718.898864][ C1] wg_packet_send_handshake_initiation+0x19a/0x360 [ 718.898908][ C1] ? __pfx_wg_packet_send_handshake_initiation+0x10/0x10 [ 718.898950][ C1] ? __lock_acquire+0x436/0x2890 [ 718.898999][ C1] wg_packet_handshake_send_worker+0x1c/0x30 [ 718.899041][ C1] process_one_work+0x9ba/0x1b20 [ 718.899081][ C1] ? __pfx_nsim_dev_trap_report_work+0x10/0x10 [ 718.899119][ C1] ? __pfx_process_one_work+0x10/0x10 [ 718.899159][ C1] ? assign_work+0x1a0/0x250 [ 718.899191][ C1] worker_thread+0x6c8/0xf10 [ 718.899231][ C1] ? __kthread_parkme+0x19e/0x250 [ 718.899276][ C1] ? __pfx_worker_thread+0x10/0x10 [ 718.899309][ C1] kthread+0x3c5/0x780 [ 718.899337][ C1] ? __pfx_kthread+0x10/0x10 [ 718.899368][ C1] ? rcu_is_watching+0x12/0xc0 [ 718.899410][ C1] ? __pfx_kthread+0x10/0x10 [ 718.899440][ C1] ret_from_fork+0x983/0xb10 [ 718.899471][ C1] ? __pfx_ret_from_fork+0x10/0x10 [ 718.899504][ C1] ? __switch_to+0x7af/0x10d0 [ 718.899543][ C1] ? __pfx_kthread+0x10/0x10 [ 718.899573][ C1] ret_from_fork_asm+0x1a/0x30 [ 718.899630][ C1] [ 721.717365][ C0] net_ratelimit: 14732 callbacks suppressed [ 721.717391][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 721.717940][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 721.718214][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 721.718402][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 721.718947][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 721.719580][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 721.719932][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 721.720135][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 721.720550][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 721.720558][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 726.729598][ C1] net_ratelimit: 14552 callbacks suppressed [ 726.729623][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 726.730014][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 726.730142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 726.730528][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 726.730931][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 726.731439][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 726.731850][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 726.732026][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 726.732511][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:d2:db:c6:85:f3:9c, vlan:0) [ 726.732911][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 726.881574][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 726.881603][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT(full) [ 726.881646][ T32] Tainted: [L]=SOFTLOCKUP [ 726.881657][ T32] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 726.881673][ T32] Call Trace: [ 726.881684][ T32] [ 726.881697][ T32] dump_stack_lvl+0x3d/0x1f0 [ 726.881731][ T32] vpanic+0x640/0x6f0 [ 726.881763][ T32] panic+0xca/0xd0 [ 726.881792][ T32] ? __pfx_panic+0x10/0x10 [ 726.881819][ T32] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 726.881854][ T32] ? nmi_trigger_cpumask_backtrace+0x1b1/0x300 [ 726.881892][ T32] ? nmi_trigger_cpumask_backtrace+0x2be/0x300 [ 726.881940][ T32] ? watchdog+0xe83/0x1180 [ 726.881983][ T32] ? watchdog+0xe76/0x1180 [ 726.882028][ T32] watchdog+0xe94/0x1180 [ 726.882078][ T32] ? rcu_is_watching+0x12/0xc0 [ 726.882121][ T32] ? __pfx_watchdog+0x10/0x10 [ 726.882163][ T32] ? lockdep_hardirqs_on+0x7c/0x110 [ 726.882194][ T32] ? __kthread_parkme+0x19e/0x250 [ 726.882240][ T32] ? __pfx_watchdog+0x10/0x10 [ 726.882284][ T32] kthread+0x3c5/0x780 [ 726.882314][ T32] ? __pfx_kthread+0x10/0x10 [ 726.882347][ T32] ? rcu_is_watching+0x12/0xc0 [ 726.882388][ T32] ? __pfx_kthread+0x10/0x10 [ 726.882438][ T32] ret_from_fork+0x983/0xb10 [ 726.882483][ T32] ? __pfx_ret_from_fork+0x10/0x10 [ 726.882534][ T32] ? __switch_to+0x7af/0x10d0 [ 726.882575][ T32] ? __pfx_kthread+0x10/0x10 [ 726.882608][ T32] ret_from_fork_asm+0x1a/0x30 [ 726.882673][ T32] [ 726.883281][ T32] Kernel Offset: disabled