last executing test programs: 33.666505161s ago: executing program 0 (id=5940): openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth0\x00'}) close_range$auto(0x0, 0xffffffffffffffff, 0x2) socket(0xa, 0x2, 0x0) r0 = socket(0x18, 0x5, 0x1) connect$auto(r0, &(0x7f0000000000)=@in={0x2, 0x100}, 0x3a) close_range$auto(0x0, 0xfffff004, 0x2) acct$auto(&(0x7f0000000100)='/dev/net/tun\x00') 33.440160615s ago: executing program 0 (id=5944): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x2020009, 0x6, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) madvise$auto(0x0, 0xffffffffffff0001, 0x15) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) symlink$auto(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto_KVM_CREATE_VM(r0, 0xae01, 0x0) memfd_create$auto(&(0x7f0000000040)='A^^\x02\x00\xef\x97\x8aY\x00\x00\xd2\x8c\xb05\x03\\\xb2\xbf247{\xde\t8\f\x00\x00\v\x00\x82\xcc\"K\xe1IIT\x00'/54, 0x5) mmap$auto(0x0, 0x9, 0xff7, 0x8000000008011, 0x4, 0x0) openat$auto_tap_fops_tap(0xffffffffffffff9c, 0x0, 0x100, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x9, 0xff7, 0x8000000008012, 0x1000000004, 0x0) landlock_add_rule$auto_LANDLOCK_RULE_PATH_BENEATH(0xffffffffffffffff, 0x1, &(0x7f0000000080)="357fcdd71d5fca32bafb9629965c308163f41f9a432741470878d9b0958afaf122a1b7fcc8d032020e276c1bbacb72f0994046b090a983aa5a1d359b9c6ec965926fdd34f9507831509ce0ed0e50980cc4087cb15ebdb8966bfc40c23f34d35901211ae80699d7f66f7a9c", 0x7ff) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) ioctl$auto_CEC_RECEIVE(0xffffffffffffffff, 0xc0386106, 0x0) close_range$auto(0x2, 0x8, 0x0) getsockopt$auto_SO_REUSEPORT(0xffffffffffffffff, 0x6, 0xf, &(0x7f0000000000)='/dev/cec12\x00', &(0x7f0000000040)=0x6) socketpair$auto(0x1e, 0x1, 0x8000000000000000, 0x0) socket(0x11, 0xa, 0x300) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xa00) syz_genetlink_get_family_id$auto_batadv(&(0x7f0000000000), 0xffffffffffffffff) 32.521267872s ago: executing program 1 (id=5949): bpf$auto(0x9, &(0x7f0000000000)=@bpf_attr_0={0x8200, 0x1, 0x9, 0x7, 0x5, 0xffffffffffffffff, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x7, 0xffff4e8b, 0x6, 0x1, 0xffffffffffffffff, 0xffffffffffffffff}, 0x7) mmap$auto(0x400000000000, 0x6, 0x5, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) unshare$auto(0x40000080) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1052c1, 0x0) r3 = clone3$auto(&(0x7f0000000040)={0x3f, 0x104, 0xfffffffffffffffb, 0x10000, 0x1, 0x8000000000000000, 0x10, 0x40, 0x11, 0x7, 0x5185}, 0x0) prctl$auto(0x3e, 0x1, r3, 0x1, 0x0) setresuid$auto(0xffffffffffffffff, 0x0, 0x0) write$auto(r2, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0xfffffffffffffffc, 0x6, 0x3, 0x111, r0, 0x9) mmap$auto(0x0, 0x81, 0x5, 0xebf, 0xfffffffffffffffa, 0x3) unshare$auto(0x8) keyctl$auto(0x1f, 0x1, 0x6, 0x3, 0x3ff) eventfd$auto(0xffffff40) madvise$auto(0xfffffffffffffffe, 0x240007, 0x17) r4 = eventfd$auto(0x80) readv$auto(r4, &(0x7f0000000380)={0x0, 0x8}, 0x100) read$auto(r4, 0x0, 0xcca0) write$auto(r4, &(0x7f0000000040)='\xa5\x99\x94\xf7\x87~\x1c\x00\x00\x00\x86', 0x8) madvise$auto(0x0, 0xffffffffffff0005, 0x19) unshare$auto(0x40000084) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) r5 = prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) sendmsg$auto_NL802154_CMD_TRIGGER_SCAN(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="20002cbd7000ffdbdf25230000000c00060009000000810000100000"], 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x40000dc) shutdown$auto(r5, 0x3) socket(0x11, 0x1, 0x4) prctl$auto(0x35, 0x0, 0x4000000008, 0x0, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) 31.990192728s ago: executing program 2 (id=5951): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) msgctl$auto_MSG_STAT(0x2, 0xb, &(0x7f00000002c0)={{0x4, 0x0, 0x0, 0x9, 0x5, 0xffffff68, 0x4}, &(0x7f00000001c0)=0x9, &(0x7f0000000200)=0x8, 0x10, 0x7, 0x3, 0x46, 0x7, 0x6, 0x9f5, 0x22f3, @raw=0xffff7fff, @raw=0x64}) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r2 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0x2062, 0x0) r3 = syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000002680), 0xffffffffffffffff) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x601, 0x0) write$auto(r4, &(0x7f0000000240)=',-\t', 0x2000008008) sendmsg$auto_IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="0108"], 0x18}, 0x1, 0x0, 0x0, 0x40014}, 0x0) getpgid$auto(0x0) r5 = socket(0x2, 0x801, 0x106) setsockopt$auto(r5, 0x6, 0x12, 0x0, 0xa1) sendmsg$auto_IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000ac0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x28014044}, 0x0) r6 = openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000080), 0x8203, 0x0) write$auto_fops_u32_ro_(r2, &(0x7f0000000340)="94a41b209e6c5b7129366690078107967414885026d57de7480d4fb9d07ffd27684d264fe71cd1b16add3e8e35349360441319de1828b9d89d92c52c81ce6a333509ae957ff6a041eb3aae5c6291013031250b218b60c0baeb8f6fc02e15566a03655edd535fbf76ded6497c4366473061ebea3066c21813a69ad85e97297601a699c13287b2c44e7c42b985230cd83d89f9932e2ac902d4572b880a93231b5603d5569b4ead8f6c960fe0576c396cf844ae2e4b9cfd1f842e9e38365fb12681eb", 0xc1) ioctl$auto(r6, 0x80046f45, 0x38) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) msync$auto(0x1ffff000, 0x180000000000000, 0x400000004) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) r7 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$auto_tomoyo_operations_securityfs_if(r7, &(0x7f0000000100), 0x0) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) bpf$auto(0x4, &(0x7f0000000440)=@token_create={0xffff, r5}, 0xb) 30.221616628s ago: executing program 0 (id=5954): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) msgctl$auto_MSG_STAT(0x2, 0xb, &(0x7f00000002c0)={{0x4, 0x0, 0x0, 0x9, 0x5, 0xffffff68, 0x4}, &(0x7f00000001c0)=0x9, &(0x7f0000000200)=0x8, 0x10, 0x7, 0x3, 0x46, 0x7, 0x6, 0x9f5, 0x22f3, @raw=0xffff7fff, @raw=0x64}) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r2 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0x2062, 0x0) r3 = syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000002680), 0xffffffffffffffff) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x601, 0x0) write$auto(r4, &(0x7f0000000240)=',-\t', 0x2000008008) sendmsg$auto_IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYRES16=r3, @ANYBLOB="0108"], 0x18}, 0x1, 0x0, 0x0, 0x40014}, 0x0) getpgid$auto(0x0) r5 = socket(0x2, 0x801, 0x106) setsockopt$auto(r5, 0x6, 0x12, 0x0, 0xa1) sendmsg$auto_IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000ac0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x28014044}, 0x0) r6 = openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000080), 0x8203, 0x0) write$auto_fops_u32_ro_(r2, &(0x7f0000000340)="94a41b209e6c5b7129366690078107967414885026d57de7480d4fb9d07ffd27684d264fe71cd1b16add3e8e35349360441319de1828b9d89d92c52c81ce6a333509ae957ff6a041eb3aae5c6291013031250b218b60c0baeb8f6fc02e15566a03655edd535fbf76ded6497c4366473061ebea3066c21813a69ad85e97297601a699c13287b2c44e7c42b985230cd83d89f9932e2ac902d4572b880a93231b5603d5569b4ead8f6c960fe0576c396cf844ae2e4b9cfd1f842e9e38365fb12681eb870bde", 0xc4) ioctl$auto(r6, 0x80046f45, 0x38) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) msync$auto(0x1ffff000, 0x180000000000000, 0x400000004) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) r7 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$auto_tomoyo_operations_securityfs_if(r7, &(0x7f0000000100), 0x0) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) bpf$auto(0x4, &(0x7f0000000440)=@token_create={0xffff, r5}, 0xb) 30.221384826s ago: executing program 1 (id=5956): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000012c0)='/sys/bus/usb/drivers/ni6501/unbind\x00', 0x121401, 0x0) write$auto(r0, &(0x7f0000000100)='0\x00\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94\xf8F\xbb\xa2\xbb>\xade\x18\xbd\xe2\x1c\x89OO]e[\xbb\xf9\xcd\xc0\xc9\x00\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\xef\xc0\x04z\xd0I>\x8f\x00\xe5\x1c*\xed`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\f};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xcbA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xdeL/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(\x95\xdfH\xf4\v\xf3C', 0x4) r1 = openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/fb0\x00', 0x20401, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x4604, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x800008000) r2 = openat$auto_proc_clear_refs_operations_internal(0xffffffffffffff9c, &(0x7f0000000600)='/proc/thread-self/clear_refs\x00', 0x2, 0x0) r3 = socket(0x2, 0x1, 0x0) getsockopt$auto(r3, 0x0, 0x63, 0x0, &(0x7f00000000c0)=0x1e) r4 = socket$nl_generic(0x10, 0x3, 0x10) fsconfig$auto(r4, 0x2, 0x0, 0x0, 0x0) r5 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200", @ANYBLOB=']'], 0x1ac}}, 0x40000) recvmmsg$auto(r5, &(0x7f0000000140)={{0x0, 0x3, &(0x7f0000000080)={0x0, 0x7fff}, 0x5, 0x0, 0x2000000200002, 0x8}, 0x803}, 0xfffffff9, 0x10, 0x0) write$auto_proc_clear_refs_operations_internal(r2, 0x0, 0xffffff4b) madvise$auto(0x0, 0x2003f2, 0x15) mmap$auto(0x0, 0x28da, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) r6 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/card0/pcm0c/sub2/sw_params\x00', 0x400, 0x0) pread64$auto(r6, 0x0, 0x1ff, 0x8800000000) 30.221207272s ago: executing program 2 (id=5957): openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty12\x00', 0x800, 0x0) r0 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/controlC1\x00', 0x40000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x2, r0, 0x0) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0xc) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000300)='/sys/fs/ocfs2/cluster_stack\x00', 0x88282, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/disk\x00', 0xda25b84c77ef907d, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop7\x00', 0x80001, 0x0) socket(0xa, 0x5, 0x0) r2 = socket(0x10, 0x2, 0xc) sendmsg$auto_ETHTOOL_MSG_CHANNELS_GET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="18000000", @ANYRES8=r2, @ANYRES8=r1], 0x18}, 0x1, 0x0, 0x0, 0x60008004}, 0x4000050) 29.902383361s ago: executing program 2 (id=5960): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nbd14\x00', 0x200, 0x0) setrlimit$auto(0x7, &(0x7f0000000080)={0x0, 0x6}) landlock_create_ruleset$auto(&(0x7f0000000000)={0x0, 0x401, 0x7}, 0x9, 0x0) ioctl$auto(r0, 0xc0c0128e, r0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nbd14\x00', 0x200, 0x0) (async) setrlimit$auto(0x7, &(0x7f0000000080)={0x0, 0x6}) (async) landlock_create_ruleset$auto(&(0x7f0000000000)={0x0, 0x401, 0x7}, 0x9, 0x0) (async) ioctl$auto(r0, 0xc0c0128e, r0) (async) 29.452263323s ago: executing program 1 (id=5961): r0 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cec27\x00', 0x400, 0x0) ioctl$auto_CEC_RECEIVE(r0, 0xc0386106, &(0x7f0000000040)={0x4, 0x5, 0x101, 0xf, 0xb, 0x2e6f2, "2142cf5800008000", 0x6, 0xe, 0x7, 0x6, 0x7, 0x91, 0x9}) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x0, 0xe983, 0x6, 0xeb1, 0xffffffffffffffff, 0x8000) close_range$auto(0x2, 0x8, 0x0) r1 = socket(0x1e, 0x1, 0x0) connect$auto(r1, &(0x7f0000000680)=@tipc=@nameseq={0x1e, 0x1, 0x3, {0x40, 0x3, 0x3}}, 0x10) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x6, 0x8000) sendmsg$auto_HSR_C_GET_NODE_STATUS(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082dbd7000fedbdf250300000008000400b70a0000060007000080000008000200", @ANYRES32, @ANYBLOB="0a0005000180c200000e00000a0001000180c200000e00000a000100aaaaaaaaaa35000008000200", @ANYRES32, @ANYBLOB="060006000500000008002e"], 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x40) socket(0x10, 0x2, 0x0) sendmsg$auto_ETHTOOL_MSG_MODULE_EEPROM_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16, @ANYBLOB="ffa2"], 0x44}, 0x1, 0x0, 0x0, 0x10000000}, 0x40000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1200"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0xa}, 0x7}, 0x3, 0x2) openat$auto_tracing_saved_tgids_fops_trace(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/tracing/saved_tgids\x00', 0x109100, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttynull\x00', 0x201, 0x0) move_pages$auto(0x1, 0xf54, 0x0, 0x0, 0x0, 0x8000000000000000) write$auto(0x3, 0x0, 0xfffffdef) r2 = socket(0x18, 0x5, 0x1) getpeername$auto(r2, 0x0, 0x0) mbind$auto(0x0, 0x100000004, 0x100000000, 0x0, 0x6, 0x2) madvise$auto(0x0, 0x20499d, 0x9) socket(0x29, 0x2, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) execve$auto(&(0x7f00000000c0)='.\x00', &(0x7f0000000140)=0x0, &(0x7f00000001c0)=&(0x7f0000000180)=')\x00') mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r3 = socket(0x2, 0x1, 0x106) bind$auto(r3, 0x0, 0x6a) connect$auto(0x3, 0x0, 0x58) 29.451798995s ago: executing program 2 (id=5962): mmap$auto(0x8000000000400003, 0x1, 0xb, 0xf6, 0xffffffffffffffff, 0x400) setitimer$auto(0x2, &(0x7f0000000080)={{0x2, 0x5}, {0x0, 0xc}}, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) capset$auto(&(0x7f0000000100)={0x20080522}, 0x0) openat$auto_msr_fops_msr(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cpu/0/msr\x00', 0x181f82, 0x0) unshare$auto(0x40000080) msync$auto(0x80000000, 0x180000000000000, 0x400000004) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/kcm_stats\x00', 0x8282, 0x0) write$auto(0xffffffffffffffff, &(0x7f0000001500)='7\x00\\\xa0\x04\xdb\xc3\x8cnI\x9c\t\xbck\x17\xfe_9\xdf\v\x9d\xf7\xa9+n\xf19\x8ba\xe38\xf7u~\r\xd0\xc8\xdc\xe4\xcf\x1c.\xe8\"\xd8\x01l\x83\xa3\xa7\x91p\x90x\xd9y\xef\a\xafs\x90\xf0\xf9\xc3\'r\xac\x8d\\\xccM\xe3\x05\x87\x8c\x1beu\xa6\xab\xb2}\xb6\xb8\xa1\xb4\x98\x0f\x9b(8\xb9\xcb\x88\x0e\x99\x81f&\xe4\xe1\xf1\xe0iS\x93\xea\xa1\xa8\xa6T\xf4G\xb0m\xe5!\xa3\xda\x83\xc1\b\xb3\xce\x1bq\x03\xf7\t\x8f', 0x81) getsockopt$auto_SO_COOKIE(0xffffffffffffffff, 0x8001, 0x39, 0x0, 0x0) mmap$auto(0x9, 0x7, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) syslog$auto(0x4, &(0x7f0000000040)='7\x00\\\xa0\x04\xdb\xc3\x8cnI\x9c\t\xbck\x17\xfe_9\xdf\v\x9d\xf7\xa9+n\xf19\x8ba\xe38\xf7u~\r\x91p\x90x\xd9y\xef\x06\xafs\x90\xf0\xf9\xc3\'r\xac\x8d\\\xccM\xe3\x05\x87\x8c\x1beu\xa6\xab\xb2}\xb6\xb8\xa1\xb4\x98\x0f\x9b(8\xb9\xcb\x88\x0e\x99\x81f&\xe4\xe1\xf1\xe0iS\x93\xea\xa1\xb8\xa6T\xf4G\xb0m\xe5!\xa3\xda\x83\xc1\b\xb3\xce\x1bq\x03\xf7\t\x8f', 0xf4) waitid$auto_P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$auto(0xffffffffffffffff, 0x107, 0xf, 0x0, 0x8) getsockopt$auto_SO_PASSCRED(0xffffffffffffffff, 0x1, 0x10, 0x0, &(0x7f00000001c0)=0xb34) ioctl$auto(0xffffffffffffffff, 0x4b62, 0xffffffffffffffff) 29.45161322s ago: executing program 3 (id=5963): mmap$auto(0x0, 0x30009, 0x4000000000df, 0x4000eb1, 0x401, 0x8000) r0 = openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/binderfs/binder1\x00', 0x20d80, 0x0) r1 = epoll_create$auto(0x200004) epoll_ctl$auto(r1, 0x1, r0, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) socket(0x10, 0x2, 0x0) mmap$auto(0x0, 0x2000a, 0x10000000000df, 0xeb2, 0x401, 0x8000) swapon$auto(&(0x7f0000000000)='/dev/ram5\x00', 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}, 0x1, 0x0, 0x0, 0x20040800}, 0x24004000) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0x9, 0x7, 0xc, 0x93c, 0x1ffde, 0x7, 0x6, 0x3ff, 0x3, 0x1, 0x2, 0x7, 0x9, 0x8, 0x8, 0x3, 0x5, 0x5, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x10001, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x800, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x30, 0x0, 0xe3a, 0x0, 0x1]}, 0x400, 0x44) io_uring_setup$auto(0x8, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x3, 0x100) socket(0x2, 0x2, 0x1) connect$auto(0x3, &(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x55) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0xffffa474, &(0x7f00000002c0)={0x0, 0xc4}, 0x9, 0x0, 0x0, 0xa}, 0x9}, 0x2, 0x800) 29.124442591s ago: executing program 3 (id=5964): mmap$auto(0x0, 0xe983, 0x3, 0xeb1, 0xffffffffffffffff, 0x20000008000) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x6, 0x0) openat$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffff9c, &(0x7f0000000000), 0x123002, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0x8000ffff}, 0x3) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x20008, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, 0x0, 0x8000, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4004810}, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0x4) socket(0x10, 0x3, 0x6) r0 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="f0020000", @ANYRES16=r0, @ANYBLOB="01002dbd7000fedbdf2505000000da0203800800c000e000000204002a000400110008002e00", @ANYRES32, @ANYBLOB="d152e64e22695352dd73864415aa8a78c65e6ab752fb4d469a47a092ae7d5061cdd9690cac4138553ecfbb1b32dd7c", @ANYBLOB], 0x2f0}, 0x1, 0x0, 0x0, 0x40000}, 0x50) io_uring_setup$auto(0x5d, &(0x7f00000004c0)={0x52, 0xd, 0x6, 0x6, 0x7, 0x8, 0xffffffffffffffff, [], {0x1, 0x6, 0x8c48, 0x29f, 0x100, 0x2, 0xb831, 0x5, 0x2}, {0x100, 0x20001, 0x52, 0x5, 0xfffffffe, 0x0, 0x76c5, 0x8, 0x100000000}}) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1c001b"], 0x1ac}}, 0x40000) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x4000, 0x0) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0x7}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x3, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4000894}, 0x800) sendmsg$auto_ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00', @ANYBLOB="010027"], 0x2c}, 0x1, 0x0, 0x0, 0x4801}, 0x8040) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) write$auto_ocfs2_control_fops_stack_user(0xffffffffffffffff, &(0x7f0000000100)="fb", 0x1) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/vxlan/parameters/udp_port\x00', 0x2400, 0x0) read$auto(r1, 0x0, 0x20) 28.845894517s ago: executing program 2 (id=5965): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) (async, rerun: 64) r0 = openat$auto_proc_coredump_filter_operations_base(0xffffffffffffff9c, &(0x7f00000001c0), 0x20a00, 0x0) (async, rerun: 64) r1 = openat$auto_ppp_device_fops_ppp_generic(0xffffffffffffff9c, &(0x7f0000000180), 0x591402, 0x0) (async, rerun: 32) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) (rerun: 32) close_range$auto(0x0, 0xfffffffffffff000, 0x2) bpf$auto(0x0, &(0x7f0000000340)=@task_fd_query={0x7, r0, 0x200, 0x9, 0x8, 0xc, 0x2e, 0x8000000, 0x3}, 0x6f4) (async, rerun: 32) pidfd_open$auto(0x1, 0x0) (async, rerun: 32) socket(0x2, 0x3, 0x100) bpf$auto(0x2, &(0x7f00000001c0)=@batch={0x8000000000009, 0x80000001, 0x10008, 0x8250, 0xa6d5, 0xffffffffffffffff, 0x7, 0x6}, 0x103) sendmsg$auto_NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="d8010000", @ANYRES16, @ANYBLOB="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"], 0x1d8}, 0x1, 0x0, 0x0, 0x40080}, 0x20040000) (async, rerun: 64) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01"], 0x14}, 0x1, 0x0, 0x0, 0x20040800}, 0x8000) (async, rerun: 64) r2 = socket(0x10, 0x2, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(r2, &(0x7f0000000240)={0x0, 0xffffffffffffff6c, &(0x7f00000011c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="72010000", @ANYBLOB="000086fb8b45977fc67976e662769aa6dd59"], 0x1ac}}, 0x0) (async) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) (async) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000400)=ANY=[], 0x1ac}}, 0x80c4) (async) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) (async) r3 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000001480)='/proc/self/net/rxrpc/conns\x00', 0x0, 0x0) pread64$auto(r3, &(0x7f00000006c0)='vdth\xdc\xe1\xf7\x9c\xc3\xfe\xa0k\x96(\x1d\x90\xcdF\x03\x0f^\xad\xd4\xb2\x05\xc2\xa8\x89\xa5\x154\x95\xcbp\x93\xa7\x18\x982q4\xa4\x1f\xf2,\x92f\xc0\xc9\xeb\x0fZ\xed\xb1d,\x92\x1a\x9bd\xb2\xab)\x06}q\a\x16\x17\xc5\xd7\xcf\xbb\xed\x03t8\xf8\xff\xf6\x14\xaa&\xbcg\xf4\x1f\xcc\xac)\xa4\xef\x029g2\x83\xfe,of=\x8bR\xbe!\x81Q/\xec;\x8bx\x9f\xc0\xe7\xfe,\xb3\xa5\x9c\xab\xb2\xe1\v\x9ej\x1b\"\x94j\x1e\xba}{\x99\xdd\xc7\x11\x00\x15\xc9\x81\xff\xba\x0e\x9ana\xbbM\xaf\a.\xe3E\xdb\xd4y>\xc8MF\xde6\'\xfdQ\x00\x00\xcf$\xf3\xee\x8f|Bk\xf9K', 0x3, 0x1000005) (async) bpf$auto_BPF_PROG_QUERY(0x10, &(0x7f0000000280)=@bpf_attr_5={@target_ifindex, r0, 0x400, 0x4, r1, @relative_fd=r3, 0x4}, 0x70000) (async, rerun: 64) unshare$auto(0x40000080) (async, rerun: 64) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = io_uring_setup$auto(0x3ff, 0x0) mmap$auto(0x0, 0x8004008, 0x2000000329, 0x2000000010011, r4, 0x8000) (async) ioctl$auto_NS_GET_TGID_IN_PIDNS(r4, 0x8004b709, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) (async) syz_genetlink_get_family_id$auto_ethtool(0x0, 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_RINGS_GET(0xffffffffffffffff, 0x0, 0x20000000) (async) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS0\x00', 0x48140, 0x0) writev$auto(0xca, &(0x7f0000000080)={0x0, 0x1}, 0x200) sched_setaffinity$auto(0x0, 0x9899, 0x0) 28.519730855s ago: executing program 3 (id=5966): mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) r0 = socket(0x10, 0x2, 0x0) sendmsg$auto_IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="b8010000", @ANYRES16=0x0, @ANYBLOB="040026bd7040fcdbdf2504000000a10103801400530000000000000000000000ffffe000000108004f00ac1e0101ca736cecfcd4415d54780149807101218008003f8004001180080007002f2a2100d200c48008006000f7ffffff0400b880040081800c0045000500000000000000d438ac6f6438513f3e86b2e4761949339e97c45e7c596d90ffae739ce5aef68a64ce3d9ad0ca647221a71ae48056f6e93caf74c3b73a4d76283ed62cb229883fcc3c10655ca9ff7ec844804d6bb4718f9058769d36eb733506b588af89552abd15b739ae01f6fd858955b62d9701e5f453991f6dfd7580922a9fb7155244f5453e2e4b1a434ef63e0792477cd115b76a945fa278870ca66d3c5a05b7cd3f90d8a6a142f20604d57abcf0f79c0ce5980f988400000c007c00ff070000000000005fda26f882381f6db7eae222a65a096962c116d81adab94b89512d70ee6b1ea5f2f7d84142f88109a5328a6959aede5bf89dca05ef8a06307390f7ea2e59834533565845a37ae352771633ce97f06b36da47ef25c3a9927630fca644d6b8b4e8d403084182903e187f14cbc7d9c285fadb0c00fb00f200"/434], 0x1b8}, 0x1, 0x0, 0x0, 0x90}, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200", @ANYBLOB="5de1"], 0x1ac}}, 0x40000) recvmmsg$auto(r0, &(0x7f0000000140)={{0x0, 0x4, &(0x7f0000000080)={0x0, 0x803}, 0x21, 0x0, 0x2, 0x8}, 0x800}, 0x10a, 0x8, 0x0) ioctl$auto(0xffffffffffffffff, 0x5522, 0xffffffffffffffff) r1 = openat$auto_blk_mq_debugfs_fops_blk_mq_debugfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/block/nbd1/sched/queued\x00', 0x8200, 0x0) read$auto_blk_mq_debugfs_fops_blk_mq_debugfs(r1, &(0x7f0000000040)=""/53, 0x35) ioctl$auto(0xffffffffffffffff, 0x5521, 0xffffffffffffffff) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nbd0\x00', 0x24000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$auto_SO_REUSEPORT(r2, 0x1, 0xf, &(0x7f0000000780)='\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_HWSIM_CMD_REPORT_PMSR(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x0) openat$auto_tk_debug_sleep_time_fops_(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0xa, 0x2, 0x88) close_range$auto(0x2, 0x8, 0x0) shmget$auto(0x8, 0x10565, 0x7ff) shmat$auto(0x0, &(0x7f0000000580)='(\x00', 0xfffffffa) shmctl$auto(0x0, 0x0, 0xfffffffffffffffd) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) r4 = socket(0xa, 0x3, 0x3a) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0xa, 0x801, 0x106) setsockopt$auto(r4, 0x29, 0x4b, 0x0, 0x9a) r5 = openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000000)='/dev/v4l-subdev6\x00', 0xa0401, 0x0) ioctl$auto(r5, 0x5646, r5) 28.518780106s ago: executing program 0 (id=5974): r0 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/irq/13/effective_affinity_list\x00', 0x2000, 0x0) pread64$auto(r0, 0x0, 0x1, 0xff) r1 = openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000000000)='/dev/binderfs/binder0\x00', 0x0, 0x0) ioctl$auto_BINDER_FREEZE(r1, 0x400c620e, 0x0) fadvise64$auto_POSIX_FADV_NORMAL(r0, 0x8, 0x2, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/midiC2D0\x00', 0x1, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/pci0000:00/0000:00:04.0/resource0\x00', 0xc0082, 0x0) openat$auto_snd_pcm_f_ops_pcm(0xffffffffffffff9c, &(0x7f0000002180)='/dev/snd/pcmC0D0p\x00', 0x0, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x60742, 0x0) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$auto_rng_chrdev_ops_core(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) madvise$auto(0x7, 0x88, 0x6) read$auto_rng_chrdev_ops_core(r2, &(0x7f0000000040)=""/4096, 0xfffffe82) socket(0x2, 0x3, 0xa) process_madvise$auto_PIDFD_SELF_THREAD(0xffffffffffffd8f0, &(0x7f0000000140)={&(0x7f0000000000), 0x55}, 0x6, 0x8, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) execve$auto(&(0x7f0000000040)=':,\x00', 0x0, &(0x7f0000001300)=0x0) fcntl$auto_F_GET_SEALS(r2, 0x40a, 0x100000001) openat$auto_fb_fops_fb_chrdev(0xffffffffffffff9c, &(0x7f0000002940)='/dev/fb0\x00', 0x841, 0x0) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) socket(0xa, 0x1, 0x84) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) open(&(0x7f00000000c0)='./file0\x00', 0x161342, 0x130) unlink$auto(&(0x7f0000000380)='./file0\x00') select$auto(0x9, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0x0, 0x1, 0x948b, 0x9, 0x15f4da07, 0x6, 0x10, 0x64, 0x80000020, 0x1000, 0xb, 0x9, 0x2, 0x8]}, 0x0) 28.114305099s ago: executing program 2 (id=5967): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x2020009, 0x6, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) madvise$auto(0x0, 0xffffffffffff0001, 0x15) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) symlink$auto(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto_KVM_CREATE_VM(r0, 0xae01, 0x0) memfd_create$auto(&(0x7f0000000040)='A^^\x02\x00\xef\x97\x8aY\x00\x00\xd2\x8c\xb05\x03\\\xb2\xbf247{\xde\t8\f\x00\x00\v\x00\x82\xcc\"K\xe1IIT\x00'/54, 0x5) mmap$auto(0x0, 0x9, 0xff7, 0x8000000008011, 0x4, 0x0) openat$auto_tap_fops_tap(0xffffffffffffff9c, 0x0, 0x100, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x9, 0xff7, 0x8000000008012, 0x1000000004, 0x0) landlock_add_rule$auto_LANDLOCK_RULE_PATH_BENEATH(0xffffffffffffffff, 0x1, &(0x7f0000000080)="357fcdd71d5fca32bafb9629965c308163f41f9a432741470878d9b0958afaf122a1b7fcc8d032020e276c1bbacb72f0994046b090a983aa5a1d359b9c6ec965926fdd34f9507831509ce0ed0e50980cc4087cb15ebdb8966bfc40c23f34d35901211ae80699d7f66f7a9c", 0x7ff) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) ioctl$auto_CEC_RECEIVE(0xffffffffffffffff, 0xc0386106, 0x0) close_range$auto(0x2, 0x8, 0x0) getsockopt$auto_SO_REUSEPORT(0xffffffffffffffff, 0x6, 0xf, &(0x7f0000000000)='/dev/cec12\x00', &(0x7f0000000040)=0x6) socketpair$auto(0x1e, 0x1, 0x8000000000000000, 0x0) socket(0x11, 0xa, 0x300) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xa00) syz_genetlink_get_family_id$auto_batadv(&(0x7f0000000000), 0xffffffffffffffff) 27.914632908s ago: executing program 3 (id=5968): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) msgctl$auto_MSG_STAT(0x2, 0xb, &(0x7f00000002c0)={{0x4, 0x0, 0x0, 0x9, 0x5, 0xffffff68, 0x4}, &(0x7f00000001c0)=0x9, &(0x7f0000000200)=0x8, 0x10, 0x7, 0x3, 0x46, 0x7, 0x6, 0x9f5, 0x22f3, @raw=0xffff7fff, @raw=0x64}) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r2 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0x2062, 0x0) r3 = syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000002680), 0xffffffffffffffff) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x601, 0x0) write$auto(r4, &(0x7f0000000240)=',-\t', 0x2000008008) sendmsg$auto_IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="0108"], 0x18}, 0x1, 0x0, 0x0, 0x40014}, 0x0) getpgid$auto(0x0) r5 = socket(0x2, 0x801, 0x106) setsockopt$auto(r5, 0x6, 0x12, 0x0, 0xa1) sendmsg$auto_IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000ac0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x28014044}, 0x0) r6 = openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000080), 0x8203, 0x0) write$auto_fops_u32_ro_(r2, &(0x7f0000000340)="94a41b209e6c5b7129366690078107967414885026d57de7480d4fb9d07ffd27684d264fe71cd1b16add3e8e35349360441319de1828b9d89d92c52c81ce6a333509ae957ff6a041eb3aae5c6291013031250b218b60c0baeb8f6fc02e15566a03655edd535fbf76ded6497c4366473061ebea3066c21813a69ad85e97297601a699c13287b2c44e7c42b985230cd83d89f9932e2ac902d4572b880a93231b5603d5569b4ead8f6c960fe0576c396cf844ae2e4b9cfd1f842e9e38365fb12681eb870b", 0xc3) ioctl$auto(r6, 0x80046f45, 0x38) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) msync$auto(0x1ffff000, 0x180000000000000, 0x400000004) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) r7 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$auto_tomoyo_operations_securityfs_if(r7, &(0x7f0000000100), 0x0) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) bpf$auto(0x4, &(0x7f0000000440)=@token_create={0xffff, r5}, 0xb) 26.753249117s ago: executing program 1 (id=5969): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) msgctl$auto_MSG_STAT(0x2, 0xb, &(0x7f00000002c0)={{0x4, 0x0, 0x0, 0x9, 0x5, 0xffffff68, 0x4}, &(0x7f00000001c0)=0x9, &(0x7f0000000200)=0x8, 0x10, 0x7, 0x3, 0x46, 0x7, 0x6, 0x9f5, 0x22f3, @raw=0xffff7fff, @raw=0x64}) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r2 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0x2062, 0x0) r3 = syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000002680), 0xffffffffffffffff) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x601, 0x0) write$auto(r4, &(0x7f0000000240)=',-\t', 0x2000008008) sendmsg$auto_IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYRES16=r3, @ANYBLOB="0108"], 0x18}, 0x1, 0x0, 0x0, 0x40014}, 0x0) getpgid$auto(0x0) r5 = socket(0x2, 0x801, 0x106) setsockopt$auto(r5, 0x6, 0x12, 0x0, 0xa1) sendmsg$auto_IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000ac0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x28014044}, 0x0) r6 = openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000080), 0x8203, 0x0) write$auto_fops_u32_ro_(r2, &(0x7f0000000340)="94a41b209e6c5b7129366690078107967414885026d57de7480d4fb9d07ffd27684d264fe71cd1b16add3e8e35349360441319de1828b9d89d92c52c81ce6a333509ae957ff6a041eb3aae5c6291013031250b218b60c0baeb8f6fc02e15566a03655edd535fbf76ded6497c4366473061ebea3066c21813a69ad85e97297601a699c13287b2c44e7c42b985230cd83d89f9932e2ac902d4572b880a93231b5603d5569b4ead8f6c960fe0576c396cf844ae2e4b9cfd1f842e9e38365fb12681eb870bde", 0xc4) ioctl$auto(r6, 0x80046f45, 0x38) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) msync$auto(0x1ffff000, 0x180000000000000, 0x400000004) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) r7 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$auto_tomoyo_operations_securityfs_if(r7, &(0x7f0000000100), 0x0) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) bpf$auto(0x4, &(0x7f0000000440)=@token_create={0xffff, r5}, 0xb) 26.740353326s ago: executing program 0 (id=5978): r0 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_HWSIM_CMD_NEW_RADIO(r1, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000004200)={&(0x7f000000cb00)={0x148, r0, 0x1, 0x70bd25, 0x25dfdbff, {}, [@HWSIM_ATTR_PMSR_RESULT={0x134, 0x1c, 0x0, 0x1, [@NL80211_PMSR_ATTR_PEERS={0x130, 0x5, 0x0, 0x1, [{0x12c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_RESP={0x8, 0x4, 0x0, 0x1, [@NL80211_PMSR_RESP_ATTR_FINAL={0x4}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0x29, 0x1, "e425d953fb431e94d1b5aab935a7e49e502dc45b539685071e2bb67a68fc08f8dd5a10b707"}, @NL80211_PMSR_PEER_ATTR_ADDR={0xbb, 0x1, "1ba2c0d235e191ce39c0fc710c3053b83b7aba519c5a35b230c6ec67f60b63f69bee2fdc4cb6a20b91831177514f86970227261ef0cdb1b3703a009c4494640afb10276394e004301f8b118633bacb0f80b981117b0a434e1f4cfa3375d893dcf91c27e44553364d60abac694352a1184d8cbbe3f293095bb08be4971889683b2f16322af4e0b8cb2420aa058789d595fc22a4365a18c08ee8be723a53b21728d49142ee133d0bf1e0c2b78eb31a25b034704ec5ebb108"}, @NL80211_PMSR_PEER_ATTR_ADDR={0x38, 0x1, "c3e7e7baf169f31a13277d127b9d872199690075cdfa5de93adcb679ae9eb84d006ffd020118dbe24b5df80efaf38e06a9c9a459"}]}]}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x40cc}, 0x20040080) 26.615359875s ago: executing program 3 (id=5970): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) msgctl$auto_MSG_STAT(0x2, 0xb, &(0x7f00000002c0)={{0x4, 0x0, 0x0, 0x9, 0x5, 0xffffff68, 0x4}, &(0x7f00000001c0)=0x9, &(0x7f0000000200)=0x8, 0x10, 0x7, 0x3, 0x46, 0x7, 0x6, 0x9f5, 0x22f3, @raw=0xffff7fff, @raw=0x64}) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r2 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0x2062, 0x0) r3 = syz_genetlink_get_family_id$auto_ipvs(&(0x7f0000002680), 0xffffffffffffffff) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x601, 0x0) write$auto(r4, &(0x7f0000000240)=',-\t', 0x2000008008) sendmsg$auto_IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="0108"], 0x18}, 0x1, 0x0, 0x0, 0x40014}, 0x0) getpgid$auto(0x0) r5 = socket(0x2, 0x801, 0x106) setsockopt$auto(r5, 0x6, 0x12, 0x0, 0xa1) sendmsg$auto_IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000ac0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x28014044}, 0x0) r6 = openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000080), 0x8203, 0x0) write$auto_fops_u32_ro_(r2, &(0x7f0000000340)="94a41b209e6c5b7129366690078107967414885026d57de7480d4fb9d07ffd27684d264fe71cd1b16add3e8e35349360441319de1828b9d89d92c52c81ce6a333509ae957ff6a041eb3aae5c6291013031250b218b60c0baeb8f6fc02e15566a03655edd535fbf76ded6497c4366473061ebea3066c21813a69ad85e97297601a699c13287b2c44e7c42b985230cd83d89f9932e2ac902d4572b880a93231b5603d5569b4ead8f6c960fe0576c396cf844ae2e4b9cfd1f842e9e38365fb12681eb870b", 0xc3) ioctl$auto(r6, 0x80046f45, 0x38) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) msync$auto(0x1ffff000, 0x180000000000000, 0x400000004) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) r7 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$auto_tomoyo_operations_securityfs_if(r7, &(0x7f0000000100), 0x0) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) bpf$auto(0x4, &(0x7f0000000440)=@token_create={0xffff, r5}, 0xb) 26.467570914s ago: executing program 0 (id=5971): mmap$auto(0x0, 0x2020009, 0x7, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000680)='/sys/devices/virtual/net/nr14/proto_down\x00', 0x82902, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x189401, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = socketcall$auto(0xa, 0x0) r4 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) ioctl$auto_KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$auto(0x3, 0xae60, 0x10000000000402) ioctl$auto(0x3, 0xae41, r3) ioctl$auto_KVM_CREATE_VM(r2, 0xae80, 0x0) r5 = openat$auto_proc_clear_refs_operations_internal(0xffffffffffffff9c, &(0x7f0000000600)='/proc/thread-self/clear_refs\x00', 0x2, 0x0) r6 = socket(0x3, 0x3, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0x1ac}}, 0x40000) recvmmsg$auto(r6, &(0x7f0000000140)={{0x0, 0x3, &(0x7f0000000080)={0x0, 0x400}, 0x5, 0x0, 0x2000000200002, 0x8}, 0x803}, 0xfffffff9, 0x10, 0x0) write$auto_proc_clear_refs_operations_internal(r5, 0x0, 0xffffff4b) open(&(0x7f0000000000)='./file0\x00', 0x261c2, 0x84) close_range$auto(r1, 0xfffff004, 0x22) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) socket(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) bpf$auto(0x0, &(0x7f00000000c0)=@bpf_attr_5={@target_fd=r7, r8, 0x4, 0xf, r7, @relative_fd, 0xe600}, 0xf) bpf$auto(0x85, &(0x7f0000000340)=@iter_create={r0, 0x2}, 0xd) 26.441701318s ago: executing program 1 (id=5972): mmap$auto(0x0, 0x2000c, 0xdf, 0x20eb1, 0x40000000000a5, 0x8000) r0 = openat$auto_tracing_mark_raw_fops_trace(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/tracing/trace_marker_raw\x00', 0xc8401, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x2) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv6/conf/veth0/accept_ra_pinfo\x00', 0x2000, 0x0) timerfd_create$auto(0x9, 0x0) setresgid$auto(0xffffffffffffffff, 0x28000000000000, 0x7) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000280)='/sys/devices/virtual/block/nbd9/trace/end_lba\x00', 0x2062, 0x0) semctl$auto_SETVAL(0x2, 0x80000001, 0x10, 0x200) syslog$auto_SYSLOG_ACTION_READ_ALL(0x3, &(0x7f0000001f80)='-\x00', 0x7fff) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/fs/ocfs2/cluster_stack\x00', 0x88282, 0x0) prctl$auto_PR_GET_NO_NEW_PRIVS(0x27, 0x5, 0x6bd, 0x10000, 0x4) write$auto(r0, &(0x7f0000000000)='_.\x00I\xf2u\xd6\x13\xbbn\v8\xa3\xe1k\xb7\x19\xccU\x00\xe2\xa7\x00', 0x4) sysfs$auto(0x2, 0x2000000000040, 0x0) r1 = fsopen$auto(0x0, 0x1) fsconfig$auto(r1, 0x8, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) close_range$auto(0x0, 0x5, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/uts\x00') pipe$auto(0x0) r2 = openat$auto_qrtr_tun_ops_tun(0xffffffffffffff9c, &(0x7f0000000040), 0x481, 0x0) pwrite64$auto(r2, 0x0, 0x14, 0x1000) r3 = openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/bus/usb/001/001\x00', 0x29202, 0x0) mmap$auto(0xffff8000, 0x280009, 0xb, 0x8000000008011, r3, 0x0) 8.076273577s ago: executing program 32 (id=5967): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x2020009, 0x6, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) madvise$auto(0x0, 0xffffffffffff0001, 0x15) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) symlink$auto(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000000100)='./file0\x00') r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto_KVM_CREATE_VM(r0, 0xae01, 0x0) memfd_create$auto(&(0x7f0000000040)='A^^\x02\x00\xef\x97\x8aY\x00\x00\xd2\x8c\xb05\x03\\\xb2\xbf247{\xde\t8\f\x00\x00\v\x00\x82\xcc\"K\xe1IIT\x00'/54, 0x5) mmap$auto(0x0, 0x9, 0xff7, 0x8000000008011, 0x4, 0x0) openat$auto_tap_fops_tap(0xffffffffffffff9c, 0x0, 0x100, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x9, 0xff7, 0x8000000008012, 0x1000000004, 0x0) landlock_add_rule$auto_LANDLOCK_RULE_PATH_BENEATH(0xffffffffffffffff, 0x1, &(0x7f0000000080)="357fcdd71d5fca32bafb9629965c308163f41f9a432741470878d9b0958afaf122a1b7fcc8d032020e276c1bbacb72f0994046b090a983aa5a1d359b9c6ec965926fdd34f9507831509ce0ed0e50980cc4087cb15ebdb8966bfc40c23f34d35901211ae80699d7f66f7a9c", 0x7ff) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) ioctl$auto_CEC_RECEIVE(0xffffffffffffffff, 0xc0386106, 0x0) close_range$auto(0x2, 0x8, 0x0) getsockopt$auto_SO_REUSEPORT(0xffffffffffffffff, 0x6, 0xf, &(0x7f0000000000)='/dev/cec12\x00', &(0x7f0000000040)=0x6) socketpair$auto(0x1e, 0x1, 0x8000000000000000, 0x0) socket(0x11, 0xa, 0x300) sendmmsg$auto(0x3, 0x0, 0x9a6, 0xa00) syz_genetlink_get_family_id$auto_batadv(&(0x7f0000000000), 0xffffffffffffffff) 7.32341383s ago: executing program 3 (id=5975): mmap$auto(0x0, 0xe983, 0x3, 0xeb1, 0xffffffffffffffff, 0x20000008000) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x6, 0x0) openat$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffff9c, &(0x7f0000000000), 0x123002, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0x8000ffff}, 0x3) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x20008, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, 0x0, 0x8000, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4004810}, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0x4) socket(0x10, 0x3, 0x6) r0 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="f0020000", @ANYRES16=r0, @ANYBLOB="01002dbd7000fedbdf2505000000da0203800800c000e000000204002a000400110008002e00", @ANYRES32, @ANYBLOB="d152e64e22695352dd73864415aa8a78c65e6ab752fb4d469a47a092ae7d5061cdd9690cac4138553ecfbb1b32dd7c", @ANYBLOB], 0x2f0}, 0x1, 0x0, 0x0, 0x40000}, 0x50) io_uring_setup$auto(0x5d, &(0x7f00000004c0)={0x52, 0xd, 0x6, 0x6, 0x7, 0x8, 0xffffffffffffffff, [], {0x1, 0x6, 0x8c48, 0x29f, 0x100, 0x2, 0xb831, 0x5, 0x2}, {0x100, 0x20001, 0x52, 0x5, 0xfffffffe, 0x0, 0x76c5, 0x8, 0x100000000}}) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1c001b"], 0x1ac}}, 0x40000) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x4000, 0x0) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0x7}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x3, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4000894}, 0x800) sendmsg$auto_ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00', @ANYBLOB="010027"], 0x2c}, 0x1, 0x0, 0x0, 0x4801}, 0x8040) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) write$auto_ocfs2_control_fops_stack_user(0xffffffffffffffff, &(0x7f0000000100)="fb", 0x1) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/vxlan/parameters/udp_port\x00', 0x2400, 0x0) read$auto(r1, 0x0, 0x20) 957.374513ms ago: executing program 33 (id=5971): mmap$auto(0x0, 0x2020009, 0x7, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x4) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000680)='/sys/devices/virtual/net/nr14/proto_down\x00', 0x82902, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x189401, 0x0) close_range$auto(0x2, 0x8, 0x0) r3 = socketcall$auto(0xa, 0x0) r4 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) ioctl$auto_KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$auto(0x3, 0xae60, 0x10000000000402) ioctl$auto(0x3, 0xae41, r3) ioctl$auto_KVM_CREATE_VM(r2, 0xae80, 0x0) r5 = openat$auto_proc_clear_refs_operations_internal(0xffffffffffffff9c, &(0x7f0000000600)='/proc/thread-self/clear_refs\x00', 0x2, 0x0) r6 = socket(0x3, 0x3, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[], 0x1ac}}, 0x40000) recvmmsg$auto(r6, &(0x7f0000000140)={{0x0, 0x3, &(0x7f0000000080)={0x0, 0x400}, 0x5, 0x0, 0x2000000200002, 0x8}, 0x803}, 0xfffffff9, 0x10, 0x0) write$auto_proc_clear_refs_operations_internal(r5, 0x0, 0xffffff4b) open(&(0x7f0000000000)='./file0\x00', 0x261c2, 0x84) close_range$auto(r1, 0xfffff004, 0x22) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) socket(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) bpf$auto(0x0, &(0x7f00000000c0)=@bpf_attr_5={@target_fd=r7, r8, 0x4, 0xf, r7, @relative_fd, 0xe600}, 0xf) bpf$auto(0x85, &(0x7f0000000340)=@iter_create={r0, 0x2}, 0xd) 0s ago: executing program 1 (id=5977): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ram5\x00', 0x1eba02, 0x0) msgctl$auto_MSG_STAT(0x2, 0xb, &(0x7f00000002c0)={{0x4, 0x0, 0x0, 0x9, 0x5, 0xffffff68, 0x4}, &(0x7f00000001c0)=0x9, &(0x7f0000000200)=0x8, 0x10, 0x7, 0x3, 0x46, 0x7, 0x6, 0x9f5, 0x22f3, @raw=0xffff7fff, @raw=0x64}) ioctl$auto_BLKALIGNOFF(r0, 0x127a, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r2 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/mtd/mtd0/bitflip_threshold\x00', 0x2062, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/module/block2mtd/parameters/block2mtd\x00', 0x601, 0x0) write$auto(r4, &(0x7f0000000240)=',-\t', 0x2000008008) sendmsg$auto_IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYBLOB="0108"], 0x18}, 0x1, 0x0, 0x0, 0x40014}, 0x0) getpgid$auto(0x0) r5 = socket(0x2, 0x801, 0x106) setsockopt$auto(r5, 0x6, 0x12, 0x0, 0xa1) r6 = openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, &(0x7f0000000080), 0x8203, 0x0) write$auto_fops_u32_ro_(r2, &(0x7f0000000340)="94a41b209e6c5b7129366690078107967414885026d57de7480d4fb9d07ffd27684d264fe71cd1b16add3e8e35349360441319de1828b9d89d92c52c81ce6a333509ae957ff6a041eb3aae5c6291013031250b218b60c0baeb8f6fc02e15566a03655edd535fbf76ded6497c4366473061ebea3066c21813a69ad85e97297601a699c13287b2c44e7c42b985230cd83d89f9932e2ac902d4572b880a93231b5603d5569b4ead8f6c960fe0576c396cf844ae2e4b9cfd1f842e9e38365fb12681eb870bde", 0xc4) ioctl$auto(r6, 0x80046f45, 0x38) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) msync$auto(0x1ffff000, 0x180000000000000, 0x400000004) mmap$auto(0x0, 0x7f, 0xdf, 0x9b72, 0x2, 0x8000) sendfile$auto(0x3, 0x3, 0x0, 0x400000000006) kernel console output (not intermixed with test programs): interval 1, probability 0, space 0, times 0 [ 1250.038691][T25722] CPU: 1 UID: 0 PID: 25722 Comm: syz.3.5437 Tainted: G L syzkaller #0 PREEMPT(full) [ 1250.038735][T25722] Tainted: [L]=SOFTLOCKUP [ 1250.038746][T25722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1250.038762][T25722] Call Trace: [ 1250.038772][T25722] [ 1250.038791][T25722] dump_stack_lvl+0x100/0x190 [ 1250.038838][T25722] should_fail_ex.cold+0x5/0xa [ 1250.038871][T25722] _copy_from_user+0x2e/0xd0 [ 1250.038907][T25722] copy_msghdr_from_user+0x9f/0x4f0 [ 1250.038946][T25722] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1250.038987][T25722] ? rcu_is_watching+0x12/0xc0 [ 1250.039030][T25722] ? ___sys_recvmsg+0x177/0x1a0 [ 1250.039063][T25722] ? kfree+0x2ec/0x6b0 [ 1250.039107][T25722] ___sys_recvmsg+0xdd/0x1a0 [ 1250.039144][T25722] ? __pfx____sys_recvmsg+0x10/0x10 [ 1250.039200][T25722] ? __pfx___might_resched+0x10/0x10 [ 1250.039252][T25722] do_recvmmsg+0x301/0x760 [ 1250.039295][T25722] ? __pfx_do_recvmmsg+0x10/0x10 [ 1250.039330][T25722] ? ksys_write+0x190/0x250 [ 1250.039358][T25722] ? ksys_write+0x190/0x250 [ 1250.039394][T25722] ? __mutex_unlock_slowpath+0x15c/0x790 [ 1250.039438][T25722] ? __fget_files+0x21f/0x3d0 [ 1250.039478][T25722] __x64_sys_recvmmsg+0x22a/0x280 [ 1250.039510][T25722] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 1250.039551][T25722] do_syscall_64+0x106/0xf80 [ 1250.039578][T25722] ? clear_bhb_loop+0x40/0x90 [ 1250.039624][T25722] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1250.039660][T25722] RIP: 0033:0x7fcd4339c819 [ 1250.039685][T25722] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1250.039713][T25722] RSP: 002b:00007fcd442f3028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1250.039742][T25722] RAX: ffffffffffffffda RBX: 00007fcd43615fa0 RCX: 00007fcd4339c819 [ 1250.039762][T25722] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000004 [ 1250.039788][T25722] RBP: 00007fcd442f3090 R08: 0000000000000000 R09: 0000000000000000 [ 1250.039807][T25722] R10: 000000000000000e R11: 0000000000000246 R12: 0000000000000001 [ 1250.039824][T25722] R13: 00007fcd43616038 R14: 00007fcd43615fa0 R15: 00007ffe8cd04f88 [ 1250.039863][T25722] [ 1250.161407][T25728] CPU: 0 UID: 0 PID: 25728 Comm: syz.0.5438 Tainted: G L syzkaller #0 PREEMPT(full) [ 1250.161450][T25728] Tainted: [L]=SOFTLOCKUP [ 1250.161460][T25728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1250.161481][T25728] Call Trace: [ 1250.161490][T25728] [ 1250.161500][T25728] dump_stack_lvl+0x100/0x190 [ 1250.161546][T25728] should_fail_ex.cold+0x5/0xa [ 1250.161579][T25728] _copy_from_user+0x2e/0xd0 [ 1250.161613][T25728] ____sys_sendmsg+0x1d1/0xb70 [ 1250.161649][T25728] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1250.161687][T25728] ? __pfx__kstrtoull+0x10/0x10 [ 1250.161733][T25728] ___sys_sendmsg+0x190/0x1e0 [ 1250.161770][T25728] ? __pfx____sys_sendmsg+0x10/0x10 [ 1250.161842][T25728] ? proc_fail_nth_write+0x9f/0x220 [ 1250.161875][T25728] ? find_held_lock+0x2b/0x80 [ 1250.161906][T25728] __sys_sendmmsg+0x205/0x430 [ 1250.161936][T25728] ? __pfx___sys_sendmmsg+0x10/0x10 [ 1250.161972][T25728] ? __pfx_do_sys_openat2+0x10/0x10 [ 1250.162025][T25728] ? ksys_write+0x1ac/0x250 [ 1250.162051][T25728] ? __pfx_ksys_write+0x10/0x10 [ 1250.162083][T25728] __x64_sys_sendmmsg+0x9c/0x100 [ 1250.162108][T25728] ? lockdep_hardirqs_on+0x78/0x100 [ 1250.162136][T25728] do_syscall_64+0x106/0xf80 [ 1250.162161][T25728] ? clear_bhb_loop+0x40/0x90 [ 1250.162194][T25728] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1250.162220][T25728] RIP: 0033:0x7f405f19c819 [ 1250.162244][T25728] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1250.162269][T25728] RSP: 002b:00007f405d3f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1250.162294][T25728] RAX: ffffffffffffffda RBX: 00007f405f415fa0 RCX: 00007f405f19c819 [ 1250.162312][T25728] RDX: 0000000000000007 RSI: 0000200000000200 RDI: 0000000000000003 [ 1250.162332][T25728] RBP: 00007f405d3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1250.162348][T25728] R10: 0000000000004008 R11: 0000000000000246 R12: 0000000000000001 [ 1250.162364][T25728] R13: 00007f405f416038 R14: 00007f405f415fa0 R15: 00007ffe63f10908 [ 1250.162399][T25728] [ 1250.639503][T25739] block2mtd: illegal erase size [ 1251.175311][T25751] binder: 25750:25751 ioctl 54e3 0 returned -22 [ 1251.197946][T25752] netlink: 504 bytes leftover after parsing attributes in process `syz.1.5442'. [ 1251.215928][T25751] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5445'. [ 1251.264987][T25751] veth0_macvtap: left promiscuous mode [ 1251.287778][T25751] macvtap0: entered promiscuous mode [ 1251.301655][T25751] macvtap0: entered allmulticast mode [ 1251.449217][T25759] block2mtd: illegal erase size Ijn9_UVQ8j@:Un M%Ux[ 1251.979589][T25771] netlink: zone id is out of range [ 1251.991564][T25771] netlink: zone id is out of range [ 1252.006674][T25771] netlink: zone id is out of range [ 1252.026660][T25771] netlink: zone id is out of range [ 1252.063261][T25771] netlink: set zone limit has 8 unknown bytes [ 1252.606543][T25783] block2mtd: illegal erase size [ 1252.882085][T25790] FAULT_INJECTION: forcing a failure. [ 1252.882085][T25790] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1252.934075][T25790] CPU: 0 UID: 0 PID: 25790 Comm: syz.1.5454 Tainted: G L syzkaller #0 PREEMPT(full) [ 1252.934108][T25790] Tainted: [L]=SOFTLOCKUP [ 1252.934115][T25790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1252.934126][T25790] Call Trace: [ 1252.934133][T25790] [ 1252.934141][T25790] dump_stack_lvl+0x100/0x190 [ 1252.934175][T25790] should_fail_ex.cold+0x5/0xa [ 1252.934198][T25790] _copy_to_user+0x32/0xd0 [ 1252.934225][T25790] rng_dev_read+0x223/0x910 [ 1252.934246][T25790] ? __pfx_virtio_read+0x10/0x10 [ 1252.934269][T25790] ? __pfx_rng_dev_read+0x10/0x10 [ 1252.934293][T25790] ? bpf_lsm_file_permission+0x9/0x10 [ 1252.934312][T25790] ? security_file_permission+0x76/0x210 [ 1252.934339][T25790] ? rw_verify_area+0xce/0x6d0 [ 1252.934368][T25790] ? __pfx_rng_dev_read+0x10/0x10 [ 1252.934388][T25790] vfs_read+0x1e4/0xb30 [ 1252.934410][T25790] ? __pfx_vfs_read+0x10/0x10 [ 1252.934426][T25790] ? find_held_lock+0x2b/0x80 [ 1252.934444][T25790] ? __fget_files+0x215/0x3d0 [ 1252.934464][T25790] ? __fget_files+0x215/0x3d0 [ 1252.934490][T25790] ? __fget_files+0x21f/0x3d0 [ 1252.934515][T25790] ksys_read+0x12a/0x250 [ 1252.934533][T25790] ? __pfx_ksys_read+0x10/0x10 [ 1252.934557][T25790] do_syscall_64+0x106/0xf80 [ 1252.934576][T25790] ? clear_bhb_loop+0x40/0x90 [ 1252.934599][T25790] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1252.934619][T25790] RIP: 0033:0x7f059279c819 [ 1252.934635][T25790] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1252.934654][T25790] RSP: 002b:00007f059359f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1252.934673][T25790] RAX: ffffffffffffffda RBX: 00007f0592a15fa0 RCX: 00007f059279c819 [ 1252.934685][T25790] RDX: 00000000fffffe82 RSI: 0000200000000040 RDI: 0000000000000003 [ 1252.934697][T25790] RBP: 00007f059359f090 R08: 0000000000000000 R09: 0000000000000000 [ 1252.934708][T25790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1252.934719][T25790] R13: 00007f0592a16038 R14: 00007f0592a15fa0 R15: 00007fff6d84f5d8 [ 1252.934742][T25790] [ 1254.302892][T25820] block2mtd: illegal erase size [ 1255.101482][T25842] FAULT_INJECTION: forcing a failure. [ 1255.101482][T25842] name failslab, interval 1, probability 0, space 0, times 0 [ 1255.182086][T25842] CPU: 1 UID: 0 PID: 25842 Comm: syz.0.5468 Tainted: G L syzkaller #0 PREEMPT(full) [ 1255.182131][T25842] Tainted: [L]=SOFTLOCKUP [ 1255.182142][T25842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1255.182158][T25842] Call Trace: [ 1255.182168][T25842] [ 1255.182181][T25842] dump_stack_lvl+0x100/0x190 [ 1255.182231][T25842] should_fail_ex.cold+0x5/0xa [ 1255.182268][T25842] should_failslab+0xc2/0x120 [ 1255.182302][T25842] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1255.182341][T25842] ? virtio_transport_do_socket_init+0x4a/0x350 [ 1255.182381][T25842] ? virtio_transport_get_local_cid+0xea/0x2a0 [ 1255.182423][T25842] virtio_transport_do_socket_init+0x4a/0x350 [ 1255.182468][T25842] vsock_assign_transport+0x67b/0x940 [ 1255.182515][T25842] vsock_connect+0x77c/0xe90 [ 1255.182567][T25842] ? __pfx_vsock_connect+0x10/0x10 [ 1255.182611][T25842] ? __pfx_tomoyo_socket_connect_permission+0x10/0x10 [ 1255.182659][T25842] ? __pfx_aa_sk_perm+0x10/0x10 [ 1255.182696][T25842] ? __pfx_autoremove_wake_function+0x10/0x10 [ 1255.182743][T25842] ? __might_fault+0xc5/0x140 [ 1255.182793][T25842] ? apparmor_socket_connect+0x100/0x1b0 [ 1255.182845][T25842] ? __pfx_vsock_connect+0x10/0x10 [ 1255.182886][T25842] __sys_connect_file+0x141/0x1a0 [ 1255.182934][T25842] __sys_connect+0x141/0x170 [ 1255.182973][T25842] ? __pfx___sys_connect+0x10/0x10 [ 1255.183012][T25842] ? __fget_files+0x21f/0x3d0 [ 1255.183056][T25842] ? __pfx_ksys_write+0x10/0x10 [ 1255.183095][T25842] __x64_sys_connect+0x72/0xb0 [ 1255.183134][T25842] ? lockdep_hardirqs_on+0x78/0x100 [ 1255.183164][T25842] do_syscall_64+0x106/0xf80 [ 1255.183193][T25842] ? clear_bhb_loop+0x40/0x90 [ 1255.183229][T25842] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1255.183260][T25842] RIP: 0033:0x7f405f19c819 [ 1255.183287][T25842] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1255.183314][T25842] RSP: 002b:00007f405d3f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1255.183343][T25842] RAX: ffffffffffffffda RBX: 00007f405f415fa0 RCX: 00007f405f19c819 [ 1255.183362][T25842] RDX: 0000000000000051 RSI: 00002000000000c0 RDI: 0000000000000003 [ 1255.183380][T25842] RBP: 00007f405d3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1255.183398][T25842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1255.183415][T25842] R13: 00007f405f416038 R14: 00007f405f415fa0 R15: 00007ffe63f10908 [ 1255.183456][T25842] [ 1255.440129][T25844] block2mtd: illegal erase size [ 1256.032344][T19397] Bluetooth: hci2: unexpected subevent 0x01 length: 123 > 18 [ 1256.258956][T25864] netlink: zone id is out of range [ 1256.265275][T25864] netlink: zone id is out of range [ 1256.270975][T25864] netlink: zone id is out of range [ 1256.279103][T25864] netlink: zone id is out of range [ 1256.299669][T25864] netlink: set zone limit has 8 unknown bytes [ 1256.506202][T25874] netlink: 342 bytes leftover after parsing attributes in process `syz.2.5477'. [ 1256.758241][T25880] block2mtd: illegal erase size [ 1257.081885][T25889] block2mtd: illegal erase size [ 1257.562116][T25894] openvswitch: netlink: Geneve opt len 1 is not a multiple of 4. [ 1258.036374][T25909] netlink: zone id is out of range [ 1258.042264][T25909] netlink: zone id is out of range [ 1258.047887][T25909] netlink: zone id is out of range [ 1258.055469][T25909] netlink: zone id is out of range [ 1258.062623][T25899] FAULT_INJECTION: forcing a failure. [ 1258.062623][T25899] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1258.080688][T25909] netlink: set zone limit has 8 unknown bytes [ 1258.137258][T25899] CPU: 1 UID: 0 PID: 25899 Comm: syz.2.5485 Tainted: G L syzkaller #0 PREEMPT(full) [ 1258.137307][T25899] Tainted: [L]=SOFTLOCKUP [ 1258.137318][T25899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1258.137335][T25899] Call Trace: [ 1258.137344][T25899] [ 1258.137356][T25899] dump_stack_lvl+0x100/0x190 [ 1258.137406][T25899] should_fail_ex.cold+0x5/0xa [ 1258.137443][T25899] strncpy_from_user+0x3b/0x2d0 [ 1258.137482][T25899] do_getname+0x78/0x390 [ 1258.137523][T25899] __x64_sys_mknod+0x78/0xc0 [ 1258.137559][T25899] do_syscall_64+0x106/0xf80 [ 1258.137590][T25899] ? clear_bhb_loop+0x40/0x90 [ 1258.137629][T25899] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1258.137668][T25899] RIP: 0033:0x7f181539c819 [ 1258.137694][T25899] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1258.137722][T25899] RSP: 002b:00007f18135f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1258.137751][T25899] RAX: ffffffffffffffda RBX: 00007f1815615fa0 RCX: 00007f181539c819 [ 1258.137770][T25899] RDX: 0000000000006862 RSI: 00000000000000cb RDI: 0000200000000040 [ 1258.137788][T25899] RBP: 00007f18135f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1258.137806][T25899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1258.137823][T25899] R13: 00007f1815616038 R14: 00007f1815615fa0 R15: 00007ffcfcebc318 [ 1258.137863][T25899] [ 1258.877138][T25933] FAULT_INJECTION: forcing a failure. [ 1258.877138][T25933] name failslab, interval 1, probability 0, space 0, times 0 [ 1258.914747][T25933] CPU: 0 UID: 0 PID: 25933 Comm: syz.2.5492 Tainted: G L syzkaller #0 PREEMPT(full) [ 1258.914779][T25933] Tainted: [L]=SOFTLOCKUP [ 1258.914787][T25933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1258.914807][T25933] Call Trace: [ 1258.914814][T25933] [ 1258.914822][T25933] dump_stack_lvl+0x100/0x190 [ 1258.914857][T25933] should_fail_ex.cold+0x5/0xa [ 1258.914880][T25933] should_failslab+0xc2/0x120 [ 1258.914903][T25933] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1258.914934][T25933] ? do_getname+0x35/0x390 [ 1258.914964][T25933] do_getname+0x35/0x390 [ 1258.914991][T25933] do_sys_openat2+0xc5/0x1e0 [ 1258.915017][T25933] ? __pfx_do_sys_openat2+0x10/0x10 [ 1258.915051][T25933] __x64_sys_openat+0x12d/0x210 [ 1258.915079][T25933] ? __pfx___x64_sys_openat+0x10/0x10 [ 1258.915113][T25933] do_syscall_64+0x106/0xf80 [ 1258.915132][T25933] ? clear_bhb_loop+0x40/0x90 [ 1258.915155][T25933] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1258.915175][T25933] RIP: 0033:0x7f181539c819 [ 1258.915192][T25933] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1258.915210][T25933] RSP: 002b:00007f18135b4028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1258.915228][T25933] RAX: ffffffffffffffda RBX: 00007f1815616180 RCX: 00007f181539c819 [ 1258.915240][T25933] RDX: 0000000000000202 RSI: 0000200000000b80 RDI: ffffffffffffff9c [ 1258.915251][T25933] RBP: 00007f1815432c91 R08: 0000000000000000 R09: 0000000000000000 [ 1258.915262][T25933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1258.915274][T25933] R13: 00007f1815616218 R14: 00007f1815616180 R15: 00007ffcfcebc318 [ 1258.915297][T25933] [ 1259.659069][T25949] block2mtd: illegal erase size [ 1260.496131][T25969] block2mtd: illegal erase size [ 1260.675011][T25977] FAULT_INJECTION: forcing a failure. [ 1260.675011][T25977] name failslab, interval 1, probability 0, space 0, times 0 [ 1260.688658][T25977] CPU: 0 UID: 0 PID: 25977 Comm: syz.2.5503 Tainted: G L syzkaller #0 PREEMPT(full) [ 1260.688703][T25977] Tainted: [L]=SOFTLOCKUP [ 1260.688713][T25977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1260.688729][T25977] Call Trace: [ 1260.688739][T25977] [ 1260.688751][T25977] dump_stack_lvl+0x100/0x190 [ 1260.688801][T25977] should_fail_ex.cold+0x5/0xa [ 1260.688835][T25977] ? tomoyo_encode2+0xfb/0x3c0 [ 1260.688872][T25977] should_failslab+0xc2/0x120 [ 1260.688905][T25977] __kmalloc_noprof+0xe0/0x850 [ 1260.688947][T25977] ? d_absolute_path+0x136/0x1b0 [ 1260.689012][T25977] tomoyo_encode2+0xfb/0x3c0 [ 1260.689058][T25977] tomoyo_encode+0x29/0x50 [ 1260.689095][T25977] tomoyo_realpath_from_path+0x18c/0x690 [ 1260.689145][T25977] tomoyo_path_number_perm+0x23c/0x580 [ 1260.689181][T25977] ? tomoyo_path_number_perm+0x22e/0x580 [ 1260.689219][T25977] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1260.689290][T25977] ? find_held_lock+0x2b/0x80 [ 1260.689319][T25977] ? __fget_files+0x215/0x3d0 [ 1260.689346][T25977] ? hook_file_ioctl_common+0x146/0x410 [ 1260.689390][T25977] ? __fget_files+0x21f/0x3d0 [ 1260.689425][T25977] security_file_ioctl+0xd3/0x230 [ 1260.689464][T25977] __x64_sys_ioctl+0xb7/0x210 [ 1260.689508][T25977] do_syscall_64+0x106/0xf80 [ 1260.689537][T25977] ? clear_bhb_loop+0x40/0x90 [ 1260.689574][T25977] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1260.689675][T25977] RIP: 0033:0x7f181539c819 [ 1260.689789][T25977] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1260.689831][T25977] RSP: 002b:00007f18135f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1260.689859][T25977] RAX: ffffffffffffffda RBX: 00007f1815615fa0 RCX: 00007f181539c819 [ 1260.689878][T25977] RDX: 0000000000000000 RSI: 0000000040046208 RDI: 0000000000000003 [ 1260.689896][T25977] RBP: 00007f18135f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1260.689914][T25977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1260.689931][T25977] R13: 00007f1815616038 R14: 00007f1815615fa0 R15: 00007ffcfcebc318 [ 1260.689971][T25977] [ 1260.689995][T25977] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1261.414126][T25987] FAULT_INJECTION: forcing a failure. [ 1261.414126][T25987] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1261.565632][T25987] CPU: 0 UID: 0 PID: 25987 Comm: syz.0.5506 Tainted: G L syzkaller #0 PREEMPT(full) [ 1261.565667][T25987] Tainted: [L]=SOFTLOCKUP [ 1261.565674][T25987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1261.565685][T25987] Call Trace: [ 1261.565692][T25987] [ 1261.565700][T25987] dump_stack_lvl+0x100/0x190 [ 1261.565735][T25987] should_fail_ex.cold+0x5/0xa [ 1261.565759][T25987] get_futex_key+0x1d2/0x1620 [ 1261.565785][T25987] ? __pfx_get_futex_key+0x10/0x10 [ 1261.565810][T25987] ? update_se+0x94/0x760 [ 1261.565838][T25987] futex_wait_setup+0x83/0x510 [ 1261.565873][T25987] __futex_wait+0x19f/0x300 [ 1261.565905][T25987] ? __pfx___futex_wait+0x10/0x10 [ 1261.565940][T25987] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1261.565971][T25987] ? lockdep_hardirqs_on+0x78/0x100 [ 1261.565992][T25987] ? __pfx_futex_wake_mark+0x10/0x10 [ 1261.566025][T25987] ? find_held_lock+0x2b/0x80 [ 1261.566043][T25987] ? futex_wake+0x456/0x530 [ 1261.566077][T25987] futex_wait+0xed/0x380 [ 1261.566108][T25987] ? __pfx_futex_wait+0x10/0x10 [ 1261.566142][T25987] ? __lock_acquire+0x4a5/0x2630 [ 1261.566171][T25987] do_futex+0x1ef/0x350 [ 1261.566197][T25987] ? __pfx_do_futex+0x10/0x10 [ 1261.566224][T25987] ? find_held_lock+0x2b/0x80 [ 1261.566245][T25987] __x64_sys_futex+0x34f/0x4d0 [ 1261.566273][T25987] ? __pfx___x64_sys_futex+0x10/0x10 [ 1261.566307][T25987] do_syscall_64+0x106/0xf80 [ 1261.566325][T25987] ? clear_bhb_loop+0x40/0x90 [ 1261.566347][T25987] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1261.566366][T25987] RIP: 0033:0x7f405f19c819 [ 1261.566383][T25987] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1261.566402][T25987] RSP: 002b:00007f405d3d50e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1261.566421][T25987] RAX: ffffffffffffffda RBX: 00007f405f416098 RCX: 00007f405f19c819 [ 1261.566433][T25987] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f405f416098 [ 1261.566444][T25987] RBP: 00007f405f416090 R08: 0000000000000000 R09: 0000000000000000 [ 1261.566455][T25987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1261.566465][T25987] R13: 00007f405f416128 R14: 00007ffe63f10820 R15: 00007ffe63f10908 [ 1261.566488][T25987] [ 1262.205214][T26001] netlink: 504 bytes leftover after parsing attributes in process `syz.2.5511'. [ 1262.466284][T26007] block2mtd: illegal erase size [ 1262.667181][T26014] FAULT_INJECTION: forcing a failure. [ 1262.667181][T26014] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1262.680908][T26014] CPU: 0 UID: 0 PID: 26014 Comm: syz.3.5515 Tainted: G L syzkaller #0 PREEMPT(full) [ 1262.680944][T26014] Tainted: [L]=SOFTLOCKUP [ 1262.680952][T26014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1262.680965][T26014] Call Trace: [ 1262.680973][T26014] [ 1262.680991][T26014] dump_stack_lvl+0x100/0x190 [ 1262.681046][T26014] should_fail_ex.cold+0x5/0xa [ 1262.681082][T26014] get_futex_key+0x295/0x1620 [ 1262.681121][T26014] ? __pfx_get_futex_key+0x10/0x10 [ 1262.681160][T26014] ? kasan_save_track+0x14/0x30 [ 1262.681190][T26014] ? __kasan_kmalloc+0xaa/0xb0 [ 1262.681213][T26014] futex_lock_pi+0x1dc/0x7b0 [ 1262.681245][T26014] ? __pfx_futex_lock_pi+0x10/0x10 [ 1262.681283][T26014] ? __pfx___futex_wait+0x10/0x10 [ 1262.681360][T26014] ? __pfx_futex_wake_mark+0x10/0x10 [ 1262.681400][T26014] ? __lock_acquire+0x4a5/0x2630 [ 1262.681430][T26014] do_futex+0x18a/0x350 [ 1262.681455][T26014] ? __pfx_do_futex+0x10/0x10 [ 1262.681483][T26014] ? find_held_lock+0x2b/0x80 [ 1262.681504][T26014] __x64_sys_futex+0x34f/0x4d0 [ 1262.681532][T26014] ? __pfx___x64_sys_futex+0x10/0x10 [ 1262.681566][T26014] do_syscall_64+0x106/0xf80 [ 1262.681586][T26014] ? clear_bhb_loop+0x40/0x90 [ 1262.681610][T26014] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1262.681629][T26014] RIP: 0033:0x7fcd4339c819 [ 1262.681647][T26014] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1262.681666][T26014] RSP: 002b:00007fcd442d2028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1262.681687][T26014] RAX: ffffffffffffffda RBX: 00007fcd43616090 RCX: 00007fcd4339c819 [ 1262.681701][T26014] RDX: 000000000000000a RSI: 0000000000000006 RDI: 0000000000000000 [ 1262.681713][T26014] RBP: 00007fcd43432c91 R08: 0000000000000000 R09: 0000000000000001 [ 1262.681724][T26014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1262.681735][T26014] R13: 00007fcd43616128 R14: 00007fcd43616090 R15: 00007ffe8cd04f88 [ 1262.681758][T26014] [ 1264.460908][T26037] netlink: 504 bytes leftover after parsing attributes in process `syz.0.5521'. [ 1265.735885][T26065] netlink: 504 bytes leftover after parsing attributes in process `syz.3.5532'. [ 1266.071229][T26071] block2mtd: illegal erase size [ 1266.237617][T26071] EXT4-fs error (device sda1): ext4_validate_block_bitmap:423: comm syz.0.5533: bg 2: bad block bitmap checksum [ 1266.310113][T26071] EXT4-fs (sda1): Delayed block allocation failed for inode 2027 at logical offset 900 with max blocks 33 with error 74 [ 1266.455522][T26082] FAULT_INJECTION: forcing a failure. [ 1266.455522][T26082] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1266.486457][T26071] EXT4-fs (sda1): This should not happen!! Data will be lost [ 1266.486457][T26071] [ 1266.520407][T26082] CPU: 0 UID: 0 PID: 26082 Comm: syz.3.5536 Tainted: G L syzkaller #0 PREEMPT(full) [ 1266.520440][T26082] Tainted: [L]=SOFTLOCKUP [ 1266.520447][T26082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1266.520458][T26082] Call Trace: [ 1266.520465][T26082] [ 1266.520473][T26082] dump_stack_lvl+0x100/0x190 [ 1266.520508][T26082] should_fail_ex.cold+0x5/0xa [ 1266.520532][T26082] _copy_from_user+0x2e/0xd0 [ 1266.520559][T26082] kstrtouint_from_user+0xd6/0x1d0 [ 1266.520591][T26082] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 1266.520621][T26082] ? __lock_acquire+0x4a5/0x2630 [ 1266.520649][T26082] ? lock_acquire+0x1cf/0x380 [ 1266.520679][T26082] proc_fail_nth_write+0x83/0x220 [ 1266.520705][T26082] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1266.520737][T26082] vfs_write+0x2aa/0x1070 [ 1266.520761][T26082] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1266.520789][T26082] ? __pfx_vfs_write+0x10/0x10 [ 1266.520807][T26082] ? __fget_files+0x215/0x3d0 [ 1266.520831][T26082] ? __fget_files+0x21f/0x3d0 [ 1266.520866][T26082] ksys_write+0x12a/0x250 [ 1266.520885][T26082] ? __pfx_ksys_write+0x10/0x10 [ 1266.520911][T26082] do_syscall_64+0x106/0xf80 [ 1266.520931][T26082] ? clear_bhb_loop+0x40/0x90 [ 1266.520956][T26082] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1266.520975][T26082] RIP: 0033:0x7fcd4335d04e [ 1266.521009][T26082] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1266.521028][T26082] RSP: 002b:00007fcd442d1fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1266.521047][T26082] RAX: ffffffffffffffda RBX: 00007fcd442d26c0 RCX: 00007fcd4335d04e [ 1266.521059][T26082] RDX: 0000000000000001 RSI: 00007fcd442d20a0 RDI: 0000000000000003 [ 1266.521071][T26082] RBP: 00007fcd442d2090 R08: 0000000000000000 R09: 0000000000000000 [ 1266.521082][T26082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1266.521093][T26082] R13: 00007fcd43616128 R14: 00007fcd43616090 R15: 00007ffe8cd04f88 [ 1266.521117][T26082] [ 1267.319001][T26098] block2mtd: illegal erase size [ 1267.853813][T26111] FAULT_INJECTION: forcing a failure. [ 1267.853813][T26111] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1267.880096][T26111] CPU: 1 UID: 0 PID: 26111 Comm: syz.2.5544 Tainted: G L syzkaller #0 PREEMPT(full) [ 1267.880129][T26111] Tainted: [L]=SOFTLOCKUP [ 1267.880136][T26111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1267.880148][T26111] Call Trace: [ 1267.880156][T26111] [ 1267.880165][T26111] dump_stack_lvl+0x100/0x190 [ 1267.880199][T26111] should_fail_ex.cold+0x5/0xa [ 1267.880222][T26111] _copy_to_user+0x32/0xd0 [ 1267.880249][T26111] rng_dev_read+0x223/0x910 [ 1267.880271][T26111] ? __pfx_virtio_read+0x10/0x10 [ 1267.880294][T26111] ? __pfx_rng_dev_read+0x10/0x10 [ 1267.880318][T26111] ? bpf_lsm_file_permission+0x9/0x10 [ 1267.880337][T26111] ? security_file_permission+0x76/0x210 [ 1267.880363][T26111] ? rw_verify_area+0xce/0x6d0 [ 1267.880392][T26111] ? __pfx_rng_dev_read+0x10/0x10 [ 1267.880413][T26111] vfs_read+0x1e4/0xb30 [ 1267.880438][T26111] ? __pfx_vfs_read+0x10/0x10 [ 1267.880455][T26111] ? find_held_lock+0x2b/0x80 [ 1267.880477][T26111] ? __fget_files+0x215/0x3d0 [ 1267.880495][T26111] ? __fget_files+0x215/0x3d0 [ 1267.880517][T26111] ? __fget_files+0x21f/0x3d0 [ 1267.880542][T26111] ksys_read+0x12a/0x250 [ 1267.880560][T26111] ? __pfx_ksys_read+0x10/0x10 [ 1267.880585][T26111] do_syscall_64+0x106/0xf80 [ 1267.880604][T26111] ? clear_bhb_loop+0x40/0x90 [ 1267.880627][T26111] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1267.880650][T26111] RIP: 0033:0x7f181539c819 [ 1267.880667][T26111] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1267.880693][T26111] RSP: 002b:00007f18135f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1267.880712][T26111] RAX: ffffffffffffffda RBX: 00007f1815615fa0 RCX: 00007f181539c819 [ 1267.880724][T26111] RDX: 00000000fffffe82 RSI: 0000200000000040 RDI: 0000000000000003 [ 1267.880736][T26111] RBP: 00007f18135f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1267.880747][T26111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1267.880758][T26111] R13: 00007f1815616038 R14: 00007f1815615fa0 R15: 00007ffcfcebc318 [ 1267.880781][T26111] [ 1268.631855][T26125] block2mtd: illegal erase size [ 1270.606882][T26148] block2mtd: illegal erase size [ 1270.642892][T26151] block2mtd: illegal erase size [ 1271.682151][T26158] Unable to find swap-space signature [ 1271.915247][T26167] block2mtd: illegal erase size [ 1272.314189][T26176] netlink: 504 bytes leftover after parsing attributes in process `syz.1.5563'. [ 1272.588084][T26181] netlink: 504 bytes leftover after parsing attributes in process `syz.0.5573'. [ 1272.877696][T26194] block2mtd: illegal erase size [ 1274.027485][T26228] block2mtd: illegal erase size [ 1274.262772][T26232] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1274.273405][T26232] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1274.280739][T26232] veth0_to_bridge: entered allmulticast mode [ 1274.373508][T26232] veth0_to_bridge: entered promiscuous mode [ 1274.402435][T26232] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1274.440832][T26232] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1274.448150][T26232] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 1274.522833][T26236] block2mtd: illegal erase size [ 1274.677636][T26243] netlink: 504 bytes leftover after parsing attributes in process `syz.3.5576'. [ 1274.994982][T26251] block2mtd: illegal erase size [ 1275.704112][T26260] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5582'. [ 1275.751470][T26260] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1275.794883][T26260] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1275.855416][T26260] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1275.892645][T26260] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1276.369916][T26271] block2mtd: illegal erase size [ 1276.540694][T26277] block2mtd: illegal erase size [ 1277.133567][T26284] block2mtd: illegal erase size [ 1277.292818][T19769] Bluetooth: hci1: command 0x0406 tx timeout [ 1277.915972][T26291] netlink: 504 bytes leftover after parsing attributes in process `syz.3.5589'. [ 1278.220029][T26299] block2mtd: illegal erase size [ 1278.389540][T26300] block2mtd: illegal erase size [ 1279.424501][T26307] FAULT_INJECTION: forcing a failure. [ 1279.424501][T26307] name failslab, interval 1, probability 0, space 0, times 0 [ 1279.469485][T26307] CPU: 1 UID: 0 PID: 26307 Comm: syz.3.5594 Tainted: G L syzkaller #0 PREEMPT(full) [ 1279.469535][T26307] Tainted: [L]=SOFTLOCKUP [ 1279.469546][T26307] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1279.469565][T26307] Call Trace: [ 1279.469577][T26307] [ 1279.469588][T26307] dump_stack_lvl+0x100/0x190 [ 1279.469636][T26307] should_fail_ex.cold+0x5/0xa [ 1279.469671][T26307] ? tomoyo_encode2+0xfb/0x3c0 [ 1279.469709][T26307] should_failslab+0xc2/0x120 [ 1279.469751][T26307] __kmalloc_noprof+0xe0/0x850 [ 1279.469794][T26307] ? d_absolute_path+0x136/0x1b0 [ 1279.469843][T26307] tomoyo_encode2+0xfb/0x3c0 [ 1279.469886][T26307] tomoyo_encode+0x29/0x50 [ 1279.469925][T26307] tomoyo_realpath_from_path+0x18c/0x690 [ 1279.469976][T26307] tomoyo_path_number_perm+0x23c/0x580 [ 1279.470010][T26307] ? tomoyo_path_number_perm+0x22e/0x580 [ 1279.470045][T26307] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1279.470078][T26307] ? futex_wait+0x125/0x380 [ 1279.470159][T26307] ? find_held_lock+0x2b/0x80 [ 1279.470188][T26307] ? __fget_files+0x215/0x3d0 [ 1279.470215][T26307] ? hook_file_ioctl_common+0x146/0x410 [ 1279.470260][T26307] ? __fget_files+0x21f/0x3d0 [ 1279.470294][T26307] security_file_ioctl+0xd3/0x230 [ 1279.470329][T26307] __x64_sys_ioctl+0xb7/0x210 [ 1279.470372][T26307] do_syscall_64+0x106/0xf80 [ 1279.470399][T26307] ? clear_bhb_loop+0x40/0x90 [ 1279.470434][T26307] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1279.470462][T26307] RIP: 0033:0x7fcd4339c819 [ 1279.470487][T26307] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1279.470516][T26307] RSP: 002b:00007fcd442f3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1279.470545][T26307] RAX: ffffffffffffffda RBX: 00007fcd43615fa0 RCX: 00007fcd4339c819 [ 1279.470564][T26307] RDX: 0000200000000140 RSI: ffffffffffdffe00 RDI: 0000000000000006 [ 1279.470582][T26307] RBP: 00007fcd43432c91 R08: 0000000000000000 R09: 0000000000000000 [ 1279.470600][T26307] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1279.470617][T26307] R13: 00007fcd43616038 R14: 00007fcd43615fa0 R15: 00007ffe8cd04f88 [ 1279.470657][T26307] [ 1279.470686][T26307] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1279.572356][T26316] netlink: 504 bytes leftover after parsing attributes in process `syz.2.5597'. [ 1280.064952][T26326] netlink: 504 bytes leftover after parsing attributes in process `syz.1.5599'. [ 1280.427249][T26337] block2mtd: illegal erase size [ 1280.680355][T26342] block2mtd: illegal erase size [ 1281.420084][T26350] block2mtd: illegal erase size [ 1281.492869][T26353] netlink: 504 bytes leftover after parsing attributes in process `syz.3.5607'. [ 1281.747901][T26358] netlink: 'syz.3.5609': attribute type 21 has an invalid length. [ 1281.755912][T26358] netlink: 334 bytes leftover after parsing attributes in process `syz.3.5609'. [ 1281.970150][T26357] FAULT_INJECTION: forcing a failure. [ 1281.970150][T26357] name failslab, interval 1, probability 0, space 0, times 0 [ 1281.995799][T26365] netlink: 504 bytes leftover after parsing attributes in process `syz.3.5610'. [ 1282.005806][T26357] CPU: 0 UID: 0 PID: 26357 Comm: syz.0.5608 Tainted: G L syzkaller #0 PREEMPT(full) [ 1282.005838][T26357] Tainted: [L]=SOFTLOCKUP [ 1282.005846][T26357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1282.005858][T26357] Call Trace: [ 1282.005866][T26357] [ 1282.005874][T26357] dump_stack_lvl+0x100/0x190 [ 1282.005909][T26357] should_fail_ex.cold+0x5/0xa [ 1282.005931][T26357] ? tomoyo_encode2+0xfb/0x3c0 [ 1282.005957][T26357] should_failslab+0xc2/0x120 [ 1282.005979][T26357] __kmalloc_noprof+0xe0/0x850 [ 1282.006008][T26357] ? d_absolute_path+0x136/0x1b0 [ 1282.006038][T26357] tomoyo_encode2+0xfb/0x3c0 [ 1282.006068][T26357] tomoyo_encode+0x29/0x50 [ 1282.006094][T26357] tomoyo_realpath_from_path+0x18c/0x690 [ 1282.006127][T26357] tomoyo_check_open_permission+0x2af/0x3c0 [ 1282.006152][T26357] ? __pfx_tomoyo_check_open_permission+0x10/0x10 [ 1282.006197][T26357] ? do_raw_spin_lock+0x128/0x260 [ 1282.006227][T26357] ? path_get+0x61/0x80 [ 1282.006252][T26357] tomoyo_file_open+0x6b/0x90 [ 1282.006271][T26357] security_file_open+0xb5/0x1e0 [ 1282.006297][T26357] do_dentry_open+0x5aa/0x1660 [ 1282.006319][T26357] ? security_inode_permission+0xbf/0x250 [ 1282.006346][T26357] vfs_open+0x82/0x3f0 [ 1282.006373][T26357] path_openat+0x208c/0x31a0 [ 1282.006401][T26357] ? __pfx_path_openat+0x10/0x10 [ 1282.006430][T26357] do_file_open+0x20e/0x430 [ 1282.006460][T26357] ? __pfx_do_file_open+0x10/0x10 [ 1282.006497][T26357] ? alloc_fd+0x476/0x790 [ 1282.006518][T26357] ? do_getname+0x191/0x390 [ 1282.006545][T26357] do_sys_openat2+0x10d/0x1e0 [ 1282.006570][T26357] ? __pfx_do_sys_openat2+0x10/0x10 [ 1282.006605][T26357] __x64_sys_openat+0x12d/0x210 [ 1282.006632][T26357] ? __pfx___x64_sys_openat+0x10/0x10 [ 1282.006667][T26357] do_syscall_64+0x106/0xf80 [ 1282.006689][T26357] ? clear_bhb_loop+0x40/0x90 [ 1282.006715][T26357] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1282.006735][T26357] RIP: 0033:0x7f405f19c819 [ 1282.006751][T26357] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1282.006770][T26357] RSP: 002b:00007f405d3f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1282.006794][T26357] RAX: ffffffffffffffda RBX: 00007f405f415fa0 RCX: 00007f405f19c819 [ 1282.006806][T26357] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: ffffffffffffff9c [ 1282.006817][T26357] RBP: 00007f405f232c91 R08: 0000000000000000 R09: 0000000000000000 [ 1282.006829][T26357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1282.006840][T26357] R13: 00007f405f416038 R14: 00007f405f415fa0 R15: 00007ffe63f10908 [ 1282.006864][T26357] [ 1282.006908][T26357] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1282.329231][T26365] netlink: 350 bytes leftover after parsing attributes in process `syz.3.5610'. [ 1282.702874][T26374] netlink: 12 bytes leftover after parsing attributes in process `syz.3.5615'. [ 1282.715703][T26374] i: entered promiscuous mode [ 1284.145275][T26393] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1284.155487][T26393] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1284.271578][T26393] veth0_to_bridge: entered allmulticast mode [ 1284.278818][T26393] veth0_to_bridge: entered promiscuous mode [ 1284.331968][T26393] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1284.345396][T26393] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1284.352828][T26393] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 1285.003255][T26401] block2mtd: illegal erase size [ 1285.332617][T26408] FAULT_INJECTION: forcing a failure. [ 1285.332617][T26408] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1285.471479][T26408] CPU: 1 UID: 0 PID: 26408 Comm: syz.3.5626 Tainted: G L syzkaller #0 PREEMPT(full) [ 1285.471512][T26408] Tainted: [L]=SOFTLOCKUP [ 1285.471519][T26408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1285.471530][T26408] Call Trace: [ 1285.471538][T26408] [ 1285.471545][T26408] dump_stack_lvl+0x100/0x190 [ 1285.471581][T26408] should_fail_ex.cold+0x5/0xa [ 1285.471605][T26408] get_futex_key+0x1d2/0x1620 [ 1285.471632][T26408] ? __pfx_get_futex_key+0x10/0x10 [ 1285.471657][T26408] ? stack_depot_save_flags+0x27/0x9d0 [ 1285.471684][T26408] ? __lock_acquire+0x4a5/0x2630 [ 1285.471713][T26408] futex_wait_setup+0x83/0x510 [ 1285.471758][T26408] __futex_wait+0x19f/0x300 [ 1285.471790][T26408] ? __pfx___futex_wait+0x10/0x10 [ 1285.471824][T26408] ? __pfx_futex_wake_mark+0x10/0x10 [ 1285.471857][T26408] ? futex_hash+0x2c5/0x380 [ 1285.471887][T26408] futex_wait+0xed/0x380 [ 1285.471917][T26408] ? __pfx_futex_wait+0x10/0x10 [ 1285.471954][T26408] ? sctp_setsockopt+0x168/0xb370 [ 1285.471983][T26408] do_futex+0x1ef/0x350 [ 1285.472009][T26408] ? __pfx_do_futex+0x10/0x10 [ 1285.472033][T26408] ? do_sock_setsockopt+0x101/0x1d0 [ 1285.472055][T26408] ? rcu_is_watching+0x12/0xc0 [ 1285.472084][T26408] ? do_sock_setsockopt+0x101/0x1d0 [ 1285.472104][T26408] ? kfree+0x2ec/0x6b0 [ 1285.472132][T26408] __x64_sys_futex+0x34f/0x4d0 [ 1285.472162][T26408] ? __pfx___x64_sys_futex+0x10/0x10 [ 1285.472188][T26408] ? __sys_setsockopt+0x139/0x190 [ 1285.472230][T26408] do_syscall_64+0x106/0xf80 [ 1285.472249][T26408] ? clear_bhb_loop+0x40/0x90 [ 1285.472272][T26408] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1285.472292][T26408] RIP: 0033:0x7fcd4339c819 [ 1285.472309][T26408] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1285.472327][T26408] RSP: 002b:00007fcd442f30e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1285.472346][T26408] RAX: ffffffffffffffda RBX: 00007fcd43615fa8 RCX: 00007fcd4339c819 [ 1285.472359][T26408] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007fcd43615fa8 [ 1285.472370][T26408] RBP: 00007fcd43615fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1285.472381][T26408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1285.472392][T26408] R13: 00007fcd43616038 R14: 00007ffe8cd04ea0 R15: 00007ffe8cd04f88 [ 1285.472416][T26408] [ 1286.028786][T26413] FAULT_INJECTION: forcing a failure. [ 1286.028786][T26413] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1286.084068][T26413] CPU: 0 UID: 0 PID: 26413 Comm: syz.2.5627 Tainted: G L syzkaller #0 PREEMPT(full) [ 1286.084123][T26413] Tainted: [L]=SOFTLOCKUP [ 1286.084136][T26413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1286.084156][T26413] Call Trace: [ 1286.084167][T26413] [ 1286.084180][T26413] dump_stack_lvl+0x100/0x190 [ 1286.084235][T26413] should_fail_ex.cold+0x5/0xa [ 1286.084269][T26413] ? __kernel_text_address+0xd/0x30 [ 1286.084322][T26413] get_futex_key+0x1d2/0x1620 [ 1286.084368][T26413] ? __pfx_get_futex_key+0x10/0x10 [ 1286.084409][T26413] ? putname+0xb1/0x110 [ 1286.084445][T26413] ? stack_trace_save+0x8e/0xc0 [ 1286.084476][T26413] ? __pfx_stack_trace_save+0x10/0x10 [ 1286.084515][T26413] futex_wait_setup+0x83/0x510 [ 1286.084575][T26413] __futex_wait+0x19f/0x300 [ 1286.084628][T26413] ? __pfx___futex_wait+0x10/0x10 [ 1286.084686][T26413] ? __pfx_futex_wake_mark+0x10/0x10 [ 1286.084751][T26413] ? futex_hash+0x2c5/0x380 [ 1286.084802][T26413] futex_wait+0xed/0x380 [ 1286.084851][T26413] ? __pfx_futex_wait+0x10/0x10 [ 1286.084911][T26413] ? putname+0xb1/0x110 [ 1286.084945][T26413] ? kmem_cache_free+0x124/0x6a0 [ 1286.085001][T26413] do_futex+0x1ef/0x350 [ 1286.085045][T26413] ? __pfx_do_futex+0x10/0x10 [ 1286.085085][T26413] ? __pfx_do_sys_openat2+0x10/0x10 [ 1286.085140][T26413] __x64_sys_futex+0x34f/0x4d0 [ 1286.085185][T26413] ? __x64_sys_openat+0x12d/0x210 [ 1286.085231][T26413] ? __pfx___x64_sys_futex+0x10/0x10 [ 1286.085289][T26413] do_syscall_64+0x106/0xf80 [ 1286.085322][T26413] ? clear_bhb_loop+0x40/0x90 [ 1286.085361][T26413] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1286.085395][T26413] RIP: 0033:0x7f181539c819 [ 1286.085424][T26413] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1286.085452][T26413] RSP: 002b:00007f18135f60e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1286.085484][T26413] RAX: ffffffffffffffda RBX: 00007f1815615fa8 RCX: 00007f181539c819 [ 1286.085507][T26413] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1815615fa8 [ 1286.085527][T26413] RBP: 00007f1815615fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1286.085547][T26413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1286.085566][T26413] R13: 00007f1815616038 R14: 00007ffcfcebc230 R15: 00007ffcfcebc318 [ 1286.085610][T26413] [ 1286.558407][T26422] block2mtd: illegal erase size [ 1286.780391][T26427] block2mtd: illegal erase size [ 1287.565417][T26433] netlink: 504 bytes leftover after parsing attributes in process `syz.1.5632'. [ 1287.575589][T26433] netlink: 350 bytes leftover after parsing attributes in process `syz.1.5632'. [ 1287.898187][T26431] FAULT_INJECTION: forcing a failure. [ 1287.898187][T26431] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.932120][T26431] CPU: 0 UID: 0 PID: 26431 Comm: syz.2.5631 Tainted: G L syzkaller #0 PREEMPT(full) [ 1287.932174][T26431] Tainted: [L]=SOFTLOCKUP [ 1287.932186][T26431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1287.932205][T26431] Call Trace: [ 1287.932216][T26431] [ 1287.932229][T26431] dump_stack_lvl+0x100/0x190 [ 1287.932274][T26431] should_fail_ex.cold+0x5/0xa [ 1287.932305][T26431] ? __register_sysctl_table+0xac/0x1650 [ 1287.932331][T26431] should_failslab+0xc2/0x120 [ 1287.932359][T26431] __kmalloc_noprof+0xe0/0x850 [ 1287.932402][T26431] __register_sysctl_table+0xac/0x1650 [ 1287.932427][T26431] ? is_module_address+0x5f/0xf0 [ 1287.932476][T26431] ? __pfx___register_sysctl_table+0x10/0x10 [ 1287.932500][T26431] ? is_module_address+0x69/0xf0 [ 1287.932530][T26431] ? register_net_sysctl_sz+0x222/0x430 [ 1287.932559][T26431] ? __asan_memcpy+0x20/0x60 [ 1287.932596][T26431] ? kmemdup_noprof+0x49/0x60 [ 1287.932623][T26431] ipv6_sysctl_net_init+0x180/0x2b0 [ 1287.932656][T26431] ? __pfx_ipv6_sysctl_net_init+0x10/0x10 [ 1287.932745][T26431] ops_init+0x1e2/0x5f0 [ 1287.932791][T26431] setup_net+0x118/0x3a0 [ 1287.932833][T26431] ? __pfx_setup_net+0x10/0x10 [ 1287.932857][T26431] ? lockdep_init_map_type+0x5c/0x250 [ 1287.932893][T26431] ? mutex_init_lockep+0x110/0x150 [ 1287.932934][T26431] copy_net_ns+0x46f/0x7c0 [ 1287.932973][T26431] create_new_namespaces+0x3ea/0xac0 [ 1287.933008][T26431] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1287.933038][T26431] ksys_unshare+0x473/0xad0 [ 1287.933073][T26431] ? __pfx_ksys_unshare+0x10/0x10 [ 1287.933120][T26431] __x64_sys_unshare+0x31/0x40 [ 1287.933153][T26431] do_syscall_64+0x106/0xf80 [ 1287.933178][T26431] ? clear_bhb_loop+0x40/0x90 [ 1287.933209][T26431] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1287.933235][T26431] RIP: 0033:0x7f181539c819 [ 1287.933258][T26431] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1287.933282][T26431] RSP: 002b:00007f18135d5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1287.933306][T26431] RAX: ffffffffffffffda RBX: 00007f1815616090 RCX: 00007f181539c819 [ 1287.933322][T26431] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1287.933338][T26431] RBP: 00007f1815432c91 R08: 0000000000000000 R09: 0000000000000000 [ 1287.933355][T26431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1287.933371][T26431] R13: 00007f1815616128 R14: 00007f1815616090 R15: 00007ffcfcebc318 [ 1287.933406][T26431] [ 1288.277927][T26436] netlink: 504 bytes leftover after parsing attributes in process `syz.1.5641'. [ 1288.278792][T26436] netlink: 350 bytes leftover after parsing attributes in process `syz.1.5641'. [ 1290.912560][T26468] block2mtd: illegal erase size [ 1291.325449][T26475] netlink: 504 bytes leftover after parsing attributes in process `syz.3.5643'. [ 1291.391026][T26475] netlink: 350 bytes leftover after parsing attributes in process `syz.3.5643'. [ 1291.506747][T26479] block2mtd: illegal erase size [ 1291.629335][T26482] block2mtd: illegal erase size [ 1292.916795][T26493] block2mtd: illegal erase size [ 1292.924037][T26492] FAULT_INJECTION: forcing a failure. [ 1292.924037][T26492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1293.042138][T26492] CPU: 1 UID: 0 PID: 26492 Comm: syz.2.5647 Tainted: G L syzkaller #0 PREEMPT(full) [ 1293.042181][T26492] Tainted: [L]=SOFTLOCKUP [ 1293.042191][T26492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1293.042207][T26492] Call Trace: [ 1293.042214][T26492] [ 1293.042222][T26492] dump_stack_lvl+0x100/0x190 [ 1293.042256][T26492] should_fail_ex.cold+0x5/0xa [ 1293.042289][T26492] _copy_from_user+0x2e/0xd0 [ 1293.042321][T26492] copy_msghdr_from_user+0x9f/0x4f0 [ 1293.042349][T26492] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1293.042377][T26492] ? rcu_is_watching+0x12/0xc0 [ 1293.042407][T26492] ? ___sys_recvmsg+0x177/0x1a0 [ 1293.042429][T26492] ? kfree+0x2ec/0x6b0 [ 1293.042459][T26492] ___sys_recvmsg+0xdd/0x1a0 [ 1293.042492][T26492] ? __pfx____sys_recvmsg+0x10/0x10 [ 1293.042536][T26492] ? __pfx___might_resched+0x10/0x10 [ 1293.042571][T26492] do_recvmmsg+0x301/0x760 [ 1293.042599][T26492] ? __pfx_do_recvmmsg+0x10/0x10 [ 1293.042622][T26492] ? ksys_write+0x190/0x250 [ 1293.042645][T26492] ? ksys_write+0x190/0x250 [ 1293.042678][T26492] ? __mutex_unlock_slowpath+0x15c/0x790 [ 1293.042713][T26492] ? __fget_files+0x21f/0x3d0 [ 1293.042737][T26492] __x64_sys_recvmmsg+0x22a/0x280 [ 1293.042765][T26492] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 1293.042790][T26492] do_syscall_64+0x106/0xf80 [ 1293.042809][T26492] ? clear_bhb_loop+0x40/0x90 [ 1293.042832][T26492] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1293.042852][T26492] RIP: 0033:0x7f181539c819 [ 1293.042869][T26492] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1293.042888][T26492] RSP: 002b:00007f18135d5028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1293.042907][T26492] RAX: ffffffffffffffda RBX: 00007f1815616090 RCX: 00007f181539c819 [ 1293.042919][T26492] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1293.042931][T26492] RBP: 00007f18135d5090 R08: 0000000000000000 R09: 0000000000000000 [ 1293.042942][T26492] R10: 0000000000000700 R11: 0000000000000246 R12: 0000000000000001 [ 1293.042953][T26492] R13: 00007f1815616128 R14: 00007f1815616090 R15: 00007ffcfcebc318 [ 1293.042976][T26492] [ 1293.561467][T26496] block2mtd: illegal erase size [ 1294.094056][T26512] netlink: 504 bytes leftover after parsing attributes in process `syz.2.5653'. [ 1294.094933][T26512] netlink: 350 bytes leftover after parsing attributes in process `syz.2.5653'. [ 1294.299109][T26521] FAULT_INJECTION: forcing a failure. [ 1294.299109][T26521] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1294.299158][T26521] CPU: 1 UID: 0 PID: 26521 Comm: syz.3.5657 Tainted: G L syzkaller #0 PREEMPT(full) [ 1294.299199][T26521] Tainted: [L]=SOFTLOCKUP [ 1294.299210][T26521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1294.299227][T26521] Call Trace: [ 1294.299237][T26521] [ 1294.299248][T26521] dump_stack_lvl+0x100/0x190 [ 1294.299297][T26521] should_fail_ex.cold+0x5/0xa [ 1294.299343][T26521] strncpy_from_user+0x3b/0x2d0 [ 1294.299386][T26521] do_getname+0x78/0x390 [ 1294.299430][T26521] __x64_sys_execve+0x76/0xd0 [ 1294.299478][T26521] do_syscall_64+0x106/0xf80 [ 1294.299507][T26521] ? clear_bhb_loop+0x40/0x90 [ 1294.299544][T26521] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1294.299574][T26521] RIP: 0033:0x7fcd4339c819 [ 1294.299598][T26521] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1294.299625][T26521] RSP: 002b:00007fcd442d2028 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 1294.299654][T26521] RAX: ffffffffffffffda RBX: 00007fcd43616090 RCX: 00007fcd4339c819 [ 1294.299673][T26521] RDX: 0000200000001300 RSI: 0000000000000000 RDI: 0000200000000040 [ 1294.299692][T26521] RBP: 00007fcd442d2090 R08: 0000000000000000 R09: 0000000000000000 [ 1294.299710][T26521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1294.299728][T26521] R13: 00007fcd43616128 R14: 00007fcd43616090 R15: 00007ffe8cd04f88 [ 1294.299767][T26521] [ 1295.365663][T26538] block2mtd: illegal erase size [ 1295.927748][T26546] block2mtd: illegal erase size [ 1296.058527][T26550] netlink: 504 bytes leftover after parsing attributes in process `syz.2.5665'. [ 1296.059466][T26550] netlink: 350 bytes leftover after parsing attributes in process `syz.2.5665'. [ 1296.306968][T26554] ksmbd: Unknown IPC event: 14, ignore. [ 1296.616513][T26564] block2mtd: illegal erase size [ 1297.979615][T26580] block2mtd: illegal erase size [ 1298.023186][T26581] block2mtd: illegal erase size [ 1298.906658][T26605] block2mtd: illegal erase size [ 1299.451147][T26613] block2mtd: illegal erase size [ 1299.938858][T26628] block2mtd: illegal erase size [ 1300.824405][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 1300.832896][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 1300.842433][T26652] block2mtd: illegal erase size [ 1301.398758][T26662] FAULT_INJECTION: forcing a failure. [ 1301.398758][T26662] name failslab, interval 1, probability 0, space 0, times 0 [ 1301.451773][T26662] CPU: 0 UID: 0 PID: 26662 Comm: syz.0.5698 Tainted: G L syzkaller #0 PREEMPT(full) [ 1301.451821][T26662] Tainted: [L]=SOFTLOCKUP [ 1301.451832][T26662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1301.451848][T26662] Call Trace: [ 1301.451858][T26662] [ 1301.451871][T26662] dump_stack_lvl+0x100/0x190 [ 1301.451924][T26662] should_fail_ex.cold+0x5/0xa [ 1301.451963][T26662] ? tomoyo_encode2+0xfb/0x3c0 [ 1301.452004][T26662] should_failslab+0xc2/0x120 [ 1301.452038][T26662] __kmalloc_noprof+0xe0/0x850 [ 1301.452082][T26662] ? d_absolute_path+0x136/0x1b0 [ 1301.452140][T26662] tomoyo_encode2+0xfb/0x3c0 [ 1301.452188][T26662] tomoyo_encode+0x29/0x50 [ 1301.452226][T26662] tomoyo_realpath_from_path+0x18c/0x690 [ 1301.452275][T26662] tomoyo_path_number_perm+0x23c/0x580 [ 1301.452307][T26662] ? tomoyo_path_number_perm+0x22e/0x580 [ 1301.452332][T26662] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 1301.452380][T26662] ? find_held_lock+0x2b/0x80 [ 1301.452398][T26662] ? __fget_files+0x215/0x3d0 [ 1301.452417][T26662] ? hook_file_ioctl_common+0x146/0x410 [ 1301.452446][T26662] ? __fget_files+0x21f/0x3d0 [ 1301.452469][T26662] security_file_ioctl+0xd3/0x230 [ 1301.452503][T26662] __x64_sys_ioctl+0xb7/0x210 [ 1301.452535][T26662] do_syscall_64+0x106/0xf80 [ 1301.452555][T26662] ? clear_bhb_loop+0x40/0x90 [ 1301.452578][T26662] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1301.452598][T26662] RIP: 0033:0x7f405f19c819 [ 1301.452615][T26662] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1301.452634][T26662] RSP: 002b:00007f405d3f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1301.452653][T26662] RAX: ffffffffffffffda RBX: 00007f405f415fa0 RCX: 00007f405f19c819 [ 1301.452665][T26662] RDX: 0000000000000009 RSI: 0000000000004b4a RDI: 0000000000000003 [ 1301.452676][T26662] RBP: 00007f405d3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1301.452687][T26662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1301.452699][T26662] R13: 00007f405f416038 R14: 00007f405f415fa0 R15: 00007ffe63f10908 [ 1301.452722][T26662] [ 1301.452761][T26662] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1302.270286][T26668] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5702'. [ 1302.281667][T26671] block2mtd: illegal erase size [ 1302.604197][T26679] program syz.2.5703 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1302.629390][T26679] bonding: no command found in bonding_masters - use +ifname or -ifname [ 1303.040066][T26688] block2mtd: illegal erase size [ 1303.579565][T26705] block2mtd: illegal erase size [ 1304.755902][T19397] Bluetooth: hci0: ACL packet for unknown connection handle 0 [ 1306.069861][T26741] Unable to find swap-space signature [ 1306.591823][T26751] futex_wake_op: syz.3.5722 tries to shift op by -2048; fix this program [ 1307.242459][T26775] binder: 26750:26775 ioctl c00c620f 200000000140 returned -22 [ 1307.757630][T26758] FAULT_INJECTION: forcing a failure. [ 1307.757630][T26758] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1307.788914][T26758] CPU: 0 UID: 0 PID: 26758 Comm: syz.0.5724 Tainted: G L syzkaller #0 PREEMPT(full) [ 1307.788953][T26758] Tainted: [L]=SOFTLOCKUP [ 1307.788960][T26758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1307.788971][T26758] Call Trace: [ 1307.788977][T26758] [ 1307.788985][T26758] dump_stack_lvl+0x100/0x190 [ 1307.789018][T26758] should_fail_ex.cold+0x5/0xa [ 1307.789042][T26758] _copy_from_user+0x2e/0xd0 [ 1307.789068][T26758] copy_msghdr_from_user+0x9f/0x4f0 [ 1307.789094][T26758] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1307.789123][T26758] ? rcu_is_watching+0x12/0xc0 [ 1307.789153][T26758] ? ___sys_recvmsg+0x177/0x1a0 [ 1307.789175][T26758] ? kfree+0x2ec/0x6b0 [ 1307.789205][T26758] ___sys_recvmsg+0xdd/0x1a0 [ 1307.789237][T26758] ? __pfx____sys_recvmsg+0x10/0x10 [ 1307.789274][T26758] ? __pfx___might_resched+0x10/0x10 [ 1307.789308][T26758] do_recvmmsg+0x301/0x760 [ 1307.789336][T26758] ? __pfx_do_recvmmsg+0x10/0x10 [ 1307.789359][T26758] ? ksys_write+0x190/0x250 [ 1307.789377][T26758] ? ksys_write+0x190/0x250 [ 1307.789399][T26758] ? __mutex_unlock_slowpath+0x15c/0x790 [ 1307.789427][T26758] ? __fget_files+0x21f/0x3d0 [ 1307.789452][T26758] __x64_sys_recvmmsg+0x22a/0x280 [ 1307.789474][T26758] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 1307.789501][T26758] do_syscall_64+0x106/0xf80 [ 1307.789520][T26758] ? clear_bhb_loop+0x40/0x90 [ 1307.789543][T26758] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1307.789563][T26758] RIP: 0033:0x7f405f19c819 [ 1307.789580][T26758] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1307.789598][T26758] RSP: 002b:00007f405d3f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1307.789617][T26758] RAX: ffffffffffffffda RBX: 00007f405f415fa0 RCX: 00007f405f19c819 [ 1307.789630][T26758] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000004 [ 1307.789641][T26758] RBP: 00007f405d3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1307.789652][T26758] R10: 000000000000000e R11: 0000000000000246 R12: 0000000000000001 [ 1307.789663][T26758] R13: 00007f405f416038 R14: 00007f405f415fa0 R15: 00007ffe63f10908 [ 1307.789686][T26758] [ 1308.161403][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 1308.473898][T26784] block2mtd: illegal erase size [ 1309.230842][T26792] block2mtd: illegal erase size [ 1309.603696][T26757] Bluetooth: hci4: ACL packet for unknown connection handle 0 [ 1312.116468][T26844] Unable to find swap-space signature [ 1312.234366][T26848] FAULT_INJECTION: forcing a failure. [ 1312.234366][T26848] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1312.302590][T26848] CPU: 0 UID: 0 PID: 26848 Comm: syz.3.5744 Tainted: G L syzkaller #0 PREEMPT(full) [ 1312.302641][T26848] Tainted: [L]=SOFTLOCKUP [ 1312.302652][T26848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1312.302670][T26848] Call Trace: [ 1312.302680][T26848] [ 1312.302693][T26848] dump_stack_lvl+0x100/0x190 [ 1312.302744][T26848] should_fail_ex.cold+0x5/0xa [ 1312.302781][T26848] _copy_to_user+0x32/0xd0 [ 1312.302823][T26848] simple_read_from_buffer+0xcb/0x170 [ 1312.302876][T26848] proc_fail_nth_read+0x1af/0x230 [ 1312.302916][T26848] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1312.302958][T26848] ? rw_verify_area+0xce/0x6d0 [ 1312.303003][T26848] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1312.303042][T26848] vfs_read+0x1e4/0xb30 [ 1312.303077][T26848] ? __pfx_vfs_read+0x10/0x10 [ 1312.303105][T26848] ? __fget_files+0x215/0x3d0 [ 1312.303157][T26848] ? __fget_files+0x21f/0x3d0 [ 1312.303199][T26848] ksys_read+0x12a/0x250 [ 1312.303228][T26848] ? __pfx_ksys_read+0x10/0x10 [ 1312.303270][T26848] do_syscall_64+0x106/0xf80 [ 1312.303299][T26848] ? clear_bhb_loop+0x40/0x90 [ 1312.303336][T26848] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1312.303366][T26848] RIP: 0033:0x7fcd4335d04e [ 1312.303389][T26848] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1312.303416][T26848] RSP: 002b:00007fcd442f2fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1312.303444][T26848] RAX: ffffffffffffffda RBX: 00007fcd442f36c0 RCX: 00007fcd4335d04e [ 1312.303462][T26848] RDX: 000000000000000f RSI: 00007fcd442f30a0 RDI: 0000000000000004 [ 1312.303480][T26848] RBP: 00007fcd442f3090 R08: 0000000000000000 R09: 0000000000000000 [ 1312.303498][T26848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1312.303516][T26848] R13: 00007fcd43616038 R14: 00007fcd43615fa0 R15: 00007ffe8cd04f88 [ 1312.303555][T26848] [ 1312.806831][T26859] block2mtd: illegal erase size [ 1313.142892][T26757] Bluetooth: hci1: ACL packet for unknown connection handle 0 [ 1314.330435][T26885] nvme_fcloop: unknown parameter or missing value '7=";&L=j"Yq'R"' [ 1315.108073][T26896] vhci_hcd vhci_hcd.2: invalid port number 111 [ 1315.116329][T26899] block2mtd: illegal erase size [ 1315.126460][T26896] vhci_hcd vhci_hcd.2: default hub control req: a356 va1b7 i006f l230 [ 1315.261223][T26902] block2mtd: illegal erase size [ 1315.653374][ T30] audit: type=1804 audit(1775344137.430:20): pid=26910 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz.0.5760" name="/newroot/194/file0" dev="tmpfs" ino=1010 res=1 errno=0 [ 1315.840409][T26915] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5762'. [ 1315.936019][T26916] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5762'. [ 1316.020964][T26915] HfR: entered promiscuous mode [ 1316.248340][T26926] FAULT_INJECTION: forcing a failure. [ 1316.248340][T26926] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1316.333864][T26926] CPU: 0 UID: 0 PID: 26926 Comm: syz.0.5766 Tainted: G L syzkaller #0 PREEMPT(full) [ 1316.333924][T26926] Tainted: [L]=SOFTLOCKUP [ 1316.333935][T26926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1316.333952][T26926] Call Trace: [ 1316.333963][T26926] [ 1316.333974][T26926] dump_stack_lvl+0x100/0x190 [ 1316.334022][T26926] should_fail_ex.cold+0x5/0xa [ 1316.334059][T26926] _copy_to_iter+0x5a4/0x1720 [ 1316.334115][T26926] ? __pfx__copy_to_iter+0x10/0x10 [ 1316.334158][T26926] ? wireless_dev_seq_show+0x3c8/0x4f0 [ 1316.334200][T26926] seq_read_iter+0xdab/0x1270 [ 1316.334281][T26926] seq_read+0x33b/0x4c0 [ 1316.334327][T26926] ? __pfx_seq_read+0x10/0x10 [ 1316.334397][T26926] ? __pfx_seq_read+0x10/0x10 [ 1316.334441][T26926] proc_reg_read+0x240/0x330 [ 1316.334498][T26926] ? __pfx_proc_reg_read+0x10/0x10 [ 1316.334543][T26926] vfs_read+0x1e4/0xb30 [ 1316.334578][T26926] ? __pfx_vfs_read+0x10/0x10 [ 1316.334605][T26926] ? __fget_files+0x215/0x3d0 [ 1316.334642][T26926] ? __fget_files+0x21f/0x3d0 [ 1316.334683][T26926] ksys_read+0x12a/0x250 [ 1316.334713][T26926] ? __pfx_ksys_read+0x10/0x10 [ 1316.334754][T26926] do_syscall_64+0x106/0xf80 [ 1316.334785][T26926] ? clear_bhb_loop+0x40/0x90 [ 1316.334822][T26926] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1316.334852][T26926] RIP: 0033:0x7f405f19c819 [ 1316.334885][T26926] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1316.334913][T26926] RSP: 002b:00007f405d3f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1316.334943][T26926] RAX: ffffffffffffffda RBX: 00007f405f415fa0 RCX: 00007f405f19c819 [ 1316.334962][T26926] RDX: 000000000000000a RSI: 0000200000000040 RDI: 0000000000000003 [ 1316.334981][T26926] RBP: 00007f405d3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1316.334999][T26926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1316.335018][T26926] R13: 00007f405f416038 R14: 00007f405f415fa0 R15: 00007ffe63f10908 [ 1316.335060][T26926] [ 1316.862322][T26941] block2mtd: illegal erase size [ 1317.530061][T26945] nvme_fcloop: unknown parameter or missing value '7=";&L=j"Yq'R"' [ 1317.671528][T26952] block2mtd: illegal erase size [ 1317.754138][T26954] FAULT_INJECTION: forcing a failure. [ 1317.754138][T26954] name failslab, interval 1, probability 0, space 0, times 0 [ 1317.802291][T26954] CPU: 1 UID: 0 PID: 26954 Comm: syz.0.5775 Tainted: G L syzkaller #0 PREEMPT(full) [ 1317.802340][T26954] Tainted: [L]=SOFTLOCKUP [ 1317.802351][T26954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1317.802369][T26954] Call Trace: [ 1317.802380][T26954] [ 1317.802391][T26954] dump_stack_lvl+0x100/0x190 [ 1317.802445][T26954] should_fail_ex.cold+0x5/0xa [ 1317.802482][T26954] ? ima_write_template_field_data+0x59/0x1d0 [ 1317.802519][T26954] should_failslab+0xc2/0x120 [ 1317.802541][T26954] __kmalloc_noprof+0xe0/0x850 [ 1317.802572][T26954] ? do_syscall_64+0x106/0xf80 [ 1317.802591][T26954] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1317.802614][T26954] ima_write_template_field_data+0x59/0x1d0 [ 1317.802645][T26954] ima_eventdigest_init_common+0x158/0x460 [ 1317.802675][T26954] ? __pfx_ima_eventdigest_init_common+0x10/0x10 [ 1317.802715][T26954] ? trace_kmalloc+0xf0/0x130 [ 1317.802735][T26954] ? __kasan_kmalloc+0xaa/0xb0 [ 1317.802754][T26954] ? __kmalloc_noprof+0x320/0x850 [ 1317.802783][T26954] ? take_dentry_name_snapshot+0x30b/0x7c0 [ 1317.802814][T26954] ima_alloc_init_template+0x399/0x6d0 [ 1317.802842][T26954] ima_store_measurement+0x1e3/0x5b0 [ 1317.802866][T26954] ? __pfx_ima_store_measurement+0x10/0x10 [ 1317.802898][T26954] ? __pfx_ima_get_hash_algo+0x10/0x10 [ 1317.802932][T26954] process_measurement+0x19cc/0x2350 [ 1317.802959][T26954] ? stack_trace_save+0x8e/0xc0 [ 1317.802979][T26954] ? __pfx_process_measurement+0x10/0x10 [ 1317.802999][T26954] ? __lock_acquire+0x4a5/0x2630 [ 1317.803023][T26954] ? __kasan_slab_alloc+0x89/0x90 [ 1317.803041][T26954] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 1317.803081][T26954] ? init_file+0x95/0x480 [ 1317.803103][T26954] ? alloc_empty_file+0x73/0x1c0 [ 1317.803125][T26954] ? alloc_file_pseudo+0x13a/0x230 [ 1317.803149][T26954] ? ksys_mmap_pgoff+0x232/0x650 [ 1317.803169][T26954] ? __x64_sys_mmap+0x125/0x190 [ 1317.803197][T26954] ? do_syscall_64+0x106/0xf80 [ 1317.803236][T26954] ? __pfx_aa_file_perm+0x10/0x10 [ 1317.803269][T26954] ima_file_mmap+0x1c4/0x1f0 [ 1317.803290][T26954] ? __pfx_ima_file_mmap+0x10/0x10 [ 1317.803317][T26954] security_mmap_file+0x278/0x9b0 [ 1317.803344][T26954] vm_mmap_pgoff+0xec/0x470 [ 1317.803368][T26954] ? __pfx_vm_mmap_pgoff+0x10/0x10 [ 1317.803389][T26954] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 1317.803416][T26954] ? hugetlbfs_get_inode+0x36e/0x750 [ 1317.803444][T26954] ksys_mmap_pgoff+0x273/0x650 [ 1317.803466][T26954] ? __x64_sys_futex+0x358/0x4d0 [ 1317.803492][T26954] ? __pfx_ksys_mmap_pgoff+0x10/0x10 [ 1317.803513][T26954] ? xfd_validate_state+0x129/0x190 [ 1317.803545][T26954] __x64_sys_mmap+0x125/0x190 [ 1317.803576][T26954] do_syscall_64+0x106/0xf80 [ 1317.803593][T26954] ? clear_bhb_loop+0x40/0x90 [ 1317.803616][T26954] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1317.803636][T26954] RIP: 0033:0x7f405f19c819 [ 1317.803653][T26954] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1317.803671][T26954] RSP: 002b:00007f405d3f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1317.803690][T26954] RAX: ffffffffffffffda RBX: 00007f405f415fa0 RCX: 00007f405f19c819 [ 1317.803702][T26954] RDX: 00004000000000df RSI: 0000000000000004 RDI: 0000000000000000 [ 1317.803713][T26954] RBP: 00007f405f232c91 R08: 0000000000000401 R09: 0000300000000000 [ 1317.803725][T26954] R10: 0000000000040eb1 R11: 0000000000000246 R12: 0000000000000000 [ 1317.803736][T26954] R13: 00007f405f416038 R14: 00007f405f415fa0 R15: 00007ffe63f10908 [ 1317.803758][T26954] [ 1317.804013][ T30] audit: type=1804 audit(1775344139.580:21): pid=26954 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=add_template_measure cause=ENOMEM comm="syz.0.5775" name="anon_hugepage" dev="hugetlbfs" ino=108467 res=0 errno=0 [ 1318.573259][T26973] netlink: 504 bytes leftover after parsing attributes in process `syz.0.5779'. [ 1318.584779][T26973] netlink: 350 bytes leftover after parsing attributes in process `syz.0.5779'. [ 1318.681940][T26974] block2mtd: illegal erase size [ 1319.200831][T26994] FAULT_INJECTION: forcing a failure. [ 1319.200831][T26994] name failslab, interval 1, probability 0, space 0, times 0 [ 1319.275241][T26994] CPU: 0 UID: 0 PID: 26994 Comm: syz.0.5785 Tainted: G L syzkaller #0 PREEMPT(full) [ 1319.275276][T26994] Tainted: [L]=SOFTLOCKUP [ 1319.275284][T26994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1319.275301][T26994] Call Trace: [ 1319.275310][T26994] [ 1319.275317][T26994] dump_stack_lvl+0x100/0x190 [ 1319.275354][T26994] should_fail_ex.cold+0x5/0xa [ 1319.275383][T26994] should_failslab+0xc2/0x120 [ 1319.275413][T26994] kmem_cache_alloc_node_noprof+0x81/0x6f0 [ 1319.275452][T26994] ? __alloc_skb+0x140/0x710 [ 1319.275485][T26994] __alloc_skb+0x140/0x710 [ 1319.275512][T26994] ? __alloc_skb+0x5b7/0x710 [ 1319.275539][T26994] ? __pfx___alloc_skb+0x10/0x10 [ 1319.275578][T26994] netlink_alloc_large_skb+0x69/0x150 [ 1319.275619][T26994] netlink_sendmsg+0x680/0xda0 [ 1319.275655][T26994] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1319.275683][T26994] ? __import_iovec+0x1d2/0x640 [ 1319.275724][T26994] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1319.275758][T26994] ____sys_sendmsg+0x9e1/0xb70 [ 1319.275781][T26994] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1319.275803][T26994] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1319.275836][T26994] ___sys_sendmsg+0x190/0x1e0 [ 1319.275862][T26994] ? __pfx____sys_sendmsg+0x10/0x10 [ 1319.275913][T26994] __sys_sendmsg+0x170/0x220 [ 1319.275945][T26994] ? __pfx___sys_sendmsg+0x10/0x10 [ 1319.275989][T26994] do_syscall_64+0x106/0xf80 [ 1319.276009][T26994] ? clear_bhb_loop+0x40/0x90 [ 1319.276032][T26994] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1319.276054][T26994] RIP: 0033:0x7f405f19c819 [ 1319.276071][T26994] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1319.276090][T26994] RSP: 002b:00007f405d3f6028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1319.276109][T26994] RAX: ffffffffffffffda RBX: 00007f405f415fa0 RCX: 00007f405f19c819 [ 1319.276130][T26994] RDX: 0000000000000080 RSI: 0000200000000140 RDI: 0000000000000003 [ 1319.276142][T26994] RBP: 00007f405d3f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1319.276153][T26994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1319.276165][T26994] R13: 00007f405f416038 R14: 00007f405f415fa0 R15: 00007ffe63f10908 [ 1319.276188][T26994] [ 1319.841474][T27000] openvswitch: HfR: Dropping previously announced user features [ 1319.885620][T27003] Unable to find swap-space signature [ 1319.963213][T27008] netlink: 504 bytes leftover after parsing attributes in process `syz.2.5790'. [ 1319.993317][T27004] netlink: 350 bytes leftover after parsing attributes in process `syz.2.5790'. [ 1320.040251][T27010] block2mtd: illegal erase size [ 1320.209473][T27018] FAULT_INJECTION: forcing a failure. [ 1320.209473][T27018] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1320.323992][T27018] CPU: 0 UID: 0 PID: 27018 Comm: syz.2.5794 Tainted: G L syzkaller #0 PREEMPT(full) [ 1320.324025][T27018] Tainted: [L]=SOFTLOCKUP [ 1320.324033][T27018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1320.324043][T27018] Call Trace: [ 1320.324051][T27018] [ 1320.324058][T27018] dump_stack_lvl+0x100/0x190 [ 1320.324103][T27018] should_fail_ex.cold+0x5/0xa [ 1320.324127][T27018] _copy_from_iter+0x1f4/0x1690 [ 1320.324157][T27018] ? policy_nodemask+0xed/0x4f0 [ 1320.324179][T27018] ? __pfx__copy_from_iter+0x10/0x10 [ 1320.324205][T27018] ? alloc_pages_mpol+0x25a/0x550 [ 1320.324227][T27018] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1320.324254][T27018] copy_page_from_iter+0xde/0x180 [ 1320.324289][T27018] anon_pipe_write+0xae4/0x1d40 [ 1320.324336][T27018] ? __pfx_anon_pipe_write+0x10/0x10 [ 1320.324366][T27018] ? apparmor_file_permission+0x13f/0x1c0 [ 1320.324401][T27018] ? bpf_lsm_file_permission+0x9/0x10 [ 1320.324431][T27018] ? security_file_permission+0x76/0x210 [ 1320.324470][T27018] ? rw_verify_area+0xce/0x6d0 [ 1320.324517][T27018] vfs_write+0x6ac/0x1070 [ 1320.324544][T27018] ? __pfx_anon_pipe_write+0x10/0x10 [ 1320.324577][T27018] ? __pfx_vfs_write+0x10/0x10 [ 1320.324602][T27018] ? find_held_lock+0x2b/0x80 [ 1320.324654][T27018] ksys_write+0x1f8/0x250 [ 1320.324682][T27018] ? __pfx_ksys_write+0x10/0x10 [ 1320.324721][T27018] do_syscall_64+0x106/0xf80 [ 1320.324749][T27018] ? clear_bhb_loop+0x40/0x90 [ 1320.324784][T27018] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1320.324813][T27018] RIP: 0033:0x7f181539c819 [ 1320.324836][T27018] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1320.324863][T27018] RSP: 002b:00007f18135d5028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1320.324890][T27018] RAX: ffffffffffffffda RBX: 00007f1815616090 RCX: 00007f181539c819 [ 1320.324909][T27018] RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000001 [ 1320.324925][T27018] RBP: 00007f18135d5090 R08: 0000000000000000 R09: 0000000000000000 [ 1320.324941][T27018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1320.324957][T27018] R13: 00007f1815616128 R14: 00007f1815616090 R15: 00007ffcfcebc318 [ 1320.324996][T27018] [ 1321.580895][T27035] syz.3.5800 (27035): attempted to duplicate a private mapping with mremap. This is not supported. [ 1322.079191][T27049] Unable to find swap-space signature [ 1322.088407][T27051] netlink: 504 bytes leftover after parsing attributes in process `syz.1.5803'. [ 1322.111476][T27051] netlink: 350 bytes leftover after parsing attributes in process `syz.1.5803'. [ 1323.308720][T27090] netlink: 504 bytes leftover after parsing attributes in process `syz.1.5816'. [ 1323.372445][T27090] netlink: 350 bytes leftover after parsing attributes in process `syz.1.5816'. [ 1324.015976][T27096] block2mtd: illegal erase size [ 1324.751996][T27108] FAULT_INJECTION: forcing a failure. [ 1324.751996][T27108] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1324.791058][T27108] CPU: 0 UID: 0 PID: 27108 Comm: syz.2.5819 Tainted: G L syzkaller #0 PREEMPT(full) [ 1324.791109][T27108] Tainted: [L]=SOFTLOCKUP [ 1324.791121][T27108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1324.791139][T27108] Call Trace: [ 1324.791150][T27108] [ 1324.791161][T27108] dump_stack_lvl+0x100/0x190 [ 1324.791455][T27108] should_fail_ex.cold+0x5/0xa [ 1324.791498][T27108] _copy_to_iter+0x1f3/0x1720 [ 1324.791542][T27108] ? __pfx__copy_to_iter+0x10/0x10 [ 1324.791593][T27108] simple_copy_to_iter+0x46/0x90 [ 1324.791635][T27108] __skb_datagram_iter+0x5c8/0x900 [ 1324.791670][T27108] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 1324.791719][T27108] skb_copy_datagram_iter+0xa1/0x270 [ 1324.791754][T27108] tcp_recvmsg_locked+0x1b36/0x28e0 [ 1324.791791][T27108] ? __pfx_tcp_recvmsg_locked+0x10/0x10 [ 1324.791822][T27108] ? __local_bh_enable_ip+0x9e/0x120 [ 1324.791848][T27108] tcp_recvmsg+0x138/0x630 [ 1324.791875][T27108] ? __pfx_tcp_recvmsg+0x10/0x10 [ 1324.791911][T27108] ? __pfx_tcp_recvmsg+0x10/0x10 [ 1324.791935][T27108] inet_recvmsg+0x129/0x6a0 [ 1324.791961][T27108] ? __pfx_inet_recvmsg+0x10/0x10 [ 1324.791986][T27108] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1324.792008][T27108] ? __pfx_inet_recvmsg+0x10/0x10 [ 1324.792033][T27108] sock_recvmsg+0x187/0x1f0 [ 1324.792058][T27108] __sys_recvfrom+0x200/0x300 [ 1324.792088][T27108] ? 0xffffffff81000000 [ 1324.792104][T27108] ? __pfx___sys_recvfrom+0x10/0x10 [ 1324.792155][T27108] ? ksys_write+0x1ac/0x250 [ 1324.792175][T27108] ? __pfx_ksys_write+0x10/0x10 [ 1324.792197][T27108] __x64_sys_recvfrom+0xe0/0x1c0 [ 1324.792227][T27108] ? do_syscall_64+0x95/0xf80 [ 1324.792246][T27108] ? lockdep_hardirqs_on+0x78/0x100 [ 1324.792266][T27108] do_syscall_64+0x106/0xf80 [ 1324.792284][T27108] ? clear_bhb_loop+0x40/0x90 [ 1324.792308][T27108] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1324.792328][T27108] RIP: 0033:0x7f181539c819 [ 1324.792345][T27108] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1324.792364][T27108] RSP: 002b:00007f18135d5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 1324.792384][T27108] RAX: ffffffffffffffda RBX: 00007f1815616090 RCX: 00007f181539c819 [ 1324.792417][T27108] RDX: 000000800000000e RSI: 0000000000000000 RDI: 0000000000000003 [ 1324.792428][T27108] RBP: 00007f18135d5090 R08: 0000000000000000 R09: ffffffff81000000 [ 1324.792440][T27108] R10: 0000000000000100 R11: 0000000000000246 R12: 0000000000000001 [ 1324.792451][T27108] R13: 00007f1815616128 R14: 00007f1815616090 R15: 00007ffcfcebc318 [ 1324.792468][T27108] ? 0xffffffff81000000 [ 1324.792489][T27108] [ 1325.322010][T27115] FAULT_INJECTION: forcing a failure. [ 1325.322010][T27115] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1325.335261][T27115] CPU: 0 UID: 0 PID: 27115 Comm: syz.3.5823 Tainted: G L syzkaller #0 PREEMPT(full) [ 1325.335309][T27115] Tainted: [L]=SOFTLOCKUP [ 1325.335320][T27115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1325.335337][T27115] Call Trace: [ 1325.335348][T27115] [ 1325.335358][T27115] dump_stack_lvl+0x100/0x190 [ 1325.335408][T27115] should_fail_ex.cold+0x5/0xa [ 1325.335445][T27115] _copy_from_user+0x2e/0xd0 [ 1325.335485][T27115] ____sys_sendmsg+0x1d1/0xb70 [ 1325.335527][T27115] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1325.335570][T27115] ? __pfx__kstrtoull+0x10/0x10 [ 1325.335623][T27115] ___sys_sendmsg+0x190/0x1e0 [ 1325.335663][T27115] ? __pfx____sys_sendmsg+0x10/0x10 [ 1325.335737][T27115] ? proc_fail_nth_write+0x9f/0x220 [ 1325.335776][T27115] ? find_held_lock+0x2b/0x80 [ 1325.335810][T27115] __sys_sendmmsg+0x205/0x430 [ 1325.335844][T27115] ? __pfx___sys_sendmmsg+0x10/0x10 [ 1325.335885][T27115] ? __pfx_do_sys_openat2+0x10/0x10 [ 1325.335943][T27115] ? ksys_write+0x1ac/0x250 [ 1325.335972][T27115] ? __pfx_ksys_write+0x10/0x10 [ 1325.336009][T27115] __x64_sys_sendmmsg+0x9c/0x100 [ 1325.336037][T27115] ? lockdep_hardirqs_on+0x78/0x100 [ 1325.336068][T27115] do_syscall_64+0x106/0xf80 [ 1325.336097][T27115] ? clear_bhb_loop+0x40/0x90 [ 1325.336134][T27115] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1325.336165][T27115] RIP: 0033:0x7fcd4339c819 [ 1325.336199][T27115] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1325.336227][T27115] RSP: 002b:00007fcd442f3028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1325.336255][T27115] RAX: ffffffffffffffda RBX: 00007fcd43615fa0 RCX: 00007fcd4339c819 [ 1325.336275][T27115] RDX: 0000000000000007 RSI: 0000200000000200 RDI: 0000000000000000 [ 1325.336293][T27115] RBP: 00007fcd442f3090 R08: 0000000000000000 R09: 0000000000000000 [ 1325.336311][T27115] R10: 0000000000004008 R11: 0000000000000246 R12: 0000000000000001 [ 1325.336328][T27115] R13: 00007fcd43616038 R14: 00007fcd43615fa0 R15: 00007ffe8cd04f88 [ 1325.336367][T27115] [ 1327.158658][T26757] Bluetooth: hci1: unexpected subevent 0x0c length: 118 > 5 [ 1327.159183][T27155] netlink: 25 bytes leftover after parsing attributes in process `syz.0.5838'. [ 1327.281192][T27161] block2mtd: illegal erase size [ 1327.680427][T27172] netlink: 504 bytes leftover after parsing attributes in process `syz.3.5843'. [ 1327.690775][T27172] netlink: 350 bytes leftover after parsing attributes in process `syz.3.5843'. [ 1327.965957][T27176] block2mtd: illegal erase size [ 1328.206729][T27179] nbd: must specify a device to reconfigure [ 1328.646448][T27189] nbd: must specify a device to reconfigure [ 1329.090478][T27195] netlink: Failed to add  helper -22 [ 1329.295185][T27202] block2mtd: illegal erase size [ 1329.730900][T27212] netlink: 504 bytes leftover after parsing attributes in process `syz.1.5854'. [ 1329.770878][T27213] block2mtd: illegal erase size [ 1329.853764][T27212] netlink: 350 bytes leftover after parsing attributes in process `syz.1.5854'. [ 1330.386219][T27222] block2mtd: illegal erase size [ 1330.505001][T27225] block2mtd: illegal erase size [ 1332.274567][T27251] netlink: 504 bytes leftover after parsing attributes in process `syz.0.5866'. [ 1332.306809][T27250] netlink: 350 bytes leftover after parsing attributes in process `syz.0.5866'. [ 1332.623055][T27263] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5863'. [ 1332.645701][T27261] nfs4: Unknown parameter '/proc/fs/netfs/requests' [ 1332.647034][T27262] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 1333.054843][T27278] block2mtd: illegal erase size [ 1334.020487][T27288] block2mtd: illegal erase size [ 1334.095531][T27290] netlink: 504 bytes leftover after parsing attributes in process `syz.1.5878'. [ 1334.133118][T27290] netlink: 350 bytes leftover after parsing attributes in process `syz.1.5878'. [ 1334.815091][T27310] nbd: must specify a device to reconfigure [ 1335.414641][T27319] netlink: 330 bytes leftover after parsing attributes in process `syz.3.5886'. [ 1336.178509][T27327] block2mtd: illegal erase size [ 1336.794928][T27334] block2mtd: illegal erase size [ 1337.018530][T27340] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5891'. [ 1337.065951][T27340] openvswitch: HfR: Dropping previously announced user features [ 1337.092341][T27341] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5891'. [ 1337.230490][T27345] block2mtd: illegal erase size [ 1337.840480][T27351] block2mtd: illegal erase size [ 1338.107872][T27354] nbd: must specify a device to reconfigure [ 1338.763294][T27367] block2mtd: illegal erase size [ 1339.047496][T27372] bond0: invalid ARP target specified [ 1341.355259][T27411] netlink: 504 bytes leftover after parsing attributes in process `syz.0.5905'. [ 1341.366133][T27411] netlink: 350 bytes leftover after parsing attributes in process `syz.0.5905'. [ 1341.398008][T27413] block2mtd: illegal erase size [ 1341.575594][T27418] nbd: must specify a device to reconfigure [ 1342.224032][T27427] netlink: 330 bytes leftover after parsing attributes in process `syz.2.5913'. [ 1342.510952][T27432] bond0: invalid ARP target specified [ 1342.545261][T27432] i2c i2c-0: dtv_property_process_set: SET cmd 0x00000000 undefined [ 1342.727702][T27439] block2mtd: illegal erase size [ 1343.875522][T27460] netlink: 504 bytes leftover after parsing attributes in process `syz.0.5920'. [ 1343.887346][T27459] netlink: 350 bytes leftover after parsing attributes in process `syz.0.5920'. [ 1344.064047][T27448] zswap: compressor not available [ 1344.276399][T27470] block2mtd: illegal erase size [ 1345.177968][T27478] FAULT_INJECTION: forcing a failure. [ 1345.177968][T27478] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1345.200030][T27478] CPU: 1 UID: 0 PID: 27478 Comm: syz.2.5925 Tainted: G L syzkaller #0 PREEMPT(full) [ 1345.200079][T27478] Tainted: [L]=SOFTLOCKUP [ 1345.200091][T27478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1345.200110][T27478] Call Trace: [ 1345.200120][T27478] [ 1345.200132][T27478] dump_stack_lvl+0x100/0x190 [ 1345.200183][T27478] should_fail_ex.cold+0x5/0xa [ 1345.200203][T27478] ? prepare_alloc_pages+0x16d/0x5f0 [ 1345.200228][T27478] should_fail_alloc_page+0xeb/0x140 [ 1345.200251][T27478] prepare_alloc_pages+0x1f0/0x5f0 [ 1345.200274][T27478] ? rcu_is_watching+0x12/0xc0 [ 1345.200307][T27478] __alloc_frozen_pages_noprof+0x19a/0x2ba0 [ 1345.200338][T27478] ? __alloc_frozen_pages_noprof+0x2b1/0x2ba0 [ 1345.200369][T27478] ? __lock_acquire+0x4a5/0x2630 [ 1345.200404][T27478] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1345.200433][T27478] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1345.200463][T27478] ? find_held_lock+0x2b/0x80 [ 1345.200483][T27478] ? bpf_ksym_find+0x124/0x1c0 [ 1345.200507][T27478] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1345.200538][T27478] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1345.200561][T27478] ? policy_nodemask+0xed/0x4f0 [ 1345.200584][T27478] alloc_pages_mpol+0x1fb/0x550 [ 1345.200606][T27478] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1345.200627][T27478] ? do_raw_spin_lock+0x128/0x260 [ 1345.200655][T27478] ? find_held_lock+0x2b/0x80 [ 1345.200672][T27478] ? __pud_alloc+0x4f6/0x690 [ 1345.200698][T27478] alloc_pages_noprof+0x136/0x390 [ 1345.200728][T27478] __pmd_alloc+0x3b/0x950 [ 1345.200759][T27478] ? __pud_alloc+0x4fb/0x690 [ 1345.200784][T27478] copy_page_range+0x45b6/0x6600 [ 1345.200816][T27478] ? __lock_acquire+0x4a5/0x2630 [ 1345.200857][T27478] ? mas_wr_store_entry+0x6d2/0x2390 [ 1345.200882][T27478] ? __pfx_copy_page_range+0x10/0x10 [ 1345.200913][T27478] ? mas_store+0x666/0xac0 [ 1345.200937][T27478] ? __pfx_mas_store+0x10/0x10 [ 1345.200964][T27478] ? __pfx___vma_start_write+0x10/0x10 [ 1345.201001][T27478] dup_mmap+0xd25/0x2180 [ 1345.201033][T27478] ? __pfx_dup_mmap+0x10/0x10 [ 1345.201054][T27478] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 1345.201102][T27478] ? __lock_acquire+0x4a5/0x2630 [ 1345.201128][T27478] ? find_held_lock+0x2b/0x80 [ 1345.201146][T27478] ? __percpu_counter_init_many+0x2bc/0x3b0 [ 1345.201190][T27478] copy_process+0x7523/0x7a40 [ 1345.201225][T27478] ? __pfx_copy_process+0x10/0x10 [ 1345.201262][T27478] ? find_held_lock+0x2b/0x80 [ 1345.201296][T27478] ? futex_private_hash_put+0x107/0x1c0 [ 1345.201339][T27478] kernel_clone+0xfc/0x9a0 [ 1345.201378][T27478] ? __pfx_kernel_clone+0x10/0x10 [ 1345.201438][T27478] __do_sys_clone+0xd9/0x120 [ 1345.201476][T27478] ? __pfx___do_sys_clone+0x10/0x10 [ 1345.201550][T27478] do_syscall_64+0x106/0xf80 [ 1345.201581][T27478] ? clear_bhb_loop+0x40/0x90 [ 1345.201619][T27478] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1345.201652][T27478] RIP: 0033:0x7f181539c819 [ 1345.201696][T27478] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1345.201734][T27478] RSP: 002b:00007f18135f5fd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1345.201765][T27478] RAX: ffffffffffffffda RBX: 00007f1815615fa0 RCX: 00007f181539c819 [ 1345.201785][T27478] RDX: 0000000000000000 RSI: 0000000000001300 RDI: 0000000000000000 [ 1345.201804][T27478] RBP: 00007f1815432c91 R08: 0000000000000000 R09: 0000000000000000 [ 1345.201823][T27478] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1345.201841][T27478] R13: 00007f1815616038 R14: 00007f1815615fa0 R15: 00007ffcfcebc318 [ 1345.201881][T27478] [ 1345.574282][T27484] block2mtd: illegal erase size [ 1346.272854][T27497] block2mtd: illegal erase size [ 1347.132094][T27507] netlink: 504 bytes leftover after parsing attributes in process `syz.2.5932'. [ 1347.152191][T27502] netlink: 350 bytes leftover after parsing attributes in process `syz.2.5932'. [ 1347.180679][T27508] block2mtd: illegal erase size [ 1347.388938][T27517] netlink: 504 bytes leftover after parsing attributes in process `syz.1.5942'. [ 1347.418358][T27517] netlink: 350 bytes leftover after parsing attributes in process `syz.1.5942'. [ 1348.162200][T27515] zswap: compressor not available [ 1350.095766][T27560] block2mtd: illegal erase size [ 1350.760774][T27573] block2mtd: illegal erase size [ 1351.096804][T27577] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5952'. [ 1352.393201][T27589] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5957'. [ 1352.444436][T27592] block2mtd: illegal erase size [ 1353.156974][T27608] Unable to find swap-space signature [ 1353.384530][T27611] netlink: 330 bytes leftover after parsing attributes in process `syz.1.5961'. [ 1353.763726][T27617] netlink: 504 bytes leftover after parsing attributes in process `syz.3.5964'. [ 1353.782855][T27617] netlink: 350 bytes leftover after parsing attributes in process `syz.3.5964'. [ 1354.025508][T27625] binder: 27624:27625 ioctl 400c620e 0 returned -14 [ 1354.337193][ T30] audit: type=1800 audit(1775344176.110:22): pid=27628 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.5966" name="SYSV00000008" dev="tmpfs" ino=0 res=0 errno=0 [ 1354.922615][T27636] block2mtd: illegal erase size [ 1355.778559][T27640] netlink: 'syz.0.5978': attribute type 11 has an invalid length. [ 1355.787114][T27640] netlink: 'syz.0.5978': attribute type 11 has an invalid length. [ 1355.795225][T27640] netlink: 'syz.0.5978': attribute type 11 has an invalid length. [ 1356.161850][T27646] block2mtd: illegal erase size [ 1357.133305][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1357.145839][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1357.158289][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1357.170746][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1357.183451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1357.196018][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1357.208601][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1357.221098][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1357.233768][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1357.246413][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1359.771953][ T0] NOHZ tick-stop error: local softirq work is pending, handler #c2!!! [ 1360.181453][ T0] NOHZ tick-stop error: local softirq work is pending, handler #42!!! [ 1360.591748][ T0] NOHZ tick-stop error: local softirq work is pending, handler #02!!! [ 1361.001379][ T0] NOHZ tick-stop error: local softirq work is pending, handler #02!!! [ 1361.922214][ T0] NOHZ tick-stop error: local softirq work is pending, handler #42!!! [ 1362.141338][ C1] net_ratelimit: 19753 callbacks suppressed [ 1362.141358][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1362.159930][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1362.172422][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1362.185075][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1362.199452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1362.213830][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1362.226899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1362.239474][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1362.252575][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1362.265658][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1362.272053][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 1366.692987][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 1367.151518][ C1] net_ratelimit: 18733 callbacks suppressed [ 1367.151546][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1367.170838][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1367.183594][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1367.196426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1367.209504][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1367.222143][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1367.234965][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1367.247851][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1367.261060][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1367.273534][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1372.161386][ C1] net_ratelimit: 19307 callbacks suppressed [ 1372.161414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1372.161663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1372.168803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1372.180937][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1372.193545][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1372.205715][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1372.217886][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1372.229822][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1372.242014][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1372.254247][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1376.171277][ C0] sched: DL replenish lagged too much [ 1377.171459][ C0] net_ratelimit: 19116 callbacks suppressed [ 1377.171487][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1377.171693][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1377.178547][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1377.190734][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1377.203176][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1377.215426][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1377.227841][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1377.240373][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1377.252273][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1377.264534][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1380.699299][T27673] netlink: 350 bytes leftover after parsing attributes in process `syz.3.5975'. [ 1382.181544][ C1] net_ratelimit: 18682 callbacks suppressed [ 1382.181574][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1382.181664][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1382.188468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1382.200538][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1382.213163][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1382.225141][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1382.237142][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1382.249103][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1382.261497][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1382.274137][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1387.191653][ C0] net_ratelimit: 18426 callbacks suppressed [ 1387.191662][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1387.191680][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1387.192222][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1387.199041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1387.212359][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1387.225097][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1387.237196][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1387.249906][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1387.262003][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1387.274568][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1392.201401][ C1] net_ratelimit: 16907 callbacks suppressed [ 1392.201430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1392.201950][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1392.208209][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1392.220825][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1392.233294][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1392.245987][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1392.258687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1392.270775][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1392.285000][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1392.298006][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1397.211380][ C0] net_ratelimit: 14185 callbacks suppressed [ 1397.211409][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1397.211515][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1397.218310][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1397.230605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1397.243730][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1397.257644][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1397.271027][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1397.284726][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1397.300540][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1397.311932][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1402.221422][ C1] net_ratelimit: 14066 callbacks suppressed [ 1402.221452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1402.222521][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1402.227845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1402.241545][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1402.252417][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1402.264664][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1402.276744][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1402.289164][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1402.301282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1402.313276][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1407.231276][ C0] net_ratelimit: 14048 callbacks suppressed [ 1407.231306][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1407.231351][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1407.237642][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1407.249801][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1407.261893][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1407.274951][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1407.288049][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1407.298990][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1407.312546][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1407.323463][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1412.241449][ C1] net_ratelimit: 13928 callbacks suppressed [ 1412.241477][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1412.241819][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1412.248183][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1412.262174][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1412.274451][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1412.287079][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1412.301619][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1412.313596][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1412.326704][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1412.339227][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1417.251428][ C1] net_ratelimit: 13639 callbacks suppressed [ 1417.251456][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1417.251904][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1417.258576][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1417.270542][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1417.283078][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1417.295614][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1417.307554][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1417.319574][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1417.331711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1417.343809][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1422.261360][ C1] net_ratelimit: 14017 callbacks suppressed [ 1422.261390][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1422.262023][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1422.268347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1422.281520][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1422.295284][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1422.309244][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1422.322677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1422.335198][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1422.348075][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1422.360666][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1427.271375][ C1] net_ratelimit: 13887 callbacks suppressed [ 1427.271403][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1427.272256][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1427.278354][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1427.291548][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1427.306271][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1427.320401][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1427.334892][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1427.348847][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1427.362950][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1427.377635][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1432.281726][ C1] net_ratelimit: 13684 callbacks suppressed [ 1432.281754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1432.282091][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1432.289362][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1432.303280][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1432.318229][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1432.331709][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1432.345885][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1432.359248][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1432.372345][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1432.385465][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1437.291464][ C1] net_ratelimit: 13714 callbacks suppressed [ 1437.291488][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1437.291492][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1437.292295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1437.298722][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1437.311598][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1437.325155][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1437.338656][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1437.351584][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1437.364764][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1437.378154][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1442.301566][ C1] net_ratelimit: 13721 callbacks suppressed [ 1442.301590][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1442.301594][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1442.301952][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1442.308129][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1442.320477][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1442.332778][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1442.346576][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1442.358019][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1442.371740][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1442.383213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1447.311435][ C1] net_ratelimit: 14290 callbacks suppressed [ 1447.311464][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1447.311494][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1447.318084][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1447.331396][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1447.343346][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1447.357947][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1447.369979][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1447.383340][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1447.394490][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1447.407294][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1452.321395][ C1] net_ratelimit: 13923 callbacks suppressed [ 1452.321422][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1452.322227][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1452.328859][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1452.343058][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1452.356600][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1452.369111][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1452.381764][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1452.394264][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1452.407350][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1452.420579][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1457.331385][ C1] net_ratelimit: 13913 callbacks suppressed [ 1457.331414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1457.332408][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1457.338083][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1457.351247][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1457.362430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1457.374772][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1457.387091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1457.399746][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1457.412488][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1457.424767][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1462.341399][ C0] net_ratelimit: 13983 callbacks suppressed [ 1462.341427][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1462.341597][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1462.347768][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1462.359895][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1462.372241][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1462.384405][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1462.396441][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1462.408584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1462.420636][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1462.434338][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1467.351457][ C1] net_ratelimit: 13974 callbacks suppressed [ 1467.351485][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1467.351565][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1467.358677][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1467.373333][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1467.385573][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1467.399542][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1467.412194][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1467.426040][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1467.438217][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1467.451031][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1472.361427][ C0] net_ratelimit: 14261 callbacks suppressed [ 1472.361456][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1472.361525][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1472.369380][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1472.380502][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1472.392546][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1472.404623][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1472.417337][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1472.429428][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1472.442064][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1472.454154][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1477.371246][ C1] net_ratelimit: 14006 callbacks suppressed [ 1477.371276][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1477.371591][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1477.377907][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1477.390454][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1477.402844][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1477.415960][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1477.429235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1477.441603][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1477.454222][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1477.467532][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1482.381406][ C1] net_ratelimit: 14340 callbacks suppressed [ 1482.381436][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1482.381922][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1482.387825][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1482.399939][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1482.412377][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1482.425591][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1482.438056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1482.450558][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1482.463220][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1482.475323][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1487.391363][ C1] net_ratelimit: 14450 callbacks suppressed [ 1487.391391][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1487.392152][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1487.398094][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1487.411864][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1487.423475][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1487.435864][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1487.448598][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1487.460798][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1487.472946][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1487.485455][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1492.401664][ C1] net_ratelimit: 14195 callbacks suppressed [ 1492.401678][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1492.401695][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1492.402144][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1492.408062][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1492.420316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1492.433393][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1492.445584][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1492.459677][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1492.471037][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1492.483074][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1493.061215][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 1493.069017][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P23414/1:b..l P27649/1:b..l P27664/1:b..l [ 1493.081770][ C0] rcu: (detected by 0, t=10502 jiffies, g=200461, q=440 ncpus=2) [ 1493.089818][ C0] task:syz-executor state:R running task stack:25416 pid:27664 tgid:27664 ppid:5809 task_flags:0x400000 flags:0x00080000 [ 1493.106185][ C0] Call Trace: [ 1493.109616][ C0] [ 1493.112684][ C0] __schedule+0xfee/0x6120 [ 1493.117164][ C0] ? find_held_lock+0x2b/0x80 [ 1493.121959][ C0] ? is_bpf_text_address+0x8a/0x1a0 [ 1493.127233][ C0] ? is_bpf_text_address+0x8a/0x1a0 [ 1493.133260][ C0] ? __pfx___schedule+0x10/0x10 [ 1493.138352][ C0] ? is_bpf_text_address+0x94/0x1a0 [ 1493.144494][ C0] ? rcu_is_watching+0x12/0xc0 [ 1493.149686][ C0] preempt_schedule_irq+0x50/0x90 [ 1493.155582][ C0] irqentry_exit+0x17b/0x670 [ 1493.161387][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1493.167705][ C0] RIP: 0010:__orc_find+0x49/0xf0 [ 1493.172775][ C0] Code: 00 49 89 fe 48 89 f0 49 39 fc 72 7b 48 b9 00 00 00 00 00 fc ff df 49 89 ff 48 89 fd eb 0c 48 8d 6b 04 49 89 df 49 39 ec 72 4e <4c> 89 e2 48 29 ea 48 89 d6 48 c1 ea 3f 48 c1 fe 02 48 01 f2 48 d1 [ 1493.193753][ C0] RSP: 0018:ffffc9000d12f138 EFLAGS: 00000212 [ 1493.200237][ C0] RAX: ffffffff91777f46 RBX: ffffffff90f165c4 RCX: dffffc0000000000 [ 1493.208451][ C0] RDX: ffffffff81aecd9f RSI: 0000000000000000 RDI: ffffffff90f165b8 [ 1493.217024][ C0] RBP: ffffffff90f165b8 R08: ffffffff91777f70 R09: 0000000000000007 [ 1493.225380][ C0] R10: 0000000000000200 R11: 000000000000aecd R12: ffffffff90f165c0 [ 1493.234365][ C0] R13: ffffffff81aecd22 R14: ffffffff90f165b8 R15: ffffffff90f165b8 [ 1493.242761][ C0] ? arch_stack_walk+0x72/0xf0 [ 1493.248137][ C0] ? arch_stack_walk+0xef/0xf0 [ 1493.252999][ C0] ? arch_stack_walk+0x72/0xf0 [ 1493.258099][ C0] unwind_next_frame+0x2ec/0x1ea0 [ 1493.263353][ C0] ? arch_stack_walk+0x73/0xf0 [ 1493.268264][ C0] __unwind_start+0x3d1/0x7f0 [ 1493.273171][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1493.279941][ C0] arch_stack_walk+0x73/0xf0 [ 1493.284796][ C0] ? arch_stack_walk+0x73/0xf0 [ 1493.289816][ C0] stack_trace_save+0x8e/0xc0 [ 1493.294698][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 1493.300596][ C0] save_stack+0x162/0x1e0 [ 1493.304987][ C0] ? __pfx_save_stack+0x10/0x10 [ 1493.309898][ C0] ? __lock_acquire+0x4a5/0x2630 [ 1493.314990][ C0] __set_page_owner+0x8c/0x540 [ 1493.320071][ C0] ? __pfx___set_page_owner+0x10/0x10 [ 1493.325730][ C0] ? bad_range+0x261/0x400 [ 1493.330301][ C0] ? lockdep_hardirqs_on+0x78/0x100 [ 1493.335647][ C0] post_alloc_hook+0x153/0x170 [ 1493.340478][ C0] get_page_from_freelist+0x111d/0x3140 [ 1493.346107][ C0] ? __pfx___might_resched+0x10/0x10 [ 1493.351587][ C0] ? prepare_alloc_pages+0x16d/0x5f0 [ 1493.356963][ C0] __alloc_frozen_pages_noprof+0x27c/0x2ba0 [ 1493.363731][ C0] ? rcu_is_watching+0x12/0xc0 [ 1493.368614][ C0] ? trace_mm_page_alloc+0x17a/0x1d0 [ 1493.373969][ C0] ? __alloc_frozen_pages_noprof+0x2b1/0x2ba0 [ 1493.380542][ C0] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1493.387493][ C0] ? stack_trace_save+0x8e/0xc0 [ 1493.392500][ C0] ? stack_depot_save_flags+0x27/0x9d0 [ 1493.398262][ C0] ? is_bpf_text_address+0x8a/0x1a0 [ 1493.403631][ C0] ? is_bpf_text_address+0x8a/0x1a0 [ 1493.408905][ C0] ? kasan_save_stack+0x3f/0x50 [ 1493.413979][ C0] ? kasan_save_track+0x14/0x30 [ 1493.418956][ C0] ? kmem_cache_alloc_node_noprof+0x25a/0x6f0 [ 1493.425477][ C0] ? alloc_vmap_area+0x640/0x2bd0 [ 1493.430702][ C0] ? __get_vm_area_node+0x1ca/0x330 [ 1493.435947][ C0] ? __vmalloc_node_range_noprof+0x213/0x1530 [ 1493.442190][ C0] ? vmalloc_user_noprof+0x9e/0xe0 [ 1493.447556][ C0] ? kcov_ioctl+0x4c/0x720 [ 1493.452239][ C0] ? __x64_sys_ioctl+0x18e/0x210 [ 1493.457319][ C0] ? do_syscall_64+0x106/0xf80 [ 1493.462226][ C0] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1493.468738][ C0] alloc_pages_bulk_noprof+0x782/0x1490 [ 1493.474381][ C0] ? __pfx_alloc_pages_bulk_noprof+0x10/0x10 [ 1493.480593][ C0] ? alloc_pages_noprof+0x238/0x390 [ 1493.485848][ C0] __kasan_populate_vmalloc+0xf0/0x210 [ 1493.491518][ C0] alloc_vmap_area+0x95d/0x2bd0 [ 1493.496858][ C0] ? __pfx_alloc_vmap_area+0x10/0x10 [ 1493.502250][ C0] __get_vm_area_node+0x1ca/0x330 [ 1493.507502][ C0] ? kcov_ioctl+0x4c/0x720 [ 1493.512633][ C0] __vmalloc_node_range_noprof+0x213/0x1530 [ 1493.519132][ C0] ? kcov_ioctl+0x4c/0x720 [ 1493.523993][ C0] ? kcov_ioctl+0x4c/0x720 [ 1493.528685][ C0] ? do_vfs_ioctl+0x226/0x13e0 [ 1493.533878][ C0] ? __pfx___vmalloc_node_range_noprof+0x10/0x10 [ 1493.540361][ C0] ? hook_file_ioctl_common+0x146/0x410 [ 1493.546039][ C0] ? kcov_ioctl+0x4c/0x720 [ 1493.551164][ C0] vmalloc_user_noprof+0x9e/0xe0 [ 1493.556376][ C0] ? kcov_ioctl+0x4c/0x720 [ 1493.560866][ C0] kcov_ioctl+0x4c/0x720 [ 1493.565326][ C0] ? __pfx_kcov_ioctl+0x10/0x10 [ 1493.570361][ C0] __x64_sys_ioctl+0x18e/0x210 [ 1493.575369][ C0] do_syscall_64+0x106/0xf80 [ 1493.580071][ C0] ? clear_bhb_loop+0x40/0x90 [ 1493.585644][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1493.593184][ C0] RIP: 0033:0x7fb4e519c4ab [ 1493.597918][ C0] RSP: 002b:00007fff4cf1e620 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1493.606911][ C0] RAX: ffffffffffffffda RBX: 0000000000100000 RCX: 00007fb4e519c4ab [ 1493.615016][ C0] RDX: 0000000000100000 RSI: ffffffff80086301 RDI: 00000000000000d7 [ 1493.623102][ C0] RBP: 00007fb4e5415f40 R08: 0000000000000000 R09: 0000000000000000 [ 1493.631505][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1493.639544][ C0] R13: 0000000000000003 R14: 00007fff4cf1e8d8 R15: 0000000000000000 [ 1493.647818][ C0] [ 1493.650979][ C0] task:syz.0.5971 state:R running task stack:26536 pid:27649 tgid:27649 ppid:23762 task_flags:0x40044c flags:0x00080003 [ 1493.664826][ C0] Call Trace: [ 1493.668141][ C0] [ 1493.671271][ C0] __schedule+0xfee/0x6120 [ 1493.675951][ C0] ? find_held_lock+0x2b/0x80 [ 1493.680737][ C0] ? unwind_next_frame+0x3c8/0x1ea0 [ 1493.686294][ C0] ? do_exit+0x8b8/0x2b60 [ 1493.690806][ C0] ? __pfx___schedule+0x10/0x10 [ 1493.695728][ C0] ? rcu_is_watching+0x12/0xc0 [ 1493.700660][ C0] preempt_schedule_irq+0x50/0x90 [ 1493.705753][ C0] irqentry_exit+0x17b/0x670 [ 1493.710589][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1493.716736][ C0] RIP: 0010:lock_acquire+0x5e/0x380 [ 1493.722762][ C0] Code: 05 3b 8d 29 12 83 f8 07 0f 87 f0 00 00 00 48 0f a3 05 06 89 f5 0e 0f 82 c2 02 00 00 8b 35 ce bc f5 0e 85 f6 0f 85 dd 00 00 00 <48> 8b 44 24 30 65 48 2b 05 dd 8c 29 12 0f 85 02 03 00 00 48 83 c4 [ 1493.742529][ C0] RSP: 0018:ffffc900040d70d8 EFLAGS: 00000206 [ 1493.748746][ C0] RAX: 0000000000000046 RBX: 0000000000000000 RCX: 0000000000000000 [ 1493.757328][ C0] RDX: 0000000000000000 RSI: ffffffff8de5cea9 RDI: ffffffff8c1b1da0 [ 1493.766171][ C0] RBP: ffffffff8e7e7760 R08: 0000000086db7919 R09: 0000000000000007 [ 1493.774481][ C0] R10: 0000000000000200 R11: 0000000000000000 R12: 0000000000000002 [ 1493.783039][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1493.791087][ C0] ? evict+0x3c2/0xad0 [ 1493.795514][ C0] ? iput.part.0+0x605/0xf50 [ 1493.800157][ C0] ? iput+0x35/0x40 [ 1493.804020][ C0] ? dentry_unlink_inode+0x2a1/0x490 [ 1493.809352][ C0] ? __dentry_kill+0x1d0/0x600 [ 1493.814233][ C0] __update_page_owner_free_handle.isra.0+0x4d/0x4d0 [ 1493.821047][ C0] ? __update_page_owner_free_handle.isra.0+0x3c/0x4d0 [ 1493.827990][ C0] __reset_page_owner+0x93/0x190 [ 1493.833044][ C0] free_unref_folios+0xaea/0x1790 [ 1493.838456][ C0] folios_put_refs+0x53c/0x840 [ 1493.843511][ C0] ? __pfx_folios_put_refs+0x10/0x10 [ 1493.848929][ C0] ? folio_batch_remove_exceptionals+0x115/0x1a0 [ 1493.855521][ C0] shmem_undo_range+0x5e5/0x1570 [ 1493.860548][ C0] ? __pfx_shmem_undo_range+0x10/0x10 [ 1493.866073][ C0] ? percpu_counter_add_batch+0xb9/0x230 [ 1493.871843][ C0] shmem_evict_inode+0x39e/0xbd0 [ 1493.876852][ C0] ? inode_wait_for_writeback+0x171/0x390 [ 1493.882610][ C0] ? __pfx_shmem_evict_inode+0x10/0x10 [ 1493.888134][ C0] ? __pfx_inode_wait_for_writeback+0x10/0x10 [ 1493.894302][ C0] ? find_held_lock+0x2b/0x80 [ 1493.899045][ C0] ? evict+0x37e/0xad0 [ 1493.903170][ C0] ? evict+0x37e/0xad0 [ 1493.907348][ C0] ? __pfx_shmem_evict_inode+0x10/0x10 [ 1493.912875][ C0] evict+0x3c2/0xad0 [ 1493.916935][ C0] ? find_held_lock+0x2b/0x80 [ 1493.921853][ C0] ? __pfx_evict+0x10/0x10 [ 1493.926341][ C0] ? iput.part.0+0x5fd/0xf50 [ 1493.931009][ C0] iput.part.0+0x605/0xf50 [ 1493.935634][ C0] ? __pfx_inode_just_drop+0x10/0x10 [ 1493.941004][ C0] iput+0x35/0x40 [ 1493.944699][ C0] dentry_unlink_inode+0x2a1/0x490 [ 1493.949919][ C0] __dentry_kill+0x1d0/0x600 [ 1493.954590][ C0] finish_dput+0x76/0x480 [ 1493.958985][ C0] dput.part.0+0x456/0x570 [ 1493.963544][ C0] dput+0x1f/0x30 [ 1493.967200][ C0] __fput+0x519/0xb40 [ 1493.971492][ C0] task_work_run+0x150/0x240 [ 1493.976252][ C0] ? __pfx_task_work_run+0x10/0x10 [ 1493.981451][ C0] ? do_raw_spin_unlock+0x145/0x1e0 [ 1493.986729][ C0] do_exit+0x8b8/0x2b60 [ 1493.990945][ C0] ? __pfx_do_exit+0x10/0x10 [ 1493.995590][ C0] ? do_raw_spin_lock+0x128/0x260 [ 1494.000682][ C0] ? find_held_lock+0x2b/0x80 [ 1494.005421][ C0] ? get_signal+0x7e0/0x21e0 [ 1494.010106][ C0] do_group_exit+0xd5/0x2a0 [ 1494.014733][ C0] get_signal+0x1ec7/0x21e0 [ 1494.019283][ C0] ? lockdep_hardirqs_on+0x78/0x100 [ 1494.024642][ C0] ? __pfx_get_signal+0x10/0x10 [ 1494.029561][ C0] arch_do_signal_or_restart+0x91/0x770 [ 1494.035171][ C0] ? blkcg_maybe_throttle_current+0x5df/0xeb0 [ 1494.041518][ C0] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1494.047780][ C0] exit_to_user_mode_loop+0x86/0x4a0 [ 1494.053131][ C0] do_syscall_64+0x668/0xf80 [ 1494.057863][ C0] ? clear_bhb_loop+0x40/0x90 [ 1494.062791][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1494.069406][ C0] RIP: 0033:0x7f405f19c819 [ 1494.073939][ C0] RSP: 002b:00007ffe63f10a68 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 1494.082638][ C0] RAX: 0000000000000000 RBX: 00007f405f417da0 RCX: 00007f405f19c819 [ 1494.090751][ C0] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 1494.098791][ C0] RBP: 00007f405f417da0 R08: 0000000000000006 R09: 0000000000000000 [ 1494.107880][ C0] R10: 00007f405f417cb0 R11: 0000000000000246 R12: 000000000014b49e [ 1494.116824][ C0] R13: 00007f405f41609c R14: 000000000014b46c R15: 00007f405f416090 [ 1494.125214][ C0] [ 1494.128280][ C0] task:syz-executor state:R running task stack:24128 pid:23414 tgid:23414 ppid:1 task_flags:0x40054c flags:0x00080003 [ 1494.142826][ C0] Call Trace: [ 1494.146520][ C0] [ 1494.149497][ C0] __schedule+0xfee/0x6120 [ 1494.154069][ C0] ? __lock_acquire+0x4a5/0x2630 [ 1494.159438][ C0] ? __pfx___schedule+0x10/0x10 [ 1494.164485][ C0] ? rcu_is_watching+0x12/0xc0 [ 1494.170716][ C0] preempt_schedule_irq+0x50/0x90 [ 1494.176026][ C0] irqentry_exit+0x17b/0x670 [ 1494.180820][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1494.187287][ C0] RIP: 0010:unwind_next_frame+0x17a/0x1ea0 [ 1494.193252][ C0] Code: ea 03 0f b6 04 02 4c 89 f2 83 e2 07 38 d0 7f 08 84 c0 0f 85 f7 0a 00 00 48 89 e9 41 0f b6 45 35 48 ba 00 00 00 00 00 fc ff df <48> c1 e9 03 80 3c 11 00 0f 85 8b 16 00 00 4d 8b 7d 48 3c 01 49 83 [ 1494.213098][ C0] RSP: 0018:ffffc90011ee7668 EFLAGS: 00000246 [ 1494.219411][ C0] RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffffc90011ee7720 [ 1494.228383][ C0] RDX: dffffc0000000000 RSI: ffffffff8c1b1d20 RDI: ffffffff8e1318e8 [ 1494.236833][ C0] RBP: ffffc90011ee7720 R08: 0000000086db7919 R09: 0000000000000007 [ 1494.245114][ C0] R10: 0000000000000200 R11: 0000000000000000 R12: ffffc90011ee7728 [ 1494.253235][ C0] R13: ffffc90011ee76d8 R14: ffffc90011ee770d R15: ffff8880285d1e80 [ 1494.261728][ C0] ? unwind_next_frame+0x6fa/0x1ea0 [ 1494.267095][ C0] ? kcov_close+0x34/0x60 [ 1494.271643][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1494.278488][ C0] arch_stack_walk+0x94/0xf0 [ 1494.283778][ C0] ? kcov_close+0x34/0x60 [ 1494.288342][ C0] stack_trace_save+0x8e/0xc0 [ 1494.293495][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 1494.299643][ C0] ? __lock_acquire+0x4a5/0x2630 [ 1494.304864][ C0] save_stack+0x162/0x1e0 [ 1494.310054][ C0] ? __pfx_save_stack+0x10/0x10 [ 1494.315048][ C0] ? __free_frozen_pages+0x7e1/0x10d0 [ 1494.320464][ C0] ? vfree.part.0+0x12b/0x9d0 [ 1494.325286][ C0] ? vfree+0x55/0x80 [ 1494.329462][ C0] ? kcov_close+0x34/0x60 [ 1494.334474][ C0] ? page_ext_put+0x3e/0xd0 [ 1494.339414][ C0] __reset_page_owner+0x84/0x190 [ 1494.344434][ C0] __free_frozen_pages+0x7e1/0x10d0 [ 1494.349822][ C0] vfree.part.0+0x12b/0x9d0 [ 1494.354484][ C0] ? __pfx___might_resched+0x10/0x10 [ 1494.359852][ C0] ? __pfx_kcov_close+0x10/0x10 [ 1494.364758][ C0] ? rcu_is_watching+0x12/0xc0 [ 1494.369728][ C0] ? __pfx_kcov_close+0x10/0x10 [ 1494.374750][ C0] vfree+0x55/0x80 [ 1494.378649][ C0] kcov_close+0x34/0x60 [ 1494.383502][ C0] __fput+0x3ff/0xb40 [ 1494.387750][ C0] ? cleanup_mnt+0x263/0x450 [ 1494.392782][ C0] task_work_run+0x150/0x240 [ 1494.397527][ C0] ? __pfx_task_work_run+0x10/0x10 [ 1494.402709][ C0] do_exit+0x8b8/0x2b60 [ 1494.406936][ C0] ? __pfx_do_exit+0x10/0x10 [ 1494.411580][ C0] ? do_raw_spin_lock+0x128/0x260 [ 1494.416736][ C0] ? find_held_lock+0x2b/0x80 [ 1494.421425][ C0] ? get_signal+0x7e0/0x21e0 [ 1494.426237][ C0] do_group_exit+0xd5/0x2a0 [ 1494.430972][ C0] get_signal+0x1ec7/0x21e0 [ 1494.435714][ C0] ? __pfx_kernel_wait4+0x10/0x10 [ 1494.440828][ C0] ? __pfx_get_signal+0x10/0x10 [ 1494.445752][ C0] arch_do_signal_or_restart+0x91/0x770 [ 1494.451373][ C0] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1494.457668][ C0] exit_to_user_mode_loop+0x86/0x4a0 [ 1494.463039][ C0] do_syscall_64+0x668/0xf80 [ 1494.467826][ C0] ? clear_bhb_loop+0x40/0x90 [ 1494.473586][ C0] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1494.479550][ C0] RIP: 0033:0x7f181535d04e [ 1494.484178][ C0] RSP: 002b:00007ffcfcebc618 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 1494.493315][ C0] RAX: 000000000000037a RBX: 0000555591a58500 RCX: 00007f181535d04e [ 1494.501437][ C0] RDX: 0000000040000000 RSI: 00007ffcfcebc6bc RDI: ffffffffffffffff [ 1494.509551][ C0] RBP: 00007ffcfcebc6bc R08: 0000000000000000 R09: 0000000000000000 [ 1494.517633][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000108 [ 1494.525826][ C0] R13: 0000555591a6b9f0 R14: 000000000014b4dd R15: 00007ffcfcebc710 [ 1494.534251][ C0] [ 1494.537403][ C0] rcu: rcu_preempt kthread starved for 6467 jiffies! g200461 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 1494.548743][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 1494.558857][ C0] rcu: RCU grace-period kthread stack dump: [ 1494.564778][ C0] task:rcu_preempt state:R running task stack:27832 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 [ 1494.578582][ C0] Call Trace: [ 1494.581899][ C0] [ 1494.584972][ C0] __schedule+0xfee/0x6120 [ 1494.589560][ C0] ? __lock_acquire+0x4a5/0x2630 [ 1494.594553][ C0] ? __pfx___schedule+0x10/0x10 [ 1494.599639][ C0] ? find_held_lock+0x2b/0x80 [ 1494.604442][ C0] ? schedule+0x2bf/0x390 [ 1494.609024][ C0] schedule+0xdd/0x390 [ 1494.613170][ C0] schedule_timeout+0x127/0x280 [ 1494.618104][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 1494.623532][ C0] ? __pfx_process_timeout+0x10/0x10 [ 1494.629004][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 1494.634948][ C0] ? prepare_to_swait_event+0xdf/0x4a0 [ 1494.640477][ C0] rcu_gp_fqs_loop+0x1a9/0x900 [ 1494.645381][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 1494.650853][ C0] ? __pfx_rcu_gp_init+0x10/0x10 [ 1494.655867][ C0] ? __pfx_rcu_gp_cleanup+0x10/0x10 [ 1494.661160][ C0] ? rcu_is_watching+0x12/0xc0 [ 1494.666012][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1494.671875][ C0] rcu_gp_kthread+0x179/0x230 [ 1494.676695][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 1494.681979][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1494.687962][ C0] ? __kthread_parkme+0x18c/0x230 [ 1494.693069][ C0] ? kthread+0x13a/0x450 [ 1494.697487][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 1494.702830][ C0] kthread+0x370/0x450 [ 1494.707066][ C0] ? __pfx_kthread+0x10/0x10 [ 1494.712093][ C0] ret_from_fork+0x754/0xd80 [ 1494.716854][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 1494.722143][ C0] ? __switch_to+0x7b4/0x1120 [ 1494.726881][ C0] ? __pfx_kthread+0x10/0x10 [ 1494.731533][ C0] ret_from_fork_asm+0x1a/0x30 [ 1494.736411][ C0] [ 1494.739573][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 1494.746070][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1494.751352][ C1] NMI backtrace for cpu 1 [ 1494.751377][ C1] CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Tainted: G L syzkaller #0 PREEMPT(full) [ 1494.751418][ C1] Tainted: [L]=SOFTLOCKUP [ 1494.751427][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 [ 1494.751440][ C1] RIP: 0010:__orc_find+0xab/0xf0 [ 1494.751470][ C1] Code: 75 4b 48 63 13 48 01 da 49 39 d5 73 af 4c 8d 63 fc 49 39 ec 73 b2 4d 29 f7 49 c1 ff 02 4b 8d 14 7f 48 8d 04 50 48 83 c4 08 5b <5d> 41 5c 41 5d 41 5e 41 5f e9 c7 f3 d9 09 48 83 c4 08 31 c0 5b 5d [ 1494.751492][ C1] RSP: 0018:ffffc90000a07cc8 EFLAGS: 00000296 [ 1494.751514][ C1] RAX: ffffffff92173478 RBX: 0000000000000002 RCX: dffffc0000000000 [ 1494.751530][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff915bde84 [ 1494.751545][ C1] RBP: ffffffff915bde88 R08: ffffffff9217347e R09: 0000000000000007 [ 1494.751561][ C1] R10: 0000000000000200 R11: 0000000000095cb0 R12: ffffffff915bde84 [ 1494.751577][ C1] R13: ffffffff8a5cb0cc R14: ffffffff915bde84 R15: 0000000000000000 [ 1494.751592][ C1] FS: 0000000000000000(0000) GS:ffff888124440000(0000) knlGS:0000000000000000 [ 1494.751617][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1494.751633][ C1] CR2: 00007f27e3852753 CR3: 000000002b72e000 CR4: 00000000003526f0 [ 1494.751649][ C1] Call Trace: [ 1494.751657][ C1] [ 1494.751667][ C1] ? br_handle_frame+0xcdc/0x1520 [ 1494.751701][ C1] unwind_next_frame+0x2ec/0x1ea0 [ 1494.751724][ C1] ? br_handle_frame+0xcdd/0x1520 [ 1494.751756][ C1] ? br_nf_dev_queue_xmit+0x5c8/0x2a20 [ 1494.751791][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 1494.751817][ C1] arch_stack_walk+0x94/0xf0 [ 1494.751842][ C1] ? br_handle_frame+0xcdd/0x1520 [ 1494.751876][ C1] stack_trace_save+0x8e/0xc0 [ 1494.751899][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 1494.751921][ C1] ? lock_acquire+0x1cf/0x380 [ 1494.751951][ C1] ? lock_acquire+0x1cf/0x380 [ 1494.751978][ C1] kasan_save_stack+0x30/0x50 [ 1494.751999][ C1] ? kasan_save_stack+0x30/0x50 [ 1494.752018][ C1] ? kasan_save_track+0x14/0x30 [ 1494.752038][ C1] ? __kasan_slab_alloc+0x89/0x90 [ 1494.752069][ C1] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 1494.752101][ C1] ? skb_ext_add+0xfa/0x810 [ 1494.752126][ C1] ? br_nf_forward_ip.part.0+0x28/0x820 [ 1494.752158][ C1] ? br_nf_forward+0xfe5/0x19f0 [ 1494.752188][ C1] ? nf_hook_slow+0xbf/0x220 [ 1494.752219][ C1] ? __br_forward+0x2f6/0x970 [ 1494.752245][ C1] ? br_flood+0x37f/0x650 [ 1494.752272][ C1] ? br_handle_frame_finish+0xff4/0x1f60 [ 1494.752302][ C1] ? br_nf_hook_thresh+0x30d/0x420 [ 1494.752333][ C1] ? br_nf_pre_routing_finish_ipv6+0x769/0xfb0 [ 1494.752366][ C1] ? br_nf_pre_routing_ipv6+0x39c/0x8b0 [ 1494.752399][ C1] ? br_nf_pre_routing+0x90d/0x1550 [ 1494.752438][ C1] ? br_handle_frame+0xcdd/0x1520 [ 1494.752485][ C1] kasan_save_track+0x14/0x30 [ 1494.752506][ C1] __kasan_slab_alloc+0x89/0x90 [ 1494.752530][ C1] kmem_cache_alloc_noprof+0x241/0x6e0 [ 1494.752571][ C1] ? skb_ext_add+0xfa/0x810 [ 1494.752600][ C1] skb_ext_add+0xfa/0x810 [ 1494.752625][ C1] ? lock_acquire+0x1cf/0x380 [ 1494.752652][ C1] ? find_held_lock+0x2b/0x80 [ 1494.752675][ C1] ? net_generic+0xea/0x2a0 [ 1494.752705][ C1] br_nf_forward_ip.part.0+0x28/0x820 [ 1494.752740][ C1] br_nf_forward+0xfe5/0x19f0 [ 1494.752775][ C1] nf_hook_slow+0xbf/0x220 [ 1494.752808][ C1] __br_forward+0x2f6/0x970 [ 1494.752837][ C1] ? __pfx___br_forward+0x10/0x10 [ 1494.752865][ C1] ? __asan_memcpy+0x3c/0x60 [ 1494.752896][ C1] ? __pfx_br_forward_finish+0x10/0x10 [ 1494.752924][ C1] ? __skb_clone+0x570/0x760 [ 1494.752959][ C1] br_flood+0x37f/0x650 [ 1494.752991][ C1] br_handle_frame_finish+0xff4/0x1f60 [ 1494.753026][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1494.753060][ C1] ? __local_bh_enable_ip+0x9e/0x120 [ 1494.753087][ C1] ? ip6t_do_table+0xc1d/0x1c90 [ 1494.753114][ C1] ? __pfx_ip6t_do_table+0x10/0x10 [ 1494.753139][ C1] ? nf_hook_slow+0x167/0x220 [ 1494.753172][ C1] br_nf_hook_thresh+0x30d/0x420 [ 1494.753204][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1494.753238][ C1] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 1494.753282][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1494.753314][ C1] ? __pfx_nf_nat_ipv6_in+0x10/0x10 [ 1494.753344][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1494.753367][ C1] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1494.753391][ C1] br_nf_pre_routing_finish_ipv6+0x769/0xfb0 [ 1494.753434][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1494.753470][ C1] br_nf_pre_routing_ipv6+0x39c/0x8b0 [ 1494.753504][ C1] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 1494.753537][ C1] ? lock_acquire+0x1cf/0x380 [ 1494.753565][ C1] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 1494.753598][ C1] ? net_generic+0xea/0x2a0 [ 1494.753630][ C1] br_nf_pre_routing+0x90d/0x1550 [ 1494.753666][ C1] br_handle_frame+0xcdd/0x1520 [ 1494.753700][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 1494.753732][ C1] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1494.753767][ C1] ? __pfx_br_handle_frame+0x10/0x10 [ 1494.753799][ C1] __netif_receive_skb_core.constprop.0+0x6c5/0x3550 [ 1494.753830][ C1] ? rcu_is_watching+0x12/0xc0 [ 1494.753866][ C1] ? kmem_cache_free+0x124/0x6a0 [ 1494.753894][ C1] ? skb_release_data+0x7a0/0x9d0 [ 1494.753927][ C1] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 1494.753960][ C1] ? kfree_skbmem+0x19f/0x210 [ 1494.753986][ C1] ? sk_skb_reason_drop+0x114/0x1b0 [ 1494.754009][ C1] ? ip6_mc_input+0x51a/0xf50 [ 1494.754038][ C1] ? __pfx_ip6_mc_input+0x10/0x10 [ 1494.754066][ C1] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 1494.754096][ C1] ? __lock_acquire+0x4a5/0x2630 [ 1494.754126][ C1] ? process_backlog+0x32a/0x1580 [ 1494.754152][ C1] __netif_receive_skb_one_core+0xb0/0x1e0 [ 1494.754183][ C1] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 1494.754214][ C1] ? lock_acquire+0x1cf/0x380 [ 1494.754242][ C1] ? process_backlog+0x32a/0x1580 [ 1494.754271][ C1] ? process_backlog+0x32a/0x1580 [ 1494.754298][ C1] __netif_receive_skb+0x1f/0x120 [ 1494.754328][ C1] process_backlog+0x37a/0x1580 [ 1494.754361][ C1] __napi_poll.constprop.0+0xaf/0x450 [ 1494.754392][ C1] net_rx_action+0xa40/0xf20 [ 1494.754432][ C1] ? __pfx_net_rx_action+0x10/0x10 [ 1494.754472][ C1] ? rcu_is_watching+0x12/0xc0 [ 1494.754506][ C1] handle_softirqs+0x1eb/0x9e0 [ 1494.754532][ C1] ? __pfx_handle_softirqs+0x10/0x10 [ 1494.754560][ C1] __irq_exit_rcu+0xef/0x150 [ 1494.754583][ C1] irq_exit_rcu+0x9/0x30 [ 1494.754605][ C1] sysvec_apic_timer_interrupt+0xa3/0xc0 [ 1494.754640][ C1] [ 1494.754648][ C1] [ 1494.754657][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1494.754681][ C1] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 1494.754704][ C1] Code: a8 84 02 c3 cc cc cc cc 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 43 00 1d 00 fb f4 fc 35 03 00 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 1494.754725][ C1] RSP: 0018:ffffc90000197df0 EFLAGS: 00000246 [ 1494.754742][ C1] RAX: 00000000018c87c5 RBX: ffff88801e6b0000 RCX: ffffffff8b8e8c75 [ 1494.754758][ C1] RDX: 0000000000000000 RSI: ffffffff8de82fd4 RDI: ffffffff8c1b1da0 [ 1494.754773][ C1] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed10170a679d [ 1494.754788][ C1] R10: ffff8880b8533ceb R11: 0000000000000000 R12: 0000000000000001 [ 1494.754802][ C1] R13: ffffed1003cd6000 R14: 0000000000000001 R15: ffffffff90d9fc10 [ 1494.754822][ C1] ? ct_kernel_exit+0x125/0x180 [ 1494.754848][ C1] default_idle+0x9/0x10 [ 1494.754872][ C1] default_idle_call+0x6c/0xb0 [ 1494.754897][ C1] do_idle+0x464/0x590 [ 1494.754919][ C1] ? __pfx_do_idle+0x10/0x10 [ 1494.754945][ C1] cpu_startup_entry+0x4f/0x60 [ 1494.754967][ C1] start_secondary+0x21d/0x2d0 [ 1494.754997][ C1] ? __pfx_start_secondary+0x10/0x10 [ 1494.755028][ C1] common_startup_64+0x13e/0x148 [ 1494.755060][ C1] [ 1497.411417][ C1] net_ratelimit: 11899 callbacks suppressed [ 1497.411446][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1497.412626][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1497.417882][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1497.430174][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1497.442452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1497.454643][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1497.467588][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1497.480558][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1497.493551][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1497.506723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1502.421253][ C1] net_ratelimit: 14052 callbacks suppressed [ 1502.421282][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1502.422602][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1502.427848][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1502.439946][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1502.452088][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1502.464199][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1502.476120][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:f3:a6:36:2e:63, vlan:0) [ 1502.488126][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1502.500456][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:07:a3:ff:61:53, vlan:0) [ 1502.512795][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)