last executing test programs: 9.347276291s ago: executing program 0 (id=3783): r0 = openat$auto_binder_fops_binder_internal(0xffffffffffffff9c, &(0x7f0000000240)='/dev/binderfs/binder0\x00', 0x80000, 0x0) ppoll$auto(&(0x7f00000002c0)={r0, 0x101, 0x2}, 0x6, 0x0, 0x0, 0x8) 9.207564806s ago: executing program 0 (id=3784): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x200000000008000) mmap$auto(0xa, 0x3, 0x3, 0x800000000000eb4, 0xfffffffffffffffa, 0x4) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x20000084) setitimer$auto(0x2, &(0x7f0000000040)={{0x0, 0x5}, {0x0, 0x8}}, 0x0) mbind$auto(0x0, 0x100000004, 0x100000000, 0x0, 0x6, 0x2) getitimer$auto_ITIMER_PROF(0x2, 0x0) r0 = openat$auto_rtc_dev_fops_dev(0xffffffffffffff9c, &(0x7f0000000000), 0x40001, 0x0) getitimer$auto_ITIMER_PROF(0x2, &(0x7f0000000080)={{0x1, 0xeeb}, {0x6, 0x4}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_tipcv2(&(0x7f0000000040), 0xffffffffffffffff) r4 = openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bus/usb/003/001\x00', 0x42082, 0x0) socket(0x2, 0x1, 0x0) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x20400, 0x0) r5 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) write$auto(r5, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) mmap$auto(0x0, 0x9, 0x3, 0x8012, 0x3, 0x8000) sendmsg$auto_TIPC_NL_KEY_SET(r2, &(0x7f0000001fc0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0xe040) msgctl$auto_IPC_INFO(0x4e, 0x3, &(0x7f0000000180)={{0x2482, 0xee01, 0xee01, 0xd, 0x1, 0xfff, 0x5d}, &(0x7f0000000100)=0x7, &(0x7f0000000140)=0x3, 0x6, 0x5, 0x3, 0x9, 0xd5, 0x0, 0xc0, 0x6, @raw=0x9}) r7 = setfsuid$auto(0x0) sendmsg$auto_TIPC_NL_PUBL_GET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000c00)={0x8ec, r3, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_PUBL={0x89a, 0x3, 0x0, 0x1, [@typed={0xff0b, 0xf7, 0x0, 0x0, @u64=0x7}, @nested={0x7a8, 0x59, 0x0, 0x1, [@generic="b1813f1989eaad365af8c1432dd79cea", @nested={0x789, 0xdc, 0x0, 0x1, [@nested={0x31c, 0x83, 0x0, 0x1, [@nested={0x4, 0x157}, @typed={0xfd, 0xa3, 0x0, 0x0, @binary="865337eb5fc04c75c636b37f38127b7931fde039539e49505d999f8c3aeab371882a1673d26fd17791946c4e36aef4f8a40429ca7eae0295c2ea8198088b2c461984016218b8cde3a860efc58a98fa4240c8e6cbb5d7711660a79df382db6f07eb3d46628f217b8808434f28e55b2fd7425ce8a14dcf2ed022c3d43f1a00510bdaf02bf39a54ecea9869b46b29892fb6ce4809db875c24a2de0c62f4bc28fc6de7f20cfcbd9ea982772398fcc010b167f1f32402eeffbbe45f13a0cf67453865ad8e133d8a4b3212ab5e07ad20ae9fd8bcc8dbb604fd4dc5177ffbcfad6f4433d1ea444ad44168436690e8ddcc983fc8bf5e62a5883c117f89"}, @generic="e3bfa4b46e1eff184121e4d3196d8872355c05b5702ab6975d1ace5aa49e24de152b67ea13aa1158664da194c8732251ce11430bd716b18bdaf2fb13233f78bdd73df63f42600c27a9949d25059b4cfc84432bf6ee08694f9f75a8dd2d8848b56964bc9e768faf776b73fa26061a945ceeec1a7b2bb07a6ce646adc7535c740b2f04f83b159b883883c532a4b04a0eb5cf349bf51999c1bf2b01e167359953c8ddbc2a4b4b99c2c2d6577e842ef082", @nested={0x4, 0x51}, @generic="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"]}, @generic="08a6a3f500220bd8227ef572060a608950517de0f7894f851032c46df9271bf69f333c3dec883a87c98d9db44076381387f9b391ec62093a2b9146d996759b8e2c59ee4049da0acadad6ff9222ae3cfaf84b2e713effaf7411bafdd00c886ec4066ce2b78229118d070f85930f4b70c2cbd30216d05090868a0d8f9424b8b9b8f7e5f2f1346453af205e982d195942349caf2fa95e27", @typed={0x8, 0x31, 0x0, 0x0, @fd=r5}, @generic="92b96731e9f3a66bebe0b302e0f8bdffd0e2c3c251f1a1888deb410b46b2f9e430cdc63b1d1aed4d51599f036d3e4d779adcfa83419b172824d9a400265ce4f98ed63b75c028aaa6737023c7eb47b297924c67f838fb98fa4a25057721061a10691e2f3a83fdfbc5441a85af9a774c1da4fb8c9a664f766acda89071f635ccbdf917ca6e334afa986f52d875c0bd4cfb314eff4e2b084822efcd2aad21343b0df97c73e93d794b57a439d90c9de022595b2e82a412513177b396453c069ee856cfc8bc2ae54618a20c9bc338cfdb577c35fb7a17f8794a68251133", @generic="18f87a7a01fc16ca9c5ba870d75c601d4dbec41e6ea66b9b56113090af50c159d4ada2f9cfcdea14ab74244b57e7a22d5af98298f1c44f2ee27fb1f03e27e08f7fa403d9fca3fd6e08dcb8f3f12b15244f58501acbc706e2054cd737b4cb7633d8831bd7382083745b73dee2f999ab1c597bc90f104c5c865e1d3b7638da6307457aeecc2b233ebcd31311a0d45a5638dc4338805d34fb6a6440bb372f5daf707d5fa406ec5aa04b6879f81c431263f4b17fb9f7191bdce3", @typed={0x8, 0x125, 0x0, 0x0, @fd=r4}, @typed={0x8, 0x70, 0x0, 0x0, @u32=0x7}, @nested={0x227, 0x9b, 0x0, 0x1, [@nested={0x4, 0x8d}, @generic="acc3c9f0d821857a55dff924fdc09869f4307571b22b7f73fdf911733d59104a5fd210f09d8a43248b9bf24be2273af44c50e6ccaba064e684836f8f5fc4d214d17eaf823e92f1818d2ca6756875a93ddf8d91e461861a01e5968141cead6b9d0f392792b65bf454facdec5845db3682e78669740dfca29235f6365f773a4f8a5a958bacd40d42047d751ddd2a0ee0f8ec343041fa3f03f249fdef7818d22107165db18f7c15e04560ff53ac1a0c4f1c0c11febb7b4ee9b7b69a5b3a9c9cfde7173b9e892df6b7748d539c1c696e47ee3f", @nested={0x4, 0x5d}, @generic="bedf2fd6c3713cf6a8a42574c0986c9a294be424ce037b0c6409d255f75c31dd031358fc9f32a4cd7056e81b16cb8dd4cbc48e3724221b1ee9a7b86ee5bb0c949b432fc49dbb73a263cb24bf9571951d43db", @typed={0x8, 0x148, 0x0, 0x0, @uid=r6}, @nested={0x0, 0x113, 0x0, 0x1, [@nested={0x0, 0x13b, 0x0, 0x1, [@nested={0x0, 0xb7}, @typed={0x0, 0x104, 0x0, 0x0, @uid=r7}, @typed={0x0, 0xbd, 0x0, 0x0, @u64=0x1}, @generic="74cecfae81f93a1ddc2189a34ff726decc38927c3b1b0b7748a67287b1c2fa40dab7d1e8c283a99e972782bb407f0ca54887a6438252df41dfa1cefa7fb197bc99708b3288b00bc9c5f8198e3f59f9b05058c9f405332f8bde65105af497090e679f24c32c8b03b5d0732db8b2", @generic="ecc87f8fa7082f746b", @nested={0x0, 0x31}]}, @nested={0x0, 0x21, 0x0, 0x1, [@typed={0x0, 0xc5, 0x0, 0x0, @ipv6=@empty}, @typed={0x0, 0x43, 0x0, 0x0, @binary="1b244b70dc68bbd3476b1ce757a4ce6ff43c02546c2e5e4b97d052077605c8b12c29978e80bfc04e602707a6ef6e278aa3b21caa8a68ecc2d865ae5f8464100516362dbe2d3bb4a558f1f931351cc298c123ed50e6a3d698607c507764fc20d4ba9ccdeb9fd8a3eef864f6e806a3a557ccb3ab691ca3ea90fcd8dd394d8d87f927b1a03aada77734af932bf05a45895a8c72446d45596ba987001398"}, @generic="ca2021e533df1909e77f979c2a46c56c7ae10fd89a7bcdd90f22264912475ad50043f2fea0f4b93a45ee5d69d9377d1dd6096a0ddebacace807428c3a1149e9caae939457581a456616b938bb510934a68397d01264a3dc633cc5a146341b8104ed0a8e72fa685d8045edd961c18929cbf1b2ca080"]}, @nested={0x0, 0x21, 0x0, 0x1, [@nested={0x0, 0x61}, @nested={0x0, 0x114}, @typed={0x0, 0x150, 0x0, 0x0, @ipv6=@empty}, @generic="afdba60cfe8a9ea4751f1cdafe61e098ea49edcf5f1be14be050c48dd9907b45ca2d1b3a4a6cd6943fbe4e5b1d34486c1856bbea09a4fa05aa4ee3457d192534c872a4b819a3f9ef2468e20c11b79c9b751241c11c70a625933f92c7011a84893814cbacbc33f945648d95b3038d9a03219d73beb3ea1563a1c0"]}]}, @typed={0x14, 0xbd, 0x0, 0x0, @ipv6=@loopback}, @generic="13be2f01a0e6a05c79cda5689818f2c2606ab6101f30c1d22e264c7a7436c5e86e205ae4a8216160b1b3b6b8429f7f33433b5e6dacce59ecac8a13faedff0072874eed9fddaec156e74bbad45c4fcf7c386a07fa36d124362779d7aeeca583ecf0b68671f35775452dd2a0b0448fd7373254044bf2e5e07adc", @typed={0x8, 0x138, 0x0, 0x0, @u32=0x8}]}]}, @typed={0x8, 0x5, 0x0, 0x0, @u32=0xd}]}, @generic="3a93a5d323a041f90724e8fa43bdccc8c0e901789e65091cf9d8d94cb805c338bb8a10dfead02a02", @generic="4520c20622b4f4c9efab16e17d705a158ac8a08f7a717ec3419912519b553a7f3c93ea92ef7ee6b4739815627e61393e56d710a40723f01eeccb99b235ec3270bdba1cfc43fa28e6e7661aa0bae1c0a2de1c087b697eb6f1420fe244523b18958d78a6ffdb3b8302447158fc1171eda55097d292ff7d3dc2be1c6f227cd590c4faa0f95d997e682611807fe42e3ee54eea4b6abea48303338fafff2cb6df2dfa3a6854f50fe0dc0bf3b57e29c004eda6276a", @nested={0xc, 0x14a, 0x0, 0x1, [@nested={0x4, 0x10}, @nested={0x4, 0x147}]}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@typed={0x14, 0x99, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x42}}, @typed={0x24, 0xd2, 0x0, 0x0, @binary="6aeb653bc27114c56c950b19a150ee55df9646c41f360072b2abe1dd2ab195bf"}]}]}, 0x8ec}, 0x1, 0x0, 0x0, 0x40014}, 0x24044000) ioctl$auto_RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)={0x6, 0xa, 0x8, 0x80000000, 0xfffff2a2, 0xa, 0x3, 0x80000005}) 8.262188919s ago: executing program 0 (id=3793): mmap$auto(0x0, 0xaaf, 0x4000000000df, 0x40000000000eb1, 0xffffffffffffffff, 0x8000) r0 = socketpair$auto(0xb, 0xd, 0xfffffffd, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket(0xa, 0x1, 0x84) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x11}}, 0x54) madvise$auto(0x4000000, 0xffffffffffff0085, 0x1004) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000001c0)='/dev/audio1\x00', 0x100000a3d9) r2 = openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f00000000c0), 0x400000, 0x0) ioctl$auto_VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000000140)=r0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) r3 = openat$auto_blk_mq_debugfs_fops_blk_mq_debugfs(0xffffffffffffff9c, 0x0, 0x40980, 0x0) pread64$auto(r3, 0x0, 0x1000f42d, 0x100) sysfs$auto(0x2, 0x23, 0x0) r4 = socket(0x2b, 0x1, 0x0) setsockopt$auto(r4, 0x1, 0x3, &(0x7f0000000380)='nl80211\x00', 0x8) unshare$auto(0x40000080) r5 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r5, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x28, 0x1, 0x0) connect$auto(0x3, &(0x7f00000000c0)=@tipc=@id={0x1e, 0x3, 0x3, {0x4e20, 0x2}}, 0x52) r6 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/virtual/net/bpq2/statistics/rx_missed_errors\x00', 0x48500, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r6, &(0x7f00000010c0)=""/4090, 0xffa) socket(0x2, 0x1, 0x106) openat$auto_blk_mq_debugfs_fops_blk_mq_debugfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/block/nbd11/hctx0/busy\x00', 0x60000, 0x0) 6.586048296s ago: executing program 0 (id=3788): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x14be02, 0x0) mmap$auto(0x0, 0x4000b, 0x7, 0x9b72, 0x7, 0x28000) socket(0x1e, 0xa, 0x8000000) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r1, 0x0, 0x20) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r2, &(0x7f0000000200)={0x0, 0x7}, 0x3) bpf$auto_BPF_MAP_DELETE_ELEM(0x3, 0x0, 0x401) socket(0xa, 0x1, 0x84) connect$auto(0x3, &(0x7f00000001c0)=@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x53) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) io_uring_setup$auto(0x243e, 0x0) setsockopt$auto(0x3, 0x1, 0x1d, 0x0, 0x8) listen$auto(0x3, 0x83) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/zram-control/hot_add\x00', 0x20800, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r3, &(0x7f0000000ec0)=""/4096, 0x1000) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) mmap$auto(0x0, 0x2020006, 0x3, 0x40000eb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) madvise$auto(0x0, 0xffffffffffff0001, 0x15) r4 = prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) listxattrat$auto(r4, 0x0, 0x4, 0x0, 0x10000000000000) close_range$auto(0x2, r0, 0x0) io_uring_setup$auto(0x6, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) socketpair$auto(0x1e, 0x1, 0x8000000000000000, 0x0) mmap$auto(0x2, 0x5, 0xdf, 0xeb1, 0x401, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) 5.787088985s ago: executing program 3 (id=3791): mkdir$auto(&(0x7f0000000100)='}[,&*}\x00', 0x8001) mount$auto(0x0, &(0x7f0000000040)='}[,&*}\x00', &(0x7f0000000080)='nfsd\x00', 0x7, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00'}) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001400c7"], 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x400c000) r1 = socket(0x10, 0x2, 0x4) write$auto(r1, &(0x7f0000000000)='-\x00', 0x2fb) openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/lru_gen\x00', 0xc0080, 0x0) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/midiC2D2\x00', 0x0, 0x0) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) iopl$auto(0x3) clone$auto(0x5, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffd, 0x100000000) syz_clone(0x700, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_taskstats(&(0x7f0000000140), r3) sendmsg$auto_TASKSTATS_CMD_GET(r3, 0x0, 0x20000840) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r2, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) openat$auto_proc_pid_maps_operations_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/ib_srp/parameters/indirect_sg_entries\x00', 0x80800, 0x0) name_to_handle_at$auto(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/blkio.bfq.dequeue\x00', &(0x7f0000001100)={0x8, 0xd, "2e5710c910109d7e"}, &(0x7f0000001180), 0x2) sendfile$auto(0x1, r4, 0x0, 0x400007ffff000) bpf$auto(0x0, &(0x7f0000000780)=@link_update={0xa, @new_map_fd=0x5, 0x4007, @old_prog_fd=0x13b}, 0xa3) fsconfig$auto(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket(0x2, 0x3, 0xa) close_range$auto(0x0, 0xfffffffffffff000, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) bpf$auto(0x24, 0x0, 0x8) socket(0x2, 0x1, 0x106) 5.680401074s ago: executing program 3 (id=3792): mkdir$auto(&(0x7f0000000100)='}[,&*}\x00', 0x8001) mount$auto(0x0, &(0x7f0000000040)='}[,&*}\x00', &(0x7f0000000080)='nfsd\x00', 0x7, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth1_to_bridge\x00'}) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001400c7"], 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x400c000) r1 = socket(0x10, 0x2, 0x4) write$auto(r1, &(0x7f0000000000)='-\x00', 0x2fb) openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/lru_gen\x00', 0xc0080, 0x0) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/midiC2D2\x00', 0x0, 0x0) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) iopl$auto(0x3) r3 = clone$auto(0x5, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffd, 0x100000000) r4 = syz_clone(0x700, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$auto_taskstats(0x0, r5) sendmsg$auto_TASKSTATS_CMD_GET(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010a27bd7000fddbdf250100000008000100", @ANYRES32=r3, @ANYBLOB="00100000d6aec0aa4c28246e5360", @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB="08000200", @ANYRES32=r3, @ANYBLOB], 0x34}, 0x1, 0x0, 0x0, 0x4001}, 0x20000840) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r2, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) openat$auto_proc_pid_maps_operations_internal(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/ib_srp/parameters/indirect_sg_entries\x00', 0x80800, 0x0) name_to_handle_at$auto(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/blkio.bfq.dequeue\x00', &(0x7f0000001100)={0x8, 0xd, "2e5710c910109d7e"}, &(0x7f0000001180), 0x2) sendfile$auto(0x1, r7, 0x0, 0x400007ffff000) bpf$auto(0x0, &(0x7f0000000780)=@link_update={0xa, @new_map_fd=0x5, 0x4007, @old_prog_fd=0x13b}, 0xa3) fsconfig$auto(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socket(0x2, 0x3, 0xa) close_range$auto(0x0, 0xfffffffffffff000, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) bpf$auto(0x24, 0x0, 0x8) socket(0x2, 0x1, 0x106) 5.169937318s ago: executing program 3 (id=3795): r0 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snd/controlC2\x00', 0x8100, 0x0) mmap$auto(0x0, 0xe983, 0xe2, 0xeb1, 0x401, 0x8000) io_uring_setup$auto(0x6, 0x0) mknod$auto(0x0, 0x63c1, 0x7ff) ioctl$auto_SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, 0x0) read$auto(r0, 0x0, 0x800) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, 0x0, 0x802, 0x0) readv$auto(0x3, &(0x7f0000000040)={0x0, 0x36a}, 0x6) openat$auto_dvb_frontend_fops_dvb_frontend(0xffffffffffffff9c, 0x0, 0x202041, 0x0) mmap$auto(0x0, 0x20009, 0xe2, 0xeb1, 0x405, 0x8000) sysfs$auto(0x2, 0x1a, 0x0) mmap$auto(0x0, 0x400005, 0xdf, 0x110, 0xffffffffffffffff, 0x8000) select$auto(0x80000001, 0x0, 0x0, &(0x7f0000000200)={[0x5, 0x7000000, 0xfff, 0x9, 0x0, 0x800000000e0, 0x2f84, 0x80, 0x6, 0x4, 0x4, 0x7, 0x8, 0x7, 0x40, 0x1]}, &(0x7f0000000000)={0xb, 0x3}) map_shadow_stack$auto(0x3, 0x1, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/system/machinecheck/machinecheck0/check_interval\x00', 0x102, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, 0x0) ioctl$auto(r1, 0x5, 0x1) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0xffffffffffffffff, 0x8000) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000800)='/sys/devices/virtual/bdi/43:384/max_bytes\x00', 0x181482, 0x0) read$auto(r2, 0x0, 0x2) write$auto(0x3, 0x0, 0xfdef) r3 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/net/rpc/auth.rpcsec.context/channel\x00', 0x101002, 0x0) r4 = socket(0xa, 0x2, 0x0) setsockopt$auto(r4, 0x29, 0x2, 0x0, 0x2) r5 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/dev\x00', 0x40100, 0x0) pread64$auto(r5, 0x0, 0x10005, 0x830) write$auto(r3, 0x0, 0x100) r6 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snd/controlC0\x00', 0x80, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_ADD(r6, 0xc1105517, &(0x7f0000000580)={{@raw=0x7fffffff, 0xf0ee, 0x20009, 0x3, "790eaa00ffff8eac2cdafc1f64010043eeb0b053030001ffff000e00", @raw}, 0x4, 0x966, 0x3, @raw=0x404, @integer={0x800000000000400e, 0x2000000b752, 0x1}, "6cc1294d63a4f1b4285854c5368de438f8cc142ef6df12bf3373a1183bedbd31b642b4051b078fa1c1c61c329794e5311121c760cb9611c78e6947a99807bcc1"}) openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, 0x0, 0x169000, 0x0) 4.450335142s ago: executing program 1 (id=3797): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0x8, 0x0) ioctl$auto_UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) close_range$auto(0x0, 0x5, 0x0) openat$auto_proc_pid_maps_operations_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/slabinfo\x00', 0x80000, 0x0) r0 = epoll_create$auto(0x4e) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) select$auto(0x7, &(0x7f0000000080)={[0x400020000008, 0xfffffffffffffffd, 0x7, 0x3, 0xc, 0x6, 0x3, 0x1ffe000, 0xcad, 0x2, 0x9, 0xf, 0xa657, 0x203, 0xd3, 0x1]}, 0x0, 0x0, 0x0) r1 = socket(0x11, 0x3, 0x9) capset$auto(0x0, &(0x7f0000000000)={0x8, 0x7, 0x802}) sendmmsg$auto(r1, &(0x7f00000006c0)={{&(0x7f0000000000), 0x5ac, &(0x7f00000000c0)={&(0x7f0000000080)='L', 0x49}, 0x2, 0x0, 0x5, 0x1}, 0x5}, 0x2, 0x1ef) epoll_ctl$auto(r0, 0x1, 0x8000000000000000, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/wakeup_count\x00', 0xc0082, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) sendmsg$auto_ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000580)={0x0}, 0x1, 0x0, 0x0, 0x20040000}, 0x20000800) read$auto(0x3, 0x0, 0x80) close_range$auto(0x2, 0xa, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/platform/vhci_hcd.0/usbip_debug\x00', 0x8002, 0x0) openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security/tomoyo/domain_policy\x00', 0x40602, 0x0) preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xf15a}, 0x6, 0x8, 0x5) write$auto(0x3, 0x0, 0xffd8) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) mprotect$auto(0x0, 0x806121, 0x8) futex$auto(0x0, 0x6, 0x47, 0x0, 0x0, 0x0) socket(0xa, 0x3, 0x3b) r2 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/net/dev_snmp6/veth1_to_bond\x00', 0x121100, 0x0) pread64$auto(r2, 0x0, 0x6, 0x1ff) 3.579575491s ago: executing program 2 (id=3799): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0xfffffffffffffffc, 0x9, 0x10001, 0x9000000eb1, 0xfffffffffffffffa, 0x8) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/system/cpu/cpu0/hotplug/state\x00', 0x0, 0x0) pread64$auto(r0, 0x0, 0x100000001, 0x9) r1 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0) write$auto(r1, &(0x7f0000000280)='/\xff\xf2\x00\xc8\xe4\x85;\xe9\xd8\xff\x01S', 0x80000000) write$auto(r1, 0x0, 0x2) fdatasync$auto(0xffffffffffffffff) r2 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x60742, 0x0) ioctl$auto_BLKZEROOUT(r2, 0x127f, 0x0) r3 = openat$auto_percpu_stats_fops_(0xffffffffffffff9c, 0x0, 0x383101, 0x0) getsockopt$auto_SO_PEEK_OFF(r3, 0x8, 0x2a, &(0x7f0000000040)='/sys/kernel/debug/netdevsim/netdevsim2/health/break_health\x00', &(0x7f00000001c0)=0x6) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snd/controlC2\x00', 0x400, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bus/usb/035/001\x00', 0xc3400, 0x0) write$auto(0xffffffffffffffff, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3dc) getcwd$auto(&(0x7f0000000540)='/sys/devices/\xde\xe7/xot\xfa\xec\x8f\xa4/}tate\x00X\xa0\xf7\xc7\x87\x92\xc9.2\x97R\xf4\xe6s\x00\xcf\x93\x1d\xe0K\xec\xacc$o\xf0\xa8\x93\x93\xe67U\xfb\xe1se\xfewZ\x03\x00\xaf\xc8$\x15\xc7\xd4\xcb\x92\x01\xecsP\x9aSM\xff\xf8\f\xcd3_oZ\x80\xdb\a\xbbY\xb7\xe9`\x1cV\xcdZ\xca\x89\x99#0xee01, 0xee01, 0xd, 0x1, 0xfff, 0x5d}, &(0x7f0000000100)=0x7, &(0x7f0000000140)=0x3, 0x6, 0x5, 0x3, 0x9, 0xd5, 0x0, 0xc0, 0x6, @raw=0x9}) r7 = setfsuid$auto(0x0) sendmsg$auto_TIPC_NL_PUBL_GET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000c00)={0x8ec, r3, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_PUBL={0x89a, 0x3, 0x0, 0x1, [@typed={0xff0b, 0xf7, 0x0, 0x0, @u64=0x7}, @nested={0x7a8, 0x59, 0x0, 0x1, [@generic="b1813f1989eaad365af8c1432dd79cea", @nested={0x789, 0xdc, 0x0, 0x1, [@nested={0x31c, 0x83, 0x0, 0x1, [@nested={0x4, 0x157}, @typed={0xfd, 0xa3, 0x0, 0x0, @binary="865337eb5fc04c75c636b37f38127b7931fde039539e49505d999f8c3aeab371882a1673d26fd17791946c4e36aef4f8a40429ca7eae0295c2ea8198088b2c461984016218b8cde3a860efc58a98fa4240c8e6cbb5d7711660a79df382db6f07eb3d46628f217b8808434f28e55b2fd7425ce8a14dcf2ed022c3d43f1a00510bdaf02bf39a54ecea9869b46b29892fb6ce4809db875c24a2de0c62f4bc28fc6de7f20cfcbd9ea982772398fcc010b167f1f32402eeffbbe45f13a0cf67453865ad8e133d8a4b3212ab5e07ad20ae9fd8bcc8dbb604fd4dc5177ffbcfad6f4433d1ea444ad44168436690e8ddcc983fc8bf5e62a5883c117f89"}, @generic="e3bfa4b46e1eff184121e4d3196d8872355c05b5702ab6975d1ace5aa49e24de152b67ea13aa1158664da194c8732251ce11430bd716b18bdaf2fb13233f78bdd73df63f42600c27a9949d25059b4cfc84432bf6ee08694f9f75a8dd2d8848b56964bc9e768faf776b73fa26061a945ceeec1a7b2bb07a6ce646adc7535c740b2f04f83b159b883883c532a4b04a0eb5cf349bf51999c1bf2b01e167359953c8ddbc2a4b4b99c2c2d6577e842ef082", @nested={0x4, 0x51}, @generic="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"]}, @generic="08a6a3f500220bd8227ef572060a608950517de0f7894f851032c46df9271bf69f333c3dec883a87c98d9db44076381387f9b391ec62093a2b9146d996759b8e2c59ee4049da0acadad6ff9222ae3cfaf84b2e713effaf7411bafdd00c886ec4066ce2b78229118d070f85930f4b70c2cbd30216d05090868a0d8f9424b8b9b8f7e5f2f1346453af205e982d195942349caf2fa95e27", @typed={0x8, 0x31, 0x0, 0x0, @fd=r5}, @generic="92b96731e9f3a66bebe0b302e0f8bdffd0e2c3c251f1a1888deb410b46b2f9e430cdc63b1d1aed4d51599f036d3e4d779adcfa83419b172824d9a400265ce4f98ed63b75c028aaa6737023c7eb47b297924c67f838fb98fa4a25057721061a10691e2f3a83fdfbc5441a85af9a774c1da4fb8c9a664f766acda89071f635ccbdf917ca6e334afa986f52d875c0bd4cfb314eff4e2b084822efcd2aad21343b0df97c73e93d794b57a439d90c9de022595b2e82a412513177b396453c069ee856cfc8bc2ae54618a20c9bc338cfdb577c35fb7a17f8794a68251133", @generic="18f87a7a01fc16ca9c5ba870d75c601d4dbec41e6ea66b9b56113090af50c159d4ada2f9cfcdea14ab74244b57e7a22d5af98298f1c44f2ee27fb1f03e27e08f7fa403d9fca3fd6e08dcb8f3f12b15244f58501acbc706e2054cd737b4cb7633d8831bd7382083745b73dee2f999ab1c597bc90f104c5c865e1d3b7638da6307457aeecc2b233ebcd31311a0d45a5638dc4338805d34fb6a6440bb372f5daf707d5fa406ec5aa04b6879f81c431263f4b17fb9f7191bdce3", @typed={0x8, 0x125, 0x0, 0x0, @fd=r4}, @typed={0x8, 0x70, 0x0, 0x0, @u32=0x7}, @nested={0x227, 0x9b, 0x0, 0x1, [@nested={0x4, 0x8d}, @generic="acc3c9f0d821857a55dff924fdc09869f4307571b22b7f73fdf911733d59104a5fd210f09d8a43248b9bf24be2273af44c50e6ccaba064e684836f8f5fc4d214d17eaf823e92f1818d2ca6756875a93ddf8d91e461861a01e5968141cead6b9d0f392792b65bf454facdec5845db3682e78669740dfca29235f6365f773a4f8a5a958bacd40d42047d751ddd2a0ee0f8ec343041fa3f03f249fdef7818d22107165db18f7c15e04560ff53ac1a0c4f1c0c11febb7b4ee9b7b69a5b3a9c9cfde7173b9e892df6b7748d539c1c696e47ee3f", @nested={0x4, 0x5d}, @generic="bedf2fd6c3713cf6a8a42574c0986c9a294be424ce037b0c6409d255f75c31dd031358fc9f32a4cd7056e81b16cb8dd4cbc48e3724221b1ee9a7b86ee5bb0c949b432fc49dbb73a263cb24bf9571951d43db", @typed={0x8, 0x148, 0x0, 0x0, @uid=r6}, @nested={0x0, 0x113, 0x0, 0x1, [@nested={0x0, 0x13b, 0x0, 0x1, [@nested={0x0, 0xb7}, @typed={0x0, 0x104, 0x0, 0x0, @uid=r7}, @typed={0x0, 0xbd, 0x0, 0x0, @u64=0x1}, @generic="74cecfae81f93a1ddc2189a34ff726decc38927c3b1b0b7748a67287b1c2fa40dab7d1e8c283a99e972782bb407f0ca54887a6438252df41dfa1cefa7fb197bc99708b3288b00bc9c5f8198e3f59f9b05058c9f405332f8bde65105af497090e679f24c32c8b03b5d0732db8b2", @generic="ecc87f8fa7082f746b", @nested={0x0, 0x31}]}, @nested={0x0, 0x21, 0x0, 0x1, [@typed={0x0, 0xc5, 0x0, 0x0, @ipv6=@empty}, @typed={0x0, 0x43, 0x0, 0x0, @binary="1b244b70dc68bbd3476b1ce757a4ce6ff43c02546c2e5e4b97d052077605c8b12c29978e80bfc04e602707a6ef6e278aa3b21caa8a68ecc2d865ae5f8464100516362dbe2d3bb4a558f1f931351cc298c123ed50e6a3d698607c507764fc20d4ba9ccdeb9fd8a3eef864f6e806a3a557ccb3ab691ca3ea90fcd8dd394d8d87f927b1a03aada77734af932bf05a45895a8c72446d45596ba987001398"}, @generic="ca2021e533df1909e77f979c2a46c56c7ae10fd89a7bcdd90f22264912475ad50043f2fea0f4b93a45ee5d69d9377d1dd6096a0ddebacace807428c3a1149e9caae939457581a456616b938bb510934a68397d01264a3dc633cc5a146341b8104ed0a8e72fa685d8045edd961c18929cbf1b2ca080"]}, @nested={0x0, 0x21, 0x0, 0x1, [@nested={0x0, 0x61}, @nested={0x0, 0x114}, @typed={0x0, 0x150, 0x0, 0x0, @ipv6=@empty}, @generic="afdba60cfe8a9ea4751f1cdafe61e098ea49edcf5f1be14be050c48dd9907b45ca2d1b3a4a6cd6943fbe4e5b1d34486c1856bbea09a4fa05aa4ee3457d192534c872a4b819a3f9ef2468e20c11b79c9b751241c11c70a625933f92c7011a84893814cbacbc33f945648d95b3038d9a03219d73beb3ea1563a1c0"]}]}, @typed={0x14, 0xbd, 0x0, 0x0, @ipv6=@loopback}, @generic="13be2f01a0e6a05c79cda5689818f2c2606ab6101f30c1d22e264c7a7436c5e86e205ae4a8216160b1b3b6b8429f7f33433b5e6dacce59ecac8a13faedff0072874eed9fddaec156e74bbad45c4fcf7c386a07fa36d124362779d7aeeca583ecf0b68671f35775452dd2a0b0448fd7373254044bf2e5e07adc", @typed={0x8, 0x138, 0x0, 0x0, @u32=0x8}]}]}, @typed={0x8, 0x5, 0x0, 0x0, @u32=0xd}]}, @generic="3a93a5d323a041f90724e8fa43bdccc8c0e901789e65091cf9d8d94cb805c338bb8a10dfead02a02", @generic="4520c20622b4f4c9efab16e17d705a158ac8a08f7a717ec3419912519b553a7f3c93ea92ef7ee6b4739815627e61393e56d710a40723f01eeccb99b235ec3270bdba1cfc43fa28e6e7661aa0bae1c0a2de1c087b697eb6f1420fe244523b18958d78a6ffdb3b8302447158fc1171eda55097d292ff7d3dc2be1c6f227cd590c4faa0f95d997e682611807fe42e3ee54eea4b6abea48303338fafff2cb6df2dfa3a6854f50fe0dc0bf3b57e29c004eda6276a", @nested={0xc, 0x14a, 0x0, 0x1, [@nested={0x4, 0x10}, @nested={0x4, 0x147}]}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@typed={0x14, 0x99, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x42}}, @typed={0x24, 0xd2, 0x0, 0x0, @binary="6aeb653bc27114c56c950b19a150ee55df9646c41f360072b2abe1dd2ab195bf"}]}]}, 0x8ec}, 0x1, 0x0, 0x0, 0x40014}, 0x24044000) ioctl$auto_RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)={0x6, 0xa, 0x8, 0x80000000, 0xfffff2a2, 0xa, 0x3, 0x80000005}) 2.246578943s ago: executing program 1 (id=3806): mmap$auto(0x0, 0xbff, 0xdf, 0x12, 0x2, 0x100008000) futex$auto(0x0, 0x3, 0x2, 0x0, 0x0, 0x71a8dce0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) close_range$auto(0x2, 0x8, 0x0) r0 = openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000180)='/proc/interrupts\x00', 0x18b202, 0x0) ioctl$auto(0xc8, 0x800454cf, 0x200000000005c8d) pread64$auto(r0, 0x0, 0x6, 0xffffffff) readv$auto(0x3, 0x0, 0x4) r1 = socket(0x11, 0x80003, 0x300) setsockopt$auto(r1, 0x107, 0x7, 0x0, 0x8000) r2 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) write$auto(r2, &(0x7f00000002c0)='0\x00\xa6\xcc\r\x91Q\xe4\xd9\x9a\xd3\xc0\xc0\x06\x00\x114_\xe5U\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94\x01\x00\t\xad\x8b\xb8:]\xd9\x94&\x81\xe2\x13\x8f\xea#\xf8F\xbbOO]e[\xbb\xf9\xcd\xc0\xc9\x00\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\b\xc1\x04z\xd0I>\x8f\x00\xcb\xcf\x8b\xd7\xe5\x1c*\xed`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\f};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xcbA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xda`{k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xdeL/\x06(\x1d\xa5\xc5\x9b\xb2\x96`\xe7\xd5Y', 0x8) socket(0x2, 0x5, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r3 = getpid() process_vm_readv$auto(r3, &(0x7f0000000000)={0x0, 0x1002}, 0x1, &(0x7f0000000280)={&(0x7f0000000080), 0x401}, 0x6, 0x0) r4 = socket(0x1d, 0x3, 0x1) setsockopt$auto(r4, 0x65, 0x1, 0x0, 0x800) bind$auto(0x3, &(0x7f0000000040)=@can={0x1d, 0x0, 0xfd}, 0x6a) close_range$auto(0x2, 0xffffffffffffffff, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x2) socket(0x11, 0x3, 0x9) syslog$auto(0x9, &(0x7f0000000080)='..\x00k\xac\x8c\x1d\x0e\x98\x80\xd2\xaf\xa1\xf2\x1e\xe1R1\xa2\x8e\xce\xa0\x17\bI3\'\xc5tw\xd7\x1d\xa6\xf4#+\xfa\xd7\x01\xb9j<\v\xf47\n\xa7\xd2\x8b\x11e1\xb3\xfdd\x04\xa9 1q\x97\xc4,\xa9^\xc1\xb6\xa1q\x0f\xd1\x013\x87l\xb9\x1e\x05\x90\xa2', 0x7) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)) getdents64$auto(r5, 0x0, 0x18) rt_tgsigqueueinfo$auto(r3, r3, 0xd7, &(0x7f00000001c0)={@siginfo_0_0={0x401, 0x0, 0x3, @_sigchld={r3, 0x0, 0x8, 0x1, 0x4}}}) openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 1.969499535s ago: executing program 1 (id=3807): write$auto(0xca, &(0x7f0000000140)='\x04\x0e\x06\xd5\x89|d\v\x00\x00@\x00\x81\x00\x00\x00\xf6\xf5\x00\xdf\xff\x00', 0x10) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) fanotify_init$auto(0x65, 0x2) socket(0x1d, 0x2, 0x2) connect$auto(0x3, 0x0, 0x55) unshare$auto(0x40000080) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x7, 0x800008000) close_range$auto(0x2, 0x8, 0x0) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bus/usb/029/001\x00', 0xa002, 0x0) socket(0x2b, 0x1, 0x0) listen$auto(0x3, 0x81) setsockopt$auto(0x3, 0x0, 0x1, 0x0, 0x10001) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D3\x00', 0x29a0c0, 0x0) mmap$auto(0x0, 0x4000b, 0x7, 0x9b72, 0x7, 0x28000) r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/oom_adj\x00', 0x48402, 0x0) read$auto(r0, 0x0, 0x7) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r1, &(0x7f0000000200)={0x0, 0x9}, 0x5) openat$auto_tracing_fops_trace(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/tracing/trace\x00', 0x1a6b75d638828712, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x745100, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/midiC2D0\x00', 0x0, 0x0) openat$auto_mousedev_fops_mousedev(0xffffffffffffff9c, &(0x7f0000001140)='/dev/psaux\x00', 0x42000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000640), r2) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'veth1\x00'}) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000001080), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) 1.867646153s ago: executing program 2 (id=3808): r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mtdblock0\x00', 0x14f602, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x0) madvise$auto(0x0, 0xffffffffffff0001, 0x15) madvise$auto(0x0, 0x2000040080000004, 0xe) write$auto(r0, 0x0, 0x10007c) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r1 = memfd_secret$auto(0x0) mmap$auto(0x0, 0x9, 0xffb, 0x8000000008011, 0x3, 0x0) ftruncate$auto(0x3, 0x700) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) r2 = openat$auto_mtd_fops_mtdchar(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mtd0ro\x00', 0x2c00, 0x0) ioctl$auto_MEMREADOOB(r2, 0xc0104d04, &(0x7f0000000080)={0x7761, 0x80, 0x0}) close_range$auto(0x2, 0x8000, 0x4000000000) getrlimit$auto(0x8, 0x0) ioctl$auto_BLKZEROOUT(0xffffffffffffffff, 0x127f, 0x0) bpf$auto_BPF_ITER_CREATE(0x21, &(0x7f0000000180)=@bpf_attr_7={@btf_id, 0x8000, 0x8, r1}, 0x3ff) 1.642802295s ago: executing program 3 (id=3809): mmap$auto(0x0, 0x6, 0x2, 0x40eb2, 0xffffffffffffffff, 0x308000000000) close_range$auto(0x0, 0x5, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000004c0)='v#\xd5\xaf>=\x14\xe6%\xf7\x8a\x8d\x9a\xae\x1a\xd6\xa8\xb8\x1d\xf5(\xb0\x1f\xbd\xcbV\n\"\xe3V\xfeP\xceN\xb2\xc32\xaf\xcc\x80\xfa\xf0\xd4\xd9|\xfe\x03y\xd16\x17\x99R\xca\xe5\xf4\xb4T\xfcv\xfc\xe6\x9cv\a\x00\xc2a\x16\xd1\x8a\x80\x90\x87\xa5s\x10\xed\x93\xd4\x15=\xc0\x1f\x0e\xb0\x18v}\x03!\xf0I\xe3}\x90\x9b\x92[\xfe2<7\xd3\x81\x9a~\xcd\r\x19\x9e\x10(5\xfd\x8b\x82\xd4\xc85\xc3\x93t\t\xd0\x9d\xca^n\xf3\xcb>\x1bO\xcej\xe0\xef\xf2\xd7\xc2}\x18\xd9`AO\x95<\x9aH\vu\xae\xd4\xea\x12\xb8\xd1\n\x01\x83r\x85\xbf*\x18\xa7 S:R\x14\x89Z3\x94\x8bP)\x00', 0x40140, 0x12d) mmap$auto(0x0, 0x2020009, 0x2, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r0 = socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) close_range$auto(r0, r0, 0x0) r1 = openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vbi3\x00', 0x2af01, 0x0) ioctl$auto(r1, 0xc0585611, r1) socket(0xa, 0x1, 0x84) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001300)={'batadv_slave_0\x00', 0x0}) name_to_handle_at$auto(0xffffffffffffffff, 0x0, &(0x7f0000000280)={0x0, 0x200}, 0x0, 0x1001) r4 = syz_genetlink_get_family_id$auto_ethtool(&(0x7f0000001480), r2) sendmsg$auto_ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000001c80)={&(0x7f0000000040)={0x28, r4, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_CHANNELS_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x2}]}, 0x28}, 0x1, 0x100000000000000, 0x0, 0x9dfefc5e47f5c72f}, 0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/kernel/shm_rmid_forced\x00', 0x141241, 0x0) r5 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/virtual/block/nbd7/queue/max_discard_segments\x00', 0x1c1000, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/platform/vhci_hcd.11/usb32/devspec\x00', 0x902, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) preadv$auto(0x40000000000003, 0x0, 0x3, 0xe27c, 0x8) read$auto(r5, 0x0, 0x9) write$auto(0x3, 0x0, 0xffd8) r6 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000800)='/dev/tty0\x00', 0x102, 0x0) r7 = socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) ioctl$auto(r6, 0x5609, r7) 1.387816997s ago: executing program 0 (id=3810): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/bus/netdevsim/del_device\x00', 0x501, 0x0) madvise$auto(0x0, 0x2000040080000004, 0x2) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snd/controlC0\x00', 0x0, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snd/midiC2D0\x00', 0x189081, 0x0) r2 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) setsockopt$auto(0xffffffffffffffff, 0xffffffff, 0x2, 0x0, 0x206) mmap$auto(0x2000000000000, 0x2020009, 0x3, 0xde, r2, 0x100008000) r3 = socket$nl_generic(0x10, 0x3, 0x10) openat$auto_proc_oom_score_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/oom_score_adj\x00', 0x2, 0x0) mmap$auto(0x0, 0x40009, 0x3, 0x9b72, 0xffffffffffffffff, 0x28000) r4 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/devices/virtual/net/bond0/queues/tx-6/tx_timeout\x00', 0x2440, 0x0) read$auto(r4, 0x0, 0x20) select$auto(0x1, 0x0, 0x0, &(0x7f0000000040)={[0xfffffffffffffffd, 0x6, 0x7, 0x40007fff, 0x948b, 0x8, 0x15f4da0a, 0x1, 0x20000800000003, 0x8000400, 0x3, 0x7, 0x934, 0x93, 0x400000001, 0x5060]}, 0x0) writev$auto(0x3, &(0x7f0000000080)={0x0, 0x1}, 0x3) syz_genetlink_get_family_id$auto_nbd(0x0, r2) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) setsockopt$auto(0x3, 0x9, 0x79, 0x0, 0x4) sendmsg$auto_NBD_CMD_DISCONNECT(r3, 0x0, 0x2000c800) madvise$auto(0xffffffffffffffff, 0x200007, 0x19) syslog$auto(0xffffffff, 0x0, 0x2) poll$auto(0x0, 0x7f, 0x9) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, 0x0, 0x101000, 0x0) r5 = openat$auto_zero_fops_mem(0xffffffffffffff9c, &(0x7f0000000340), 0x200, 0x0) pread64$auto(r5, &(0x7f0000000240)='\x03W\x96l\x15\x00'/21, 0x100000002, 0x100000001) r6 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/memory.limit_in_bytes\x00', 0x182b02, 0x0) sendfile$auto(r6, r6, 0x0, 0x3) write$auto_kernfs_file_fops_kernfs_internal(r0, &(0x7f0000000200)="34aeede8", 0x4) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/system/cpu/cpu0/hotplug/fail\x00', 0x808882, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) 1.058531802s ago: executing program 1 (id=3811): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x200000000008000) mmap$auto(0xa, 0x3, 0x3, 0x800000000000eb4, 0xfffffffffffffffa, 0x4) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, 0x0, 0x20000084) setitimer$auto(0x2, &(0x7f0000000040)={{0x0, 0x5}, {0x0, 0x8}}, 0x0) mbind$auto(0x0, 0x100000004, 0x100000000, 0x0, 0x6, 0x2) getitimer$auto_ITIMER_PROF(0x2, 0x0) r0 = openat$auto_rtc_dev_fops_dev(0xffffffffffffff9c, &(0x7f0000000000), 0x40001, 0x0) getitimer$auto_ITIMER_PROF(0x2, &(0x7f0000000080)={{0x1, 0xeeb}, {0x6, 0x4}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_tipcv2(&(0x7f0000000040), 0xffffffffffffffff) r4 = openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bus/usb/003/001\x00', 0x42082, 0x0) socket(0x2, 0x1, 0x0) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x20400, 0x0) r5 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) write$auto(r5, &(0x7f0000000040)='7\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x81) mmap$auto(0x0, 0x9, 0x3, 0x8012, 0x3, 0x8000) sendmsg$auto_TIPC_NL_KEY_SET(r2, &(0x7f0000001fc0)={0x0, 0x0, &(0x7f0000001f80)={0x0, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0xe040) msgctl$auto_IPC_INFO(0x4e, 0x3, &(0x7f0000000180)={{0x2482, 0xee01, 0xee01, 0xd, 0x1, 0xfff, 0x5d}, &(0x7f0000000100)=0x7, &(0x7f0000000140)=0x3, 0x6, 0x5, 0x3, 0x9, 0xd5, 0x0, 0xc0, 0x6, @raw=0x9}) r7 = setfsuid$auto(0x0) sendmsg$auto_TIPC_NL_PUBL_GET(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000c00)={0x8ec, r3, 0x1, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_PUBL={0x89a, 0x3, 0x0, 0x1, [@typed={0xff0b, 0xf7, 0x0, 0x0, @u64=0x7}, @nested={0x7a8, 0x59, 0x0, 0x1, [@generic="b1813f1989eaad365af8c1432dd79cea", @nested={0x789, 0xdc, 0x0, 0x1, [@nested={0x31c, 0x83, 0x0, 0x1, [@nested={0x4, 0x157}, @typed={0xfd, 0xa3, 0x0, 0x0, @binary="865337eb5fc04c75c636b37f38127b7931fde039539e49505d999f8c3aeab371882a1673d26fd17791946c4e36aef4f8a40429ca7eae0295c2ea8198088b2c461984016218b8cde3a860efc58a98fa4240c8e6cbb5d7711660a79df382db6f07eb3d46628f217b8808434f28e55b2fd7425ce8a14dcf2ed022c3d43f1a00510bdaf02bf39a54ecea9869b46b29892fb6ce4809db875c24a2de0c62f4bc28fc6de7f20cfcbd9ea982772398fcc010b167f1f32402eeffbbe45f13a0cf67453865ad8e133d8a4b3212ab5e07ad20ae9fd8bcc8dbb604fd4dc5177ffbcfad6f4433d1ea444ad44168436690e8ddcc983fc8bf5e62a5883c117f89"}, @generic="e3bfa4b46e1eff184121e4d3196d8872355c05b5702ab6975d1ace5aa49e24de152b67ea13aa1158664da194c8732251ce11430bd716b18bdaf2fb13233f78bdd73df63f42600c27a9949d25059b4cfc84432bf6ee08694f9f75a8dd2d8848b56964bc9e768faf776b73fa26061a945ceeec1a7b2bb07a6ce646adc7535c740b2f04f83b159b883883c532a4b04a0eb5cf349bf51999c1bf2b01e167359953c8ddbc2a4b4b99c2c2d6577e842ef082", @nested={0x4, 0x51}, @generic="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"]}, @generic="08a6a3f500220bd8227ef572060a608950517de0f7894f851032c46df9271bf69f333c3dec883a87c98d9db44076381387f9b391ec62093a2b9146d996759b8e2c59ee4049da0acadad6ff9222ae3cfaf84b2e713effaf7411bafdd00c886ec4066ce2b78229118d070f85930f4b70c2cbd30216d05090868a0d8f9424b8b9b8f7e5f2f1346453af205e982d195942349caf2fa95e27", @typed={0x8, 0x31, 0x0, 0x0, @fd=r5}, @generic="92b96731e9f3a66bebe0b302e0f8bdffd0e2c3c251f1a1888deb410b46b2f9e430cdc63b1d1aed4d51599f036d3e4d779adcfa83419b172824d9a400265ce4f98ed63b75c028aaa6737023c7eb47b297924c67f838fb98fa4a25057721061a10691e2f3a83fdfbc5441a85af9a774c1da4fb8c9a664f766acda89071f635ccbdf917ca6e334afa986f52d875c0bd4cfb314eff4e2b084822efcd2aad21343b0df97c73e93d794b57a439d90c9de022595b2e82a412513177b396453c069ee856cfc8bc2ae54618a20c9bc338cfdb577c35fb7a17f8794a68251133", @generic="18f87a7a01fc16ca9c5ba870d75c601d4dbec41e6ea66b9b56113090af50c159d4ada2f9cfcdea14ab74244b57e7a22d5af98298f1c44f2ee27fb1f03e27e08f7fa403d9fca3fd6e08dcb8f3f12b15244f58501acbc706e2054cd737b4cb7633d8831bd7382083745b73dee2f999ab1c597bc90f104c5c865e1d3b7638da6307457aeecc2b233ebcd31311a0d45a5638dc4338805d34fb6a6440bb372f5daf707d5fa406ec5aa04b6879f81c431263f4b17fb9f7191bdce3", @typed={0x8, 0x125, 0x0, 0x0, @fd=r4}, @typed={0x8, 0x70, 0x0, 0x0, @u32=0x7}, @nested={0x227, 0x9b, 0x0, 0x1, [@nested={0x4, 0x8d}, @generic="acc3c9f0d821857a55dff924fdc09869f4307571b22b7f73fdf911733d59104a5fd210f09d8a43248b9bf24be2273af44c50e6ccaba064e684836f8f5fc4d214d17eaf823e92f1818d2ca6756875a93ddf8d91e461861a01e5968141cead6b9d0f392792b65bf454facdec5845db3682e78669740dfca29235f6365f773a4f8a5a958bacd40d42047d751ddd2a0ee0f8ec343041fa3f03f249fdef7818d22107165db18f7c15e04560ff53ac1a0c4f1c0c11febb7b4ee9b7b69a5b3a9c9cfde7173b9e892df6b7748d539c1c696e47ee3f", @nested={0x4, 0x5d}, @generic="bedf2fd6c3713cf6a8a42574c0986c9a294be424ce037b0c6409d255f75c31dd031358fc9f32a4cd7056e81b16cb8dd4cbc48e3724221b1ee9a7b86ee5bb0c949b432fc49dbb73a263cb24bf9571951d43db", @typed={0x8, 0x148, 0x0, 0x0, @uid=r6}, @nested={0x0, 0x113, 0x0, 0x1, [@nested={0x0, 0x13b, 0x0, 0x1, [@nested={0x0, 0xb7}, @typed={0x0, 0x104, 0x0, 0x0, @uid=r7}, @typed={0x0, 0xbd, 0x0, 0x0, @u64=0x1}, @generic="74cecfae81f93a1ddc2189a34ff726decc38927c3b1b0b7748a67287b1c2fa40dab7d1e8c283a99e972782bb407f0ca54887a6438252df41dfa1cefa7fb197bc99708b3288b00bc9c5f8198e3f59f9b05058c9f405332f8bde65105af497090e679f24c32c8b03b5d0732db8b2", @generic="ecc87f8fa7082f746b", @nested={0x0, 0x31}]}, @nested={0x0, 0x21, 0x0, 0x1, [@typed={0x0, 0xc5, 0x0, 0x0, @ipv6=@empty}, @typed={0x0, 0x43, 0x0, 0x0, @binary="1b244b70dc68bbd3476b1ce757a4ce6ff43c02546c2e5e4b97d052077605c8b12c29978e80bfc04e602707a6ef6e278aa3b21caa8a68ecc2d865ae5f8464100516362dbe2d3bb4a558f1f931351cc298c123ed50e6a3d698607c507764fc20d4ba9ccdeb9fd8a3eef864f6e806a3a557ccb3ab691ca3ea90fcd8dd394d8d87f927b1a03aada77734af932bf05a45895a8c72446d45596ba987001398"}, @generic="ca2021e533df1909e77f979c2a46c56c7ae10fd89a7bcdd90f22264912475ad50043f2fea0f4b93a45ee5d69d9377d1dd6096a0ddebacace807428c3a1149e9caae939457581a456616b938bb510934a68397d01264a3dc633cc5a146341b8104ed0a8e72fa685d8045edd961c18929cbf1b2ca080"]}, @nested={0x0, 0x21, 0x0, 0x1, [@nested={0x0, 0x61}, @nested={0x0, 0x114}, @typed={0x0, 0x150, 0x0, 0x0, @ipv6=@empty}, @generic="afdba60cfe8a9ea4751f1cdafe61e098ea49edcf5f1be14be050c48dd9907b45ca2d1b3a4a6cd6943fbe4e5b1d34486c1856bbea09a4fa05aa4ee3457d192534c872a4b819a3f9ef2468e20c11b79c9b751241c11c70a625933f92c7011a84893814cbacbc33f945648d95b3038d9a03219d73beb3ea1563a1c0"]}]}, @typed={0x14, 0xbd, 0x0, 0x0, @ipv6=@loopback}, @generic="13be2f01a0e6a05c79cda5689818f2c2606ab6101f30c1d22e264c7a7436c5e86e205ae4a8216160b1b3b6b8429f7f33433b5e6dacce59ecac8a13faedff0072874eed9fddaec156e74bbad45c4fcf7c386a07fa36d124362779d7aeeca583ecf0b68671f35775452dd2a0b0448fd7373254044bf2e5e07adc", @typed={0x8, 0x138, 0x0, 0x0, @u32=0x8}]}]}, @typed={0x8, 0x5, 0x0, 0x0, @u32=0xd}]}, @generic="3a93a5d323a041f90724e8fa43bdccc8c0e901789e65091cf9d8d94cb805c338bb8a10dfead02a02", @generic="4520c20622b4f4c9efab16e17d705a158ac8a08f7a717ec3419912519b553a7f3c93ea92ef7ee6b4739815627e61393e56d710a40723f01eeccb99b235ec3270bdba1cfc43fa28e6e7661aa0bae1c0a2de1c087b697eb6f1420fe244523b18958d78a6ffdb3b8302447158fc1171eda55097d292ff7d3dc2be1c6f227cd590c4faa0f95d997e682611807fe42e3ee54eea4b6abea48303338fafff2cb6df2dfa3a6854f50fe0dc0bf3b57e29c004eda6276a", @nested={0xc, 0x14a, 0x0, 0x1, [@nested={0x4, 0x10}, @nested={0x4, 0x147}]}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@typed={0x14, 0x99, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x42}}, @typed={0x24, 0xd2, 0x0, 0x0, @binary="6aeb653bc27114c56c950b19a150ee55df9646c41f360072b2abe1dd2ab195bf"}]}]}, 0x8ec}, 0x1, 0x0, 0x0, 0x40014}, 0x24044000) ioctl$auto_RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)={0x6, 0xa, 0x8, 0x80000000, 0xfffff2a2, 0xa, 0x3, 0x80000005}) 1.044689743s ago: executing program 2 (id=3812): socket(0xa, 0x3, 0x3b) connect$auto(0x3, &(0x7f0000000000)=@generic={0xa, "0000e100"}, 0x58) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) close_range$auto(0x2, 0x8, 0x0) r0 = openat$auto_rtc_dev_fops_dev(0xffffffffffffff9c, 0x0, 0x189400, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/cgroup.threads\x00', 0x80302, 0x0) preadv$auto(0x3, &(0x7f0000000040)={0x0, 0x5}, 0x3, 0xf8, 0xffffffffffffffff) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) keyctl$auto_KEYCTL_REVOKE(0x3, 0xf77, 0x6, 0x0, 0x80000001) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) r1 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x131200, 0x0) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r2) ioctl$auto_KVM_CREATE_VM(r1, 0xae80, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$auto_FUSE_DEV_IOC_BACKING_OPEN(0xffffffffffffffff, 0x4010e501, &(0x7f0000000080)={r0, 0x101}) bpf$auto(0x0, &(0x7f0000000380)=@task_fd_query={0x12, 0x3, 0x4, 0xfffffff8, 0x8, 0xae85, 0xffffffffffffffff, 0x4, 0x7ff}, 0x6f4) r4 = syz_genetlink_get_family_id$auto_ovs_packet(&(0x7f0000000040), r3) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x28, r4, 0x1b, 0x70bd26, 0x25dfdbfd, {}, [@OVS_PACKET_ATTR_PROBE={0x4}, @OVS_PACKET_ATTR_ACTIONS={0x8, 0x3, 0x0, 0x1, [@nested={0x4, 0x17}]}, @OVS_PACKET_ATTR_PROBE={0x4}, @OVS_PACKET_ATTR_KEY={0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004040}, 0xc800) mmap$auto(0x0, 0x200004, 0x4000000000e3, 0x40eb2, 0xd, 0x300000000000) mremap$auto(0x0, 0x7, 0x3fd6, 0x3, 0x200000) 697.331778ms ago: executing program 1 (id=3813): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0xfffffffffffffffc, 0x9, 0x10001, 0x9000000eb1, 0xfffffffffffffffa, 0x8) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/system/cpu/cpu0/hotplug/state\x00', 0x0, 0x0) pread64$auto(r0, 0x0, 0x100000001, 0x9) r1 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0) write$auto(r1, &(0x7f0000000280)='/\xff\xf2\x00\xc8\xe4\x85;\xe9\xd8\xff\x01S', 0x80000000) write$auto(r1, 0x0, 0x2) fdatasync$auto(0xffffffffffffffff) r2 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, 0x0, 0x60742, 0x0) ioctl$auto_BLKZEROOUT(r2, 0x127f, 0x0) r3 = openat$auto_percpu_stats_fops_(0xffffffffffffff9c, 0x0, 0x383101, 0x0) getsockopt$auto_SO_PEEK_OFF(r3, 0x8, 0x2a, &(0x7f0000000040)='/sys/kernel/debug/netdevsim/netdevsim2/health/break_health\x00', &(0x7f00000001c0)=0x6) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snd/controlC2\x00', 0x400, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bus/usb/035/001\x00', 0xc3400, 0x0) write$auto(0xffffffffffffffff, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3dc) getcwd$auto(&(0x7f0000000540)='/sys/devices/\xde\xe7/xot\xfa\xec\x8f\xa4/}tate\x00X\xa0\xf7\xc7\x87\x92\xc9.2\x97R\xf4\xe6s\x00\xcf\x93\x1d\xe0K\xec\xacc$o\xf0\xa8\x93\x93\xe67U\xfb\xe1se\xfewZ\x03\x00\xaf\xc8$\x15\xc7\xd4\xcb\x92\x01\xecsP\x9aSM\xff\xf8\f\xcd3_oZ\x80\xdb\a\xbbY\xb7\xe9`\x1cV\xcdZ\xca\x89\x99# [ 1023.311589][T21225] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3523'. [ 1023.414285][ T5839] Bluetooth: hci4: command 0x0c1a tx timeout [ 1023.420384][ T5839] Bluetooth: hci0: command 0x0c1a tx timeout [ 1023.428338][ T5839] Bluetooth: hci1: command 0x0c1a tx timeout [ 1023.445306][T15274] Bluetooth: hci2: command 0x0c1a tx timeout [ 1025.517900][T21258] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3529'. [ 1027.916534][T21282] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3533'. [ 1030.261092][T21322] FAULT_INJECTION: forcing a failure. [ 1030.261092][T21322] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1030.338427][T21322] CPU: 0 UID: 0 PID: 21322 Comm: syz.1.3542 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1030.338456][T21322] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1030.338463][T21322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1030.338473][T21322] Call Trace: [ 1030.338479][T21322] [ 1030.338486][T21322] dump_stack_lvl+0x100/0x190 [ 1030.338516][T21322] should_fail_ex.cold+0x5/0xa [ 1030.338542][T21322] _copy_to_user+0x32/0xd0 [ 1030.338565][T21322] ksys_msgctl.constprop.0+0x2cc/0x340 [ 1030.338584][T21322] ? __pfx_ksys_msgctl.constprop.0+0x10/0x10 [ 1030.338618][T21322] do_syscall_64+0xc9/0xf80 [ 1030.338637][T21322] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1030.338652][T21322] RIP: 0033:0x7f67d439acb9 [ 1030.338665][T21322] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1030.338680][T21322] RSP: 002b:00007f67d5208028 EFLAGS: 00000246 ORIG_RAX: 0000000000000047 [ 1030.338696][T21322] RAX: ffffffffffffffda RBX: 00007f67d4616090 RCX: 00007f67d439acb9 [ 1030.338707][T21322] RDX: 0000200000000180 RSI: 0000000000000003 RDI: 000000000000004e [ 1030.338716][T21322] RBP: 00007f67d4408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1030.338725][T21322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1030.338733][T21322] R13: 00007f67d4616128 R14: 00007f67d4616090 R15: 00007ffc129127f8 [ 1030.338753][T21322] [ 1030.783581][T21326] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3544'. [ 1031.061047][T21333] kstrtoul() returned -22 for lu_gp_id [ 1031.107949][ T30] audit: type=1800 audit(4294967475.650:163): pid=21333 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.2.3545" name="lu_gp_id" dev="configfs" ino=100637 res=0 errno=0 [ 1032.306111][T21355] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3552'. [ 1034.455245][T21372] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3554'. [ 1036.884879][T21407] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 1037.018777][T21407] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 1037.074581][ T30] audit: type=1800 audit(4294967481.660:164): pid=21420 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.3565" name="lu_gp_id" dev="configfs" ino=101151 res=0 errno=0 [ 1037.096429][T21420] kstrtoul() returned -22 for lu_gp_id [ 1037.178327][T21407] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 1037.184426][T21407] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 1037.354602][T21422] netlink: zone id is out of range [ 1037.443880][T21422] netlink: zone id is out of range [ 1037.661409][T21428] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3567'. [ 1038.788382][T21446] FAULT_INJECTION: forcing a failure. [ 1038.788382][T21446] name failslab, interval 1, probability 0, space 0, times 0 [ 1038.877416][T21446] CPU: 0 UID: 0 PID: 21446 Comm: syz.1.3572 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1038.877447][T21446] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1038.877453][T21446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1038.877463][T21446] Call Trace: [ 1038.877468][T21446] [ 1038.877475][T21446] dump_stack_lvl+0x100/0x190 [ 1038.877503][T21446] should_fail_ex.cold+0x5/0xa [ 1038.877529][T21446] should_failslab+0xc2/0x120 [ 1038.877550][T21446] ? tomoyo_encode2+0xfb/0x3c0 [ 1038.877564][T21446] __kmalloc_noprof+0xf6/0x9c0 [ 1038.877585][T21446] ? tomoyo_encode2+0xfb/0x3c0 [ 1038.877605][T21446] tomoyo_encode2+0xfb/0x3c0 [ 1038.877623][T21446] tomoyo_encode+0x29/0x50 [ 1038.877637][T21446] tomoyo_realpath_from_path+0x18c/0x690 [ 1038.877658][T21446] tomoyo_mkdev_perm+0x231/0x570 [ 1038.877678][T21446] ? tomoyo_mkdev_perm+0x21d/0x570 [ 1038.877701][T21446] ? __pfx_tomoyo_mkdev_perm+0x10/0x10 [ 1038.877729][T21446] ? do_raw_spin_unlock+0x145/0x1e0 [ 1038.877761][T21446] ? __pfx_current_check_access_path+0x10/0x10 [ 1038.877785][T21446] ? simple_lookup+0x105/0x1d0 [ 1038.877804][T21446] tomoyo_path_mknod+0xe2/0x190 [ 1038.877821][T21446] ? __pfx_tomoyo_path_mknod+0x10/0x10 [ 1038.877839][T21446] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1038.877859][T21446] security_path_mknod+0x161/0x300 [ 1038.877876][T21446] do_mknodat+0x247/0x7a0 [ 1038.877894][T21446] ? __pfx_do_mknodat+0x10/0x10 [ 1038.877908][T21446] ? strncpy_from_user+0x19d/0x2d0 [ 1038.877930][T21446] ? getname_flags.part.0+0x1c5/0x540 [ 1038.877954][T21446] __x64_sys_mknod+0x118/0x170 [ 1038.877973][T21446] do_syscall_64+0xc9/0xf80 [ 1038.877993][T21446] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1038.878009][T21446] RIP: 0033:0x7f67d439acb9 [ 1038.878022][T21446] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1038.878038][T21446] RSP: 002b:00007f67d5229028 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1038.878053][T21446] RAX: ffffffffffffffda RBX: 00007f67d4615fa0 RCX: 00007f67d439acb9 [ 1038.878063][T21446] RDX: 0000000000000103 RSI: 00000000000020e9 RDI: 00002000000003c0 [ 1038.878073][T21446] RBP: 00007f67d4408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1038.878082][T21446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1038.878090][T21446] R13: 00007f67d4616038 R14: 00007f67d4615fa0 R15: 00007ffc129127f8 [ 1038.878111][T21446] [ 1038.878128][T21446] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1039.172303][T21230] Bluetooth: hci4: command 0x0c1a tx timeout [ 1039.180894][ T5843] Bluetooth: hci2: command 0x0c1a tx timeout [ 1039.197395][T21230] Bluetooth: hci1: command 0x0c1a tx timeout [ 1039.204079][T21230] Bluetooth: hci0: command 0x0c1a tx timeout [ 1039.509839][T21452] FAULT_INJECTION: forcing a failure. [ 1039.509839][T21452] name failslab, interval 1, probability 0, space 0, times 0 [ 1039.666300][T21452] CPU: 0 UID: 0 PID: 21452 Comm: syz.3.3573 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1039.666330][T21452] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1039.666337][T21452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1039.666348][T21452] Call Trace: [ 1039.666354][T21452] [ 1039.666360][T21452] dump_stack_lvl+0x100/0x190 [ 1039.666385][T21452] should_fail_ex.cold+0x5/0xa [ 1039.666407][T21452] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 1039.666424][T21452] should_failslab+0xc2/0x120 [ 1039.666445][T21452] kmem_cache_alloc_noprof+0x83/0x780 [ 1039.666465][T21452] ? skb_clone+0x190/0x400 [ 1039.666489][T21452] ? skb_clone+0x190/0x400 [ 1039.666508][T21452] skb_clone+0x190/0x400 [ 1039.666530][T21452] netlink_deliver_tap+0xaed/0xcc0 [ 1039.666556][T21452] netlink_unicast+0x650/0x870 [ 1039.666596][T21452] ? __pfx_netlink_unicast+0x10/0x10 [ 1039.666626][T21452] netlink_sendmsg+0x8b0/0xda0 [ 1039.666652][T21452] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1039.666673][T21452] ? __import_iovec+0x1d2/0x640 [ 1039.666698][T21452] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1039.666719][T21452] ____sys_sendmsg+0xa54/0xc30 [ 1039.666738][T21452] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1039.666756][T21452] ? try_to_wake_up+0x644/0x1a60 [ 1039.666777][T21452] ___sys_sendmsg+0x190/0x1e0 [ 1039.666795][T21452] ? __pfx____sys_sendmsg+0x10/0x10 [ 1039.666812][T21452] ? futex_private_hash_put+0x107/0x1c0 [ 1039.666839][T21452] ? find_held_lock+0x2b/0x80 [ 1039.666866][T21452] __sys_sendmsg+0x170/0x220 [ 1039.666887][T21452] ? __pfx___sys_sendmsg+0x10/0x10 [ 1039.666908][T21452] ? __x64_sys_futex+0x34f/0x4d0 [ 1039.666939][T21452] do_syscall_64+0xc9/0xf80 [ 1039.666959][T21452] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1039.666975][T21452] RIP: 0033:0x7f101039acb9 [ 1039.666988][T21452] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1039.667004][T21452] RSP: 002b:00007f100e5d5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1039.667020][T21452] RAX: ffffffffffffffda RBX: 00007f1010616090 RCX: 00007f101039acb9 [ 1039.667030][T21452] RDX: 000000000000e040 RSI: 0000200000001fc0 RDI: 0000000000000005 [ 1039.667039][T21452] RBP: 00007f1010408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1039.667049][T21452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1039.667058][T21452] R13: 00007f1010616128 R14: 00007f1010616090 R15: 00007ffe4724d6c8 [ 1039.667079][T21452] [ 1040.343380][T21458] FAULT_INJECTION: forcing a failure. [ 1040.343380][T21458] name failslab, interval 1, probability 0, space 0, times 0 [ 1040.426162][T21458] CPU: 0 UID: 0 PID: 21458 Comm: syz.0.3575 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1040.426192][T21458] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1040.426198][T21458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1040.426208][T21458] Call Trace: [ 1040.426215][T21458] [ 1040.426221][T21458] dump_stack_lvl+0x100/0x190 [ 1040.426244][T21458] should_fail_ex.cold+0x5/0xa [ 1040.426270][T21458] should_failslab+0xc2/0x120 [ 1040.426291][T21458] kmem_cache_alloc_noprof+0x83/0x780 [ 1040.426311][T21458] ? alloc_uid+0xe2/0x4c0 [ 1040.426330][T21458] ? alloc_uid+0x13d/0x4c0 [ 1040.426351][T21458] ? alloc_uid+0x13d/0x4c0 [ 1040.426369][T21458] alloc_uid+0x13d/0x4c0 [ 1040.426387][T21458] ? __pfx_alloc_uid+0x10/0x10 [ 1040.426406][T21458] ? bpf_lsm_cred_prepare+0x9/0x10 [ 1040.426427][T21458] ? security_prepare_creds+0xa8/0x290 [ 1040.426446][T21458] __sys_setresuid+0x4f2/0x1280 [ 1040.426467][T21458] do_syscall_64+0xc9/0xf80 [ 1040.426494][T21458] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1040.426511][T21458] RIP: 0033:0x7f129439acb9 [ 1040.426524][T21458] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1040.426539][T21458] RSP: 002b:00007f129524e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 1040.426556][T21458] RAX: ffffffffffffffda RBX: 00007f1294615fa0 RCX: 00007f129439acb9 [ 1040.426566][T21458] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000008 [ 1040.426576][T21458] RBP: 00007f1294408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1040.426585][T21458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1040.426594][T21458] R13: 00007f1294616038 R14: 00007f1294615fa0 R15: 00007ffe0448e5e8 [ 1040.426614][T21458] [ 1040.827166][T21463] FAULT_INJECTION: forcing a failure. [ 1040.827166][T21463] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1040.887319][T21463] CPU: 0 UID: 0 PID: 21463 Comm: syz.2.3576 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1040.887348][T21463] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1040.887354][T21463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1040.887363][T21463] Call Trace: [ 1040.887369][T21463] [ 1040.887375][T21463] dump_stack_lvl+0x100/0x190 [ 1040.887404][T21463] should_fail_ex.cold+0x5/0xa [ 1040.887429][T21463] _copy_from_user+0x2e/0xd0 [ 1040.887453][T21463] ____sys_sendmsg+0x1d1/0xc30 [ 1040.887472][T21463] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1040.887493][T21463] ? _kstrtoull+0x13c/0x1f0 [ 1040.887509][T21463] ? __pfx__kstrtoull+0x10/0x10 [ 1040.887528][T21463] ___sys_sendmsg+0x190/0x1e0 [ 1040.887547][T21463] ? __pfx____sys_sendmsg+0x10/0x10 [ 1040.887585][T21463] __sys_sendmmsg+0x205/0x430 [ 1040.887609][T21463] ? __pfx___sys_sendmmsg+0x10/0x10 [ 1040.887636][T21463] ? __fget_files+0x215/0x3d0 [ 1040.887653][T21463] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1040.887683][T21463] ? fput+0x79/0x100 [ 1040.887703][T21463] ? ksys_write+0x1ac/0x250 [ 1040.887719][T21463] ? __pfx_ksys_write+0x10/0x10 [ 1040.887739][T21463] __x64_sys_sendmmsg+0x9c/0x100 [ 1040.887760][T21463] ? lockdep_hardirqs_on+0x78/0x100 [ 1040.887777][T21463] do_syscall_64+0xc9/0xf80 [ 1040.887796][T21463] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1040.887812][T21463] RIP: 0033:0x7f205319acb9 [ 1040.887824][T21463] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1040.887838][T21463] RSP: 002b:00007f2054139028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1040.887854][T21463] RAX: ffffffffffffffda RBX: 00007f2053415fa0 RCX: 00007f205319acb9 [ 1040.887864][T21463] RDX: 0000000000000003 RSI: 0000200000000080 RDI: 0000000000000003 [ 1040.887873][T21463] RBP: 00007f2054139090 R08: 0000000000000000 R09: 0000000000000000 [ 1040.887882][T21463] R10: 0000000000001f00 R11: 0000000000000246 R12: 0000000000000001 [ 1040.887891][T21463] R13: 00007f2053416038 R14: 00007f2053415fa0 R15: 00007ffe31aa3788 [ 1040.887910][T21463] [ 1042.663718][T21483] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3581'. [ 1043.912500][T21494] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 1044.014157][T21494] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 1044.057846][T21509] netlink: 354 bytes leftover after parsing attributes in process `syz.0.3585'. [ 1044.133912][T21494] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 1044.149884][T21509] FAULT_INJECTION: forcing a failure. [ 1044.149884][T21509] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1044.244330][T21494] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 1044.318963][T21509] CPU: 0 UID: 0 PID: 21509 Comm: syz.0.3585 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1044.318991][T21509] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1044.318997][T21509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1044.319007][T21509] Call Trace: [ 1044.319012][T21509] [ 1044.319018][T21509] dump_stack_lvl+0x100/0x190 [ 1044.319041][T21509] should_fail_ex.cold+0x5/0xa [ 1044.319074][T21509] _copy_from_user+0x2e/0xd0 [ 1044.319099][T21509] move_addr_to_kernel+0x65/0x170 [ 1044.319117][T21509] copy_msghdr_from_user+0x417/0x4f0 [ 1044.319135][T21509] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1044.319155][T21509] ? _kstrtoull+0x13c/0x1f0 [ 1044.319171][T21509] ? __pfx__kstrtoull+0x10/0x10 [ 1044.319190][T21509] ___sys_sendmsg+0x106/0x1e0 [ 1044.319208][T21509] ? __pfx____sys_sendmsg+0x10/0x10 [ 1044.319242][T21509] ? __pfx___might_resched+0x10/0x10 [ 1044.319269][T21509] __sys_sendmmsg+0x205/0x430 [ 1044.319294][T21509] ? __pfx___sys_sendmmsg+0x10/0x10 [ 1044.319320][T21509] ? __fget_files+0x215/0x3d0 [ 1044.319336][T21509] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1044.319363][T21509] ? fput+0x79/0x100 [ 1044.319383][T21509] ? ksys_write+0x1ac/0x250 [ 1044.319400][T21509] ? __pfx_ksys_write+0x10/0x10 [ 1044.319419][T21509] __x64_sys_sendmmsg+0x9c/0x100 [ 1044.319441][T21509] ? lockdep_hardirqs_on+0x78/0x100 [ 1044.319457][T21509] do_syscall_64+0xc9/0xf80 [ 1044.319477][T21509] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1044.319492][T21509] RIP: 0033:0x7f129439acb9 [ 1044.319505][T21509] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1044.319519][T21509] RSP: 002b:00007f129520c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1044.319534][T21509] RAX: ffffffffffffffda RBX: 00007f1294616180 RCX: 00007f129439acb9 [ 1044.319544][T21509] RDX: 0000000000003d55 RSI: 0000200000000080 RDI: 0000000000000016 [ 1044.319553][T21509] RBP: 00007f129520c090 R08: 0000000000000000 R09: 0000000000000000 [ 1044.319562][T21509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1044.319571][T21509] R13: 00007f1294616218 R14: 00007f1294616180 R15: 00007ffe0448e5e8 [ 1044.319590][T21509] [ 1045.255096][T21516] Invalid ELF header magic: != ELF [ 1045.927493][ T5843] Bluetooth: hci2: command 0x0c1a tx timeout [ 1046.076035][ T5843] Bluetooth: hci4: command 0x0c1a tx timeout [ 1046.157191][ T5843] Bluetooth: hci1: command 0x0c1a tx timeout [ 1046.293550][T21524] random: crng reseeded on system resumption [ 1046.316831][ T5843] Bluetooth: hci0: command 0x0c1a tx timeout [ 1047.647109][T21540] FAULT_INJECTION: forcing a failure. [ 1047.647109][T21540] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.701982][T21540] CPU: 0 UID: 0 PID: 21540 Comm: syz.1.3593 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1047.702010][T21540] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1047.702016][T21540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1047.702025][T21540] Call Trace: [ 1047.702031][T21540] [ 1047.702037][T21540] dump_stack_lvl+0x100/0x190 [ 1047.702060][T21540] should_fail_ex.cold+0x5/0xa [ 1047.702086][T21540] should_failslab+0xc2/0x120 [ 1047.702107][T21540] kmem_cache_alloc_noprof+0x83/0x780 [ 1047.702127][T21540] ? alloc_empty_file+0x55/0x1c0 [ 1047.702152][T21540] ? alloc_empty_file+0x55/0x1c0 [ 1047.702171][T21540] alloc_empty_file+0x55/0x1c0 [ 1047.702193][T21540] path_openat+0xe8/0x3120 [ 1047.702209][T21540] ? getname_flags+0x93/0xf0 [ 1047.702222][T21540] ? do_sys_openat2+0xc5/0x220 [ 1047.702243][T21540] ? __x64_sys_openat+0x12d/0x210 [ 1047.702264][T21540] ? do_syscall_64+0xc9/0xf80 [ 1047.702281][T21540] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1047.702300][T21540] ? __pfx_path_openat+0x10/0x10 [ 1047.702324][T21540] do_filp_open+0x1f7/0x420 [ 1047.702343][T21540] ? __pfx_do_filp_open+0x10/0x10 [ 1047.702372][T21540] ? _raw_spin_unlock+0x28/0x50 [ 1047.702386][T21540] ? alloc_fd+0x476/0x790 [ 1047.702408][T21540] do_sys_openat2+0x12e/0x220 [ 1047.702430][T21540] ? __pfx_do_sys_openat2+0x10/0x10 [ 1047.702451][T21540] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1047.702472][T21540] ? __fget_files+0x21f/0x3d0 [ 1047.702490][T21540] __x64_sys_openat+0x12d/0x210 [ 1047.702513][T21540] ? __pfx___x64_sys_openat+0x10/0x10 [ 1047.702535][T21540] ? ksys_write+0x1ac/0x250 [ 1047.702557][T21540] do_syscall_64+0xc9/0xf80 [ 1047.702575][T21540] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1047.702590][T21540] RIP: 0033:0x7f67d439acb9 [ 1047.702603][T21540] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1047.702618][T21540] RSP: 002b:00007f67d5229028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1047.702633][T21540] RAX: ffffffffffffffda RBX: 00007f67d4615fa0 RCX: 00007f67d439acb9 [ 1047.702643][T21540] RDX: 0000000000000643 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1047.702653][T21540] RBP: 00007f67d5229090 R08: 0000000000000000 R09: 0000000000000000 [ 1047.702662][T21540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1047.702671][T21540] R13: 00007f67d4616038 R14: 00007f67d4615fa0 R15: 00007ffc129127f8 [ 1047.702690][T21540] [ 1047.966736][T21542] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3594'. [ 1049.043834][T21563] input: jJǸ-¶š9ã%vø“ as /devices/virtual/input/input22 [ 1049.110908][T21566] FAULT_INJECTION: forcing a failure. [ 1049.110908][T21566] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.263590][T21566] CPU: 0 UID: 0 PID: 21566 Comm: syz.3.3604 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1049.263621][T21566] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1049.263627][T21566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1049.263637][T21566] Call Trace: [ 1049.263643][T21566] [ 1049.263650][T21566] dump_stack_lvl+0x100/0x190 [ 1049.263675][T21566] should_fail_ex.cold+0x5/0xa [ 1049.263700][T21566] should_failslab+0xc2/0x120 [ 1049.263722][T21566] ? tomoyo_encode2+0xfb/0x3c0 [ 1049.263736][T21566] __kmalloc_noprof+0xf6/0x9c0 [ 1049.263757][T21566] ? tomoyo_encode2+0xfb/0x3c0 [ 1049.263770][T21566] tomoyo_encode2+0xfb/0x3c0 [ 1049.263787][T21566] tomoyo_encode+0x29/0x50 [ 1049.263801][T21566] tomoyo_realpath_from_path+0x18c/0x690 [ 1049.263822][T21566] tomoyo_mkdev_perm+0x231/0x570 [ 1049.263841][T21566] ? tomoyo_mkdev_perm+0x21d/0x570 [ 1049.263863][T21566] ? __pfx_tomoyo_mkdev_perm+0x10/0x10 [ 1049.263891][T21566] ? do_raw_spin_unlock+0x145/0x1e0 [ 1049.263922][T21566] ? __pfx_current_check_access_path+0x10/0x10 [ 1049.263946][T21566] ? simple_lookup+0x105/0x1d0 [ 1049.263965][T21566] tomoyo_path_mknod+0xe2/0x190 [ 1049.263982][T21566] ? __pfx_tomoyo_path_mknod+0x10/0x10 [ 1049.264000][T21566] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1049.264020][T21566] security_path_mknod+0x161/0x300 [ 1049.264037][T21566] do_mknodat+0x247/0x7a0 [ 1049.264056][T21566] ? __pfx_do_mknodat+0x10/0x10 [ 1049.264070][T21566] ? strncpy_from_user+0x19d/0x2d0 [ 1049.264093][T21566] ? getname_flags.part.0+0x1c5/0x540 [ 1049.264116][T21566] __x64_sys_mknod+0x118/0x170 [ 1049.264135][T21566] do_syscall_64+0xc9/0xf80 [ 1049.264154][T21566] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1049.264170][T21566] RIP: 0033:0x7f101039acb9 [ 1049.264183][T21566] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1049.264201][T21566] RSP: 002b:00007f100e5f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1049.264216][T21566] RAX: ffffffffffffffda RBX: 00007f1010615fa0 RCX: 00007f101039acb9 [ 1049.264227][T21566] RDX: 0000000000000103 RSI: 00000000000020e9 RDI: 00002000000003c0 [ 1049.264236][T21566] RBP: 00007f1010408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1049.264245][T21566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1049.264254][T21566] R13: 00007f1010616038 R14: 00007f1010615fa0 R15: 00007ffe4724d6c8 [ 1049.264275][T21566] [ 1049.264312][T21566] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1049.701642][T21573] netlink: set zone limit has 8 unknown bytes [ 1049.954262][T21579] FAULT_INJECTION: forcing a failure. [ 1049.954262][T21579] name failslab, interval 1, probability 0, space 0, times 0 [ 1049.978738][T21581] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3605'. [ 1049.987885][T21579] CPU: 0 UID: 0 PID: 21579 Comm: syz.1.3603 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1049.987913][T21579] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1049.987920][T21579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1049.987930][T21579] Call Trace: [ 1049.987936][T21579] [ 1049.987942][T21579] dump_stack_lvl+0x100/0x190 [ 1049.987966][T21579] should_fail_ex.cold+0x5/0xa [ 1049.987993][T21579] should_failslab+0xc2/0x120 [ 1049.988013][T21579] ? sk_prot_alloc+0x10b/0x2a0 [ 1049.988029][T21579] __kmalloc_noprof+0xf6/0x9c0 [ 1049.988042][T21579] ? security_inode_alloc+0x3b/0x2c0 [ 1049.988068][T21579] ? sk_prot_alloc+0x10b/0x2a0 [ 1049.988081][T21579] sk_prot_alloc+0x10b/0x2a0 [ 1049.988098][T21579] sk_alloc+0x36/0xe80 [ 1049.988119][T21579] alg_create+0x9e/0x150 [ 1049.988138][T21579] __sock_create+0x339/0x860 [ 1049.988158][T21579] __sys_socket+0x14d/0x260 [ 1049.988175][T21579] ? __pfx___sys_socket+0x10/0x10 [ 1049.988191][T21579] ? xfd_validate_state+0x129/0x190 [ 1049.988223][T21579] __x64_sys_socket+0x72/0xb0 [ 1049.988239][T21579] ? lockdep_hardirqs_on+0x78/0x100 [ 1049.988257][T21579] do_syscall_64+0xc9/0xf80 [ 1049.988275][T21579] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1049.988291][T21579] RIP: 0033:0x7f67d439acb9 [ 1049.988305][T21579] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1049.988321][T21579] RSP: 002b:00007f67d5229028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 1049.988337][T21579] RAX: ffffffffffffffda RBX: 00007f67d4615fa0 RCX: 00007f67d439acb9 [ 1049.988347][T21579] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000026 [ 1049.988356][T21579] RBP: 00007f67d4408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1049.988365][T21579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1049.988374][T21579] R13: 00007f67d4616038 R14: 00007f67d4615fa0 R15: 00007ffc129127f8 [ 1049.988393][T21579] [ 1051.482621][T21605] netlink: 28 bytes leftover after parsing attributes in process `syz.0.3609'. [ 1051.612360][ T5843] Bluetooth: hci2: unexpected event 0x23 length: 127 > 13 [ 1051.741035][T21610] synth uevent: /module/orangefs: unknown uevent action string [ 1051.983312][T21614] FAULT_INJECTION: forcing a failure. [ 1051.983312][T21614] name failslab, interval 1, probability 0, space 0, times 0 [ 1052.115139][T21614] CPU: 0 UID: 0 PID: 21614 Comm: syz.3.3611 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1052.115169][T21614] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1052.115185][T21614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1052.115196][T21614] Call Trace: [ 1052.115201][T21614] [ 1052.115209][T21614] dump_stack_lvl+0x100/0x190 [ 1052.115233][T21614] should_fail_ex.cold+0x5/0xa [ 1052.115257][T21614] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 1052.115273][T21614] should_failslab+0xc2/0x120 [ 1052.115295][T21614] kmem_cache_alloc_noprof+0x83/0x780 [ 1052.115315][T21614] ? skb_clone+0x190/0x400 [ 1052.115340][T21614] ? skb_clone+0x190/0x400 [ 1052.115359][T21614] skb_clone+0x190/0x400 [ 1052.115381][T21614] netlink_deliver_tap+0xaed/0xcc0 [ 1052.115407][T21614] netlink_unicast+0x650/0x870 [ 1052.115432][T21614] ? __pfx_netlink_unicast+0x10/0x10 [ 1052.115453][T21614] ? __asan_memset+0x23/0x50 [ 1052.115468][T21614] ? __build_skb_around+0x278/0x390 [ 1052.115486][T21614] ? is_vmalloc_addr+0x86/0xa0 [ 1052.115505][T21614] netlink_sendmsg+0x8b0/0xda0 [ 1052.115531][T21614] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1052.115551][T21614] ? __import_iovec+0x1d2/0x640 [ 1052.115575][T21614] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1052.115597][T21614] ____sys_sendmsg+0xa54/0xc30 [ 1052.115615][T21614] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1052.115633][T21614] ? try_to_wake_up+0x644/0x1a60 [ 1052.115654][T21614] ___sys_sendmsg+0x190/0x1e0 [ 1052.115672][T21614] ? __pfx____sys_sendmsg+0x10/0x10 [ 1052.115688][T21614] ? futex_private_hash_put+0x107/0x1c0 [ 1052.115715][T21614] ? find_held_lock+0x2b/0x80 [ 1052.115742][T21614] __sys_sendmsg+0x170/0x220 [ 1052.115763][T21614] ? __pfx___sys_sendmsg+0x10/0x10 [ 1052.115784][T21614] ? __x64_sys_futex+0x34f/0x4d0 [ 1052.115814][T21614] do_syscall_64+0xc9/0xf80 [ 1052.115834][T21614] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1052.115849][T21614] RIP: 0033:0x7f101039acb9 [ 1052.115862][T21614] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1052.115878][T21614] RSP: 002b:00007f100e5b4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1052.115894][T21614] RAX: ffffffffffffffda RBX: 00007f1010616180 RCX: 00007f101039acb9 [ 1052.115904][T21614] RDX: 00000000000080c0 RSI: 0000200000001480 RDI: 0000000000000008 [ 1052.115917][T21614] RBP: 00007f1010408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1052.115926][T21614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1052.115935][T21614] R13: 00007f1010616218 R14: 00007f1010616180 R15: 00007ffe4724d6c8 [ 1052.115955][T21614] [ 1054.368860][T21605] bond0: (slave bond_slave_1): Releasing backup interface [ 1055.513044][T21635] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3615'. [ 1058.074019][T21679] binder: BINDER_SET_CONTEXT_MGR already set [ 1058.137765][T21679] binder: 21678:21679 ioctl 4018620d 9 returned -16 [ 1059.600075][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 1059.606528][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 1060.263073][T19322] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1060.386949][T21719] __vm_enough_memory: pid: 21719, comm: syz.2.3637, bytes: 8589938688 not enough memory for the allocation [ 1060.528317][T21724] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3639'. [ 1060.934491][T21732] FAULT_INJECTION: forcing a failure. [ 1060.934491][T21732] name failslab, interval 1, probability 0, space 0, times 0 [ 1060.986278][T21732] CPU: 0 UID: 0 PID: 21732 Comm: syz.0.3641 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1060.986310][T21732] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1060.986316][T21732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1060.986325][T21732] Call Trace: [ 1060.986332][T21732] [ 1060.986339][T21732] dump_stack_lvl+0x100/0x190 [ 1060.986363][T21732] should_fail_ex.cold+0x5/0xa [ 1060.986389][T21732] should_failslab+0xc2/0x120 [ 1060.986410][T21732] ? tomoyo_encode2+0xfb/0x3c0 [ 1060.986424][T21732] __kmalloc_noprof+0xf6/0x9c0 [ 1060.986445][T21732] ? tomoyo_encode2+0xfb/0x3c0 [ 1060.986458][T21732] tomoyo_encode2+0xfb/0x3c0 [ 1060.986476][T21732] tomoyo_encode+0x29/0x50 [ 1060.986490][T21732] tomoyo_realpath_from_path+0x18c/0x690 [ 1060.986510][T21732] tomoyo_mkdev_perm+0x231/0x570 [ 1060.986531][T21732] ? tomoyo_mkdev_perm+0x21d/0x570 [ 1060.986553][T21732] ? __pfx_tomoyo_mkdev_perm+0x10/0x10 [ 1060.986581][T21732] ? do_raw_spin_unlock+0x145/0x1e0 [ 1060.986613][T21732] ? __pfx_current_check_access_path+0x10/0x10 [ 1060.986637][T21732] ? simple_lookup+0x105/0x1d0 [ 1060.986655][T21732] tomoyo_path_mknod+0xe2/0x190 [ 1060.986673][T21732] ? __pfx_tomoyo_path_mknod+0x10/0x10 [ 1060.986691][T21732] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1060.986710][T21732] security_path_mknod+0x161/0x300 [ 1060.986727][T21732] do_mknodat+0x247/0x7a0 [ 1060.986746][T21732] ? __pfx_do_mknodat+0x10/0x10 [ 1060.986760][T21732] ? strncpy_from_user+0x19d/0x2d0 [ 1060.986782][T21732] ? getname_flags.part.0+0x1c5/0x540 [ 1060.986806][T21732] __x64_sys_mknod+0x118/0x170 [ 1060.986825][T21732] do_syscall_64+0xc9/0xf80 [ 1060.986844][T21732] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1060.986860][T21732] RIP: 0033:0x7f129439acb9 [ 1060.986874][T21732] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1060.986889][T21732] RSP: 002b:00007f129524e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1060.986905][T21732] RAX: ffffffffffffffda RBX: 00007f1294615fa0 RCX: 00007f129439acb9 [ 1060.986915][T21732] RDX: 0000000000000103 RSI: 00000000000020e9 RDI: 00002000000003c0 [ 1060.986925][T21732] RBP: 00007f1294408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1060.986935][T21732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1060.986944][T21732] R13: 00007f1294616038 R14: 00007f1294615fa0 R15: 00007ffe0448e5e8 [ 1060.986965][T21732] [ 1060.989013][T21732] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1061.386175][T21734] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3640'. [ 1061.482910][T21738] vivid-009: ================= START STATUS ================= [ 1061.526034][T21738] vivid-009: Radio HW Seek Mode: Bounded [ 1061.536968][T21738] vivid-009: Radio Programmable HW Seek: false [ 1061.546990][T21738] vivid-009: RDS Rx I/O Mode: Block I/O [ 1061.552583][T21738] vivid-009: Generate RBDS Instead of RDS: false [ 1061.612565][T21738] vivid-009: RDS Reception: true [ 1061.622476][T21738] vivid-009: RDS Program Type: 0 inactive [ 1061.632586][T21738] vivid-009: RDS PS Name: inactive [ 1061.642699][T21738] vivid-009: RDS Radio Text: inactive [ 1061.652795][T21738] vivid-009: RDS Traffic Announcement: false inactive [ 1061.662450][T21738] vivid-009: RDS Traffic Program: false inactive [ 1061.747513][T21738] vivid-009: RDS Music: false inactive [ 1061.758619][T21738] vivid-009: ================== END STATUS ================== [ 1062.135082][T21751] FAULT_INJECTION: forcing a failure. [ 1062.135082][T21751] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1062.196330][T21751] CPU: 0 UID: 0 PID: 21751 Comm: syz.2.3645 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1062.196360][T21751] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1062.196367][T21751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1062.196376][T21751] Call Trace: [ 1062.196383][T21751] [ 1062.196389][T21751] dump_stack_lvl+0x100/0x190 [ 1062.196413][T21751] should_fail_ex.cold+0x5/0xa [ 1062.196438][T21751] _copy_from_iter+0x1f4/0x1690 [ 1062.196464][T21751] ? rcu_is_watching+0x12/0xc0 [ 1062.196481][T21751] ? __pfx__copy_from_iter+0x10/0x10 [ 1062.196503][T21751] ? __asan_memset+0x23/0x50 [ 1062.196519][T21751] ? __build_skb_around+0x278/0x390 [ 1062.196539][T21751] ? is_vmalloc_addr+0x86/0xa0 [ 1062.196558][T21751] netlink_sendmsg+0x808/0xda0 [ 1062.196584][T21751] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1062.196605][T21751] ? __import_iovec+0x1d2/0x640 [ 1062.196629][T21751] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1062.196651][T21751] ____sys_sendmsg+0xa54/0xc30 [ 1062.196669][T21751] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1062.196688][T21751] ? try_to_wake_up+0x644/0x1a60 [ 1062.196708][T21751] ___sys_sendmsg+0x190/0x1e0 [ 1062.196726][T21751] ? __pfx____sys_sendmsg+0x10/0x10 [ 1062.196746][T21751] ? futex_private_hash_put+0x107/0x1c0 [ 1062.196774][T21751] ? find_held_lock+0x2b/0x80 [ 1062.196802][T21751] __sys_sendmsg+0x170/0x220 [ 1062.196824][T21751] ? __pfx___sys_sendmsg+0x10/0x10 [ 1062.196844][T21751] ? __x64_sys_futex+0x34f/0x4d0 [ 1062.196875][T21751] do_syscall_64+0xc9/0xf80 [ 1062.196895][T21751] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1062.196911][T21751] RIP: 0033:0x7f205319acb9 [ 1062.196924][T21751] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1062.196938][T21751] RSP: 002b:00007f2054118028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1062.196954][T21751] RAX: ffffffffffffffda RBX: 00007f2053416090 RCX: 00007f205319acb9 [ 1062.196964][T21751] RDX: 00000000000080c0 RSI: 0000200000001480 RDI: 0000000000000007 [ 1062.196973][T21751] RBP: 00007f2053208bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1062.196983][T21751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1062.196991][T21751] R13: 00007f2053416128 R14: 00007f2053416090 R15: 00007ffe31aa3788 [ 1062.197011][T21751] [ 1062.862652][T21758] WARNING! power/level is deprecated; use power/control instead [ 1063.972034][T21777] zswap: compressor û not available [ 1064.187485][T21784] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3652'. [ 1064.943413][T21802] FAULT_INJECTION: forcing a failure. [ 1064.943413][T21802] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1065.049562][T21802] CPU: 0 UID: 0 PID: 21802 Comm: syz.3.3655 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1065.049592][T21802] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1065.049599][T21802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1065.049608][T21802] Call Trace: [ 1065.049614][T21802] [ 1065.049621][T21802] dump_stack_lvl+0x100/0x190 [ 1065.049644][T21802] should_fail_ex.cold+0x5/0xa [ 1065.049670][T21802] _copy_from_iter+0x1f4/0x1690 [ 1065.049695][T21802] ? __alloc_skb+0x220/0x410 [ 1065.049714][T21802] ? __alloc_skb+0x35d/0x410 [ 1065.049733][T21802] ? __pfx__copy_from_iter+0x10/0x10 [ 1065.049755][T21802] ? netlink_autobind.isra.0+0x110/0x370 [ 1065.049789][T21802] netlink_sendmsg+0x808/0xda0 [ 1065.049814][T21802] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1065.049836][T21802] ? __import_iovec+0x1d2/0x640 [ 1065.049860][T21802] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1065.049883][T21802] ____sys_sendmsg+0xa54/0xc30 [ 1065.049902][T21802] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1065.049917][T21802] ? __pfx___futex_wait+0x10/0x10 [ 1065.049934][T21802] ? __pfx_futex_wake_mark+0x10/0x10 [ 1065.049959][T21802] ___sys_sendmsg+0x190/0x1e0 [ 1065.049977][T21802] ? __pfx____sys_sendmsg+0x10/0x10 [ 1065.050003][T21802] ? find_held_lock+0x2b/0x80 [ 1065.050030][T21802] __sys_sendmsg+0x170/0x220 [ 1065.050052][T21802] ? __pfx___sys_sendmsg+0x10/0x10 [ 1065.050072][T21802] ? __x64_sys_futex+0x34f/0x4d0 [ 1065.050103][T21802] do_syscall_64+0xc9/0xf80 [ 1065.050130][T21802] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1065.050146][T21802] RIP: 0033:0x7f101039acb9 [ 1065.050159][T21802] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1065.050175][T21802] RSP: 002b:00007f100e5d5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1065.050192][T21802] RAX: ffffffffffffffda RBX: 00007f1010616090 RCX: 00007f101039acb9 [ 1065.050202][T21802] RDX: 000000000000e040 RSI: 0000200000001fc0 RDI: 0000000000000005 [ 1065.050212][T21802] RBP: 00007f1010408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1065.050221][T21802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1065.050230][T21802] R13: 00007f1010616128 R14: 00007f1010616090 R15: 00007ffe4724d6c8 [ 1065.050250][T21802] [ 1066.527648][T21834] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3664'. [ 1066.755049][T21843] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1066.791313][T21843] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1066.827055][T21843] veth0_to_bridge: entered allmulticast mode [ 1066.859187][T21843] veth0_to_bridge: entered promiscuous mode [ 1066.896247][T21843] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1066.960432][T21843] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1066.967699][T21843] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 1070.395598][T21915] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3685'. [ 1071.586565][T21945] FAULT_INJECTION: forcing a failure. [ 1071.586565][T21945] name failslab, interval 1, probability 0, space 0, times 0 [ 1071.866329][T21945] CPU: 0 UID: 0 PID: 21945 Comm: syz.3.3689 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1071.866360][T21945] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1071.866366][T21945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1071.866376][T21945] Call Trace: [ 1071.866382][T21945] [ 1071.866388][T21945] dump_stack_lvl+0x100/0x190 [ 1071.866413][T21945] should_fail_ex.cold+0x5/0xa [ 1071.866437][T21945] should_failslab+0xc2/0x120 [ 1071.866458][T21945] kmem_cache_alloc_noprof+0x83/0x780 [ 1071.866478][T21945] ? security_file_alloc+0x34/0x2c0 [ 1071.866504][T21945] ? security_file_alloc+0x34/0x2c0 [ 1071.866525][T21945] security_file_alloc+0x34/0x2c0 [ 1071.866548][T21945] init_file+0x93/0x4c0 [ 1071.866569][T21945] alloc_empty_file+0x73/0x1c0 [ 1071.866591][T21945] dentry_open+0x46/0xd0 [ 1071.866612][T21945] pidfs_alloc_file+0x18f/0x290 [ 1071.866628][T21945] ? __pfx_pidfs_alloc_file+0x10/0x10 [ 1071.866649][T21945] pidfd_prepare+0x129/0x200 [ 1071.866670][T21945] __x64_sys_pidfd_open+0x105/0x1a0 [ 1071.866692][T21945] ? __pfx___x64_sys_pidfd_open+0x10/0x10 [ 1071.866716][T21945] ? rcu_is_watching+0x12/0xc0 [ 1071.866733][T21945] do_syscall_64+0xc9/0xf80 [ 1071.866753][T21945] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1071.866768][T21945] RIP: 0033:0x7f101039acb9 [ 1071.866782][T21945] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1071.866796][T21945] RSP: 002b:00007f100e191028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b2 [ 1071.866811][T21945] RAX: ffffffffffffffda RBX: 00007f1010616270 RCX: 00007f101039acb9 [ 1071.866821][T21945] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 1071.866830][T21945] RBP: 00007f1010408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1071.866840][T21945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1071.866849][T21945] R13: 00007f1010616308 R14: 00007f1010616270 R15: 00007ffe4724d6c8 [ 1071.866869][T21945] [ 1072.356615][T21957] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3696'. [ 1072.548349][T21964] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 1072.740592][T21970] FAULT_INJECTION: forcing a failure. [ 1072.740592][T21970] name failslab, interval 1, probability 0, space 0, times 0 [ 1072.790863][T21970] CPU: 0 UID: 0 PID: 21970 Comm: syz.3.3699 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1072.790897][T21970] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1072.790903][T21970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1072.790914][T21970] Call Trace: [ 1072.790921][T21970] [ 1072.790941][T21970] dump_stack_lvl+0x100/0x190 [ 1072.790971][T21970] should_fail_ex.cold+0x5/0xa [ 1072.790993][T21970] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 1072.791010][T21970] should_failslab+0xc2/0x120 [ 1072.791032][T21970] kmem_cache_alloc_noprof+0x83/0x780 [ 1072.791052][T21970] ? skb_clone+0x190/0x400 [ 1072.791076][T21970] ? skb_clone+0x190/0x400 [ 1072.791095][T21970] skb_clone+0x190/0x400 [ 1072.791117][T21970] netlink_deliver_tap+0xaed/0xcc0 [ 1072.791143][T21970] netlink_unicast+0x650/0x870 [ 1072.791168][T21970] ? __pfx_netlink_unicast+0x10/0x10 [ 1072.791189][T21970] ? __asan_memset+0x23/0x50 [ 1072.791205][T21970] ? __build_skb_around+0x278/0x390 [ 1072.791223][T21970] ? is_vmalloc_addr+0x86/0xa0 [ 1072.791242][T21970] netlink_sendmsg+0x8b0/0xda0 [ 1072.791267][T21970] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1072.791288][T21970] ? __import_iovec+0x1d2/0x640 [ 1072.791312][T21970] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1072.791334][T21970] ____sys_sendmsg+0xa54/0xc30 [ 1072.791353][T21970] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1072.791371][T21970] ? try_to_wake_up+0x644/0x1a60 [ 1072.791391][T21970] ___sys_sendmsg+0x190/0x1e0 [ 1072.791409][T21970] ? __pfx____sys_sendmsg+0x10/0x10 [ 1072.791426][T21970] ? futex_private_hash_put+0x107/0x1c0 [ 1072.791453][T21970] ? find_held_lock+0x2b/0x80 [ 1072.791479][T21970] __sys_sendmsg+0x170/0x220 [ 1072.791501][T21970] ? __pfx___sys_sendmsg+0x10/0x10 [ 1072.791521][T21970] ? __x64_sys_futex+0x34f/0x4d0 [ 1072.791552][T21970] do_syscall_64+0xc9/0xf80 [ 1072.791572][T21970] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1072.791588][T21970] RIP: 0033:0x7f101039acb9 [ 1072.791602][T21970] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1072.791617][T21970] RSP: 002b:00007f100e5d5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1072.791634][T21970] RAX: ffffffffffffffda RBX: 00007f1010616090 RCX: 00007f101039acb9 [ 1072.791644][T21970] RDX: 00000000000080c0 RSI: 0000200000001480 RDI: 0000000000000008 [ 1072.791653][T21970] RBP: 00007f1010408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1072.791662][T21970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1072.791672][T21970] R13: 00007f1010616128 R14: 00007f1010616090 R15: 00007ffe4724d6c8 [ 1072.791691][T21970] [ 1074.062668][T21991] EXT4-fs error (device sda1): ext4_validate_block_bitmap:423: comm syz.1.3704: bg 2: bad block bitmap checksum [ 1074.187832][T21991] EXT4-fs (sda1): Delayed block allocation failed for inode 2021 at logical offset 5983 with max blocks 1 with error 74 [ 1074.291430][T21991] EXT4-fs (sda1): This should not happen!! Data will be lost [ 1074.291430][T21991] [ 1075.146051][T22007] binder: 22006:22007 ioctl c018620c 0 returned -1 [ 1075.945439][T22020] Invalid ELF header magic: != ELF [ 1078.977843][T22075] FAULT_INJECTION: forcing a failure. [ 1078.977843][T22075] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1079.084378][T22075] CPU: 0 UID: 0 PID: 22075 Comm: syz.0.3723 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1079.084410][T22075] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1079.084416][T22075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1079.084426][T22075] Call Trace: [ 1079.084432][T22075] [ 1079.084438][T22075] dump_stack_lvl+0x100/0x190 [ 1079.084462][T22075] should_fail_ex.cold+0x5/0xa [ 1079.084487][T22075] get_futex_key+0x1d2/0x1620 [ 1079.084508][T22075] ? __pfx_get_futex_key+0x10/0x10 [ 1079.084534][T22075] futex_wait_setup+0x81/0x500 [ 1079.084553][T22075] __futex_wait+0x19f/0x300 [ 1079.084569][T22075] ? __pfx___futex_wait+0x10/0x10 [ 1079.084586][T22075] ? __pfx_futex_wake_mark+0x10/0x10 [ 1079.084613][T22075] ? futex_hash+0x2c5/0x380 [ 1079.084636][T22075] futex_wait+0xed/0x380 [ 1079.084650][T22075] ? __pfx_futex_wait+0x10/0x10 [ 1079.084674][T22075] do_futex+0x1ef/0x350 [ 1079.084694][T22075] ? __pfx_do_futex+0x10/0x10 [ 1079.084713][T22075] ? fput+0x79/0x100 [ 1079.084733][T22075] ? __sys_sendmsg+0x18f/0x220 [ 1079.084756][T22075] __x64_sys_futex+0x34f/0x4d0 [ 1079.084779][T22075] ? __pfx___x64_sys_futex+0x10/0x10 [ 1079.084806][T22075] do_syscall_64+0xc9/0xf80 [ 1079.084825][T22075] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1079.084840][T22075] RIP: 0033:0x7f129439acb9 [ 1079.084853][T22075] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1079.084872][T22075] RSP: 002b:00007f129522d0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1079.084888][T22075] RAX: ffffffffffffffda RBX: 00007f1294616098 RCX: 00007f129439acb9 [ 1079.084898][T22075] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1294616098 [ 1079.084908][T22075] RBP: 00007f1294616090 R08: 0000000000000000 R09: 0000000000000000 [ 1079.084918][T22075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1079.084928][T22075] R13: 00007f1294616128 R14: 00007ffe0448e500 R15: 00007ffe0448e5e8 [ 1079.084948][T22075] [ 1081.596020][ T5843] Bluetooth: hci5: Opcode 0x0c03 failed: -110 [ 1082.188090][T22103] FAULT_INJECTION: forcing a failure. [ 1082.188090][T22103] name failslab, interval 1, probability 0, space 0, times 0 [ 1082.235395][T22103] CPU: 0 UID: 0 PID: 22103 Comm: syz.0.3729 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1082.235423][T22103] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1082.235429][T22103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1082.235438][T22103] Call Trace: [ 1082.235443][T22103] [ 1082.235450][T22103] dump_stack_lvl+0x100/0x190 [ 1082.235472][T22103] should_fail_ex.cold+0x5/0xa [ 1082.235498][T22103] should_failslab+0xc2/0x120 [ 1082.235519][T22103] kmem_cache_alloc_noprof+0x83/0x780 [ 1082.235538][T22103] ? __pfx_acct_collect+0x10/0x10 [ 1082.235551][T22103] ? taskstats_exit+0x650/0xbd0 [ 1082.235569][T22103] ? taskstats_exit+0x650/0xbd0 [ 1082.235582][T22103] taskstats_exit+0x650/0xbd0 [ 1082.235596][T22103] ? __pfx_acct_update_integrals+0x10/0x10 [ 1082.235616][T22103] ? __pfx_taskstats_exit+0x10/0x10 [ 1082.235632][T22103] ? rcu_read_lock_any_held+0x6a/0xa0 [ 1082.235647][T22103] ? exit_signals+0x395/0xaf0 [ 1082.235667][T22103] do_exit+0x5ca/0x2a30 [ 1082.235691][T22103] ? __pfx_do_exit+0x10/0x10 [ 1082.235713][T22103] ? do_raw_spin_lock+0x128/0x260 [ 1082.235735][T22103] ? find_held_lock+0x2b/0x80 [ 1082.235748][T22103] ? get_signal+0x7e0/0x21e0 [ 1082.235767][T22103] do_group_exit+0xd5/0x2a0 [ 1082.235791][T22103] get_signal+0x1ec7/0x21e0 [ 1082.235816][T22103] ? __pfx_get_signal+0x10/0x10 [ 1082.235834][T22103] ? do_futex+0x192/0x350 [ 1082.235857][T22103] arch_do_signal_or_restart+0x91/0x770 [ 1082.235879][T22103] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 1082.235904][T22103] ? __pfx___x64_sys_futex+0x10/0x10 [ 1082.235928][T22103] ? ksys_mmap_pgoff+0x85/0x5b0 [ 1082.235953][T22103] exit_to_user_mode_loop+0x86/0x4b0 [ 1082.235974][T22103] ? rcu_is_watching+0x12/0xc0 [ 1082.235997][T22103] do_syscall_64+0x4ea/0xf80 [ 1082.236017][T22103] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1082.236033][T22103] RIP: 0033:0x7f129439acb9 [ 1082.236045][T22103] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1082.236060][T22103] RSP: 002b:00007f129524e0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1082.236075][T22103] RAX: fffffffffffffe00 RBX: 00007f1294615fa8 RCX: 00007f129439acb9 [ 1082.236085][T22103] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f1294615fa8 [ 1082.236095][T22103] RBP: 00007f1294615fa0 R08: 0000000000000000 R09: 0000000000000000 [ 1082.236104][T22103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1082.236113][T22103] R13: 00007f1294616038 R14: 00007ffe0448e500 R15: 00007ffe0448e5e8 [ 1082.236132][T22103] [ 1082.516356][T22107] FAULT_INJECTION: forcing a failure. [ 1082.516356][T22107] name failslab, interval 1, probability 0, space 0, times 0 [ 1082.529114][T22107] CPU: 0 UID: 0 PID: 22107 Comm: syz.2.3731 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1082.529142][T22107] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1082.529149][T22107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1082.529159][T22107] Call Trace: [ 1082.529166][T22107] [ 1082.529172][T22107] dump_stack_lvl+0x100/0x190 [ 1082.529196][T22107] should_fail_ex.cold+0x5/0xa [ 1082.529221][T22107] should_failslab+0xc2/0x120 [ 1082.529242][T22107] ? sk_prot_alloc+0x10b/0x2a0 [ 1082.529256][T22107] __kmalloc_noprof+0xf6/0x9c0 [ 1082.529272][T22107] ? evm_inode_alloc_security+0x44/0xc0 [ 1082.529296][T22107] ? sk_prot_alloc+0x10b/0x2a0 [ 1082.529309][T22107] sk_prot_alloc+0x10b/0x2a0 [ 1082.529325][T22107] sk_alloc+0x36/0xe80 [ 1082.529346][T22107] __netlink_create+0x5e/0x2c0 [ 1082.529368][T22107] __netlink_kernel_create+0xed/0x750 [ 1082.529391][T22107] ? __pfx___netlink_kernel_create+0x10/0x10 [ 1082.529417][T22107] ? __pfx_genl_pernet_init+0x10/0x10 [ 1082.529432][T22107] genl_pernet_init+0xbd/0x160 [ 1082.529447][T22107] ? __pfx_genl_pernet_init+0x10/0x10 [ 1082.529461][T22107] ? lockdep_init_map_type+0x5c/0x250 [ 1082.529481][T22107] ? __pfx_genl_rcv+0x10/0x10 [ 1082.529494][T22107] ? __pfx_genl_bind+0x10/0x10 [ 1082.529507][T22107] ? __pfx_genl_unbind+0x10/0x10 [ 1082.529519][T22107] ? __pfx_genl_release+0x10/0x10 [ 1082.529534][T22107] ? mutex_init_lockep+0x110/0x150 [ 1082.529557][T22107] ops_init+0x1e2/0x5f0 [ 1082.529580][T22107] setup_net+0x118/0x3a0 [ 1082.529602][T22107] ? __pfx_setup_net+0x10/0x10 [ 1082.529622][T22107] ? lockdep_init_map_type+0x5c/0x250 [ 1082.529642][T22107] ? mutex_init_lockep+0x110/0x150 [ 1082.529665][T22107] copy_net_ns+0x46f/0x7c0 [ 1082.529682][T22107] create_new_namespaces+0x3ea/0xab0 [ 1082.529703][T22107] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 1082.529722][T22107] ksys_unshare+0x455/0xab0 [ 1082.529742][T22107] ? native_tss_update_io_bitmap+0x3d6/0x740 [ 1082.529759][T22107] ? __pfx_ksys_unshare+0x10/0x10 [ 1082.529779][T22107] ? xfd_validate_state+0x129/0x190 [ 1082.529807][T22107] __x64_sys_unshare+0x31/0x40 [ 1082.529827][T22107] do_syscall_64+0xc9/0xf80 [ 1082.529847][T22107] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1082.529863][T22107] RIP: 0033:0x7f205319acb9 [ 1082.529877][T22107] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1082.529909][T22107] RSP: 002b:00007f2054139028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1082.529926][T22107] RAX: ffffffffffffffda RBX: 00007f2053415fa0 RCX: 00007f205319acb9 [ 1082.529937][T22107] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1082.529947][T22107] RBP: 00007f2053208bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1082.529962][T22107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1082.529971][T22107] R13: 00007f2053416038 R14: 00007f2053415fa0 R15: 00007ffe31aa3788 [ 1082.529992][T22107] [ 1083.084573][T22117] FAULT_INJECTION: forcing a failure. [ 1083.084573][T22117] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.097370][T22117] CPU: 0 UID: 0 PID: 22117 Comm: syz.2.3733 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1083.097398][T22117] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1083.097405][T22117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1083.097415][T22117] Call Trace: [ 1083.097422][T22117] [ 1083.097429][T22117] dump_stack_lvl+0x100/0x190 [ 1083.097451][T22117] should_fail_ex.cold+0x5/0xa [ 1083.097477][T22117] should_failslab+0xc2/0x120 [ 1083.097503][T22117] ? sk_prot_alloc+0x10b/0x2a0 [ 1083.097519][T22117] __kmalloc_noprof+0xf6/0x9c0 [ 1083.097535][T22117] ? security_inode_alloc+0x3b/0x2c0 [ 1083.097560][T22117] ? sk_prot_alloc+0x10b/0x2a0 [ 1083.097574][T22117] sk_prot_alloc+0x10b/0x2a0 [ 1083.097591][T22117] sk_alloc+0x36/0xe80 [ 1083.097612][T22117] alg_create+0x9e/0x150 [ 1083.097632][T22117] __sock_create+0x339/0x860 [ 1083.097651][T22117] __sys_socket+0x14d/0x260 [ 1083.097668][T22117] ? __pfx___sys_socket+0x10/0x10 [ 1083.097684][T22117] ? xfd_validate_state+0x129/0x190 [ 1083.097711][T22117] __x64_sys_socket+0x72/0xb0 [ 1083.097727][T22117] ? lockdep_hardirqs_on+0x78/0x100 [ 1083.097744][T22117] do_syscall_64+0xc9/0xf80 [ 1083.097762][T22117] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1083.097777][T22117] RIP: 0033:0x7f205319acb9 [ 1083.097790][T22117] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1083.097805][T22117] RSP: 002b:00007f2054139028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 1083.097820][T22117] RAX: ffffffffffffffda RBX: 00007f2053415fa0 RCX: 00007f205319acb9 [ 1083.097837][T22117] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000026 [ 1083.097846][T22117] RBP: 00007f2053208bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1083.097856][T22117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1083.097865][T22117] R13: 00007f2053416038 R14: 00007f2053415fa0 R15: 00007ffe31aa3788 [ 1083.097886][T22117] [ 1083.396141][T22122] input: f¬ as /devices/virtual/input/input23 [ 1083.495226][T22126] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3735'. [ 1084.384496][T22139] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3738'. [ 1084.667714][T22152] FAULT_INJECTION: forcing a failure. [ 1084.667714][T22152] name failslab, interval 1, probability 0, space 0, times 0 [ 1084.726959][T22152] CPU: 0 UID: 0 PID: 22152 Comm: syz.1.3742 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1084.726994][T22152] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1084.727003][T22152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1084.727013][T22152] Call Trace: [ 1084.727021][T22152] [ 1084.727028][T22152] dump_stack_lvl+0x100/0x190 [ 1084.727055][T22152] should_fail_ex.cold+0x5/0xa [ 1084.727083][T22152] should_failslab+0xc2/0x120 [ 1084.727103][T22152] ? tomoyo_encode2+0xfb/0x3c0 [ 1084.727117][T22152] __kmalloc_noprof+0xf6/0x9c0 [ 1084.727139][T22152] ? tomoyo_encode2+0xfb/0x3c0 [ 1084.727155][T22152] tomoyo_encode2+0xfb/0x3c0 [ 1084.727175][T22152] tomoyo_encode+0x29/0x50 [ 1084.727189][T22152] tomoyo_realpath_from_path+0x18c/0x690 [ 1084.727212][T22152] tomoyo_mkdev_perm+0x231/0x570 [ 1084.727236][T22152] ? tomoyo_mkdev_perm+0x21d/0x570 [ 1084.727258][T22152] ? __pfx_tomoyo_mkdev_perm+0x10/0x10 [ 1084.727290][T22152] ? do_raw_spin_unlock+0x145/0x1e0 [ 1084.727326][T22152] ? __pfx_current_check_access_path+0x10/0x10 [ 1084.727353][T22152] ? simple_lookup+0x105/0x1d0 [ 1084.727374][T22152] tomoyo_path_mknod+0xe2/0x190 [ 1084.727393][T22152] ? __pfx_tomoyo_path_mknod+0x10/0x10 [ 1084.727414][T22152] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1084.727442][T22152] security_path_mknod+0x161/0x300 [ 1084.727463][T22152] do_mknodat+0x247/0x7a0 [ 1084.727481][T22152] ? __pfx_do_mknodat+0x10/0x10 [ 1084.727498][T22152] ? strncpy_from_user+0x19d/0x2d0 [ 1084.727523][T22152] ? getname_flags.part.0+0x1c5/0x540 [ 1084.727547][T22152] __x64_sys_mknod+0x118/0x170 [ 1084.727569][T22152] do_syscall_64+0xc9/0xf80 [ 1084.727593][T22152] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1084.727611][T22152] RIP: 0033:0x7f67d439acb9 [ 1084.727626][T22152] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1084.727643][T22152] RSP: 002b:00007f67d5229028 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1084.727660][T22152] RAX: ffffffffffffffda RBX: 00007f67d4615fa0 RCX: 00007f67d439acb9 [ 1084.727674][T22152] RDX: 0000000000000103 RSI: 00000000000020e9 RDI: 00002000000003c0 [ 1084.727683][T22152] RBP: 00007f67d4408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1084.727697][T22152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1084.727706][T22152] R13: 00007f67d4616038 R14: 00007f67d4615fa0 R15: 00007ffc129127f8 [ 1084.727730][T22152] [ 1084.728321][T22152] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1085.458167][T22166] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3746'. [ 1085.798387][T22178] FAULT_INJECTION: forcing a failure. [ 1085.798387][T22178] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.897593][T22178] CPU: 0 UID: 0 PID: 22178 Comm: syz.3.3748 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1085.897624][T22178] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1085.897630][T22178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1085.897641][T22178] Call Trace: [ 1085.897647][T22178] [ 1085.897654][T22178] dump_stack_lvl+0x100/0x190 [ 1085.897678][T22178] should_fail_ex.cold+0x5/0xa [ 1085.897699][T22178] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 1085.897716][T22178] should_failslab+0xc2/0x120 [ 1085.897737][T22178] kmem_cache_alloc_noprof+0x83/0x780 [ 1085.897757][T22178] ? skb_clone+0x190/0x400 [ 1085.897781][T22178] ? skb_clone+0x190/0x400 [ 1085.897801][T22178] skb_clone+0x190/0x400 [ 1085.897823][T22178] netlink_deliver_tap+0xaed/0xcc0 [ 1085.897848][T22178] netlink_unicast+0x650/0x870 [ 1085.897873][T22178] ? __pfx_netlink_unicast+0x10/0x10 [ 1085.897894][T22178] ? __asan_memset+0x23/0x50 [ 1085.897911][T22178] ? __build_skb_around+0x278/0x390 [ 1085.897930][T22178] ? is_vmalloc_addr+0x86/0xa0 [ 1085.897949][T22178] netlink_sendmsg+0x8b0/0xda0 [ 1085.897974][T22178] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1085.897995][T22178] ? __import_iovec+0x1d2/0x640 [ 1085.898019][T22178] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1085.898041][T22178] ____sys_sendmsg+0xa54/0xc30 [ 1085.898059][T22178] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1085.898078][T22178] ? try_to_wake_up+0x644/0x1a60 [ 1085.898098][T22178] ___sys_sendmsg+0x190/0x1e0 [ 1085.898116][T22178] ? __pfx____sys_sendmsg+0x10/0x10 [ 1085.898132][T22178] ? futex_private_hash_put+0x107/0x1c0 [ 1085.898160][T22178] ? find_held_lock+0x2b/0x80 [ 1085.898186][T22178] __sys_sendmsg+0x170/0x220 [ 1085.898207][T22178] ? __pfx___sys_sendmsg+0x10/0x10 [ 1085.898228][T22178] ? __x64_sys_futex+0x34f/0x4d0 [ 1085.898259][T22178] do_syscall_64+0xc9/0xf80 [ 1085.898279][T22178] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1085.898295][T22178] RIP: 0033:0x7f101039acb9 [ 1085.898308][T22178] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1085.898323][T22178] RSP: 002b:00007f100e5b4028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1085.898339][T22178] RAX: ffffffffffffffda RBX: 00007f1010616180 RCX: 00007f101039acb9 [ 1085.898350][T22178] RDX: 00000000000080c0 RSI: 0000200000001480 RDI: 0000000000000007 [ 1085.898360][T22178] RBP: 00007f1010408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1085.898369][T22178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1085.898377][T22178] R13: 00007f1010616218 R14: 00007f1010616180 R15: 00007ffe4724d6c8 [ 1085.898397][T22178] [ 1086.636174][T22187] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3751'. [ 1087.412395][T22210] FAULT_INJECTION: forcing a failure. [ 1087.412395][T22210] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1087.467366][T22210] CPU: 0 UID: 0 PID: 22210 Comm: syz.2.3754 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1087.467404][T22210] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1087.467410][T22210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1087.467420][T22210] Call Trace: [ 1087.467426][T22210] [ 1087.467433][T22210] dump_stack_lvl+0x100/0x190 [ 1087.467456][T22210] should_fail_ex.cold+0x5/0xa [ 1087.467482][T22210] _copy_to_user+0x32/0xd0 [ 1087.467511][T22210] ksys_msgctl.constprop.0+0x2cc/0x340 [ 1087.467530][T22210] ? __pfx_ksys_msgctl.constprop.0+0x10/0x10 [ 1087.467562][T22210] do_syscall_64+0xc9/0xf80 [ 1087.467582][T22210] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1087.467598][T22210] RIP: 0033:0x7f205319acb9 [ 1087.467610][T22210] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1087.467625][T22210] RSP: 002b:00007f2054139028 EFLAGS: 00000246 ORIG_RAX: 0000000000000047 [ 1087.467641][T22210] RAX: ffffffffffffffda RBX: 00007f2053415fa0 RCX: 00007f205319acb9 [ 1087.467651][T22210] RDX: 0000200000000180 RSI: 0000000000000003 RDI: 000000000000004e [ 1087.467660][T22210] RBP: 00007f2053208bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1087.467669][T22210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1087.467678][T22210] R13: 00007f2053416038 R14: 00007f2053415fa0 R15: 00007ffe31aa3788 [ 1087.467698][T22210] [ 1087.879924][T22213] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3755'. [ 1088.616532][T22226] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3757'. [ 1089.607579][T22250] FAULT_INJECTION: forcing a failure. [ 1089.607579][T22250] name failslab, interval 1, probability 0, space 0, times 0 [ 1089.676671][T22250] CPU: 0 UID: 0 PID: 22250 Comm: syz.2.3762 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1089.676701][T22250] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1089.676708][T22250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1089.676717][T22250] Call Trace: [ 1089.676724][T22250] [ 1089.676731][T22250] dump_stack_lvl+0x100/0x190 [ 1089.676754][T22250] should_fail_ex.cold+0x5/0xa [ 1089.676780][T22250] should_failslab+0xc2/0x120 [ 1089.676801][T22250] ? tomoyo_encode2+0xfb/0x3c0 [ 1089.676815][T22250] __kmalloc_noprof+0xf6/0x9c0 [ 1089.676837][T22250] ? tomoyo_encode2+0xfb/0x3c0 [ 1089.676850][T22250] tomoyo_encode2+0xfb/0x3c0 [ 1089.676867][T22250] tomoyo_encode+0x29/0x50 [ 1089.676881][T22250] tomoyo_realpath_from_path+0x18c/0x690 [ 1089.676902][T22250] tomoyo_mkdev_perm+0x231/0x570 [ 1089.676922][T22250] ? tomoyo_mkdev_perm+0x21d/0x570 [ 1089.676943][T22250] ? __pfx_tomoyo_mkdev_perm+0x10/0x10 [ 1089.676970][T22250] ? do_raw_spin_unlock+0x145/0x1e0 [ 1089.677002][T22250] ? __pfx_current_check_access_path+0x10/0x10 [ 1089.677026][T22250] ? simple_lookup+0x105/0x1d0 [ 1089.677045][T22250] tomoyo_path_mknod+0xe2/0x190 [ 1089.677062][T22250] ? __pfx_tomoyo_path_mknod+0x10/0x10 [ 1089.677081][T22250] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1089.677100][T22250] security_path_mknod+0x161/0x300 [ 1089.677118][T22250] do_mknodat+0x247/0x7a0 [ 1089.677136][T22250] ? __pfx_do_mknodat+0x10/0x10 [ 1089.677150][T22250] ? strncpy_from_user+0x19d/0x2d0 [ 1089.677181][T22250] ? getname_flags.part.0+0x1c5/0x540 [ 1089.677207][T22250] __x64_sys_mknod+0x118/0x170 [ 1089.677226][T22250] do_syscall_64+0xc9/0xf80 [ 1089.677246][T22250] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1089.677262][T22250] RIP: 0033:0x7f205319acb9 [ 1089.677276][T22250] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1089.677291][T22250] RSP: 002b:00007f2054139028 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1089.677307][T22250] RAX: ffffffffffffffda RBX: 00007f2053415fa0 RCX: 00007f205319acb9 [ 1089.677317][T22250] RDX: 0000000000000103 RSI: 00000000000020e9 RDI: 00002000000003c0 [ 1089.677327][T22250] RBP: 00007f2053208bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1089.677336][T22250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1089.677345][T22250] R13: 00007f2053416038 R14: 00007f2053415fa0 R15: 00007ffe31aa3788 [ 1089.677366][T22250] [ 1089.677383][T22250] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1090.416821][T22259] CIFS: No dialect specified on mount. Default has changed to a more secure dialect, SMB2.1 or later (e.g. SMB3.1.1), from CIFS (SMB1). To use the less secure SMB1 dialect to access old servers which do not support SMB3.1.1 (or even SMB3 or SMB2.1) specify vers=1.0 on mount. [ 1090.488482][T22256] FAULT_INJECTION: forcing a failure. [ 1090.488482][T22256] name failslab, interval 1, probability 0, space 0, times 0 [ 1090.522013][T22261] netlink: 5180 bytes leftover after parsing attributes in process `syz.0.3765'. [ 1090.555891][T22256] CPU: 0 UID: 0 PID: 22256 Comm: syz.1.3771 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1090.555924][T22256] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1090.555930][T22256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1090.555940][T22256] Call Trace: [ 1090.555947][T22256] [ 1090.555953][T22256] dump_stack_lvl+0x100/0x190 [ 1090.555977][T22256] should_fail_ex.cold+0x5/0xa [ 1090.556002][T22256] should_failslab+0xc2/0x120 [ 1090.556023][T22256] kmem_cache_alloc_noprof+0x83/0x780 [ 1090.556043][T22256] ? mempool_init_node+0x2f7/0x6e0 [ 1090.556069][T22256] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 1090.556090][T22256] ? mempool_init_node+0x2f7/0x6e0 [ 1090.556111][T22256] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 1090.556138][T22256] mempool_init_node+0x2f7/0x6e0 [ 1090.556165][T22256] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 1090.556186][T22256] ? __pfx_mempool_free_slab+0x10/0x10 [ 1090.556208][T22256] mempool_init_noprof+0x3a/0x50 [ 1090.556233][T22256] bioset_init+0x37e/0x8a0 [ 1090.556256][T22256] ? __pfx_bioset_init+0x10/0x10 [ 1090.556287][T22256] __alloc_disk_node+0x83/0x6b0 [ 1090.556312][T22256] __blk_alloc_disk+0xd2/0x170 [ 1090.556332][T22256] ? __pfx___blk_alloc_disk+0x10/0x10 [ 1090.556364][T22256] ? __pfx_idr_alloc+0x10/0x10 [ 1090.556380][T22256] ? lockdep_init_map_type+0x5c/0x250 [ 1090.556401][T22256] ? __raw_spin_lock_init+0x3a/0x110 [ 1090.556425][T22256] ? __pfx_hot_add_show+0x10/0x10 [ 1090.556448][T22256] zram_add+0x1bf/0x670 [ 1090.556470][T22256] ? __pfx_zram_add+0x10/0x10 [ 1090.556504][T22256] ? find_held_lock+0x2b/0x80 [ 1090.556518][T22256] ? sysfs_file_kobj+0xe4/0x290 [ 1090.556534][T22256] ? sysfs_file_kobj+0xe4/0x290 [ 1090.556553][T22256] ? __pfx_hot_add_show+0x10/0x10 [ 1090.556574][T22256] hot_add_show+0x21/0x80 [ 1090.556596][T22256] class_attr_show+0x72/0xa0 [ 1090.556617][T22256] ? __pfx_class_attr_show+0x10/0x10 [ 1090.556635][T22256] sysfs_kf_seq_show+0x217/0x3a0 [ 1090.556656][T22256] seq_read_iter+0x32f/0x1270 [ 1090.556680][T22256] kernfs_fop_read_iter+0x46c/0x610 [ 1090.556696][T22256] ? rw_verify_area+0xce/0x6d0 [ 1090.556711][T22256] ? __pfx_kernfs_fop_read_iter+0x10/0x10 [ 1090.556728][T22256] vfs_read+0x825/0xb30 [ 1090.556747][T22256] ? __pfx_vfs_read+0x10/0x10 [ 1090.556761][T22256] ? find_held_lock+0x2b/0x80 [ 1090.556788][T22256] ksys_read+0x12a/0x250 [ 1090.556804][T22256] ? __pfx_ksys_read+0x10/0x10 [ 1090.556826][T22256] do_syscall_64+0xc9/0xf80 [ 1090.556845][T22256] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1090.556861][T22256] RIP: 0033:0x7f67d439acb9 [ 1090.556875][T22256] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1090.556891][T22256] RSP: 002b:00007f67d5229028 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1090.556906][T22256] RAX: ffffffffffffffda RBX: 00007f67d4615fa0 RCX: 00007f67d439acb9 [ 1090.556917][T22256] RDX: 0000000000001000 RSI: 0000200000000ec0 RDI: 0000000000000008 [ 1090.556927][T22256] RBP: 00007f67d4408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1090.556937][T22256] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1090.556946][T22256] R13: 00007f67d4616038 R14: 00007f67d4615fa0 R15: 00007ffc129127f8 [ 1090.556968][T22256] [ 1090.872588][T22259] CIFS mount error: No usable UNC path provided in device string! [ 1090.872588][T22259] [ 1090.882861][T22259] CIFS: VFS: CIFS mount error: No usable UNC path provided in device string! [ 1091.003083][T22261] FAULT_INJECTION: forcing a failure. [ 1091.003083][T22261] name failslab, interval 1, probability 0, space 0, times 0 [ 1091.016761][T22261] CPU: 0 UID: 0 PID: 22261 Comm: syz.0.3765 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1091.016788][T22261] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1091.016794][T22261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1091.016803][T22261] Call Trace: [ 1091.016809][T22261] [ 1091.016814][T22261] dump_stack_lvl+0x100/0x190 [ 1091.016838][T22261] should_fail_ex.cold+0x5/0xa [ 1091.016862][T22261] should_failslab+0xc2/0x120 [ 1091.016883][T22261] __kmalloc_cache_noprof+0x80/0x810 [ 1091.016899][T22261] ? __request_module+0x2b7/0x650 [ 1091.016922][T22261] ? lockdep_hardirqs_on+0x78/0x100 [ 1091.016941][T22261] ? __request_module+0x2b7/0x650 [ 1091.016962][T22261] __request_module+0x2b7/0x650 [ 1091.016984][T22261] ? __pfx___request_module+0x10/0x10 [ 1091.017014][T22261] ? find_held_lock+0x2b/0x80 [ 1091.017029][T22261] ? inet_create+0xa72/0x1060 [ 1091.017050][T22261] inet_create+0xab1/0x1060 [ 1091.017072][T22261] ? inet_create+0x94/0x1060 [ 1091.017091][T22261] __sock_create+0x339/0x860 [ 1091.017111][T22261] __sys_socket+0x14d/0x260 [ 1091.017128][T22261] ? fput+0x79/0x100 [ 1091.017147][T22261] ? __pfx___sys_socket+0x10/0x10 [ 1091.017164][T22261] ? xfd_validate_state+0x129/0x190 [ 1091.017192][T22261] __x64_sys_socket+0x72/0xb0 [ 1091.017208][T22261] ? lockdep_hardirqs_on+0x78/0x100 [ 1091.017225][T22261] do_syscall_64+0xc9/0xf80 [ 1091.017244][T22261] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1091.017260][T22261] RIP: 0033:0x7f129439acb9 [ 1091.017272][T22261] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1091.017287][T22261] RSP: 002b:00007f129522d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 1091.017303][T22261] RAX: ffffffffffffffda RBX: 00007f1294616090 RCX: 00007f129439acb9 [ 1091.017313][T22261] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000002 [ 1091.017323][T22261] RBP: 00007f1294408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1091.017332][T22261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1091.017341][T22261] R13: 00007f1294616128 R14: 00007f1294616090 R15: 00007ffe0448e5e8 [ 1091.017360][T22261] [ 1091.660644][T22279] netlink: 354 bytes leftover after parsing attributes in process `syz.0.3768'. [ 1091.732202][T22279] FAULT_INJECTION: forcing a failure. [ 1091.732202][T22279] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1091.775332][T22279] CPU: 0 UID: 0 PID: 22279 Comm: syz.0.3768 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1091.775361][T22279] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1091.775367][T22279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1091.775377][T22279] Call Trace: [ 1091.775382][T22279] [ 1091.775388][T22279] dump_stack_lvl+0x100/0x190 [ 1091.775410][T22279] should_fail_ex.cold+0x5/0xa [ 1091.775436][T22279] _copy_from_user+0x2e/0xd0 [ 1091.775460][T22279] move_addr_to_kernel+0x65/0x170 [ 1091.775479][T22279] copy_msghdr_from_user+0x417/0x4f0 [ 1091.775496][T22279] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1091.775516][T22279] ? _kstrtoull+0x13c/0x1f0 [ 1091.775531][T22279] ? __pfx__kstrtoull+0x10/0x10 [ 1091.775550][T22279] ___sys_sendmsg+0x106/0x1e0 [ 1091.775568][T22279] ? __pfx____sys_sendmsg+0x10/0x10 [ 1091.775601][T22279] ? __pfx___might_resched+0x10/0x10 [ 1091.775628][T22279] __sys_sendmmsg+0x205/0x430 [ 1091.775652][T22279] ? __pfx___sys_sendmmsg+0x10/0x10 [ 1091.775678][T22279] ? __fget_files+0x215/0x3d0 [ 1091.775695][T22279] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1091.775721][T22279] ? fput+0x79/0x100 [ 1091.775741][T22279] ? ksys_write+0x1ac/0x250 [ 1091.775757][T22279] ? __pfx_ksys_write+0x10/0x10 [ 1091.775776][T22279] __x64_sys_sendmmsg+0x9c/0x100 [ 1091.775798][T22279] ? lockdep_hardirqs_on+0x78/0x100 [ 1091.775815][T22279] do_syscall_64+0xc9/0xf80 [ 1091.775834][T22279] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1091.775849][T22279] RIP: 0033:0x7f129439acb9 [ 1091.775862][T22279] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1091.775876][T22279] RSP: 002b:00007f129522d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1091.775892][T22279] RAX: ffffffffffffffda RBX: 00007f1294616090 RCX: 00007f129439acb9 [ 1091.775906][T22279] RDX: 0000000000003d55 RSI: 0000200000000080 RDI: 0000000000000016 [ 1091.775915][T22279] RBP: 00007f129522d090 R08: 0000000000000000 R09: 0000000000000000 [ 1091.775924][T22279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1091.775939][T22279] R13: 00007f1294616128 R14: 00007f1294616090 R15: 00007ffe0448e5e8 [ 1091.775959][T22279] [ 1093.238073][T22296] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3773'. [ 1093.335074][T22301] netlink: 'syz.3.3773': attribute type 1 has an invalid length. [ 1093.391031][T22301] netlink: 5 bytes leftover after parsing attributes in process `syz.3.3773'. [ 1093.747368][T22308] FAULT_INJECTION: forcing a failure. [ 1093.747368][T22308] name failslab, interval 1, probability 0, space 0, times 0 [ 1093.815480][T22308] CPU: 0 UID: 0 PID: 22308 Comm: syz.2.3777 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1093.815512][T22308] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1093.815519][T22308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1093.815528][T22308] Call Trace: [ 1093.815534][T22308] [ 1093.815541][T22308] dump_stack_lvl+0x100/0x190 [ 1093.815565][T22308] should_fail_ex.cold+0x5/0xa [ 1093.815592][T22308] should_failslab+0xc2/0x120 [ 1093.815612][T22308] ? tomoyo_encode2+0xfb/0x3c0 [ 1093.815627][T22308] __kmalloc_noprof+0xf6/0x9c0 [ 1093.815648][T22308] ? tomoyo_encode2+0xfb/0x3c0 [ 1093.815661][T22308] tomoyo_encode2+0xfb/0x3c0 [ 1093.815678][T22308] tomoyo_encode+0x29/0x50 [ 1093.815693][T22308] tomoyo_realpath_from_path+0x18c/0x690 [ 1093.815713][T22308] tomoyo_mkdev_perm+0x231/0x570 [ 1093.815734][T22308] ? tomoyo_mkdev_perm+0x21d/0x570 [ 1093.815755][T22308] ? __pfx_tomoyo_mkdev_perm+0x10/0x10 [ 1093.815783][T22308] ? do_raw_spin_unlock+0x145/0x1e0 [ 1093.815815][T22308] ? __pfx_current_check_access_path+0x10/0x10 [ 1093.815840][T22308] ? simple_lookup+0x105/0x1d0 [ 1093.815858][T22308] tomoyo_path_mknod+0xe2/0x190 [ 1093.815879][T22308] ? __pfx_tomoyo_path_mknod+0x10/0x10 [ 1093.815898][T22308] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1093.815917][T22308] security_path_mknod+0x161/0x300 [ 1093.815935][T22308] do_mknodat+0x247/0x7a0 [ 1093.815953][T22308] ? __pfx_do_mknodat+0x10/0x10 [ 1093.815967][T22308] ? strncpy_from_user+0x19d/0x2d0 [ 1093.815997][T22308] ? getname_flags.part.0+0x1c5/0x540 [ 1093.816021][T22308] __x64_sys_mknod+0x118/0x170 [ 1093.816041][T22308] do_syscall_64+0xc9/0xf80 [ 1093.816062][T22308] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1093.816078][T22308] RIP: 0033:0x7f205319acb9 [ 1093.816091][T22308] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1093.816107][T22308] RSP: 002b:00007f2054139028 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1093.816124][T22308] RAX: ffffffffffffffda RBX: 00007f2053415fa0 RCX: 00007f205319acb9 [ 1093.816134][T22308] RDX: 0000000000000103 RSI: 00000000000020e9 RDI: 00002000000003c0 [ 1093.816144][T22308] RBP: 00007f2053208bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1093.816153][T22308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1093.816162][T22308] R13: 00007f2053416038 R14: 00007f2053415fa0 R15: 00007ffe31aa3788 [ 1093.816182][T22308] [ 1094.306682][T22256] zram: Error allocating disk structure for device 0 [ 1095.111082][T22308] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1095.916113][T22329] FAULT_INJECTION: forcing a failure. [ 1095.916113][T22329] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1096.147681][T22329] CPU: 0 UID: 0 PID: 22329 Comm: syz.3.3782 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1096.147712][T22329] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1096.147719][T22329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1096.147729][T22329] Call Trace: [ 1096.147735][T22329] [ 1096.147742][T22329] dump_stack_lvl+0x100/0x190 [ 1096.147765][T22329] should_fail_ex.cold+0x5/0xa [ 1096.147790][T22329] _copy_from_iter+0x1f4/0x1690 [ 1096.147816][T22329] ? __alloc_skb+0x220/0x410 [ 1096.147835][T22329] ? __alloc_skb+0x35d/0x410 [ 1096.147854][T22329] ? __pfx__copy_from_iter+0x10/0x10 [ 1096.147876][T22329] ? netlink_autobind.isra.0+0x110/0x370 [ 1096.147906][T22329] netlink_sendmsg+0x808/0xda0 [ 1096.147933][T22329] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1096.147953][T22329] ? __import_iovec+0x1d2/0x640 [ 1096.147977][T22329] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1096.147998][T22329] ____sys_sendmsg+0xa54/0xc30 [ 1096.148016][T22329] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1096.148030][T22329] ? __pfx___futex_wait+0x10/0x10 [ 1096.148047][T22329] ? __pfx_futex_wake_mark+0x10/0x10 [ 1096.148072][T22329] ___sys_sendmsg+0x190/0x1e0 [ 1096.148090][T22329] ? __pfx____sys_sendmsg+0x10/0x10 [ 1096.148115][T22329] ? find_held_lock+0x2b/0x80 [ 1096.148141][T22329] __sys_sendmsg+0x170/0x220 [ 1096.148162][T22329] ? __pfx___sys_sendmsg+0x10/0x10 [ 1096.148183][T22329] ? __x64_sys_futex+0x34f/0x4d0 [ 1096.148212][T22329] do_syscall_64+0xc9/0xf80 [ 1096.148232][T22329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1096.148248][T22329] RIP: 0033:0x7f101039acb9 [ 1096.148261][T22329] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1096.148275][T22329] RSP: 002b:00007f100e5d5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1096.148291][T22329] RAX: ffffffffffffffda RBX: 00007f1010616090 RCX: 00007f101039acb9 [ 1096.148302][T22329] RDX: 000000000000e040 RSI: 0000200000001fc0 RDI: 0000000000000005 [ 1096.148312][T22329] RBP: 00007f1010408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1096.148321][T22329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1096.148330][T22329] R13: 00007f1010616128 R14: 00007f1010616090 R15: 00007ffe4724d6c8 [ 1096.148350][T22329] [ 1098.739594][T22363] FAULT_INJECTION: forcing a failure. [ 1098.739594][T22363] name failslab, interval 1, probability 0, space 0, times 0 [ 1098.804911][T22363] CPU: 0 UID: 0 PID: 22363 Comm: syz.0.3788 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1098.804942][T22363] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1098.804949][T22363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1098.804958][T22363] Call Trace: [ 1098.804964][T22363] [ 1098.804971][T22363] dump_stack_lvl+0x100/0x190 [ 1098.804996][T22363] should_fail_ex.cold+0x5/0xa [ 1098.805022][T22363] should_failslab+0xc2/0x120 [ 1098.805043][T22363] kmem_cache_alloc_noprof+0x83/0x780 [ 1098.805064][T22363] ? mempool_init_node+0x2f7/0x6e0 [ 1098.805090][T22363] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 1098.805110][T22363] ? mempool_init_node+0x2f7/0x6e0 [ 1098.805131][T22363] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 1098.805151][T22363] mempool_init_node+0x2f7/0x6e0 [ 1098.805177][T22363] ? __pfx_mempool_alloc_slab+0x10/0x10 [ 1098.805197][T22363] ? __pfx_mempool_free_slab+0x10/0x10 [ 1098.805226][T22363] mempool_init_noprof+0x3a/0x50 [ 1098.805252][T22363] bioset_init+0x37e/0x8a0 [ 1098.805276][T22363] ? __pfx_bioset_init+0x10/0x10 [ 1098.805306][T22363] __alloc_disk_node+0x83/0x6b0 [ 1098.805331][T22363] __blk_alloc_disk+0xd2/0x170 [ 1098.805352][T22363] ? __pfx___blk_alloc_disk+0x10/0x10 [ 1098.805387][T22363] ? __pfx_idr_alloc+0x10/0x10 [ 1098.805403][T22363] ? lockdep_init_map_type+0x5c/0x250 [ 1098.805425][T22363] ? __raw_spin_lock_init+0x3a/0x110 [ 1098.805450][T22363] ? __pfx_hot_add_show+0x10/0x10 [ 1098.805473][T22363] zram_add+0x1bf/0x670 [ 1098.805496][T22363] ? __pfx_zram_add+0x10/0x10 [ 1098.805531][T22363] ? find_held_lock+0x2b/0x80 [ 1098.805546][T22363] ? sysfs_file_kobj+0xe4/0x290 [ 1098.805562][T22363] ? sysfs_file_kobj+0xe4/0x290 [ 1098.805581][T22363] ? __pfx_hot_add_show+0x10/0x10 [ 1098.805603][T22363] hot_add_show+0x21/0x80 [ 1098.805624][T22363] class_attr_show+0x72/0xa0 [ 1098.805644][T22363] ? __pfx_class_attr_show+0x10/0x10 [ 1098.805662][T22363] sysfs_kf_seq_show+0x217/0x3a0 [ 1098.805684][T22363] seq_read_iter+0x32f/0x1270 [ 1098.805708][T22363] kernfs_fop_read_iter+0x46c/0x610 [ 1098.805724][T22363] ? rw_verify_area+0xce/0x6d0 [ 1098.805739][T22363] ? __pfx_kernfs_fop_read_iter+0x10/0x10 [ 1098.805756][T22363] vfs_read+0x825/0xb30 [ 1098.805775][T22363] ? __pfx_vfs_read+0x10/0x10 [ 1098.805789][T22363] ? find_held_lock+0x2b/0x80 [ 1098.805816][T22363] ksys_read+0x12a/0x250 [ 1098.805833][T22363] ? __pfx_ksys_read+0x10/0x10 [ 1098.805855][T22363] do_syscall_64+0xc9/0xf80 [ 1098.805874][T22363] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1098.805890][T22363] RIP: 0033:0x7f129439acb9 [ 1098.805903][T22363] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1098.805918][T22363] RSP: 002b:00007f129524e028 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1098.805933][T22363] RAX: ffffffffffffffda RBX: 00007f1294615fa0 RCX: 00007f129439acb9 [ 1098.805944][T22363] RDX: 0000000000001000 RSI: 0000200000000ec0 RDI: 0000000000000008 [ 1098.805953][T22363] RBP: 00007f1294408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1098.805963][T22363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1098.805972][T22363] R13: 00007f1294616038 R14: 00007f1294615fa0 R15: 00007ffe0448e5e8 [ 1098.805993][T22363] [ 1099.525813][T22371] FAULT_INJECTION: forcing a failure. [ 1099.525813][T22371] name failslab, interval 1, probability 0, space 0, times 0 [ 1099.550881][T22371] CPU: 0 UID: 0 PID: 22371 Comm: syz.2.3790 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1099.550912][T22371] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1099.550918][T22371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1099.550928][T22371] Call Trace: [ 1099.550934][T22371] [ 1099.550941][T22371] dump_stack_lvl+0x100/0x190 [ 1099.550964][T22371] should_fail_ex.cold+0x5/0xa [ 1099.550991][T22371] should_failslab+0xc2/0x120 [ 1099.551012][T22371] ? tomoyo_encode2+0xfb/0x3c0 [ 1099.551026][T22371] __kmalloc_noprof+0xf6/0x9c0 [ 1099.551048][T22371] ? tomoyo_encode2+0xfb/0x3c0 [ 1099.551061][T22371] tomoyo_encode2+0xfb/0x3c0 [ 1099.551078][T22371] tomoyo_encode+0x29/0x50 [ 1099.551092][T22371] tomoyo_realpath_from_path+0x18c/0x690 [ 1099.551113][T22371] tomoyo_mkdev_perm+0x231/0x570 [ 1099.551133][T22371] ? tomoyo_mkdev_perm+0x21d/0x570 [ 1099.551164][T22371] ? __pfx_tomoyo_mkdev_perm+0x10/0x10 [ 1099.551201][T22371] ? do_raw_spin_unlock+0x145/0x1e0 [ 1099.551233][T22371] ? __pfx_current_check_access_path+0x10/0x10 [ 1099.551258][T22371] ? simple_lookup+0x105/0x1d0 [ 1099.551277][T22371] tomoyo_path_mknod+0xe2/0x190 [ 1099.551294][T22371] ? __pfx_tomoyo_path_mknod+0x10/0x10 [ 1099.551312][T22371] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1099.551331][T22371] security_path_mknod+0x161/0x300 [ 1099.551348][T22371] do_mknodat+0x247/0x7a0 [ 1099.551366][T22371] ? __pfx_do_mknodat+0x10/0x10 [ 1099.551381][T22371] ? strncpy_from_user+0x19d/0x2d0 [ 1099.551403][T22371] ? getname_flags.part.0+0x1c5/0x540 [ 1099.551426][T22371] __x64_sys_mknod+0x118/0x170 [ 1099.551445][T22371] do_syscall_64+0xc9/0xf80 [ 1099.551465][T22371] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1099.551480][T22371] RIP: 0033:0x7f205319acb9 [ 1099.551494][T22371] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1099.551508][T22371] RSP: 002b:00007f2054139028 EFLAGS: 00000246 ORIG_RAX: 0000000000000085 [ 1099.551524][T22371] RAX: ffffffffffffffda RBX: 00007f2053415fa0 RCX: 00007f205319acb9 [ 1099.551534][T22371] RDX: 0000000000000103 RSI: 00000000000020e9 RDI: 00002000000003c0 [ 1099.551544][T22371] RBP: 00007f2053208bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1099.551553][T22371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1099.551563][T22371] R13: 00007f2053416038 R14: 00007f2053415fa0 R15: 00007ffe31aa3788 [ 1099.551584][T22371] [ 1099.551601][T22371] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1099.969608][T22378] FAULT_INJECTION: forcing a failure. [ 1099.969608][T22378] name fail_futex, interval 1, probability 0, space 0, times 0 [ 1099.988525][T22378] CPU: 0 UID: 0 PID: 22378 Comm: syz.1.3794 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1099.988554][T22378] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1099.988560][T22378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1099.988570][T22378] Call Trace: [ 1099.988576][T22378] [ 1099.988582][T22378] dump_stack_lvl+0x100/0x190 [ 1099.988605][T22378] should_fail_ex.cold+0x5/0xa [ 1099.988628][T22378] ? rcu_is_watching+0x12/0xc0 [ 1099.988649][T22378] get_futex_key+0x1d2/0x1620 [ 1099.988671][T22378] ? __pfx_get_futex_key+0x10/0x10 [ 1099.988688][T22378] ? ___sys_sendmsg+0x19d/0x1e0 [ 1099.988705][T22378] ? ___sys_sendmsg+0x127/0x1e0 [ 1099.988722][T22378] ? __pfx____sys_sendmsg+0x10/0x10 [ 1099.988741][T22378] futex_wake+0xea/0x530 [ 1099.988765][T22378] ? __pfx_futex_wake+0x10/0x10 [ 1099.988797][T22378] do_futex+0x32b/0x350 [ 1099.988817][T22378] ? __pfx_do_futex+0x10/0x10 [ 1099.988836][T22378] ? fput+0x79/0x100 [ 1099.988856][T22378] ? __sys_sendmsg+0x18f/0x220 [ 1099.988878][T22378] __x64_sys_futex+0x34f/0x4d0 [ 1099.988900][T22378] ? __pfx___x64_sys_futex+0x10/0x10 [ 1099.988927][T22378] do_syscall_64+0xc9/0xf80 [ 1099.988946][T22378] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1099.988962][T22378] RIP: 0033:0x7f67d439acb9 [ 1099.988976][T22378] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1099.988991][T22378] RSP: 002b:00007f67d52080e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1099.989007][T22378] RAX: ffffffffffffffda RBX: 00007f67d4616098 RCX: 00007f67d439acb9 [ 1099.989017][T22378] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f67d461609c [ 1099.989027][T22378] RBP: 00007f67d4616090 R08: 0000000000000000 R09: 0000000000000000 [ 1099.989036][T22378] R10: 0000000000000018 R11: 0000000000000246 R12: 0000000000000000 [ 1099.989045][T22378] R13: 00007f67d4616128 R14: 00007ffc12912710 R15: 00007ffc129127f8 [ 1099.989073][T22378] [ 1100.865356][T22363] zram: Error allocating disk structure for device 0 [ 1101.909235][T22411] synth uevent: /module/orangefs: unknown uevent action string [ 1103.228595][ T5843] Bluetooth: hci4: unexpected event for opcode 0x7c89 [ 1103.539364][T22439] FAULT_INJECTION: forcing a failure. [ 1103.539364][T22439] name failslab, interval 1, probability 0, space 0, times 0 [ 1103.670099][T22439] CPU: 0 UID: 0 PID: 22439 Comm: syz.1.3807 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1103.670144][T22439] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1103.670151][T22439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1103.670161][T22439] Call Trace: [ 1103.670167][T22439] [ 1103.670173][T22439] dump_stack_lvl+0x100/0x190 [ 1103.670197][T22439] should_fail_ex.cold+0x5/0xa [ 1103.670224][T22439] should_failslab+0xc2/0x120 [ 1103.670245][T22439] __kmalloc_cache_noprof+0x80/0x810 [ 1103.670262][T22439] ? ring_buffer_read_start+0x149/0x460 [ 1103.670288][T22439] ? ring_buffer_read_start+0x149/0x460 [ 1103.670310][T22439] ring_buffer_read_start+0x149/0x460 [ 1103.670332][T22439] ? __pfx_ring_buffer_read_start+0x10/0x10 [ 1103.670353][T22439] ? lockdep_init_map_type+0x5c/0x250 [ 1103.670375][T22439] ? ring_buffer_overruns+0x14e/0x1a0 [ 1103.670396][T22439] tracing_open+0x986/0xe00 [ 1103.670419][T22439] do_dentry_open+0x73e/0x1570 [ 1103.670436][T22439] ? __pfx_tracing_open+0x10/0x10 [ 1103.670455][T22439] ? security_inode_permission+0xbf/0x250 [ 1103.670480][T22439] vfs_open+0x82/0x3f0 [ 1103.670503][T22439] path_openat+0x21dc/0x3120 [ 1103.670527][T22439] ? __pfx_path_openat+0x10/0x10 [ 1103.670551][T22439] do_filp_open+0x1f7/0x420 [ 1103.670570][T22439] ? __pfx_do_filp_open+0x10/0x10 [ 1103.670600][T22439] ? _raw_spin_unlock+0x28/0x50 [ 1103.670614][T22439] ? alloc_fd+0x476/0x790 [ 1103.670645][T22439] do_sys_openat2+0x12e/0x220 [ 1103.670668][T22439] ? __pfx_do_sys_openat2+0x10/0x10 [ 1103.670692][T22439] ? __fget_files+0x21f/0x3d0 [ 1103.670712][T22439] __x64_sys_openat+0x12d/0x210 [ 1103.670735][T22439] ? __pfx___x64_sys_openat+0x10/0x10 [ 1103.670757][T22439] ? xfd_validate_state+0x129/0x190 [ 1103.670787][T22439] do_syscall_64+0xc9/0xf80 [ 1103.670806][T22439] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1103.670822][T22439] RIP: 0033:0x7f67d439acb9 [ 1103.670835][T22439] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1103.670851][T22439] RSP: 002b:00007f67d5208028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1103.670866][T22439] RAX: ffffffffffffffda RBX: 00007f67d4616090 RCX: 00007f67d439acb9 [ 1103.670877][T22439] RDX: 1a6b75d638828712 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1103.670887][T22439] RBP: 00007f67d4408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1103.670896][T22439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1103.670906][T22439] R13: 00007f67d4616128 R14: 00007f67d4616090 R15: 00007ffc129127f8 [ 1103.670927][T22439] [ 1104.328268][T22452] FAULT_INJECTION: forcing a failure. [ 1104.328268][T22452] name failslab, interval 1, probability 0, space 0, times 0 [ 1104.328300][T22452] CPU: 0 UID: 0 PID: 22452 Comm: syz.1.3811 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1104.328324][T22452] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1104.328330][T22452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1104.328339][T22452] Call Trace: [ 1104.328345][T22452] [ 1104.328352][T22452] dump_stack_lvl+0x100/0x190 [ 1104.328376][T22452] should_fail_ex.cold+0x5/0xa [ 1104.328399][T22452] ? __pfx_ref_tracker_alloc+0x10/0x10 [ 1104.328415][T22452] should_failslab+0xc2/0x120 [ 1104.328437][T22452] kmem_cache_alloc_noprof+0x83/0x780 [ 1104.328457][T22452] ? skb_clone+0x190/0x400 [ 1104.328482][T22452] ? skb_clone+0x190/0x400 [ 1104.328501][T22452] skb_clone+0x190/0x400 [ 1104.328523][T22452] netlink_deliver_tap+0xaed/0xcc0 [ 1104.328549][T22452] netlink_unicast+0x650/0x870 [ 1104.328584][T22452] ? __pfx_netlink_unicast+0x10/0x10 [ 1104.328615][T22452] netlink_sendmsg+0x8b0/0xda0 [ 1104.328641][T22452] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1104.328663][T22452] ? __import_iovec+0x1d2/0x640 [ 1104.328687][T22452] ? aa_sock_msg_perm.isra.0+0x100/0x1b0 [ 1104.328709][T22452] ____sys_sendmsg+0xa54/0xc30 [ 1104.328726][T22452] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1104.328745][T22452] ? try_to_wake_up+0x644/0x1a60 [ 1104.328765][T22452] ___sys_sendmsg+0x190/0x1e0 [ 1104.328783][T22452] ? __pfx____sys_sendmsg+0x10/0x10 [ 1104.328799][T22452] ? futex_private_hash_put+0x107/0x1c0 [ 1104.328826][T22452] ? find_held_lock+0x2b/0x80 [ 1104.328853][T22452] __sys_sendmsg+0x170/0x220 [ 1104.328874][T22452] ? __pfx___sys_sendmsg+0x10/0x10 [ 1104.328895][T22452] ? __x64_sys_futex+0x34f/0x4d0 [ 1104.328925][T22452] do_syscall_64+0xc9/0xf80 [ 1104.328945][T22452] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1104.328960][T22452] RIP: 0033:0x7f67d439acb9 [ 1104.328974][T22452] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1104.328988][T22452] RSP: 002b:00007f67d5229028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1104.329003][T22452] RAX: ffffffffffffffda RBX: 00007f67d4615fa0 RCX: 00007f67d439acb9 [ 1104.329013][T22452] RDX: 000000000000e040 RSI: 0000200000001fc0 RDI: 0000000000000005 [ 1104.329023][T22452] RBP: 00007f67d4408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1104.329033][T22452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1104.329043][T22452] R13: 00007f67d4616038 R14: 00007f67d4615fa0 R15: 00007ffc129127f8 [ 1104.329064][T22452] [ 1104.539869][T22449] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1105.366506][T22449] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1112.505632][ C0] sched: DL replenish lagged too much [ 1122.662363][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 1122.670936][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 1136.405770][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1136.406858][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1136.407593][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1136.408322][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1136.409044][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1136.409782][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1136.410497][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1136.411250][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1136.411983][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1136.412698][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1141.406609][ C0] net_ratelimit: 6649 callbacks suppressed [ 1141.406633][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1141.407363][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1141.408146][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1141.408901][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1141.409641][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1141.410388][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1141.411137][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1141.411883][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1141.412624][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1141.413372][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1146.416308][ C0] net_ratelimit: 6604 callbacks suppressed [ 1146.416326][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1146.417065][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1146.417814][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1146.418570][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1146.419317][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1146.420684][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1146.421444][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1146.422174][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1146.422900][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1146.423657][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1151.426615][ C0] net_ratelimit: 6547 callbacks suppressed [ 1151.426633][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1151.427369][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1151.428138][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1151.428870][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1151.429657][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1151.430486][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1151.431238][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1151.431966][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1151.432724][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1151.433469][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.436648][ C0] net_ratelimit: 6547 callbacks suppressed [ 1156.436665][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.437446][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.438254][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.439055][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.439828][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.440613][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.441392][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.442171][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.442965][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1156.443764][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.446299][ C0] net_ratelimit: 6621 callbacks suppressed [ 1161.446318][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.447101][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.448003][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.448772][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.449538][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.450310][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.451080][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.451847][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.452615][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1161.453403][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1166.456379][ C0] net_ratelimit: 12129 callbacks suppressed [ 1166.456399][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1166.456616][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1166.456889][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1166.457566][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1166.457781][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1166.458082][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1166.458749][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1166.458968][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1166.459228][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1166.459911][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1171.466513][ C0] net_ratelimit: 12329 callbacks suppressed [ 1171.466531][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1171.466749][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1171.466999][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1171.467765][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1171.467981][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1171.468230][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1171.468932][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1171.469147][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1171.469400][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1171.470093][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1176.475969][ C0] net_ratelimit: 12690 callbacks suppressed [ 1176.475988][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1176.476240][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1176.476945][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1176.477195][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1176.477445][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1176.478123][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1176.478354][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1176.478649][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1176.479323][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1176.479554][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.486210][ C0] net_ratelimit: 12820 callbacks suppressed [ 1181.486228][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1181.486468][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.486733][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.487499][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1181.487728][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.487991][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.488749][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1181.488976][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.489240][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1181.490001][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1182.597001][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 1182.611055][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 1186.496178][ C0] net_ratelimit: 12890 callbacks suppressed [ 1186.496196][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1186.496415][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.496667][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.497383][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1186.497605][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.497862][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.498563][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1186.498792][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.499048][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1186.499772][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1191.505942][ C0] net_ratelimit: 12434 callbacks suppressed [ 1191.505962][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1191.506249][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.506518][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.507206][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1191.507457][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.507712][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.508414][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1191.508646][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.508914][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1191.509626][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1196.516319][ C0] net_ratelimit: 12944 callbacks suppressed [ 1196.516336][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1196.516569][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.516826][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.517518][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1196.517764][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.518021][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.518708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1196.518929][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.519191][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1196.519887][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1201.526007][ C0] net_ratelimit: 13766 callbacks suppressed [ 1201.526025][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1201.526287][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1201.526997][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1201.527256][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1201.527439][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1201.527693][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1201.528401][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1201.528652][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1201.528834][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1201.529096][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1206.536602][ C0] net_ratelimit: 13944 callbacks suppressed [ 1206.536636][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1206.536903][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1206.537095][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1206.537358][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1206.538102][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1206.538366][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1206.538557][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1206.538826][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1206.539562][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1206.539832][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1211.545938][ C0] net_ratelimit: 13807 callbacks suppressed [ 1211.545956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1211.546144][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1211.546417][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1211.547113][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1211.547370][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1211.547608][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1211.547858][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1211.548550][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1211.548808][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1211.548990][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1216.555923][ C0] net_ratelimit: 14077 callbacks suppressed [ 1216.555942][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1216.556243][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1216.556447][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1216.556747][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1216.557534][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1216.557810][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1216.558027][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1216.558316][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1216.559075][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1216.559366][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1221.565933][ C0] net_ratelimit: 13607 callbacks suppressed [ 1221.565951][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1221.566174][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1221.566430][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1221.567155][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1221.567441][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1221.567659][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1221.567921][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1221.568670][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1221.568928][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1221.569121][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.576261][ C0] net_ratelimit: 14413 callbacks suppressed [ 1226.576279][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1226.576538][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1226.576719][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.576981][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.577668][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1226.577916][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1226.578106][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.578354][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1226.579055][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1226.579304][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1231.586528][ C0] net_ratelimit: 13958 callbacks suppressed [ 1231.586548][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1231.586814][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1231.587003][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1231.587256][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1231.587964][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1231.588218][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1231.588399][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1231.588675][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1231.589371][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1231.589623][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1236.596045][ C0] net_ratelimit: 13715 callbacks suppressed [ 1236.596063][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1236.596284][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.596568][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.597344][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1236.597642][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1236.597844][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.598123][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1236.598912][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1236.599190][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1236.599391][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.606056][ C0] net_ratelimit: 13968 callbacks suppressed [ 1241.606074][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.606760][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1241.607030][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1241.607211][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.607460][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.608167][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1241.608415][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1241.608595][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.608931][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1241.609617][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1244.030006][ T1303] ieee802154 phy0 wpan0: encryption failed: -22 [ 1244.037358][ T1303] ieee802154 phy1 wpan1: encryption failed: -22 [ 1246.616031][ C0] net_ratelimit: 14433 callbacks suppressed [ 1246.616050][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1246.616327][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1246.617022][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1246.617273][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1246.617474][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1246.617728][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1246.618459][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1246.618723][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:76:91:e4:c4:3b:a4, vlan:0) [ 1246.618905][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1246.619168][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1249.046359][ T31] INFO: task syz.0.3810:22458 blocked for more than 143 seconds. [ 1249.046383][ T31] Tainted: G U L syzkaller #0 [ 1249.046393][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1249.046400][ T31] task:syz.0.3810 state:D stack:27704 pid:22458 tgid:22445 ppid:15272 task_flags:0x400140 flags:0x00080002 [ 1249.046452][ T31] Call Trace: [ 1249.046459][ T31] [ 1249.046469][ T31] ? __schedule+0xf65/0x5e10 [ 1249.046491][ T31] __schedule+0xfe4/0x5e10 [ 1249.046508][ T31] ? __lock_acquire+0x4a5/0x2630 [ 1249.046540][ T31] ? __pfx___schedule+0x10/0x10 [ 1249.046555][ T31] ? find_held_lock+0x2b/0x80 [ 1249.046571][ T31] ? schedule+0x2bf/0x390 [ 1249.046590][ T31] schedule+0xdd/0x390 [ 1249.046606][ T31] schedule_preempt_disabled+0x13/0x30 [ 1249.046623][ T31] __mutex_lock+0xc9a/0x1b90 [ 1249.046644][ T31] ? fdget_pos+0x2aa/0x380 [ 1249.046666][ T31] ? __pfx___mutex_lock+0x10/0x10 [ 1249.046687][ T31] ? find_held_lock+0x2b/0x80 [ 1249.046703][ T31] ? __fget_files+0x215/0x3d0 [ 1249.046724][ T31] ? __fget_files+0x21f/0x3d0 [ 1249.046744][ T31] ? fdget_pos+0x2aa/0x380 [ 1249.046761][ T31] fdget_pos+0x2aa/0x380 [ 1249.046780][ T31] ksys_write+0x71/0x250 [ 1249.046799][ T31] ? __pfx_ksys_write+0x10/0x10 [ 1249.046822][ T31] do_syscall_64+0xc9/0xf80 [ 1249.046843][ T31] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1249.046860][ T31] RIP: 0033:0x7f129439acb9 [ 1249.046873][ T31] RSP: 002b:00007f12951ca028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1249.046889][ T31] RAX: ffffffffffffffda RBX: 00007f1294616360 RCX: 00007f129439acb9 [ 1249.046901][ T31] RDX: 0000000000000004 RSI: 0000200000000200 RDI: 0000000000000003 [ 1249.046911][ T31] RBP: 00007f1294408bf7 R08: 0000000000000000 R09: 0000000000000000 [ 1249.046921][ T31] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1249.046932][ T31] R13: 00007f12946163f8 R14: 00007f1294616360 R15: 00007ffe0448e5e8 [ 1249.046953][ T31] [ 1249.046964][ T31] [ 1249.046964][ T31] Showing all locks held in the system: [ 1249.046973][ T31] 1 lock held by kthreadd/2: [ 1249.046985][ T31] 1 lock held by khungtaskd/31: [ 1249.046994][ T31] #0: ffffffff8e5e31a0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x3d/0x184 [ 1249.047041][ T31] 1 lock held by kcompactd0/34: [ 1249.047052][ T31] 3 locks held by kworker/u8:3/50: [ 1249.047061][ T31] 3 locks held by kworker/u8:5/80: [ 1249.047076][ T31] 3 locks held by kworker/u8:7/1104: [ 1249.047085][ T31] #0: ffff88814d083148 ((wq_completion)ipv6_addrconf){+.+.}-{0:0}, at: process_one_work+0x11ae/0x1840 [ 1249.047139][ T31] #1: ffffc90003f9fc98 ((work_completion)(&(&net->ipv6.addr_chk_work)->work)){+.+.}-{0:0}, at: process_one_work+0x927/0x1840 [ 1249.047186][ T31] #2: ffffffff903f45e8 (rtnl_mutex){+.+.}-{4:4}, at: addrconf_verify_work+0x12/0x30 [ 1249.047232][ T31] 4 locks held by kworker/u8:8/1164: [ 1249.047243][ T31] 6 locks held by kworker/u8:9/2115: [ 1249.047262][ T31] 3 locks held by kworker/u8:13/3513: [ 1249.047271][ T31] 3 locks held by kworker/u8:14/3563: [ 1249.047280][ T31] 4 locks held by kworker/u8:15/3742: [ 1249.047289][ T31] 4 locks held by kworker/u8:19/4587: [ 1249.047300][ T31] 1 lock held by klogd/5196: [ 1249.047308][ T31] 2 locks held by udevd/5207: [ 1249.047317][ T31] 1 lock held by dhcpcd/5502: [ 1249.047327][ T31] 3 locks held by crond/5581: [ 1249.047336][ T31] 2 locks held by getty/5599: [ 1249.047344][ T31] #0: ffff8880315490a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 1249.047387][ T31] #1: ffffc9000332b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x419/0x1500 [ 1249.047428][ T31] 2 locks held by syz-executor/5825: [ 1249.047438][ T31] 2 locks held by kworker/0:6/5928: [ 1249.047447][ T31] 3 locks held by kworker/u8:2/10768: [ 1249.047457][ T31] 3 locks held by kworker/u8:4/11709: [ 1249.047467][ T31] 2 locks held by kworker/u8:21/11711: [ 1249.047476][ T31] 3 locks held by kworker/u8:25/11715: [ 1249.047485][ T31] 3 locks held by kworker/u8:26/11716: [ 1249.047498][ T31] 3 locks held by kworker/0:7/14296: [ 1249.047508][ T31] #0: ffff88813fe15948 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x11ae/0x1840 [ 1249.047553][ T31] #1: ffffc90003567c98 (deferred_process_work){+.+.}-{0:0}, at: process_one_work+0x927/0x1840 [ 1249.047598][ T31] #2: ffffffff903f45e8 (rtnl_mutex){+.+.}-{4:4}, at: switchdev_deferred_process_work+0xe/0x20 [ 1249.047638][ T31] 3 locks held by kworker/u8:28/14848: [ 1249.047648][ T31] 3 locks held by kworker/u8:29/14849: [ 1249.047657][ T31] 1 lock held by syz-executor/15272: [ 1249.047668][ T31] 1 lock held by syz-executor/15429: [ 1249.047680][ T31] 2 locks held by syz.0.2886/18472: [ 1249.047691][ T31] 3 locks held by kworker/u8:32/19320: [ 1249.047700][ T31] 3 locks held by kworker/u8:33/19321: [ 1249.047708][ T31] #0: ffff88813fe29948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_one_work+0x11ae/0x1840 [ 1249.047758][ T31] #1: ffffc9000bc17c98 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x927/0x1840 [ 1249.047802][ T31] #2: ffffffff903f45e8 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0x51/0xc0 [ 1249.047841][ T31] 4 locks held by kworker/u8:34/19322: [ 1249.047851][ T31] 3 locks held by kworker/0:8/20417: [ 1249.047860][ T31] #0: ffff88813fe16948 ((wq_completion)events_power_efficient){+.+.}-{0:0}, at: process_one_work+0x11ae/0x1840 [ 1249.047906][ T31] #1: ffffc9000e66fc98 ((reg_check_chans).work){+.+.}-{0:0}, at: process_one_work+0x927/0x1840 [ 1249.047951][ T31] #2: ffffffff903f45e8 (rtnl_mutex){+.+.}-{4:4}, at: reg_check_chans_work+0x91/0x10e0 [ 1249.047995][ T31] 2 locks held by kworker/0:10/21174: [ 1249.048004][ T31] 2 locks held by syz.3.3809/22442: [ 1249.048013][ T31] 10 locks held by syz.0.3810/22449: [ 1249.048022][ T31] #0: ffff888034f8cb78 (&f->f_pos_lock){+.+.}-{4:4}, at: fdget_pos+0x2aa/0x380 [ 1249.048062][ T31] #1: ffff888031ac0420 (sb_writers#7){.+.+}-{0:0}, at: do_writev+0x13e/0x340 [ 1249.048103][ T31] #2: ffff888068aeac88 (&of->mutex){+.+.}-{4:4}, at: kernfs_fop_write_iter+0x2c2/0x5f0 [ 1249.048147][ T31] #3: ffff888143742a58 (kn->active#52){.+.+}-{0:0}, at: kernfs_fop_write_iter+0x332/0x5f0 [ 1249.048188][ T31] #4: ffffffff8f94fe08 (nsim_bus_dev_list_lock){+.+.}-{4:4}, at: del_device_store+0xd1/0x480 [ 1249.048235][ T31] #5: ffff888035bb30e8 (&dev->mutex){....}-{4:4}, at: device_release_driver_internal+0xaa/0x600 [ 1249.048278][ T31] #6: ffff88807a8a7250 (&devlink->lock_key#5){+.+.}-{4:4}, at: nsim_drv_remove+0x4a/0x1e0 [ 1249.048323][ T31] #7: ffffffff903f45e8 (rtnl_mutex){+.+.}-{4:4}, at: nsim_destroy+0x108/0x830 [ 1249.048360][ T31] #8: ffff88803568cd38 (&dev_instance_lock_key#24){+.+.}-{4:4}, at: unregister_netdevice_many_notify+0xd49/0x2580 [ 1249.048412][ T31] #9: ffffffff8e5ef978 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x27f/0x3c0 [ 1249.048454][ T31] 4 locks held by syz.0.3810/22453: [ 1249.048463][ T31] 1 lock held by syz.0.3810/22458: [ 1249.048472][ T31] #0: ffff888034f8cb78 (&f->f_pos_lock){+.+.}-{4:4}, at: fdget_pos+0x2aa/0x380 [ 1249.048512][ T31] 2 locks held by syz.2.3814/22464: [ 1249.048521][ T31] [ 1249.048525][ T31] ============================================= [ 1249.048525][ T31] [ 1249.048536][ T31] NMI backtrace for cpu 0 [ 1249.048550][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Tainted: G U L syzkaller #0 PREEMPT(full) [ 1249.048572][ T31] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1249.048578][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1249.048586][ T31] Call Trace: [ 1249.048591][ T31] [ 1249.048597][ T31] dump_stack_lvl+0x100/0x190 [ 1249.048616][ T31] nmi_cpu_backtrace.cold+0x12d/0x151 [ 1249.048635][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 1249.048660][ T31] nmi_trigger_cpumask_backtrace+0x1d7/0x230 [ 1249.048685][ T31] sys_info+0x141/0x190 [ 1249.048705][ T31] watchdog+0xcc3/0xfe0 [ 1249.048725][ T31] ? __pfx_watchdog+0x10/0x10 [ 1249.048741][ T31] ? __kthread_parkme+0x18c/0x230 [ 1249.048760][ T31] ? __pfx_watchdog+0x10/0x10 [ 1249.048775][ T31] ? __pfx_watchdog+0x10/0x10 [ 1249.048789][ T31] kthread+0x3b3/0x730 [ 1249.048811][ T31] ? __pfx_kthread+0x10/0x10 [ 1249.048830][ T31] ? ret_from_fork+0x79/0xaf0 [ 1249.048844][ T31] ? ret_from_fork+0x79/0xaf0 [ 1249.048857][ T31] ? rcu_is_watching+0x12/0xc0 [ 1249.048871][ T31] ? __pfx_kthread+0x10/0x10 [ 1249.048893][ T31] ret_from_fork+0x754/0xaf0 [ 1249.048907][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 1249.048923][ T31] ? __switch_to+0x7b9/0x10c0 [ 1249.048942][ T31] ? __pfx_kthread+0x10/0x10 [ 1249.048963][ T31] ret_from_fork_asm+0x1a/0x30 [ 1249.048993][ T31] [ 1249.049009][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 1249.049020][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Tainted: G U L syzkaller #0 PREEMPT(full) [ 1249.049041][ T31] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1249.049047][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026 [ 1249.049056][ T31] Call Trace: [ 1249.049061][ T31] [ 1249.049067][ T31] dump_stack_lvl+0x100/0x190 [ 1249.049084][ T31] vpanic+0x20d/0x630 [ 1249.049099][ T31] panic+0xd1/0xd1 [ 1249.049112][ T31] ? __pfx_panic+0x10/0x10 [ 1249.049131][ T31] ? nmi_cpu_backtrace+0x79/0x200 [ 1249.049155][ T31] ? nmi_trigger_cpumask_backtrace+0x1be/0x230 [ 1249.049176][ T31] ? watchdog.cold+0x198/0x1ca [ 1249.049192][ T31] ? watchdog+0xcd3/0xfe0 [ 1249.049208][ T31] watchdog.cold+0x1a9/0x1ca [ 1249.049229][ T31] ? __pfx_watchdog+0x10/0x10 [ 1249.049245][ T31] ? __kthread_parkme+0x18c/0x230 [ 1249.049263][ T31] ? __pfx_watchdog+0x10/0x10 [ 1249.049280][ T31] ? __pfx_watchdog+0x10/0x10 [ 1249.049294][ T31] kthread+0x3b3/0x730 [ 1249.049315][ T31] ? __pfx_kthread+0x10/0x10 [ 1249.049335][ T31] ? ret_from_fork+0x79/0xaf0 [ 1249.049348][ T31] ? ret_from_fork+0x79/0xaf0 [ 1249.049363][ T31] ? rcu_is_watching+0x12/0xc0 [ 1249.049377][ T31] ? __pfx_kthread+0x10/0x10 [ 1249.049398][ T31] ret_from_fork+0x754/0xaf0 [ 1249.049413][ T31] ? __pfx_ret_from_fork+0x10/0x10 [ 1249.049429][ T31] ? __switch_to+0x7b9/0x10c0 [ 1249.049448][ T31] ? __pfx_kthread+0x10/0x10 [ 1249.049469][ T31] ret_from_fork_asm+0x1a/0x30 [ 1249.049499][ T31] [ 1249.049550][ T31] Kernel Offset: disabled