last executing test programs: 21.693516114s ago: executing program 3 (id=519): r0 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv6/conf/veth1_vlan/disable_ipv6\x00', 0x82002, 0x0) r1 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv6/conf/virt_wifi0/ra_defrtr_metric\x00', 0x0, 0x0) sendfile$auto(r0, r1, 0x0, 0x15) 21.313477945s ago: executing program 3 (id=522): r0 = socket(0xa, 0x5, 0x84) mmap$auto(0x0, 0xa, 0xdb, 0x9b72, 0x5, 0x8000) r1 = io_uring_setup$auto(0x6, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0xaa102, 0x0) r2 = syz_genetlink_get_family_id$auto_nl802154(&(0x7f0000000100), r1) sendmsg$auto_NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1e8, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x8}, @NL802154_ATTR_COORDINATOR={0x24, 0x1e, 0x0, 0x1, [@nested={0x14, 0x50, 0x0, 0x1, [@generic="4a2a132cfd3bfe642e192f2f", @nested={0x4, 0x9c}]}, @typed={0xc, 0x7b, 0x0, 0x0, @u64=0x2000000000}]}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x7}, @NL802154_ATTR_SEC_LEVEL={0x16f, 0x2d, 0x0, 0x1, [@nested={0x147, 0x29, 0x0, 0x1, [@generic="e45d1b5fa3af96d96d06c501ffd4e513dafdedd26de1d69311f79a0be1576844d3767dd2d66f3cfa699139f55f803573517a9e68ac075a99dfff2ca35f6c86b7dcb42d46e1ec2ee083a119812423caf8b1bf6c4a5d0c7b018c334bc4d4d0ee9877424fbdd077ff12e58d32cd4a2bbdcd571b577a1dd9d82b850a0b4eae935f9c44f97af9ea85e215", @typed={0x8, 0x12b, 0x0, 0x0, @u32=0x3}, @generic="787bb8b9bbda3adff838e26153d055c1e7865124aa47508d9134926d88d2587fea0998410db6b008f09a7e041bf443d9149ad7edba2e1f6ec3be2f016ca5c393564c81e4813ce9105859dc64e301f605afa4c4ec729ba4bbae6816f1a42f5a74993a2cafc54e932fad794b8909e75a16b6d97ef712462c9329031f92d69c33f345abbb02ad217ceaf8188cf615f4ea6dbb5c9fa61d78632f4fbb3b1f6f1b25d464b148f698920318861fe8031cd2847781b39f"]}, @generic="1031bf4d07139a69738e9a078ffe2941c1ad5eb16175110f120360f7a3bf0366323ad5"]}, @NL802154_ATTR_WPAN_PHY_NAME={0xa, 0x2, 'bond0\x00'}, @NL802154_ATTR_IFNAME={0x14, 0x4, 'hsr0\x00'}, @NL802154_ATTR_CCA_ED_LEVEL={0x8, 0xe, 0x7}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x1}, 0x88c0) mremap$auto(0x4000, 0xfee0, 0x3fd6, 0x3, 0x0) mmap$auto(0x0, 0x420009, 0xdf, 0xeb1, 0xffffffffffffffff, 0x8000) r3 = openat$auto_btrfs_ctl_fops_super(0xffffffffffffff9c, &(0x7f0000003880), 0x20000, 0x0) ioctl$auto_BTRFS_IOC_FORGET_DEV(r3, 0x50009405, 0x0) writev$auto(0xffffffffffffffff, 0x0, 0x4) close_range$auto(0x0, 0x5, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty12\x00', 0x800, 0x0) r4 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000080)='/dev/tty12\x00', 0x101840, 0x0) r5 = socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) ioctl$auto(r4, 0x541c, r5) 20.928893288s ago: executing program 3 (id=525): r0 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/snd/controlC0\x00', 0x1000, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) socket(0x10, 0x2, 0x0) sendmsg$auto_OVS_DP_CMD_NEW(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0f0026bd7000fcdbdf9907"], 0x24}, 0x1, 0x0, 0x0, 0x20000800}, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01eb"], 0x14}, 0x1, 0x0, 0x0, 0x20040800}, 0x24004000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1200"], 0x1ac}}, 0x40000) sendmmsg$auto(r0, &(0x7f00000001c0)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0x9}, 0x0, 0x0, 0x0, 0x6}, 0x7}, 0x3, 0xa2b) madvise$auto(0x0, 0xffffffffffff0005, 0x19) r1 = openat$auto_snapshot_fops_user(0xffffffffffffff9c, &(0x7f0000000180), 0x1001, 0x0) ioctl$auto_SNAPSHOT_FREE_SWAP_PAGES(r1, 0x3309, 0x0) mincore$auto(0x1000, 0x8001, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000140)='/dev/tty50\x00', 0x40, 0x0) fchmodat2$auto(0xffffffffffffffff, 0x0, 0x5, 0x0) mmap$auto(0x0, 0x2020009, 0x7, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) getrandom$auto(0x0, 0x6000000, 0x3) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$auto(0x3, 0x4018aebd, 0x38) r3 = openat$auto_proc_single_file_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/ksm_stat\x00', 0x2, 0x0) read$auto_proc_single_file_operations_base(r3, &(0x7f0000000040)=""/228, 0xe4) 19.725510881s ago: executing program 1 (id=528): mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) socketpair$auto(0x1, 0x5, 0x8000000000000000, 0x0) mmap$auto(0x2, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = socket(0x22, 0x2, 0x24) r1 = getsockopt$auto(r0, 0x3, 0x1, 0x0, 0x0) rseq$auto(0x0, 0x8000, 0x0, 0x6) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, r1, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r2 = socket(0x2b, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@can, 0x6c) sendmmsg$auto(r2, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800009}, 0x3, 0x20000000) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) recvfrom$auto(0x3, 0x0, 0x800000000e, 0x100, 0x0, 0xfffffffffffffffd) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mbind$auto(0x3, 0x100000007, 0x1, 0x0, 0x2, 0x2) madvise$auto(0x0, 0xffffffff97fb20a5, 0x10002) openat$auto_mon_fops_binary_mon_bin(0xffffffffffffff9c, &(0x7f0000000080)='/dev/usbmon2\x00', 0x40080, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x7b1602, 0x0) socket(0x1f, 0x800, 0xffffff01) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x400005, 0xdf, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket(0x1, 0x5, 0x0) socket(0x2, 0x1, 0x0) sysfs$auto(0x2, 0x11, 0x0) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) connect$auto(0x3, 0x0, 0x55) r3 = openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa1\x00', 0x101041, 0x0) writev$auto(r3, &(0x7f00000000c0)={&(0x7f0000000080), 0x8}, 0x94) 19.090363898s ago: executing program 3 (id=531): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) io_uring_register$auto(0x2, 0x13, 0x0, 0x2) mmap$auto(0x0, 0x400008, 0x1000df, 0x9b72, 0x2, 0x8000) madvise$auto(0x0, 0xffffffffffff0001, 0x15) mmap$auto(0x2, 0x2020009, 0x9, 0xeb1, 0xffffffffffffffff, 0x8000) mmap$auto(0x0, 0x4005, 0x2, 0x40eb2, 0x401, 0x300000000000) close_range$auto(0x0, 0xfffff004, 0x2) socket(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0xa, 0x2, 0x88) r2 = socket(0xa, 0x2, 0x3a) setsockopt$auto(r2, 0x29, 0x39, &(0x7f0000000080)='\x15!\xa8^J/\xddCx4!\x00\xd3\x8f\x1e\x1b\xc3 \xe2\xa8\xd6\xd9\xc0\xa2\x0f\x88\xb1e\x8a\xd8?\xfe\xda\xc4\xef\xff(i\xc6@\x91[\vBj\x0eQ\xce\x16\'C\x8cYA\x92u\xd5\xb8\\\x82,\xe2=y\x9bR\xbcn\xa0c\x16~\x86\"t\xde\x14\xe4\xa5\xfe\xb5', 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'veth1_to_hsr\x00', 0x0}) bpf$auto(0x0, &(0x7f00000000c0)=@bpf_attr_5={@target_ifindex=r5, r4, 0x8, 0xff, r1, @relative_fd, 0xe600}, 0xf) bpf$auto(0x2, &(0x7f00000001c0)=@raw_tracepoint={0x5, 0xffffffffffffffff, 0x0, 0x1}, 0x4) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) msync$auto(0x0, 0xe0, 0x6) write$auto(0xffffffffffffffff, 0x0, 0x4) 17.71848592s ago: executing program 3 (id=533): r0 = socket(0x1b, 0x3, 0x76) madvise$auto(0x0, 0x2000040080000004, 0xe) r1 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0) write$auto(r1, &(0x7f0000000040)='//\xf2\x00', 0x80000000) getsockopt$auto_SO_RCVPRIORITY(r0, 0x2, 0x52, 0x0, &(0x7f0000000240)=0x7) r2 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) keyctl$auto(0x20, 0x72510000000, 0x69c9, 0x2, 0x6) r4 = syz_genetlink_get_family_id$auto_nfsd(&(0x7f0000002f00), 0xffffffffffffffff) sendmsg$auto_NFSD_CMD_LISTENER_SET(r3, &(0x7f0000005380)={0x0, 0x0, &(0x7f0000005340)={&(0x7f0000000180)={0x28, r4, 0x1, 0x870bd2b, 0x25dfdbfc, {}, [@NFSD_A_SERVER_SOCK_ADDR={0x14, 0x1, 0x0, 0x1, [@NFSD_A_SOCK_TRANSPORT_NAME={0x9, 0x2, 'nfsd\x00'}, @NFSD_A_SOCK_ADDR={0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xc000}, 0x20000000) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r2, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r5 = socket(0x10, 0x2, 0x0) sendmsg$auto_CTRL_CMD_GETPOLICY(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="0500000089b90000df254a93391e1c"], 0x14}, 0x1, 0x0, 0x0, 0x20008000}, 0x10004090) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="1a00"], 0x1ac}}, 0x40000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) recvmmsg$auto(r5, &(0x7f0000000100)={{0x0, 0x4, &(0x7f0000000080)={&(0x7f0000000040), 0x100000000cb}, 0x3, 0x0, 0x80000000, 0x80000000}, 0x9}, 0x7, 0x6, 0x0) r6 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="72010000", @ANYBLOB="18"], 0x1ac}}, 0x20000000) select$auto(0xe, 0x0, 0x0, 0x0, 0x0) syz_clone(0x4040400, 0x0, 0x0, 0x0, 0x0, 0x0) readv$auto(0x3, 0x0, 0x1) sendmsg$auto_NL80211_CMD_GET_WOWLAN(r3, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000029bd7000fcdbdf25490000000c005800080000000000000034008180050001000700000005000100020000000500010007ffff0005000100ad000000050002000300000005000200650000004bdaa088a124877d7a1d49d19647e4cf993b124dd1e9531d7433e8bdeb53c208e8405087831da9b518ed63ace52a05f88a"], 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004810}, 0x800) syz_genetlink_get_family_id$auto_nlctrl(&(0x7f00000001c0), r0) close_range$auto(0x2, 0x8, 0x0) openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) 17.505504124s ago: executing program 2 (id=535): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = socket(0x2, 0x1, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x3a}}, 0x6e) sendmmsg$auto(r0, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800009}, 0x9, 0x20000000) io_uring_setup$auto(0x1, 0x0) mmap$auto(0x0, 0x101, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r1 = openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bus/usb/021/001\x00', 0x2101, 0x0) ioctl$auto_USBDEVFS_RELEASEINTERFACE(r1, 0x80045510, 0x0) r2 = openat$auto_nsim_dev_health_break_fops_health(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/netdevsim/netdevsim2/health/break_health\x00', 0x48081, 0x0) write$auto(r2, 0x0, 0x1ff) socket(0x10, 0x2, 0x0) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) write$auto(0x3, 0x0, 0xfffffdef) mmap$auto(0x0, 0x202000f, 0x2000000000000000, 0x80000000000eb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x40000c, 0xdf, 0x9b72, 0xffffffffffffffff, 0x7ffd) r3 = inotify_init1$auto(0x3000000000000) r4 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/controlC2\x00', 0x0, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000040)=0x5) r5 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$auto_XFS_IOC_SWAPEXT(r3, 0xc0c0586d, &(0x7f00000003c0)={0x2, @inferred=r4, @inferred=r5, 0x8001, 0x5, '\x00', {0x103, 0xcd4b, 0x0, 0x0, 0x0, 0x4, 0xffffffff, 0xffff, {0x5, 0x4}, {0x80}, {0xffffffffffffffff, 0x1}, 0x400, 0x3, 0x4, 0x5, 0x2, 0xca50, 0xffff, 0x7, 0x81, 0x201, '\x00', 0xfff, 0x9, 0x5, 0x6}}) close_range$auto(r6, 0x8, 0x1) socket(0x10, 0x2, 0x0) socket(0x10, 0x2, 0x0) socketpair$auto(0xff, 0x101, 0x8, &(0x7f0000000080)=0x6) 17.187882035s ago: executing program 1 (id=537): mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) (async) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) socket(0x28, 0x801, 0x0) connect$auto(0x3, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x2711}, 0x51) mmap$auto(0x0, 0x276, 0xdf, 0xeb1, 0x401, 0x8000) (async) socketpair$auto(0x1, 0x5, 0x8000000000000000, 0x0) setsockopt$auto(0x200000000000003, 0x1, 0x2c, 0x0, 0x300) (async) shutdown$auto(0x200000003, 0x2) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) close_range$auto(0x2, 0x8, 0x0) (async) mmap$auto(0x0, 0x40005, 0xdf, 0x9b72, 0x7, 0x28000) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$auto_uinput_fops_uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x400, 0x0) (async) ioctl$auto_UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, &(0x7f00000003c0)=0x4) (async) mmap$auto(0x0, 0xa, 0xdb, 0x9b72, 0x5, 0x8000) connect$auto(0x3, &(0x7f00000000c0)=@vsock={0x28, 0x0, 0x2711}, 0x51) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dmmidi2\x00', 0x0, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) (async) open(&(0x7f0000000100)='./bus\x00', 0x14d27e, 0x72) (async) socket(0x6, 0x2, 0x1) (async) write$auto(r0, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) (async) close_range$auto(0x2, 0x8, 0x2) (async) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r1 = socket(0x29, 0x2, 0x0) (async) r2 = socket(0x10, 0x2, 0x0) (async) sendmsg$auto_ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x2000000}, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYRES16=r0, @ANYBLOB="1200", @ANYBLOB="ed6e"], 0x1ac}}, 0x40000) (async) recvmmsg$auto(r2, &(0x7f0000000140)={{0x0, 0xfffffffe, 0x0, 0x5, 0x0, 0x200002, 0x8}, 0x801}, 0xfffffff9, 0x10, 0x0) (async) ioctl$auto(r1, 0x8923, 0x24) 16.57743803s ago: executing program 0 (id=539): r0 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x40814}, 0x2004c0c4) select$auto(0x9, 0x0, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) write$auto(0xffffffffffffffff, &(0x7f00000002c0)='0\x00\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94\xf8F\xbb\xa2\xbb>\xade\x18\xbd\xe2\x1c\x89OO]e[\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\xef`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\b};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xacA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xde\f/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(\x95\xdfH\xf4\v\xf3CRnz\xc2\x13<\xf0\v\x1f\x14\xf3\xd0\xf2\xd1L!\x81\xea\x83\xa0\r|%\xbf\x02trg\x9a\xe7\x00\x85Z\x06?\x12\x98\x0f)\a\xf4\xaa\x05\xc0\xa0r\xd2\x85\x8dH\xd0>\xca\xfc5\x01\x95O4\xca\x95\x1d\x83\xec\nD\x8e\xfb\xce\xd1w\x15:\xe9\x81/B#\xc6\xa1\xfa-\x1b\x8cr\x92nM\xa1;\xe4pd$\xd7\x1b\v\x82\r\f\xd0Hq\xd9\r\x88#\x89\x8d\xcd\x1e\xc7N\xeeO\x8dO\xe9\xfc\x91\xa1\xa8HR+\a\xb7R\t\n+\x7f\xd5H\x90G=\x9a\r\xb10\x17n\x1b\xf8\v\x11\v\xbb\xc8^\xa4\xe2\x05\x91|\x123\xc3:\xfd\xee\x04a\xc8\x12\xce\xa2\x12\xcb\x8c\x87f\xebGQ\xe9\x96\xd5E\x13a\xb7\x057<&\xe0\x94\xa7\xfb\x9d;\xfa\xb1\x1b4a,\'\xb2Ym\xe1:\xbf\x8cs\x06\xa3u\x8d!\n\x80-\x9a\xbb;\xf4\xf3\xe1\x97\xfc8\xff\xa7\\\x8b\xf9\x95\x10$\xef\x1a #b\xfb\xfe\xe9\x06fK0\xdd\x84T,\xfa\xb5\x00\x83d\xbba\xd7\n\x92\x90|l\xdfAN\x9d\xcb\x96\xc7\xe8\xe6\x8bC\xeb\xc7EZ\xc8\x1a\x81nf\tZ-sZ\x13n\xec\xa9\xbf\xd0$\xb9\xd8\x00'/507, 0x1098c7) sendmmsg$auto(r0, &(0x7f0000000200)={{0x0, 0x3f00, &(0x7f0000000100)={0x0, 0xfc2}, 0x2, 0x0, 0x7, 0xa505}, 0x800}, 0x7, 0x4008) 16.402351257s ago: executing program 1 (id=540): r0 = socket(0x11, 0x3, 0x9) capset$auto(0x0, &(0x7f0000000000)={0xb213, 0x2c, 0x800}) sendmmsg$auto(r0, &(0x7f0000000400)={{&(0x7f0000000000), 0x5aa, &(0x7f00000000c0)={&(0x7f0000000040)="661b0cbd4aeb2ba218", 0x5dc}, 0x1, &(0x7f0000000200), 0x5, 0x3}, 0x4}, 0x2, 0x100) 16.129511308s ago: executing program 1 (id=541): mmap$auto(0x0, 0x1, 0xdf, 0xeb4, 0x40000000000a5, 0x8000) close_range$auto(0x2, 0xa, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/platform/vhci_hcd.0/usbip_debug\x00', 0x8002, 0x0) r0 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security/tomoyo/domain_policy\x00', 0x40602, 0x0) read$auto(r0, 0x0, 0x7ff) preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xfffffffd}, 0x6, 0x8, 0x5) write$auto(0x3, 0x0, 0x5c8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)) getdents$auto(r1, 0x0, 0xc08) write$auto(0x3, 0x0, 0x5c8) 15.939716553s ago: executing program 1 (id=542): r0 = socket(0x2, 0x1, 0x106) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) connect$auto(0x3, &(0x7f00000000c0)=@in={0x2, 0x3}, 0x55) setsockopt$auto(r0, 0x6, 0xd, &(0x7f0000000280)='lp\x00h\x85M\xdf\xdc\x83\x8a\xa7\xe4]U(\x01\t=\x1e\x00\x00', 0x4) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0xf1, 0x2, 0x8000) remap_file_pages$auto(0x5, 0x1000, 0x0, 0x8, 0x10007) openat$auto_proc_pid_cmdline_ops_base(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r1 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x68, 0x0, 0x4000000}, 0x0) mmap$auto(0x0, 0x1a, 0xdf, 0x9b72, 0x2, 0x7fffffff) sendfile$auto(0x3, 0xffffffffffffffff, 0x0, 0x400000000006) tkill$auto(0x0, 0xe6) write$auto(0x3, 0x0, 0x100082) unshare$auto(0x40000080) move_mount$auto(0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x77) setsockopt$auto(0x3, 0x114, 0xa, 0x0, 0x4) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xebf, 0x401, 0x8000) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x0) open(0x0, 0x22240, 0x155) r3 = socket(0x2, 0x80802, 0x0) close_range$auto(0x2, 0xa, 0x0) socket(0x18, 0xa, 0x1) socket(0xa, 0x2, 0x88) connect$auto(0x3, &(0x7f00000018c0)=@generic={0xa, "ab06fdffff00fff500"}, 0x55) setsockopt$auto(r3, 0x11, 0x67, 0x0, 0x8) sendmmsg$auto(0x3, 0x0, 0x3, 0x0) 15.718606661s ago: executing program 2 (id=543): r0 = socket(0xa, 0x5, 0x84) mmap$auto(0x0, 0xa, 0xdb, 0x9b72, 0x5, 0x8000) r1 = io_uring_setup$auto(0x6, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0xaa102, 0x0) r2 = syz_genetlink_get_family_id$auto_nl802154(&(0x7f0000000100), r1) sendmsg$auto_NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1e4, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x8}, @NL802154_ATTR_COORDINATOR={0x24, 0x1e, 0x0, 0x1, [@nested={0x14, 0x50, 0x0, 0x1, [@generic="4a2a132cfd3bfe642e192f2f", @nested={0x4, 0x9c}]}, @typed={0xc, 0x7b, 0x0, 0x0, @u64=0x2000000000}]}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x7}, @NL802154_ATTR_SEC_LEVEL={0x16b, 0x2d, 0x0, 0x1, [@nested={0x147, 0x29, 0x0, 0x1, [@generic="e45d1b5fa3af96d96d06c501ffd4e513dafdedd26de1d69311f79a0be1576844d3767dd2d66f3cfa699139f55f803573517a9e68ac075a99dfff2ca35f6c86b7dcb42d46e1ec2ee083a119812423caf8b1bf6c4a5d0c7b018c334bc4d4d0ee9877424fbdd077ff12e58d32cd4a2bbdcd571b577a1dd9d82b850a0b4eae935f9c44f97af9ea85e215", @typed={0x8, 0x12b, 0x0, 0x0, @u32=0x3}, @generic="787bb8b9bbda3adff838e26153d055c1e7865124aa47508d9134926d88d2587fea0998410db6b008f09a7e041bf443d9149ad7edba2e1f6ec3be2f016ca5c393564c81e4813ce9105859dc64e301f605afa4c4ec729ba4bbae6816f1a42f5a74993a2cafc54e932fad794b8909e75a16b6d97ef712462c9329031f92d69c33f345abbb02ad217ceaf8188cf615f4ea6dbb5c9fa61d78632f4fbb3b1f6f1b25d464b148f698920318861fe8031cd2847781b39f"]}, @generic="1031bf4d07139a69738e9a078ffe2941c1ad5eb16175110f120360f7a3bf03"]}, @NL802154_ATTR_WPAN_PHY_NAME={0xa, 0x2, 'bond0\x00'}, @NL802154_ATTR_IFNAME={0x14, 0x4, 'hsr0\x00'}, @NL802154_ATTR_CCA_ED_LEVEL={0x8, 0xe, 0x7}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x1}, 0x88c0) mremap$auto(0x4000, 0xfee0, 0x3fd6, 0x3, 0x0) mmap$auto(0x0, 0x420009, 0xdf, 0xeb1, 0xffffffffffffffff, 0x8000) r3 = openat$auto_btrfs_ctl_fops_super(0xffffffffffffff9c, &(0x7f0000003880), 0x20000, 0x0) ioctl$auto_BTRFS_IOC_FORGET_DEV(r3, 0x50009405, 0x0) writev$auto(0xffffffffffffffff, 0x0, 0x4) mmap$auto(0x0, 0xfb1, 0xffffffff, 0x9b72, 0x2, 0x8000) lsm_list_modules$auto(0x0, 0x0, 0x0) r4 = socket(0x2, 0x801, 0x106) getsockopt$auto(r4, 0x11c, 0x3, 0x0, 0x0) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x89fc, &(0x7f0000000040)={'bond0\x00'}) clone3$auto(0x0, 0x1000) 15.457445957s ago: executing program 0 (id=544): openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000180)='/proc/kcore\x00', 0xc40, 0x0) r0 = getpid() socket(0x2, 0x2, 0x0) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0x401bf, 0x734f, 0x36, 0x67f, 0x1ffde, 0x7, 0x3, 0x20000002, 0xd, 0x3, 0x1, 0x2091, 0xb4, 0x9, 0x6, 0x6, 0x80, 0x4, 0x1cd7, 0x1000, 0x2000, 0x203, 0x0, 0x10000084}, 0x1fe, 0xd) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) mmap$auto(0x0, 0x9, 0xc00000072, 0x8b72, 0x1000000002, 0x8000) openat$auto_ep0_operations_inode(0xffffffffffffff9c, 0x0, 0x8a001, 0x0) r1 = openat$auto_l2cap_debugfs_fops_(0xffffffffffffff9c, &(0x7f0000000140), 0x20200, 0x0) mmap$auto(0x61, 0x2020009, 0xdee, 0xeb8, r1, 0x800003) sendmsg$auto_NET_SHAPER_CMD_GROUP(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2004c804}, 0x14) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) io_uring_setup$auto(0xa, 0x0) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x40008000) getsockopt$auto_SO_SNDLOWAT(r2, 0x0, 0x13, &(0x7f0000000040)=')&*\x00', &(0x7f0000000080)) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) setxattr$auto(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='/dev/audio1\x00', &(0x7f0000000440)="eaf229d51acc87277d8f4d6898e57730ea2e52f56c9f20ff258fb7022c049d9b0355bd12e8999ab9cf4c008c5a347dd3e9daf9fa88b05efcb37d19889beb1189ab278e29654df6332d94c321a3c22e45d6aa7d0b37593796d9b1d272fe5ebd7e463302a7923a146e94998cbd12c1d7bb7abc56f6dd5e90fadb887dfb4b25eb5ef3eba359ac78a519cfb54ef64957cd4dd9665b423836b9237d765703cc9079cb406b58f9d428efd3e10ec25a1e5100", 0x9, 0x101) sendmmsg$auto(0x3, &(0x7f0000000000)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xac}, 0x5, 0x0, 0x1, 0x697b}, 0xed7138c}, 0x2, 0x9) recvmmsg$auto(0x4, 0x0, 0x7, 0xe, 0x0) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0x2003f0, 0x15) shutdown$auto(0x200000003, 0x2) r3 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/cec18\x00', 0x900, 0x0) ioctl$auto_CEC_S_MODE(r3, 0x40046109, &(0x7f0000000000)=0xf2) getsid$auto(r0) write$auto(0xffffffffffffffff, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) 15.156059606s ago: executing program 2 (id=545): socket(0x2, 0x1, 0x106) modify_ldt$auto(0x1, 0x0, 0x10) openat$auto_evdev_fops_evdev(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/input/event1\x00', 0x34d802, 0x0) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) r1 = socketcall$auto(0x8000, 0x0) close_range$auto(0x2, 0x8, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) openat$auto_fops_blob_file(0xffffffffffffff9c, &(0x7f0000011500), 0x20ac0, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) write$auto(0x3, 0x0, 0x580000000) write$auto(0x3, 0x0, 0xfffffdef) ioctl$auto_EVIOCSREP(r1, 0x40084503, &(0x7f0000000040)=[0x7, 0x2]) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) socket(0x2, 0x1, 0x106) ioctl$auto(0x3, 0xae41, r1) ioctl$auto_KVM_CREATE_VM(r0, 0xae80, 0x0) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0x8000) openat$auto_regulator_summary_fops_(0xffffffffffffff9c, 0x0, 0x408200, 0x0) close_range$auto(0x2, 0x8, 0x0) setresuid$auto(0x8000000000000001, 0x1, 0x200) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r3 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) close_range$auto(0x2, 0x8, 0x0) r4 = openat$auto_bch_chardev_fops_chardev(0xffffffffffffff9c, &(0x7f0000000580), 0x400, 0x0) ioctl$auto_BCH_IOCTL_FSCK_OFFLINE(r4, 0x4018bc13, 0x0) writev$auto(r3, &(0x7f0000000200)={0x0, 0x3}, 0x3) pread64$auto(0xffffffffffffffff, 0x0, 0x7, 0xffff) 15.081949497s ago: executing program 0 (id=546): r0 = socket(0x10, 0x4, 0x8) r1 = openat$auto_msft_opcode_fops_(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/bluetooth/hci0/msft_opcode\x00', 0x0, 0x0) read$auto(r1, &(0x7f0000006740)='^%-[)>\'\xdf\x00', 0xffff) setresuid$auto(0x0, 0x0, 0xffffffffffffffff) unshare$auto(0x40000080) mmap$auto(0x0, 0x2020005, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) read$auto(r2, 0x0, 0x20) r3 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r3, &(0x7f0000000200)={0x0, 0x7}, 0x3) io_uring_setup$auto(0x1, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) r4 = fanotify_init$auto(0x401, 0x1) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x20342, 0x0) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/bus/usb/001/001\x00', 0x29202, 0x0) mmap$auto(0x0, 0x4, 0xffb, 0x8000000008012, 0x3, 0x0) mount$auto(0x0, &(0x7f00000000c0)='.\x00', &(0x7f0000000100)='nfsd\x00\xee\x1a\x8fg\x1b\x04\xad>\x96\xe9IG\xbe\xc8\x12\xae\xc3\xc0@[\x99\xec\xbf(\xec\xc3\xb2\xf2\x15Zi\xc4S6\'\x14\x05\t\x8c\xd5?\xa0\x00\xd8\xe4\xafW\xcc\xa3\xce\t\xf8p\xc6\x00\x00\x00\x00\xb9\xac\xde\x0e\x90\x18\xf1\x13I\x95\xe12\xaclJ\xba\xeb\xe4\x83Z\xaev\xd7\xd9\xdd\x14\x81\xbe\xab\xed\xd5MI\x830_\xc2\x14O\x84\xaa\x13W\xb7\x06\'fvQ\x95\xc5\xd1\x98\xe3T\xees\xf0\xc2\xad\xae\x99\xeb\xc5\xf0\"\x92\xcdfk\xc7\xe9\x96\r\x91\xb0\xc46\xf2\xfc\xef\xfe\xa0\xc9d\xb3h$\xeb\xad\xa4P\x8f\xc3bM{4RQ\x00\x9d)_\xd81(\x03\xca1\x88|\xe5\x1e\x10\x89X\x01\xe9\xf6g\x95xx\xaf\xa9~m\x05\xa2\xe4\x81\xb9\x92\xda\x13\xfe5\xfb\xc6\xd8>\x01\xd4\x14\x94o\x1b[\xa8]\x9b\x03\x95\xc3\xad\xad\x1d#oi|\x04\x93N\xfa\x17\xf3b\xf6\x00\x00\x00', 0x0, 0x0) getcwd$auto(0x0, 0xffffffffffffffff) fspick$auto(r4, 0x0, 0x4) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) unshare$auto(0x40000080) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x40814}, 0x2004c0c4) r5 = openat$auto_dai_list_fops_(0xffffffffffffff9c, &(0x7f0000000280), 0x30041, 0x0) read$auto_dai_list_fops_(r5, &(0x7f0000000780)=""/34, 0x22) select$auto(0x9, 0x0, 0x0, 0x0, 0x0) mkdir$auto(&(0x7f0000000000)='./file0\x00', 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x401, 0x8000) write$auto(0xffffffffffffffff, &(0x7f00000002c0)='0\x00\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94\xf8F\xbb\xa2\xbb>\xade\x18\xbd\xe2\x1c\x89OO]e[\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\xef`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\b};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xacA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xde\f/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(\x95\xdfH\xf4\v\xf3CRnz\xc2\x13<\xf0\v\x1f\x14\xf3\xd0\xf2\xd1L!\x81\xea\x83\xa0\r|%\xbf\x02trg\x9a\xe7\x00\x85Z\x06?\x12\x98\x0f)\a\xf4\xaa\x05\xc0\xa0r\xd2\x85\x8dH\xd0>\xca\xfc5\x01\x95O4\xca\x95\x1d\x83\xec\nD\x8e\xfb\xce\xd1w\x15:\xe9\x81/B#\xc6\xa1\xfa-\x1b\x8cr\x92nM\xa1;\xe4pd$\xd7\x1b\v\x82\r\f\xd0Hq\xd9\r\x88#\x89\x8d\xcd\x1e\xc7N\xeeO\x8dO\xe9\xfc\x91\xa1\xa8HR+\a\xb7R\t\n+\x7f\xd5H\x90G=\x9a\r\xb10\x17n\x1b\xf8\v\x11\v\xbb\xc8^\xa4\xe2\x05\x91|\x123\xc3:\xfd\xee\x04a\xc8\x12\xce\xa2\x12\xcb\x8c\x87f\xebGQ\xe9\x96\xd5E\x13a\xb7\x057<&\xe0\x94\xa7\xfb\x9d;\xfa\xb1\x1b4a,\'\xb2Ym\xe1:\xbf\x8cs\x06\xa3u\x8d!\n\x80-\x9a\xbb;\xf4\xf3\xe1\x97\xfc8\xff\xa7\\\x8b\xf9\x95\x10$\xef\x1a #b\xfb\xfe\xe9\x06fK0\xdd\x84T,\xfa\xb5\x00\x83d\xbba\xd7\n\x92\x90|l\xdfAN\x9d\xcb\x96\xc7\xe8\xe6\x8bC\xeb\xc7EZ\xc8\x1a\x81nf\tZ-sZ\x13n\xec\xa9\xbf\xd0$\xb9\xd8\x00'/507, 0x1098c7) sendmmsg$auto(r0, &(0x7f0000000200)={{0x0, 0x0, &(0x7f0000000100)={0x0, 0xfc2}, 0x2, 0x0, 0x7, 0xa505}, 0xfffffffd}, 0x7, 0x4008) 13.557444353s ago: executing program 2 (id=547): tgkill$auto(0x1, 0x1, 0x5) mmap$auto(0x0, 0x20009, 0x4000000000db, 0xeb1, 0x400, 0x8000) sendmsg$auto_OVS_PACKET_CMD_EXECUTE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x78, 0x0, 0x1b, 0x70bd26, 0x5dfdbfd, {}, [@OVS_PACKET_ATTR_ACTIONS={0x5d, 0x3, 0x0, 0x1, [@nested={0x4, 0x11}, @generic="9c887a6de138be204ad2b7b442189f2566cfc5c6e0a8ec5ca68962505c82f5345d9123db93896cf8dbcfde3a3d330ff8afe67ae02677518657098fa7ca0362c41ee083708cd367214fbe25af55be9a7fcde6ecb617"]}, @OVS_PACKET_ATTR_ACTIONS={0x4}]}, 0x78}, 0x1, 0x0, 0x0, 0x4004040}, 0xc800) socket(0x10, 0x2, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0x28102, 0x0) r0 = syz_genetlink_get_family_id$auto_tipcv2(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_TIPC_NL_LINK_GET(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000051c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="1800000072bb24e4052dbbe48f2cb2eed8b41dea46fdca121229cc951ddd0818ce29b6aaf55cb0e74da2634836775a12a1f3acd622949a686ff5c4f643b45aeb14778dcb3d5c556130ea82ef058bc434a7d5dda330b86aa6b45b2f0085f438487e092aba58d203f42c34cfafda12676f64a15bda847c4db17e7e87469a8018dd9ee5172c3741d4d2c41a29", @ANYRES16=r0, @ANYBLOB="010326bd7000fedbdf250800000004000480"], 0x18}, 0x1, 0x0, 0x0, 0x24000874}, 0x8c0) adjtimex$auto(&(0x7f00000004c0)={0xf332b6e, 0x0, 0x0, 0xfffffffffffffffd, 0x20000000000000d4, 0x1, 0x6, 0x0, 0x7, 0x368a, 0x2, {0x100000000, 0x10000}, 0x5, 0x8, 0xfffffffffffffffd, 0x1007fff, 0x0, 0x8, 0x81, 0xdfffffffffff628e, 0x6, 0xdeb1, 0x808}) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty12\x00', 0x800, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D1\x00', 0x1, 0x0) mmap$auto(0x0, 0x10000, 0xffb, 0x8000000008011, 0x3, 0x8000) r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$auto(r2, 0x5453, r2) getrandom$auto(0x0, 0x8, 0x7) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nbd7\x00', 0x80000, 0x0) syz_genetlink_get_family_id$auto_nbd(0x0, 0xffffffffffffffff) sendmsg$auto_NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x8880) r3 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/virtual/tty/ptyab/power/autosuspend_delay_ms\x00', 0xc2082, 0x0) write$auto(r3, &(0x7f00000004c0)='N\x00\\\xa0\x04|\x03\xcb\x12\xfa\b\x1c\xc7k', 0x7ff) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x80840, 0x0) sendmsg$auto_NETDEV_CMD_DEV_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x0) kexec_load$auto(0xff, 0x2, &(0x7f0000000080)={@kbuf, 0x2, 0x8000, 0x3000}, 0x4) statx$auto(0xffffff9c, 0x0, 0x1000, 0x803, 0x0) ioctl$auto_IOCTL_VMCI_QUEUEPAIR_SETVA(0xffffffffffffffff, 0x7a4, 0x0) socket(0x10, 0x2, 0xc) syz_genetlink_get_family_id$auto_nlctrl(&(0x7f00000002c0), 0xffffffffffffffff) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) 13.337422141s ago: executing program 2 (id=548): r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$auto(r0, 0xc0285443, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r1 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/pts/ptmx\x00', 0x40001, 0x0) ioctl$auto_TCFLSH2(r1, 0x80045439, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$auto_ovs_ct_limit(&(0x7f0000000840), r2) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0xc) socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) close_range$auto(0x2, 0x8, 0x0) r5 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) ioctl$auto_KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r5) ioctl$auto_KVM_GET_MSRS(r4, 0x4008ae89, &(0x7f0000000040)={0x2, 0x0, [{0x4b564d01, 0x400, 0x8000}]}) mbind$auto(0x2000, 0x100000004, 0x100000000, 0x0, 0x6, 0x2) sendmsg$auto_OVS_CT_LIMIT_CMD_SET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000006400)={0x1c, r3, 0x1a4, 0x51bd2e, 0x25dfcbfb, {}, [@OVS_CT_LIMIT_ATTR_ZONE_LIMIT={0x4}, @OVS_CT_LIMIT_ATTR_ZONE_LIMIT={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000c040}, 0x4) keyctl$auto(0x3, 0x0, 0x0, 0x0, 0x8) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$auto_ovs_ct_limit(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$auto_OVS_CT_LIMIT_CMD_DEL(r6, &(0x7f0000003480)={0x0, 0x0, &(0x7f0000003440)={&(0x7f00000003c0)={0x2b4, r7, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@OVS_CT_LIMIT_ATTR_ZONE_LIMIT={0x295, 0x1, 0x0, 0x1, [@typed={0x8, 0xba, 0x0, 0x0, @uid}, @generic="98438034f6706b2ec21af8f19adfca41f9a3d03deb3e496a1cf79699aed488464c387f8c82e407e2b54821f80d6a6a2c069ab15adc20750e37ed36c83698de5a2e4a4432a0162899f5", @nested={0x23f, 0x120, 0x0, 0x1, [@generic="582d22e33f14b088fbb65fb807121723ed569c2098e5d373a1dbaeeac464e1aa903d95a1c9b62d6eeec1bee3ce7e9cdde48f66fa376ea8ca090952f1fe1e12a83feb", @typed={0x6, 0x4, 0x0, 0x0, @str='.\x00'}, @nested={0x16c, 0x50, 0x0, 0x1, [@generic="a2009235f7b52ef2bf2db1d0443ae08fd2d4c33eea655b2968fe59db0a7515ad0c3850fc98078aa73727b5c97afe2fb2c3f86ca43bb0ee0d316b478e45d86f50247a534a408d9f5932214450ce33f923b56f85a9a623e7c462035a846c011f1636da6a2bee788422fcce831567d0565b4d64b756c87f407d1dffccbe77c6c8ccf2f6cbb5ad9c3729e15dc6cb0fa59d8256f7689d963a1a6a701c5cd16138ba41ced134db80a969d3dee67dda5cb1358fc43d1760e7cb20843f52db4c182e5660752dbf5a612291eab8bdef05a41c8212b3", @generic="baf606f0dd3bc284ca6f7fb136daba4e61e0878a937b31acdcad9b76d4247aa7bf1d2fe8f75348cf3d98c55dac1f4aad072359be01604f4f6ee098ec60fbd4ebc7d832fe3d92534b494baa9dd73fa9dd355e405927203a6003c62e48964eb4922a3e6f81a93e3b0976c4741bfac4bdd340e0053e32f003b390d73cbe9953071be7a6b1d00846a5ca8ce11d", @typed={0x8, 0x24, 0x0, 0x0, @str='$.,\x00'}, @nested={0x4, 0x7}]}, @typed={0x14, 0x6d, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x1f}}, @generic="11420d1aa7d3d766d732ce45d34afaa84872f8094d58bea3d41eaf8114a66b305bcb0cb48455c1839717bc3c6eb8d99a3fa43d6173bae928bd597a14a19bca350e4a6aac9fc154f59386582c2f103e9e64b3a508d4d0ad317dd4f045b4c412e447905d06a3ecf8fca9a30f93278eabb131"]}]}, @OVS_CT_LIMIT_ATTR_ZONE_LIMIT={0x8, 0x1, 0x0, 0x1, [@nested={0x4, 0x2d}]}]}, 0x2b4}, 0x1, 0x0, 0x0, 0x40c4}, 0xc000) 12.650549052s ago: executing program 1 (id=549): openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000100)='/sys/devices/virtual/tty/console/active\x00', 0x103280, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000140), r0) r1 = prctl$auto(0x23, 0x9, 0x0, 0x0, 0x0) ioperm$auto(0x7, 0x1, 0x7) modify_ldt$auto(0x1, 0x0, 0x10) ioperm$auto(0x7, 0x6, 0x2) r2 = gettid() rt_sigqueueinfo$auto(r2, 0x2, 0x0) openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/lru_gen\x00', 0xc0000, 0x0) socket(0x26, 0xa, 0x7) set_mempolicy$auto(0x2, &(0x7f0000000080)=0x7e, 0x4) clone$auto(0x20003b46, 0x876b, 0x0, 0x0, 0xffffffff7ffffffe) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r3, &(0x7f0000003280)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) sendmsg$auto_BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="2c00000092b0f58b30abaf58e298f7b447c30d83a63463c9bb0526019f50cde4428cdc6e", @ANYBLOB="100025bd7000fbdbdf250f00000008000300", @ANYRES32=0x0, @ANYRESOCT], 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x140080e4) r4 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sched_setaffinity$auto(r2, 0x4, &(0x7f0000000240)=0x6) prctl$auto(0x6, 0x2, r2, 0x4, 0xd) sendmsg$auto_NL80211_CMD_RELOAD_REGDB(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01002dbd7000fcdbdf257e000000"], 0x14}, 0x1, 0x68, 0x0, 0x4000000}, 0x0) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) mkdir$auto(&(0x7f0000000100)='}[,&*}\x00', 0x2) ioctl$auto_SOUND_MIXER_READ_DEVMASK2(r1, 0x80044dfe, &(0x7f0000000440)="eef0f8c0d7d2d004af228f87ab52165b290fa3c95848a45d400d7221cea921b3de5f17b96d618a020567214832327fee6753ef375629ed3f6ce5f2a3de33d1a4338c378b53f78be4575c32f6dbbf612f34cd6adba1c59b5d27cb250ff7fe830d7739d60e0115f9dc7d3ff0ac5b9010b9d91f20c2e037e10f0bb5e8c6d64e8596bb9bc67d0e7424c6cc542980ad38406fa5afec73c81bad715e23053dc709f8fd57e1dc6b89209a1857297abed82282f107bede8fea0e01f01c1892241d39dabd2e5206eb700869ef406f44d8b91e897c5bef6caad711e3880510be70d781476342f1d624036fef229c4aa80588e4") mount$auto(0x0, &(0x7f0000000540)='}[,&*}\x00', &(0x7f0000000040)='nfsd\x00', 0x3, &(0x7f00000003c0)="3dd1fa31") unshare$auto(0x40000080) ioctl$auto_TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) r6 = openat$auto_proc_pid_attr_operations_base(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/exec\x00', 0x101002, 0x0) write$auto_proc_pid_attr_operations_base(r6, &(0x7f0000000200)="a597d9ce6359203d", 0x8) 12.497519452s ago: executing program 0 (id=550): r0 = openat$auto_event_trigger_fops_trace(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/tracing/events/vmalloc/alloc_vmap_area/trigger\x00', 0x0, 0x0) writev$auto(r0, &(0x7f00000000c0)={&(0x7f0000000000)="f0fc002471c60d923e33f10dc322f556b75d9f5b48fa34e08deec61e6e3ea4d96cc25631c549e86818422441680113dcdda4a93973ab403654811697b0f3fc9eddc33b1f3b7bc5e57ffddc316105cbbb218b546ac9eed9f18b1d057802258d705967231a55e4473edfaabf29411b04e386005c28dd2d0d1726eb758afffd91680007040efe100b0cb80072bdaeee25489290910b00a1226a171e3502c0642969bbb400b68199e45489511e868d3be8816e", 0x8}, 0x80000001) readv$auto(r0, &(0x7f0000001080)={&(0x7f0000000080), 0x5c2}, 0x5) 12.431064354s ago: executing program 3 (id=551): socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) write$auto(0x3, 0x0, 0x7fffffff) write$auto(0x1, 0x0, 0x80000000) mmap$auto(0x6dea, 0x5, 0x9, 0x17, r0, 0x10001) openat$auto_dvb_demux_fops_dmxdev(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xfffffffd}, 0x6, 0x8, 0x5) openat$auto_nsim_dev_max_vfs_fops_dev(0xffffffffffffff9c, &(0x7f00000089c0)='/sys/kernel/debug/netdevsim/netdevsim1/max_vfs\x00', 0xc798ee72cfbd85fc, 0x0) socket(0xf, 0x3, 0x2) openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cec18\x00', 0x1c0, 0x0) openat$auto_proc_timens_offsets_operations_base(0xffffffffffffff9c, &(0x7f0000002440), 0x80c02, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) socketpair$auto(0x1, 0x2164, 0x8000000000000000, 0x0) write$auto(r1, &(0x7f0000000400)='\x05deo1\x00', 0x100000a3d9) close_range$auto(0x2, 0xa, 0x0) r2 = socket(0xa, 0x2, 0x88) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'bond0\x00', 0x0}) bpf$auto(0x0, &(0x7f00000000c0)=@bpf_attr_5={@target_ifindex=r4, r3, 0x4, 0x1ff, r2, @relative_id=0x13, 0xe600}, 0xf) socketpair$auto(0x1, 0x3, 0x8000000000000000, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) bpf$auto(0x2, &(0x7f00000001c0)=@raw_tracepoint={0x5, r5, 0x0, 0x3}, 0xc) close_range$auto(0x2, 0x8, 0x0) 12.234385095s ago: executing program 0 (id=552): r0 = socket(0xa, 0x3, 0xff) setsockopt$auto(0x400000000000003, 0x29, 0x18, 0x0, 0x20056b) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) sysfs$auto(0x2, 0x3d, 0x0) r1 = fcntl$auto_F_DUPFD_CLOEXEC(r0, 0x406, r0) r2 = fspick$auto(r1, &(0x7f0000000080)='./file0\x00', 0x4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4892}, 0x8040) sendmsg$auto_HWSIM_CMD_DEL_RADIO(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000000", @ANYRES16, @ANYBLOB="01eb"], 0x14}, 0x1, 0x0, 0x0, 0x20040800}, 0x24004000) r3 = socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) close_range$auto(0x2, 0x8, 0x0) open(0x0, 0x22240, 0x155) r4 = socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x3, 0x6) setsockopt$auto(r4, 0x104000000000010e, 0xb, 0x0, 0x400) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}}, 0x40000) ioctl$auto_SOUND_MIXER_READ_RECMASK(r3, 0x80044dfd, &(0x7f0000000300)="f9e8548c6b66efedb52581b6b3b28c013c75bff6285d9893d9a63662a0bedbb2891be0c02202d27d85eb8a0e7e70ec18894accb91aa1795966bd7bf549a6e3f0c94f841ead3e3f28b1f2e555365c7329acc96835b3ca04bb54971067b76e3fada3") sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) read$auto_proc_page_owner_operations_page_owner(r2, &(0x7f0000000040)=""/4, 0x4) fsopen$auto(0x0, 0x1) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0xa00006, 0x400002, 0x40eb1, 0x602, 0x300000000000) open(&(0x7f00000000c0)='./cgroup\x00', 0x0, 0x1) r5 = getpgid(0x0) fcntl$auto(0x3, 0x402, r5) close_range$auto(0x2, 0x8, 0x0) 12.181465239s ago: executing program 2 (id=553): openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000340)='/sys/devices/platform/vhci_hcd.0/usbip_debug\x00', 0x8002, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000280), r0) sendmsg$auto_HWSIM_CMD_REGISTER(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="019261588a00fddbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) (async) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) sysfs$auto(0x2, 0x810000000000003a, 0x0) (async) fsopen$auto(0x0, 0x1) close_range$auto(0x2, 0x8, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) (async) shmget$auto(0x20000003, 0x0, 0xe64) (async, rerun: 32) mmap$auto(0x0, 0xfff, 0xdf, 0x9b72, 0x400, 0x28000) (async, rerun: 32) statmount$auto(0x0, 0x0, 0x400, 0x81) (async) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x88042, 0x0) (async) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, 0x0) (async) init_module$auto(0x0, 0x3, 0x0) (async) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x2200, 0x0) (async) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x1, 0x0) (async) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) (async, rerun: 64) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async, rerun: 64) getsockopt$auto(0x3, 0x200000000001, 0x1e, 0x0, 0x0) (async) socket(0x2, 0x3, 0xa) (async) sendmsg$auto_NFC_CMD_ENABLE_SE(0xffffffffffffffff, 0x0, 0x8000) (async) sendmsg$auto_NFC_CMD_ENABLE_SE(0xffffffffffffffff, 0x0, 0x4000) (async, rerun: 64) r2 = socket$nl_generic(0x10, 0x3, 0x10) (rerun: 64) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/controlC0\x00', 0x1a000, 0x0) (async) r3 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000180), r2) (async) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$auto_NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001f80)={0x1c, r3, 0xd0d58b333228212f, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x4000000) 0s ago: executing program 0 (id=554): r0 = socket(0xa, 0x5, 0x84) mmap$auto(0x0, 0xa, 0xdb, 0x9b72, 0x5, 0x8000) r1 = io_uring_setup$auto(0x6, 0x0) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, 0x0, 0xaa102, 0x0) r2 = syz_genetlink_get_family_id$auto_nl802154(&(0x7f0000000100), r1) sendmsg$auto_NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1e8, r2, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x8}, @NL802154_ATTR_COORDINATOR={0x24, 0x1e, 0x0, 0x1, [@nested={0x14, 0x50, 0x0, 0x1, [@generic="4a2a132cfd3bfe642e192f2f", @nested={0x4, 0x9c}]}, @typed={0xc, 0x7b, 0x0, 0x0, @u64=0x2000000000}]}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x7}, @NL802154_ATTR_SEC_LEVEL={0x16d, 0x2d, 0x0, 0x1, [@nested={0x147, 0x29, 0x0, 0x1, [@generic="e45d1b5fa3af96d96d06c501ffd4e513dafdedd26de1d69311f79a0be1576844d3767dd2d66f3cfa699139f55f803573517a9e68ac075a99dfff2ca35f6c86b7dcb42d46e1ec2ee083a119812423caf8b1bf6c4a5d0c7b018c334bc4d4d0ee9877424fbdd077ff12e58d32cd4a2bbdcd571b577a1dd9d82b850a0b4eae935f9c44f97af9ea85e215", @typed={0x8, 0x12b, 0x0, 0x0, @u32=0x3}, @generic="787bb8b9bbda3adff838e26153d055c1e7865124aa47508d9134926d88d2587fea0998410db6b008f09a7e041bf443d9149ad7edba2e1f6ec3be2f016ca5c393564c81e4813ce9105859dc64e301f605afa4c4ec729ba4bbae6816f1a42f5a74993a2cafc54e932fad794b8909e75a16b6d97ef712462c9329031f92d69c33f345abbb02ad217ceaf8188cf615f4ea6dbb5c9fa61d78632f4fbb3b1f6f1b25d464b148f698920318861fe8031cd2847781b39f"]}, @generic="1031bf4d07139a69738e9a078ffe2941c1ad5eb16175110f120360f7a3bf036632"]}, @NL802154_ATTR_WPAN_PHY_NAME={0xa, 0x2, 'bond0\x00'}, @NL802154_ATTR_IFNAME={0x14, 0x4, 'hsr0\x00'}, @NL802154_ATTR_CCA_ED_LEVEL={0x8, 0xe, 0x7}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x1}, 0x88c0) mremap$auto(0x4000, 0xfee0, 0x3fd6, 0x3, 0x0) mmap$auto(0x0, 0x420009, 0xdf, 0xeb1, 0xffffffffffffffff, 0x8000) r3 = openat$auto_btrfs_ctl_fops_super(0xffffffffffffff9c, &(0x7f0000003880), 0x20000, 0x0) ioctl$auto_BTRFS_IOC_FORGET_DEV(r3, 0x50009405, 0x0) writev$auto(0xffffffffffffffff, 0x0, 0x4) mmap$auto(0x0, 0xfb1, 0xffffffff, 0x9b72, 0x2, 0x8000) lsm_list_modules$auto(0x0, 0x0, 0x0) r4 = socket(0x2, 0x801, 0x106) getsockopt$auto(r4, 0x11c, 0x3, 0x0, 0x0) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r5, 0x89fc, &(0x7f0000000040)={'bond0\x00'}) clone3$auto(0x0, 0x1000) kernel console output (not intermixed with test programs): d blocking state [ 103.651622][ T5848] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.659432][ T5848] bridge_slave_1: entered allmulticast mode [ 103.666791][ T5848] bridge_slave_1: entered promiscuous mode [ 103.696075][ T5852] team0: Port device team_slave_1 added [ 103.723134][ T5844] bridge0: port 1(bridge_slave_0) entered blocking state [ 103.730777][ T5844] bridge0: port 1(bridge_slave_0) entered disabled state [ 103.738005][ T5844] bridge_slave_0: entered allmulticast mode [ 103.745602][ T5844] bridge_slave_0: entered promiscuous mode [ 103.816751][ T5848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 103.840960][ T5844] bridge0: port 2(bridge_slave_1) entered blocking state [ 103.848126][ T5844] bridge0: port 2(bridge_slave_1) entered disabled state [ 103.858089][ T5844] bridge_slave_1: entered allmulticast mode [ 103.867593][ T5844] bridge_slave_1: entered promiscuous mode [ 103.876276][ T5852] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 103.883707][ T5852] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 103.909988][ T5852] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 103.923597][ T5852] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 103.930671][ T5852] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 103.957072][ T5852] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 103.971145][ T5848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.050709][ T5857] bridge0: port 1(bridge_slave_0) entered blocking state [ 104.057949][ T5857] bridge0: port 1(bridge_slave_0) entered disabled state [ 104.065557][ T5857] bridge_slave_0: entered allmulticast mode [ 104.072935][ T5857] bridge_slave_0: entered promiscuous mode [ 104.082394][ T5857] bridge0: port 2(bridge_slave_1) entered blocking state [ 104.089655][ T5857] bridge0: port 2(bridge_slave_1) entered disabled state [ 104.096871][ T5857] bridge_slave_1: entered allmulticast mode [ 104.106298][ T5857] bridge_slave_1: entered promiscuous mode [ 104.130893][ T5844] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 104.143835][ T5844] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.156706][ T5848] team0: Port device team_slave_0 added [ 104.166593][ T5848] team0: Port device team_slave_1 added [ 104.300576][ T5857] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 104.318273][ T5852] hsr_slave_0: entered promiscuous mode [ 104.325649][ T5852] hsr_slave_1: entered promiscuous mode [ 104.336291][ T5844] team0: Port device team_slave_0 added [ 104.342913][ T5168] Bluetooth: hci0: command tx timeout [ 104.352664][ T5844] team0: Port device team_slave_1 added [ 104.359654][ T5848] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 104.366629][ T5848] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.393892][ T5848] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 104.407955][ T5857] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 104.418805][ T5168] Bluetooth: hci1: command tx timeout [ 104.418813][ T5853] Bluetooth: hci2: command tx timeout [ 104.462740][ T5848] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 104.470046][ T5848] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.496861][ T5848] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 104.500053][ T5168] Bluetooth: hci3: command tx timeout [ 104.546824][ T5844] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 104.554127][ T5844] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.580383][ T5844] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 104.593875][ T5844] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 104.601035][ T5844] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.627084][ T5844] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 104.649821][ T5857] team0: Port device team_slave_0 added [ 104.659886][ T5857] team0: Port device team_slave_1 added [ 104.754888][ T5857] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 104.762168][ T5857] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.788289][ T5857] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 104.800666][ T5857] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 104.807665][ T5857] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 104.834570][ T5857] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 104.871579][ T5848] hsr_slave_0: entered promiscuous mode [ 104.878143][ T5848] hsr_slave_1: entered promiscuous mode [ 104.884780][ T5848] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 104.892745][ T5848] Cannot create hsr debugfs directory [ 104.933899][ T5844] hsr_slave_0: entered promiscuous mode [ 104.940718][ T5844] hsr_slave_1: entered promiscuous mode [ 104.947013][ T5844] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 104.954779][ T5844] Cannot create hsr debugfs directory [ 105.095657][ T5857] hsr_slave_0: entered promiscuous mode [ 105.102344][ T5857] hsr_slave_1: entered promiscuous mode [ 105.108538][ T5857] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 105.116701][ T5857] Cannot create hsr debugfs directory [ 105.489499][ T5852] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 105.503734][ T5852] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 105.528781][ T5852] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 105.558057][ T5852] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 105.628400][ T5848] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 105.643225][ T5848] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 105.656112][ T5848] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 105.692943][ T5848] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 105.756728][ T5844] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 105.773945][ T5844] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 105.788007][ T5844] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 105.825838][ T5844] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 105.913360][ T5857] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 105.928301][ T5857] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 105.942352][ T5857] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 105.958571][ T5857] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 106.081806][ T5852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.132304][ T5852] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.194629][ T2995] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.202026][ T2995] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.214792][ T2995] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.222158][ T2995] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.240860][ T5848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.321307][ T5844] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.334419][ T5857] 8021q: adding VLAN 0 to HW filter on device bond0 [ 106.377633][ T5848] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.395305][ T5844] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.419600][ T5168] Bluetooth: hci0: command tx timeout [ 106.427342][ T2978] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.434538][ T2978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.444667][ T2978] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.451948][ T2978] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.463375][ T2978] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.470587][ T2978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.503707][ T5168] Bluetooth: hci2: command tx timeout [ 106.503716][ T5853] Bluetooth: hci1: command tx timeout [ 106.530355][ T2978] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.538090][ T2978] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.583565][ T5168] Bluetooth: hci3: command tx timeout [ 106.597065][ T5857] 8021q: adding VLAN 0 to HW filter on device team0 [ 106.642824][ T749] bridge0: port 1(bridge_slave_0) entered blocking state [ 106.650080][ T749] bridge0: port 1(bridge_slave_0) entered forwarding state [ 106.698118][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 106.705432][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 106.805690][ T5844] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 106.884909][ T5857] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 107.020813][ T5852] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.205880][ T5852] veth0_vlan: entered promiscuous mode [ 107.247377][ T5852] veth1_vlan: entered promiscuous mode [ 107.303872][ T5848] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.416357][ T5852] veth0_macvtap: entered promiscuous mode [ 107.448556][ T5852] veth1_macvtap: entered promiscuous mode [ 107.483323][ T5848] veth0_vlan: entered promiscuous mode [ 107.511641][ T5844] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.521692][ T5852] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 107.543876][ T5852] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 107.557371][ T5848] veth1_vlan: entered promiscuous mode [ 107.573352][ T5852] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 107.583946][ T5852] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 107.595135][ T5852] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 107.605209][ T5852] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 107.662423][ T5857] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 107.707688][ T5848] veth0_macvtap: entered promiscuous mode [ 107.722032][ T5848] veth1_macvtap: entered promiscuous mode [ 107.834846][ T749] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 107.867628][ T749] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 107.885873][ T5844] veth0_vlan: entered promiscuous mode [ 107.904308][ T5848] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 107.952639][ T5848] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 107.976412][ T5848] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 107.986812][ T5848] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 107.995669][ T5848] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.005235][ T5848] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.017735][ T749] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.030898][ T5844] veth1_vlan: entered promiscuous mode [ 108.038394][ T749] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.053716][ T5857] veth0_vlan: entered promiscuous mode [ 108.090008][ T5857] veth1_vlan: entered promiscuous mode [ 108.157360][ T5844] veth0_macvtap: entered promiscuous mode [ 108.200360][ T5852] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 108.203925][ T5844] veth1_macvtap: entered promiscuous mode [ 108.271110][ T49] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.300085][ T49] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.318342][ T5857] veth0_macvtap: entered promiscuous mode [ 108.388311][ T5844] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 108.408144][ T5844] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 108.428902][ T49] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.432963][ T5857] veth1_macvtap: entered promiscuous mode [ 108.443252][ T49] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 108.453723][ T5844] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.465511][ T5844] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.477023][ T5938] Zero length message leads to an empty skb [ 108.483381][ T5844] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.493809][ T5844] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.503600][ T5168] Bluetooth: hci0: command tx timeout [ 108.533285][ T5938] zram: Removed device: zram0 [ 108.579401][ T5168] Bluetooth: hci2: command tx timeout [ 108.580158][ T5853] Bluetooth: hci1: command tx timeout [ 108.628572][ T5857] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 108.644937][ T5857] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 108.659994][ T5853] Bluetooth: hci3: command tx timeout [ 108.701445][ T5857] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.724491][ T5857] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.748746][ T5857] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.765606][ T5857] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 108.938451][ T36] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 108.976231][ T36] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 109.087742][ T749] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 109.097392][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 109.114734][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 109.118156][ T749] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 109.350165][ T2978] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 109.373130][ T2978] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 109.539672][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 109.669659][ T0] NOHZ tick-stop error: local softirq work is pending, handler #02!!! [ 110.249454][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 110.258475][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 110.273065][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 110.409231][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 110.423591][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 110.499345][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 110.580189][ T5853] Bluetooth: hci0: command tx timeout [ 110.668877][ T5853] Bluetooth: hci2: command tx timeout [ 110.668988][ T5168] Bluetooth: hci1: command tx timeout [ 110.689223][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 110.689251][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 110.738921][ T5168] Bluetooth: hci3: command tx timeout [ 110.809357][ T5970] syz.3.7 uses obsolete (PF_INET,SOCK_PACKET) [ 111.332004][ T5975] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10'. [ 112.192999][ T5993] netlink: 342 bytes leftover after parsing attributes in process `syz.1.12'. [ 112.245285][ T5993] ima: policy update failed [ 112.281817][ T30] audit: type=1802 audit(1752666017.730:2): pid=5993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=policy_update cause=failed comm="syz.1.12" res=0 errno=0 [ 112.312702][ T5993] netlink: 146 bytes leftover after parsing attributes in process `syz.1.12'. [ 112.402486][ T5987] lo: entered allmulticast mode [ 112.408053][ T5987] lo: left allmulticast mode [ 112.901379][ T6002] netlink: 28 bytes leftover after parsing attributes in process `syz.0.14'. [ 114.305756][ T6034] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 116.288941][ T6070] netlink: 334 bytes leftover after parsing attributes in process `syz.0.26'. [ 116.374872][ T6066] .SR: entered promiscuous mode [ 116.422023][ T6077] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 116.696794][ T6082] netlink: 4 bytes leftover after parsing attributes in process `syz.0.27'. [ 116.726988][ T6082] netlink: 25 bytes leftover after parsing attributes in process `syz.0.27'. [ 119.021905][ T6128] netlink: 4 bytes leftover after parsing attributes in process `syz.2.40'. [ 119.036702][ T6128] netlink: 25 bytes leftover after parsing attributes in process `syz.2.40'. [ 120.120130][ T3419] smpboot: CPU 0 is now offline [ 120.601567][ T30] audit: type=1800 audit(6047633322.041:3): pid=6148 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.43" name="SYSV00000008" dev="tmpfs" ino=0 res=0 errno=0 [ 121.322419][ T6155] netlink: 4 bytes leftover after parsing attributes in process `syz.0.45'. [ 121.383784][ T6158] netlink: 4 bytes leftover after parsing attributes in process `syz.1.46'. [ 121.394395][ T6162] netlink: 25 bytes leftover after parsing attributes in process `syz.0.45'. [ 121.432681][ T6158] netlink: 25 bytes leftover after parsing attributes in process `syz.1.46'. [ 123.258574][ T6194] netlink: 4 bytes leftover after parsing attributes in process `syz.0.59'. [ 123.295833][ T6194] netlink: 25 bytes leftover after parsing attributes in process `syz.0.59'. [ 125.579455][ T6247] netlink: 4 bytes leftover after parsing attributes in process `syz.0.71'. [ 125.636274][ T6250] netlink: 25 bytes leftover after parsing attributes in process `syz.0.71'. [ 127.034006][ T6284] netlink: 4 bytes leftover after parsing attributes in process `syz.0.83'. [ 127.097055][ T6285] netlink: 25 bytes leftover after parsing attributes in process `syz.0.83'. [ 132.767733][ T6387] netlink: 4 bytes leftover after parsing attributes in process `syz.2.112'. [ 132.805598][ T6387] netlink: 25 bytes leftover after parsing attributes in process `syz.2.112'. [ 133.833463][ T6383] device-mapper: ioctl: Invalid ioctl structure: uuid , name , dev 3000000008 [ 134.362785][ T6407] vivid-003: ================= START STATUS ================= [ 134.597065][ T6407] vivid-003: Radio HW Seek Mode: Bounded [ 134.691815][ T6407] vivid-003: Radio Programmable HW Seek: false [ 134.767394][ T6407] vivid-003: RDS Rx I/O Mode: Block I/O [ 134.879356][ T6407] vivid-003: Generate RBDS Instead of RDS: false [ 134.983416][ T6407] vivid-003: RDS Reception: true [ 135.015628][ T6407] vivid-003: RDS Program Type: 0 inactive [ 135.075849][ T6407] vivid-003: RDS PS Name: inactive [ 135.172059][ T6407] vivid-003: RDS Radio Text: inactive [ 135.274169][ T6407] vivid-003: RDS Traffic Announcement: false inactive [ 135.398233][ T6407] vivid-003: RDS Traffic Program: false inactive [ 135.481263][ T6407] vivid-003: RDS Music: false inactive [ 135.587661][ T6407] vivid-003: ================== END STATUS ================== [ 137.573620][ T6446] FAULT_INJECTION: forcing a failure. [ 137.573620][ T6446] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 137.668856][ T6446] CPU: 1 UID: 0 PID: 6446 Comm: syz.2.125 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 137.668889][ T6446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 137.668912][ T6446] Call Trace: [ 137.668920][ T6446] [ 137.668932][ T6446] dump_stack_lvl+0x16c/0x1f0 [ 137.668984][ T6446] should_fail_ex+0x512/0x640 [ 137.669023][ T6446] _copy_from_user+0x2e/0xd0 [ 137.669060][ T6446] ____sys_sendmsg+0x607/0xc70 [ 137.669090][ T6446] ? __pfx_____sys_sendmsg+0x10/0x10 [ 137.669128][ T6446] ___sys_sendmsg+0x134/0x1d0 [ 137.669164][ T6446] ? __pfx____sys_sendmsg+0x10/0x10 [ 137.669196][ T6446] ? __lock_acquire+0x622/0x1c90 [ 137.669263][ T6446] __sys_sendmsg+0x16d/0x220 [ 137.669297][ T6446] ? __pfx___sys_sendmsg+0x10/0x10 [ 137.669350][ T6446] do_syscall_64+0xcd/0x490 [ 137.669387][ T6446] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 137.669410][ T6446] RIP: 0033:0x7f27a878e929 [ 137.669431][ T6446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.669452][ T6446] RSP: 002b:00007f27a96a8038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 137.669473][ T6446] RAX: ffffffffffffffda RBX: 00007f27a89b5fa0 RCX: 00007f27a878e929 [ 137.669488][ T6446] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000003 [ 137.669502][ T6446] RBP: 00007f27a96a8090 R08: 0000000000000000 R09: 0000000000000000 [ 137.669515][ T6446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.669528][ T6446] R13: 0000000000000000 R14: 00007f27a89b5fa0 R15: 00007ffcdf217e78 [ 137.669563][ T6446] [ 139.397611][ T6473] netlink: 4 bytes leftover after parsing attributes in process `syz.3.131'. [ 139.440743][ T6473] netlink: 25 bytes leftover after parsing attributes in process `syz.3.131'. [ 140.996323][ T6494] FAULT_INJECTION: forcing a failure. [ 140.996323][ T6494] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 141.082354][ T6494] CPU: 1 UID: 0 PID: 6494 Comm: syz.2.139 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 141.082387][ T6494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 141.082400][ T6494] Call Trace: [ 141.082407][ T6494] [ 141.082416][ T6494] dump_stack_lvl+0x16c/0x1f0 [ 141.082455][ T6494] should_fail_ex+0x512/0x640 [ 141.082493][ T6494] _copy_from_user+0x2e/0xd0 [ 141.082528][ T6494] copy_msghdr_from_user+0x98/0x160 [ 141.082563][ T6494] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 141.082601][ T6494] ? __pfx__kstrtoull+0x10/0x10 [ 141.082633][ T6494] ___sys_sendmsg+0xfe/0x1d0 [ 141.082666][ T6494] ? __pfx____sys_sendmsg+0x10/0x10 [ 141.082712][ T6494] ? find_held_lock+0x2b/0x80 [ 141.082753][ T6494] __sys_sendmmsg+0x200/0x420 [ 141.082790][ T6494] ? __pfx___sys_sendmmsg+0x10/0x10 [ 141.082832][ T6494] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 141.082895][ T6494] ? fput+0x70/0xf0 [ 141.082935][ T6494] ? ksys_write+0x1ac/0x250 [ 141.082968][ T6494] ? __pfx_ksys_write+0x10/0x10 [ 141.083018][ T6494] __x64_sys_sendmmsg+0x9c/0x100 [ 141.083052][ T6494] ? lockdep_hardirqs_on+0x7c/0x110 [ 141.083085][ T6494] do_syscall_64+0xcd/0x490 [ 141.083122][ T6494] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 141.083146][ T6494] RIP: 0033:0x7f27a878e929 [ 141.083163][ T6494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.083185][ T6494] RSP: 002b:00007f27a96a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 141.083206][ T6494] RAX: ffffffffffffffda RBX: 00007f27a89b5fa0 RCX: 00007f27a878e929 [ 141.083221][ T6494] RDX: 0000000000000007 RSI: 0000200000000200 RDI: 0000000000000003 [ 141.083234][ T6494] RBP: 00007f27a96a8090 R08: 0000000000000000 R09: 0000000000000000 [ 141.083248][ T6494] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 141.083261][ T6494] R13: 0000000000000000 R14: 00007f27a89b5fa0 R15: 00007ffcdf217e78 [ 141.083289][ T6494] [ 141.429623][ T6498] netlink: 342 bytes leftover after parsing attributes in process `syz.1.140'. [ 143.228951][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 143.235427][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 143.507315][ T6534] ======================================================= [ 143.507315][ T6534] WARNING: The mand mount option has been deprecated and [ 143.507315][ T6534] and is ignored by this kernel. Remove the mand [ 143.507315][ T6534] option from the mount to silence this warning. [ 143.507315][ T6534] ======================================================= [ 143.863944][ T5168] Bluetooth: hci2: unexpected event 0x3e length: 726 > 260 [ 143.863978][ T5168] Bluetooth: hci2: unexpected subevent 0x0d length: 725 > 260 [ 143.881139][ T5168] Bluetooth: hci2: Unknown advertising packet type: 0x7f [ 143.881185][ T5168] Bluetooth: hci2: adv larger than maximum supported [ 143.888351][ T5168] Bluetooth: hci2: Unknown advertising packet type: 0x7b [ 143.895499][ T5168] Bluetooth: hci2: Malformed LE Event: 0x0d [ 144.998569][ T6546] netlink: 342 bytes leftover after parsing attributes in process `syz.0.153'. [ 145.924058][ T6566] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input5 [ 146.882080][ T6576] mkiss: ax0: crc mode is auto. [ 146.905964][ T6568] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input6 [ 149.238342][ T6592] kexec: Could not allocate control_code_buffer [ 152.109286][ T6665] FAULT_INJECTION: forcing a failure. [ 152.109286][ T6665] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 152.208855][ T6665] CPU: 1 UID: 0 PID: 6665 Comm: syz.2.182 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 152.208889][ T6665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 152.208903][ T6665] Call Trace: [ 152.208911][ T6665] [ 152.208919][ T6665] dump_stack_lvl+0x16c/0x1f0 [ 152.208959][ T6665] should_fail_ex+0x512/0x640 [ 152.208997][ T6665] _copy_from_user+0x2e/0xd0 [ 152.209033][ T6665] copy_msghdr_from_user+0x98/0x160 [ 152.209075][ T6665] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 152.209124][ T6665] ___sys_sendmsg+0xfe/0x1d0 [ 152.209159][ T6665] ? __pfx____sys_sendmsg+0x10/0x10 [ 152.209190][ T6665] ? __lock_acquire+0x622/0x1c90 [ 152.209257][ T6665] __sys_sendmsg+0x16d/0x220 [ 152.209291][ T6665] ? __pfx___sys_sendmsg+0x10/0x10 [ 152.209344][ T6665] do_syscall_64+0xcd/0x490 [ 152.209380][ T6665] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 152.209404][ T6665] RIP: 0033:0x7f27a878e929 [ 152.209421][ T6665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.209443][ T6665] RSP: 002b:00007f27a9687038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 152.209464][ T6665] RAX: ffffffffffffffda RBX: 00007f27a89b6080 RCX: 00007f27a878e929 [ 152.209479][ T6665] RDX: 0000000000000080 RSI: 0000200000000180 RDI: 000000000000000f [ 152.209492][ T6665] RBP: 00007f27a9687090 R08: 0000000000000000 R09: 0000000000000000 [ 152.209506][ T6665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 152.209519][ T6665] R13: 0000000000000000 R14: 00007f27a89b6080 R15: 00007ffcdf217e78 [ 152.209546][ T6665] [ 153.298147][ T6678] tty tty10: ldisc open failed (-12), clearing slot 9 [ 153.880142][ T6705] mmap: syz.3.191 (6705) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 156.979759][ T6758] FAULT_INJECTION: forcing a failure. [ 156.979759][ T6758] name failslab, interval 1, probability 0, space 0, times 1 [ 157.051168][ T6758] CPU: 1 UID: 0 PID: 6758 Comm: syz.0.207 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 157.051202][ T6758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 157.051216][ T6758] Call Trace: [ 157.051223][ T6758] [ 157.051231][ T6758] dump_stack_lvl+0x16c/0x1f0 [ 157.051271][ T6758] should_fail_ex+0x512/0x640 [ 157.051304][ T6758] ? __kmalloc_noprof+0xbf/0x510 [ 157.051340][ T6758] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xc8/0x290 [ 157.051371][ T6758] should_failslab+0xc2/0x120 [ 157.051392][ T6758] __kmalloc_noprof+0xd2/0x510 [ 157.051427][ T6758] ? kmem_cache_free+0x2d1/0x4d0 [ 157.051463][ T6758] genl_family_rcv_msg_attrs_parse.constprop.0+0xc8/0x290 [ 157.051499][ T6758] genl_family_rcv_msg_doit+0xbf/0x2f0 [ 157.051529][ T6758] ? __pfx_genl_family_rcv_msg_doit+0x10/0x10 [ 157.051555][ T6758] ? rcu_is_watching+0x12/0xc0 [ 157.051590][ T6758] ? bpf_lsm_capable+0x9/0x10 [ 157.051618][ T6758] ? security_capable+0x7e/0x260 [ 157.051646][ T6758] genl_rcv_msg+0x55c/0x800 [ 157.051676][ T6758] ? __pfx_genl_rcv_msg+0x10/0x10 [ 157.051709][ T6758] ? __pfx_tcp_metrics_nl_cmd_del+0x10/0x10 [ 157.051743][ T6758] netlink_rcv_skb+0x155/0x420 [ 157.051766][ T6758] ? __pfx_genl_rcv_msg+0x10/0x10 [ 157.051794][ T6758] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 157.051829][ T6758] ? netlink_deliver_tap+0x1ae/0xd30 [ 157.051870][ T6758] genl_rcv+0x28/0x40 [ 157.051893][ T6758] netlink_unicast+0x58d/0x850 [ 157.051920][ T6758] ? __pfx_netlink_unicast+0x10/0x10 [ 157.051950][ T6758] netlink_sendmsg+0x8d1/0xdd0 [ 157.051978][ T6758] ? __pfx_netlink_sendmsg+0x10/0x10 [ 157.052012][ T6758] ____sys_sendmsg+0xa95/0xc70 [ 157.052038][ T6758] ? copy_msghdr_from_user+0x10a/0x160 [ 157.052071][ T6758] ? __pfx_____sys_sendmsg+0x10/0x10 [ 157.052109][ T6758] ___sys_sendmsg+0x134/0x1d0 [ 157.052144][ T6758] ? __pfx____sys_sendmsg+0x10/0x10 [ 157.052180][ T6758] ? __lock_acquire+0x622/0x1c90 [ 157.052247][ T6758] __sys_sendmsg+0x16d/0x220 [ 157.052294][ T6758] ? __pfx___sys_sendmsg+0x10/0x10 [ 157.052345][ T6758] do_syscall_64+0xcd/0x490 [ 157.052381][ T6758] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 157.052403][ T6758] RIP: 0033:0x7f635db8e929 [ 157.052420][ T6758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 157.052441][ T6758] RSP: 002b:00007f635e931038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 157.052461][ T6758] RAX: ffffffffffffffda RBX: 00007f635ddb5fa0 RCX: 00007f635db8e929 [ 157.052475][ T6758] RDX: 00000000000000d0 RSI: 0000200000000240 RDI: 0000000000000003 [ 157.052488][ T6758] RBP: 00007f635e931090 R08: 0000000000000000 R09: 0000000000000000 [ 157.052501][ T6758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 157.052514][ T6758] R13: 0000000000000000 R14: 00007f635ddb5fa0 R15: 00007ffd2b18acf8 [ 157.052541][ T6758] [ 157.645580][ T6752] syz.3.205 (6752) used greatest stack depth: 19784 bytes left [ 159.261527][ T5168] Bluetooth: hci2: unexpected subevent 0x03 length: 253 > 9 [ 164.076883][ T6848] random: crng reseeded on system resumption [ 165.101894][ T6864] hub 8-0:1.0: USB hub found [ 165.176637][ T6864] hub 8-0:1.0: 1 port detected [ 166.629527][ T6888] FAULT_INJECTION: forcing a failure. [ 166.629527][ T6888] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 166.689701][ T6888] CPU: 1 UID: 0 PID: 6888 Comm: syz.0.238 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 166.689735][ T6888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 166.689749][ T6888] Call Trace: [ 166.689756][ T6888] [ 166.689765][ T6888] dump_stack_lvl+0x16c/0x1f0 [ 166.689805][ T6888] should_fail_ex+0x512/0x640 [ 166.689852][ T6888] _copy_from_user+0x2e/0xd0 [ 166.689888][ T6888] copy_msghdr_from_user+0x98/0x160 [ 166.689924][ T6888] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 166.689964][ T6888] ? __pfx__kstrtoull+0x10/0x10 [ 166.689996][ T6888] ___sys_sendmsg+0xfe/0x1d0 [ 166.690031][ T6888] ? __pfx____sys_sendmsg+0x10/0x10 [ 166.690079][ T6888] ? find_held_lock+0x2b/0x80 [ 166.690121][ T6888] __sys_sendmmsg+0x200/0x420 [ 166.690159][ T6888] ? __pfx___sys_sendmmsg+0x10/0x10 [ 166.690202][ T6888] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 166.690251][ T6888] ? fput+0x70/0xf0 [ 166.690273][ T6888] ? ksys_write+0x1ac/0x250 [ 166.690304][ T6888] ? __pfx_ksys_write+0x10/0x10 [ 166.690342][ T6888] __x64_sys_sendmmsg+0x9c/0x100 [ 166.690376][ T6888] ? lockdep_hardirqs_on+0x7c/0x110 [ 166.690408][ T6888] do_syscall_64+0xcd/0x490 [ 166.690444][ T6888] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 166.690467][ T6888] RIP: 0033:0x7f635db8e929 [ 166.690485][ T6888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.690506][ T6888] RSP: 002b:00007f635e931038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 166.690528][ T6888] RAX: ffffffffffffffda RBX: 00007f635ddb5fa0 RCX: 00007f635db8e929 [ 166.690543][ T6888] RDX: 0000000000000003 RSI: 0000200000000080 RDI: 0000000000000003 [ 166.690556][ T6888] RBP: 00007f635e931090 R08: 0000000000000000 R09: 0000000000000000 [ 166.690570][ T6888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.690583][ T6888] R13: 0000000000000000 R14: 00007f635ddb5fa0 R15: 00007ffd2b18acf8 [ 166.690611][ T6888] [ 167.892907][ T6873] binder: binder_mmap: 6872 0-811000 bad vm_flags failed -1 [ 169.714923][ T6934] FAULT_INJECTION: forcing a failure. [ 169.714923][ T6934] name failslab, interval 1, probability 0, space 0, times 0 [ 169.763652][ T6934] CPU: 1 UID: 0 PID: 6934 Comm: syz.0.249 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 169.763687][ T6934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 169.763700][ T6934] Call Trace: [ 169.763707][ T6934] [ 169.763716][ T6934] dump_stack_lvl+0x16c/0x1f0 [ 169.763756][ T6934] should_fail_ex+0x512/0x640 [ 169.763789][ T6934] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 169.763828][ T6934] should_failslab+0xc2/0x120 [ 169.763850][ T6934] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 169.763885][ T6934] ? radix_tree_node_alloc.constprop.0+0x7c/0x350 [ 169.763919][ T6934] radix_tree_node_alloc.constprop.0+0x7c/0x350 [ 169.763954][ T6934] radix_tree_insert+0x247/0x630 [ 169.763990][ T6934] qrtr_node_enqueue+0x1077/0x12e0 [ 169.764018][ T6934] ? __asan_memcpy+0x3c/0x60 [ 169.764050][ T6934] ? __pfx_qrtr_node_enqueue+0x10/0x10 [ 169.764070][ T6934] ? skb_set_owner_w+0x31f/0x710 [ 169.764100][ T6934] ? skb_copy_header+0x20/0x2b0 [ 169.764130][ T6934] ? __pfx_skb_set_owner_w+0x10/0x10 [ 169.764158][ T6934] ? __pskb_copy_fclone+0x48e/0xb50 [ 169.764179][ T6934] ? __pfx__copy_from_iter+0x10/0x10 [ 169.764220][ T6934] qrtr_bcast_enqueue+0xc7/0x1b0 [ 169.764248][ T6934] qrtr_sendmsg+0x444/0x7b0 [ 169.764271][ T6934] ? __pfx_qrtr_bcast_enqueue+0x10/0x10 [ 169.764293][ T6934] ? __pfx_qrtr_sendmsg+0x10/0x10 [ 169.764326][ T6934] sock_write_iter+0x4ff/0x5b0 [ 169.764352][ T6934] ? __pfx_sock_write_iter+0x10/0x10 [ 169.764388][ T6934] ? __futex_wait+0x24c/0x2f0 [ 169.764421][ T6934] ? copy_iovec_from_user+0x131/0x170 [ 169.764459][ T6934] do_iter_readv_writev+0x657/0x950 [ 169.764493][ T6934] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 169.764547][ T6934] ? bpf_lsm_file_permission+0x9/0x10 [ 169.764578][ T6934] ? security_file_permission+0x71/0x210 [ 169.764611][ T6934] ? rw_verify_area+0xcf/0x680 [ 169.764648][ T6934] vfs_writev+0x35f/0xde0 [ 169.764688][ T6934] ? __pfx_vfs_writev+0x10/0x10 [ 169.764741][ T6934] ? __fget_files+0x20e/0x3c0 [ 169.764782][ T6934] ? do_writev+0x28c/0x340 [ 169.764811][ T6934] do_writev+0x28c/0x340 [ 169.764842][ T6934] ? __pfx_do_writev+0x10/0x10 [ 169.764882][ T6934] do_syscall_64+0xcd/0x490 [ 169.764921][ T6934] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 169.764944][ T6934] RIP: 0033:0x7f635db8e929 [ 169.764963][ T6934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.764985][ T6934] RSP: 002b:00007f635e931038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 169.765006][ T6934] RAX: ffffffffffffffda RBX: 00007f635ddb5fa0 RCX: 00007f635db8e929 [ 169.765021][ T6934] RDX: 0000000000000008 RSI: 0000200000000100 RDI: 0000000000000003 [ 169.765035][ T6934] RBP: 00007f635dc10b39 R08: 0000000000000000 R09: 0000000000000000 [ 169.765049][ T6934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 169.765062][ T6934] R13: 0000000000000000 R14: 00007f635ddb5fa0 R15: 00007ffd2b18acf8 [ 169.765092][ T6934] [ 171.237009][ T6965] FAULT_INJECTION: forcing a failure. [ 171.237009][ T6965] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 171.337714][ T6965] CPU: 1 UID: 0 PID: 6965 Comm: syz.1.259 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 171.337746][ T6965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 171.337760][ T6965] Call Trace: [ 171.337767][ T6965] [ 171.337775][ T6965] dump_stack_lvl+0x16c/0x1f0 [ 171.337814][ T6965] should_fail_ex+0x512/0x640 [ 171.337869][ T6965] _copy_from_user+0x2e/0xd0 [ 171.337906][ T6965] memdup_user_nul+0x6c/0x120 [ 171.337929][ T6965] proc_simple_write+0xc7/0x1b0 [ 171.337953][ T6965] ? __pfx_proc_simple_write+0x10/0x10 [ 171.337976][ T6965] proc_reg_write+0x240/0x330 [ 171.338012][ T6965] ? __pfx_proc_reg_write+0x10/0x10 [ 171.338044][ T6965] vfs_write+0x29d/0x1150 [ 171.338081][ T6965] ? __pfx___mutex_lock+0x10/0x10 [ 171.338115][ T6965] ? __pfx_vfs_write+0x10/0x10 [ 171.338155][ T6965] ? __fget_files+0x20e/0x3c0 [ 171.338194][ T6965] ksys_write+0x12a/0x250 [ 171.338225][ T6965] ? __pfx_ksys_write+0x10/0x10 [ 171.338266][ T6965] do_syscall_64+0xcd/0x490 [ 171.338302][ T6965] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 171.338328][ T6965] RIP: 0033:0x7f1d0258e929 [ 171.338345][ T6965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.338366][ T6965] RSP: 002b:00007f1d0342f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 171.338387][ T6965] RAX: ffffffffffffffda RBX: 00007f1d027b5fa0 RCX: 00007f1d0258e929 [ 171.338402][ T6965] RDX: 0000000000000006 RSI: 0000200000000300 RDI: 0000000000000003 [ 171.338415][ T6965] RBP: 00007f1d0342f090 R08: 0000000000000000 R09: 0000000000000000 [ 171.338428][ T6965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.338440][ T6965] R13: 0000000000000000 R14: 00007f1d027b5fa0 R15: 00007ffea77d3918 [ 171.338468][ T6965] [ 172.009057][ T6971] FAULT_INJECTION: forcing a failure. [ 172.009057][ T6971] name failslab, interval 1, probability 0, space 0, times 0 [ 172.158707][ T6971] CPU: 1 UID: 0 PID: 6971 Comm: syz.0.260 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 172.158742][ T6971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 172.158756][ T6971] Call Trace: [ 172.158764][ T6971] [ 172.158772][ T6971] dump_stack_lvl+0x16c/0x1f0 [ 172.158814][ T6971] should_fail_ex+0x512/0x640 [ 172.158849][ T6971] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 172.158888][ T6971] should_failslab+0xc2/0x120 [ 172.158911][ T6971] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 172.158948][ T6971] ? security_file_alloc+0x34/0x2b0 [ 172.158985][ T6971] security_file_alloc+0x34/0x2b0 [ 172.159016][ T6971] init_file+0x93/0x4c0 [ 172.159039][ T6971] alloc_empty_file+0x73/0x1e0 [ 172.159065][ T6971] path_openat+0xda/0x2cb0 [ 172.159097][ T6971] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 172.159132][ T6971] ? __pfx_path_openat+0x10/0x10 [ 172.159170][ T6971] ? __lock_acquire+0xb8a/0x1c90 [ 172.159207][ T6971] do_filp_open+0x20b/0x470 [ 172.159241][ T6971] ? __pfx_do_filp_open+0x10/0x10 [ 172.159296][ T6971] ? alloc_fd+0x471/0x7d0 [ 172.159336][ T6971] do_sys_openat2+0x11b/0x1d0 [ 172.159370][ T6971] ? __pfx_do_sys_openat2+0x10/0x10 [ 172.159408][ T6971] __x64_sys_openat+0x174/0x210 [ 172.159436][ T6971] ? __pfx___x64_sys_openat+0x10/0x10 [ 172.159474][ T6971] do_syscall_64+0xcd/0x490 [ 172.159513][ T6971] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 172.159536][ T6971] RIP: 0033:0x7f635db8e929 [ 172.159554][ T6971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 172.159576][ T6971] RSP: 002b:00007f635e910038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 172.159598][ T6971] RAX: ffffffffffffffda RBX: 00007f635ddb6080 RCX: 00007f635db8e929 [ 172.159613][ T6971] RDX: 0000000000101000 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 172.159628][ T6971] RBP: 00007f635dc10b39 R08: 0000000000000000 R09: 0000000000000000 [ 172.159641][ T6971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 172.159655][ T6971] R13: 0000000000000000 R14: 00007f635ddb6080 R15: 00007ffd2b18acf8 [ 172.159683][ T6971] [ 176.321963][ T7044] FAULT_INJECTION: forcing a failure. [ 176.321963][ T7044] name failslab, interval 1, probability 0, space 0, times 0 [ 176.397090][ T7044] CPU: 1 UID: 0 PID: 7044 Comm: syz.1.281 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 176.397124][ T7044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 176.397138][ T7044] Call Trace: [ 176.397146][ T7044] [ 176.397154][ T7044] dump_stack_lvl+0x16c/0x1f0 [ 176.397196][ T7044] should_fail_ex+0x512/0x640 [ 176.397231][ T7044] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 176.397272][ T7044] should_failslab+0xc2/0x120 [ 176.397295][ T7044] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 176.397333][ T7044] ? radix_tree_node_alloc.constprop.0+0x7c/0x350 [ 176.397369][ T7044] radix_tree_node_alloc.constprop.0+0x7c/0x350 [ 176.397406][ T7044] radix_tree_insert+0x247/0x630 [ 176.397444][ T7044] qrtr_node_enqueue+0x1077/0x12e0 [ 176.397473][ T7044] ? __asan_memcpy+0x3c/0x60 [ 176.397506][ T7044] ? __pfx_qrtr_node_enqueue+0x10/0x10 [ 176.397528][ T7044] ? skb_set_owner_w+0x31f/0x710 [ 176.397559][ T7044] ? skb_copy_header+0x20/0x2b0 [ 176.397591][ T7044] ? __pfx_skb_set_owner_w+0x10/0x10 [ 176.397621][ T7044] ? __pskb_copy_fclone+0x48e/0xb50 [ 176.397644][ T7044] ? __pfx__copy_from_iter+0x10/0x10 [ 176.397687][ T7044] qrtr_bcast_enqueue+0xc7/0x1b0 [ 176.397717][ T7044] qrtr_sendmsg+0x444/0x7b0 [ 176.397741][ T7044] ? __pfx_qrtr_bcast_enqueue+0x10/0x10 [ 176.397764][ T7044] ? __pfx_qrtr_sendmsg+0x10/0x10 [ 176.397799][ T7044] sock_write_iter+0x4ff/0x5b0 [ 176.397830][ T7044] ? __pfx_sock_write_iter+0x10/0x10 [ 176.397867][ T7044] ? __futex_wait+0x24c/0x2f0 [ 176.397902][ T7044] ? copy_iovec_from_user+0x131/0x170 [ 176.397941][ T7044] do_iter_readv_writev+0x657/0x950 [ 176.397976][ T7044] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 176.398020][ T7044] ? bpf_lsm_file_permission+0x9/0x10 [ 176.398051][ T7044] ? security_file_permission+0x71/0x210 [ 176.398083][ T7044] ? rw_verify_area+0xcf/0x680 [ 176.398120][ T7044] vfs_writev+0x35f/0xde0 [ 176.398161][ T7044] ? __pfx_vfs_writev+0x10/0x10 [ 176.398215][ T7044] ? __fget_files+0x20e/0x3c0 [ 176.398255][ T7044] ? do_writev+0x28c/0x340 [ 176.398284][ T7044] do_writev+0x28c/0x340 [ 176.398315][ T7044] ? __pfx_do_writev+0x10/0x10 [ 176.398356][ T7044] do_syscall_64+0xcd/0x490 [ 176.398394][ T7044] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 176.398418][ T7044] RIP: 0033:0x7f1d0258e929 [ 176.398436][ T7044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.398458][ T7044] RSP: 002b:00007f1d0342f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 176.398480][ T7044] RAX: ffffffffffffffda RBX: 00007f1d027b5fa0 RCX: 00007f1d0258e929 [ 176.398495][ T7044] RDX: 0000000000000008 RSI: 0000200000000100 RDI: 0000000000000003 [ 176.398509][ T7044] RBP: 00007f1d02610b39 R08: 0000000000000000 R09: 0000000000000000 [ 176.398523][ T7044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 176.398536][ T7044] R13: 0000000000000000 R14: 00007f1d027b5fa0 R15: 00007ffea77d3918 [ 176.398566][ T7044] [ 176.789147][ T7046] workqueue: max_active 110524825 requested for writeback is out of range, clamping between 1 and 2048 [ 178.782066][ T7082] netlink: 4 bytes leftover after parsing attributes in process `syz.0.292'. [ 178.863738][ T7082] netlink: 25 bytes leftover after parsing attributes in process `syz.0.292'. [ 180.712915][ T7122] FAULT_INJECTION: forcing a failure. [ 180.712915][ T7122] name failslab, interval 1, probability 0, space 0, times 0 [ 180.800644][ T7122] CPU: 1 UID: 0 PID: 7122 Comm: syz.3.303 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 180.800679][ T7122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 180.800696][ T7122] Call Trace: [ 180.800704][ T7122] [ 180.800713][ T7122] dump_stack_lvl+0x16c/0x1f0 [ 180.800755][ T7122] should_fail_ex+0x512/0x640 [ 180.800791][ T7122] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 180.800831][ T7122] should_failslab+0xc2/0x120 [ 180.800855][ T7122] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 180.800892][ T7122] ? radix_tree_node_alloc.constprop.0+0x7c/0x350 [ 180.800929][ T7122] radix_tree_node_alloc.constprop.0+0x7c/0x350 [ 180.800966][ T7122] radix_tree_insert+0x247/0x630 [ 180.801005][ T7122] qrtr_node_enqueue+0x1077/0x12e0 [ 180.801033][ T7122] ? __asan_memcpy+0x3c/0x60 [ 180.801067][ T7122] ? __pfx_qrtr_node_enqueue+0x10/0x10 [ 180.801089][ T7122] ? skb_set_owner_w+0x31f/0x710 [ 180.801121][ T7122] ? skb_copy_header+0x20/0x2b0 [ 180.801153][ T7122] ? __pfx_skb_set_owner_w+0x10/0x10 [ 180.801183][ T7122] ? __pskb_copy_fclone+0x48e/0xb50 [ 180.801206][ T7122] ? __pfx__copy_from_iter+0x10/0x10 [ 180.801250][ T7122] qrtr_bcast_enqueue+0xc7/0x1b0 [ 180.801280][ T7122] qrtr_sendmsg+0x444/0x7b0 [ 180.801303][ T7122] ? __pfx_qrtr_bcast_enqueue+0x10/0x10 [ 180.801327][ T7122] ? __pfx_qrtr_sendmsg+0x10/0x10 [ 180.801362][ T7122] sock_write_iter+0x4ff/0x5b0 [ 180.801390][ T7122] ? __pfx_sock_write_iter+0x10/0x10 [ 180.801428][ T7122] ? __futex_wait+0x24c/0x2f0 [ 180.801464][ T7122] ? copy_iovec_from_user+0x131/0x170 [ 180.801505][ T7122] do_iter_readv_writev+0x657/0x950 [ 180.801545][ T7122] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 180.801582][ T7122] ? bpf_lsm_file_permission+0x9/0x10 [ 180.801614][ T7122] ? security_file_permission+0x71/0x210 [ 180.801646][ T7122] ? rw_verify_area+0xcf/0x680 [ 180.801680][ T7122] vfs_writev+0x35f/0xde0 [ 180.801721][ T7122] ? __pfx_vfs_writev+0x10/0x10 [ 180.801774][ T7122] ? __fget_files+0x20e/0x3c0 [ 180.801814][ T7122] ? do_writev+0x28c/0x340 [ 180.801843][ T7122] do_writev+0x28c/0x340 [ 180.801875][ T7122] ? __pfx_do_writev+0x10/0x10 [ 180.801915][ T7122] do_syscall_64+0xcd/0x490 [ 180.801953][ T7122] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 180.801977][ T7122] RIP: 0033:0x7fb04978e929 [ 180.801995][ T7122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.802017][ T7122] RSP: 002b:00007fb04a640038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 180.802039][ T7122] RAX: ffffffffffffffda RBX: 00007fb0499b5fa0 RCX: 00007fb04978e929 [ 180.802055][ T7122] RDX: 0000000000000008 RSI: 0000200000000100 RDI: 0000000000000003 [ 180.802068][ T7122] RBP: 00007fb049810b39 R08: 0000000000000000 R09: 0000000000000000 [ 180.802082][ T7122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 180.802095][ T7122] R13: 0000000000000000 R14: 00007fb0499b5fa0 R15: 00007ffe3926dec8 [ 180.802125][ T7122] [ 183.041646][ T7155] FAULT_INJECTION: forcing a failure. [ 183.041646][ T7155] name failslab, interval 1, probability 0, space 0, times 0 [ 183.118445][ T7155] CPU: 1 UID: 0 PID: 7155 Comm: syz.3.314 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 183.118479][ T7155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 183.118492][ T7155] Call Trace: [ 183.118499][ T7155] [ 183.118508][ T7155] dump_stack_lvl+0x16c/0x1f0 [ 183.118547][ T7155] should_fail_ex+0x512/0x640 [ 183.118585][ T7155] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 183.118624][ T7155] should_failslab+0xc2/0x120 [ 183.118646][ T7155] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 183.118682][ T7155] ? radix_tree_node_alloc.constprop.0+0x7c/0x350 [ 183.118718][ T7155] radix_tree_node_alloc.constprop.0+0x7c/0x350 [ 183.118754][ T7155] radix_tree_insert+0x247/0x630 [ 183.118790][ T7155] qrtr_node_enqueue+0x1077/0x12e0 [ 183.118819][ T7155] ? __asan_memcpy+0x3c/0x60 [ 183.118851][ T7155] ? __pfx_qrtr_node_enqueue+0x10/0x10 [ 183.118872][ T7155] ? skb_set_owner_w+0x31f/0x710 [ 183.118902][ T7155] ? skb_copy_header+0x20/0x2b0 [ 183.118933][ T7155] ? __pfx_skb_set_owner_w+0x10/0x10 [ 183.118962][ T7155] ? __pskb_copy_fclone+0x48e/0xb50 [ 183.118984][ T7155] ? __pfx__copy_from_iter+0x10/0x10 [ 183.119026][ T7155] qrtr_bcast_enqueue+0xc7/0x1b0 [ 183.119055][ T7155] qrtr_sendmsg+0x444/0x7b0 [ 183.119077][ T7155] ? __pfx_qrtr_bcast_enqueue+0x10/0x10 [ 183.119099][ T7155] ? __pfx_qrtr_sendmsg+0x10/0x10 [ 183.119132][ T7155] sock_write_iter+0x4ff/0x5b0 [ 183.119158][ T7155] ? __pfx_sock_write_iter+0x10/0x10 [ 183.119194][ T7155] ? __futex_wait+0x24c/0x2f0 [ 183.119228][ T7155] ? copy_iovec_from_user+0x131/0x170 [ 183.119283][ T7155] do_iter_readv_writev+0x657/0x950 [ 183.119336][ T7155] ? __pfx_do_iter_readv_writev+0x10/0x10 [ 183.119373][ T7155] ? bpf_lsm_file_permission+0x9/0x10 [ 183.119405][ T7155] ? security_file_permission+0x71/0x210 [ 183.119438][ T7155] ? rw_verify_area+0xcf/0x680 [ 183.119471][ T7155] vfs_writev+0x35f/0xde0 [ 183.119511][ T7155] ? __pfx_vfs_writev+0x10/0x10 [ 183.119565][ T7155] ? __fget_files+0x20e/0x3c0 [ 183.119605][ T7155] ? do_writev+0x28c/0x340 [ 183.119634][ T7155] do_writev+0x28c/0x340 [ 183.119666][ T7155] ? __pfx_do_writev+0x10/0x10 [ 183.119706][ T7155] do_syscall_64+0xcd/0x490 [ 183.119744][ T7155] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 183.119767][ T7155] RIP: 0033:0x7fb04978e929 [ 183.119786][ T7155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 183.119809][ T7155] RSP: 002b:00007fb04a640038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 183.119830][ T7155] RAX: ffffffffffffffda RBX: 00007fb0499b5fa0 RCX: 00007fb04978e929 [ 183.119845][ T7155] RDX: 0000000000000008 RSI: 0000200000000100 RDI: 0000000000000003 [ 183.119859][ T7155] RBP: 00007fb049810b39 R08: 0000000000000000 R09: 0000000000000000 [ 183.119873][ T7155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 183.119886][ T7155] R13: 0000000000000000 R14: 00007fb0499b5fa0 R15: 00007ffe3926dec8 [ 183.119915][ T7155] [ 186.785600][ T7205] netlink: 25 bytes leftover after parsing attributes in process `syz.3.326'. [ 186.944927][ T7205] ima: policy update failed [ 187.038674][ T30] audit: type=1802 audit(4294967340.090:4): pid=7205 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=policy_update cause=failed comm="syz.3.326" res=0 errno=0 syzkaller syzkaller login: [ 188.245965][ T7238] FAULT_INJECTION: forcing a failure. [ 188.245965][ T7238] name failslab, interval 1, probability 0, space 0, times 0 [ 188.588411][ T7238] CPU: 1 UID: 0 PID: 7238 Comm: syz.2.334 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 188.588444][ T7238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 188.588458][ T7238] Call Trace: [ 188.588465][ T7238] [ 188.588473][ T7238] dump_stack_lvl+0x16c/0x1f0 [ 188.588513][ T7238] should_fail_ex+0x512/0x640 [ 188.588546][ T7238] ? __kmalloc_noprof+0xbf/0x510 [ 188.588589][ T7238] ? copy_splice_read+0x1a8/0xba0 [ 188.588616][ T7238] should_failslab+0xc2/0x120 [ 188.588637][ T7238] __kmalloc_noprof+0xd2/0x510 [ 188.588678][ T7238] copy_splice_read+0x1a8/0xba0 [ 188.588713][ T7238] ? __pfx_copy_splice_read+0x10/0x10 [ 188.588744][ T7238] ? look_up_lock_class+0x59/0x150 [ 188.588782][ T7238] ? lockdep_init_map_type+0x5c/0x280 [ 188.588817][ T7238] ? __pfx_pipe_lock_cmp_fn+0x10/0x10 [ 188.588853][ T7238] ? __pfx_copy_splice_read+0x10/0x10 [ 188.588881][ T7238] do_splice_read+0x285/0x370 [ 188.588912][ T7238] splice_direct_to_actor+0x2a1/0xa30 [ 188.588952][ T7238] ? __pfx_direct_splice_actor+0x10/0x10 [ 188.588987][ T7238] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 188.589016][ T7238] ? get_pid_task+0xfc/0x250 [ 188.589055][ T7238] do_splice_direct+0x174/0x240 [ 188.589085][ T7238] ? __pfx_do_splice_direct+0x10/0x10 [ 188.589115][ T7238] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 188.589149][ T7238] ? rw_verify_area+0xcf/0x680 [ 188.589181][ T7238] do_sendfile+0xb06/0xe50 [ 188.589217][ T7238] ? __pfx_do_sendfile+0x10/0x10 [ 188.589248][ T7238] ? __fget_files+0x20e/0x3c0 [ 188.589288][ T7238] __x64_sys_sendfile64+0x1d8/0x220 [ 188.589309][ T7238] ? ksys_write+0x1ac/0x250 [ 188.589340][ T7238] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 188.589371][ T7238] do_syscall_64+0xcd/0x490 [ 188.589408][ T7238] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 188.589431][ T7238] RIP: 0033:0x7f27a878e929 [ 188.589448][ T7238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.589470][ T7238] RSP: 002b:00007f27a96a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 188.589491][ T7238] RAX: ffffffffffffffda RBX: 00007f27a89b5fa0 RCX: 00007f27a878e929 [ 188.589506][ T7238] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 188.589519][ T7238] RBP: 00007f27a96a8090 R08: 0000000000000000 R09: 0000000000000000 [ 188.589533][ T7238] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 188.589546][ T7238] R13: 0000000000000000 R14: 00007f27a89b5fa0 R15: 00007ffcdf217e78 [ 188.589573][ T7238] [ 189.480126][ T7257] FAULT_INJECTION: forcing a failure. [ 189.480126][ T7257] name failslab, interval 1, probability 0, space 0, times 0 [ 189.519953][ T7257] CPU: 1 UID: 0 PID: 7257 Comm: syz.3.340 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 189.519987][ T7257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 189.520019][ T7257] Call Trace: [ 189.520026][ T7257] [ 189.520035][ T7257] dump_stack_lvl+0x16c/0x1f0 [ 189.520074][ T7257] should_fail_ex+0x512/0x640 [ 189.520107][ T7257] ? fs_reclaim_acquire+0xae/0x150 [ 189.520135][ T7257] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 189.520167][ T7257] should_failslab+0xc2/0x120 [ 189.520188][ T7257] __kmalloc_noprof+0xd2/0x510 [ 189.520228][ T7257] tomoyo_realpath_from_path+0xc2/0x6e0 [ 189.520263][ T7257] ? tomoyo_profile+0x47/0x60 [ 189.520301][ T7257] tomoyo_path_number_perm+0x245/0x580 [ 189.520326][ T7257] ? tomoyo_path_number_perm+0x237/0x580 [ 189.520354][ T7257] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 189.520383][ T7257] ? find_held_lock+0x2b/0x80 [ 189.520431][ T7257] ? find_held_lock+0x2b/0x80 [ 189.520453][ T7257] ? hook_file_ioctl_common+0x145/0x410 [ 189.520484][ T7257] ? __fget_files+0x20e/0x3c0 [ 189.520520][ T7257] security_file_ioctl+0x9b/0x240 [ 189.520549][ T7257] __x64_sys_ioctl+0xb7/0x210 [ 189.520578][ T7257] do_syscall_64+0xcd/0x490 [ 189.520613][ T7257] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 189.520636][ T7257] RIP: 0033:0x7fb04978e929 [ 189.520654][ T7257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 189.520675][ T7257] RSP: 002b:00007fb04a640038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 189.520696][ T7257] RAX: ffffffffffffffda RBX: 00007fb0499b5fa0 RCX: 00007fb04978e929 [ 189.520711][ T7257] RDX: 0000000000000000 RSI: 0000000000004161 RDI: 0000000000000003 [ 189.520724][ T7257] RBP: 00007fb04a640090 R08: 0000000000000000 R09: 0000000000000000 [ 189.520738][ T7257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 189.520751][ T7257] R13: 0000000000000000 R14: 00007fb0499b5fa0 R15: 00007ffe3926dec8 [ 189.520779][ T7257] [ 189.520788][ T7257] ERROR: Out of memory at tomoyo_realpath_from_path. [ 190.016046][ T7262] FAULT_INJECTION: forcing a failure. [ 190.016046][ T7262] name failslab, interval 1, probability 0, space 0, times 0 [ 190.083350][ T7262] CPU: 1 UID: 0 PID: 7262 Comm: syz.2.342 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 190.083383][ T7262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 190.083396][ T7262] Call Trace: [ 190.083403][ T7262] [ 190.083412][ T7262] dump_stack_lvl+0x16c/0x1f0 [ 190.083451][ T7262] should_fail_ex+0x512/0x640 [ 190.083484][ T7262] ? kmem_cache_alloc_node_noprof+0x5e/0x3b0 [ 190.083523][ T7262] should_failslab+0xc2/0x120 [ 190.083546][ T7262] kmem_cache_alloc_node_noprof+0x71/0x3b0 [ 190.083581][ T7262] ? __alloc_skb+0x2b2/0x380 [ 190.083617][ T7262] __alloc_skb+0x2b2/0x380 [ 190.083648][ T7262] ? __pfx___alloc_skb+0x10/0x10 [ 190.083691][ T7262] tipc_buf_acquire+0x26/0xe0 [ 190.083719][ T7262] tipc_msg_build+0x112/0x1150 [ 190.083753][ T7262] ? __pfx_tipc_msg_build+0x10/0x10 [ 190.083796][ T7262] __tipc_sendmsg+0xa30/0x19a0 [ 190.083832][ T7262] ? __pfx___tipc_sendmsg+0x10/0x10 [ 190.083865][ T7262] ? __pfx___might_resched+0x10/0x10 [ 190.083895][ T7262] ? __pfx_woken_wake_function+0x10/0x10 [ 190.083935][ T7262] ? __local_bh_enable_ip+0xa4/0x120 [ 190.083965][ T7262] tipc_sendmsg+0x4f/0x70 [ 190.083990][ T7262] ____sys_sendmsg+0xa95/0xc70 [ 190.084017][ T7262] ? copy_msghdr_from_user+0x10a/0x160 [ 190.084051][ T7262] ? __pfx_____sys_sendmsg+0x10/0x10 [ 190.084081][ T7262] ? kfree+0x24f/0x4d0 [ 190.084107][ T7262] ? __pfx__kstrtoull+0x10/0x10 [ 190.084140][ T7262] ___sys_sendmsg+0x134/0x1d0 [ 190.084175][ T7262] ? __pfx____sys_sendmsg+0x10/0x10 [ 190.084236][ T7262] ? __pfx___might_resched+0x10/0x10 [ 190.084267][ T7262] __sys_sendmmsg+0x200/0x420 [ 190.084317][ T7262] ? __pfx___sys_sendmmsg+0x10/0x10 [ 190.084358][ T7262] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 190.084404][ T7262] ? fput+0x70/0xf0 [ 190.084425][ T7262] ? ksys_write+0x1ac/0x250 [ 190.084455][ T7262] ? __pfx_ksys_write+0x10/0x10 [ 190.084491][ T7262] __x64_sys_sendmmsg+0x9c/0x100 [ 190.084522][ T7262] ? lockdep_hardirqs_on+0x7c/0x110 [ 190.084553][ T7262] do_syscall_64+0xcd/0x490 [ 190.084587][ T7262] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 190.084628][ T7262] RIP: 0033:0x7f27a878e929 [ 190.084646][ T7262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 190.084667][ T7262] RSP: 002b:00007f27a96a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 190.084703][ T7262] RAX: ffffffffffffffda RBX: 00007f27a89b5fa0 RCX: 00007f27a878e929 [ 190.084717][ T7262] RDX: 00000000000009a6 RSI: 0000000000000000 RDI: 0000000000000004 [ 190.084730][ T7262] RBP: 00007f27a96a8090 R08: 0000000000000000 R09: 0000000000000000 [ 190.084743][ T7262] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000002 [ 190.084755][ T7262] R13: 0000000000000000 R14: 00007f27a89b5fa0 R15: 00007ffcdf217e78 [ 190.084783][ T7262] [ 191.625328][ T7285] FAULT_INJECTION: forcing a failure. [ 191.625328][ T7285] name failslab, interval 1, probability 0, space 0, times 0 [ 191.682759][ T7285] CPU: 1 UID: 0 PID: 7285 Comm: syz.0.348 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 191.682794][ T7285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 191.682808][ T7285] Call Trace: [ 191.682815][ T7285] [ 191.682824][ T7285] dump_stack_lvl+0x16c/0x1f0 [ 191.682864][ T7285] should_fail_ex+0x512/0x640 [ 191.682899][ T7285] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 191.682934][ T7285] ? __pfx_drm_debugfs_entry_open+0x10/0x10 [ 191.682966][ T7285] should_failslab+0xc2/0x120 [ 191.682989][ T7285] __kmalloc_cache_noprof+0x6a/0x3e0 [ 191.683019][ T7285] ? __pfx_drm_debugfs_entry_open+0x10/0x10 [ 191.683052][ T7285] ? single_open+0x4d/0x1f0 [ 191.683080][ T7285] ? __pfx_drm_debugfs_entry_open+0x10/0x10 [ 191.683111][ T7285] ? __pfx_vkms_config_show+0x10/0x10 [ 191.683141][ T7285] single_open+0x4d/0x1f0 [ 191.683167][ T7285] drm_debugfs_entry_open+0x127/0x1c0 [ 191.683201][ T7285] full_proxy_open_regular+0x1b6/0x360 [ 191.683231][ T7285] do_dentry_open+0x744/0x1c10 [ 191.683267][ T7285] ? __pfx_full_proxy_open_regular+0x10/0x10 [ 191.683299][ T7285] vfs_open+0x82/0x3f0 [ 191.683327][ T7285] path_openat+0x1de4/0x2cb0 [ 191.683371][ T7285] ? __pfx_path_openat+0x10/0x10 [ 191.683407][ T7285] ? __lock_acquire+0xb8a/0x1c90 [ 191.683443][ T7285] do_filp_open+0x20b/0x470 [ 191.683478][ T7285] ? __pfx_do_filp_open+0x10/0x10 [ 191.683533][ T7285] ? alloc_fd+0x471/0x7d0 [ 191.683573][ T7285] do_sys_openat2+0x11b/0x1d0 [ 191.683598][ T7285] ? __pfx_do_sys_openat2+0x10/0x10 [ 191.683636][ T7285] __x64_sys_openat+0x174/0x210 [ 191.683671][ T7285] ? __pfx___x64_sys_openat+0x10/0x10 [ 191.683715][ T7285] do_syscall_64+0xcd/0x490 [ 191.683753][ T7285] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 191.683777][ T7285] RIP: 0033:0x7f635db8e929 [ 191.683796][ T7285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.683818][ T7285] RSP: 002b:00007f635e931038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 191.683839][ T7285] RAX: ffffffffffffffda RBX: 00007f635ddb5fa0 RCX: 00007f635db8e929 [ 191.683854][ T7285] RDX: 0000000040000100 RSI: 0000200000001040 RDI: ffffffffffffff9c [ 191.683869][ T7285] RBP: 00007f635dc10b39 R08: 0000000000000000 R09: 0000000000000000 [ 191.683883][ T7285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 191.683897][ T7285] R13: 0000000000000000 R14: 00007f635ddb5fa0 R15: 00007ffd2b18acf8 [ 191.683925][ T7285] [ 191.935266][ C1] vcan0: j1939_tp_rxtimer: 0xffff888033ed3c00: rx timeout, send abort [ 191.947602][ C1] vcan0: j1939_xtp_rx_abort_one: 0xffff888033ed3c00: 0x40000: (3) A timeout occurred and this is the connection abort to close the session. [ 192.603810][ T7297] FAULT_INJECTION: forcing a failure. [ 192.603810][ T7297] name failslab, interval 1, probability 0, space 0, times 0 [ 192.652827][ T7297] CPU: 1 UID: 0 PID: 7297 Comm: syz.3.354 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 192.652861][ T7297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 192.652874][ T7297] Call Trace: [ 192.652882][ T7297] [ 192.652890][ T7297] dump_stack_lvl+0x16c/0x1f0 [ 192.652929][ T7297] should_fail_ex+0x512/0x640 [ 192.652963][ T7297] ? fs_reclaim_acquire+0xae/0x150 [ 192.652997][ T7297] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 192.653030][ T7297] should_failslab+0xc2/0x120 [ 192.653052][ T7297] __kmalloc_noprof+0xd2/0x510 [ 192.653093][ T7297] tomoyo_realpath_from_path+0xc2/0x6e0 [ 192.653128][ T7297] ? tomoyo_profile+0x47/0x60 [ 192.653167][ T7297] tomoyo_path_number_perm+0x245/0x580 [ 192.653193][ T7297] ? tomoyo_path_number_perm+0x237/0x580 [ 192.653223][ T7297] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 192.653252][ T7297] ? find_held_lock+0x2b/0x80 [ 192.653301][ T7297] ? find_held_lock+0x2b/0x80 [ 192.653323][ T7297] ? hook_file_ioctl_common+0x145/0x410 [ 192.653354][ T7297] ? __fget_files+0x20e/0x3c0 [ 192.653392][ T7297] security_file_ioctl+0x9b/0x240 [ 192.653422][ T7297] __x64_sys_ioctl+0xb7/0x210 [ 192.653451][ T7297] do_syscall_64+0xcd/0x490 [ 192.653488][ T7297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 192.653511][ T7297] RIP: 0033:0x7fb04978e929 [ 192.653529][ T7297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 192.653550][ T7297] RSP: 002b:00007fb04a61f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 192.653571][ T7297] RAX: ffffffffffffffda RBX: 00007fb0499b6080 RCX: 00007fb04978e929 [ 192.653586][ T7297] RDX: 0000200000000080 RSI: 0000000000004601 RDI: 0000000000000003 [ 192.653600][ T7297] RBP: 00007fb04a61f090 R08: 0000000000000000 R09: 0000000000000000 [ 192.653613][ T7297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 192.653626][ T7297] R13: 0000000000000000 R14: 00007fb0499b6080 R15: 00007ffe3926dec8 [ 192.653660][ T7297] [ 192.858925][ C1] vkms_vblank_simulate: vblank timer overrun [ 193.631364][ T7297] ERROR: Out of memory at tomoyo_realpath_from_path. [ 193.685388][ T7316] FAULT_INJECTION: forcing a failure. [ 193.685388][ T7316] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 193.685423][ T7316] CPU: 1 UID: 0 PID: 7316 Comm: syz.1.360 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 193.685451][ T7316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 193.685464][ T7316] Call Trace: [ 193.685472][ T7316] [ 193.685480][ T7316] dump_stack_lvl+0x16c/0x1f0 [ 193.685519][ T7316] should_fail_ex+0x512/0x640 [ 193.685557][ T7316] should_fail_alloc_page+0xe7/0x130 [ 193.685581][ T7316] prepare_alloc_pages+0x3c2/0x610 [ 193.685614][ T7316] __alloc_frozen_pages_noprof+0x18b/0x23f0 [ 193.685649][ T7316] ? rcu_is_watching+0x12/0xc0 [ 193.685673][ T7316] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 193.685704][ T7316] ? lockdep_hardirqs_on+0x7c/0x110 [ 193.685737][ T7316] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 193.685776][ T7316] ? stack_depot_save_flags+0x3e0/0xa40 [ 193.685812][ T7316] ? __lock_acquire+0xb8a/0x1c90 [ 193.685847][ T7316] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 193.685881][ T7316] ? kasan_save_stack+0x33/0x60 [ 193.685914][ T7316] ? __kasan_kmalloc+0xaa/0xb0 [ 193.685946][ T7316] ? copy_splice_read+0x1a8/0xba0 [ 193.685973][ T7316] ? do_splice_read+0x285/0x370 [ 193.685998][ T7316] ? splice_direct_to_actor+0x2a1/0xa30 [ 193.686026][ T7316] ? do_splice_direct+0x174/0x240 [ 193.686053][ T7316] ? do_sendfile+0xb06/0xe50 [ 193.686081][ T7316] ? __x64_sys_sendfile64+0x154/0x220 [ 193.686102][ T7316] ? do_syscall_64+0xcd/0x490 [ 193.686156][ T7316] alloc_pages_bulk_noprof+0x71c/0x1410 [ 193.686200][ T7316] ? __pfx_alloc_pages_bulk_noprof+0x10/0x10 [ 193.686242][ T7316] ? trace_kmalloc+0x2b/0xd0 [ 193.686264][ T7316] ? __kmalloc_noprof+0x242/0x510 [ 193.686305][ T7316] copy_splice_read+0x1e1/0xba0 [ 193.686340][ T7316] ? __pfx_copy_splice_read+0x10/0x10 [ 193.686371][ T7316] ? look_up_lock_class+0x59/0x150 [ 193.686408][ T7316] ? lockdep_init_map_type+0x5c/0x280 [ 193.686442][ T7316] ? __pfx_pipe_lock_cmp_fn+0x10/0x10 [ 193.686477][ T7316] ? __pfx_copy_splice_read+0x10/0x10 [ 193.686505][ T7316] do_splice_read+0x285/0x370 [ 193.686536][ T7316] splice_direct_to_actor+0x2a1/0xa30 [ 193.686568][ T7316] ? __pfx_direct_splice_actor+0x10/0x10 [ 193.686603][ T7316] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 193.686631][ T7316] ? get_pid_task+0xfc/0x250 [ 193.686670][ T7316] do_splice_direct+0x174/0x240 [ 193.686700][ T7316] ? __pfx_do_splice_direct+0x10/0x10 [ 193.686730][ T7316] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 193.686785][ T7316] ? rw_verify_area+0xcf/0x680 [ 193.686835][ T7316] do_sendfile+0xb06/0xe50 [ 193.686870][ T7316] ? __pfx_do_sendfile+0x10/0x10 [ 193.686910][ T7316] __x64_sys_sendfile64+0x154/0x220 [ 193.686932][ T7316] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 193.686962][ T7316] do_syscall_64+0xcd/0x490 [ 193.686998][ T7316] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 193.687020][ T7316] RIP: 0033:0x7f1d0258e929 [ 193.687037][ T7316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 193.687058][ T7316] RSP: 002b:00007f1d0342f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 193.687078][ T7316] RAX: ffffffffffffffda RBX: 00007f1d027b5fa0 RCX: 00007f1d0258e929 [ 193.687092][ T7316] RDX: 0000200000000040 RSI: 0000000000000003 RDI: 0000000000000003 [ 193.687105][ T7316] RBP: 00007f1d0342f090 R08: 0000000000000000 R09: 0000000000000000 [ 193.687119][ T7316] R10: 000000000000788b R11: 0000000000000246 R12: 0000000000000001 [ 193.687131][ T7316] R13: 0000000000000000 R14: 00007f1d027b5fa0 R15: 00007ffea77d3918 [ 193.687159][ T7316] [ 195.657057][ T7331] tty tty12: ldisc open failed (-12), clearing slot 11 [ 196.582388][ T7357] FAULT_INJECTION: forcing a failure. [ 196.582388][ T7357] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 196.698811][ T7357] CPU: 1 UID: 0 PID: 7357 Comm: syz.3.370 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 196.698844][ T7357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 196.698857][ T7357] Call Trace: [ 196.698864][ T7357] [ 196.698873][ T7357] dump_stack_lvl+0x16c/0x1f0 [ 196.698912][ T7357] should_fail_ex+0x512/0x640 [ 196.698961][ T7357] _copy_from_user+0x2e/0xd0 [ 196.698997][ T7357] move_addr_to_kernel+0x65/0x170 [ 196.699025][ T7357] __sys_connect+0xb1/0x160 [ 196.699053][ T7357] ? __pfx___sys_connect+0x10/0x10 [ 196.699091][ T7357] ? __pfx_ksys_write+0x10/0x10 [ 196.699128][ T7357] __x64_sys_connect+0x72/0xb0 [ 196.699155][ T7357] ? lockdep_hardirqs_on+0x7c/0x110 [ 196.699187][ T7357] do_syscall_64+0xcd/0x490 [ 196.699222][ T7357] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 196.699244][ T7357] RIP: 0033:0x7fb04978e929 [ 196.699270][ T7357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 196.699290][ T7357] RSP: 002b:00007fb04a640038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 196.699311][ T7357] RAX: ffffffffffffffda RBX: 00007fb0499b5fa0 RCX: 00007fb04978e929 [ 196.699325][ T7357] RDX: 000000000000003a RSI: 0000200000000000 RDI: 0000000000000002 [ 196.699338][ T7357] RBP: 00007fb04a640090 R08: 0000000000000000 R09: 0000000000000000 [ 196.699351][ T7357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 196.699364][ T7357] R13: 0000000000000000 R14: 00007fb0499b5fa0 R15: 00007ffe3926dec8 [ 196.699391][ T7357] [ 196.865894][ C1] vkms_vblank_simulate: vblank timer overrun [ 197.177406][ T7367] netlink: 'syz.3.374': attribute type 2 has an invalid length. [ 198.367148][ T7385] netlink: 16 bytes leftover after parsing attributes in process `syz.0.379'. [ 200.181835][ T7422] process 'syz.2.391' launched './file0' with NULL argv: empty string added [ 204.149865][ T7497] netlink: 342 bytes leftover after parsing attributes in process `syz.1.411'. [ 204.311374][ T7501] FAULT_INJECTION: forcing a failure. [ 204.311374][ T7501] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 204.390079][ T3419] Process accounting resumed [ 204.678066][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 204.684553][ T7501] CPU: 1 UID: 0 PID: 7501 Comm: syz.1.411 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 204.684589][ T7501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 204.684602][ T7501] Call Trace: [ 204.684609][ T7501] [ 204.684619][ T7501] dump_stack_lvl+0x16c/0x1f0 [ 204.684658][ T7501] should_fail_ex+0x512/0x640 [ 204.684696][ T7501] _copy_from_user+0x2e/0xd0 [ 204.684733][ T7501] copy_msghdr_from_user+0x98/0x160 [ 204.684769][ T7501] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 204.684808][ T7501] ? __pfx__kstrtoull+0x10/0x10 [ 204.684840][ T7501] ___sys_sendmsg+0xfe/0x1d0 [ 204.684875][ T7501] ? __pfx____sys_sendmsg+0x10/0x10 [ 204.684923][ T7501] ? find_held_lock+0x2b/0x80 [ 204.684965][ T7501] __sys_sendmmsg+0x200/0x420 [ 204.685002][ T7501] ? __pfx___sys_sendmmsg+0x10/0x10 [ 204.685046][ T7501] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 204.685094][ T7501] ? fput+0x70/0xf0 [ 204.685116][ T7501] ? ksys_write+0x1ac/0x250 [ 204.685148][ T7501] ? __pfx_ksys_write+0x10/0x10 [ 204.685185][ T7501] __x64_sys_sendmmsg+0x9c/0x100 [ 204.685219][ T7501] ? lockdep_hardirqs_on+0x7c/0x110 [ 204.685251][ T7501] do_syscall_64+0xcd/0x490 [ 204.685288][ T7501] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 204.685312][ T7501] RIP: 0033:0x7f1d0258e929 [ 204.685329][ T7501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.685351][ T7501] RSP: 002b:00007f1d0340e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 204.685372][ T7501] RAX: ffffffffffffffda RBX: 00007f1d027b6080 RCX: 00007f1d0258e929 [ 204.685387][ T7501] RDX: 0000000000000003 RSI: 0000200000000080 RDI: 0000000000000003 [ 204.685401][ T7501] RBP: 00007f1d0340e090 R08: 0000000000000000 R09: 0000000000000000 [ 204.685414][ T7501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 204.685427][ T7501] R13: 0000000000000000 R14: 00007f1d027b6080 R15: 00007ffea77d3918 [ 204.685455][ T7501] [ 204.685620][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 207.375327][ T7546] netlink: 'syz.0.423': attribute type 8 has an invalid length. [ 210.152730][ T7566] netlink: 338 bytes leftover after parsing attributes in process `syz.2.429'. [ 212.820422][ T7629] syz.0.445(7629): Attempt to set a LOCK_MAND lock via flock(2). This support has been removed and the request ignored. [ 216.197376][ T5168] Bluetooth: hci2: Malformed HCI Event [ 217.614460][ T7695] i2c i2c-0: DVB: adapter 0 frontend 0 frequency 0 out of range (51000000..2150000000) [ 218.842717][ T7714] random: crng reseeded on system resumption [ 221.064330][ T7734] netlink: 28 bytes leftover after parsing attributes in process `syz.3.470'. [ 221.826284][ T30] audit: type=1400 audit(6442450970.246:5): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=7737 comm="syz.0.471" [ 223.680335][ T30] audit: type=1804 audit(6442450972.096:6): pid=7769 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz.2.479" name="/newroot/sys/kernel/tracing/events/vmalloc/enable" dev="tracefs" ino=19680823 res=1 errno=0 [ 223.901848][ T7767] FAULT_INJECTION: forcing a failure. [ 223.901848][ T7767] name failslab, interval 1, probability 0, space 0, times 0 [ 224.028905][ T7767] CPU: 1 UID: 0 PID: 7767 Comm: syz.3.480 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 224.028942][ T7767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 224.028956][ T7767] Call Trace: [ 224.028963][ T7767] [ 224.028972][ T7767] dump_stack_lvl+0x16c/0x1f0 [ 224.029020][ T7767] should_fail_ex+0x512/0x640 [ 224.029054][ T7767] ? __kvmalloc_node_noprof+0x124/0x620 [ 224.029091][ T7767] should_failslab+0xc2/0x120 [ 224.029113][ T7767] __kvmalloc_node_noprof+0x137/0x620 [ 224.029147][ T7767] ? seq_read_iter+0x826/0x12c0 [ 224.029181][ T7767] ? seq_read_iter+0x826/0x12c0 [ 224.029207][ T7767] seq_read_iter+0x826/0x12c0 [ 224.029237][ T7767] ? aa_file_perm+0x4d6/0xfb0 [ 224.029277][ T7767] seq_read+0x39e/0x4e0 [ 224.029306][ T7767] ? __pfx_seq_read+0x10/0x10 [ 224.029332][ T7767] ? __lock_acquire+0xb8a/0x1c90 [ 224.029375][ T7767] ? get_pid_task+0xfc/0x250 [ 224.029425][ T7767] ? __pfx_seq_read+0x10/0x10 [ 224.029459][ T7767] proc_reg_read+0x240/0x330 [ 224.029496][ T7767] ? __pfx_proc_reg_read+0x10/0x10 [ 224.029535][ T7767] vfs_read+0x1e4/0xc60 [ 224.029571][ T7767] ? __pfx___mutex_lock+0x10/0x10 [ 224.029607][ T7767] ? __pfx_vfs_read+0x10/0x10 [ 224.029647][ T7767] ? __fget_files+0x20e/0x3c0 [ 224.029704][ T7767] ksys_read+0x12a/0x250 [ 224.029734][ T7767] ? __pfx_ksys_read+0x10/0x10 [ 224.029774][ T7767] do_syscall_64+0xcd/0x490 [ 224.029810][ T7767] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 224.029833][ T7767] RIP: 0033:0x7fb04978e929 [ 224.029856][ T7767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 224.029890][ T7767] RSP: 002b:00007fb04a640038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 224.029910][ T7767] RAX: ffffffffffffffda RBX: 00007fb0499b5fa0 RCX: 00007fb04978e929 [ 224.029928][ T7767] RDX: 0000000000000f34 RSI: 0000000000000000 RDI: 0000000000000003 [ 224.029940][ T7767] RBP: 00007fb04a640090 R08: 0000000000000000 R09: 0000000000000000 [ 224.029953][ T7767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 224.029966][ T7767] R13: 0000000000000000 R14: 00007fb0499b5fa0 R15: 00007ffe3926dec8 [ 224.029996][ T7767] [ 227.384227][ T5168] Bluetooth: hci3: command 0x0406 tx timeout [ 227.384303][ T5168] Bluetooth: hci1: command 0x0406 tx timeout [ 227.384343][ T5168] Bluetooth: hci2: command 0x0406 tx timeout [ 227.384375][ T5168] Bluetooth: hci0: command 0x0406 tx timeout [ 227.557162][ T7819] ptrace attach of "./syz-executor exec"[5848] was attempted by "./syz-executor exec"[7819] [ 227.607646][ T7823] FAULT_INJECTION: forcing a failure. [ 227.607646][ T7823] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 227.607748][ T7823] CPU: 1 UID: 0 PID: 7823 Comm: syz.2.493 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 227.607791][ T7823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 227.607803][ T7823] Call Trace: [ 227.607810][ T7823] [ 227.607818][ T7823] dump_stack_lvl+0x16c/0x1f0 [ 227.607856][ T7823] should_fail_ex+0x512/0x640 [ 227.607892][ T7823] should_fail_alloc_page+0xe7/0x130 [ 227.607925][ T7823] prepare_alloc_pages+0x3c2/0x610 [ 227.607974][ T7823] __alloc_frozen_pages_noprof+0x18b/0x23f0 [ 227.608013][ T7823] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 227.608042][ T7823] ? is_bpf_text_address+0x94/0x1a0 [ 227.608087][ T7823] ? kernel_text_address+0x8d/0x100 [ 227.608108][ T7823] ? __kernel_text_address+0xd/0x40 [ 227.608127][ T7823] ? unwind_get_return_address+0x59/0xa0 [ 227.608163][ T7823] ? arch_stack_walk+0xa6/0x100 [ 227.608184][ T7823] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 227.608224][ T7823] ? __lock_acquire+0x622/0x1c90 [ 227.608258][ T7823] ? __pfx_stack_trace_save+0x10/0x10 [ 227.608283][ T7823] ? stack_depot_save_flags+0x28/0xa40 [ 227.608319][ T7823] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 227.608355][ T7823] ? policy_nodemask+0xea/0x4e0 [ 227.608378][ T7823] alloc_pages_mpol+0x1fb/0x550 [ 227.608400][ T7823] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 227.608429][ T7823] alloc_pages_noprof+0x131/0x390 [ 227.608451][ T7823] __pmd_alloc+0x3b/0x930 [ 227.608474][ T7823] ? find_held_lock+0x2b/0x80 [ 227.608499][ T7823] __handle_mm_fault+0xaac/0x5490 [ 227.608536][ T7823] ? __pfx___handle_mm_fault+0x10/0x10 [ 227.608567][ T7823] ? __pfx_mt_find+0x10/0x10 [ 227.608602][ T7823] ? find_vma+0xbf/0x140 [ 227.608623][ T7823] ? __pfx_find_vma+0x10/0x10 [ 227.608648][ T7823] handle_mm_fault+0x589/0xd10 [ 227.608679][ T7823] ? __pkru_allows_pkey+0x51/0xb0 [ 227.608711][ T7823] do_user_addr_fault+0x7a6/0x1370 [ 227.608746][ T7823] ? rcu_is_watching+0x12/0xc0 [ 227.608772][ T7823] exc_page_fault+0x5c/0xb0 [ 227.608804][ T7823] asm_exc_page_fault+0x26/0x30 [ 227.608825][ T7823] RIP: 0010:rep_movs_alternative+0xf/0x90 [ 227.608851][ T7823] Code: c4 10 e9 84 11 04 00 0f 1f 40 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 83 f9 40 73 44 83 f9 08 73 25 85 c9 74 0f <8a> 06 88 07 48 ff c7 48 ff c6 48 ff c9 75 f1 e9 4d 11 04 00 66 66 [ 227.608872][ T7823] RSP: 0018:ffffc900023af9d0 EFLAGS: 00050202 [ 227.608889][ T7823] RAX: 0000000000000001 RBX: 0000000000000000 RCX: 0000000000000007 [ 227.608906][ T7823] RDX: fffff52000475f4c RSI: 0000000000000000 RDI: ffffc900023afa58 [ 227.608920][ T7823] RBP: 0000000000000007 R08: 0000000000000001 R09: fffff52000475f4b [ 227.608933][ T7823] R10: ffffc900023afa5e R11: 0000000000000001 R12: 0000000000000000 [ 227.608946][ T7823] R13: ffffc900023afa58 R14: 1ffff92000475f45 R15: ffffc900023afd8c [ 227.608974][ T7823] _copy_from_user+0x98/0xd0 [ 227.609011][ T7823] ____sys_sendmsg+0x607/0xc70 [ 227.609039][ T7823] ? __pfx_____sys_sendmsg+0x10/0x10 [ 227.609068][ T7823] ? __pfx__kstrtoull+0x10/0x10 [ 227.609100][ T7823] ___sys_sendmsg+0x134/0x1d0 [ 227.609135][ T7823] ? __pfx____sys_sendmsg+0x10/0x10 [ 227.609181][ T7823] ? find_held_lock+0x2b/0x80 [ 227.609221][ T7823] __sys_sendmmsg+0x200/0x420 [ 227.609257][ T7823] ? __pfx___sys_sendmmsg+0x10/0x10 [ 227.609300][ T7823] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 227.609346][ T7823] ? fput+0x70/0xf0 [ 227.609368][ T7823] ? ksys_write+0x1ac/0x250 [ 227.609398][ T7823] ? __pfx_ksys_write+0x10/0x10 [ 227.609435][ T7823] __x64_sys_sendmmsg+0x9c/0x100 [ 227.609467][ T7823] ? lockdep_hardirqs_on+0x7c/0x110 [ 227.609498][ T7823] do_syscall_64+0xcd/0x490 [ 227.609533][ T7823] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 227.609572][ T7823] RIP: 0033:0x7f27a878e929 [ 227.609589][ T7823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 227.609610][ T7823] RSP: 002b:00007f27a96a8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 227.609629][ T7823] RAX: ffffffffffffffda RBX: 00007f27a89b5fa0 RCX: 00007f27a878e929 [ 227.609644][ T7823] RDX: 0000000000000007 RSI: 0000200000000200 RDI: 0000000000000003 [ 227.609657][ T7823] RBP: 00007f27a96a8090 R08: 0000000000000000 R09: 0000000000000000 [ 227.609671][ T7823] R10: 0000000000004008 R11: 0000000000000246 R12: 0000000000000001 [ 227.609684][ T7823] R13: 0000000000000000 R14: 00007f27a89b5fa0 R15: 00007ffcdf217e78 [ 227.609713][ T7823] [ 228.819588][ T5847] Bluetooth: hci4: Opcode 0x0c03 failed: -110 [ 230.605597][ T7835] tty tty12: ldisc open failed (-12), clearing slot 11 [ 230.633994][ T7837] tty tty12: ldisc open failed (-12), clearing slot 11 [ 230.654684][ T7845] tty tty12: ldisc open failed (-12), clearing slot 11 [ 230.677085][ T7852] ttyS ttyS3: ldisc open failed (-12), clearing slot 3 [ 233.113653][ T7904] FAULT_INJECTION: forcing a failure. [ 233.113653][ T7904] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 233.216329][ T7904] CPU: 1 UID: 0 PID: 7904 Comm: syz.1.507 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 233.216361][ T7904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 233.216375][ T7904] Call Trace: [ 233.216382][ T7904] [ 233.216390][ T7904] dump_stack_lvl+0x16c/0x1f0 [ 233.216430][ T7904] should_fail_ex+0x512/0x640 [ 233.216468][ T7904] _copy_to_user+0x32/0xd0 [ 233.216506][ T7904] do_pages_stat+0x631/0x820 [ 233.216539][ T7904] ? __pfx_do_pages_stat+0x10/0x10 [ 233.216565][ T7904] ? __lock_acquire+0x622/0x1c90 [ 233.216616][ T7904] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 233.216647][ T7904] ? lockdep_hardirqs_on+0x7c/0x110 [ 233.216679][ T7904] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 233.216714][ T7904] kernel_move_pages+0xfd4/0x13b0 [ 233.216751][ T7904] ? __pfx_kernel_move_pages+0x10/0x10 [ 233.216778][ T7904] ? __fget_files+0x20e/0x3c0 [ 233.216815][ T7904] ? fput+0x70/0xf0 [ 233.216836][ T7904] ? ksys_write+0x1ac/0x250 [ 233.216868][ T7904] ? __pfx_ksys_write+0x10/0x10 [ 233.216904][ T7904] __x64_sys_move_pages+0xe0/0x1c0 [ 233.216930][ T7904] ? do_syscall_64+0x91/0x490 [ 233.216963][ T7904] ? lockdep_hardirqs_on+0x7c/0x110 [ 233.216995][ T7904] do_syscall_64+0xcd/0x490 [ 233.217031][ T7904] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 233.217054][ T7904] RIP: 0033:0x7f1d0258e929 [ 233.217071][ T7904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 233.217092][ T7904] RSP: 002b:00007f1d033ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000117 [ 233.217114][ T7904] RAX: ffffffffffffffda RBX: 00007f1d027b6160 RCX: 00007f1d0258e929 [ 233.217129][ T7904] RDX: 0000000000000000 RSI: 0000000000001002 RDI: 0000000000000000 [ 233.217150][ T7904] RBP: 00007f1d033ed090 R08: 0000000000000000 R09: 0000000000000000 [ 233.217163][ T7904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 233.217176][ T7904] R13: 0000000000000001 R14: 00007f1d027b6160 R15: 00007ffea77d3918 [ 233.217204][ T7904] [ 237.349589][ T7959] random: crng reseeded on system resumption [ 239.091116][ T7984] bridge0: port 3(veth0_to_bridge) entered blocking state [ 239.137308][ T7984] bridge0: port 3(veth0_to_bridge) entered disabled state [ 239.227147][ T7984] veth0_to_bridge: entered allmulticast mode [ 239.239530][ T7990] delete_channel: no stack [ 239.327267][ T7984] veth0_to_bridge: entered promiscuous mode [ 239.391020][ T7984] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 239.521425][ T7984] bridge0: port 3(veth0_to_bridge) entered blocking state [ 239.528868][ T7984] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 242.709865][ T8043] FAULT_INJECTION: forcing a failure. [ 242.709865][ T8043] name failslab, interval 1, probability 0, space 0, times 0 [ 242.803794][ T8043] CPU: 1 UID: 0 PID: 8043 Comm: syz.0.546 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) [ 242.803829][ T8043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 242.803842][ T8043] Call Trace: [ 242.803849][ T8043] [ 242.803858][ T8043] dump_stack_lvl+0x16c/0x1f0 [ 242.803899][ T8043] should_fail_ex+0x512/0x640 [ 242.803935][ T8043] ? fs_reclaim_acquire+0xae/0x150 [ 242.803966][ T8043] should_failslab+0xc2/0x120 [ 242.803989][ T8043] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 242.804026][ T8043] ? security_inode_alloc+0x3b/0x2b0 [ 242.804056][ T8043] security_inode_alloc+0x3b/0x2b0 [ 242.804083][ T8043] inode_init_always_gfp+0xce4/0x1030 [ 242.804121][ T8043] alloc_inode+0x86/0x240 [ 242.804145][ T8043] new_inode+0x22/0x1c0 [ 242.804171][ T8043] simple_fill_super+0x306/0x720 [ 242.804209][ T8043] ? __pfx_nfsd_fill_super+0x10/0x10 [ 242.804236][ T8043] nfsd_fill_super+0x90/0x530 [ 242.804261][ T8043] ? __pfx_set_anon_super_fc+0x10/0x10 [ 242.804292][ T8043] ? __pfx_nfsd_fill_super+0x10/0x10 [ 242.804325][ T8043] get_tree_keyed+0x10b/0x1d0 [ 242.804360][ T8043] vfs_get_tree+0x8b/0x340 [ 242.804387][ T8043] path_mount+0x1414/0x2020 [ 242.804426][ T8043] ? kmem_cache_free+0x2d1/0x4d0 [ 242.804459][ T8043] ? __pfx_path_mount+0x10/0x10 [ 242.804500][ T8043] ? putname+0x154/0x1a0 [ 242.804526][ T8043] __x64_sys_mount+0x28d/0x310 [ 242.804564][ T8043] ? __pfx___x64_sys_mount+0x10/0x10 [ 242.804610][ T8043] do_syscall_64+0xcd/0x490 [ 242.804648][ T8043] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 242.804685][ T8043] RIP: 0033:0x7f635db8e929 [ 242.804702][ T8043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 242.804724][ T8043] RSP: 002b:00007f635e910038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 242.804745][ T8043] RAX: ffffffffffffffda RBX: 00007f635ddb6080 RCX: 00007f635db8e929 [ 242.804760][ T8043] RDX: 0000200000000100 RSI: 00002000000000c0 RDI: 0000000000000000 [ 242.804773][ T8043] RBP: 00007f635dc10b39 R08: 0000000000000000 R09: 0000000000000000 [ 242.804787][ T8043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 242.804799][ T8043] R13: 0000000000000000 R14: 00007f635ddb6080 R15: 00007ffd2b18acf8 [ 242.804828][ T8043] [ 244.479023][ T8053] netlink: 660 bytes leftover after parsing attributes in process `syz.2.548'. [ 245.175829][ T30] audit: type=1400 audit(6442450993.596:7): apparmor="DENIED" operation="setprocattr" info="exec" error=-22 profile="unconfined" pid=8054 comm="syz.1.549" [ 245.415105][ T8066] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 245.625938][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 245.639139][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 245.651549][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 245.663893][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 245.676242][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 245.688610][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 245.700930][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 245.713349][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 245.725664][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 245.737981][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 250.574495][ C1] sched: DL replenish lagged too much [ 250.628783][ C1] net_ratelimit: 14866 callbacks suppressed [ 250.628803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 250.647235][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 250.659905][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 250.672408][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 250.684796][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 250.697230][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 250.709597][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 250.722040][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 250.734410][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 250.746807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 255.638647][ C1] net_ratelimit: 14612 callbacks suppressed [ 255.638668][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 255.657064][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 255.669492][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 255.681892][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 255.694270][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 255.706639][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 255.719168][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 255.731598][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 255.744028][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 255.756427][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 260.648854][ C1] net_ratelimit: 14151 callbacks suppressed [ 260.648874][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 260.667261][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 260.679675][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 260.692035][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 260.704396][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 260.716771][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 260.729110][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 260.741509][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 260.753886][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 260.766257][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 265.658775][ C1] net_ratelimit: 15103 callbacks suppressed [ 265.658795][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 265.677172][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 265.689542][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 265.701918][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 265.714295][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 265.726699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 265.739056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 265.751429][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 265.763784][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 265.776209][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 270.668766][ C1] net_ratelimit: 15080 callbacks suppressed [ 270.668786][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 270.687239][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 270.699602][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 270.712017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 270.724384][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 270.736731][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 270.749070][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 270.761421][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 270.773784][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 270.786192][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 271.535277][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 275.678722][ C1] net_ratelimit: 15168 callbacks suppressed [ 275.678742][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 275.697112][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 275.709458][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 275.721913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 275.734262][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 275.746600][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 275.758929][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 275.771279][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 275.783630][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 275.796037][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 280.688825][ C1] net_ratelimit: 15759 callbacks suppressed [ 280.688846][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 280.707189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 280.719630][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 280.732044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 280.744402][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 280.756763][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 280.769170][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 280.781540][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 280.793879][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 280.806252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 281.604003][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 285.698687][ C1] net_ratelimit: 15346 callbacks suppressed [ 285.698707][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 285.717022][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 285.729404][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 285.741764][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 285.754277][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 285.766629][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 285.778991][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 285.791432][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 285.803800][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 285.816193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 290.708801][ C1] net_ratelimit: 15479 callbacks suppressed [ 290.708820][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 290.727113][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 290.739462][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 290.751816][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 290.764147][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 290.776512][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 290.788834][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 290.801161][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 290.813515][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 290.825827][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 295.718604][ C1] net_ratelimit: 15515 callbacks suppressed [ 295.718624][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 295.736917][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 295.749311][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 295.761663][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 295.774016][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 295.786345][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 295.798751][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 295.811095][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 295.823454][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 295.835832][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 300.728716][ C1] net_ratelimit: 15538 callbacks suppressed [ 300.728736][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 300.747061][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 300.759468][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 300.771815][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 300.784192][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 300.796680][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 300.809042][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 300.821423][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 300.833757][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 300.846128][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 305.738732][ C1] net_ratelimit: 15521 callbacks suppressed [ 305.738752][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 305.757125][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 305.769480][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 305.781824][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 305.794180][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 305.806513][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 305.818921][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 305.831325][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 305.843704][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 305.856157][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 310.748666][ C1] net_ratelimit: 15477 callbacks suppressed [ 310.748686][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 310.767058][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 310.779470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 310.791816][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 310.804164][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 310.816528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 310.828885][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 310.841469][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 310.853887][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 310.866268][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 315.758687][ C1] net_ratelimit: 15516 callbacks suppressed [ 315.758706][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 315.777073][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 315.789483][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 315.801830][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 315.814164][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 315.826474][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 315.838812][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 315.851327][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 315.863787][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 315.876321][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 320.768758][ C1] net_ratelimit: 15374 callbacks suppressed [ 320.768778][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 320.787066][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 320.799438][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 320.811825][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 320.824202][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 320.836528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 320.848858][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 320.861188][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 320.873513][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 320.885976][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 325.778782][ C1] net_ratelimit: 15433 callbacks suppressed [ 325.778803][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 325.797124][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 325.809519][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 325.822011][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 325.834400][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 325.846770][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 325.859159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 325.871546][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 325.883954][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 325.896376][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 330.788687][ C1] net_ratelimit: 15373 callbacks suppressed [ 330.788709][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 330.807121][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 330.819466][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 330.831817][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 330.844169][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 330.856585][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 330.868964][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 330.881300][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 330.893613][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 330.905943][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 335.798702][ C1] net_ratelimit: 15331 callbacks suppressed [ 335.798722][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 335.817018][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 335.829470][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 335.841888][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 335.854236][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 335.866633][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 335.879052][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 335.891401][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 335.903779][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 335.916124][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 340.808749][ C1] net_ratelimit: 15539 callbacks suppressed [ 340.808768][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 340.827189][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 340.839556][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 340.851909][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 340.864257][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 340.876634][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 340.889011][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 340.901348][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 340.913699][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 340.926044][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 345.818587][ C1] net_ratelimit: 15597 callbacks suppressed [ 345.818608][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 345.836918][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 345.849269][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 345.861643][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 345.874025][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 345.886357][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 345.898727][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 345.911075][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 345.923484][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 345.935843][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 350.828563][ C1] net_ratelimit: 15664 callbacks suppressed [ 350.828583][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 350.846913][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 350.859275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 350.871665][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 350.884034][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 350.896395][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 350.908765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 350.921182][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 350.933539][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 350.945865][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 355.838665][ C1] net_ratelimit: 15776 callbacks suppressed [ 355.838687][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 355.856968][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.869272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 355.881591][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.893929][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 355.906219][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.918571][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 355.930883][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 355.943167][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 355.955631][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.848869][ C1] net_ratelimit: 11122 callbacks suppressed [ 360.848888][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 360.867134][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.880329][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 360.892635][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.905725][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 360.918074][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.931159][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 360.943479][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 360.956557][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 360.968862][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.858562][ C1] net_ratelimit: 8429 callbacks suppressed [ 365.858584][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.877565][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.889910][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.902307][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 365.914630][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.927913][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.940266][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 365.952707][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 365.964991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 365.978052][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.868810][ C1] net_ratelimit: 9780 callbacks suppressed [ 370.868832][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.887102][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 370.899400][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 370.912509][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.924855][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.937251][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 370.949581][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 370.962820][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.975316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 370.987765][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 375.878703][ C1] net_ratelimit: 9746 callbacks suppressed [ 375.878725][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.897093][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 375.909405][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 375.922514][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.934984][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.947371][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 375.959661][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 375.972710][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.985056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 375.997399][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 377.268510][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 377.275576][ C1] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P5844/1:b..l P8060/1:b..l P8058/1:b..l P5218/1:b..l [ 377.287245][ C1] rcu: (detected by 1, t=10502 jiffies, g=27025, q=480 ncpus=1) [ 377.295239][ C1] task:udevd state:R running task stack:24664 pid:5218 tgid:5218 ppid:1 task_flags:0x400140 flags:0x00004002 [ 377.309409][ C1] Call Trace: [ 377.312700][ C1] [ 377.315646][ C1] __schedule+0x116a/0x5de0 [ 377.320199][ C1] ? __pfx___schedule+0x10/0x10 [ 377.325089][ C1] ? mark_held_locks+0x49/0x80 [ 377.329881][ C1] preempt_schedule_irq+0x51/0x90 [ 377.334932][ C1] irqentry_exit+0x36/0x90 [ 377.339375][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 377.345401][ C1] RIP: 0010:lookup_page_ext+0x0/0x1d0 [ 377.350806][ C1] Code: c7 c0 58 e1 9a e8 50 6b f4 ff e9 95 fe ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <41> 55 41 54 55 53 48 89 fb e8 b2 89 8e ff 48 c7 c0 40 f4 f2 8d 48 [ 377.370438][ C1] RSP: 0018:ffffc900032a78f0 EFLAGS: 00000293 [ 377.376534][ C1] RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffffffff822cdd88 [ 377.384605][ C1] RDX: ffff88807d46bc00 RSI: ffffffff822cdd50 RDI: ffffea0000c5a800 [ 377.392586][ C1] RBP: ffffea0000c5a800 R08: 0000000000000001 R09: 0000000000000000 [ 377.400573][ C1] R10: 0000000000000001 R11: 0000000000000001 R12: ffffea0000c5a800 [ 377.408553][ C1] R13: 0000003f45793f1a R14: 0000000000000003 R15: 0000000000000000 [ 377.416538][ C1] ? page_ext_get+0x88/0x1a0 [ 377.421151][ C1] ? page_ext_get+0x50/0x1a0 [ 377.425772][ C1] page_ext_get+0x58/0x1a0 [ 377.430224][ C1] __reset_page_owner+0x2b/0x1a0 [ 377.435188][ C1] __free_frozen_pages+0x7fe/0x1180 [ 377.440408][ C1] ? mod_node_page_state+0x60/0x150 [ 377.445635][ C1] qlist_free_all+0x4d/0x120 [ 377.450265][ C1] kasan_quarantine_reduce+0x195/0x1e0 [ 377.455772][ C1] __kasan_slab_alloc+0x69/0x90 [ 377.460652][ C1] kmem_cache_alloc_noprof+0x1cb/0x3b0 [ 377.466136][ C1] ? mark_held_locks+0x49/0x80 [ 377.470926][ C1] ? alloc_empty_file+0x55/0x1e0 [ 377.475881][ C1] alloc_empty_file+0x55/0x1e0 [ 377.480657][ C1] path_openat+0xda/0x2cb0 [ 377.485097][ C1] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 377.491278][ C1] ? __pfx_path_openat+0x10/0x10 [ 377.496255][ C1] ? __lock_acquire+0xb8a/0x1c90 [ 377.501302][ C1] do_filp_open+0x20b/0x470 [ 377.505833][ C1] ? __pfx_do_filp_open+0x10/0x10 [ 377.510901][ C1] ? alloc_fd+0x471/0x7d0 [ 377.515262][ C1] do_sys_openat2+0x11b/0x1d0 [ 377.519963][ C1] ? __pfx_do_sys_openat2+0x10/0x10 [ 377.525195][ C1] __x64_sys_openat+0x174/0x210 [ 377.530062][ C1] ? __pfx___x64_sys_openat+0x10/0x10 [ 377.535485][ C1] do_syscall_64+0xcd/0x490 [ 377.540017][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 377.545928][ C1] RIP: 0033:0x7f1f56d15c3a [ 377.550356][ C1] RSP: 002b:00007fff81bce7c8 EFLAGS: 00000206 ORIG_RAX: 0000000000000101 [ 377.558788][ C1] RAX: ffffffffffffffda RBX: 000055cac1a3f8b0 RCX: 00007f1f56d15c3a [ 377.566773][ C1] RDX: 0000000000090800 RSI: 000055cac1a03650 RDI: 00000000ffffff9c [ 377.574757][ C1] RBP: 000055cac1a03650 R08: 0000000000000000 R09: 0000000000000001 [ 377.582754][ C1] R10: 0000000000000000 R11: 0000000000000206 R12: 000055cac1a137d0 [ 377.590740][ C1] R13: 00000000000000ff R14: 000055cab3ab4be0 R15: 00007fff81bcea50 [ 377.598741][ C1] [ 377.601778][ C1] task:syz.1.549 state:R running task stack:25880 pid:8058 tgid:8054 ppid:5848 task_flags:0x400140 flags:0x00004006 [ 377.615305][ C1] Call Trace: [ 377.618594][ C1] [ 377.621534][ C1] __schedule+0x116a/0x5de0 [ 377.626066][ C1] ? lock_acquire+0x179/0x350 [ 377.630776][ C1] ? __pfx___schedule+0x10/0x10 [ 377.635660][ C1] ? mark_held_locks+0x49/0x80 [ 377.640454][ C1] preempt_schedule_irq+0x51/0x90 [ 377.645504][ C1] irqentry_exit+0x36/0x90 [ 377.649941][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 377.655936][ C1] RIP: 0010:__orc_find+0x70/0xf0 [ 377.660896][ C1] Code: ec 72 4e 4c 89 e2 48 29 ea 48 89 d6 48 c1 ea 3f 48 c1 fe 02 48 01 f2 48 d1 fa 48 8d 5c 95 00 48 89 da 48 c1 ea 03 0f b6 34 0a <48> 89 da 83 e2 07 83 c2 03 40 38 f2 7c 05 40 84 f6 75 4b 48 63 13 [ 377.680515][ C1] RSP: 0018:ffffc90003d2f310 EFLAGS: 00000a02 [ 377.686594][ C1] RAX: ffffffff914bee48 RBX: ffffffff90c39f88 RCX: dffffc0000000000 [ 377.694575][ C1] RDX: 1ffffffff21873f1 RSI: 0000000000000000 RDI: ffffffff90c39f78 [ 377.702556][ C1] RBP: ffffffff90c39f78 R08: ffffffff914bee7e R09: 0000000000000000 [ 377.710622][ C1] R10: 0000000000000000 R11: 000000000001135f R12: ffffffff90c39f98 [ 377.718606][ C1] R13: ffffffff82135f7d R14: ffffffff90c39f78 R15: ffffffff90c39f78 [ 377.726587][ C1] ? __free_frozen_pages+0x7fd/0x1180 [ 377.732002][ C1] ? __free_frozen_pages+0x7fd/0x1180 [ 377.737404][ C1] unwind_next_frame+0x2ec/0x20a0 [ 377.742450][ C1] ? __free_frozen_pages+0x7fe/0x1180 [ 377.747845][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 377.754013][ C1] arch_stack_walk+0x94/0x100 [ 377.758709][ C1] ? __free_frozen_pages+0x7fe/0x1180 [ 377.764107][ C1] stack_trace_save+0x8e/0xc0 [ 377.768799][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 377.774190][ C1] ? __lock_acquire+0x622/0x1c90 [ 377.779157][ C1] save_stack+0x160/0x1f0 [ 377.783515][ C1] ? __pfx_save_stack+0x10/0x10 [ 377.788388][ C1] ? __free_frozen_pages+0x7fe/0x1180 [ 377.793873][ C1] ? page_ext_put+0x3e/0xd0 [ 377.798403][ C1] __reset_page_owner+0x84/0x1a0 [ 377.803367][ C1] __free_frozen_pages+0x7fe/0x1180 [ 377.808590][ C1] ? mod_node_page_state+0x60/0x150 [ 377.813814][ C1] __put_partials+0x16d/0x1c0 [ 377.818518][ C1] qlist_free_all+0x4d/0x120 [ 377.823131][ C1] kasan_quarantine_reduce+0x195/0x1e0 [ 377.828616][ C1] __kasan_slab_alloc+0x69/0x90 [ 377.833494][ C1] kmem_cache_alloc_noprof+0x1cb/0x3b0 [ 377.838979][ C1] ? __kernfs_new_node+0xd2/0x8e0 [ 377.844027][ C1] __kernfs_new_node+0xd2/0x8e0 [ 377.848917][ C1] ? ishtp_hbm_dispatch+0x12b9/0x26b0 [ 377.854316][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 377.859712][ C1] ? __pfx___kernfs_new_node+0x10/0x10 [ 377.865196][ C1] ? find_held_lock+0x2b/0x80 [ 377.869889][ C1] ? kernfs_root+0xee/0x2a0 [ 377.874420][ C1] kernfs_new_node+0x13c/0x1e0 [ 377.879207][ C1] ? device_get_ownership+0x7f/0xa0 [ 377.884419][ C1] kernfs_create_dir_ns+0x4c/0x1a0 [ 377.889548][ C1] sysfs_create_dir_ns+0x13a/0x2b0 [ 377.894682][ C1] ? __pfx_sysfs_create_dir_ns+0x10/0x10 [ 377.900341][ C1] ? kobject_set_name_vargs+0xfe/0x140 [ 377.905819][ C1] ? kobject_set_name+0xc7/0x100 [ 377.910768][ C1] ? __pfx_kobject_set_name+0x10/0x10 [ 377.916158][ C1] kobject_add_internal+0x2c4/0x9b0 [ 377.921374][ C1] kset_register+0x198/0x2b0 [ 377.925976][ C1] kset_create_and_add+0x123/0x190 [ 377.931105][ C1] netdev_register_kobject+0x1c8/0x3a0 [ 377.936590][ C1] register_netdevice+0x13dc/0x2270 [ 377.941804][ C1] ? __pfx_register_netdevice+0x10/0x10 [ 377.947449][ C1] ? alloc_netdev_mqs+0xe7e/0x1570 [ 377.952598][ C1] register_netdev+0x34/0x50 [ 377.957208][ C1] ip6gre_init_net+0x306/0x450 [ 377.961987][ C1] ? __pfx_ip6gre_init_net+0x10/0x10 [ 377.967282][ C1] ops_init+0x1e2/0x5f0 [ 377.971461][ C1] setup_net+0x1ff/0x510 [ 377.975723][ C1] ? lockdep_init_map_type+0x5c/0x280 [ 377.981118][ C1] ? __pfx_setup_net+0x10/0x10 [ 377.985922][ C1] ? debug_mutex_init+0x37/0x70 [ 377.990794][ C1] copy_net_ns+0x2a6/0x5f0 [ 377.995227][ C1] create_new_namespaces+0x3ea/0xa90 [ 378.000535][ C1] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 378.006194][ C1] ksys_unshare+0x45b/0xa40 [ 378.010723][ C1] ? __pfx_ksys_unshare+0x10/0x10 [ 378.015770][ C1] ? xfd_validate_state+0x61/0x180 [ 378.020905][ C1] __x64_sys_unshare+0x31/0x40 [ 378.025700][ C1] do_syscall_64+0xcd/0x490 [ 378.030243][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 378.036165][ C1] RIP: 0033:0x7f1d0258e929 [ 378.040589][ C1] RSP: 002b:00007f1d0340e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 378.049035][ C1] RAX: ffffffffffffffda RBX: 00007f1d027b6080 RCX: 00007f1d0258e929 [ 378.057042][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 378.065034][ C1] RBP: 00007f1d02610b39 R08: 0000000000000000 R09: 0000000000000000 [ 378.073017][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 378.081189][ C1] R13: 0000000000000000 R14: 00007f1d027b6080 R15: 00007ffea77d3918 [ 378.089204][ C1] [ 378.092241][ C1] task:syz.3.551 state:R running task stack:26280 pid:8060 tgid:8060 ppid:5852 task_flags:0x40044c flags:0x00004004 [ 378.105790][ C1] Call Trace: [ 378.109082][ C1] [ 378.112027][ C1] __schedule+0x116a/0x5de0 [ 378.116554][ C1] ? __lock_acquire+0x622/0x1c90 [ 378.121534][ C1] ? __pfx___schedule+0x10/0x10 [ 378.126405][ C1] ? lock_acquire+0x179/0x350 [ 378.131198][ C1] ? do_raw_spin_lock+0x12c/0x2b0 [ 378.136264][ C1] ? preempt_schedule_thunk+0x16/0x30 [ 378.141747][ C1] preempt_schedule_common+0x44/0xc0 [ 378.147057][ C1] preempt_schedule_thunk+0x16/0x30 [ 378.152280][ C1] _raw_spin_unlock+0x3e/0x50 [ 378.156979][ C1] unmap_page_range+0x106b/0x4350 [ 378.162044][ C1] ? __pfx_unmap_page_range+0x10/0x10 [ 378.167436][ C1] ? uprobe_munmap+0x20/0x5c0 [ 378.172129][ C1] unmap_single_vma.constprop.0+0x153/0x240 [ 378.178047][ C1] unmap_vmas+0x218/0x470 [ 378.182396][ C1] ? __pfx_unmap_vmas+0x10/0x10 [ 378.187281][ C1] exit_mmap+0x1b9/0xb90 [ 378.191547][ C1] ? __pfx_exit_mmap+0x10/0x10 [ 378.196357][ C1] __mmput+0x12a/0x410 [ 378.200448][ C1] mmput+0x62/0x70 [ 378.204195][ C1] do_exit+0x7c4/0x2bd0 [ 378.208377][ C1] ? __pfx_try_to_wake_up+0x10/0x10 [ 378.213598][ C1] ? __pfx_do_exit+0x10/0x10 [ 378.218217][ C1] ? do_raw_spin_lock+0x12c/0x2b0 [ 378.223266][ C1] ? find_held_lock+0x2b/0x80 [ 378.227982][ C1] do_group_exit+0xd3/0x2a0 [ 378.232544][ C1] get_signal+0x2673/0x26d0 [ 378.237115][ C1] ? __pfx_get_signal+0x10/0x10 [ 378.242026][ C1] ? do_futex+0x122/0x350 [ 378.246387][ C1] ? __pfx_do_futex+0x10/0x10 [ 378.251097][ C1] arch_do_signal_or_restart+0x8f/0x790 [ 378.256677][ C1] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 378.262888][ C1] exit_to_user_mode_loop+0x84/0x110 [ 378.268204][ C1] do_syscall_64+0x3f6/0x490 [ 378.272826][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 378.278733][ C1] RIP: 0033:0x7fb04978e929 [ 378.283161][ C1] RSP: 002b:00007ffe3926e028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 378.291764][ C1] RAX: 0000000000000001 RBX: 00007fb0499b6088 RCX: 00007fb04978e929 [ 378.299754][ C1] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fb0499b6088 [ 378.307737][ C1] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000d3926e31f [ 378.315718][ C1] R10: 00007fb0499b5fa0 R11: 0000000000000246 R12: 00007fb0499b608c [ 378.323727][ C1] R13: 00007fb0499b6080 R14: 0000000000001198 R15: 0000000000000004 [ 378.331736][ C1] [ 378.334771][ C1] task:syz-executor state:R running task stack:23688 pid:5844 tgid:5844 ppid:5840 task_flags:0x400140 flags:0x00004002 [ 378.348299][ C1] Call Trace: [ 378.351594][ C1] [ 378.354543][ C1] __schedule+0x116a/0x5de0 [ 378.359097][ C1] ? __pfx___schedule+0x10/0x10 [ 378.363987][ C1] ? mark_held_locks+0x49/0x80 [ 378.368779][ C1] preempt_schedule_irq+0x51/0x90 [ 378.373830][ C1] irqentry_exit+0x36/0x90 [ 378.378271][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 378.384277][ C1] RIP: 0010:lock_acquire+0x4e/0x350 [ 378.389501][ C1] Code: 48 8b 05 8d ec 37 12 48 89 44 24 30 31 c0 66 90 65 8b 05 a9 ec 37 12 83 f8 07 0f 87 bc 02 00 00 89 c0 48 0f a3 05 b2 8d 11 0f <0f> 82 74 02 00 00 8b 35 7a bf 11 0f 85 f6 0f 85 8d 00 00 00 48 8b [ 378.409128][ C1] RSP: 0018:ffffc90003f9f4d8 EFLAGS: 00000297 [ 378.415215][ C1] RAX: 0000000000000001 RBX: ffffffff8e5c4c80 RCX: 0000000000000002 [ 378.423197][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffff8e5c4c80 [ 378.431181][ C1] RBP: 0000000000000002 R08: 0000000000000000 R09: 0000000000000000 [ 378.439161][ C1] R10: 0000000000000000 R11: 000000000000a719 R12: 0000000000000000 [ 378.447147][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 378.455147][ C1] ? find_held_lock+0x2b/0x80 [ 378.460211][ C1] ? unwind_next_frame+0x3f4/0x20a0 [ 378.465461][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 378.471653][ C1] unwind_next_frame+0xd1/0x20a0 [ 378.476635][ C1] ? unwind_next_frame+0xbd/0x20a0 [ 378.481785][ C1] ? save_stack+0x160/0x1f0 [ 378.486328][ C1] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 378.492522][ C1] arch_stack_walk+0x94/0x100 [ 378.497240][ C1] ? save_stack+0x160/0x1f0 [ 378.501775][ C1] stack_trace_save+0x8e/0xc0 [ 378.506475][ C1] ? __pfx_stack_trace_save+0x10/0x10 [ 378.511875][ C1] ? __lock_acquire+0x622/0x1c90 [ 378.516843][ C1] save_stack+0x160/0x1f0 [ 378.521200][ C1] ? __pfx_save_stack+0x10/0x10 [ 378.526093][ C1] ? page_ext_put+0x3e/0xd0 [ 378.530633][ C1] __reset_page_owner+0x84/0x1a0 [ 378.535634][ C1] __free_frozen_pages+0x7fe/0x1180 [ 378.540886][ C1] qlist_free_all+0x4d/0x120 [ 378.545598][ C1] kasan_quarantine_reduce+0x195/0x1e0 [ 378.551093][ C1] __kasan_kmalloc+0x8a/0xb0 [ 378.555798][ C1] __kvmalloc_node_noprof+0x27b/0x620 [ 378.561199][ C1] ? trace_kmalloc+0x2b/0xd0 [ 378.565804][ C1] ? __kmalloc_noprof+0x211/0x510 [ 378.570860][ C1] ? xt_replace_table+0x1e3/0x950 [ 378.575934][ C1] ? xt_replace_table+0x1e3/0x950 [ 378.580997][ C1] xt_replace_table+0x1e3/0x950 [ 378.585893][ C1] __do_replace+0x1cf/0x9e0 [ 378.590435][ C1] ? __pfx___do_replace+0x10/0x10 [ 378.595582][ C1] ? xt_alloc_table_info+0x3e/0xa0 [ 378.600739][ C1] do_ipt_set_ctl+0x7f7/0xa60 [ 378.605448][ C1] ? nf_sockopt_find.constprop.0+0x222/0x290 [ 378.611468][ C1] ? __pfx_do_ipt_set_ctl+0x10/0x10 [ 378.616710][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 378.621948][ C1] ? sockopt_release_sock+0x52/0x60 [ 378.627181][ C1] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 378.633195][ C1] ? sockopt_release_sock+0x52/0x60 [ 378.638462][ C1] ? nf_sockopt_find.constprop.0+0x222/0x290 [ 378.644494][ C1] nf_setsockopt+0x8d/0xf0 [ 378.648941][ C1] ip_setsockopt+0xcb/0xf0 [ 378.653392][ C1] tcp_setsockopt+0xa7/0x100 [ 378.658012][ C1] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 378.663927][ C1] do_sock_setsockopt+0x221/0x470 [ 378.668969][ C1] ? __pfx_do_sock_setsockopt+0x10/0x10 [ 378.674539][ C1] ? handle_mm_fault+0x2ab/0xd10 [ 378.679502][ C1] ? find_held_lock+0x2b/0x80 [ 378.684203][ C1] __sys_setsockopt+0x120/0x1a0 [ 378.689083][ C1] __x64_sys_setsockopt+0xbd/0x160 [ 378.694218][ C1] ? do_syscall_64+0x91/0x490 [ 378.698943][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 378.704263][ C1] do_syscall_64+0xcd/0x490 [ 378.708825][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 378.714748][ C1] RIP: 0033:0x7f635db9081a [ 378.719209][ C1] RSP: 002b:00007ffd2b18a988 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 378.727645][ C1] RAX: ffffffffffffffda RBX: 00007ffd2b18aa10 RCX: 00007f635db9081a [ 378.735693][ C1] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 378.743687][ C1] RBP: 0000000000000003 R08: 00000000000002d8 R09: 00007ffd2b18adc7 [ 378.751677][ C1] R10: 00007f635dd82ea0 R11: 0000000000000202 R12: 00007f635dd82e40 [ 378.759661][ C1] R13: 00007ffd2b18a9ac R14: 0000000000000000 R15: 00007f635dd85000 [ 378.767750][ C1] [ 380.888609][ C1] net_ratelimit: 6356 callbacks suppressed [ 380.888630][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.907708][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.920113][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.932562][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 380.944894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 380.958081][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.970564][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 380.982973][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 380.995300][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 381.008646][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.898507][ C1] net_ratelimit: 8757 callbacks suppressed [ 385.898528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 385.916739][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.929906][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.942373][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.954792][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 385.967201][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 385.980412][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 385.992805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 386.005193][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:4a:80:fb:55:7b:91, vlan:0) [ 386.017521][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)