last executing test programs: 8.889956207s ago: executing program 1 (id=851): openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare$auto(0x40000080) mmap$auto(0x0, 0x40, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) socket$nl_generic(0x10, 0x3, 0x10) mprotect$auto(0x110c238000, 0x1, 0x3) select$auto(0xe, 0x0, 0x0, 0x0, 0x0) r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/oom_adj\x00', 0x48402, 0x0) read$auto(r0, 0x0, 0x9a28) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r1, &(0x7f0000000100)={0x0, 0x4dcf3887}, 0x7) r2 = socket(0x10, 0x1, 0x106) getsockopt$auto(r2, 0x11c, 0x3, 0xfffffffffffffffe, 0xfffffffffffffffd) openat$auto_snd_pcm_f_ops_pcm(0xffffffffffffff9c, &(0x7f0000004ec0)='/dev/snd/pcmC1D0p\x00', 0x2100, 0x0) (fail_nth: 5) process_madvise$auto_MADV_DOFORK(0xffffffffffffffff, 0x0, 0x0, 0xb, 0x9) 7.959816311s ago: executing program 0 (id=854): ioctl$auto_PROCMAP_QUERY(0xffffffffffffffff, 0xc0686611, &(0x7f0000000080)={0x68, 0x4, 0x9, 0x4, 0xc0000000009, 0x7fb4, 0x9, 0x6, 0x200000000000, 0x4, 0xfffffffe, 0x7ffffffd, 0x7ff, 0x7, 0x9}) read$auto(0xffffffffffffffff, &(0x7f0000000040)='/dev/rtc0\x00', 0x8) read$auto(0xffffffffffffffff, &(0x7f0000000100)='N\xd5\f\xb9GC*(,\x00\xc4bAL\xa3`\xb1\xf2\xe7\xc04b$\x99.\xb4\xcc\xc0%\xaa\xd3\xd5\xef\xa4\xd35u\xc0\xa6\r\xcaJ\x11\xaf\x93\xde\xc3|\x17\a\x00\x00\x00\x00\x00\x00\x00(=!\xf1\xe8\xe4\xcdm\xedKW\xe7\xfbL\\\a\x00\x00\x00\x00\x00\x00\x00B\x81s\xdd\x8199\xa5\x1e\xb0A\xa3\xcbj7\xe9\xc9L\xcc\xc6\xa4\xaf%\xba%:bXj\xd5[UG\x8a\x8ab\x9a\x18\xe8K\xafU\x8d\xb1\f~\xaa\xab(\x86(\xf9\b\xf7$%\xf2\x11\xa4\x9bj\xc1\xe4\x00\x1ft\xb6\xaf\xe2\xd4\x95\xa3\xe1\x1f\xf7uw\a\xd0\x83{_>/\xff\x00\x00\x00', 0x100000001) r0 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyr1\x00', 0x4182, 0x0) write$auto_console_fops_tty_io(r0, &(0x7f0000000000)="c80d1b5d399b3b", 0xfdef) openat$auto_raw_fops_raw_gadget(0xffffffffffffff9c, &(0x7f0000000040), 0x88000, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x3, 0xffffffffffffffff, 0xeb1, 0xffffffffffffffff, 0x7ffc) mmap$auto(0x0, 0xe7a, 0x34f, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) openat$auto_proc_environ_operations_base(0xffffffffffffff9c, &(0x7f0000002240)='/proc/thread-self/environ\x00', 0x8400, 0x0) r2 = openat$auto_tracing_cpumask_fops_trace(0xffffffffffffff9c, &(0x7f0000000580)='/sys/kernel/debug/tracing/tracing_cpumask\x00', 0x18b002, 0x0) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], 0x2c}, 0x1, 0x0, 0x0, 0x2000804}, 0x20000000) writev$auto(r2, &(0x7f00000000c0)={0x0, 0x9}, 0x5) 7.563762487s ago: executing program 0 (id=855): ioctl$auto(0xffffffffffffffff, 0x4b62, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_tipcv2(&(0x7f0000000340), r0) sendmsg$auto_TIPC_NL_NET_SET(r0, &(0x7f00000079c0)={0x0, 0x0, &(0x7f0000007980)={&(0x7f0000000040)={0x20, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@typed={0x8, 0x2, 0x0, 0x0, @uid=0xee00}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40010}, 0x2) msgctl$auto(0x9, 0xffff8a28, &(0x7f0000000240)={{0x80000001, 0xee01, 0x0, 0x4, 0x84, 0x7, 0x7}, 0x0, &(0x7f0000000200), 0x8, 0x8, 0x7, 0x236, 0xed, 0xe, 0x1ff, 0x40, @inferred, @raw=0x3}) sendmsg$auto_TIPC_NL_PEER_REMOVE(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10800004}, 0xc, &(0x7f0000001980)={&(0x7f00000002c0)={0x1bc, r1, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x8, 0x2, 0x0, 0x1, [@typed={0x4, 0x12f, 0x0, 0x0, @binary}]}, @TIPC_NLA_NET={0x199, 0x7, 0x0, 0x1, [@nested={0x1c, 0x1b, 0x0, 0x1, [@typed={0x8, 0xb1, 0x0, 0x0, @fd}, @generic, @nested={0x4, 0xff}, @typed={0x8, 0x6f, 0x0, 0x0, @ipv4=@remote}, @nested={0x4, 0x56}]}, @typed={0x8, 0xe1, 0x0, 0x0, @uid}, @generic="c5f24d98bbc24f27a0a02273a64b72db659efb34d57f57ea9002425d857923b6b2e05edb39b10c1741f7dc920774282bbca0d2d76cfe34d14d7baf9c3b507bea52769b5a1af9d6c9c582b8154d5495c0813198529e7c8900806b58de2e5240a2f2296d8f10750c70c20cdddec9269c22f984f4baabf5b0f13e719bb6424cfebe2e090c09b7b46e4528f5e8450c975f1711444796225c1f652b3e726b972a5b297ea40ff14b91163cc4772a03167f6c4889397e6f1dbabad8c4c3d05adfea59ad39fc82e1409e193f15ed6f37da0da1c6a4af393fd3709bcee3ca168e2b2b9bb83774bd21d4cedd8297429fbb7fadc8d7ff", @typed={0xc, 0xa5, 0x0, 0x0, @u64=0x8001}, @generic="0da7f54dc3571843bd00bccc1fc5cd04acd5deaf410ca28d8002dcce6a8aeb0105bd87a8af9144903b4d3341eb609358d413ff102b8b73e8f8b0a52e79d070f493e6947ff4737ca8af39dc3ff3c3d21929b494493d1970475f59369f0205eed8c5d25bc5db504f0229120e5b59d399871e0ab32e"]}, @TIPC_NLA_NET={0x4}]}, 0x1bc}}, 0x800) r2 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000001140), 0xffffffffffffffff) mmap$auto(0x0, 0x4020009, 0xdb, 0xeb1, 0x401, 0x8000) r3 = openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/tcp_fastopen_key\x00', 0x181081, 0x0) write$auto_proc_sys_file_operations_proc_sysctl(r3, &(0x7f00000001c0)="853632c0d3cfd0d691a83a66ece86459c4a843b9e987", 0x16) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) r4 = socket(0x2a, 0x2, 0x1) connect$auto(r4, &(0x7f0000000000)=@vsock={0x28, 0x0, 0x2711}, 0x53) close_range$auto(0x0, 0x5, 0x0) bpf$auto(0x0, &(0x7f00000001c0)=@bpf_attr_0={0x1, 0xb5, 0x10, 0x7, 0x4, 0xffffffffffffffff, 0xa, "2af051a940806ec05be276cfc83ce63f", 0x0, 0xffffffffffffffff, 0x5, 0x7, 0xe5, 0x3}, 0x10) bpf$auto(0x1a, &(0x7f0000000380)=@link_create={@map_fd, @target_ifindex=r5, 0x3, 0x81, @uprobe_multi={0x81, 0x1ff, 0x3d7e, 0x0, 0x1, 0x4}}, 0x92) r6 = socket(0x22, 0x4, 0x0) statmount$auto(&(0x7f0000000000)={0x1, @raw=0x7, 0x8, 0x2, 0x8}, &(0x7f0000000500)={0x5, 0x2076, 0x6, 0x995, 0x422, 0x2b, 0x9, 0x9, 0xfffffffffffffffa, 0x0, 0x64b8, 0x5, 0x8, 0x21a, 0x5, 0x8000000000000001, 0x8, 0x5, 0x7, 0x7, 0x3, 0x2, 0x7, 0x7, 0xc, 0x72bd, 0x7fffffffffffffff, 0xfffffff1, 0x2, 0x80000, 0x9, [0xffffffff, 0x4, 0x8001, 0x100, 0x8000000000000001, 0x8000000000000001, 0x9, 0x10, 0x97d5, 0x1, 0x8, 0x8, 0x38, 0xc00000, 0x100, 0x4, 0x4, 0x8, 0x9, 0x7, 0x7, 0x1, 0x9, 0x3, 0x0, 0x0, 0x2, 0x9, 0xf, 0x32, 0x8, 0xfff, 0x5, 0x3, 0x1, 0x6, 0x7, 0x363, 0x8, 0x28, 0x8, 0x6, 0x3ff]}, 0x4, 0x4) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$auto_nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$auto_NL802154_CMD_GET_WPAN_PHY(r7, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000140)={0x1c, r8, 0x1, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_PHY={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x51}, 0x0) fcntl$auto_F_SETOWN_EX(r6, 0xf, 0x2) socket(0xa, 0x801, 0x106) mmap$auto(0x0, 0xd, 0xdf, 0x9b76, 0x2, 0x8000) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000040)='/dev/tty44\x00', 0x88940, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$auto_NL80211_CMD_STOP_AP(r9, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)={0x1c, r2, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004010}, 0x4008000) 7.475960189s ago: executing program 1 (id=856): r0 = socket$nl_generic(0x10, 0x3, 0x10) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r1 = prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) ioctl$auto_BTRFS_IOC_ADD_DEV(r1, 0x5000940a, 0x0) mremap$auto(0x0, 0xffffffffffffffff, 0x3fda, 0x3, 0x7fffffffb000) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, 0x0, 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) mmap$auto(0x0, 0x400008, 0xb, 0x9b72, 0x2, 0x9) madvise$auto(0x0, 0x2003f2, 0x15) pread64$auto(0xffffffffffffffff, 0x0, 0x100000002, 0x100000001) io_setup$auto(0x1, 0x0) mmap$auto(0x0, 0x40000f, 0xe2, 0x97, 0x2, 0x4) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x1ac}, 0x1, 0x0, 0x0, 0x4004810}, 0x800) connect$auto(0x3, 0x0, 0x54) unshare$auto(0x40000080) ioprio_get$auto_IOPRIO_WHO_PROCESS(0x1, 0x0) ioctl$auto_XFS_IOC_COMMIT_RANGE(0xffffffffffffffff, 0x40585883, &(0x7f00000011c0)={0xffffffffffffffff, 0x0, 0xbcd80000000, 0x1, 0xffffffffffffc0a7, 0x7, [0x8, 0x7, 0x4, 0x1, 0x1000000000000001, 0x7fffffff]}) syz_genetlink_get_family_id$auto_smbd_genl(0x0, 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000004440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6gre0\x00'}) r4 = fcntl$auto_F_GETOWN(0xffffffffffffffff, 0x9, 0x7) kill$auto_SIGCONT(r4, 0x12) sendmsg$auto_OVS_DP_CMD_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100abbd7000fcdbdf250100000008000900", @ANYRESOCT=r2, @ANYBLOB="080005008000006f76735f121200000000000000000000080002004d771dd0070295a19e5b4c9783aaf6267293955bab8504b794c89f02e5e4c3cc8f9e167a94a9ed63c9a3ed8a9018e2d780a066bccd721eb772223a9806fd6ae4773f8d6adedd08eb13a6bc9203a73f645679e360e39de759ebd4dfd34d3c2c8c71e541056b76203e2bfcec335a84d2ee41b390337ab714eace3a4585dad75c34962a259a174aeabdf1a63d8e0011f1e4b73bf108166670bae5a88b52ccef8ff6ae8f4c9da75cd60b76d2a7052833d8ceda4d640e0f28b7b4e2a2f6a070d2", @ANYRES32=0x0, @ANYRESDEC=0x0], 0x40}}, 0x2000000) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) getrandom$auto(0x0, 0x6000002, 0x3) openat$auto_mon_fops_binary_mon_bin(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/usbmon0\x00', 0x0, 0x0) syz_clone3(&(0x7f0000000100)={0x2000000, 0x0, 0x0, 0x0, {0x21}, 0x0, 0x0, 0x0, 0x0}, 0x58) mknod$auto(0x0, 0x1081, 0x9) r5 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/mnt\x00') statmount$auto(&(0x7f0000000000)={0x18, @inferred=r5, 0x400000080000029, 0x100000001, 0x8}, 0x0, 0x207, 0x0) 7.050952587s ago: executing program 0 (id=857): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_debugfs_full_proxy_file_operations_internal(0xffffffffffffff9c, 0x0, 0x82, 0x0) rseq$auto(0x0, 0x8002, 0x0, 0x6) pwritev$auto(r0, 0x0, 0x3, 0x9, 0x5) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/LNXSYSTM:00/LNXSYBUS:00/PNP0A03:00/device:08/adr\x00', 0x0, 0x0) rseq$auto(&(0x7f0000000000)={0xc4, 0x3, 0x400, 0x2, 0x6, 0xb, "7e56249dcba250d5463a8d89bf0e0a7d4ad1b05407a3c4b115bc4a1eb21cf5963d46fbeab45a6759a3972a3c4e048d0623b671ded1dfbe2b7a46bd7d1fb7"}, 0x6, 0x2, 0x6) read$auto(r1, 0x0, 0x20) syz_genetlink_get_family_id$auto_ipvs(0x0, 0xffffffffffffffff) r2 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/net/afs/sysname\x00', 0x1b58c1, 0x0) write$auto_proc_reg_file_ops_compat_inode(r2, &(0x7f00000001c0)="3ca629a12f", 0x5) madvise$auto(0x0, 0xffffffffffff0001, 0x15) madvise$auto(0x0, 0x2000000080000001, 0x3) 6.557120497s ago: executing program 0 (id=860): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000000000008000) (async) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) (async) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async) set_mempolicy_home_node$auto(0x5ffffc, 0xffffffffffffffff, 0x0, 0x0) migrate_pages$auto(0x0, 0x8, 0x0, 0x0) (async) socket(0xa, 0x3, 0x3) (async) write$auto_tomoyo_operations_securityfs_if(0xffffffffffffffff, 0x0, 0x0) 5.268966791s ago: executing program 2 (id=865): ioctl$auto_PROCMAP_QUERY(0xffffffffffffffff, 0xc0686611, &(0x7f0000000080)={0x68, 0x4, 0x9, 0x4, 0xc0000000009, 0x7fb4, 0x9, 0x6, 0x200000000000, 0x4, 0xfffffffe, 0x7ffffffd, 0x7ff, 0x7, 0x9}) read$auto(0xffffffffffffffff, &(0x7f0000000040)='/dev/rtc0\x00', 0x8) read$auto(0xffffffffffffffff, &(0x7f0000000100)='N\xd5\f\xb9GC*(,\x00\xc4bAL\xa3`\xb1\xf2\xe7\xc04b$\x99.\xb4\xcc\xc0%\xaa\xd3\xd5\xef\xa4\xd35u\xc0\xa6\r\xcaJ\x11\xaf\x93\xde\xc3|\x17\a\x00\x00\x00\x00\x00\x00\x00(=!\xf1\xe8\xe4\xcdm\xedKW\xe7\xfbL\\\a\x00\x00\x00\x00\x00\x00\x00B\x81s\xdd\x8199\xa5\x1e\xb0A\xa3\xcbj7\xe9\xc9L\xcc\xc6\xa4\xaf%\xba%:bXj\xd5[UG\x8a\x8ab\x9a\x18\xe8K\xafU\x8d\xb1\f~\xaa\xab(\x86(\xf9\b\xf7$%\xf2\x11\xa4\x9bj\xc1\xe4\x00\x1ft\xb6\xaf\xe2\xd4\x95\xa3\xe1\x1f\xf7uw\a\xd0\x83{_>/\xff\x00\x00\x00', 0x100000001) r0 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyr1\x00', 0x4182, 0x0) write$auto_console_fops_tty_io(r0, &(0x7f0000000000)="c80d1b5d399b3b", 0xfdef) openat$auto_raw_fops_raw_gadget(0xffffffffffffff9c, &(0x7f0000000040), 0x88000, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x3, 0xffffffffffffffff, 0xeb1, 0xffffffffffffffff, 0x7ffc) mmap$auto(0x0, 0xe7a, 0x34f, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket(0x1d, 0x2, 0x7) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) r2 = openat$auto_proc_environ_operations_base(0xffffffffffffff9c, &(0x7f0000002240)='/proc/thread-self/environ\x00', 0x8400, 0x0) read$auto_proc_environ_operations_base(r2, 0x0, 0x0) bind$auto(r1, &(0x7f00000001c0)=@ax25={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, 0x6a) sendto$auto(r1, 0x0, 0x6fffff9, 0xfffffff8, &(0x7f0000000440)=@can={0x1d, 0x0, 0x3f}, 0x36) r3 = openat$auto_tracing_cpumask_fops_trace(0xffffffffffffff9c, &(0x7f0000000580)='/sys/kernel/debug/tracing/tracing_cpumask\x00', 0x18b002, 0x0) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], 0x2c}, 0x1, 0x0, 0x0, 0x2000804}, 0x20000000) writev$auto(r3, &(0x7f00000000c0)={0x0, 0x9}, 0x5) 4.805678512s ago: executing program 2 (id=867): mmap$auto(0x1, 0x2020009, 0x3, 0x11, 0xffffffffffffffff, 0xffffffffffffffff) mmap$auto(0x0, 0x20009, 0x4000000000db, 0xeb1, 0x400, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x4000894}, 0x800) r0 = open(0x0, 0x101800, 0xbf) r1 = socket(0x2, 0x3, 0x100) splice$auto(r0, 0x0, r1, 0x0, 0x7fffffffffffffff, 0x9) read$auto_bdi_debug_stats_fops_(r0, &(0x7f0000000300)=""/234, 0xea) io_uring_setup$auto(0x8, &(0x7f0000000140)={0x0, 0x3, 0x9, 0x10001, 0xc, 0xc05, 0xffffffffffffffff, [0x7fd, 0x1001, 0x8], {0x9, 0x1, 0x6, 0x0, 0x420, 0x1001, 0x3fdc, 0x3, 0x5}, {0x2, 0x140, 0x54ed, 0x0, 0x101, 0xff, 0x7, 0xa, 0x3}}) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x10, 0x3, 0x4) sendmsg$auto_ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000000180)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYBLOB="010027"], 0x2c}, 0x1, 0x0, 0x0, 0x4801}, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="72010000", @ANYBLOB="12"], 0x1ac}}, 0x40000) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) r2 = eventfd2$auto(0x31b, 0x5) r3 = syz_genetlink_get_family_id$auto_smc_pnetid(&(0x7f0000002340), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000100)='/proc/fs/cifs/rdma_readwrite_threshold\x00', 0x181840, 0x0) pread64$auto(r5, 0x0, 0x3ef, 0x9) r6 = openat$auto_tomoyo_operations_securityfs_if(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/security/tomoyo/domain_policy\x00', 0x40802, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYRESOCT=r6, @ANYRESOCT=r3, @ANYBLOB=']'], 0x1ac}}, 0x40000) sendmsg$auto_SMC_PNETID_ADD(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x24, r3, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x10, 0x1, '/dev/userio\x00'}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000001}, 0x40000) futex$auto(0x0, 0x5, 0x0, 0x0, 0x0, 0xa0000001) r7 = openat$auto_userio_fops_userio(0xffffffffffffff9c, &(0x7f0000000980), 0x102001, 0x0) pwrite64$auto(r7, 0x0, 0x2, 0x0) 4.559468054s ago: executing program 2 (id=868): openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS0\x00', 0x48140, 0x0) io_uring_setup$auto(0x1, 0x0) sendfile$auto(0x1, 0x3, 0x0, 0xa) r0 = socket(0x2, 0x1, 0x106) bind$auto(r0, &(0x7f0000000040)=@in={0x2, 0x3, @multicast2}, 0x6a) mmap$auto(0x0, 0x30009, 0x4000000000df, 0x4000eb1, 0x401, 0x8000) unshare$auto(0x40000080) r1 = openat$auto_debugfs_devm_entry_ops_file(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/cec/cec24/status\x00', 0x2, 0x0) read$auto(r1, &(0x7f00000000c0)='/dev/i2c-0\x00', 0xf) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x804, 0x0) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) pselect6$auto(0x8eb, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) ioctl$auto_SOUND_MIXER_READ_DEVMASK2(0xffffffffffffffff, 0x40044620, 0x0) mremap$auto(0x1ff000, 0xff, 0x843, 0x3, 0xfffff000) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/conf/geneve0/disable_policy\x00', 0x40180, 0x0) close_range$auto(0x2, 0x8, 0x0) semctl$auto(0xa, 0x2, 0x13, 0xde) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) setsockopt$auto(0x3, 0x1, 0x4c, 0x0, 0x9) recvmmsg$auto(0x3, 0x0, 0x80000401, 0x4000, 0x0) socket(0x11, 0xa, 0x9) 4.019395377s ago: executing program 0 (id=869): openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS0\x00', 0x48140, 0x0) io_uring_setup$auto(0x1, 0x0) sendfile$auto(0x1, 0x3, 0x0, 0xa) r0 = socket(0x2, 0x1, 0x106) bind$auto(r0, &(0x7f0000000040)=@in={0x2, 0x3, @multicast2}, 0x6a) mmap$auto(0x0, 0x30009, 0x4000000000df, 0x4000eb1, 0x401, 0x8000) unshare$auto(0x40000080) r1 = openat$auto_debugfs_devm_entry_ops_file(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/cec/cec24/status\x00', 0x2, 0x0) read$auto(r1, &(0x7f00000000c0)='/dev/i2c-0\x00', 0xf) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x2, 0x0) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) pselect6$auto(0x8eb, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) ioctl$auto_SOUND_MIXER_READ_DEVMASK2(0xffffffffffffffff, 0x40044620, 0x0) mremap$auto(0x1ff000, 0xff, 0x843, 0x3, 0xfffff000) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/conf/geneve0/disable_policy\x00', 0x40180, 0x0) close_range$auto(0x2, 0x8, 0x0) semctl$auto(0xa, 0x2, 0x13, 0xde) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) setsockopt$auto(0x3, 0x1, 0x4c, 0x0, 0x9) recvmmsg$auto(0x3, 0x0, 0x80000401, 0x4000, 0x0) socket(0x11, 0xa, 0x9) 3.635679983s ago: executing program 1 (id=871): unshare$auto(0x40000080) lstat$auto(0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000100), 0xffffffffffffffff) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/system/cpu/smt/control\x00', 0x2ab42, 0x0) write$auto_kernfs_file_fops_kernfs_internal(r2, &(0x7f0000000040)='1', 0x1) sendmsg$auto_NL80211_CMD_VENDOR(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f0000001700)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="050727bd7000fbdbdf25670080af8b63c38769f62494"], 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r3 = openat$auto_snapshot_fops_user(0xffffffffffffff9c, &(0x7f0000000000), 0x4000, 0x0) mmap$auto(0x0, 0x7fff, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r4 = socket(0x11, 0x80003, 0x300) socket(0x2d, 0x2, 0x0) setsockopt$auto(0x3, 0x11d, 0x1, 0xffffffffffffffff, 0x4000) sysfs$auto(0x2, 0x44, 0x0) openat$auto_rfcomm_dlc_debugfs_fops_(0xffffffffffffff9c, &(0x7f0000000040), 0x1c3000, 0x0) read$auto(0x3, 0x0, 0x1f40) setsockopt$auto(0x3, 0x1, 0x24, 0x0, 0x9) sendmsg$auto_NL80211_CMD_JOIN_MESH(r3, &(0x7f0000002840)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000002800)={&(0x7f00000017c0)={0x1034, r1, 0x300, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_MLO_TTLM_DLINK={0x1004, 0x148, "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"}, @NL80211_ATTR_WIPHY_ANTENNA_TX={0x8, 0x69, 0xffff7fff}, @NL80211_ATTR_KEY_SEQ={0x14, 0xa, "6eac4343972c5b97808d87d3cd0e9ef4"}]}, 0x1034}, 0x1, 0x0, 0x0, 0x801}, 0x0) sendto$auto(r4, 0x0, 0x13, 0xc, &(0x7f0000000000)=@tipc=@id={0x1e, 0x3, 0x3, {0x4e22, 0x2}}, 0x1e) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) r5 = openat$auto_vhost_net_fops_net(0xffffffffffffff9c, &(0x7f00000001c0), 0x44000, 0x0) ioctl$auto_VHOST_SET_LOG_FD(r5, 0x4004af07, &(0x7f0000000200)=r4) r6 = open(&(0x7f00000000c0)='./cgroup\x00', 0x0, 0xb5d1af1605322df2) setrlimit$auto(0xc, 0x0) ioctl$auto_VHOST_SET_FEATURES(r6, 0x4008af00, &(0x7f0000000080)=0x7) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x3, 0xdf, 0x9b72, 0x2, 0x8000) r7 = open(&(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x80400, 0xb5d1af1605322ddc) r8 = open_by_handle_at$auto(r7, &(0x7f0000001280)={0x8, 0x2, "0200000000000000"}, 0x6) sendfile$auto(r8, r7, 0x0, 0x2) syz_clone3(&(0x7f00000003c0)={0x383201180, 0x0, 0x0, 0x0, {0x39}, 0x0, 0x0, 0x0, 0x0, 0x0, {r6}}, 0x58) 3.211282155s ago: executing program 3 (id=872): mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x3fd, 0x8000) statmount$auto(0x0, &(0x7f0000000180)={0x8, 0x1, 0x9, 0x7, 0x1f, 0x940, 0x1ffde, 0x3, 0x6, 0x8000003, 0x8, 0x5, 0x0, 0x4, 0xb0, 0x7, 0x203, 0x3, 0x205, 0x7, 0x0, 0x3ffff, 0x0, 0x3, 0x7069, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, [0x0, 0x0, 0x0, 0x4, 0x5, 0x8000004, 0x0, 0x100000000000000, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x81, 0x80000, 0x0, 0x100000000, 0x0, 0x8000000000000001, 0x0, 0x1, 0xfffffffffffffffe, 0x0, 0xfff, 0x4, 0x0, 0x0, 0x2000000000000000]}, 0x203, 0x7d) sendmsg$auto_OVS_VPORT_CMD_DEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYBLOB="11002d"], 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[], 0x1ac}}, 0x40000) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$auto_tracing_cpumask_fops_trace(0xffffffffffffff9c, &(0x7f0000000580)='/sys/kernel/debug/tracing/tracing_cpumask\x00', 0x8002, 0x0) writev$auto(r0, &(0x7f0000000000)={&(0x7f0000000180)="df0eae125b9f", 0x9}, 0x1) close_range$auto(0x0, 0xfffffffffffff000, 0x2) r1 = open(&(0x7f0000000000)='./file0\x00', 0x246142, 0xe) close_range$auto(r1, r1, 0x9) r2 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/platform/dummy_udc.0/gadget.0/function\x00', 0x0, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r2, &(0x7f0000001080)=""/98, 0x62) write$auto_nsim_nexthop_bucket_activity_fops_fib(r1, &(0x7f0000000080)="56f7d583625d94c47bc12e525841ae4b2303e8373f1be0568da45798985aadcd40f21555c30cd858851f20c0d06317efd432f50b81a7bcb391ff19c4b0383ac1b5ea480674cb5177f7c58e71758e2f1fb4460f921b45079adb2b49e3f26054c7e577c3a80704d05a30f84c458c39c2a3ab37ab1a4d922496dfe3750adf2d0cc1c4474df77258a016127e5529ea0f3cbd3508e31c61e59fe2cc466ae5e248ad988b42a767d06f8a02b03c55e835352435db0eed877ae3aeaa0d40ebded2976039a70b452984451d42fea383709c58a15ffb67eaf530d8539b6a70b02ff038bd8821631609f162a965029230", 0xeb) r3 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop13\x00', 0x8202, 0x0) read$auto(0xc8, 0x0, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r3, 0x4c00, 0x0) 2.972943898s ago: executing program 3 (id=873): ioctl$auto_PROCMAP_QUERY(0xffffffffffffffff, 0xc0686611, &(0x7f0000000080)={0x68, 0x4, 0x9, 0x4, 0xc0000000009, 0x7fb4, 0x9, 0x6, 0x200000000000, 0x4, 0xfffffffe, 0x7ffffffd, 0x7ff, 0x7, 0x9}) read$auto(0xffffffffffffffff, &(0x7f0000000040)='/dev/rtc0\x00', 0x8) read$auto(0xffffffffffffffff, &(0x7f0000000100)='N\xd5\f\xb9GC*(,\x00\xc4bAL\xa3`\xb1\xf2\xe7\xc04b$\x99.\xb4\xcc\xc0%\xaa\xd3\xd5\xef\xa4\xd35u\xc0\xa6\r\xcaJ\x11\xaf\x93\xde\xc3|\x17\a\x00\x00\x00\x00\x00\x00\x00(=!\xf1\xe8\xe4\xcdm\xedKW\xe7\xfbL\\\a\x00\x00\x00\x00\x00\x00\x00B\x81s\xdd\x8199\xa5\x1e\xb0A\xa3\xcbj7\xe9\xc9L\xcc\xc6\xa4\xaf%\xba%:bXj\xd5[UG\x8a\x8ab\x9a\x18\xe8K\xafU\x8d\xb1\f~\xaa\xab(\x86(\xf9\b\xf7$%\xf2\x11\xa4\x9bj\xc1\xe4\x00\x1ft\xb6\xaf\xe2\xd4\x95\xa3\xe1\x1f\xf7uw\a\xd0\x83{_>/\xff\x00\x00\x00', 0x100000001) r0 = openat$auto_console_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyr1\x00', 0x4182, 0x0) write$auto_console_fops_tty_io(r0, &(0x7f0000000000)="c80d1b5d399b3b", 0xfdef) openat$auto_raw_fops_raw_gadget(0xffffffffffffff9c, &(0x7f0000000040), 0x88000, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$auto(0x0, 0x3, 0xffffffffffffffff, 0xeb1, 0xffffffffffffffff, 0x7ffc) mmap$auto(0x0, 0xe7a, 0x34f, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x1d, 0x2, 0x7) r1 = openat$auto_tracing_cpumask_fops_trace(0xffffffffffffff9c, &(0x7f0000000580)='/sys/kernel/debug/tracing/tracing_cpumask\x00', 0x18b002, 0x0) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[], 0x2c}, 0x1, 0x0, 0x0, 0x2000804}, 0x20000000) writev$auto(r1, &(0x7f00000000c0)={0x0, 0x9}, 0x5) 2.701043358s ago: executing program 2 (id=874): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) mbind$auto(0x0, 0x2091d1, 0x1, 0x0, 0x6, 0x2) sendmsg$auto_NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@NL80211_ATTR_DISABLE_HE={0x4}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x10}, @NL80211_ATTR_STA_SUPPORT_P2P_PS={0x5, 0xe4, 0x1}, @NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x5}, @NL80211_ATTR_SAE_PWE={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x4040044}, 0x8000) 2.243368243s ago: executing program 2 (id=875): r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/platform/snd_aloop.0/sound/card1/pcmC1D1p/power/control\x00', 0x50001, 0x0) read$auto_kernfs_file_fops_kernfs_internal(r0, &(0x7f0000001540)=""/104, 0x68) r1 = openat$auto_nvram_misc_fops_nvram(0xffffffffffffff9c, 0x0, 0x820181, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) io_uring_setup$auto(0x6, 0x0) r2 = socket(0x25, 0x3, 0x9) getsockopt$auto(r2, 0x84, 0x20, 0x0, 0x0) write$auto_nvram_misc_fops_nvram(r1, 0x0, 0x0) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0xffffffffffffffff, 0x0) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x9, 0x0) openat$auto_tracing_pipe_fops_trace(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/tracing/trace_pipe\x00', 0x20100, 0x0) sendfile$auto(0x1, 0x3, 0x0, 0x9013) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) fanotify_init$auto(0x5, 0x2000000000002) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) socket(0xa, 0x5, 0x0) sysfs$auto(0x2, 0x0, 0x0) fsconfig$auto(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount$auto(0x4, 0x0, 0xa7) socket(0x10, 0x2, 0x0) openat$auto_ftrace_set_event_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/tracing/set_event\x00', 0x620201, 0x0) mmap$auto(0x0, 0x4020009, 0x6, 0xeb1, 0x401, 0x8000) close_range$auto(0x0, 0xfffffffffffff000, 0x2) socket(0x10, 0x2, 0x14) socket(0x10, 0x2, 0x0) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000280)='/sys/devices/system/node/node1/hugepages/hugepages-1048576kB/demote\x00', 0x2, 0x0) socket(0x28, 0xa, 0x6) 1.741275s ago: executing program 3 (id=876): r0 = socket(0x2, 0x1, 0x106) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) setsockopt$auto(r0, 0x1, 0xf, &(0x7f0000000100)='\'\a\xeb\xb6\xc8\vF`\xf6\"8\x06hM\x06K\xa7x\x03\x00.y\xa8\xe5\xcb\x11L\x896[\x97\xb0\x8d\xee\xd1\xab\x88sM\xbc\xb9\"\x13 ;f\x8d9\x11\x98\x04u\xd7\xd9\xf7a\xe6\x00\xb3w\x1f\xa3T0\xee\xb7\x81:\xb6,\xd3\x19\x9c-\x1c\xcaG\xaa\xc2\xb3B-V9 b\xcb\x9d7\xbb\x1c\xcb4.\xa8\xab\xf9D\xb5\xf4\xca\xa1\xa6zk\x17Y\x0fi\xbb\xea$\x96\xce\xe7\x88\xdc\x85', 0xe966) mmap$auto(0x0, 0x4, 0x2, 0x9b75, r0, 0x40) close_range$auto(0x2, 0x8, 0x0) r1 = fanotify_init$auto(0x65, 0x2) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv6/neigh/veth0_to_bridge/base_reachable_time\x00', 0x202, 0x0) sendfile$auto(r1, r0, 0x0, 0x200) unshare$auto(0x2) open(&(0x7f00000000c0)='./file0\x00', 0x4205c2, 0x1f6) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0xc0002, 0x0) r2 = openat$auto_ns_file_operations_nsfs(0xffffffffffffff9c, &(0x7f0000005dc0)='/proc/thread-self/ns/cgroup\x00', 0x800, 0x0) open_by_handle_at$auto(r2, &(0x7f0000005e00)={0x10, 0xf1, "1500"/16}, 0x80000001) bind$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x6a) truncate$auto(0x0, 0xfffffffffffffffe) mmap$auto(0x0, 0x20009, 0xffffffffffffffff, 0xeb1, 0x401, 0x8000) sendmmsg$auto(0x3, 0x0, 0x3, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) r3 = socket(0x2, 0x3, 0xa) setsockopt$auto(r3, 0x0, 0x20, 0x0, 0x5) r4 = setfsuid$auto(0xee00) r5 = setfsuid$auto(0xee01) setresuid$auto(r4, r5, r4) setfsuid$auto(0x0) r6 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptyxf\x00', 0x800, 0x0) ioctl$auto(r6, 0x4b49, 0x9) r7 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual/mtd/mtd0/subpagesize\x00', 0x103862, 0x0) write$auto(r7, &(0x7f00000001c0)='1\x00\\X\xdb~\xdc\xcb\x12\xfa\b\x1c\xc7k', 0x81) write$auto(0xffffffffffffffff, &(0x7f0000000200)='0\x00\xa6\xcc\rI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3\n\x00\x00\x00\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94\xf8F\xbb\xa2\xbb>\xade\x18\xbd\xe2\x1c\x89OO]e[\xbb\xf9\xcd\xc0\xc9\x00\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\xef\xc0\x04z\xd0I>\x8f\x00\xe5\x1c*\xed`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\f};\xabt\xd1ak\xe5\x98\xea\xe3\xca\xf2\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xacA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xdeL/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(\x95\xdfH\xf4\v\xf3CRnz\xc2\x13<\xf0\v\x1f\x14\xf3\xd0\xf2\xd1L!\x81\xea\x83\xa0\r|%\xbf\x02trg\x9a\xe7)\a\xf4\xaa\x05\xc0\xa0r\xd2\x85\x8dH\xd0>\xca\xfc5\x01\x95O4\xca\x95\x1d\x83\xec\nD\x8e\xfb\xce\xd1w\x15:\xe9\x81/B#\xc6\xa1\xfa-\x1b\x8cr\x00\x00\x00\x00\xbb\xe4p!\xb1}\x92\x89\x8d\xcd\x1e\xc7N\xeeO\x8dO\xe9\xfc\x91\xa1\xa8=R+\a\xb7R\t\f+\x7f\xd5H\x90G=\x9a\r\xb10\x17n\x1b\xf8\v\x11\v\xbb\x00'/350, 0x3fd) 1.560958344s ago: executing program 1 (id=877): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) futex$auto(0x0, 0x5, 0x0, 0x0, 0x0, 0xa0000001) r0 = openat$auto_userio_fops_userio(0xffffffffffffff9c, &(0x7f0000000980), 0x102001, 0x0) pwrite64$auto(r0, 0x0, 0x2, 0x0) 1.43542813s ago: executing program 1 (id=878): r0 = openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sg0\x00', 0x28641, 0x0) mmap$auto(0x0, 0x420009, 0xe3, 0x200000000000eb1, 0x401, 0x8000) write$auto(r0, 0x0, 0x2a) mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) r1 = socket(0x2, 0x3, 0xa) (async, rerun: 64) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x9, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) (async, rerun: 64) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) (async, rerun: 32) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0x62, 0x0) (async, rerun: 32) mmap$auto(0x0, 0xe983, 0x6, 0xeb1, 0xffffffffffffffff, 0x8000) (async) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(r1, 0x0, 0x9a9, 0x70000fc) (async, rerun: 64) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0x6ab82, 0x0) (rerun: 64) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) (async) close_range$auto(0x2, 0x8, 0x0) (async) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) (async) r3 = prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x80802, 0x0) (async, rerun: 32) r4 = socket(0x2b, 0x1, 0x0) (rerun: 32) ioctl$auto_BTRFS_IOC_ENCODED_WRITE_32(r3, 0x40789440, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x11}}, 0x6a) sendmmsg$auto(r4, &(0x7f0000000140)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800009}, 0x3, 0x20000000) (async) sendfile$auto(0x1, 0x3, 0x0, 0x7ff) sendto$auto(0x3, 0x0, 0x2000f, 0x181, 0x0, 0x1c) (async) recvmmsg$auto(0x3, 0x0, 0xfffe, 0x6, 0x0) (async) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) (async) write$auto(0xffffffffffffffff, 0x0, 0x6) socket$nl_generic(0x10, 0x3, 0x10) 1.343303265s ago: executing program 3 (id=879): r0 = socket(0x23, 0x80805, 0x0) poll$auto(&(0x7f0000000000)={r0, 0x1, 0x8}, 0x5, 0x400) setsockopt$auto(r1, 0x113, 0x4, 0x0, 0x1) mremap$auto(0x110c230000, 0x0, 0x101, 0x3, 0x0) remap_file_pages$auto(0x5, 0x1000, 0x0, 0x8, 0x10007) 1.278498536s ago: executing program 2 (id=880): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mremap$auto(0x0, 0xffffffffffffffff, 0x3fda, 0x3, 0x7fffffffb000) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) write$auto(r0, &(0x7f0000001380)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xfc\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\r&\xec\xb8\xb1Z\\\xc9L\xb2\t\xddbH|\xffGP\x97)\xb9:nqn\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc$\xa0\xa5\xce\xca\xe1P\xf7\xe5_\xca\xd5\xd8\xa4g_\xb1\x88\x8cAJS\x11\x8b\xd1%a\xe5DPk\x8c\xf9\xfb\xe0+\xdb\x12\x10.F\x00\xc37\xc7\xbf\x80\xbeu\xe1V\xb2\xc5\xc9\x1a\xc7\xdc}!\x10\xb1\",1%\x0e\xeb\x15\x15me\xe1a\x03\x18{\xb03+\x93*vB\xc6\xf1\xc6\xff\xbbt\x04!\xb6\v\xde2\xc9\x89#\xbaR\xee\x13jF%\xf2\x15\x9a\x82&\x89o\xa9\xd9\xbfFY\x90\x8c\xa0\xe4\x9d\xa2\xcd\x9a\xb5TC\xc4\x9d\x9ePb]\xaa\xc7f\x06N\xc5\xfa{\x02Y\xae\xf4(\xaa\x06);{?\x1e\fu\x19b\xdf$,\x01\"\x94\x00\x00\x00\x00\x003\xcfZ\xaf~<\xba\xb7\xa03\x8c\n*krS\x19Q#\x8f\xfbW\xad\xe0\xb3o\xcb\xf7\xda\x87C\x99\x1a\xa8\xc1\xe3\xc6%\xac\x01@*\xa0\xc4\xedn-lT\xe6*?\'\x9dW=\xa7\x03\x06\x83 IT\xa3\x7ff\xb6\x95\xe5\xd2\n\xaf\x87`\xce%\xf6 &\xa7M5I\x9c\x17h\x8c\xa4\x98\x16\xe0\xd9?Y\x7f\xf6\x85_{\xfd9p$B9_\xd8\xf4\x0e\xd0\xfa\xe7\xb0\xb8\xa0\xd7\a\xff.\"\x81\b\xb0\xb4\x84\xac\xad\x1b\x93~_\xea\xfe7\x03\"\xd9\x1d.\xe5{bHX\x14\xa1\bO\x03[^\x85jP\x89\t\x06GI\xb7\x99\xb2zZf\xc8\xd4\x8d\x1c\x1e\x03\xb9\xa7Nt\xae\xfff\xf9\tx\xae\xa8\x05\xb14\xc6\x9b\x1f\xd3\x01#\xc6\nb\xd4\xb4\xc8?\xa7\xe2R\xc1\xcf\xd2\xbc\xae\xd1\xc2\x88\"\xf3\xf0\xc0uQy\xec\xfab\xd6\xcd\x16)\x19*E\vm\x8d\x1bG:\x80\'pJ', 0x4100000a3d7) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) madvise$auto(0x0, 0x2003f2, 0x15) madvise$auto(0x0, 0x200007, 0x19) pread64$auto(0xffffffffffffffff, 0x0, 0x100000002, 0x100000001) mmap$auto(0x0, 0x202000a, 0x5, 0xeb1, 0xfffffffffffffffa, 0x8000) mremap$auto(0x0, 0x4000007, 0x3fd7, 0x0, 0x20000020000000) io_setup$auto(0x1, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r1 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x14be02, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) socket(0x2, 0x3, 0xa) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x9, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) mmap$auto(0x0, 0xe983, 0x6, 0xeb1, 0xffffffffffffffff, 0x8000) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) preadv2$auto(r1, &(0x7f0000000280)={0x0, 0x80000000}, 0x6, 0x3, 0x4, 0x2e) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_mac80211_hwsim(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket(0x29, 0x5, 0x0) write$auto(r2, &(0x7f0000000080)='/de$-audio1\x00', 0x100000a3dc) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x6, 0x0) socket(0xa, 0x1, 0x84) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) 1.08597982s ago: executing program 3 (id=881): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x101e81, 0x0) ioctl$auto_TIOCMSET2(0xffffffffffffffff, 0x5418, &(0x7f0000000000)="4b339f60501429") mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/virtual/net/bpq4/mtu\x00', 0x0, 0x0) read$auto(0xffffffffffffffff, 0x0, 0x10001) r2 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r2, &(0x7f0000000240)={0x0, 0x7}, 0x2) r3 = open(0x0, 0x4242, 0xe1d2b27bdc14aabc) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/net/rpc/nfsd.fh/content\x00', 0x4200, 0x0) close_range$auto(0x2, 0x8, 0x0) close_range$auto(0x2, 0x8, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) close_range$auto(0x0, 0xfffffffffffff001, 0x2) socket(0x29, 0x5, 0x0) open(&(0x7f00000000c0)='./cgroup\x00', 0x80400, 0xb5d1af1605322dd2) open_by_handle_at$auto(r0, &(0x7f0000000200)={0x17, 0x2, "02b0fffe005704000400000016376efe0a6cc276b60028"}, 0x6) sendfile$auto(r4, r4, 0x0, 0x2) socket(0x2, 0x1, 0x0) close_range$auto(0x2, 0x8, 0x0) mmap$auto(0xfffffffffffffffe, 0x20008, 0x4000000000df, 0xeb1, r1, 0x4fd) io_uring_setup$auto(0x6, 0x0) socket(0xa, 0x1, 0x84) ioctl$auto_SG_GET_TRANSFORM(r3, 0x2205, &(0x7f0000000100)="265d3e8feb9e960169f5a8fc68400874fcfcbccec6e028fb9fd8c4b63c65c9bb89a159df5d08ecafee135bff477b26b509e593d2aee887435aa9c1551886ceb42734bf83be2526e475a186a0d883947cc58b5e431bdd690f8d4b5aef297b0be55d55e99245198758d58a16bccc9ad4e7b68ef23a328563f70dd5aa0d55ff7aab5a9e00966d127015cdc08806237982225a9f64f6593b4fc884e3bc31dde1d81ff412078fae209ebcb345f4dc2c3c1309ba7f8ac5bba0cdfb6aac29b58bb3656bd54cfb1f4a448ce56de6e11810e0580766acc9ff6140c2ddf3c3b98debc5e8845960bf115d2261") bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) r5 = syz_genetlink_get_family_id$auto_gtp(&(0x7f0000001040), 0xffffffffffffffff) sendmsg$auto_GTP_CMD_GETPDP(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000280)=ANY=[@ANYRES64=r0, @ANYRES32=r5, @ANYBLOB="01002cbd70ffffdbdf2502000000080002000800"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x24040814) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) 316.666059ms ago: executing program 3 (id=882): mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x8000) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES16], 0x1ac}, 0x1, 0x0, 0x0, 0x8000}, 0x40001) r0 = socket(0x2a, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) bind$auto(0x3, 0x0, 0x6a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'vxcan1\x00', 0x0}) sendmsg$auto_ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4040}, 0xc, &(0x7f0000000740)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="3c020000", @ANYRES16=0x0, @ANYBLOB="020028bd7000fbdbdf2502000000540001800800030004000000140002006261746164765f736c6176655f300000140002006272696467655f736c6176655f31000008000100", @ANYRES32=0x0, @ANYBLOB="0800030001000000080003007245ffff080003000b0000001c00018008000100", @ANYRES32=0x0, @ANYBLOB="0808000100", @ANYRES32=0x0, @ANYBLOB="2000018008000300040000001400020069705f767469300000000000000000003000018008000100", @ANYRES32=0x0, @ANYRESHEX, @ANYRES32, @ANYBLOB="08000300bc0d000044000180140002006e65747063693000000000000000000008000100", @ANYBLOB="080001", @ANYRES32=r1, @ANYBLOB="1400020076657468305f746f5f6261746164760008000300000200001400018008000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32=r1, @ANYBLOB="84000180080003000800000014000200766c616e310000000000000000000000140002007663616e3000000000000000000000000800030040000000140002006772653000000000000000000000000014000200626f6e643000000000000000000000000800030005000000080003000500000008000300080000000800030005000000140001800800", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="54000180140002006772653000000000000000000000000008000300ff070000080003000700000014000200626f6e645f736c6176655f310000000008000300ffffffff08000100", @ANYRES32=r1, @ANYBLOB, @ANYRES32=r2, @ANYBLOB="24000180", @ANYRES32, @ANYBLOB='\b', @ANYRES32, @ANYBLOB], 0x23c}, 0x1, 0x0, 0x0, 0x4c011}, 0x90) sendmsg$auto_NFSD_CMD_THREADS_SET(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x400c000) r3 = socket(0x29, 0x2, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYBLOB="1200", @ANYBLOB="5de1"], 0x1ac}}, 0x40000) recvmmsg$auto(r4, &(0x7f0000000040)={{0x0, 0x5, 0x0, 0x5, 0x0, 0x200002, 0x13}, 0x6}, 0xfffffff9, 0x10, 0x0) ioctl$auto(r3, 0x89f1, 0x24) 208.309078ms ago: executing program 0 (id=883): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) bpf$auto(0x9, &(0x7f0000000000)=@link_update={0xffffffffffffffff, @new_prog_fd=0x4, 0x8}, 0xa3) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x6, 0x0) socket(0xa, 0x1, 0x84) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x4, &(0x7f00000002c0)={0x0, 0xffeb}, 0x1, 0x0, 0x5, 0x7}, 0x8}, 0xffffffff, 0xb00) write$auto(0x3, 0x0, 0xffd8) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, &(0x7f00000002c0)={0x0, 0xc4}, 0x1, 0x0, 0x0, 0x7}, 0xa}, 0x3, 0x0) close_range$auto(0x2, 0x8, 0x0) open(0x0, 0x22040, 0x75) socket(0x840000000002, 0x3, 0xff) setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) connect$auto(0x3, &(0x7f00000018c0)=@l2tp={0x2, 0x0, @multicast1}, 0x55) 0s ago: executing program 1 (id=884): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) socket(0x10, 0x2, 0x0) openat$auto_ftrace_set_event_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/tracing/set_event\x00', 0x20201, 0x0) io_uring_setup$auto(0x59, 0x0) getpid() unshare$auto(0x40000080) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) listen$auto(0x3, 0x81) mmap$auto(0x0, 0x2020009, 0x3, 0xebd, 0xfffffffffffffffa, 0x8000) keyctl$auto(0x1f, 0x1, 0x6, 0x3, 0x3ff) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0x2003f2, 0x15) madvise$auto(0x0, 0x200007, 0x19) getcpu$auto(0xfffffffffffffffc, 0xffffffffffffffff, 0xfffffffffffffffd) fanotify_init$auto(0x65, 0x2) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) unshare$auto(0x20000080) syz_clone3(&(0x7f0000000380)={0x2c022000, 0x0, 0x0, 0x0, {0x1f}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000001c0), 0x101000, 0x0) r0 = openat$auto_zero_fops_mem(0xffffffffffffff9c, &(0x7f0000000340), 0x80200, 0x0) pread64$auto(r0, &(0x7f0000000240)='\x03W\x96l\x15\x00\x00\x00\x00\xf4\x00'/21, 0x100000002, 0x100000001) openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x101c82, 0x0) prctl$auto(0x42, 0x0, 0x0, 0x1, 0x0) kernel console output (not intermixed with test programs): 1 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 190.906034][ T8130] RSP: 002b:00007fbded89b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 190.906049][ T8130] RAX: ffffffffffffffda RBX: 00007fbdecc15fa0 RCX: 00007fbdec99c819 [ 190.906064][ T8130] RDX: 0000000000000007 RSI: 0000200000000140 RDI: 0000000000000003 [ 190.906080][ T8130] RBP: 00007fbdeca32c91 R08: 0000000000000000 R09: 0000000000000000 [ 190.906097][ T8130] R10: 0000000020020004 R11: 0000000000000246 R12: 0000000000000000 [ 190.906109][ T8130] R13: 00007fbdecc16038 R14: 00007fbdecc15fa0 R15: 00007ffd5465e5c8 [ 190.906128][ T8130] [ 191.617010][ T8137] ubi0: attaching mtd0 [ 191.661685][ T8137] ubi0: scanning is finished [ 191.669444][ T8137] ubi0: empty MTD device detected [ 191.931686][ T8156] netlink: 28 bytes leftover after parsing attributes in process `syz.1.478'. [ 192.177772][ T8137] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 192.206066][ T8137] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 192.223716][ T8137] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 192.232521][ T8137] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 192.252660][ T8137] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 192.265844][ T8137] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 192.286270][ T8137] ubi0: max/mean erase counter: 0/0, WL threshold: 4096, image sequence number: 2048005290 [ 192.325077][ T8137] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 192.339560][ T8163] netlink: 354 bytes leftover after parsing attributes in process `syz.1.479'. [ 192.364803][ T8160] ubi0: background thread "ubi_bgt0d" started, PID 8160 [ 192.390367][ T8142] ubi0: detaching mtd0 [ 192.447600][ T8142] ubi0: mtd0 is detached [ 194.248501][ T1313] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.254862][ T1313] ieee802154 phy1 wpan1: encryption failed: -22 [ 194.891690][ T8202] ubi0: attaching mtd0 [ 194.929841][ T8215] netlink: 354 bytes leftover after parsing attributes in process `syz.1.489'. [ 194.994017][ T8202] ubi0: scanning is finished [ 195.603580][ T8202] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 195.656670][ T8202] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 195.727178][ T8202] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 195.789081][ T8202] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 195.883782][ T8202] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 195.903856][ T30] audit: type=1800 audit(1776948623.197:8): pid=8237 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.492" name="members" dev="configfs" ino=23027 res=0 errno=0 [ 195.926527][ T8202] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 195.952757][ T8202] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 2048005290 [ 196.002495][ T8202] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 196.016055][ T8232] ubi0: background thread "ubi_bgt0d" started, PID 8232 [ 196.017495][ T8216] ubi0: detaching mtd0 [ 196.313805][ T8216] ubi0: mtd0 is detached [ 198.104140][ T8281] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 198.129000][ T8281] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 198.146625][ T8281] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 198.165936][ T8281] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 198.891264][ T8300] netlink: 36 bytes leftover after parsing attributes in process `syz.0.500'. [ 199.133914][ T8302] can: request_module (can-proto-4) failed. [ 199.188151][ T30] audit: type=1107 audit(1776948626.477:9): pid=8305 uid=0 auid=4294967295 ses=4294967295 subj=unconfined msg='â3Ú' [ 199.400143][ T8311] netlink: 8 bytes leftover after parsing attributes in process `syz.2.503'. [ 199.516283][ T5843] Bluetooth: hci2: command 0x0c1a tx timeout [ 199.815147][ T8318] netlink: 354 bytes leftover after parsing attributes in process `syz.1.505'. [ 200.071243][ T8321] netlink: 20 bytes leftover after parsing attributes in process `syz.0.506'. [ 200.157380][ T5843] Bluetooth: hci1: command 0x0c1a tx timeout [ 200.157398][ T5853] Bluetooth: hci3: command 0x0c1a tx timeout [ 200.236355][ T5843] Bluetooth: hci0: command 0x0c1a tx timeout [ 200.503866][ T5843] Bluetooth: hci2: unexpected subevent 0x01 length: 123 > 18 [ 200.648086][ T8329] FAULT_INJECTION: forcing a failure. [ 200.648086][ T8329] name failslab, interval 1, probability 0, space 0, times 0 [ 200.668835][ T8329] CPU: 0 UID: 0 PID: 8329 Comm: syz.1.508 Tainted: G L syzkaller #0 PREEMPT(full) [ 200.668876][ T8329] Tainted: [L]=SOFTLOCKUP [ 200.668886][ T8329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 200.668903][ T8329] Call Trace: [ 200.668912][ T8329] [ 200.668923][ T8329] dump_stack_lvl+0x100/0x190 [ 200.668952][ T8329] should_fail_ex.cold+0x5/0xa [ 200.668971][ T8329] ? kobject_get_path+0xcf/0x2c0 [ 200.668986][ T8329] should_failslab+0xc2/0x120 [ 200.669004][ T8329] __kmalloc_noprof+0xe0/0x850 [ 200.669031][ T8329] kobject_get_path+0xcf/0x2c0 [ 200.669050][ T8329] kobject_uevent_env+0x287/0x18b0 [ 200.669070][ T8329] ? bus_to_subsys+0x114/0x150 [ 200.669092][ T8329] device_add+0x116e/0x1950 [ 200.669109][ T8329] ? __pfx_device_add+0x10/0x10 [ 200.669133][ T8329] nfc_register_device+0x41/0x3e0 [ 200.669158][ T8329] nci_register_device+0x7f1/0xb80 [ 200.669177][ T8329] ? __pfx_nci_register_device+0x10/0x10 [ 200.669197][ T8329] ? lockdep_init_map_type+0x5c/0x250 [ 200.669216][ T8329] virtual_ncidev_open+0x141/0x220 [ 200.669236][ T8329] ? __pfx_virtual_ncidev_open+0x10/0x10 [ 200.669254][ T8329] misc_open+0x26d/0x450 [ 200.669271][ T8329] ? __pfx_misc_open+0x10/0x10 [ 200.669286][ T8329] chrdev_open+0x234/0x6a0 [ 200.669303][ T8329] ? __pfx_apparmor_file_open+0x10/0x10 [ 200.669324][ T8329] ? __pfx_chrdev_open+0x10/0x10 [ 200.669342][ T8329] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 200.669365][ T8329] do_dentry_open+0x6d8/0x1660 [ 200.669382][ T8329] ? __pfx_chrdev_open+0x10/0x10 [ 200.669405][ T8329] vfs_open+0x82/0x3f0 [ 200.669430][ T8329] path_openat+0x208c/0x31a0 [ 200.669454][ T8329] ? __pfx_path_openat+0x10/0x10 [ 200.669479][ T8329] do_file_open+0x20e/0x430 [ 200.669498][ T8329] ? __pfx_do_file_open+0x10/0x10 [ 200.669529][ T8329] ? alloc_fd+0x476/0x790 [ 200.669548][ T8329] ? do_getname+0x191/0x390 [ 200.669570][ T8329] do_sys_openat2+0x10d/0x1e0 [ 200.669590][ T8329] ? __pfx_do_sys_openat2+0x10/0x10 [ 200.669613][ T8329] ? __fget_files+0x21f/0x3d0 [ 200.669633][ T8329] __x64_sys_openat+0x12d/0x210 [ 200.669655][ T8329] ? __pfx___x64_sys_openat+0x10/0x10 [ 200.669707][ T8329] ? rcu_is_watching+0x12/0xc0 [ 200.669732][ T8329] do_syscall_64+0x10b/0xf80 [ 200.669754][ T8329] ? clear_bhb_loop+0x40/0x90 [ 200.669772][ T8329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 200.669787][ T8329] RIP: 0033:0x7fbdec99c819 [ 200.669800][ T8329] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 200.669814][ T8329] RSP: 002b:00007fbded859028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 200.669829][ T8329] RAX: ffffffffffffffda RBX: 00007fbdecc16180 RCX: 00007fbdec99c819 [ 200.669839][ T8329] RDX: 0000000000000002 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 200.669848][ T8329] RBP: 00007fbdeca32c91 R08: 0000000000000000 R09: 0000000000000000 [ 200.669857][ T8329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 200.669866][ T8329] R13: 00007fbdecc16218 R14: 00007fbdecc16180 R15: 00007ffd5465e5c8 [ 200.669886][ T8329] [ 200.990965][ T8329] futex_wake_op: syz.1.508 tries to shift op by -2048; fix this program [ 201.027076][ T8314] kexec: Could not allocate control_code_buffer [ 202.458175][ T8367] FAULT_INJECTION: forcing a failure. [ 202.458175][ T8367] name failslab, interval 1, probability 0, space 0, times 0 [ 202.458203][ T8367] CPU: 0 UID: 0 PID: 8367 Comm: syz.0.514 Tainted: G L syzkaller #0 PREEMPT(full) [ 202.458225][ T8367] Tainted: [L]=SOFTLOCKUP [ 202.458230][ T8367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 202.458239][ T8367] Call Trace: [ 202.458244][ T8367] [ 202.458250][ T8367] dump_stack_lvl+0x100/0x190 [ 202.458273][ T8367] should_fail_ex.cold+0x5/0xa [ 202.458292][ T8367] ? lsm_blob_alloc+0x68/0x90 [ 202.458309][ T8367] should_failslab+0xc2/0x120 [ 202.458326][ T8367] __kmalloc_noprof+0xe0/0x850 [ 202.458349][ T8367] ? trace_kmem_cache_alloc+0xd5/0x100 [ 202.458369][ T8367] lsm_blob_alloc+0x68/0x90 [ 202.458391][ T8367] security_prepare_creds+0x2d/0x290 [ 202.458424][ T8367] prepare_creds+0x5d6/0x950 [ 202.458444][ T8367] __sys_setresuid+0x458/0x1280 [ 202.458466][ T8367] do_syscall_64+0x10b/0xf80 [ 202.458488][ T8367] ? clear_bhb_loop+0x40/0x90 [ 202.458512][ T8367] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 202.458527][ T8367] RIP: 0033:0x7f1e5779c819 [ 202.458541][ T8367] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 202.458555][ T8367] RSP: 002b:00007f1e559ee028 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 202.458569][ T8367] RAX: ffffffffffffffda RBX: 00007f1e57a15fa0 RCX: 00007f1e5779c819 [ 202.458579][ T8367] RDX: 0000000000000200 RSI: 0000000000000000 RDI: 0000000000000000 [ 202.458588][ T8367] RBP: 00007f1e57832c91 R08: 0000000000000000 R09: 0000000000000000 [ 202.458596][ T8367] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 202.458604][ T8367] R13: 00007f1e57a16038 R14: 00007f1e57a15fa0 R15: 00007ffda60ee128 [ 202.458623][ T8367] [ 202.786702][ T8374] FAULT_INJECTION: forcing a failure. [ 202.786702][ T8374] name failslab, interval 1, probability 0, space 0, times 0 [ 202.786732][ T8374] CPU: 1 UID: 0 PID: 8374 Comm: syz.3.515 Tainted: G L syzkaller #0 PREEMPT(full) [ 202.786753][ T8374] Tainted: [L]=SOFTLOCKUP [ 202.786758][ T8374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 202.786767][ T8374] Call Trace: [ 202.786772][ T8374] [ 202.786778][ T8374] dump_stack_lvl+0x100/0x190 [ 202.786796][ T8374] should_fail_ex.cold+0x5/0xa [ 202.786815][ T8374] ? lsm_blob_alloc+0x68/0x90 [ 202.786831][ T8374] should_failslab+0xc2/0x120 [ 202.786848][ T8374] __kmalloc_noprof+0xe0/0x850 [ 202.786869][ T8374] ? trace_kmem_cache_alloc+0xd5/0x100 [ 202.786889][ T8374] lsm_blob_alloc+0x68/0x90 [ 202.786906][ T8374] security_prepare_creds+0x2d/0x290 [ 202.786923][ T8374] prepare_creds+0x5d6/0x950 [ 202.786940][ T8374] __sys_setresuid+0x458/0x1280 [ 202.786960][ T8374] do_syscall_64+0x10b/0xf80 [ 202.786981][ T8374] ? clear_bhb_loop+0x40/0x90 [ 202.786998][ T8374] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 202.787013][ T8374] RIP: 0033:0x7fc6c139c819 [ 202.787026][ T8374] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 202.787040][ T8374] RSP: 002b:00007fc6c219c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 202.787054][ T8374] RAX: ffffffffffffffda RBX: 00007fc6c1615fa0 RCX: 00007fc6c139c819 [ 202.787064][ T8374] RDX: 0000000000000200 RSI: 0000000000000000 RDI: 0000000000000000 [ 202.787072][ T8374] RBP: 00007fc6c1432c91 R08: 0000000000000000 R09: 0000000000000000 [ 202.787081][ T8374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 202.787089][ T8374] R13: 00007fc6c1616038 R14: 00007fc6c1615fa0 R15: 00007ffd94b34458 [ 202.787108][ T8374] [ 203.555639][ T8395] FAULT_INJECTION: forcing a failure. [ 203.555639][ T8395] name failslab, interval 1, probability 0, space 0, times 0 [ 203.555669][ T8395] CPU: 1 UID: 0 PID: 8395 Comm: syz.3.521 Tainted: G L syzkaller #0 PREEMPT(full) [ 203.555690][ T8395] Tainted: [L]=SOFTLOCKUP [ 203.555696][ T8395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 203.555705][ T8395] Call Trace: [ 203.555710][ T8395] [ 203.555716][ T8395] dump_stack_lvl+0x100/0x190 [ 203.555736][ T8395] should_fail_ex.cold+0x5/0xa [ 203.555756][ T8395] should_failslab+0xc2/0x120 [ 203.555773][ T8395] __kmalloc_cache_noprof+0x7a/0x6f0 [ 203.555793][ T8395] ? snd_card_file_add+0x52/0x330 [ 203.555815][ T8395] ? __pfx_snd_pcm_playback_open+0x10/0x10 [ 203.555830][ T8395] snd_card_file_add+0x52/0x330 [ 203.555851][ T8395] ? __pfx_snd_pcm_playback_open+0x10/0x10 [ 203.555865][ T8395] snd_pcm_open+0xf1/0x710 [ 203.555881][ T8395] ? __pfx_snd_pcm_open+0x10/0x10 [ 203.555903][ T8395] ? __pfx_snd_pcm_playback_open+0x10/0x10 [ 203.555917][ T8395] snd_pcm_playback_open+0x86/0xe0 [ 203.555932][ T8395] snd_open+0x201/0x450 [ 203.555951][ T8395] ? __pfx_snd_open+0x10/0x10 [ 203.555968][ T8395] chrdev_open+0x234/0x6a0 [ 203.555986][ T8395] ? __pfx_apparmor_file_open+0x10/0x10 [ 203.556006][ T8395] ? __pfx_chrdev_open+0x10/0x10 [ 203.556024][ T8395] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 203.556047][ T8395] do_dentry_open+0x6d8/0x1660 [ 203.556063][ T8395] ? __pfx_chrdev_open+0x10/0x10 [ 203.556085][ T8395] vfs_open+0x82/0x3f0 [ 203.556107][ T8395] path_openat+0x208c/0x31a0 [ 203.556131][ T8395] ? __pfx_path_openat+0x10/0x10 [ 203.556155][ T8395] do_file_open+0x20e/0x430 [ 203.556174][ T8395] ? __pfx_do_file_open+0x10/0x10 [ 203.556241][ T8395] ? alloc_fd+0x476/0x790 [ 203.556261][ T8395] ? do_getname+0x191/0x390 [ 203.556283][ T8395] do_sys_openat2+0x10d/0x1e0 [ 203.556304][ T8395] ? __pfx_do_sys_openat2+0x10/0x10 [ 203.556326][ T8395] ? __fget_files+0x21f/0x3d0 [ 203.556346][ T8395] __x64_sys_openat+0x12d/0x210 [ 203.556367][ T8395] ? __pfx___x64_sys_openat+0x10/0x10 [ 203.556388][ T8395] ? __hrtimer_rearm_deferred+0x24d/0x740 [ 203.556409][ T8395] ? rcu_is_watching+0x12/0xc0 [ 203.556431][ T8395] do_syscall_64+0x10b/0xf80 [ 203.556452][ T8395] ? clear_bhb_loop+0x40/0x90 [ 203.556471][ T8395] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 203.556486][ T8395] RIP: 0033:0x7fc6c139c819 [ 203.556500][ T8395] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 203.556514][ T8395] RSP: 002b:00007fc6bf5f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 203.556530][ T8395] RAX: ffffffffffffffda RBX: 00007fc6c1616180 RCX: 00007fc6c139c819 [ 203.556540][ T8395] RDX: 0000000000002100 RSI: 0000200000004ec0 RDI: ffffffffffffff9c [ 203.556549][ T8395] RBP: 00007fc6c1432c91 R08: 0000000000000000 R09: 0000000000000000 [ 203.556558][ T8395] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 203.556567][ T8395] R13: 00007fc6c1616218 R14: 00007fc6c1616180 R15: 00007ffd94b34458 [ 203.556586][ T8395] [ 204.153010][ T8387] kexec: Could not allocate control_code_buffer [ 204.710584][ T8412] netlink: 4 bytes leftover after parsing attributes in process `syz.0.525'. [ 204.728502][ T8412] net_ratelimit: 11 callbacks suppressed [ 204.728525][ T8412] netlink: zone id is out of range [ 204.728540][ T8412] netlink: zone id is out of range [ 204.728551][ T8412] netlink: zone id is out of range [ 204.728561][ T8412] netlink: zone id is out of range [ 204.728571][ T8412] netlink: zone id is out of range [ 204.728580][ T8412] netlink: zone id is out of range [ 204.728590][ T8412] netlink: zone id is out of range [ 204.728600][ T8412] netlink: zone id is out of range [ 204.728611][ T8412] netlink: zone id is out of range [ 204.728622][ T8412] netlink: zone id is out of range [ 205.842216][ T8441] FAULT_INJECTION: forcing a failure. [ 205.842216][ T8441] name failslab, interval 1, probability 0, space 0, times 0 [ 205.865908][ T8441] CPU: 1 UID: 0 PID: 8441 Comm: syz.0.532 Tainted: G L syzkaller #0 PREEMPT(full) [ 205.865952][ T8441] Tainted: [L]=SOFTLOCKUP [ 205.865963][ T8441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 205.865979][ T8441] Call Trace: [ 205.865988][ T8441] [ 205.866007][ T8441] dump_stack_lvl+0x100/0x190 [ 205.866042][ T8441] should_fail_ex.cold+0x5/0xa [ 205.866079][ T8441] should_failslab+0xc2/0x120 [ 205.866113][ T8441] __kmalloc_cache_noprof+0x7a/0x6f0 [ 205.866152][ T8441] ? snd_card_file_add+0x52/0x330 [ 205.866198][ T8441] ? __pfx_snd_pcm_playback_open+0x10/0x10 [ 205.866226][ T8441] snd_card_file_add+0x52/0x330 [ 205.866266][ T8441] ? __pfx_snd_pcm_playback_open+0x10/0x10 [ 205.866295][ T8441] snd_pcm_open+0xf1/0x710 [ 205.866326][ T8441] ? __pfx_snd_pcm_open+0x10/0x10 [ 205.866370][ T8441] ? __pfx_snd_pcm_playback_open+0x10/0x10 [ 205.866398][ T8441] snd_pcm_playback_open+0x86/0xe0 [ 205.866427][ T8441] snd_open+0x201/0x450 [ 205.866463][ T8441] ? __pfx_snd_open+0x10/0x10 [ 205.866498][ T8441] chrdev_open+0x234/0x6a0 [ 205.866531][ T8441] ? __pfx_apparmor_file_open+0x10/0x10 [ 205.866570][ T8441] ? __pfx_chrdev_open+0x10/0x10 [ 205.866606][ T8441] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 205.866649][ T8441] do_dentry_open+0x6d8/0x1660 [ 205.866681][ T8441] ? __pfx_chrdev_open+0x10/0x10 [ 205.866724][ T8441] vfs_open+0x82/0x3f0 [ 205.866767][ T8441] path_openat+0x208c/0x31a0 [ 205.866813][ T8441] ? __pfx_path_openat+0x10/0x10 [ 205.866860][ T8441] do_file_open+0x20e/0x430 [ 205.866897][ T8441] ? __pfx_do_file_open+0x10/0x10 [ 205.866956][ T8441] ? alloc_fd+0x476/0x790 [ 205.866989][ T8441] ? do_getname+0x191/0x390 [ 205.867034][ T8441] do_sys_openat2+0x10d/0x1e0 [ 205.867074][ T8441] ? __pfx_do_sys_openat2+0x10/0x10 [ 205.867115][ T8441] ? __fget_files+0x21f/0x3d0 [ 205.867150][ T8441] __x64_sys_openat+0x12d/0x210 [ 205.867188][ T8441] ? __pfx___x64_sys_openat+0x10/0x10 [ 205.867234][ T8441] ? rcu_is_watching+0x12/0xc0 [ 205.867269][ T8441] do_syscall_64+0x10b/0xf80 [ 205.867310][ T8441] ? clear_bhb_loop+0x40/0x90 [ 205.867345][ T8441] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 205.867373][ T8441] RIP: 0033:0x7f1e5779c819 [ 205.867395][ T8441] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 205.867422][ T8441] RSP: 002b:00007f1e559ac028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 205.867449][ T8441] RAX: ffffffffffffffda RBX: 00007f1e57a16180 RCX: 00007f1e5779c819 [ 205.867469][ T8441] RDX: 0000000000002100 RSI: 0000200000004ec0 RDI: ffffffffffffff9c [ 205.867487][ T8441] RBP: 00007f1e57832c91 R08: 0000000000000000 R09: 0000000000000000 [ 205.867504][ T8441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 205.867520][ T8441] R13: 00007f1e57a16218 R14: 00007f1e57a16180 R15: 00007ffda60ee128 [ 205.867558][ T8441] [ 206.967646][ T8449] kexec: Could not allocate control_code_buffer [ 207.474574][ T8466] FAULT_INJECTION: forcing a failure. [ 207.474574][ T8466] name failslab, interval 1, probability 0, space 0, times 0 [ 207.518267][ T8466] CPU: 1 UID: 0 PID: 8466 Comm: syz.2.538 Tainted: G L syzkaller #0 PREEMPT(full) [ 207.518304][ T8466] Tainted: [L]=SOFTLOCKUP [ 207.518310][ T8466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 207.518319][ T8466] Call Trace: [ 207.518326][ T8466] [ 207.518332][ T8466] dump_stack_lvl+0x100/0x190 [ 207.518353][ T8466] should_fail_ex.cold+0x5/0xa [ 207.518372][ T8466] should_failslab+0xc2/0x120 [ 207.518390][ T8466] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 207.518411][ T8466] ? ima_inode_get+0x11f/0x580 [ 207.518434][ T8466] ima_inode_get+0x11f/0x580 [ 207.518455][ T8466] process_measurement+0x1213/0x2350 [ 207.518477][ T8466] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 207.518495][ T8466] ? __pfx_process_measurement+0x10/0x10 [ 207.518520][ T8466] ? rcu_read_unlock+0x17/0x60 [ 207.518554][ T8466] ? mutex_init_lockdep+0xf1/0x120 [ 207.518570][ T8466] ? seq_open+0x116/0x170 [ 207.518592][ T8466] ? inode_to_bdi+0x9e/0x160 [ 207.518609][ T8466] ima_file_check+0xcc/0x120 [ 207.518629][ T8466] ? __pfx_ima_file_check+0x10/0x10 [ 207.518653][ T8466] security_file_post_open+0xc4/0x210 [ 207.518676][ T8466] path_openat+0x1418/0x31a0 [ 207.518700][ T8466] ? __pfx_path_openat+0x10/0x10 [ 207.518725][ T8466] do_file_open+0x20e/0x430 [ 207.518744][ T8466] ? __pfx_do_file_open+0x10/0x10 [ 207.518775][ T8466] ? alloc_fd+0x476/0x790 [ 207.518794][ T8466] ? do_getname+0x191/0x390 [ 207.518816][ T8466] do_sys_openat2+0x10d/0x1e0 [ 207.518837][ T8466] ? __pfx_do_sys_openat2+0x10/0x10 [ 207.518860][ T8466] ? __pfx_sched_core_share_pid+0x10/0x10 [ 207.518884][ T8466] __x64_sys_openat+0x12d/0x210 [ 207.518909][ T8466] ? __pfx___x64_sys_openat+0x10/0x10 [ 207.518934][ T8466] ? rcu_is_watching+0x12/0xc0 [ 207.518953][ T8466] do_syscall_64+0x10b/0xf80 [ 207.518974][ T8466] ? clear_bhb_loop+0x40/0x90 [ 207.518992][ T8466] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 207.519007][ T8466] RIP: 0033:0x7fbe70f9c819 [ 207.519021][ T8466] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 207.519041][ T8466] RSP: 002b:00007fbe71f3d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 207.519066][ T8466] RAX: ffffffffffffffda RBX: 00007fbe71215fa0 RCX: 00007fbe70f9c819 [ 207.519085][ T8466] RDX: 0000000000000582 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 207.519103][ T8466] RBP: 00007fbe71032c91 R08: 0000000000000000 R09: 0000000000000000 [ 207.519119][ T8466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 207.519129][ T8466] R13: 00007fbe71216038 R14: 00007fbe71215fa0 R15: 00007ffcfc411e18 [ 207.519156][ T8466] [ 208.261490][ T8478] netlink: 354 bytes leftover after parsing attributes in process `syz.2.541'. [ 208.848057][ T8486] netlink: 186 bytes leftover after parsing attributes in process `syz.2.543'. [ 208.893735][ T8486] netlink: 186 bytes leftover after parsing attributes in process `syz.2.543'. [ 208.930417][ T8492] netlink: 8 bytes leftover after parsing attributes in process `syz.0.544'. [ 209.051767][ T8486] ICMPv6: process `syz.2.543' is using deprecated sysctl (syscall) net.ipv6.neigh.ipvlan1.retrans_time - use net.ipv6.neigh.ipvlan1.retrans_time_ms instead [ 210.175827][ T8495] kexec: Could not allocate control_code_buffer [ 210.404642][ T8512] netlink: 8 bytes leftover after parsing attributes in process `syz.2.549'. [ 210.433633][ T8515] netlink: 354 bytes leftover after parsing attributes in process `syz.3.551'. [ 211.627306][ T8538] FAULT_INJECTION: forcing a failure. [ 211.627306][ T8538] name failslab, interval 1, probability 0, space 0, times 0 [ 211.671493][ T8538] CPU: 0 UID: 0 PID: 8538 Comm: syz.3.557 Tainted: G L syzkaller #0 PREEMPT(full) [ 211.671520][ T8538] Tainted: [L]=SOFTLOCKUP [ 211.671526][ T8538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 211.671535][ T8538] Call Trace: [ 211.671540][ T8538] [ 211.671546][ T8538] dump_stack_lvl+0x100/0x190 [ 211.671574][ T8538] should_fail_ex.cold+0x5/0xa [ 211.671594][ T8538] should_failslab+0xc2/0x120 [ 211.671613][ T8538] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 211.671638][ T8538] ? mas_preallocate+0x1105/0x14a0 [ 211.671658][ T8538] mas_preallocate+0x1105/0x14a0 [ 211.671678][ T8538] ? __pfx_mas_preallocate+0x10/0x10 [ 211.671699][ T8538] ? anon_vma_name+0x5a/0x250 [ 211.671723][ T8538] __split_vma+0x33d/0xd90 [ 211.671747][ T8538] ? __pfx___split_vma+0x10/0x10 [ 211.671773][ T8538] ? __pfx___up_read+0x10/0x10 [ 211.671789][ T8538] ? vms_complete_munmap_vmas+0xaac/0xdd0 [ 211.671813][ T8538] ? vms_complete_munmap_vmas+0xaac/0xdd0 [ 211.671837][ T8538] vms_gather_munmap_vmas+0x1d2/0x1720 [ 211.671860][ T8538] ? vms_complete_munmap_vmas+0x1e1/0xdd0 [ 211.671903][ T8538] ? __pfx_vms_gather_munmap_vmas+0x10/0x10 [ 211.671928][ T8538] ? __pfx_vms_complete_munmap_vmas+0x10/0x10 [ 211.671961][ T8538] do_vmi_align_munmap+0x287/0x5f0 [ 211.671985][ T8538] ? __pfx_do_vmi_align_munmap+0x10/0x10 [ 211.672007][ T8538] ? trace_contention_end+0x145/0x1a0 [ 211.672048][ T8538] do_vmi_munmap+0x1f8/0x3e0 [ 211.672072][ T8538] __vm_munmap+0x196/0x390 [ 211.672087][ T8538] ? __pfx___vm_munmap+0x10/0x10 [ 211.672113][ T8538] __x64_sys_munmap+0x59/0x80 [ 211.672130][ T8538] do_syscall_64+0x10b/0xf80 [ 211.672151][ T8538] ? clear_bhb_loop+0x40/0x90 [ 211.672169][ T8538] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 211.672184][ T8538] RIP: 0033:0x7fc6c139c647 [ 211.672198][ T8538] Code: 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 0b 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 211.672213][ T8538] RSP: 002b:00007fc6c219ad18 EFLAGS: 00000206 ORIG_RAX: 000000000000000b [ 211.672228][ T8538] RAX: ffffffffffffffda RBX: 00007fc6b8000000 RCX: 00007fc6c139c647 [ 211.672238][ T8538] RDX: 0000000000000000 RSI: 0000000003400000 RDI: 00007fc6bc000000 [ 211.672248][ T8538] RBP: 0000000000021000 R08: 00000000ffffffff R09: 0000000000000000 [ 211.672257][ T8538] R10: 0000000000000022 R11: 0000000000000206 R12: 0000000004000000 [ 211.672266][ T8538] R13: 0000000000001000 R14: 00007fc6bc000000 R15: 0000000000c00000 [ 211.672285][ T8538] [ 212.632163][ T8547] FAULT_INJECTION: forcing a failure. [ 212.632163][ T8547] name failslab, interval 1, probability 0, space 0, times 0 [ 212.644825][ T8547] CPU: 0 UID: 0 PID: 8547 Comm: syz.3.559 Tainted: G L syzkaller #0 PREEMPT(full) [ 212.644849][ T8547] Tainted: [L]=SOFTLOCKUP [ 212.644854][ T8547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 212.644864][ T8547] Call Trace: [ 212.644870][ T8547] [ 212.644875][ T8547] dump_stack_lvl+0x100/0x190 [ 212.644896][ T8547] should_fail_ex.cold+0x5/0xa [ 212.644917][ T8547] should_failslab+0xc2/0x120 [ 212.644934][ T8547] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 212.644956][ T8547] ? inet_bind2_bucket_create+0x36/0x5f0 [ 212.644978][ T8547] ? do_raw_spin_lock+0x128/0x260 [ 212.644998][ T8547] inet_bind2_bucket_create+0x36/0x5f0 [ 212.645024][ T8547] inet_csk_get_port+0x2687/0x28e0 [ 212.645045][ T8547] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 212.645066][ T8547] ? __local_bh_enable_ip+0x9e/0x120 [ 212.645087][ T8547] __inet_bind+0x598/0xc60 [ 212.645110][ T8547] inet_bind+0xdb/0x120 [ 212.645131][ T8547] __sys_bind+0x1a9/0x260 [ 212.645152][ T8547] ? __pfx___sys_bind+0x10/0x10 [ 212.645191][ T8547] __x64_sys_bind+0x72/0xb0 [ 212.645211][ T8547] ? lockdep_hardirqs_on+0x78/0x100 [ 212.645233][ T8547] do_syscall_64+0x10b/0xf80 [ 212.645254][ T8547] ? clear_bhb_loop+0x40/0x90 [ 212.645272][ T8547] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 212.645287][ T8547] RIP: 0033:0x7fc6c139c819 [ 212.645305][ T8547] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 212.645319][ T8547] RSP: 002b:00007fc6c219c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 212.645334][ T8547] RAX: ffffffffffffffda RBX: 00007fc6c1615fa0 RCX: 00007fc6c139c819 [ 212.645344][ T8547] RDX: 000000000000006a RSI: 0000200000000040 RDI: 0000000000000003 [ 212.645354][ T8547] RBP: 00007fc6c1432c91 R08: 0000000000000000 R09: 0000000000000000 [ 212.645363][ T8547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 212.645372][ T8547] R13: 00007fc6c1616038 R14: 00007fc6c1615fa0 R15: 00007ffd94b34458 [ 212.645392][ T8547] [ 212.906170][ T8551] : Can't lookup blockdev [ 214.242531][ T8579] smc: net device dummy0 applied user defined pnetid DUMMY0 [ 214.742342][ T8585] zswap: compressor not available [ 216.998232][ T8639] FAULT_INJECTION: forcing a failure. [ 216.998232][ T8639] name failslab, interval 1, probability 0, space 0, times 0 [ 217.026639][ T8639] CPU: 1 UID: 0 PID: 8639 Comm: syz.2.579 Tainted: G L syzkaller #0 PREEMPT(full) [ 217.026666][ T8639] Tainted: [L]=SOFTLOCKUP [ 217.026671][ T8639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 217.026681][ T8639] Call Trace: [ 217.026687][ T8639] [ 217.026692][ T8639] dump_stack_lvl+0x100/0x190 [ 217.026713][ T8639] should_fail_ex.cold+0x5/0xa [ 217.026733][ T8639] should_failslab+0xc2/0x120 [ 217.026749][ T8639] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 217.026772][ T8639] ? prepare_creds+0x2c/0x950 [ 217.026787][ T8639] ? apparmor_capable+0x1d7/0x4d0 [ 217.026807][ T8639] ? __x64_sys_futex+0x358/0x4d0 [ 217.026826][ T8639] prepare_creds+0x2c/0x950 [ 217.026842][ T8639] __sys_setresuid+0x458/0x1280 [ 217.026865][ T8639] do_syscall_64+0x10b/0xf80 [ 217.026887][ T8639] ? clear_bhb_loop+0x40/0x90 [ 217.026905][ T8639] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 217.026920][ T8639] RIP: 0033:0x7fbe70f9c819 [ 217.026933][ T8639] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 217.026948][ T8639] RSP: 002b:00007fbe71f3d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 217.026963][ T8639] RAX: ffffffffffffffda RBX: 00007fbe71215fa0 RCX: 00007fbe70f9c819 [ 217.026973][ T8639] RDX: 0000000000000200 RSI: 0000000000000000 RDI: 0000000000000000 [ 217.026981][ T8639] RBP: 00007fbe71032c91 R08: 0000000000000000 R09: 0000000000000000 [ 217.026990][ T8639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 217.026999][ T8639] R13: 00007fbe71216038 R14: 00007fbe71215fa0 R15: 00007ffcfc411e18 [ 217.027017][ T8639] [ 217.477695][ T8646] FAULT_INJECTION: forcing a failure. [ 217.477695][ T8646] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 217.502484][ T8646] CPU: 1 UID: 0 PID: 8646 Comm: syz.3.581 Tainted: G L syzkaller #0 PREEMPT(full) [ 217.502524][ T8646] Tainted: [L]=SOFTLOCKUP [ 217.502529][ T8646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 217.502539][ T8646] Call Trace: [ 217.502545][ T8646] [ 217.502551][ T8646] dump_stack_lvl+0x100/0x190 [ 217.502573][ T8646] should_fail_ex.cold+0x5/0xa [ 217.502589][ T8646] ? prepare_alloc_pages+0x16d/0x5f0 [ 217.502610][ T8646] should_fail_alloc_page+0xeb/0x140 [ 217.502629][ T8646] prepare_alloc_pages+0x1f0/0x5f0 [ 217.502646][ T8646] ? kernel_text_address+0x8d/0x100 [ 217.502663][ T8646] __alloc_frozen_pages_noprof+0x19a/0x2bc0 [ 217.502693][ T8646] ? copy_splice_read+0x1a3/0xb90 [ 217.502710][ T8646] ? stack_trace_save+0x8e/0xc0 [ 217.502729][ T8646] ? __pfx_stack_trace_save+0x10/0x10 [ 217.502747][ T8646] ? find_held_lock+0x2b/0x80 [ 217.502766][ T8646] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 217.502791][ T8646] ? copy_splice_read+0x1a3/0xb90 [ 217.502807][ T8646] ? kasan_save_stack+0x3f/0x50 [ 217.502820][ T8646] ? kasan_save_stack+0x30/0x50 [ 217.502833][ T8646] ? kasan_save_track+0x14/0x30 [ 217.502845][ T8646] ? __kasan_kmalloc+0xaa/0xb0 [ 217.502857][ T8646] ? __kmalloc_noprof+0x301/0x850 [ 217.502878][ T8646] ? copy_splice_read+0x1a3/0xb90 [ 217.502895][ T8646] ? do_syscall_64+0x10b/0xf80 [ 217.502916][ T8646] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 217.502942][ T8646] alloc_pages_bulk_noprof+0x657/0x1390 [ 217.502972][ T8646] ? __pfx_alloc_pages_bulk_noprof+0x10/0x10 [ 217.503000][ T8646] ? __kmalloc_noprof+0x320/0x850 [ 217.503025][ T8646] copy_splice_read+0x1e1/0xb90 [ 217.503047][ T8646] ? __pfx_copy_splice_read+0x10/0x10 [ 217.503066][ T8646] ? __pfx_splice_from_pipe+0x10/0x10 [ 217.503088][ T8646] ? __pfx_pipe_lock_cmp_fn+0x10/0x10 [ 217.503106][ T8646] ? __pfx_copy_splice_read+0x10/0x10 [ 217.503123][ T8646] do_splice_read+0x285/0x370 [ 217.503142][ T8646] splice_direct_to_actor+0x2a1/0xa30 [ 217.503164][ T8646] ? __pfx_direct_splice_actor+0x10/0x10 [ 217.503185][ T8646] ? __pfx_splice_direct_to_actor+0x10/0x10 [ 217.503208][ T8646] do_splice_direct+0x174/0x240 [ 217.503226][ T8646] ? __pfx_do_splice_direct+0x10/0x10 [ 217.503244][ T8646] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 217.503262][ T8646] ? bpf_lsm_file_permission+0x9/0x10 [ 217.503275][ T8646] ? security_file_permission+0x76/0x210 [ 217.503291][ T8646] ? rw_verify_area+0xce/0x6d0 [ 217.503307][ T8646] do_sendfile+0xadc/0xe20 [ 217.503325][ T8646] ? __pfx_do_sendfile+0x10/0x10 [ 217.503343][ T8646] ? __x64_sys_futex+0x34f/0x4d0 [ 217.503359][ T8646] ? __x64_sys_futex+0x358/0x4d0 [ 217.503376][ T8646] __x64_sys_sendfile64+0x1d8/0x220 [ 217.503402][ T8646] ? ksys_write+0x1ac/0x250 [ 217.503419][ T8646] ? __pfx___x64_sys_sendfile64+0x10/0x10 [ 217.503440][ T8646] ? rcu_is_watching+0x12/0xc0 [ 217.503461][ T8646] do_syscall_64+0x10b/0xf80 [ 217.503482][ T8646] ? clear_bhb_loop+0x40/0x90 [ 217.503499][ T8646] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 217.503514][ T8646] RIP: 0033:0x7fc6c139c819 [ 217.503527][ T8646] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 217.503541][ T8646] RSP: 002b:00007fc6c219c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 217.503556][ T8646] RAX: ffffffffffffffda RBX: 00007fc6c1615fa0 RCX: 00007fc6c139c819 [ 217.503566][ T8646] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000007 [ 217.503575][ T8646] RBP: 00007fc6c1432c91 R08: 0000000000000000 R09: 0000000000000000 [ 217.503584][ T8646] R10: 0010000800000003 R11: 0000000000000246 R12: 0000000000000000 [ 217.503593][ T8646] R13: 00007fc6c1616038 R14: 00007fc6c1615fa0 R15: 00007ffd94b34458 [ 217.503613][ T8646] [ 218.614153][ T8657] netlink: 8 bytes leftover after parsing attributes in process `syz.1.584'. [ 219.099657][ T8664] misc userio: No port type given on /dev/userio [ 219.565973][ T8676] netlink: 62 bytes leftover after parsing attributes in process `syz.1.588'. [ 219.602717][ T8676] netlink: 62 bytes leftover after parsing attributes in process `syz.1.588'. [ 219.612948][ T8676] netlink: 62 bytes leftover after parsing attributes in process `syz.1.588'. [ 219.626649][ T8676] netlink: 62 bytes leftover after parsing attributes in process `syz.1.588'. [ 219.637381][ T8676] netlink: 62 bytes leftover after parsing attributes in process `syz.1.588'. [ 219.648573][ T8676] netlink: 62 bytes leftover after parsing attributes in process `syz.1.588'. [ 219.695369][ T8676] netlink: 62 bytes leftover after parsing attributes in process `syz.1.588'. [ 219.718066][ T8676] netlink: 62 bytes leftover after parsing attributes in process `syz.1.588'. [ 219.745894][ T8676] netlink: 62 bytes leftover after parsing attributes in process `syz.1.588'. [ 221.934043][ T5843] Bluetooth: hci3: unexpected event 0x14 length: 16 > 6 [ 221.972490][ T8718] random: crng reseeded on system resumption [ 222.223706][ T8715] misc userio: No port type given on /dev/userio [ 223.000082][ T8721] kexec: Could not allocate control_code_buffer [ 223.367267][ T8739] net_ratelimit: 342 callbacks suppressed [ 223.367293][ T8739] openvswitch: netlink: VXLAN extension 64 out of range max 1 [ 224.790212][ T8776] nvme_fcloop: unknown parameter or missing value '0' [ 224.808554][ T8773] __nla_validate_parse: 10 callbacks suppressed [ 224.808577][ T8773] netlink: 8 bytes leftover after parsing attributes in process `syz.1.610'. [ 225.218103][ T8784] netlink: 354 bytes leftover after parsing attributes in process `syz.0.612'. [ 226.703596][ T8801] netlink: 18 bytes leftover after parsing attributes in process `syz.2.617'. [ 226.764854][ T8801] smc: net device dummy0 applied user defined pnetid DUMMY0 [ 226.853167][ T8801] netlink: 8 bytes leftover after parsing attributes in process `syz.2.617'. [ 227.671146][ T8820] netlink: 354 bytes leftover after parsing attributes in process `syz.0.622'. [ 227.994152][ T8830] bridge0: port 3(bond0) entered blocking state [ 228.004441][ T8830] bridge0: port 3(bond0) entered disabled state [ 228.011561][ T8830] bond0: entered allmulticast mode [ 228.017192][ T8830] bond_slave_0: entered allmulticast mode [ 228.022974][ T8830] bond_slave_1: entered allmulticast mode [ 228.031948][ T8830] bond0: entered promiscuous mode [ 228.038323][ T8830] bond_slave_0: entered promiscuous mode [ 228.052107][ T8830] bond_slave_1: entered promiscuous mode [ 228.070489][ T8830] bridge0: port 3(bond0) entered blocking state [ 228.078203][ T8830] bridge0: port 3(bond0) entered forwarding state [ 229.655860][ T8874] netlink: 146 bytes leftover after parsing attributes in process `syz.0.634'. [ 232.220481][ T8940] FAULT_INJECTION: forcing a failure. [ 232.220481][ T8940] name failslab, interval 1, probability 0, space 0, times 0 [ 232.239721][ T8942] netlink: 8 bytes leftover after parsing attributes in process `syz.2.644'. [ 232.249165][ T8940] CPU: 1 UID: 0 PID: 8940 Comm: syz.0.645 Tainted: G L syzkaller #0 PREEMPT(full) [ 232.249211][ T8940] Tainted: [L]=SOFTLOCKUP [ 232.249221][ T8940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 232.249239][ T8940] Call Trace: [ 232.249249][ T8940] [ 232.249260][ T8940] dump_stack_lvl+0x100/0x190 [ 232.249297][ T8940] should_fail_ex.cold+0x5/0xa [ 232.249336][ T8940] should_failslab+0xc2/0x120 [ 232.249377][ T8940] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 232.249421][ T8940] ? sock_alloc_inode+0x26/0x290 [ 232.249462][ T8940] ? __pfx_sock_alloc_inode+0x10/0x10 [ 232.249499][ T8940] sock_alloc_inode+0x26/0x290 [ 232.249532][ T8940] ? __pfx_sock_alloc_inode+0x10/0x10 [ 232.249563][ T8940] alloc_inode+0x68/0x250 [ 232.249604][ T8940] sock_alloc+0x44/0x280 [ 232.249632][ T8940] ? security_socket_create+0x7f/0x250 [ 232.249672][ T8940] __sock_create+0xc2/0x860 [ 232.249713][ T8940] __sys_socket+0x14d/0x260 [ 232.249751][ T8940] ? __pfx___sys_socket+0x10/0x10 [ 232.249785][ T8940] ? set_cred_ucounts+0x10f/0x200 [ 232.249825][ T8940] __x64_sys_socket+0x72/0xb0 [ 232.249862][ T8940] ? lockdep_hardirqs_on+0x78/0x100 [ 232.249904][ T8940] do_syscall_64+0x10b/0xf80 [ 232.249945][ T8940] ? clear_bhb_loop+0x40/0x90 [ 232.249979][ T8940] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 232.250013][ T8940] RIP: 0033:0x7f1e5779c819 [ 232.250037][ T8940] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 232.250064][ T8940] RSP: 002b:00007f1e559ee028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 232.250091][ T8940] RAX: ffffffffffffffda RBX: 00007f1e57a15fa0 RCX: 00007f1e5779c819 [ 232.250112][ T8940] RDX: 000000000000009e RSI: 0000000000000001 RDI: 0000000000000022 [ 232.250128][ T8940] RBP: 00007f1e57832c91 R08: 0000000000000000 R09: 0000000000000000 [ 232.250145][ T8940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 232.250160][ T8940] R13: 00007f1e57a16038 R14: 00007f1e57a15fa0 R15: 00007ffda60ee128 [ 232.250193][ T8940] [ 232.250270][ T8940] socket: no more sockets [ 233.161310][ T8955] FAULT_INJECTION: forcing a failure. [ 233.161310][ T8955] name fail_futex, interval 1, probability 0, space 0, times 0 [ 233.187099][ T8955] CPU: 0 UID: 0 PID: 8955 Comm: syz.3.648 Tainted: G L syzkaller #0 PREEMPT(full) [ 233.187150][ T8955] Tainted: [L]=SOFTLOCKUP [ 233.187161][ T8955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 233.187178][ T8955] Call Trace: [ 233.187187][ T8955] [ 233.187199][ T8955] dump_stack_lvl+0x100/0x190 [ 233.187242][ T8955] should_fail_ex.cold+0x5/0xa [ 233.187280][ T8955] get_futex_key+0x295/0x1510 [ 233.187314][ T8955] ? __pfx_get_futex_key+0x10/0x10 [ 233.187345][ T8955] ? kasan_save_track+0x14/0x30 [ 233.187373][ T8955] ? __kasan_kmalloc+0xaa/0xb0 [ 233.187406][ T8955] futex_lock_pi+0x1d2/0x7a0 [ 233.187447][ T8955] ? __pfx_futex_lock_pi+0x10/0x10 [ 233.187500][ T8955] ? __pfx_try_to_wake_up+0x10/0x10 [ 233.187547][ T8955] ? futex_private_hash_put+0x107/0x1c0 [ 233.187600][ T8955] ? __pfx_futex_wake_mark+0x10/0x10 [ 233.187645][ T8955] ? __might_fault+0x111/0x140 [ 233.187689][ T8955] ? do_vfs_ioctl+0x226/0x13e0 [ 233.187721][ T8955] do_futex+0x18a/0x350 [ 233.187752][ T8955] ? __pfx_do_futex+0x10/0x10 [ 233.187785][ T8955] ? find_held_lock+0x2b/0x80 [ 233.187826][ T8955] __x64_sys_futex+0x34f/0x4d0 [ 233.187863][ T8955] ? __pfx___x64_sys_futex+0x10/0x10 [ 233.187901][ T8955] ? rcu_is_watching+0x12/0xc0 [ 233.187940][ T8955] do_syscall_64+0x10b/0xf80 [ 233.187981][ T8955] ? clear_bhb_loop+0x40/0x90 [ 233.188015][ T8955] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 233.188043][ T8955] RIP: 0033:0x7fc6c139c819 [ 233.188067][ T8955] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 233.188095][ T8955] RSP: 002b:00007fc6c217b028 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 233.188124][ T8955] RAX: ffffffffffffffda RBX: 00007fc6c1616090 RCX: 00007fc6c139c819 [ 233.188143][ T8955] RDX: 0000000000000008 RSI: 0000000000000006 RDI: 0000000000000000 [ 233.188161][ T8955] RBP: 00007fc6c1432c91 R08: 0000000000000000 R09: 000000008000fff5 [ 233.188179][ T8955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 233.188197][ T8955] R13: 00007fc6c1616128 R14: 00007fc6c1616090 R15: 00007ffd94b34458 [ 233.188235][ T8955] [ 234.148668][ T8971] netlink: 342 bytes leftover after parsing attributes in process `syz.3.651'. [ 234.805695][ T8983] FAULT_INJECTION: forcing a failure. [ 234.805695][ T8983] name failslab, interval 1, probability 0, space 0, times 0 [ 234.828021][ T8983] CPU: 0 UID: 0 PID: 8983 Comm: syz.0.654 Tainted: G L syzkaller #0 PREEMPT(full) [ 234.828076][ T8983] Tainted: [L]=SOFTLOCKUP [ 234.828086][ T8983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 234.828104][ T8983] Call Trace: [ 234.828113][ T8983] [ 234.828125][ T8983] dump_stack_lvl+0x100/0x190 [ 234.828170][ T8983] should_fail_ex.cold+0x5/0xa [ 234.828207][ T8983] ? lsm_blob_alloc+0x68/0x90 [ 234.828239][ T8983] should_failslab+0xc2/0x120 [ 234.828272][ T8983] __kmalloc_noprof+0xe0/0x850 [ 234.828314][ T8983] ? trace_kmem_cache_alloc+0xd5/0x100 [ 234.828355][ T8983] lsm_blob_alloc+0x68/0x90 [ 234.828389][ T8983] security_prepare_creds+0x2d/0x290 [ 234.828422][ T8983] prepare_creds+0x5d6/0x950 [ 234.828457][ T8983] __sys_setresuid+0x458/0x1280 [ 234.828498][ T8983] do_syscall_64+0x10b/0xf80 [ 234.828540][ T8983] ? clear_bhb_loop+0x40/0x90 [ 234.828575][ T8983] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 234.828604][ T8983] RIP: 0033:0x7f1e5779c819 [ 234.828628][ T8983] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 234.828657][ T8983] RSP: 002b:00007f1e559ee028 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 234.828686][ T8983] RAX: ffffffffffffffda RBX: 00007f1e57a15fa0 RCX: 00007f1e5779c819 [ 234.828705][ T8983] RDX: 0000000000000200 RSI: 0000000000000000 RDI: 0000000000000000 [ 234.828722][ T8983] RBP: 00007f1e57832c91 R08: 0000000000000000 R09: 0000000000000000 [ 234.828740][ T8983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 234.828757][ T8983] R13: 00007f1e57a16038 R14: 00007f1e57a15fa0 R15: 00007ffda60ee128 [ 234.828795][ T8983] [ 237.040133][ T9000] kexec: Could not allocate control_code_buffer [ 237.819470][ T9026] zram0: detected capacity change from 0 to 16 [ 237.906558][ T9034] FAULT_INJECTION: forcing a failure. [ 237.906558][ T9034] name fail_futex, interval 1, probability 0, space 0, times 0 [ 237.926420][ T9034] CPU: 0 UID: 0 PID: 9034 Comm: syz.3.666 Tainted: G L syzkaller #0 PREEMPT(full) [ 237.926463][ T9034] Tainted: [L]=SOFTLOCKUP [ 237.926472][ T9034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 237.926488][ T9034] Call Trace: [ 237.926495][ T9034] [ 237.926505][ T9034] dump_stack_lvl+0x100/0x190 [ 237.926540][ T9034] should_fail_ex.cold+0x5/0xa [ 237.926570][ T9034] get_futex_key+0x1d2/0x1510 [ 237.926600][ T9034] ? __pfx_get_futex_key+0x10/0x10 [ 237.926647][ T9034] futex_wake+0xea/0x530 [ 237.926685][ T9034] ? __pfx_futex_wake+0x10/0x10 [ 237.926725][ T9034] ? proc_id_connector+0x2ed/0x650 [ 237.926761][ T9034] do_futex+0x32b/0x350 [ 237.926790][ T9034] ? __pfx_do_futex+0x10/0x10 [ 237.926819][ T9034] ? find_held_lock+0x2b/0x80 [ 237.926851][ T9034] ? setid_policy_lookup+0x10c/0x350 [ 237.926884][ T9034] __x64_sys_futex+0x34f/0x4d0 [ 237.926916][ T9034] ? __pfx___x64_sys_futex+0x10/0x10 [ 237.926944][ T9034] ? set_cred_ucounts+0x10f/0x200 [ 237.926977][ T9034] ? rcu_is_watching+0x12/0xc0 [ 237.927013][ T9034] do_syscall_64+0x10b/0xf80 [ 237.927053][ T9034] ? clear_bhb_loop+0x40/0x90 [ 237.927086][ T9034] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 237.927112][ T9034] RIP: 0033:0x7fc6c139c819 [ 237.927133][ T9034] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 237.927158][ T9034] RSP: 002b:00007fc6c219c0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 237.927185][ T9034] RAX: ffffffffffffffda RBX: 00007fc6c1615fa8 RCX: 00007fc6c139c819 [ 237.927203][ T9034] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fc6c1615fac [ 237.927219][ T9034] RBP: 00007fc6c1615fa0 R08: 0000000000000001 R09: 0000000000000000 [ 237.927236][ T9034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 237.927251][ T9034] R13: 00007fc6c1616038 R14: 00007ffd94b34370 R15: 00007ffd94b34458 [ 237.927288][ T9034] [ 239.528325][ T9038] kexec: Could not allocate control_code_buffer [ 240.433555][ T9077] misc userio: No port type given on /dev/userio [ 240.814531][ T9086] netlink: 8 bytes leftover after parsing attributes in process `syz.0.678'. [ 241.508022][ T9105] FAULT_INJECTION: forcing a failure. [ 241.508022][ T9105] name fail_futex, interval 1, probability 0, space 0, times 0 [ 241.530259][ T9105] CPU: 0 UID: 0 PID: 9105 Comm: syz.3.684 Tainted: G L syzkaller #0 PREEMPT(full) [ 241.530284][ T9105] Tainted: [L]=SOFTLOCKUP [ 241.530289][ T9105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 241.530299][ T9105] Call Trace: [ 241.530304][ T9105] [ 241.530310][ T9105] dump_stack_lvl+0x100/0x190 [ 241.530331][ T9105] should_fail_ex.cold+0x5/0xa [ 241.530355][ T9105] get_futex_key+0x1d2/0x1510 [ 241.530378][ T9105] ? __pfx_get_futex_key+0x10/0x10 [ 241.530400][ T9105] futex_wake+0xea/0x530 [ 241.530419][ T9105] ? rcu_is_watching+0x12/0xc0 [ 241.530438][ T9105] ? __pfx_futex_wake+0x10/0x10 [ 241.530461][ T9105] ? putname+0xb1/0x110 [ 241.530478][ T9105] ? kmem_cache_free+0x127/0x6c0 [ 241.530498][ T9105] ? do_sys_openat2+0x1b4/0x1e0 [ 241.530522][ T9105] do_futex+0x32b/0x350 [ 241.530537][ T9105] ? __pfx_do_futex+0x10/0x10 [ 241.530551][ T9105] ? __pfx_do_sys_openat2+0x10/0x10 [ 241.530573][ T9105] ? __fget_files+0x21f/0x3d0 [ 241.530592][ T9105] __x64_sys_futex+0x34f/0x4d0 [ 241.530615][ T9105] ? __x64_sys_openat+0x12d/0x210 [ 241.530637][ T9105] ? __pfx___x64_sys_futex+0x10/0x10 [ 241.530657][ T9105] ? rcu_is_watching+0x12/0xc0 [ 241.530677][ T9105] do_syscall_64+0x10b/0xf80 [ 241.530698][ T9105] ? clear_bhb_loop+0x40/0x90 [ 241.530717][ T9105] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 241.530733][ T9105] RIP: 0033:0x7fc6c139c819 [ 241.530746][ T9105] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 241.530761][ T9105] RSP: 002b:00007fc6c219c0e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 241.530775][ T9105] RAX: ffffffffffffffda RBX: 00007fc6c1615fa8 RCX: 00007fc6c139c819 [ 241.530785][ T9105] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fc6c1615fac [ 241.530794][ T9105] RBP: 00007fc6c1615fa0 R08: 0000000000000001 R09: 0000000000000000 [ 241.530803][ T9105] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 241.530812][ T9105] R13: 00007fc6c1616038 R14: 00007ffd94b34370 R15: 00007ffd94b34458 [ 241.530830][ T9105] [ 242.190256][ T9114] misc userio: No port type given on /dev/userio [ 242.201073][ T9114] FAULT_INJECTION: forcing a failure. [ 242.201073][ T9114] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 242.237895][ T9114] CPU: 1 UID: 0 PID: 9114 Comm: syz.1.686 Tainted: G L syzkaller #0 PREEMPT(full) [ 242.237936][ T9114] Tainted: [L]=SOFTLOCKUP [ 242.237946][ T9114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 242.237960][ T9114] Call Trace: [ 242.237968][ T9114] [ 242.237979][ T9114] dump_stack_lvl+0x100/0x190 [ 242.238013][ T9114] should_fail_ex.cold+0x5/0xa [ 242.238047][ T9114] _copy_to_user+0x32/0xd0 [ 242.238087][ T9114] simple_read_from_buffer+0xcb/0x170 [ 242.238120][ T9114] proc_fail_nth_read+0x1af/0x230 [ 242.238159][ T9114] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 242.238200][ T9114] ? rw_verify_area+0xce/0x6d0 [ 242.238225][ T9114] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 242.238262][ T9114] vfs_read+0x1e4/0xb30 [ 242.238296][ T9114] ? __pfx_vfs_read+0x10/0x10 [ 242.238323][ T9114] ? __fget_files+0x215/0x3d0 [ 242.238361][ T9114] ? __fget_files+0x21f/0x3d0 [ 242.238424][ T9114] ksys_read+0x12a/0x250 [ 242.238452][ T9114] ? __pfx_ksys_read+0x10/0x10 [ 242.238483][ T9114] ? rcu_is_watching+0x12/0xc0 [ 242.238520][ T9114] do_syscall_64+0x10b/0xf80 [ 242.238555][ T9114] ? clear_bhb_loop+0x40/0x90 [ 242.238589][ T9114] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 242.238616][ T9114] RIP: 0033:0x7fbdec95d04e [ 242.238637][ T9114] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 242.238662][ T9114] RSP: 002b:00007fbded89afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 242.238686][ T9114] RAX: ffffffffffffffda RBX: 00007fbded89b6c0 RCX: 00007fbdec95d04e [ 242.238703][ T9114] RDX: 000000000000000f RSI: 00007fbded89b0a0 RDI: 0000000000000004 [ 242.238719][ T9114] RBP: 00007fbded89b090 R08: 0000000000000000 R09: 0000000000000000 [ 242.238735][ T9114] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 242.238750][ T9114] R13: 00007fbdecc16038 R14: 00007fbdecc15fa0 R15: 00007ffd5465e5c8 [ 242.238787][ T9114] [ 242.961947][ T9123] misc userio: No port type given on /dev/userio [ 243.034583][ T9133] FAULT_INJECTION: forcing a failure. [ 243.034583][ T9133] name failslab, interval 1, probability 0, space 0, times 0 [ 243.057431][ T9133] CPU: 0 UID: 0 PID: 9133 Comm: syz.2.691 Tainted: G L syzkaller #0 PREEMPT(full) [ 243.057482][ T9133] Tainted: [L]=SOFTLOCKUP [ 243.057492][ T9133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 243.057516][ T9133] Call Trace: [ 243.057525][ T9133] [ 243.057536][ T9133] dump_stack_lvl+0x100/0x190 [ 243.057572][ T9133] should_fail_ex.cold+0x5/0xa [ 243.057608][ T9133] ? lsm_blob_alloc+0x68/0x90 [ 243.057639][ T9133] should_failslab+0xc2/0x120 [ 243.057672][ T9133] __kmalloc_noprof+0xe0/0x850 [ 243.057714][ T9133] ? trace_kmem_cache_alloc+0xd5/0x100 [ 243.057754][ T9133] lsm_blob_alloc+0x68/0x90 [ 243.057787][ T9133] security_sk_alloc+0x2d/0x290 [ 243.057825][ T9133] sk_prot_alloc+0x1d1/0x2a0 [ 243.057864][ T9133] sk_alloc+0x36/0xe80 [ 243.057896][ T9133] inet_create+0x3a0/0x1060 [ 243.057936][ T9133] ? inet_create+0x94/0x1060 [ 243.057981][ T9133] __sock_create+0x339/0x860 [ 243.058026][ T9133] udp_sock_create4+0xa6/0x450 [ 243.058057][ T9133] ? __pfx_udp_sock_create4+0x10/0x10 [ 243.058094][ T9133] ? lockdep_hardirqs_on+0x78/0x100 [ 243.058136][ T9133] ? crng_make_state+0x2b0/0x6c0 [ 243.058186][ T9133] rxrpc_open_socket+0x4ef/0x6b0 [ 243.058224][ T9133] ? __pfx_rxrpc_open_socket+0x10/0x10 [ 243.058280][ T9133] ? rcu_is_watching+0x12/0xc0 [ 243.058313][ T9133] ? trace_rxrpc_local+0x80/0x250 [ 243.058352][ T9133] rxrpc_lookup_local+0xac7/0x1220 [ 243.058397][ T9133] ? __pfx_rxrpc_lookup_local+0x10/0x10 [ 243.058439][ T9133] ? __local_bh_enable_ip+0x9e/0x120 [ 243.058485][ T9133] rxrpc_sendmsg+0x34a/0x680 [ 243.058533][ T9133] sock_write_iter+0x524/0x5a0 [ 243.058569][ T9133] ? __pfx_rxrpc_sendmsg+0x10/0x10 [ 243.058614][ T9133] ? __pfx_sock_write_iter+0x10/0x10 [ 243.058664][ T9133] ? bpf_lsm_file_permission+0x9/0x10 [ 243.058691][ T9133] ? security_file_permission+0x76/0x210 [ 243.058717][ T9133] ? rw_verify_area+0xce/0x6d0 [ 243.058746][ T9133] vfs_write+0x6ac/0x1070 [ 243.058776][ T9133] ? __pfx_sock_write_iter+0x10/0x10 [ 243.058814][ T9133] ? __pfx_vfs_write+0x10/0x10 [ 243.058843][ T9133] ? find_held_lock+0x2b/0x80 [ 243.058903][ T9133] ksys_write+0x1f8/0x250 [ 243.058934][ T9133] ? __pfx_ksys_write+0x10/0x10 [ 243.058968][ T9133] ? rcu_is_watching+0x12/0xc0 [ 243.059006][ T9133] do_syscall_64+0x10b/0xf80 [ 243.059047][ T9133] ? clear_bhb_loop+0x40/0x90 [ 243.059080][ T9133] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 243.059109][ T9133] RIP: 0033:0x7fbe70f9c819 [ 243.059133][ T9133] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 243.059161][ T9133] RSP: 002b:00007fbe71f3d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 243.059195][ T9133] RAX: ffffffffffffffda RBX: 00007fbe71215fa0 RCX: 00007fbe70f9c819 [ 243.059215][ T9133] RDX: 0000200000100082 RSI: 0000000000000000 RDI: 0000000000000003 [ 243.059233][ T9133] RBP: 00007fbe71032c91 R08: 0000000000000000 R09: 0000000000000000 [ 243.059249][ T9133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 243.059267][ T9133] R13: 00007fbe71216038 R14: 00007fbe71215fa0 R15: 00007ffcfc411e18 [ 243.059308][ T9133] [ 243.670652][ T9143] FAULT_INJECTION: forcing a failure. [ 243.670652][ T9143] name failslab, interval 1, probability 0, space 0, times 0 [ 243.710972][ T9143] CPU: 0 UID: 0 PID: 9143 Comm: syz.2.694 Tainted: G L syzkaller #0 PREEMPT(full) [ 243.711015][ T9143] Tainted: [L]=SOFTLOCKUP [ 243.711024][ T9143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 243.711039][ T9143] Call Trace: [ 243.711047][ T9143] [ 243.711056][ T9143] dump_stack_lvl+0x100/0x190 [ 243.711092][ T9143] should_fail_ex.cold+0x5/0xa [ 243.711127][ T9143] should_failslab+0xc2/0x120 [ 243.711157][ T9143] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 243.711268][ T9143] ? prepare_creds+0x2c/0x950 [ 243.711301][ T9143] ? apparmor_capable+0x1d7/0x4d0 [ 243.711340][ T9143] ? __x64_sys_futex+0x358/0x4d0 [ 243.711376][ T9143] prepare_creds+0x2c/0x950 [ 243.711413][ T9143] __sys_setresuid+0x458/0x1280 [ 243.711452][ T9143] do_syscall_64+0x10b/0xf80 [ 243.711492][ T9143] ? clear_bhb_loop+0x40/0x90 [ 243.711525][ T9143] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 243.711554][ T9143] RIP: 0033:0x7fbe70f9c819 [ 243.711577][ T9143] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 243.711605][ T9143] RSP: 002b:00007fbe71f3d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 243.711632][ T9143] RAX: ffffffffffffffda RBX: 00007fbe71215fa0 RCX: 00007fbe70f9c819 [ 243.711653][ T9143] RDX: 0000000000000200 RSI: 0000000000000000 RDI: 0000000000000000 [ 243.711670][ T9143] RBP: 00007fbe71032c91 R08: 0000000000000000 R09: 0000000000000000 [ 243.711687][ T9143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 243.711701][ T9143] R13: 00007fbe71216038 R14: 00007fbe71215fa0 R15: 00007ffcfc411e18 [ 243.711738][ T9143] [ 244.186675][ T9157] FAULT_INJECTION: forcing a failure. [ 244.186675][ T9157] name fail_futex, interval 1, probability 0, space 0, times 0 [ 244.205170][ T9157] CPU: 0 UID: 0 PID: 9157 Comm: syz.3.695 Tainted: G L syzkaller #0 PREEMPT(full) [ 244.205217][ T9157] Tainted: [L]=SOFTLOCKUP [ 244.205228][ T9157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 244.205245][ T9157] Call Trace: [ 244.205255][ T9157] [ 244.205265][ T9157] dump_stack_lvl+0x100/0x190 [ 244.205301][ T9157] should_fail_ex.cold+0x5/0xa [ 244.205337][ T9157] get_futex_key+0x1d2/0x1510 [ 244.205371][ T9157] ? __pfx_get_futex_key+0x10/0x10 [ 244.205422][ T9157] futex_wake+0xea/0x530 [ 244.205460][ T9157] ? rcu_is_watching+0x12/0xc0 [ 244.205495][ T9157] ? __pfx_futex_wake+0x10/0x10 [ 244.205535][ T9157] ? putname+0xb1/0x110 [ 244.205567][ T9157] ? kmem_cache_free+0x127/0x6c0 [ 244.205606][ T9157] ? do_sys_openat2+0x1b4/0x1e0 [ 244.205653][ T9157] do_futex+0x32b/0x350 [ 244.205684][ T9157] ? __pfx_do_futex+0x10/0x10 [ 244.205711][ T9157] ? __pfx_do_sys_openat2+0x10/0x10 [ 244.205755][ T9157] ? __fget_files+0x21f/0x3d0 [ 244.205791][ T9157] __x64_sys_futex+0x34f/0x4d0 [ 244.205823][ T9157] ? __x64_sys_openat+0x12d/0x210 [ 244.205865][ T9157] ? __pfx___x64_sys_futex+0x10/0x10 [ 244.205903][ T9157] ? rcu_is_watching+0x12/0xc0 [ 244.205940][ T9157] do_syscall_64+0x10b/0xf80 [ 244.205981][ T9157] ? clear_bhb_loop+0x40/0x90 [ 244.206016][ T9157] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 244.206046][ T9157] RIP: 0033:0x7fc6c139c819 [ 244.206069][ T9157] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 244.206098][ T9157] RSP: 002b:00007fc6bf5f60e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 244.206125][ T9157] RAX: ffffffffffffffda RBX: 00007fc6c1616188 RCX: 00007fc6c139c819 [ 244.206145][ T9157] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007fc6c161618c [ 244.206161][ T9157] RBP: 00007fc6c1616180 R08: 0000000000000001 R09: 0000000000000000 [ 244.206178][ T9157] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000000 [ 244.206194][ T9157] R13: 00007fc6c1616218 R14: 00007ffd94b34370 R15: 00007ffd94b34458 [ 244.206227][ T9157] [ 244.851299][ T9158] NFSD: Failed to start, no listeners configured. [ 245.708698][ T9156] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 245.726965][ T9156] Bluetooth: hci2: Opcode 0x0406 failed: -4 [ 245.787526][ T9156] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 245.807053][ T9156] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 245.813475][ T9156] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 247.209273][ T9186] kexec: Could not allocate control_code_buffer [ 247.275004][ T30] audit: type=1804 audit(1776948674.567:10): pid=9208 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=open_writers comm="syz.3.709" name="/newroot/166/file0" dev="tmpfs" ino=880 res=1 errno=0 [ 247.345146][ T30] audit: type=1804 audit(1776948674.607:11): pid=9211 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=invalid_pcr cause=ToMToU comm="syz.3.709" name="/newroot/166/file0" dev="tmpfs" ino=880 res=1 errno=0 [ 247.628989][ T9220] netlink: 146 bytes leftover after parsing attributes in process `syz.0.713'. [ 247.679009][ T5843] Bluetooth: hci2: command 0x0c1a tx timeout [ 247.836419][ T5843] Bluetooth: hci0: command 0x0c1a tx timeout [ 247.842948][ T5843] Bluetooth: hci1: command 0x0c1a tx timeout [ 247.846590][ T5853] Bluetooth: hci3: command 0x0c1a tx timeout [ 247.974726][ T9228] EXT4-fs error (device sda1): trigger_test_error:130: comm syz.3.716: 7 [ 248.121067][ T9228] misc userio: No port type given on /dev/userio [ 248.580018][ T9242] bridge0: port 3(veth0_to_bridge) entered blocking state [ 248.587862][ T9242] bridge0: port 3(veth0_to_bridge) entered disabled state [ 248.595277][ T9242] veth0_to_bridge: entered allmulticast mode [ 248.613348][ T9242] veth0_to_bridge: entered promiscuous mode [ 248.622681][ T9242] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 248.650964][ T9242] bridge0: port 3(veth0_to_bridge) entered blocking state [ 248.658169][ T9242] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 248.870584][ T9246] i2c i2c-0: DVB: adapter 0 frontend 0 frequency 0 out of range (51000000..2150000000) [ 249.075744][ T9249] netlink: 342 bytes leftover after parsing attributes in process `syz.2.723'. [ 249.388693][ T9240] kexec: Could not allocate control_code_buffer [ 249.756347][ T5853] Bluetooth: hci2: command 0x0c1a tx timeout [ 250.125567][ T9274] netlink: 4 bytes leftover after parsing attributes in process `syz.0.730'. [ 250.138702][ T9274] netlink: 13 bytes leftover after parsing attributes in process `syz.0.730'. [ 250.160221][ T9274] FAULT_INJECTION: forcing a failure. [ 250.160221][ T9274] name failslab, interval 1, probability 0, space 0, times 0 [ 250.174264][ T9274] CPU: 0 UID: 0 PID: 9274 Comm: syz.0.730 Tainted: G L syzkaller #0 PREEMPT(full) [ 250.174305][ T9274] Tainted: [L]=SOFTLOCKUP [ 250.174315][ T9274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 250.174333][ T9274] Call Trace: [ 250.174343][ T9274] [ 250.174354][ T9274] dump_stack_lvl+0x100/0x190 [ 250.174391][ T9274] should_fail_ex.cold+0x5/0xa [ 250.174427][ T9274] should_failslab+0xc2/0x120 [ 250.174458][ T9274] __kmalloc_cache_noprof+0x7a/0x6f0 [ 250.174497][ T9274] ? proc_self_get_link+0x189/0x1f0 [ 250.174535][ T9274] proc_self_get_link+0x189/0x1f0 [ 250.174566][ T9274] pick_link+0xac2/0x13c0 [ 250.174593][ T9274] ? __pfx_proc_self_get_link+0x10/0x10 [ 250.174628][ T9274] step_into_slowpath+0x9ba/0xf90 [ 250.174669][ T9274] ? __pfx_step_into_slowpath+0x10/0x10 [ 250.174704][ T9274] ? lookup_fast+0x2da/0x600 [ 250.174729][ T9274] ? inode_permission+0x374/0x620 [ 250.174773][ T9274] link_path_walk+0xf28/0x1cc0 [ 250.174813][ T9274] path_openat+0x1be/0x31a0 [ 250.174844][ T9274] ? kasan_save_stack+0x3f/0x50 [ 250.174869][ T9274] ? kasan_save_stack+0x30/0x50 [ 250.174893][ T9274] ? kasan_save_track+0x14/0x30 [ 250.174918][ T9274] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 250.174977][ T9274] ? __pfx_path_openat+0x10/0x10 [ 250.175023][ T9274] do_file_open+0x20e/0x430 [ 250.175059][ T9274] ? __pfx_do_file_open+0x10/0x10 [ 250.175120][ T9274] ? alloc_fd+0x476/0x790 [ 250.175156][ T9274] ? do_getname+0x191/0x390 [ 250.175198][ T9274] do_sys_openat2+0x10d/0x1e0 [ 250.175239][ T9274] ? __pfx_do_sys_openat2+0x10/0x10 [ 250.175291][ T9274] __x64_sys_openat+0x12d/0x210 [ 250.175331][ T9274] ? __pfx___x64_sys_openat+0x10/0x10 [ 250.175370][ T9274] ? ksys_write+0x1ac/0x250 [ 250.175406][ T9274] ? rcu_is_watching+0x12/0xc0 [ 250.175444][ T9274] do_syscall_64+0x10b/0xf80 [ 250.175484][ T9274] ? clear_bhb_loop+0x40/0x90 [ 250.175518][ T9274] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 250.175547][ T9274] RIP: 0033:0x7f1e5779c819 [ 250.175569][ T9274] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 250.175597][ T9274] RSP: 002b:00007f1e559ee028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 250.175623][ T9274] RAX: ffffffffffffffda RBX: 00007f1e57a15fa0 RCX: 00007f1e5779c819 [ 250.175641][ T9274] RDX: 0000000000038000 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 250.175660][ T9274] RBP: 00007f1e57832c91 R08: 0000000000000000 R09: 0000000000000000 [ 250.175675][ T9274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 250.175692][ T9274] R13: 00007f1e57a16038 R14: 00007f1e57a15fa0 R15: 00007ffda60ee128 [ 250.175728][ T9274] [ 250.580047][ T9276] netlink: 4 bytes leftover after parsing attributes in process `syz.3.729'. [ 251.062023][ T9287] misc userio: No port type given on /dev/userio [ 251.706701][ T9317] FAULT_INJECTION: forcing a failure. [ 251.706701][ T9317] name failslab, interval 1, probability 0, space 0, times 0 [ 251.719703][ T9317] CPU: 1 UID: 0 PID: 9317 Comm: syz.3.741 Tainted: G L syzkaller #0 PREEMPT(full) [ 251.719742][ T9317] Tainted: [L]=SOFTLOCKUP [ 251.719751][ T9317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 251.719766][ T9317] Call Trace: [ 251.719774][ T9317] [ 251.719784][ T9317] dump_stack_lvl+0x100/0x190 [ 251.719815][ T9317] should_fail_ex.cold+0x5/0xa [ 251.719848][ T9317] should_failslab+0xc2/0x120 [ 251.719877][ T9317] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 251.719914][ T9317] ? do_getname+0x35/0x390 [ 251.719948][ T9317] ? find_held_lock+0x2b/0x80 [ 251.719979][ T9317] ? ksys_write+0x190/0x250 [ 251.720011][ T9317] do_getname+0x35/0x390 [ 251.720050][ T9317] do_sys_openat2+0xc5/0x1e0 [ 251.720086][ T9317] ? __pfx_do_sys_openat2+0x10/0x10 [ 251.720121][ T9317] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 251.720165][ T9317] ? __fget_files+0x21f/0x3d0 [ 251.720200][ T9317] __x64_sys_openat+0x12d/0x210 [ 251.720237][ T9317] ? __pfx___x64_sys_openat+0x10/0x10 [ 251.720273][ T9317] ? ksys_write+0x1ac/0x250 [ 251.720306][ T9317] ? rcu_is_watching+0x12/0xc0 [ 251.720340][ T9317] do_syscall_64+0x10b/0xf80 [ 251.720376][ T9317] ? clear_bhb_loop+0x40/0x90 [ 251.720407][ T9317] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 251.720433][ T9317] RIP: 0033:0x7fc6c139c819 [ 251.720455][ T9317] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 251.720478][ T9317] RSP: 002b:00007fc6c219c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 251.720503][ T9317] RAX: ffffffffffffffda RBX: 00007fc6c1615fa0 RCX: 00007fc6c139c819 [ 251.720521][ T9317] RDX: 0000000000002100 RSI: 0000200000004ec0 RDI: ffffffffffffff9c [ 251.720537][ T9317] RBP: 00007fc6c219c090 R08: 0000000000000000 R09: 0000000000000000 [ 251.720556][ T9317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 251.720571][ T9317] R13: 00007fc6c1616038 R14: 00007fc6c1615fa0 R15: 00007ffd94b34458 [ 251.720611][ T9317] [ 253.105746][ T9339] [U] [ 253.432870][ T9357] queue_state_write: unsupported operation '' [ 253.462206][ T9357] queue_state_write: use 'run', 'start' or 'kick' [ 254.218723][ T9380] netlink: 334 bytes leftover after parsing attributes in process `syz.1.754'. [ 254.270466][ T9380] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 254.523403][ T9383] FAULT_INJECTION: forcing a failure. [ 254.523403][ T9383] name failslab, interval 1, probability 0, space 0, times 0 [ 254.563774][ T9383] CPU: 0 UID: 0 PID: 9383 Comm: syz.3.756 Tainted: G L syzkaller #0 PREEMPT(full) [ 254.563817][ T9383] Tainted: [L]=SOFTLOCKUP [ 254.563827][ T9383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 254.563845][ T9383] Call Trace: [ 254.563853][ T9383] [ 254.563863][ T9383] dump_stack_lvl+0x100/0x190 [ 254.563901][ T9383] should_fail_ex.cold+0x5/0xa [ 254.563939][ T9383] should_failslab+0xc2/0x120 [ 254.563974][ T9383] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 254.564017][ T9383] ? __proc_create+0x2cb/0x8c0 [ 254.564060][ T9383] __proc_create+0x2cb/0x8c0 [ 254.564095][ T9383] ? __pfx___proc_create+0x10/0x10 [ 254.564145][ T9383] proc_mkdir+0x81/0x170 [ 254.564181][ T9383] ? __pfx_proc_mkdir+0x10/0x10 [ 254.564220][ T9383] ? cache_register_net+0x137/0x5e0 [ 254.564255][ T9383] ? cache_register_net+0x137/0x5e0 [ 254.564296][ T9383] cache_register_net+0x18f/0x5e0 [ 254.564332][ T9383] unix_gid_cache_create+0x8b/0x130 [ 254.564377][ T9383] ? __pfx_sunrpc_init_net+0x10/0x10 [ 254.564420][ T9383] sunrpc_init_net+0x71/0x190 [ 254.564448][ T9383] ops_init+0x1e2/0x5f0 [ 254.564483][ T9383] setup_net+0x118/0x3a0 [ 254.564516][ T9383] ? __pfx_setup_net+0x10/0x10 [ 254.564547][ T9383] ? mutex_init_lockdep+0xf1/0x120 [ 254.564584][ T9383] copy_net_ns+0x46f/0x7c0 [ 254.564619][ T9383] create_new_namespaces+0x3ea/0xac0 [ 254.564661][ T9383] unshare_nsproxy_namespaces+0xf2/0x220 [ 254.564706][ T9383] ksys_unshare+0x438/0xab0 [ 254.564751][ T9383] ? __pfx_ksys_unshare+0x10/0x10 [ 254.564790][ T9383] ? xfd_validate_state+0x129/0x190 [ 254.564834][ T9383] __x64_sys_unshare+0x31/0x40 [ 254.564875][ T9383] do_syscall_64+0x10b/0xf80 [ 254.564917][ T9383] ? clear_bhb_loop+0x40/0x90 [ 254.564951][ T9383] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 254.564979][ T9383] RIP: 0033:0x7fc6c139c819 [ 254.565007][ T9383] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 254.565037][ T9383] RSP: 002b:00007fc6c219c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 254.565066][ T9383] RAX: ffffffffffffffda RBX: 00007fc6c1615fa0 RCX: 00007fc6c139c819 [ 254.565086][ T9383] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 254.565104][ T9383] RBP: 00007fc6c1432c91 R08: 0000000000000000 R09: 0000000000000000 [ 254.565123][ T9383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 254.565140][ T9383] R13: 00007fc6c1616038 R14: 00007fc6c1615fa0 R15: 00007ffd94b34458 [ 254.565180][ T9383] [ 254.701228][ T9378] x86/mm: Checked W+X mappings: passed, no W+X pages found. [ 254.748036][ T9390] netlink: 354 bytes leftover after parsing attributes in process `syz.0.758'. [ 254.905759][ T9395] synth uevent: /module/l2tp_ip6: unknown uevent action string [ 255.445081][ T9416] netlink: Unknown nat attribute (0) [ 255.461855][ T9417] sd 0:0:1:0: PR command failed: 1026 [ 255.472008][ T9417] sd 0:0:1:0: Sense Key : Illegal Request [current] [ 255.485440][ T9417] sd 0:0:1:0: Add. Sense: Invalid command operation code [ 255.687624][ T1313] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.694102][ T1313] ieee802154 phy1 wpan1: encryption failed: -22 [ 255.702284][ T9422] FAULT_INJECTION: forcing a failure. [ 255.702284][ T9422] name failslab, interval 1, probability 0, space 0, times 0 [ 255.759269][ T9422] CPU: 1 UID: 0 PID: 9422 Comm: syz.2.767 Tainted: G L syzkaller #0 PREEMPT(full) [ 255.759320][ T9422] Tainted: [L]=SOFTLOCKUP [ 255.759330][ T9422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 255.759347][ T9422] Call Trace: [ 255.759355][ T9422] [ 255.759366][ T9422] dump_stack_lvl+0x100/0x190 [ 255.759404][ T9422] should_fail_ex.cold+0x5/0xa [ 255.759445][ T9422] ? lsm_blob_alloc+0x68/0x90 [ 255.759484][ T9422] should_failslab+0xc2/0x120 [ 255.759518][ T9422] __kmalloc_noprof+0xe0/0x850 [ 255.759569][ T9422] ? trace_kmem_cache_alloc+0xd5/0x100 [ 255.759609][ T9422] lsm_blob_alloc+0x68/0x90 [ 255.759643][ T9422] security_prepare_creds+0x2d/0x290 [ 255.759678][ T9422] prepare_creds+0x5d6/0x950 [ 255.759712][ T9422] __sys_setresuid+0x458/0x1280 [ 255.759753][ T9422] do_syscall_64+0x10b/0xf80 [ 255.759795][ T9422] ? clear_bhb_loop+0x40/0x90 [ 255.759830][ T9422] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 255.759859][ T9422] RIP: 0033:0x7fbe70f9c819 [ 255.759883][ T9422] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 255.759911][ T9422] RSP: 002b:00007fbe71f3d028 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 255.759939][ T9422] RAX: ffffffffffffffda RBX: 00007fbe71215fa0 RCX: 00007fbe70f9c819 [ 255.759959][ T9422] RDX: 0000000000000200 RSI: 0000000000000000 RDI: 0000000000000000 [ 255.759979][ T9422] RBP: 00007fbe71032c91 R08: 0000000000000000 R09: 0000000000000000 [ 255.759997][ T9422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 255.760014][ T9422] R13: 00007fbe71216038 R14: 00007fbe71215fa0 R15: 00007ffcfc411e18 [ 255.760051][ T9422] [ 256.071205][ T9430] netlink: 354 bytes leftover after parsing attributes in process `syz.1.768'. [ 257.923294][ T9483] netlink: 354 bytes leftover after parsing attributes in process `syz.1.781'. [ 258.209445][ T9486] FAULT_INJECTION: forcing a failure. [ 258.209445][ T9486] name failslab, interval 1, probability 0, space 0, times 0 [ 258.235586][ T9486] CPU: 0 UID: 0 PID: 9486 Comm: syz.1.782 Tainted: G L syzkaller #0 PREEMPT(full) [ 258.235634][ T9486] Tainted: [L]=SOFTLOCKUP [ 258.235644][ T9486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 258.235663][ T9486] Call Trace: [ 258.235672][ T9486] [ 258.235683][ T9486] dump_stack_lvl+0x100/0x190 [ 258.235721][ T9486] should_fail_ex.cold+0x5/0xa [ 258.235759][ T9486] should_failslab+0xc2/0x120 [ 258.235792][ T9486] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 258.235834][ T9486] ? prepare_creds+0x2c/0x950 [ 258.235863][ T9486] ? apparmor_capable+0x1d7/0x4d0 [ 258.235900][ T9486] ? __x64_sys_futex+0x358/0x4d0 [ 258.235937][ T9486] prepare_creds+0x2c/0x950 [ 258.235970][ T9486] __sys_setresuid+0x458/0x1280 [ 258.236011][ T9486] do_syscall_64+0x10b/0xf80 [ 258.236052][ T9486] ? clear_bhb_loop+0x40/0x90 [ 258.236087][ T9486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 258.236124][ T9486] RIP: 0033:0x7fbdec99c819 [ 258.236149][ T9486] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 258.236180][ T9486] RSP: 002b:00007fbded89b028 EFLAGS: 00000246 ORIG_RAX: 0000000000000075 [ 258.236206][ T9486] RAX: ffffffffffffffda RBX: 00007fbdecc15fa0 RCX: 00007fbdec99c819 [ 258.236224][ T9486] RDX: 0000000000000200 RSI: 0000000000000000 RDI: 0000000000000000 [ 258.236239][ T9486] RBP: 00007fbdeca32c91 R08: 0000000000000000 R09: 0000000000000000 [ 258.236256][ T9486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 258.236272][ T9486] R13: 00007fbdecc16038 R14: 00007fbdecc15fa0 R15: 00007ffd5465e5c8 [ 258.236306][ T9486] [ 259.551680][ T9513] netlink: 354 bytes leftover after parsing attributes in process `syz.2.790'. [ 261.058524][ T9509] kexec: Could not allocate control_code_buffer [ 261.547397][ T9547] usb usb38: selecting invalid altsetting 65537 [ 261.687777][ T9554] FAULT_INJECTION: forcing a failure. [ 261.687777][ T9554] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 261.731806][ T9554] CPU: 1 UID: 0 PID: 9554 Comm: syz.0.803 Tainted: G L syzkaller #0 PREEMPT(full) [ 261.731840][ T9554] Tainted: [L]=SOFTLOCKUP [ 261.731848][ T9554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 261.731861][ T9554] Call Trace: [ 261.731869][ T9554] [ 261.731876][ T9554] dump_stack_lvl+0x100/0x190 [ 261.731907][ T9554] should_fail_ex.cold+0x5/0xa [ 261.731936][ T9554] _copy_to_user+0x32/0xd0 [ 261.731973][ T9554] simple_read_from_buffer+0xcb/0x170 [ 261.732002][ T9554] proc_fail_nth_read+0x1af/0x230 [ 261.732036][ T9554] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 261.732065][ T9554] ? rw_verify_area+0xce/0x6d0 [ 261.732083][ T9554] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 261.732112][ T9554] vfs_read+0x1e4/0xb30 [ 261.732147][ T9554] ? __pfx_vfs_read+0x10/0x10 [ 261.732167][ T9554] ? __fget_files+0x215/0x3d0 [ 261.732197][ T9554] ? __fget_files+0x21f/0x3d0 [ 261.732227][ T9554] ksys_read+0x12a/0x250 [ 261.732248][ T9554] ? __pfx_ksys_read+0x10/0x10 [ 261.732274][ T9554] ? rcu_is_watching+0x12/0xc0 [ 261.732305][ T9554] do_syscall_64+0x10b/0xf80 [ 261.732337][ T9554] ? clear_bhb_loop+0x40/0x90 [ 261.732373][ T9554] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 261.732394][ T9554] RIP: 0033:0x7f1e5775d04e [ 261.732414][ T9554] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 261.732436][ T9554] RSP: 002b:00007f1e559edfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 261.732457][ T9554] RAX: ffffffffffffffda RBX: 00007f1e559ee6c0 RCX: 00007f1e5775d04e [ 261.732470][ T9554] RDX: 000000000000000f RSI: 00007f1e559ee0a0 RDI: 0000000000000004 [ 261.732481][ T9554] RBP: 00007f1e559ee090 R08: 0000000000000000 R09: 0000000000000000 [ 261.732493][ T9554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 261.732505][ T9554] R13: 00007f1e57a16038 R14: 00007f1e57a15fa0 R15: 00007ffda60ee128 [ 261.732537][ T9554] [ 263.462049][ T9565] kexec: Could not allocate control_code_buffer [ 263.621822][ T9596] netlink: 8 bytes leftover after parsing attributes in process `syz.2.814'. [ 263.784316][ T9596] HfR: entered promiscuous mode [ 264.554575][ T9611] sysfs_service_op_show: Client not running :-5: [ 264.675909][ T9612] random: crng reseeded on system resumption [ 264.723748][ T9612] Restarting kernel threads ... [ 264.750385][ T9612] Done restarting kernel threads. [ 265.002538][ T9625] kmem.tcp.limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 265.789950][ T9642] loop13: detected capacity change from 0 to 8 [ 265.829474][ C0] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 265.839927][ C1] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 265.849309][ C1] Buffer I/O error on dev loop13, logical block 0, async page read [ 265.859999][ C0] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 265.869379][ C0] Buffer I/O error on dev loop13, logical block 0, async page read [ 265.886478][ C0] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 265.895738][ C0] Buffer I/O error on dev loop13, logical block 0, async page read [ 265.904697][ C0] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 265.913963][ C0] Buffer I/O error on dev loop13, logical block 0, async page read [ 265.924829][ C0] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 265.934143][ C0] Buffer I/O error on dev loop13, logical block 0, async page read [ 266.074085][ C1] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 266.096607][ C1] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 266.105927][ C1] Buffer I/O error on dev loop13, logical block 0, async page read [ 266.115995][ C0] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 266.125291][ C0] Buffer I/O error on dev loop13, logical block 0, async page read [ 266.133966][ C1] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 266.143283][ C1] Buffer I/O error on dev loop13, logical block 0, async page read [ 266.152361][ C0] Buffer I/O error on dev loop13, logical block 0, async page read [ 266.162486][ C1] Buffer I/O error on dev loop13, logical block 0, async page read [ 268.193275][ T30] audit: type=1800 audit(1776948695.487:12): pid=9671 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.2.835" name="lu_gp_id" dev="configfs" ino=30657 res=0 errno=0 [ 268.354482][ T9680] FAULT_INJECTION: forcing a failure. [ 268.354482][ T9680] name failslab, interval 1, probability 0, space 0, times 0 [ 268.458771][ T9680] CPU: 0 UID: 0 PID: 9680 Comm: syz.3.832 Tainted: G L syzkaller #0 PREEMPT(full) [ 268.458814][ T9680] Tainted: [L]=SOFTLOCKUP [ 268.458825][ T9680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 268.458841][ T9680] Call Trace: [ 268.458850][ T9680] [ 268.458860][ T9680] dump_stack_lvl+0x100/0x190 [ 268.458896][ T9680] should_fail_ex.cold+0x5/0xa [ 268.458932][ T9680] should_failslab+0xc2/0x120 [ 268.458964][ T9680] __kmalloc_cache_noprof+0x7a/0x6f0 [ 268.459003][ T9680] ? snd_card_file_add+0x52/0x330 [ 268.459046][ T9680] ? __pfx_snd_pcm_playback_open+0x10/0x10 [ 268.459076][ T9680] snd_card_file_add+0x52/0x330 [ 268.459116][ T9680] ? __pfx_snd_pcm_playback_open+0x10/0x10 [ 268.459145][ T9680] snd_pcm_open+0xf1/0x710 [ 268.459175][ T9680] ? __pfx_snd_pcm_open+0x10/0x10 [ 268.459219][ T9680] ? __pfx_snd_pcm_playback_open+0x10/0x10 [ 268.459251][ T9680] snd_pcm_playback_open+0x86/0xe0 [ 268.459279][ T9680] snd_open+0x201/0x450 [ 268.459316][ T9680] ? __pfx_snd_open+0x10/0x10 [ 268.459359][ T9680] chrdev_open+0x234/0x6a0 [ 268.459393][ T9680] ? __pfx_apparmor_file_open+0x10/0x10 [ 268.459433][ T9680] ? __pfx_chrdev_open+0x10/0x10 [ 268.459468][ T9680] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 268.459512][ T9680] do_dentry_open+0x6d8/0x1660 [ 268.459544][ T9680] ? __pfx_chrdev_open+0x10/0x10 [ 268.459586][ T9680] vfs_open+0x82/0x3f0 [ 268.459629][ T9680] path_openat+0x208c/0x31a0 [ 268.459674][ T9680] ? __pfx_path_openat+0x10/0x10 [ 268.459721][ T9680] do_file_open+0x20e/0x430 [ 268.459757][ T9680] ? __pfx_do_file_open+0x10/0x10 [ 268.459817][ T9680] ? alloc_fd+0x476/0x790 [ 268.459853][ T9680] ? do_getname+0x191/0x390 [ 268.459896][ T9680] do_sys_openat2+0x10d/0x1e0 [ 268.459938][ T9680] ? __pfx_do_sys_openat2+0x10/0x10 [ 268.459981][ T9680] ? __fget_files+0x21f/0x3d0 [ 268.460020][ T9680] __x64_sys_openat+0x12d/0x210 [ 268.460062][ T9680] ? __pfx___x64_sys_openat+0x10/0x10 [ 268.460110][ T9680] ? rcu_is_watching+0x12/0xc0 [ 268.460146][ T9680] do_syscall_64+0x10b/0xf80 [ 268.460185][ T9680] ? clear_bhb_loop+0x40/0x90 [ 268.460221][ T9680] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.460251][ T9680] RIP: 0033:0x7fc6c139c819 [ 268.460273][ T9680] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 268.460300][ T9680] RSP: 002b:00007fc6bf5f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 268.460327][ T9680] RAX: ffffffffffffffda RBX: 00007fc6c1616180 RCX: 00007fc6c139c819 [ 268.460353][ T9680] RDX: 0000000000002100 RSI: 0000200000004ec0 RDI: ffffffffffffff9c [ 268.460371][ T9680] RBP: 00007fc6c1432c91 R08: 0000000000000000 R09: 0000000000000000 [ 268.460387][ T9680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 268.460403][ T9680] R13: 00007fc6c1616218 R14: 00007fc6c1616180 R15: 00007ffd94b34458 [ 268.460441][ T9680] [ 268.889437][ T9691] netlink: 354 bytes leftover after parsing attributes in process `syz.2.837'. [ 270.555302][ T9715] bridge0: port 4(batadv0) entered blocking state [ 270.573445][ T9715] bridge0: port 4(batadv0) entered disabled state [ 270.585636][ T9715] batadv0: entered allmulticast mode [ 270.596271][ T9715] batadv0: entered promiscuous mode [ 270.604628][ T9715] bridge0: port 4(batadv0) entered blocking state [ 270.611226][ T9715] bridge0: port 4(batadv0) entered forwarding state [ 270.806719][ T133] batman_adv: batadv0: No IGMP Querier present - multicast optimizations disabled [ 270.816762][ T133] batman_adv: batadv0: No MLD Querier present - multicast optimizations disabled [ 271.058920][ T9754] FAULT_INJECTION: forcing a failure. [ 271.058920][ T9754] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 271.090436][ T9754] CPU: 1 UID: 0 PID: 9754 Comm: syz.3.848 Tainted: G L syzkaller #0 PREEMPT(full) [ 271.090465][ T9754] Tainted: [L]=SOFTLOCKUP [ 271.090470][ T9754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 271.090479][ T9754] Call Trace: [ 271.090484][ T9754] [ 271.090490][ T9754] dump_stack_lvl+0x100/0x190 [ 271.090510][ T9754] should_fail_ex.cold+0x5/0xa [ 271.090528][ T9754] _copy_from_user+0x2e/0xd0 [ 271.090550][ T9754] userio_char_write+0xc1/0x450 [ 271.090570][ T9754] ? apparmor_file_permission+0x13f/0x1c0 [ 271.090592][ T9754] ? __pfx_userio_char_write+0x10/0x10 [ 271.090612][ T9754] ? bpf_iter_css_new+0x90/0x100 [ 271.090629][ T9754] ? security_file_permission+0x76/0x210 [ 271.090643][ T9754] ? rw_verify_area+0xce/0x6d0 [ 271.090658][ T9754] vfs_write+0x2aa/0x1070 [ 271.090674][ T9754] ? __pfx_userio_char_write+0x10/0x10 [ 271.090696][ T9754] ? __pfx_vfs_write+0x10/0x10 [ 271.090710][ T9754] ? find_held_lock+0x2b/0x80 [ 271.090728][ T9754] ? __fget_files+0x215/0x3d0 [ 271.090755][ T9754] ? __fget_files+0x215/0x3d0 [ 271.090777][ T9754] ? __fget_files+0x21f/0x3d0 [ 271.090797][ T9754] __x64_sys_pwrite64+0x1eb/0x250 [ 271.090814][ T9754] ? __pfx___x64_sys_pwrite64+0x10/0x10 [ 271.090832][ T9754] ? rcu_is_watching+0x12/0xc0 [ 271.090852][ T9754] do_syscall_64+0x10b/0xf80 [ 271.090873][ T9754] ? clear_bhb_loop+0x40/0x90 [ 271.090889][ T9754] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 271.090903][ T9754] RIP: 0033:0x7fc6c139c819 [ 271.090916][ T9754] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 271.090930][ T9754] RSP: 002b:00007fc6c219c028 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 271.090944][ T9754] RAX: ffffffffffffffda RBX: 00007fc6c1615fa0 RCX: 00007fc6c139c819 [ 271.090954][ T9754] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000003 [ 271.090962][ T9754] RBP: 00007fc6c219c090 R08: 0000000000000000 R09: 0000000000000000 [ 271.090970][ T9754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 271.090978][ T9754] R13: 00007fc6c1616038 R14: 00007fc6c1615fa0 R15: 00007ffd94b34458 [ 271.090996][ T9754] [ 271.572822][ T9761] netlink: 354 bytes leftover after parsing attributes in process `syz.2.850'. [ 271.755511][ T9766] FAULT_INJECTION: forcing a failure. [ 271.755511][ T9766] name failslab, interval 1, probability 0, space 0, times 0 [ 271.845765][ T9766] CPU: 1 UID: 0 PID: 9766 Comm: syz.1.851 Tainted: G L syzkaller #0 PREEMPT(full) [ 271.845805][ T9766] Tainted: [L]=SOFTLOCKUP [ 271.845814][ T9766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 271.845828][ T9766] Call Trace: [ 271.845836][ T9766] [ 271.845845][ T9766] dump_stack_lvl+0x100/0x190 [ 271.845878][ T9766] should_fail_ex.cold+0x5/0xa [ 271.845909][ T9766] ? tomoyo_encode2+0xfb/0x3c0 [ 271.845933][ T9766] should_failslab+0xc2/0x120 [ 271.845960][ T9766] __kmalloc_noprof+0xe0/0x850 [ 271.845996][ T9766] ? rcu_is_watching+0x12/0xc0 [ 271.846029][ T9766] tomoyo_encode2+0xfb/0x3c0 [ 271.846064][ T9766] tomoyo_encode+0x29/0x50 [ 271.846089][ T9766] tomoyo_realpath_from_path+0x18c/0x690 [ 271.846125][ T9766] tomoyo_check_open_permission+0x2af/0x3c0 [ 271.846166][ T9766] ? __pfx_tomoyo_check_open_permission+0x10/0x10 [ 271.846215][ T9766] ? hook_file_open+0x24e/0x7a0 [ 271.846255][ T9766] ? lock_acquire+0x1b1/0x370 [ 271.846291][ T9766] tomoyo_file_open+0x6b/0x90 [ 271.846324][ T9766] security_file_open+0xb5/0x1e0 [ 271.846350][ T9766] do_dentry_open+0x5aa/0x1660 [ 271.846400][ T9766] vfs_open+0x82/0x3f0 [ 271.846439][ T9766] path_openat+0x208c/0x31a0 [ 271.846483][ T9766] ? __pfx_path_openat+0x10/0x10 [ 271.846527][ T9766] do_file_open+0x20e/0x430 [ 271.846561][ T9766] ? __pfx_do_file_open+0x10/0x10 [ 271.846606][ T9766] ? __pfx_kfree_link+0x10/0x10 [ 271.846640][ T9766] ? alloc_fd+0x476/0x790 [ 271.846672][ T9766] ? do_getname+0x191/0x390 [ 271.846710][ T9766] do_sys_openat2+0x10d/0x1e0 [ 271.846747][ T9766] ? __pfx_do_sys_openat2+0x10/0x10 [ 271.846786][ T9766] ? __fget_files+0x21f/0x3d0 [ 271.846821][ T9766] __x64_sys_openat+0x12d/0x210 [ 271.846860][ T9766] ? __pfx___x64_sys_openat+0x10/0x10 [ 271.846903][ T9766] ? rcu_is_watching+0x12/0xc0 [ 271.846937][ T9766] do_syscall_64+0x10b/0xf80 [ 271.846973][ T9766] ? clear_bhb_loop+0x40/0x90 [ 271.847005][ T9766] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 271.847031][ T9766] RIP: 0033:0x7fbdec95d04e [ 271.847053][ T9766] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 271.847078][ T9766] RSP: 002b:00007fbded858f98 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 271.847102][ T9766] RAX: ffffffffffffffda RBX: 00007fbded8596c0 RCX: 00007fbdec95d04e [ 271.847119][ T9766] RDX: 0000000000000002 RSI: 00007fbdeca32598 RDI: ffffffffffffff9c [ 271.847135][ T9766] RBP: 00007fbdeca32c91 R08: 0000000000000000 R09: 0000000000000000 [ 271.847150][ T9766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 271.847165][ T9766] R13: 00007fbdecc16218 R14: 00007fbdecc16180 R15: 00007ffd5465e5c8 [ 271.847201][ T9766] [ 272.361856][ T9760] kexec: Could not allocate control_code_buffer [ 272.409865][ T9766] ERROR: Out of memory at tomoyo_realpath_from_path. [ 272.443806][ T9766] FAULT_INJECTION: forcing a failure. [ 272.443806][ T9766] name failslab, interval 1, probability 0, space 0, times 0 [ 272.490480][ T9766] CPU: 1 UID: 0 PID: 9766 Comm: syz.1.851 Tainted: G L syzkaller #0 PREEMPT(full) [ 272.490520][ T9766] Tainted: [L]=SOFTLOCKUP [ 272.490529][ T9766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 272.490544][ T9766] Call Trace: [ 272.490552][ T9766] [ 272.490561][ T9766] dump_stack_lvl+0x100/0x190 [ 272.490594][ T9766] should_fail_ex.cold+0x5/0xa [ 272.490626][ T9766] ? tomoyo_realpath_from_path+0xb6/0x690 [ 272.490654][ T9766] should_failslab+0xc2/0x120 [ 272.490683][ T9766] __kmalloc_noprof+0xe0/0x850 [ 272.490719][ T9766] ? kfree+0x1dd/0x6c0 [ 272.490758][ T9766] tomoyo_realpath_from_path+0xb6/0x690 [ 272.490794][ T9766] tomoyo_check_open_permission+0x2af/0x3c0 [ 272.490834][ T9766] ? __pfx_tomoyo_check_open_permission+0x10/0x10 [ 272.490886][ T9766] ? hook_file_open+0x24e/0x7a0 [ 272.490934][ T9766] ? path_get+0x61/0x80 [ 272.490971][ T9766] tomoyo_file_open+0x6b/0x90 [ 272.491003][ T9766] security_file_open+0xb5/0x1e0 [ 272.491030][ T9766] do_dentry_open+0x5aa/0x1660 [ 272.491062][ T9766] ? security_inode_permission+0xbf/0x250 [ 272.491106][ T9766] vfs_open+0x82/0x3f0 [ 272.491144][ T9766] path_openat+0x208c/0x31a0 [ 272.491188][ T9766] ? __pfx_path_openat+0x10/0x10 [ 272.491232][ T9766] do_file_open+0x20e/0x430 [ 272.491265][ T9766] ? __pfx_do_file_open+0x10/0x10 [ 272.491322][ T9766] ? alloc_fd+0x476/0x790 [ 272.491354][ T9766] ? do_getname+0x191/0x390 [ 272.491397][ T9766] do_sys_openat2+0x10d/0x1e0 [ 272.491433][ T9766] ? __pfx_do_sys_openat2+0x10/0x10 [ 272.491467][ T9766] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 272.491511][ T9766] ? __fget_files+0x21f/0x3d0 [ 272.491545][ T9766] __x64_sys_openat+0x12d/0x210 [ 272.491582][ T9766] ? __pfx___x64_sys_openat+0x10/0x10 [ 272.491616][ T9766] ? ksys_write+0x1ac/0x250 [ 272.491649][ T9766] ? rcu_is_watching+0x12/0xc0 [ 272.491683][ T9766] do_syscall_64+0x10b/0xf80 [ 272.491719][ T9766] ? clear_bhb_loop+0x40/0x90 [ 272.491751][ T9766] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 272.491777][ T9766] RIP: 0033:0x7fbdec99c819 [ 272.491801][ T9766] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 272.491825][ T9766] RSP: 002b:00007fbded859028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 272.491849][ T9766] RAX: ffffffffffffffda RBX: 00007fbdecc16180 RCX: 00007fbdec99c819 [ 272.491867][ T9766] RDX: 0000000000002100 RSI: 0000200000004ec0 RDI: ffffffffffffff9c [ 272.491883][ T9766] RBP: 00007fbded859090 R08: 0000000000000000 R09: 0000000000000000 [ 272.491899][ T9766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 272.491914][ T9766] R13: 00007fbdecc16218 R14: 00007fbdecc16180 R15: 00007ffd5465e5c8 [ 272.491950][ T9766] [ 273.130078][ T9779] tipc: Started in network mode [ 273.136067][ T9779] tipc: Node identity ee00, cluster identity 4711 [ 273.142930][ T9779] tipc: Node number set to 60928 [ 273.189180][ T9787] netlink: 40 bytes leftover after parsing attributes in process `syz.1.856'. [ 273.545002][ T9799] FAULT_INJECTION: forcing a failure. [ 273.545002][ T9799] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 273.571937][ T9799] CPU: 0 UID: 0 PID: 9799 Comm: syz.3.859 Tainted: G L syzkaller #0 PREEMPT(full) [ 273.571963][ T9799] Tainted: [L]=SOFTLOCKUP [ 273.571971][ T9799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 273.571981][ T9799] Call Trace: [ 273.571987][ T9799] [ 273.571996][ T9799] dump_stack_lvl+0x100/0x190 [ 273.572021][ T9799] should_fail_ex.cold+0x5/0xa [ 273.572040][ T9799] _copy_to_user+0x32/0xd0 [ 273.572063][ T9799] simple_read_from_buffer+0xcb/0x170 [ 273.572081][ T9799] proc_fail_nth_read+0x1af/0x230 [ 273.572103][ T9799] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 273.572125][ T9799] ? rw_verify_area+0xce/0x6d0 [ 273.572138][ T9799] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 273.572159][ T9799] vfs_read+0x1e4/0xb30 [ 273.572176][ T9799] ? __pfx_vfs_read+0x10/0x10 [ 273.572191][ T9799] ? __fget_files+0x215/0x3d0 [ 273.572215][ T9799] ? __fget_files+0x21f/0x3d0 [ 273.572236][ T9799] ksys_read+0x12a/0x250 [ 273.572251][ T9799] ? __pfx_ksys_read+0x10/0x10 [ 273.572267][ T9799] ? rcu_is_watching+0x12/0xc0 [ 273.572287][ T9799] do_syscall_64+0x10b/0xf80 [ 273.572308][ T9799] ? clear_bhb_loop+0x40/0x90 [ 273.572325][ T9799] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 273.572343][ T9799] RIP: 0033:0x7fc6c135d04e [ 273.572355][ T9799] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 273.572369][ T9799] RSP: 002b:00007fc6c219bfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 273.572382][ T9799] RAX: ffffffffffffffda RBX: 00007fc6c219c6c0 RCX: 00007fc6c135d04e [ 273.572392][ T9799] RDX: 000000000000000f RSI: 00007fc6c219c0a0 RDI: 0000000000000004 [ 273.572400][ T9799] RBP: 00007fc6c219c090 R08: 0000000000000000 R09: 0000000000000000 [ 273.572409][ T9799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 273.572417][ T9799] R13: 00007fc6c1616038 R14: 00007fc6c1615fa0 R15: 00007ffd94b34458 [ 273.572436][ T9799] [ 274.124108][ T9811] i2c i2c-0: Frontend requested software zigzag, but didn't set the frequency step size [ 277.512813][ C0] blk_print_req_error: 2 callbacks suppressed [ 277.512832][ C0] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 277.536159][ C0] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 277.545442][ C0] Buffer I/O error on dev loop13, logical block 0, async page read [ 277.555119][ C0] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 277.564357][ C0] Buffer I/O error on dev loop13, logical block 0, async page read [ 277.581166][ C0] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 277.590391][ C0] Buffer I/O error on dev loop13, logical block 0, async page read [ 277.606262][ C0] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 277.615498][ C0] Buffer I/O error on dev loop13, logical block 0, async page read [ 277.625376][ C0] I/O error, dev loop13, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 277.634604][ C0] Buffer I/O error on dev loop13, logical block 0, async page read [ 277.670326][ T9857] netlink: 8 bytes leftover after parsing attributes in process `syz.1.871'. [ 277.782753][ T9856] smpboot: CPU 1 is now offline [ 278.378552][ T9858] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 278.424497][ T9858] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 278.494623][ T9858] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 278.553024][ T9858] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 278.811210][ T9880] ICMPv6: process `syz.3.876' is using deprecated sysctl (syscall) net.ipv6.neigh.veth0_to_bridge.base_reachable_time - use net.ipv6.neigh.veth0_to_bridge.base_reachable_time_ms instead [ 280.396528][ T5853] Bluetooth: hci2: command 0x0c1a tx timeout [ 280.476595][ T5853] Bluetooth: hci3: command 0x0c1a tx timeout [ 280.556605][ T5853] Bluetooth: hci0: command 0x0c1a tx timeout [ 280.562641][ T5847] Bluetooth: hci1: command 0x0c1a tx timeout [ 285.826218][ C0] sched: DL replenish lagged too much [ 315.951029][ T1313] ieee802154 phy0 wpan0: encryption failed: -22 [ 316.258969][ T1313] ieee802154 phy1 wpan1: encryption failed: -22 [ 322.241874][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.255128][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.267721][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.280312][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.292867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.305446][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.318035][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.330620][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.343282][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 322.355862][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.246802][ C0] net_ratelimit: 6971 callbacks suppressed [ 327.246819][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.265393][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.278130][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.290867][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.303631][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.316394][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.329131][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.341847][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.354571][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 327.367307][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 332.256410][ C0] net_ratelimit: 3538 callbacks suppressed [ 332.256428][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 332.275476][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 332.288681][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 332.302230][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 332.315530][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 332.328776][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 332.341983][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 332.355258][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 332.368512][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 332.381689][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.267375][ C0] net_ratelimit: 3741 callbacks suppressed [ 337.267393][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.286808][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.300321][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.313766][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.327433][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.340844][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.354696][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.368160][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.381606][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 337.395000][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.277211][ C0] net_ratelimit: 3536 callbacks suppressed [ 342.277228][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.296522][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.309753][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.322964][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.336293][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.349550][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.362808][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.376673][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.389917][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 342.403145][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.286661][ C0] net_ratelimit: 3685 callbacks suppressed [ 347.286678][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.306083][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.319754][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.333267][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.346806][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.360272][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.373670][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.387139][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.401124][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 347.414578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.296910][ C0] net_ratelimit: 3712 callbacks suppressed [ 352.296933][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.316215][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.330099][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.343499][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.356994][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.370350][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.383823][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.397279][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.410649][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 352.424076][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.306849][ C0] net_ratelimit: 7133 callbacks suppressed [ 357.306865][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.324924][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.337544][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.350558][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.362789][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.375382][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.388421][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.400660][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 357.413230][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 357.426133][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.316771][ C0] net_ratelimit: 8701 callbacks suppressed [ 362.316787][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.334900][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 362.347221][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.359835][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.372847][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.385186][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 362.397570][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.410367][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 362.423307][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 362.435551][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 367.326748][ C0] net_ratelimit: 8998 callbacks suppressed [ 367.326765][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.344930][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 367.357281][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.369919][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 367.383004][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.395288][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 367.407671][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.420327][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 367.433338][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 367.445597][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 372.336612][ C0] net_ratelimit: 8686 callbacks suppressed [ 372.336629][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.354751][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 372.367125][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.379834][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 372.392930][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.405223][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 372.417557][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.430214][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 372.443304][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 372.455570][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 377.346339][ C0] net_ratelimit: 8738 callbacks suppressed [ 377.346355][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.364413][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 377.376671][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.389208][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.402080][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.414288][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 377.426574][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.439105][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 377.452099][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 377.464330][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 382.040488][ T1313] ieee802154 phy0 wpan0: encryption failed: -22 [ 382.356234][ C0] net_ratelimit: 8775 callbacks suppressed [ 382.356252][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 382.374356][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.386962][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.399896][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.412142][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 382.424413][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.437028][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 382.449927][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 382.462192][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 382.474503][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 384.421143][ T1313] ieee802154 phy1 wpan1: encryption failed: -22 [ 387.366398][ C0] net_ratelimit: 8516 callbacks suppressed [ 387.366416][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.385335][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.397596][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 387.409909][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.422578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.435604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.447859][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 387.460162][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 387.472812][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 387.485892][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.376597][ C0] net_ratelimit: 8818 callbacks suppressed [ 392.376617][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.395473][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.407784][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 392.420086][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.432728][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.445770][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.458064][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 392.470377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 392.483007][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 392.496328][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.386260][ C0] net_ratelimit: 8541 callbacks suppressed [ 397.386276][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.404848][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.417723][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.429975][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 397.442240][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.454779][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 397.467648][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.479866][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 397.492194][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 397.505096][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.397153][ C0] net_ratelimit: 8827 callbacks suppressed [ 402.397171][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.416249][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.428487][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 402.440765][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.453378][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.466343][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.478577][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 402.490834][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 402.503589][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 402.516494][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.407162][ C0] net_ratelimit: 8747 callbacks suppressed [ 407.407179][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.425255][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 407.437544][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.450233][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.463318][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.476358][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 407.488683][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.501332][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 407.514365][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 407.526657][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 412.416319][ C0] net_ratelimit: 9154 callbacks suppressed [ 412.416337][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.434410][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 412.446710][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.459328][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.472450][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.484705][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 412.496994][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.509608][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 412.522657][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 412.534897][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 417.426651][ C0] net_ratelimit: 8833 callbacks suppressed [ 417.426668][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.445396][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.457635][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 417.469918][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.482653][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.495518][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.507718][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 417.519985][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 417.532608][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 417.545516][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.436274][ C0] net_ratelimit: 8835 callbacks suppressed [ 422.436290][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.454371][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 422.466665][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.479305][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.492307][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.504530][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 422.516802][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.529400][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 422.542352][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 422.554576][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 427.446638][ C0] net_ratelimit: 9350 callbacks suppressed [ 427.446654][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.464706][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 427.476956][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.489481][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 427.502410][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.514619][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 427.526865][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.539424][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 427.552314][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 427.564510][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 429.796187][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 429.803156][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P9810/1:b..l [ 429.811410][ C0] rcu: (detected by 0, t=10502 jiffies, g=52341, q=1972 ncpus=1) [ 429.819203][ C0] task:syz.3.861 state:R running task stack:23224 pid:9810 tgid:9810 ppid:5840 task_flags:0x40064c flags:0x00080001 [ 429.833336][ C0] Call Trace: [ 429.836602][ C0] [ 429.839519][ C0] __schedule+0x10e9/0x6820 [ 429.844013][ C0] ? lock_acquire+0x1b1/0x370 [ 429.848676][ C0] ? lock_acquire+0x1b1/0x370 [ 429.853343][ C0] ? __pfx___schedule+0x10/0x10 [ 429.858184][ C0] ? rcu_is_watching+0x12/0xc0 [ 429.862935][ C0] preempt_schedule_irq+0x50/0x90 [ 429.867943][ C0] irqentry_exit+0x1fe/0x790 [ 429.872520][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 429.878487][ C0] RIP: 0010:unwind_next_frame+0x146e/0x2090 [ 429.884370][ C0] Code: fc ff df 48 8b 14 24 48 c1 ea 03 80 3c 02 00 0f 85 a6 08 00 00 48 89 c8 4d 8b 7d 38 48 ba 00 00 00 00 00 fc ff df 48 c1 e8 03 <0f> b6 34 10 48 8d 41 01 48 89 c7 48 c1 ef 03 0f b6 14 17 48 89 cf [ 429.903961][ C0] RSP: 0018:ffffc900059aef30 EFLAGS: 00000a06 [ 429.910013][ C0] RAX: 1ffffffff23199dd RBX: 0000000000000001 RCX: ffffffff918cceea [ 429.917962][ C0] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: ffffffff90ffee60 [ 429.925915][ C0] RBP: ffffc900059aefe8 R08: ffffffff918cceee R09: 0000000000000007 [ 429.933867][ C0] R10: 0000000000000200 R11: 0000000000018fb1 R12: ffffc900059aeff0 [ 429.941816][ C0] R13: ffffc900059aefa0 R14: 0000000000000003 R15: ffffc900059afa88 [ 429.949779][ C0] ? dput.part.0+0x456/0x570 [ 429.954380][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 429.960520][ C0] arch_stack_walk+0x94/0xf0 [ 429.965101][ C0] ? dput.part.0+0x456/0x570 [ 429.969680][ C0] stack_trace_save+0x8e/0xc0 [ 429.974351][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 429.979713][ C0] ? __lock_acquire+0x4a5/0x2630 [ 429.984629][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 429.990418][ C0] ? lockdep_hardirqs_on+0x78/0x100 [ 429.995611][ C0] save_stack+0x162/0x1e0 [ 429.999930][ C0] ? __pfx_save_stack+0x10/0x10 [ 430.004762][ C0] ? free_unref_folios+0xa0d/0x16f0 [ 430.009948][ C0] ? folios_put_refs+0x571/0xa90 [ 430.014868][ C0] ? shmem_undo_range+0x5e5/0x1570 [ 430.019954][ C0] ? shmem_evict_inode+0x3f3/0xc40 [ 430.025043][ C0] ? evict+0x3c2/0xad0 [ 430.029094][ C0] ? iput.part.0+0x605/0xf50 [ 430.033665][ C0] ? iput+0x35/0x40 [ 430.037456][ C0] ? dentry_unlink_inode+0x2c0/0x4c0 [ 430.042727][ C0] ? __dentry_kill+0x1d0/0x690 [ 430.047474][ C0] ? finish_dput+0x76/0x480 [ 430.051982][ C0] ? dput.part.0+0x456/0x570 [ 430.056557][ C0] ? page_ext_put+0x3e/0xd0 [ 430.061046][ C0] __reset_page_owner+0x84/0x190 [ 430.065971][ C0] free_unref_folios+0xa0d/0x16f0 [ 430.070984][ C0] ? __print_lock_name+0x60/0x80 [ 430.075903][ C0] ? folios_put_refs+0x50a/0xa90 [ 430.080828][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 430.086622][ C0] folios_put_refs+0x571/0xa90 [ 430.091377][ C0] ? __pfx_folios_put_refs+0x10/0x10 [ 430.096652][ C0] ? folio_batch_remove_exceptionals+0x115/0x1a0 [ 430.102972][ C0] shmem_undo_range+0x5e5/0x1570 [ 430.107893][ C0] ? __pfx_shmem_undo_range+0x10/0x10 [ 430.113259][ C0] ? __lock_acquire+0x4a5/0x2630 [ 430.118186][ C0] ? rcu_is_watching+0x12/0xc0 [ 430.122931][ C0] ? trace_hrtimer_start+0x79/0x230 [ 430.128112][ C0] shmem_evict_inode+0x3f3/0xc40 [ 430.133028][ C0] ? inode_wait_for_writeback+0x171/0x390 [ 430.138724][ C0] ? finish_task_switch.isra.0+0x2cb/0x1010 [ 430.144595][ C0] ? __pfx_shmem_evict_inode+0x10/0x10 [ 430.150033][ C0] ? __pfx_inode_wait_for_writeback+0x10/0x10 [ 430.156096][ C0] ? find_held_lock+0x2b/0x80 [ 430.160753][ C0] ? evict+0x37e/0xad0 [ 430.164807][ C0] ? evict+0x37e/0xad0 [ 430.168860][ C0] ? __pfx_shmem_evict_inode+0x10/0x10 [ 430.174332][ C0] evict+0x3c2/0xad0 [ 430.178235][ C0] ? find_held_lock+0x2b/0x80 [ 430.182911][ C0] ? __pfx_evict+0x10/0x10 [ 430.187343][ C0] ? iput.part.0+0x5fd/0xf50 [ 430.191925][ C0] iput.part.0+0x605/0xf50 [ 430.196334][ C0] ? __pfx_inode_just_drop+0x10/0x10 [ 430.201605][ C0] iput+0x35/0x40 [ 430.205227][ C0] dentry_unlink_inode+0x2c0/0x4c0 [ 430.210776][ C0] __dentry_kill+0x1d0/0x690 [ 430.215356][ C0] finish_dput+0x76/0x480 [ 430.219673][ C0] dput.part.0+0x456/0x570 [ 430.224075][ C0] dput+0x1f/0x30 [ 430.227694][ C0] __fput+0x519/0xb50 [ 430.231661][ C0] task_work_run+0x150/0x240 [ 430.236233][ C0] ? __pfx_task_work_run+0x10/0x10 [ 430.241325][ C0] ? do_raw_spin_unlock+0x145/0x1e0 [ 430.246511][ C0] do_exit+0x8d2/0x2a60 [ 430.250657][ C0] ? __pfx_do_exit+0x10/0x10 [ 430.255232][ C0] ? __pfx_proc_coredump_connector+0x10/0x10 [ 430.261200][ C0] do_group_exit+0xd5/0x2a0 [ 430.265695][ C0] get_signal+0x1ec7/0x21e0 [ 430.270191][ C0] ? __pfx_get_signal+0x10/0x10 [ 430.275027][ C0] arch_do_signal_or_restart+0x91/0x770 [ 430.280557][ C0] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 430.286693][ C0] ? cond_local_irq_disable.part.0+0x33/0x40 [ 430.292669][ C0] ? exc_general_protection+0x120/0x240 [ 430.298197][ C0] ? rcu_is_watching+0x12/0xc0 [ 430.302944][ C0] irqentry_exit+0x403/0x790 [ 430.307521][ C0] asm_exc_general_protection+0x26/0x30 [ 430.313057][ C0] RIP: 0033:0x7fc6c139c821 [ 430.317462][ C0] RSP: 002b:0000200000000030 EFLAGS: 00010217 [ 430.323505][ C0] RAX: 0000000000000000 RBX: 00007fc6c1615fa0 RCX: 00007fc6c139c819 [ 430.331456][ C0] RDX: 0000200000000040 RSI: 0000200000000030 RDI: 0000000000000200 [ 430.339406][ C0] RBP: 00007fc6c1432c91 R08: 0000200000000100 R09: 0000200000000100 [ 430.347353][ C0] R10: 00002000000000c0 R11: 0000000000000206 R12: 0000000000000000 [ 430.355305][ C0] R13: 00007fc6c1616038 R14: 00007fc6c1615fa0 R15: 00007ffd94b34458 [ 430.363273][ C0] [ 430.366282][ C0] rcu: rcu_preempt kthread starved for 2388 jiffies! g52341 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 430.377366][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 430.387323][ C0] rcu: RCU grace-period kthread stack dump: [ 430.393185][ C0] task:rcu_preempt state:R running task stack:28904 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 [ 430.406647][ C0] Call Trace: [ 430.409934][ C0] [ 430.412849][ C0] __schedule+0x10e9/0x6820 [ 430.417354][ C0] ? __pfx___schedule+0x10/0x10 [ 430.422184][ C0] ? find_held_lock+0x2b/0x80 [ 430.426844][ C0] ? schedule+0x2bf/0x390 [ 430.431157][ C0] schedule+0xdd/0x390 [ 430.435207][ C0] schedule_timeout+0x127/0x280 [ 430.440039][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 430.445390][ C0] ? __pfx_process_timeout+0x10/0x10 [ 430.450671][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 430.456462][ C0] ? prepare_to_swait_event+0xdf/0x4a0 [ 430.461910][ C0] rcu_gp_fqs_loop+0x1a9/0x900 [ 430.466669][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 430.471943][ C0] ? prepare_to_swait_event+0xae/0x4a0 [ 430.477387][ C0] ? __pfx_rcu_gp_init+0x10/0x10 [ 430.482318][ C0] ? __pfx_rcu_gp_cleanup+0x10/0x10 [ 430.487505][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 430.493296][ C0] rcu_gp_kthread+0x179/0x230 [ 430.497964][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 430.503149][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 430.508941][ C0] ? __kthread_parkme+0x18c/0x230 [ 430.513950][ C0] ? kthread+0x13a/0x450 [ 430.518176][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 430.523358][ C0] kthread+0x370/0x450 [ 430.527412][ C0] ? __pfx_kthread+0x10/0x10 [ 430.531986][ C0] ret_from_fork+0x72b/0xd50 [ 430.536559][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 430.541653][ C0] ? __switch_to+0x800/0x1100 [ 430.546313][ C0] ? __switch_to_asm+0x39/0x70 [ 430.551061][ C0] ? __pfx_kthread+0x10/0x10 [ 430.555642][ C0] ret_from_fork_asm+0x1a/0x30 [ 430.560400][ C0] [ 430.563396][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 430.569697][ C0] CPU: 0 UID: 0 PID: 7682 Comm: kworker/u8:21 Tainted: G L syzkaller #0 PREEMPT(full) [ 430.580781][ C0] Tainted: [L]=SOFTLOCKUP [ 430.585089][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 430.595125][ C0] Workqueue: bat_events batadv_tt_purge [ 430.600745][ C0] RIP: 0010:lock_release+0x19e/0x310 [ 430.606008][ C0] Code: ff 65 0f c1 05 db 59 2f 12 83 f8 01 0f 85 28 01 00 00 9c 58 f6 c4 02 0f 85 13 01 00 00 41 f7 c6 00 02 00 00 0f 85 c0 00 00 00 <48> 8b 44 24 10 65 48 2b 05 2d 12 2f 12 0f 85 4e 01 00 00 48 83 c4 [ 430.625596][ C0] RSP: 0018:ffffc90000006a60 EFLAGS: 00000206 [ 430.631643][ C0] RAX: 0000000000000046 RBX: ffffffff8e7e5260 RCX: ffffc90000006a6c [ 430.639597][ C0] RDX: 0000000000000005 RSI: ffffffff8df2fec2 RDI: ffffffff8c1c1080 [ 430.647547][ C0] RBP: ffffffff81b851ae R08: 0000000000000001 R09: 0000000000000007 [ 430.655495][ C0] R10: 0000000000000200 R11: 0000000000085e06 R12: ffff88802f0f0000 [ 430.663444][ C0] R13: ffffc90000006b18 R14: 0000000000000202 R15: 0000000000000006 [ 430.671392][ C0] FS: 0000000000000000(0000) GS:ffff8881242e2000(0000) knlGS:0000000000000000 [ 430.680300][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 430.686862][ C0] CR2: 00007fddd521ee80 CR3: 000000007c23c000 CR4: 00000000003526f0 [ 430.694812][ C0] Call Trace: [ 430.698072][ C0] [ 430.700901][ C0] unwind_next_frame+0x3c3/0x2090 [ 430.705924][ C0] ? __skb_ext_put+0x102/0x2f0 [ 430.710674][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 430.716829][ C0] arch_stack_walk+0x94/0xf0 [ 430.721407][ C0] ? skb_release_head_state+0x2c8/0x400 [ 430.726932][ C0] ? __skb_ext_put+0x102/0x2f0 [ 430.731677][ C0] stack_trace_save+0x8e/0xc0 [ 430.736343][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 430.741699][ C0] ? __lock_acquire+0x4a5/0x2630 [ 430.746614][ C0] ? ip6_pol_route+0x2a3/0x1230 [ 430.751446][ C0] kasan_save_stack+0x30/0x50 [ 430.756098][ C0] ? kasan_save_stack+0x30/0x50 [ 430.761022][ C0] ? kasan_save_track+0x14/0x30 [ 430.765852][ C0] ? kasan_save_free_info+0x3b/0x70 [ 430.771034][ C0] ? __kasan_slab_free+0x5f/0x80 [ 430.775949][ C0] ? kmem_cache_free+0x127/0x6c0 [ 430.780867][ C0] ? __skb_ext_put+0x102/0x2f0 [ 430.785634][ C0] kasan_save_track+0x14/0x30 [ 430.790294][ C0] kasan_save_free_info+0x3b/0x70 [ 430.795377][ C0] __kasan_slab_free+0x5f/0x80 [ 430.800141][ C0] kmem_cache_free+0x127/0x6c0 [ 430.804908][ C0] __skb_ext_put+0x102/0x2f0 [ 430.809490][ C0] ? ipv6_chk_mcast_addr+0x2b0/0x9a0 [ 430.814760][ C0] ? ip6_mc_input+0x832/0xf50 [ 430.819431][ C0] skb_release_head_state+0x2c8/0x400 [ 430.824786][ C0] sk_skb_reason_drop+0xc4/0x1b0 [ 430.829708][ C0] ip6_mc_input+0x832/0xf50 [ 430.834215][ C0] ? __pfx_ip6_mc_input+0x10/0x10 [ 430.839242][ C0] ? ip6_rcv_finish_core.isra.0+0x113/0x1260 [ 430.845217][ C0] ? __pfx_ip6_mc_input+0x10/0x10 [ 430.850230][ C0] ip6_rcv_finish+0x294/0x300 [ 430.854895][ C0] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 430.860086][ C0] ip_sabotage_in+0x21e/0x290 [ 430.864753][ C0] nf_hook_slow+0xbf/0x220 [ 430.869157][ C0] nf_hook.constprop.0+0x2a6/0x750 [ 430.874260][ C0] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 430.879452][ C0] ? __pfx_nf_hook.constprop.0+0x10/0x10 [ 430.885088][ C0] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 430.890279][ C0] ? __pfx_ipv6_rcv+0x10/0x10 [ 430.894939][ C0] ipv6_rcv+0xa4/0x3d0 [ 430.898992][ C0] ? __pfx_ipv6_rcv+0x10/0x10 [ 430.903650][ C0] __netif_receive_skb_one_core+0x12d/0x1e0 [ 430.909528][ C0] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 430.915929][ C0] ? lock_acquire+0x1b1/0x370 [ 430.920591][ C0] __netif_receive_skb+0x1f/0x120 [ 430.925602][ C0] netif_receive_skb+0x13b/0x7f0 [ 430.930540][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 430.935984][ C0] ? __pfx_netif_receive_skb+0x10/0x10 [ 430.941434][ C0] br_pass_frame_up+0x346/0x490 [ 430.946272][ C0] br_handle_frame_finish+0xa74/0x1f60 [ 430.951721][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 430.957600][ C0] ? __local_bh_enable_ip+0x9e/0x120 [ 430.962870][ C0] ? ip6t_do_table+0xc1d/0x1c90 [ 430.967703][ C0] ? __pfx_ip6t_do_table+0x10/0x10 [ 430.972795][ C0] ? nf_hook_slow+0x167/0x220 [ 430.977461][ C0] br_nf_hook_thresh+0x30d/0x420 [ 430.982383][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 430.988262][ C0] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 430.993710][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 430.999588][ C0] ? __pfx_nf_nat_ipv6_in+0x10/0x10 [ 431.004768][ C0] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 431.010644][ C0] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 431.016521][ C0] br_nf_pre_routing_finish_ipv6+0x659/0xdd0 [ 431.022487][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 431.028370][ C0] br_nf_pre_routing_ipv6+0x39c/0x8b0 [ 431.033729][ C0] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 431.039605][ C0] ? lock_acquire+0x1b1/0x370 [ 431.044274][ C0] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 431.050777][ C0] ? net_generic+0xea/0x2a0 [ 431.055285][ C0] br_nf_pre_routing+0x90f/0x1560 [ 431.060306][ C0] br_handle_frame+0xcdd/0x1520 [ 431.065144][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 431.070428][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 431.076311][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 431.081583][ C0] __netif_receive_skb_core.constprop.0+0x6c5/0x3530 [ 431.088249][ C0] ? kmem_cache_free+0x127/0x6c0 [ 431.093174][ C0] ? skb_release_data+0x6ca/0x8e0 [ 431.098176][ C0] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 431.105275][ C0] ? kfree_skbmem+0x19f/0x210 [ 431.109936][ C0] ? sk_skb_reason_drop+0x114/0x1b0 [ 431.115115][ C0] ? ip6_mc_input+0x51a/0xf50 [ 431.119780][ C0] ? __pfx_ip6_mc_input+0x10/0x10 [ 431.124794][ C0] ? __lock_acquire+0x4a5/0x2630 [ 431.129713][ C0] ? process_backlog+0x32a/0x1580 [ 431.134719][ C0] __netif_receive_skb_one_core+0xb0/0x1e0 [ 431.140510][ C0] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 431.146908][ C0] ? lock_acquire+0x1b1/0x370 [ 431.151565][ C0] ? process_backlog+0x32a/0x1580 [ 431.156571][ C0] ? process_backlog+0x32a/0x1580 [ 431.161578][ C0] __netif_receive_skb+0x1f/0x120 [ 431.166588][ C0] process_backlog+0x37a/0x1580 [ 431.171428][ C0] __napi_poll.constprop.0+0xaf/0x450 [ 431.176802][ C0] net_rx_action+0xa40/0xf20 [ 431.181381][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 431.186476][ C0] ? __print_lock_name+0x60/0x80 [ 431.191395][ C0] ? try_to_wake_up+0x153/0x1900 [ 431.196313][ C0] ? kvm_sched_clock_read+0x11/0x20 [ 431.201495][ C0] ? sched_clock+0x38/0x60 [ 431.205896][ C0] ? sched_clock_cpu+0x6c/0x570 [ 431.210741][ C0] ? mark_held_locks+0x40/0x70 [ 431.215494][ C0] handle_softirqs+0x1ea/0xa00 [ 431.220246][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 431.225518][ C0] ? __hrtimer_rearm_deferred+0x9b/0x740 [ 431.231148][ C0] ? batadv_tt_purge+0x25d/0xbd0 [ 431.236068][ C0] do_softirq+0xac/0xe0 [ 431.240205][ C0] [ 431.243115][ C0] [ 431.246023][ C0] __local_bh_enable_ip+0xf8/0x120 [ 431.251118][ C0] batadv_tt_purge+0x25d/0xbd0 [ 431.255881][ C0] ? __pfx_batadv_tt_purge+0x10/0x10 [ 431.261151][ C0] ? rcu_is_watching+0x12/0xc0 [ 431.265897][ C0] process_one_work+0xa0e/0x1980 [ 431.270822][ C0] ? __pfx_process_one_work+0x10/0x10 [ 431.276190][ C0] ? __pfx_batadv_tt_purge+0x10/0x10 [ 431.281459][ C0] worker_thread+0x5ef/0xe50 [ 431.286034][ C0] ? kthread+0x13a/0x450 [ 431.290261][ C0] ? __pfx_worker_thread+0x10/0x10 [ 431.295351][ C0] kthread+0x370/0x450 [ 431.299407][ C0] ? __pfx_kthread+0x10/0x10 [ 431.303984][ C0] ret_from_fork+0x72b/0xd50 [ 431.308555][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 431.313648][ C0] ? __switch_to+0x800/0x1100 [ 431.318309][ C0] ? __switch_to_asm+0x39/0x70 [ 431.323056][ C0] ? __pfx_kthread+0x10/0x10 [ 431.327633][ C0] ret_from_fork_asm+0x1a/0x30 [ 431.332387][ C0] [ 432.456719][ C0] net_ratelimit: 6249 callbacks suppressed [ 432.456736][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.475583][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.487849][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 432.500160][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.512762][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.525785][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.538013][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 432.550318][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 432.562959][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 432.575949][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.467200][ C0] net_ratelimit: 7931 callbacks suppressed [ 437.467217][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.485294][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 437.497575][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.510165][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 437.523103][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.535370][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0) [ 437.547658][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.560251][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 437.573182][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 437.585455][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:86:eb:b9:5b:d4:2e, vlan:0)