last executing test programs: 6m55.076335554s ago: executing program 0 (id=2308): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone(0x102311, 0x0, 0x0, 0x0, 0x0, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) 6m54.888166333s ago: executing program 0 (id=2317): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) io_setup(0x82, &(0x7f0000000240)=0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x138) io_submit(r2, 0x1, &(0x7f0000000300)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x4001, r3, &(0x7f0000000080)='N-5f', 0x4, 0x3, 0x0, 0x0, r3}]) 6m54.782825714s ago: executing program 0 (id=2323): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000000500), 0x0, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4) writev(r3, &(0x7f00000000c0)=[{&(0x7f0000012380)="580000001500add427323b470c47b45602067fffffff81004e220700000000000000a8002000eaa57b00090080020efffeffe809020000ff0004f03a007357ac8ddc1fdd00000000000004ffffffe7ee0000000044c60000", 0x58}], 0x1) 6m54.759664586s ago: executing program 0 (id=2324): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00), 0x0, 0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$tipc(r2, 0x0, &(0x7f0000000100)) 6m54.681724114s ago: executing program 0 (id=2329): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket(0x10, 0x3, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x1a1043, 0xc5) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000003c0)={0xd8, 0x0, 0x200}) mmap(&(0x7f000029a000/0x1000)=nil, 0x1000, 0xc, 0x4002011, r3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000980)={0x802}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x1000000, 0x0, 0xfffffd11, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002180)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r7, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x18, 0x52, 0x1, 0xfffffffc, 0x0, {0xa}, [@typed={0x4, 0x2, 0x0, 0x0, @binary}]}, 0x18}}, 0x0) 6m54.671801215s ago: executing program 0 (id=2330): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) (async) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') (async) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_usb_connect(0x0, 0x3b, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000ec13b2106d04d308280b0102030109022900010000000009046900000e01000008240501020205050764f7edb276"], 0x0) syz_usb_control_io(r2, &(0x7f0000000300)={0x2c, 0x0, &(0x7f0000000140)={0x0, 0x3, 0x2, @string={0x2}}, 0x0, 0x0, 0x0}, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='pids.events\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r4, @ANYRES64=r3], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) (async) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) (async) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r5, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={&(0x7f0000000d40)={0x14, 0x7, 0x1, 0x101, 0x0, 0x0, {0x2, 0x0, 0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x4008880}, 0x20000040) (async) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@version_u}]}}) 6m39.635516482s ago: executing program 32 (id=2330): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) (async) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') (async) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r2 = syz_usb_connect(0x0, 0x3b, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000ec13b2106d04d308280b0102030109022900010000000009046900000e01000008240501020205050764f7edb276"], 0x0) syz_usb_control_io(r2, &(0x7f0000000300)={0x2c, 0x0, &(0x7f0000000140)={0x0, 0x3, 0x2, @string={0x2}}, 0x0, 0x0, 0x0}, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='pids.events\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r4, @ANYRES64=r3], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0) ioctl$KVM_X86_SETUP_MCE(r4, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) (async) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) (async) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r5, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={&(0x7f0000000d40)={0x14, 0x7, 0x1, 0x101, 0x0, 0x0, {0x2, 0x0, 0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x4008880}, 0x20000040) (async) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@version_u}]}}) 5m17.588022665s ago: executing program 3 (id=4304): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x0, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) close_range(r2, 0xffffffffffffffff, 0x0) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) setns(r4, 0x24020000) r5 = syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_pidfd_open(r5, 0x0) socket$unix(0x1, 0x3, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r7, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r7, @ANYRES64=r6], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r7, 0x0) ioctl$KVM_X86_SETUP_MCE(r7, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) 5m17.515780742s ago: executing program 3 (id=4306): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, 0x0) 5m17.412606252s ago: executing program 3 (id=4307): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r3, @ANYRES64=r2], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000040)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x103, 0x3}) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r4, 0x0) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r5, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x1}) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r5, 0x0) r6 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x1000, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f00000003c0)={0x44, 0x0, &(0x7f0000000180)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f0000000580)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000}], 0x0, 0x0, 0x0}) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) io_setup(0x3ff, &(0x7f0000000500)) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r8, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r8, @ANYRES64=r7], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r8, 0x0) 5m17.396105234s ago: executing program 3 (id=4309): mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x12c5008, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x20000805, 0x0, 0x0) mount$bind(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000008, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') read$FUSE(r3, &(0x7f0000006b40)={0x2020}, 0x2020) 5m17.268855667s ago: executing program 3 (id=4313): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) 5m16.960860948s ago: executing program 3 (id=4320): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r3 = syz_create_resource$binfmt(0x0) r4 = openat$binfmt(0xffffffffffffff9c, r3, 0x42, 0x1ff) close(r4) 5m16.9358041s ago: executing program 33 (id=4320): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r3 = syz_create_resource$binfmt(0x0) r4 = openat$binfmt(0xffffffffffffff9c, r3, 0x42, 0x1ff) close(r4) 1m3.86488031s ago: executing program 1 (id=10298): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f00000000c0)={0x1d, r3}, 0x10) sendmsg$can_bcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1, 0xc10, 0x1, {0x77359400}, {0x77359400}, {}, 0x1, @canfd={{0x2, 0x1, 0x1, 0x1}, 0x14, 0x3, 0x0, 0x0, "fa7efc9b891e7fa191c62a9dda33ee9b37c8238ac55837db30d8f04a1417b4ee1a7f5a04e75d3c8ee5c25b21ca5f8782270b9673950de954657a186d30f16359"}}, 0x80}, 0x1, 0x0, 0x0, 0x4048001}, 0x0) 1m3.833051543s ago: executing program 1 (id=10299): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00), 0x0, 0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x19) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) 1m3.176093169s ago: executing program 1 (id=10301): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x4]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000000200), 0x1, 0x4) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r2, 0x0, 0x2, 0x0) 1m3.071485949s ago: executing program 2 (id=10303): rt_sigaction(0x2b, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x5b]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$pppl2tp(0x18, 0x1, 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$pppl2tp(r2, &(0x7f0000000300)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x4, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, 0x32) r4 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r4, &(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e21, @remote}, 0x4, 0x4}}, 0x26) ioctl$PPPIOCGL2TPSTATS(r4, 0x40047459, 0xfffffffffffffffe) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1d, 0x526d630517582f25, 0x6}) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r6, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r6, @ANYRES64=r5], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r6, 0x0) ioctl$KVM_X86_SETUP_MCE(r6, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f0000000500)={0x0, {0x2, 0x4e21, @empty}, {0x2, 0x4e20, @local}, {0x2, 0x4e20, @empty}, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r8 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_GETDRIVER(r8, 0x41045508, &(0x7f0000000200)={0x0, "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"}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x4048aec9, &(0x7f0000000080)={[{0xfffffffc, 0x0, 0x9, 0xc, 0x4, 0x81, 0x0, 0x66, 0x5, 0x4, 0x80, 0xb, 0xa5}, {0x7, 0x3, 0x0, 0x3, 0x1c, 0x23, 0xfd, 0x0, 0x2, 0x4, 0x3, 0x2}, {0x200003, 0x2, 0x20, 0x8, 0x40, 0x0, 0x5f, 0x5, 0x0, 0x2, 0x0, 0x3, 0x8}], 0x1fffeff}) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a040007000000b6f1ffff0000854105001a"], 0x38}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000010200fd000005000500000000000a"], 0x70}}, 0x0) sendmmsg(r9, &(0x7f0000000180), 0x3ef, 0x0) 1m2.968854199s ago: executing program 1 (id=10305): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x4]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) fcntl$lock(r2, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r2, 0x26, &(0x7f0000000080)={0x1, 0x0, 0x2007, 0x1fd}) fcntl$lock(r2, 0x6, &(0x7f0000000280)={0x1, 0x0, 0x9, 0x7}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) 1m2.892850027s ago: executing program 2 (id=10306): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1002, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r2, 0x800448d2, 0x0) futex(0x0, 0x5, 0xfffefffe, 0x0, 0x0, 0x1) syz_usb_control_io(0xffffffffffffffff, &(0x7f00000003c0)={0x2c, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) quotactl_fd$Q_SYNC(r2, 0xffffffff80000100, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r3, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r3, &(0x7f0000004200)={0x50, 0x0, r4}, 0x50) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(r3, &(0x7f00000042c0), 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006380)={0x20, 0x0, 0x0, {0x0, 0x8}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getdents64(r5, &(0x7f00000063c0)=""/1024, 0x400) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket$nl_generic(0x10, 0x3, 0x10) lstat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)) 1m2.892653117s ago: executing program 4 (id=10307): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f00000000c0)={0x1d, r3}, 0x10) sendmsg$can_bcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1, 0xc10, 0x1, {0x77359400}, {0x77359400}, {}, 0x1, @canfd={{0x2, 0x1, 0x1, 0x1}, 0x14, 0x3, 0x0, 0x0, "fa7efc9b891e7fa191c62a9dda33ee9b37c8238ac55837db30d8f04a1417b4ee1a7f5a04e75d3c8ee5c25b21ca5f8782270b9673950de954657a186d30f16359"}}, 0x80}, 0x1, 0x0, 0x0, 0x4048001}, 0x0) 1m2.85745028s ago: executing program 1 (id=10308): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING_ACQ_REL(r1, 0x4068aea3, &(0x7f0000000040)={0xdf, 0x0, 0x10000}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x1002, 0x0) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r4, 0x4008af60, &(0x7f0000000140)={@my=0x1}) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder1\x00', 0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000140)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) r5 = socket$unix(0x1, 0x1, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100), 0x212000, 0x0) getsockname$unix(r5, 0x0, &(0x7f0000000080)) r6 = socket(0x10, 0x3, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000080)={'syztnl1\x00', r8, 0x4, 0x5, 0x7, 0x401, 0x25, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x10, 0x80, 0x5}}) 1m2.832323233s ago: executing program 4 (id=10309): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x1f000000, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x956, 0x0, 0x11, 0x2}]}) 1m2.732934403s ago: executing program 4 (id=10310): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x4]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, 0x0, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x5, 0x0, 0x0) 1m2.729708133s ago: executing program 4 (id=10311): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="800000000001010400000000000000000200000024000180"], 0x80}}, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815"], 0x65) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x3e) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) rt_sigprocmask(0x0, 0x0, &(0x7f0000000240), 0x0) chdir(&(0x7f0000000140)='./bus\x00') syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001700)={0x0, &(0x7f0000000280)={0x18, 0x0, 0x7f, {0x7}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000dc0)={0x20, 0xffffffffffffffda, 0x2, {0x0, 0x0, 0x7fffffff, 0x1000}}, 0x0}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0xc0189436, &(0x7f0000000140)) 1m2.619533294s ago: executing program 4 (id=10312): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x4]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000000200), 0x1, 0x4) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) wait4(r2, 0x0, 0x2, 0x0) 1m2.168703299s ago: executing program 5 (id=10315): unshare(0x60000600) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00), 0x0, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000240)={0x2, 0x6e24, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) 1m1.416255914s ago: executing program 1 (id=10316): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x4]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x1, 0x0, 0x2007, 0x1fd}) fcntl$lock(r1, 0x6, &(0x7f0000000280)={0x1, 0x0, 0x9, 0x7}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) close_range(r2, 0xffffffffffffffff, 0x0) 59.075309739s ago: executing program 2 (id=10317): rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) connect$can_bcm(r2, &(0x7f00000000c0)={0x1d, r3}, 0x10) sendmsg$can_bcm(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1, 0xc10, 0x1, {0x77359400}, {0x77359400}, {}, 0x1, @canfd={{0x2, 0x1, 0x1, 0x1}, 0x14, 0x3, 0x0, 0x0, "fa7efc9b891e7fa191c62a9dda33ee9b37c8238ac55837db30d8f04a1417b4ee1a7f5a04e75d3c8ee5c25b21ca5f8782270b9673950de954657a186d30f16359"}}, 0x80}, 0x1, 0x0, 0x0, 0x4048001}, 0x0) 58.083601888s ago: executing program 4 (id=10318): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e20, @loopback}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = syz_clone(0x81248080, 0x0, 0x4c, 0x0, 0x0, 0x0) ptrace(0x10, r4) futex(&(0x7f000000cffc)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x3, 0x801, 0x0, 0x0, 0x0) waitid(0x1, r4, 0x0, 0x4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r6, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r6, @ANYRES64=r5], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r6, 0x0) ioctl$KVM_X86_SETUP_MCE(r6, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f0000000040)) r7 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) add_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_MP_STATE(r7, 0x4004ae99, &(0x7f0000000000)=0x7) 49.280582809s ago: executing program 5 (id=10319): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x4]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, 0x0, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x5, 0x0, 0x0) 46.243265873s ago: executing program 2 (id=10320): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="800000000001010400000000000000000200000024000180"], 0x80}}, 0x0) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757815"], 0x65) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_flowlabel\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x3e) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000080)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) rt_sigprocmask(0x0, 0x0, &(0x7f0000000240), 0x0) chdir(&(0x7f0000000140)='./bus\x00') syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001700)={0x0, &(0x7f0000000280)={0x18, 0x0, 0x7f, {0x7}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000dc0)={0x20, 0xffffffffffffffda, 0x2, {0x0, 0x0, 0x7fffffff, 0x1000}}, 0x0}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0xc0189436, &(0x7f0000000140)) 45.244843163s ago: executing program 34 (id=10316): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x4]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r0, @ANYRES64], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) fcntl$lock(r1, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x1, 0x0, 0x2007, 0x1fd}) fcntl$lock(r1, 0x6, &(0x7f0000000280)={0x1, 0x0, 0x9, 0x7}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) close_range(r2, 0xffffffffffffffff, 0x0) 41.660662651s ago: executing program 5 (id=10322): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000006a80), 0x1, 0x0) write$vga_arbiter(r2, &(0x7f0000000580)=ANY=[@ANYBLOB='trylock ie'], 0xc) 38.851571342s ago: executing program 35 (id=10318): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'tunl0\x00', {0x2, 0x4e20, @loopback}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = syz_clone(0x81248080, 0x0, 0x4c, 0x0, 0x0, 0x0) ptrace(0x10, r4) futex(&(0x7f000000cffc)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) futex(0x0, 0x3, 0x801, 0x0, 0x0, 0x0) waitid(0x1, r4, 0x0, 0x4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r6, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r6, @ANYRES64=r5], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r6, 0x0) ioctl$KVM_X86_SETUP_MCE(r6, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f0000000040)) r7 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) add_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_MP_STATE(r7, 0x4004ae99, &(0x7f0000000000)=0x7) 31.522896426s ago: executing program 2 (id=10324): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x1]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) syz_usb_connect$hid(0x1, 0x36, &(0x7f0000001140)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x8, 0x458, 0x5015, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x1, 0x10, 0x6b, [{{0x9, 0x4, 0x0, 0xd, 0x1, 0x3, 0x1, 0x2, 0x0, {0x9, 0x21, 0xffff, 0x8, 0x1, {0x22, 0x312}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x40, 0x0, 0x9}}}}}]}}]}}, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x3, [{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}]}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_CAP_DIRTY_LOG_RING_ACQ_REL(r1, 0x4068aea3, &(0x7f0000000040)={0xdf, 0x0, 0x10000}) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) flock(0xffffffffffffffff, 0x0) 30.611264157s ago: executing program 5 (id=10325): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x4]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, 0x0, 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000000200), 0x1, 0x4) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r2, 0x0, 0x2, 0x0) 28.861190382s ago: executing program 5 (id=10326): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x4]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000000200), 0x1, 0x4) r2 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r2) wait4(r2, 0x0, 0x2, 0x0) 27.665174661s ago: executing program 5 (id=10327): unshare(0x60000600) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, 0x0, 0x0) 24.661685562s ago: executing program 2 (id=10328): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000180)={0x14, 0x2, 0x6, 0x201, 0x0, 0x0, {0x3}}, 0x14}, 0x1, 0x0, 0x0, 0xc040}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000004c0)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x1, 0xfffff00c}, {0x20, 0x0, 0x0, 0xdffff010}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f00000000c0), 0x3f, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r3, @ANYRES64=r2], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x3}) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r4, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000000c0)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x50, 0x0, &(0x7f0000000040)="c77f63941720024fcb205ad3f3502124f14eba8419d2d70aade14d22ca5137369a7e2f7c68839e02d428fe526929aaaeb71b01b4a33854d4ca7681b53a970b1a4175371ccff2ad1d15ed65d48b413559"}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f00000002c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400}], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) (async) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000180)={0x14, 0x2, 0x6, 0x201, 0x0, 0x0, {0x3}}, 0x14}, 0x1, 0x0, 0x0, 0xc040}, 0x0) (async) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000004c0)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x1, 0xfffff00c}, {0x20, 0x0, 0x0, 0xdffff010}, {0x6}]}, 0x10) (async) sendmmsg$unix(r0, &(0x7f00000000c0), 0x3f, 0x0) (async) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) (async) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r3, @ANYRES64=r2], 0x118) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) (async) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) (async) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) (async) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x3}) (async) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r4, 0x0) (async) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000000c0)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x50, 0x0, &(0x7f0000000040)="c77f63941720024fcb205ad3f3502124f14eba8419d2d70aade14d22ca5137369a7e2f7c68839e02d428fe526929aaaeb71b01b4a33854d4ca7681b53a970b1a4175371ccff2ad1d15ed65d48b413559"}) (async) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f00000002c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400}], 0x0, 0x0, 0x0}) (async) 12.270839132s ago: executing program 36 (id=10327): unshare(0x60000600) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, 0x0, 0x0) 0s ago: executing program 37 (id=10328): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000180)={0x14, 0x2, 0x6, 0x201, 0x0, 0x0, {0x3}}, 0x14}, 0x1, 0x0, 0x0, 0xc040}, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000004c0)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x1, 0xfffff00c}, {0x20, 0x0, 0x0, 0xdffff010}, {0x6}]}, 0x10) sendmmsg$unix(r0, &(0x7f00000000c0), 0x3f, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r3, @ANYRES64=r2], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x3}) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r4, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000000c0)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x50, 0x0, &(0x7f0000000040)="c77f63941720024fcb205ad3f3502124f14eba8419d2d70aade14d22ca5137369a7e2f7c68839e02d428fe526929aaaeb71b01b4a33854d4ca7681b53a970b1a4175371ccff2ad1d15ed65d48b413559"}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f00000002c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400}], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) (async) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000180)={0x14, 0x2, 0x6, 0x201, 0x0, 0x0, {0x3}}, 0x14}, 0x1, 0x0, 0x0, 0xc040}, 0x0) (async) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000004c0)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x1, 0xfffff00c}, {0x20, 0x0, 0x0, 0xdffff010}, {0x6}]}, 0x10) (async) sendmmsg$unix(r0, &(0x7f00000000c0), 0x3f, 0x0) (async) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) (async) socket$inet6_tcp(0xa, 0x1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) (async) write$UHID_CREATE2(r3, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r3, @ANYRES64=r2], 0x118) (async) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r3, 0x0) (async) ioctl$KVM_X86_SETUP_MCE(r3, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) (async) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) (async) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) (async) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000140)={0x73622a85, 0x1381, 0x3}) (async) mmap$binder(&(0x7f00000a0000)=nil, 0x2000, 0x1, 0x11, r4, 0x0) (async) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000000c0)={0x4, 0x0, &(0x7f0000000000)=[@register_looper], 0x50, 0x0, &(0x7f0000000040)="c77f63941720024fcb205ad3f3502124f14eba8419d2d70aade14d22ca5137369a7e2f7c68839e02d428fe526929aaaeb71b01b4a33854d4ca7681b53a970b1a4175371ccff2ad1d15ed65d48b413559"}) (async) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f00000002c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400}], 0x0, 0x0, 0x0}) (async) kernel console output (not intermixed with test programs): 07fa9873e5fa0 RCX: 00007fa98718e0dc [ 403.492619][T20547] RDX: 000000000000000f RSI: 00007fa9880e60a0 RDI: 0000000000000006 [ 403.492633][T20547] RBP: 00007fa9880e6090 R08: 0000000000000000 R09: 0000000000000000 [ 403.492646][T20547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 403.492660][T20547] R13: 00007fa9873e6038 R14: 00007fa9873e5fa0 R15: 00007ffd27407e58 [ 403.492678][T20547] [ 404.730217][T20606] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9292'. [ 404.831325][ T36] kauditd_printk_skb: 3 callbacks suppressed [ 404.831345][ T36] audit: type=1400 audit(2000000295.046:529): avc: denied { write } for pid=20618 comm="syz.1.9305" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 404.899651][ T36] audit: type=1400 audit(2000000295.076:530): avc: denied { remove_name } for pid=20618 comm="syz.1.9305" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 404.949566][ T36] audit: type=1400 audit(2000000295.086:531): avc: denied { unlink } for pid=20618 comm="syz.1.9305" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 405.257314][T20651] SELinux: security_context_str_to_sid (syte) failed with errno=-22 [ 405.301361][ T36] audit: type=1400 audit(2000000295.516:532): avc: denied { getopt } for pid=20652 comm="syz.1.9322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 405.383210][T20657] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9324'. [ 405.594411][T20667] bridge0: port 4(dummy0) entered blocking state [ 405.619629][T20667] bridge0: port 4(dummy0) entered disabled state [ 405.626073][T20667] dummy0: entered allmulticast mode [ 405.650060][T20667] dummy0: entered promiscuous mode [ 405.655334][T20667] bridge0: port 4(dummy0) entered blocking state [ 405.661745][T20667] bridge0: port 4(dummy0) entered forwarding state [ 405.902612][T20683] bridge0: port 3(bond_slave_0) entered blocking state [ 405.920180][T20683] bridge0: port 3(bond_slave_0) entered disabled state [ 405.929725][T20683] bond_slave_0: entered allmulticast mode [ 405.941103][T20683] bond_slave_0: entered promiscuous mode [ 406.020733][T20688] bridge0: port 4(dummy0) entered blocking state [ 406.027239][T20688] bridge0: port 4(dummy0) entered disabled state [ 406.064091][T20688] dummy0: entered allmulticast mode [ 406.080224][T20688] dummy0: entered promiscuous mode [ 406.087756][T20688] bridge0: port 4(dummy0) entered blocking state [ 406.094178][T20688] bridge0: port 4(dummy0) entered forwarding state [ 406.652708][T20710] netlink: 'syz.1.9349': attribute type 29 has an invalid length. [ 406.656912][T20711] netlink: 556 bytes leftover after parsing attributes in process `syz.4.9348'. [ 406.950768][T20729] netlink: 556 bytes leftover after parsing attributes in process `syz.1.9359'. [ 407.005071][T20732] netlink: 96 bytes leftover after parsing attributes in process `syz.4.9361'. [ 407.243542][T20749] netlink: 556 bytes leftover after parsing attributes in process `syz.1.9368'. [ 407.461217][T20761] FAULT_INJECTION: forcing a failure. [ 407.461217][T20761] name failslab, interval 1, probability 0, space 0, times 0 [ 407.498963][T20761] CPU: 1 UID: 0 PID: 20761 Comm: syz.5.9373 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 407.499004][T20761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 407.499019][T20761] Call Trace: [ 407.499028][T20761] [ 407.499038][T20761] __dump_stack+0x21/0x30 [ 407.499075][T20761] dump_stack_lvl+0x10c/0x190 [ 407.499106][T20761] ? __cfi_dump_stack_lvl+0x10/0x10 [ 407.499138][T20761] ? proc_tid_base_lookup+0x2f/0x40 [ 407.499170][T20761] ? do_filp_open+0x1c6/0x3e0 [ 407.499198][T20761] ? do_sys_openat2+0x12c/0x1c0 [ 407.499228][T20761] ? __x64_sys_openat+0x13a/0x170 [ 407.499258][T20761] ? do_syscall_64+0x58/0xf0 [ 407.499289][T20761] dump_stack+0x19/0x20 [ 407.499317][T20761] should_fail_ex+0x3d9/0x530 [ 407.499342][T20761] should_failslab+0xac/0x100 [ 407.499373][T20761] kmem_cache_alloc_noprof+0x42/0x430 [ 407.499394][T20761] ? __asan_memcpy+0x5a/0x80 [ 407.499412][T20761] ? vm_area_dup+0x42/0x570 [ 407.499437][T20761] vm_area_dup+0x42/0x570 [ 407.499460][T20761] __split_vma+0x1bd/0xa80 [ 407.499485][T20761] ? vms_gather_munmap_vmas+0xdd0/0xdd0 [ 407.499511][T20761] ? mas_find+0x3f1/0x5f0 [ 407.499535][T20761] vms_gather_munmap_vmas+0x428/0xdd0 [ 407.499563][T20761] mmap_region+0x598/0x1bc0 [ 407.499588][T20761] ? __cfi_mmap_region+0x10/0x10 [ 407.499613][T20761] ? __kasan_check_read+0x15/0x20 [ 407.499647][T20761] ? arch_get_unmapped_area_topdown+0x232/0x8d0 [ 407.499677][T20761] ? file_mmap_ok+0x147/0x1a0 [ 407.499706][T20761] do_mmap+0xb6d/0x13c0 [ 407.499729][T20761] ? __cfi_do_mmap+0x10/0x10 [ 407.499748][T20761] ? down_write_killable+0xe9/0x2d0 [ 407.499773][T20761] ? __cfi_down_write_killable+0x10/0x10 [ 407.499800][T20761] vm_mmap_pgoff+0x38f/0x4e0 [ 407.499823][T20761] ? __cfi_vm_mmap_pgoff+0x10/0x10 [ 407.499845][T20761] ? __fget_files+0x2c5/0x340 [ 407.499872][T20761] ksys_mmap_pgoff+0x166/0x1e0 [ 407.499894][T20761] __x64_sys_mmap+0x121/0x140 [ 407.499929][T20761] x64_sys_call+0x13bf/0x2ee0 [ 407.499964][T20761] do_syscall_64+0x58/0xf0 [ 407.499992][T20761] ? clear_bhb_loop+0x50/0xa0 [ 407.500018][T20761] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 407.500042][T20761] RIP: 0033:0x7f6de458f6c9 [ 407.500074][T20761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.500094][T20761] RSP: 002b:00007f6de547b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 407.500118][T20761] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458f6c9 [ 407.500136][T20761] RDX: 0000000000000000 RSI: 0000000000002000 RDI: 0000200000003000 [ 407.500151][T20761] RBP: 00007f6de547b090 R08: 0000000000000005 R09: 00000000ffffd000 [ 407.500167][T20761] R10: 0000000002000011 R11: 0000000000000246 R12: 0000000000000001 [ 407.500182][T20761] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 407.500203][T20761] [ 408.616991][T20821] FAULT_INJECTION: forcing a failure. [ 408.616991][T20821] name failslab, interval 1, probability 0, space 0, times 0 [ 408.669361][T20821] CPU: 0 UID: 0 PID: 20821 Comm: syz.5.9400 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 408.669400][T20821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 408.669415][T20821] Call Trace: [ 408.669423][T20821] [ 408.669433][T20821] __dump_stack+0x21/0x30 [ 408.669469][T20821] dump_stack_lvl+0x10c/0x190 [ 408.669501][T20821] ? __cfi_dump_stack_lvl+0x10/0x10 [ 408.669540][T20821] dump_stack+0x19/0x20 [ 408.669565][T20821] should_fail_ex+0x3d9/0x530 [ 408.669586][T20821] should_failslab+0xac/0x100 [ 408.669610][T20821] kmem_cache_alloc_noprof+0x42/0x430 [ 408.669633][T20821] ? do_timer_create+0x199/0x1210 [ 408.669669][T20821] ? vfs_write+0x93e/0xf30 [ 408.669690][T20821] do_timer_create+0x199/0x1210 [ 408.669725][T20821] ? __cfi_vfs_write+0x10/0x10 [ 408.669746][T20821] ? __kasan_check_write+0x18/0x20 [ 408.669780][T20821] ? mutex_unlock+0x8b/0x240 [ 408.669812][T20821] ? __cfi_mutex_unlock+0x10/0x10 [ 408.669833][T20821] ? __ia32_sys_clock_nanosleep_time32+0xc0/0xc0 [ 408.669871][T20821] ? __kasan_check_write+0x18/0x20 [ 408.669906][T20821] __x64_sys_timer_create+0x140/0x190 [ 408.669938][T20821] ? __cfi___x64_sys_timer_create+0x10/0x10 [ 408.669970][T20821] ? __kasan_check_read+0x15/0x20 [ 408.670005][T20821] x64_sys_call+0x2704/0x2ee0 [ 408.670040][T20821] do_syscall_64+0x58/0xf0 [ 408.670069][T20821] ? clear_bhb_loop+0x50/0xa0 [ 408.670095][T20821] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 408.670120][T20821] RIP: 0033:0x7f6de458f6c9 [ 408.670139][T20821] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.670159][T20821] RSP: 002b:00007f6de547b038 EFLAGS: 00000246 ORIG_RAX: 00000000000000de [ 408.670184][T20821] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458f6c9 [ 408.670202][T20821] RDX: 0000000000000000 RSI: 0000200000533fa0 RDI: 0000000000000000 [ 408.670217][T20821] RBP: 00007f6de547b090 R08: 0000000000000000 R09: 0000000000000000 [ 408.670232][T20821] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.670246][T20821] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 408.670267][T20821] [ 409.659330][T20874] rust_binder: BC_CLEAR_DEATH_NOTIFICATION invalid ref 1 [ 409.669318][T20874] rust_binder: BC_REQUEST_DEATH_NOTIFICATION invalid ref 2 [ 409.980391][T20896] FAULT_INJECTION: forcing a failure. [ 409.980391][T20896] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 410.013842][T20896] CPU: 1 UID: 0 PID: 20896 Comm: syz.4.9434 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 410.013880][T20896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 410.013895][T20896] Call Trace: [ 410.013904][T20896] [ 410.013912][T20896] __dump_stack+0x21/0x30 [ 410.013948][T20896] dump_stack_lvl+0x10c/0x190 [ 410.013978][T20896] ? __cfi_dump_stack_lvl+0x10/0x10 [ 410.014010][T20896] ? check_stack_object+0x12c/0x140 [ 410.014033][T20896] dump_stack+0x19/0x20 [ 410.014062][T20896] should_fail_ex+0x3d9/0x530 [ 410.014086][T20896] should_fail+0xf/0x20 [ 410.014106][T20896] should_fail_usercopy+0x1e/0x30 [ 410.014131][T20896] _copy_from_user+0x22/0xb0 [ 410.014160][T20896] __copy_msghdr+0x3ec/0x5d0 [ 410.014194][T20896] ___sys_sendmsg+0x1a6/0x2a0 [ 410.014227][T20896] ? __sys_sendmsg+0x280/0x280 [ 410.014260][T20896] ? proc_fail_nth_write+0x17e/0x210 [ 410.014290][T20896] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 410.014328][T20896] __x64_sys_sendmsg+0x1eb/0x2c0 [ 410.014360][T20896] ? fput+0x1a5/0x240 [ 410.014387][T20896] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 410.014420][T20896] ? ksys_write+0x1ef/0x250 [ 410.014443][T20896] ? __kasan_check_read+0x15/0x20 [ 410.014478][T20896] x64_sys_call+0x2a4c/0x2ee0 [ 410.014511][T20896] do_syscall_64+0x58/0xf0 [ 410.014540][T20896] ? clear_bhb_loop+0x50/0xa0 [ 410.014565][T20896] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 410.014589][T20896] RIP: 0033:0x7fa90c58f6c9 [ 410.014608][T20896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 410.014645][T20896] RSP: 002b:00007fa90d392038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 410.014670][T20896] RAX: ffffffffffffffda RBX: 00007fa90c7e5fa0 RCX: 00007fa90c58f6c9 [ 410.014701][T20896] RDX: 0000000000040880 RSI: 00002000000004c0 RDI: 0000000000000005 [ 410.014717][T20896] RBP: 00007fa90d392090 R08: 0000000000000000 R09: 0000000000000000 [ 410.014733][T20896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 410.014748][T20896] R13: 00007fa90c7e6038 R14: 00007fa90c7e5fa0 R15: 00007ffe31571a38 [ 410.014770][T20896] [ 410.696871][T20928] netlink: 536 bytes leftover after parsing attributes in process `syz.5.9449'. [ 410.774361][T20934] netlink: 96 bytes leftover after parsing attributes in process `syz.2.9452'. [ 410.914242][T20949] FAULT_INJECTION: forcing a failure. [ 410.914242][T20949] name fail_futex, interval 1, probability 0, space 0, times 0 [ 410.919647][T20951] netlink: 8 bytes leftover after parsing attributes in process `syz.2.9460'. [ 410.927183][T20949] CPU: 0 UID: 0 PID: 20949 Comm: syz.5.9461 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 410.927223][T20949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 410.927241][T20949] Call Trace: [ 410.927253][T20949] [ 410.927264][T20949] __dump_stack+0x21/0x30 [ 410.927307][T20949] dump_stack_lvl+0x10c/0x190 [ 410.927342][T20949] ? __cfi_dump_stack_lvl+0x10/0x10 [ 410.927388][T20949] ? kernel_text_address+0xa9/0xe0 [ 410.927422][T20949] dump_stack+0x19/0x20 [ 410.927454][T20949] should_fail_ex+0x3d9/0x530 [ 410.927484][T20949] should_fail+0xf/0x20 [ 410.927508][T20949] get_futex_key+0x16b/0x930 [ 410.927534][T20949] ? __cfi_get_futex_key+0x10/0x10 [ 410.927558][T20949] ? _parse_integer+0x2e/0x40 [ 410.927597][T20949] ? refill_pi_state_cache+0x56/0x220 [ 410.927628][T20949] futex_requeue+0x21c/0x12e0 [ 410.927658][T20949] ? kstrtouint+0x78/0xf0 [ 410.927681][T20949] ? kstrtouint_from_user+0xfb/0x150 [ 410.927705][T20949] ? __x64_sys_openat+0x13a/0x170 [ 410.927740][T20949] ? x64_sys_call+0xe69/0x2ee0 [ 410.927777][T20949] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 410.927803][T20949] ? __cfi_futex_requeue+0x10/0x10 [ 410.927835][T20949] ? __kasan_check_write+0x18/0x20 [ 410.927875][T20949] ? proc_fail_nth_write+0x17e/0x210 [ 410.927912][T20949] ? bpf_lsm_file_permission+0xd/0x20 [ 410.927949][T20949] ? vfs_write+0x93e/0xf30 [ 410.927974][T20949] do_futex+0x330/0x500 [ 410.928001][T20949] ? __cfi_do_futex+0x10/0x10 [ 410.928026][T20949] ? mutex_unlock+0x8b/0x240 [ 410.928049][T20949] ? __fget_files+0x2c5/0x340 [ 410.928080][T20949] __se_sys_futex+0x28f/0x300 [ 410.928107][T20949] ? fput+0x1a5/0x240 [ 410.928137][T20949] ? __x64_sys_futex+0x110/0x110 [ 410.928164][T20949] ? __cfi_ksys_write+0x10/0x10 [ 410.928190][T20949] __x64_sys_futex+0xe9/0x110 [ 410.928237][T20949] x64_sys_call+0x227f/0x2ee0 [ 410.928276][T20949] do_syscall_64+0x58/0xf0 [ 410.928308][T20949] ? clear_bhb_loop+0x50/0xa0 [ 410.928338][T20949] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 410.928373][T20949] RIP: 0033:0x7f6de458f6c9 [ 410.928395][T20949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 410.928418][T20949] RSP: 002b:00007f6de547b038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 410.928447][T20949] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458f6c9 [ 410.928469][T20949] RDX: 0000000000000001 RSI: 000000000000000c RDI: 000020000000cffc [ 410.928487][T20949] RBP: 00007f6de547b090 R08: 0000200000048000 R09: 0000000000000000 [ 410.928506][T20949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 410.928523][T20949] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 410.928547][T20949] [ 411.096810][T20956] netlink: 536 bytes leftover after parsing attributes in process `syz.1.9459'. [ 411.114074][T20953] netlink: 96 bytes leftover after parsing attributes in process `syz.5.9462'. [ 411.331119][T20975] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9471'. [ 411.438183][T20985] FAULT_INJECTION: forcing a failure. [ 411.438183][T20985] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 411.479197][T20985] CPU: 0 UID: 0 PID: 20985 Comm: syz.1.9476 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 411.479238][T20985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 411.479254][T20985] Call Trace: [ 411.479262][T20985] [ 411.479272][T20985] __dump_stack+0x21/0x30 [ 411.479306][T20985] dump_stack_lvl+0x10c/0x190 [ 411.479337][T20985] ? __cfi_dump_stack_lvl+0x10/0x10 [ 411.479374][T20985] ? check_stack_object+0x107/0x140 [ 411.479398][T20985] dump_stack+0x19/0x20 [ 411.479427][T20985] should_fail_ex+0x3d9/0x530 [ 411.479453][T20985] should_fail+0xf/0x20 [ 411.479475][T20985] should_fail_usercopy+0x1e/0x30 [ 411.479501][T20985] _copy_from_user+0x22/0xb0 [ 411.479531][T20985] __sys_connect+0x136/0x440 [ 411.479563][T20985] ? __cfi___sys_connect+0x10/0x10 [ 411.479605][T20985] ? __kasan_check_read+0x15/0x20 [ 411.479641][T20985] __x64_sys_connect+0x7e/0x90 [ 411.479672][T20985] x64_sys_call+0x1c2f/0x2ee0 [ 411.479706][T20985] do_syscall_64+0x58/0xf0 [ 411.479737][T20985] ? clear_bhb_loop+0x50/0xa0 [ 411.479763][T20985] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 411.479789][T20985] RIP: 0033:0x7f0eb2f8f6c9 [ 411.479809][T20985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 411.479829][T20985] RSP: 002b:00007f0eb3df4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 411.479856][T20985] RAX: ffffffffffffffda RBX: 00007f0eb31e5fa0 RCX: 00007f0eb2f8f6c9 [ 411.479873][T20985] RDX: 0000000000000011 RSI: 0000200000000000 RDI: 0000000000000006 [ 411.479890][T20985] RBP: 00007f0eb3df4090 R08: 0000000000000000 R09: 0000000000000000 [ 411.479907][T20985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 411.479922][T20985] R13: 00007f0eb31e6038 R14: 00007f0eb31e5fa0 R15: 00007ffd41735288 [ 411.479943][T20985] [ 411.679867][T20989] netlink: 96 bytes leftover after parsing attributes in process `syz.1.9477'. [ 411.904148][T21009] netlink: 96 bytes leftover after parsing attributes in process `syz.2.9487'. [ 411.953783][T21013] FAULT_INJECTION: forcing a failure. [ 411.953783][T21013] name failslab, interval 1, probability 0, space 0, times 0 [ 411.976556][T21015] netlink: 556 bytes leftover after parsing attributes in process `syz.1.9490'. [ 412.039163][T21013] CPU: 1 UID: 0 PID: 21013 Comm: syz.4.9489 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 412.039208][T21013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 412.039223][T21013] Call Trace: [ 412.039232][T21013] [ 412.039242][T21013] __dump_stack+0x21/0x30 [ 412.039285][T21013] dump_stack_lvl+0x10c/0x190 [ 412.039316][T21013] ? __cfi_dump_stack_lvl+0x10/0x10 [ 412.039347][T21013] ? release_sock+0x171/0x1f0 [ 412.039375][T21013] dump_stack+0x19/0x20 [ 412.039403][T21013] should_fail_ex+0x3d9/0x530 [ 412.039426][T21013] should_failslab+0xac/0x100 [ 412.039451][T21013] kmem_cache_alloc_node_noprof+0x45/0x440 [ 412.039473][T21013] ? netlink_data_ready+0x20/0x20 [ 412.039502][T21013] ? __alloc_skb+0x10c/0x370 [ 412.039530][T21013] __alloc_skb+0x10c/0x370 [ 412.039558][T21013] netlink_alloc_large_skb+0xf7/0x1b0 [ 412.039586][T21013] netlink_sendmsg+0x586/0xaf0 [ 412.039619][T21013] ? __cfi_netlink_sendmsg+0x10/0x10 [ 412.039653][T21013] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 412.039680][T21013] ? security_socket_sendmsg+0x33/0xd0 [ 412.039702][T21013] ? __cfi_netlink_sendmsg+0x10/0x10 [ 412.039734][T21013] ____sys_sendmsg+0xa15/0xa70 [ 412.039768][T21013] ? __sys_sendmsg_sock+0x50/0x50 [ 412.039802][T21013] ? import_iovec+0x81/0xb0 [ 412.039834][T21013] ___sys_sendmsg+0x220/0x2a0 [ 412.039867][T21013] ? __sys_sendmsg+0x280/0x280 [ 412.039900][T21013] ? proc_fail_nth_write+0x17e/0x210 [ 412.039930][T21013] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 412.039967][T21013] __x64_sys_sendmsg+0x1eb/0x2c0 [ 412.039999][T21013] ? fput+0x1a5/0x240 [ 412.040025][T21013] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 412.040058][T21013] ? ksys_write+0x1ef/0x250 [ 412.040081][T21013] ? __kasan_check_read+0x15/0x20 [ 412.040117][T21013] x64_sys_call+0x2a4c/0x2ee0 [ 412.040151][T21013] do_syscall_64+0x58/0xf0 [ 412.040180][T21013] ? clear_bhb_loop+0x50/0xa0 [ 412.040205][T21013] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 412.040240][T21013] RIP: 0033:0x7fa90c58f6c9 [ 412.040259][T21013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.040286][T21013] RSP: 002b:00007fa90d392038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 412.040311][T21013] RAX: ffffffffffffffda RBX: 00007fa90c7e5fa0 RCX: 00007fa90c58f6c9 [ 412.040330][T21013] RDX: 0000000000000000 RSI: 0000200000000340 RDI: 0000000000000005 [ 412.040345][T21013] RBP: 00007fa90d392090 R08: 0000000000000000 R09: 0000000000000000 [ 412.040379][T21013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 412.040394][T21013] R13: 00007fa90c7e6038 R14: 00007fa90c7e5fa0 R15: 00007ffe31571a38 [ 412.040415][T21013] [ 412.105626][T21024] netlink: 20 bytes leftover after parsing attributes in process `syz.4.9494'. [ 412.370013][T21030] FAULT_INJECTION: forcing a failure. [ 412.370013][T21030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 412.399586][T21031] rust_binder: 21026 RLIMIT_NICE not set [ 412.419176][T21030] CPU: 0 UID: 0 PID: 21030 Comm: syz.2.9497 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 412.419216][T21030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 412.419231][T21030] Call Trace: [ 412.419239][T21030] [ 412.419249][T21030] __dump_stack+0x21/0x30 [ 412.419286][T21030] dump_stack_lvl+0x10c/0x190 [ 412.419316][T21030] ? __cfi_dump_stack_lvl+0x10/0x10 [ 412.419348][T21030] ? check_stack_object+0x12c/0x140 [ 412.419372][T21030] dump_stack+0x19/0x20 [ 412.419401][T21030] should_fail_ex+0x3d9/0x530 [ 412.419425][T21030] should_fail+0xf/0x20 [ 412.419446][T21030] should_fail_usercopy+0x1e/0x30 [ 412.419481][T21030] _copy_to_user+0x24/0xa0 [ 412.419509][T21030] simple_read_from_buffer+0xed/0x160 [ 412.419539][T21030] proc_fail_nth_read+0x19e/0x210 [ 412.419570][T21030] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 412.419601][T21030] ? bpf_lsm_file_permission+0xd/0x20 [ 412.419631][T21030] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 412.419661][T21030] vfs_read+0x27d/0xc70 [ 412.419682][T21030] ? __cfi_vfs_read+0x10/0x10 [ 412.419702][T21030] ? __kasan_check_write+0x18/0x20 [ 412.419736][T21030] ? mutex_lock+0x92/0x1c0 [ 412.419757][T21030] ? __cfi_mutex_lock+0x10/0x10 [ 412.419778][T21030] ? __fget_files+0x2c5/0x340 [ 412.419819][T21030] ksys_read+0x141/0x250 [ 412.419840][T21030] ? __cfi_ksys_read+0x10/0x10 [ 412.419861][T21030] ? __kasan_check_read+0x15/0x20 [ 412.419895][T21030] __x64_sys_read+0x7f/0x90 [ 412.419916][T21030] x64_sys_call+0x2638/0x2ee0 [ 412.419954][T21030] do_syscall_64+0x58/0xf0 [ 412.419984][T21030] ? clear_bhb_loop+0x50/0xa0 [ 412.420010][T21030] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 412.420034][T21030] RIP: 0033:0x7fa98718e0dc [ 412.420053][T21030] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 412.420075][T21030] RSP: 002b:00007fa9880e6030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 412.420100][T21030] RAX: ffffffffffffffda RBX: 00007fa9873e5fa0 RCX: 00007fa98718e0dc [ 412.420118][T21030] RDX: 000000000000000f RSI: 00007fa9880e60a0 RDI: 0000000000000005 [ 412.420135][T21030] RBP: 00007fa9880e6090 R08: 0000000000000000 R09: 0000000000000000 [ 412.420150][T21030] R10: 0000000000000009 R11: 0000000000000246 R12: 0000000000000001 [ 412.420165][T21030] R13: 00007fa9873e6038 R14: 00007fa9873e5fa0 R15: 00007ffd27407e58 [ 412.420185][T21030] [ 414.092118][T21100] random: crng reseeded on system resumption [ 414.104692][ T46] Bluetooth: hci0: Frame reassembly failed (-84) [ 414.179533][ T36] audit: type=1400 audit(2000000304.397:533): avc: denied { ioctl } for pid=21114 comm="syz.5.9533" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 414.352767][T21140] FAULT_INJECTION: forcing a failure. [ 414.352767][T21140] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 414.366292][T21140] CPU: 0 UID: 0 PID: 21140 Comm: syz.5.9549 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 414.366336][T21140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 414.366351][T21140] Call Trace: [ 414.366359][T21140] [ 414.366368][T21140] __dump_stack+0x21/0x30 [ 414.366402][T21140] dump_stack_lvl+0x10c/0x190 [ 414.366430][T21140] ? __cfi_dump_stack_lvl+0x10/0x10 [ 414.366464][T21140] dump_stack+0x19/0x20 [ 414.366490][T21140] should_fail_ex+0x3d9/0x530 [ 414.366514][T21140] should_fail+0xf/0x20 [ 414.366535][T21140] should_fail_usercopy+0x1e/0x30 [ 414.366559][T21140] _copy_from_user+0x22/0xb0 [ 414.366586][T21140] sock_copy_user_timeval+0x231/0x3d0 [ 414.366614][T21140] ? __cfi_sock_copy_user_timeval+0x10/0x10 [ 414.366641][T21140] ? selinux_socket_setsockopt+0x2ea/0x390 [ 414.366676][T21140] vsock_connectible_setsockopt+0x2fc/0x7c0 [ 414.366710][T21140] ? __cfi_vsock_connectible_setsockopt+0x10/0x10 [ 414.366742][T21140] ? __cfi_vfs_write+0x10/0x10 [ 414.366763][T21140] ? __kasan_check_write+0x18/0x20 [ 414.366796][T21140] ? bpf_lsm_socket_setsockopt+0xd/0x20 [ 414.366823][T21140] ? security_socket_setsockopt+0x33/0xd0 [ 414.366845][T21140] ? __cfi_vsock_connectible_setsockopt+0x10/0x10 [ 414.366876][T21140] do_sock_setsockopt+0x26d/0x400 [ 414.366907][T21140] ? __cfi_do_sock_setsockopt+0x10/0x10 [ 414.366941][T21140] __x64_sys_setsockopt+0x1b8/0x250 [ 414.366973][T21140] x64_sys_call+0x2adc/0x2ee0 [ 414.367010][T21140] do_syscall_64+0x58/0xf0 [ 414.367038][T21140] ? clear_bhb_loop+0x50/0xa0 [ 414.367062][T21140] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 414.367086][T21140] RIP: 0033:0x7f6de458f6c9 [ 414.367104][T21140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 414.367149][T21140] RSP: 002b:00007f6de547b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 414.367174][T21140] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458f6c9 [ 414.367191][T21140] RDX: 0000000000000006 RSI: 0000000000000028 RDI: 0000000000000006 [ 414.367205][T21140] RBP: 00007f6de547b090 R08: 0000000000000010 R09: 0000000000000000 [ 414.367220][T21140] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000001 [ 414.367235][T21140] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 414.367255][T21140] [ 415.041996][T21180] FAULT_INJECTION: forcing a failure. [ 415.041996][T21180] name failslab, interval 1, probability 0, space 0, times 0 [ 415.078989][T21180] CPU: 0 UID: 0 PID: 21180 Comm: syz.5.9568 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 415.079045][T21180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 415.079061][T21180] Call Trace: [ 415.079070][T21180] [ 415.079079][T21180] __dump_stack+0x21/0x30 [ 415.079117][T21180] dump_stack_lvl+0x10c/0x190 [ 415.079149][T21180] ? __cfi_dump_stack_lvl+0x10/0x10 [ 415.079182][T21180] dump_stack+0x19/0x20 [ 415.079212][T21180] should_fail_ex+0x3d9/0x530 [ 415.079236][T21180] should_failslab+0xac/0x100 [ 415.079262][T21180] kmem_cache_alloc_noprof+0x42/0x430 [ 415.079285][T21180] ? __kvm_mmu_topup_memory_cache+0x1eb/0x860 [ 415.079319][T21180] __kvm_mmu_topup_memory_cache+0x1eb/0x860 [ 415.079354][T21180] ? mutex_unlock+0x8b/0x240 [ 415.079378][T21180] kvm_mmu_topup_memory_cache+0x24/0x30 [ 415.079411][T21180] kvm_mmu_load+0xa2/0x28a0 [ 415.079440][T21180] ? kvm_hv_setup_tsc_page+0x5ee/0xa70 [ 415.079471][T21180] ? __kasan_check_write+0x18/0x20 [ 415.079506][T21180] ? __kasan_check_write+0x18/0x20 [ 415.079541][T21180] ? kvm_apic_has_interrupt+0x79b/0x7b0 [ 415.079574][T21180] vcpu_run+0x4d2d/0x7830 [ 415.079603][T21180] ? x64_sys_call+0xe69/0x2ee0 [ 415.079652][T21180] ? signal_pending+0xc0/0xc0 [ 415.079680][T21180] ? __kasan_check_write+0x18/0x20 [ 415.079715][T21180] ? xfd_validate_state+0x68/0x150 [ 415.079746][T21180] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 415.079772][T21180] ? __kasan_check_write+0x18/0x20 [ 415.079806][T21180] ? fpregs_mark_activate+0x69/0x160 [ 415.079832][T21180] ? fpu_swap_kvm_fpstate+0x44d/0x5f0 [ 415.079857][T21180] ? fpu_swap_kvm_fpstate+0x93/0x5f0 [ 415.079885][T21180] kvm_arch_vcpu_ioctl_run+0x101a/0x1aa0 [ 415.079917][T21180] ? __cfi_kvm_arch_vcpu_ioctl_run+0x10/0x10 [ 415.079947][T21180] ? kstrtoull+0x13b/0x1e0 [ 415.079969][T21180] ? kstrtouint+0x78/0xf0 [ 415.079990][T21180] ? ioctl_has_perm+0x1aa/0x4d0 [ 415.080036][T21180] ? __asan_memcpy+0x5a/0x80 [ 415.080057][T21180] ? ioctl_has_perm+0x3e0/0x4d0 [ 415.080085][T21180] ? has_cap_mac_admin+0xd0/0xd0 [ 415.080112][T21180] ? __kasan_check_write+0x18/0x20 [ 415.080158][T21180] ? mutex_lock_killable+0x92/0x1c0 [ 415.080180][T21180] ? __cfi_mutex_lock_killable+0x10/0x10 [ 415.080202][T21180] ? proc_fail_nth_write+0x17e/0x210 [ 415.080235][T21180] kvm_vcpu_ioctl+0x96f/0xee0 [ 415.080256][T21180] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 415.080278][T21180] ? __cfi_vfs_write+0x10/0x10 [ 415.080298][T21180] ? __kasan_check_write+0x18/0x20 [ 415.080331][T21180] ? mutex_unlock+0x8b/0x240 [ 415.080351][T21180] ? __cfi_mutex_unlock+0x10/0x10 [ 415.080371][T21180] ? __fget_files+0x2c5/0x340 [ 415.080398][T21180] ? __fget_files+0x2c5/0x340 [ 415.080422][T21180] ? bpf_lsm_file_ioctl+0xd/0x20 [ 415.080453][T21180] ? security_file_ioctl+0x34/0xd0 [ 415.080478][T21180] ? __cfi_kvm_vcpu_ioctl+0x10/0x10 [ 415.080498][T21180] __se_sys_ioctl+0x135/0x1b0 [ 415.080522][T21180] __x64_sys_ioctl+0x7f/0xa0 [ 415.080546][T21180] x64_sys_call+0x1878/0x2ee0 [ 415.080578][T21180] do_syscall_64+0x58/0xf0 [ 415.080607][T21180] ? clear_bhb_loop+0x50/0xa0 [ 415.080632][T21180] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 415.080656][T21180] RIP: 0033:0x7f6de458f6c9 [ 415.080674][T21180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 415.080694][T21180] RSP: 002b:00007f6de547b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 415.080718][T21180] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458f6c9 [ 415.080736][T21180] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000008 [ 415.080751][T21180] RBP: 00007f6de547b090 R08: 0000000000000000 R09: 0000000000000000 [ 415.080766][T21180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 415.080781][T21180] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 415.080801][T21180] [ 415.569203][T21197] netlink: 'syz.1.9575': attribute type 29 has an invalid length. [ 415.749181][T21220] netlink: 'syz.1.9585': attribute type 29 has an invalid length. [ 415.889149][T21242] netlink: 'syz.5.9595': attribute type 29 has an invalid length. [ 415.900007][T21246] FAULT_INJECTION: forcing a failure. [ 415.900007][T21246] name failslab, interval 1, probability 0, space 0, times 0 [ 415.925091][T21246] CPU: 1 UID: 0 PID: 21246 Comm: syz.4.9597 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 415.925130][T21246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 415.925146][T21246] Call Trace: [ 415.925154][T21246] [ 415.925163][T21246] __dump_stack+0x21/0x30 [ 415.925200][T21246] dump_stack_lvl+0x10c/0x190 [ 415.925241][T21246] ? __cfi_dump_stack_lvl+0x10/0x10 [ 415.925273][T21246] ? kernel_text_address+0xa9/0xe0 [ 415.925305][T21246] dump_stack+0x19/0x20 [ 415.925334][T21246] should_fail_ex+0x3d9/0x530 [ 415.925360][T21246] should_failslab+0xac/0x100 [ 415.925386][T21246] kmem_cache_alloc_noprof+0x42/0x430 [ 415.925408][T21246] ? __inet_bhash2_update_saddr+0xf2/0x1a10 [ 415.925433][T21246] ? avc_has_perm+0x144/0x220 [ 415.925473][T21246] __inet_bhash2_update_saddr+0xf2/0x1a10 [ 415.925501][T21246] inet_bhash2_reset_saddr+0x60/0x90 [ 415.925524][T21246] tcp_disconnect+0x49c/0x1870 [ 415.925557][T21246] ? _raw_spin_lock_bh+0x90/0x120 [ 415.925587][T21246] __inet_stream_connect+0x39c/0xf40 [ 415.925610][T21246] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 415.925641][T21246] ? _raw_spin_unlock_bh+0x54/0x60 [ 415.925670][T21246] ? lock_sock_nested+0x1f5/0x290 [ 415.925695][T21246] ? __cfi___inet_stream_connect+0x10/0x10 [ 415.925717][T21246] ? check_stack_object+0x107/0x140 [ 415.925740][T21246] ? __check_object_size+0xe0/0x810 [ 415.925761][T21246] ? __fget_files+0x2c5/0x340 [ 415.925787][T21246] inet_stream_connect+0x66/0xa0 [ 415.925809][T21246] __sys_connect+0x39d/0x440 [ 415.925840][T21246] ? __cfi___sys_connect+0x10/0x10 [ 415.925873][T21246] ? __kasan_check_read+0x15/0x20 [ 415.925919][T21246] __x64_sys_connect+0x7e/0x90 [ 415.925967][T21246] x64_sys_call+0x1c2f/0x2ee0 [ 415.926012][T21246] do_syscall_64+0x58/0xf0 [ 415.926040][T21246] ? clear_bhb_loop+0x50/0xa0 [ 415.926064][T21246] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 415.926088][T21246] RIP: 0033:0x7fa90c58f6c9 [ 415.926107][T21246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 415.926126][T21246] RSP: 002b:00007fa90d392038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 415.926151][T21246] RAX: ffffffffffffffda RBX: 00007fa90c7e5fa0 RCX: 00007fa90c58f6c9 [ 415.926169][T21246] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000005 [ 415.926184][T21246] RBP: 00007fa90d392090 R08: 0000000000000000 R09: 0000000000000000 [ 415.926199][T21246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 415.926213][T21246] R13: 00007fa90c7e6038 R14: 00007fa90c7e5fa0 R15: 00007ffe31571a38 [ 415.926240][T21246] [ 416.189217][T21113] Bluetooth: hci0: command 0x1003 tx timeout [ 416.195340][ T54] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 416.307530][T21251] random: crng reseeded on system resumption [ 416.470417][T21264] netlink: 'syz.5.9606': attribute type 29 has an invalid length. [ 416.567911][ T36] audit: type=1400 audit(2000000306.777:534): avc: denied { append } for pid=21273 comm="syz.5.9610" name="rnullb0" dev="devtmpfs" ino=31 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 416.640273][T21284] netlink: 'syz.1.9615': attribute type 29 has an invalid length. [ 416.939677][ T36] audit: type=1326 audit(2000000307.157:535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21305 comm="syz.2.9625" exe="/root/syz-executor" sig=9 arch=c000003e syscall=39 compat=0 ip=0x7fa987186567 code=0x0 [ 417.003775][T21311] netlink: 'syz.2.9626': attribute type 29 has an invalid length. [ 417.044124][ T36] audit: type=1400 audit(2000000307.257:536): avc: denied { accept } for pid=21314 comm="syz.2.9628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 417.269128][T21326] SELinux: syz.5.9632 (21326) set checkreqprot to 1. This is no longer supported. [ 417.319025][T21332] rust_binder: 226: no such ref 1 [ 417.337895][T21334] FAULT_INJECTION: forcing a failure. [ 417.337895][T21334] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 417.351286][T21334] CPU: 0 UID: 0 PID: 21334 Comm: syz.5.9636 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 417.351333][T21334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 417.351348][T21334] Call Trace: [ 417.351355][T21334] [ 417.351365][T21334] __dump_stack+0x21/0x30 [ 417.351400][T21334] dump_stack_lvl+0x10c/0x190 [ 417.351429][T21334] ? __cfi_dump_stack_lvl+0x10/0x10 [ 417.351458][T21334] ? kstrtoull+0x13b/0x1e0 [ 417.351478][T21334] dump_stack+0x19/0x20 [ 417.351505][T21334] should_fail_ex+0x3d9/0x530 [ 417.351528][T21334] should_fail+0xf/0x20 [ 417.351548][T21334] should_fail_usercopy+0x1e/0x30 [ 417.351572][T21334] _copy_from_user+0x22/0xb0 [ 417.351599][T21334] ___sys_sendmsg+0x159/0x2a0 [ 417.351632][T21334] ? __sys_sendmsg+0x280/0x280 [ 417.351663][T21334] ? proc_fail_nth_write+0x17e/0x210 [ 417.351698][T21334] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 417.351734][T21334] __x64_sys_sendmsg+0x1eb/0x2c0 [ 417.351766][T21334] ? fput+0x1a5/0x240 [ 417.351792][T21334] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 417.351823][T21334] ? ksys_write+0x1ef/0x250 [ 417.351845][T21334] ? __kasan_check_read+0x15/0x20 [ 417.351879][T21334] x64_sys_call+0x2a4c/0x2ee0 [ 417.351911][T21334] do_syscall_64+0x58/0xf0 [ 417.351939][T21334] ? clear_bhb_loop+0x50/0xa0 [ 417.351963][T21334] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 417.351987][T21334] RIP: 0033:0x7f6de458f6c9 [ 417.352005][T21334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 417.352025][T21334] RSP: 002b:00007f6de547b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 417.352049][T21334] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458f6c9 [ 417.352066][T21334] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000005 [ 417.352080][T21334] RBP: 00007f6de547b090 R08: 0000000000000000 R09: 0000000000000000 [ 417.352094][T21334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 417.352117][T21334] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 417.352137][T21334] [ 417.478893][ T31] usb 5-1: new low-speed USB device number 7 using dummy_hcd [ 417.730002][ T31] usb 5-1: config 1 interface 0 has no altsetting 0 [ 417.738949][ T31] usb 5-1: string descriptor 0 read error: -22 [ 417.746796][ T31] usb 5-1: New USB device found, idVendor=0458, idProduct=5015, bcdDevice= 0.40 [ 417.756037][ T31] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 417.793818][T21346] FAULT_INJECTION: forcing a failure. [ 417.793818][T21346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 417.807164][T21346] CPU: 0 UID: 0 PID: 21346 Comm: syz.1.9642 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 417.807204][T21346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 417.807219][T21346] Call Trace: [ 417.807229][T21346] [ 417.807239][T21346] __dump_stack+0x21/0x30 [ 417.807274][T21346] dump_stack_lvl+0x10c/0x190 [ 417.807305][T21346] ? __cfi_dump_stack_lvl+0x10/0x10 [ 417.807326][T21346] ? check_stack_object+0x12c/0x140 [ 417.807351][T21346] dump_stack+0x19/0x20 [ 417.807382][T21346] should_fail_ex+0x3d9/0x530 [ 417.807405][T21346] should_fail+0xf/0x20 [ 417.807429][T21346] should_fail_usercopy+0x1e/0x30 [ 417.807456][T21346] _copy_to_user+0x24/0xa0 [ 417.807482][T21346] simple_read_from_buffer+0xed/0x160 [ 417.807503][T21346] proc_fail_nth_read+0x19e/0x210 [ 417.807537][T21346] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 417.807569][T21346] ? bpf_lsm_file_permission+0xd/0x20 [ 417.807601][T21346] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 417.807662][T21346] vfs_read+0x27d/0xc70 [ 417.807684][T21346] ? __cfi_vfs_read+0x10/0x10 [ 417.807702][T21346] ? __kasan_check_write+0x18/0x20 [ 417.807739][T21346] ? mutex_lock+0x92/0x1c0 [ 417.807755][T21346] ? __cfi_mutex_lock+0x10/0x10 [ 417.807773][T21346] ? __fget_files+0x2c5/0x340 [ 417.807797][T21346] ksys_read+0x141/0x250 [ 417.807824][T21346] ? __cfi_ksys_read+0x10/0x10 [ 417.807848][T21346] ? __kasan_check_read+0x15/0x20 [ 417.807880][T21346] __x64_sys_read+0x7f/0x90 [ 417.807900][T21346] x64_sys_call+0x2638/0x2ee0 [ 417.807940][T21346] do_syscall_64+0x58/0xf0 [ 417.807987][T21346] ? clear_bhb_loop+0x50/0xa0 [ 417.808017][T21346] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 417.808040][T21346] RIP: 0033:0x7f0eb2f8e0dc [ 417.808059][T21346] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 417.808073][T21346] RSP: 002b:00007f0eb3df4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 417.808095][T21346] RAX: ffffffffffffffda RBX: 00007f0eb31e5fa0 RCX: 00007f0eb2f8e0dc [ 417.808115][T21346] RDX: 000000000000000f RSI: 00007f0eb3df40a0 RDI: 0000000000000006 [ 417.808130][T21346] RBP: 00007f0eb3df4090 R08: 0000000000000000 R09: 0000000000000000 [ 417.808152][T21346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 417.808166][T21346] R13: 00007f0eb31e6038 R14: 00007f0eb31e5fa0 R15: 00007ffd41735288 [ 417.808184][T21346] [ 418.056912][ T31] usbhid 5-1:1.0: can't add hid device: -71 [ 418.063056][ T31] usbhid 5-1:1.0: probe with driver usbhid failed with error -71 [ 418.072137][ T31] usb 5-1: USB disconnect, device number 7 [ 418.207022][T21368] random: crng reseeded on system resumption [ 418.410267][ T36] audit: type=1400 audit(2000000308.627:537): avc: denied { execute_no_trans } for pid=21381 comm="syz.5.9657" path="/108/file0" dev="tmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 418.704716][T21395] random: crng reseeded on system resumption [ 419.174585][T21414] FAULT_INJECTION: forcing a failure. [ 419.174585][T21414] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 419.208110][T21414] CPU: 1 UID: 0 PID: 21414 Comm: syz.1.9672 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 419.208150][T21414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 419.208166][T21414] Call Trace: [ 419.208174][T21414] [ 419.208184][T21414] __dump_stack+0x21/0x30 [ 419.208220][T21414] dump_stack_lvl+0x10c/0x190 [ 419.208251][T21414] ? __cfi_dump_stack_lvl+0x10/0x10 [ 419.208283][T21414] ? check_stack_object+0x12c/0x140 [ 419.208307][T21414] dump_stack+0x19/0x20 [ 419.208336][T21414] should_fail_ex+0x3d9/0x530 [ 419.208360][T21414] should_fail+0xf/0x20 [ 419.208381][T21414] should_fail_usercopy+0x1e/0x30 [ 419.208406][T21414] _copy_to_user+0x24/0xa0 [ 419.208435][T21414] simple_read_from_buffer+0xed/0x160 [ 419.208465][T21414] proc_fail_nth_read+0x19e/0x210 [ 419.208495][T21414] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 419.208526][T21414] ? bpf_lsm_file_permission+0xd/0x20 [ 419.208558][T21414] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 419.208589][T21414] vfs_read+0x27d/0xc70 [ 419.208611][T21414] ? __cfi_vfs_read+0x10/0x10 [ 419.208631][T21414] ? __kasan_check_write+0x18/0x20 [ 419.208664][T21414] ? mutex_lock+0x92/0x1c0 [ 419.208686][T21414] ? __cfi_mutex_lock+0x10/0x10 [ 419.208712][T21414] ? __fget_files+0x2c5/0x340 [ 419.208738][T21414] ksys_read+0x141/0x250 [ 419.208760][T21414] ? __cfi_ksys_read+0x10/0x10 [ 419.208781][T21414] ? __kasan_check_read+0x15/0x20 [ 419.208816][T21414] __x64_sys_read+0x7f/0x90 [ 419.208837][T21414] x64_sys_call+0x2638/0x2ee0 [ 419.208871][T21414] do_syscall_64+0x58/0xf0 [ 419.208906][T21414] ? clear_bhb_loop+0x50/0xa0 [ 419.208932][T21414] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 419.208963][T21414] RIP: 0033:0x7f0eb2f8e0dc [ 419.208983][T21414] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 419.209004][T21414] RSP: 002b:00007f0eb3df4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 419.209029][T21414] RAX: ffffffffffffffda RBX: 00007f0eb31e5fa0 RCX: 00007f0eb2f8e0dc [ 419.209047][T21414] RDX: 000000000000000f RSI: 00007f0eb3df40a0 RDI: 0000000000000004 [ 419.209062][T21414] RBP: 00007f0eb3df4090 R08: 0000000000000000 R09: 0000000000000000 [ 419.209079][T21414] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 419.209094][T21414] R13: 00007f0eb31e6038 R14: 00007f0eb31e5fa0 R15: 00007ffd41735288 [ 419.209115][T21414] [ 419.548658][T21424] bridge0: port 5(bond_slave_0) entered blocking state [ 419.570381][T21424] bridge0: port 5(bond_slave_0) entered disabled state [ 419.585026][T21426] binder: Bad value for 'stats' [ 419.594481][T21424] bond_slave_0: entered allmulticast mode [ 419.610398][T21424] bond_slave_0: entered promiscuous mode [ 420.944715][ T36] audit: type=1326 audit(2000000311.157:538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21457 comm="syz.4.9694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa90c58f6c9 code=0x7fc00000 [ 421.586932][ T36] audit: type=1326 audit(2000000311.797:539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21457 comm="syz.4.9694" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa90c52b779 code=0x7fc00000 [ 421.931811][T21489] netlink: 'syz.2.9707': attribute type 29 has an invalid length. [ 421.972311][T21492] rust_binder: Error while translating object. [ 421.972342][T21492] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: ENOENT } [ 421.988644][T21491] rust_binder: Error while translating object. [ 421.998086][T21491] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: ENOENT } [ 422.018635][T21492] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:331 [ 422.048639][T21491] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:331 [ 422.425340][T21505] FAULT_INJECTION: forcing a failure. [ 422.425340][T21505] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 422.486242][T21505] CPU: 0 UID: 0 PID: 21505 Comm: syz.5.9716 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 422.486280][T21505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 422.486295][T21505] Call Trace: [ 422.486303][T21505] [ 422.486313][T21505] __dump_stack+0x21/0x30 [ 422.486348][T21505] dump_stack_lvl+0x10c/0x190 [ 422.486387][T21505] ? __cfi_dump_stack_lvl+0x10/0x10 [ 422.486423][T21505] ? kstrtoull+0x13b/0x1e0 [ 422.486444][T21505] dump_stack+0x19/0x20 [ 422.486472][T21505] should_fail_ex+0x3d9/0x530 [ 422.486495][T21505] should_fail+0xf/0x20 [ 422.486515][T21505] should_fail_usercopy+0x1e/0x30 [ 422.486539][T21505] _copy_from_user+0x22/0xb0 [ 422.486566][T21505] ___sys_sendmsg+0x159/0x2a0 [ 422.486598][T21505] ? __sys_sendmsg+0x280/0x280 [ 422.486638][T21505] ? proc_fail_nth_write+0x17e/0x210 [ 422.486667][T21505] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 422.486703][T21505] __x64_sys_sendmsg+0x1eb/0x2c0 [ 422.486735][T21505] ? fput+0x1a5/0x240 [ 422.486761][T21505] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 422.486793][T21505] ? ksys_write+0x1ef/0x250 [ 422.486814][T21505] ? __kasan_check_read+0x15/0x20 [ 422.486848][T21505] x64_sys_call+0x2a4c/0x2ee0 [ 422.486879][T21505] do_syscall_64+0x58/0xf0 [ 422.486907][T21505] ? clear_bhb_loop+0x50/0xa0 [ 422.486932][T21505] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 422.486955][T21505] RIP: 0033:0x7f6de458f6c9 [ 422.486972][T21505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.486991][T21505] RSP: 002b:00007f6de547b038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 422.487015][T21505] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458f6c9 [ 422.487031][T21505] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000005 [ 422.487046][T21505] RBP: 00007f6de547b090 R08: 0000000000000000 R09: 0000000000000000 [ 422.487061][T21505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 422.487074][T21505] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 422.487094][T21505] [ 422.768980][T21509] __nla_validate_parse: 7 callbacks suppressed [ 422.769006][T21509] netlink: 12 bytes leftover after parsing attributes in process `syz.4.9715'. [ 423.072378][T21536] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9729'. [ 423.165159][T21540] netlink: 96 bytes leftover after parsing attributes in process `syz.4.9732'. [ 423.322843][T21558] netlink: 8 bytes leftover after parsing attributes in process `syz.2.9740'. [ 423.798530][T21588] SELinux: Context ϧ®-·)ç:EØ2¡Ù­ìؾò)Ä‘Ju36·ÒÆÞ¢{à@˜mý[ is not valid (left unmapped). [ 424.323086][T21601] netlink: 'syz.1.9761': attribute type 29 has an invalid length. [ 424.458632][T21607] random: crng reseeded on system resumption [ 424.545070][T21611] netlink: 8 bytes leftover after parsing attributes in process `syz.2.9765'. [ 424.630384][T21620] netlink: 'syz.1.9770': attribute type 29 has an invalid length. [ 424.821995][T21635] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9777'. [ 424.927430][T21652] netlink: 556 bytes leftover after parsing attributes in process `syz.4.9785'. [ 425.067222][T21675] netlink: 556 bytes leftover after parsing attributes in process `syz.1.9796'. [ 425.129740][T21684] netlink: 180 bytes leftover after parsing attributes in process `syz.1.9799'. [ 425.260277][ T36] audit: type=1400 audit(2000000315.477:540): avc: denied { bpf } for pid=21701 comm="syz.1.9809" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 425.333377][T21704] FAULT_INJECTION: forcing a failure. [ 425.333377][T21704] name failslab, interval 1, probability 0, space 0, times 0 [ 425.346358][T21704] CPU: 0 UID: 0 PID: 21704 Comm: syz.2.9805 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 425.346396][T21704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 425.346413][T21704] Call Trace: [ 425.346421][T21704] [ 425.346431][T21704] __dump_stack+0x21/0x30 [ 425.346466][T21704] dump_stack_lvl+0x10c/0x190 [ 425.346488][T21704] ? __cfi_dump_stack_lvl+0x10/0x10 [ 425.346511][T21704] ? release_sock+0x171/0x1f0 [ 425.346531][T21704] dump_stack+0x19/0x20 [ 425.346552][T21704] should_fail_ex+0x3d9/0x530 [ 425.346569][T21704] should_failslab+0xac/0x100 [ 425.346588][T21704] kmem_cache_alloc_node_noprof+0x45/0x440 [ 425.346605][T21704] ? netlink_data_ready+0x20/0x20 [ 425.346627][T21704] ? __alloc_skb+0x10c/0x370 [ 425.346648][T21704] __alloc_skb+0x10c/0x370 [ 425.346667][T21704] netlink_alloc_large_skb+0xf7/0x1b0 [ 425.346689][T21704] netlink_sendmsg+0x586/0xaf0 [ 425.346714][T21704] ? __cfi_netlink_sendmsg+0x10/0x10 [ 425.346738][T21704] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 425.346758][T21704] ? security_socket_sendmsg+0x33/0xd0 [ 425.346775][T21704] sock_write_iter+0x49c/0x4f0 [ 425.346792][T21704] ? __cfi_sock_write_iter+0x10/0x10 [ 425.346810][T21704] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 425.346834][T21704] vfs_write+0x718/0xf30 [ 425.346849][T21704] ? __cfi_sock_write_iter+0x10/0x10 [ 425.346866][T21704] ? __cfi_vfs_write+0x10/0x10 [ 425.346883][T21704] ksys_write+0x141/0x250 [ 425.346898][T21704] ? __cfi_ksys_write+0x10/0x10 [ 425.346913][T21704] ? __kasan_check_read+0x15/0x20 [ 425.346938][T21704] __x64_sys_write+0x7f/0x90 [ 425.346953][T21704] x64_sys_call+0x271c/0x2ee0 [ 425.346977][T21704] do_syscall_64+0x58/0xf0 [ 425.347016][T21704] ? clear_bhb_loop+0x50/0xa0 [ 425.347035][T21704] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 425.347052][T21704] RIP: 0033:0x7fa98718f6c9 [ 425.347066][T21704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 425.347080][T21704] RSP: 002b:00007fa9880e6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 425.347098][T21704] RAX: ffffffffffffffda RBX: 00007fa9873e5fa0 RCX: 00007fa98718f6c9 [ 425.347110][T21704] RDX: 0000000000000018 RSI: 00002000000000c0 RDI: 0000000000000005 [ 425.347121][T21704] RBP: 00007fa9880e6090 R08: 0000000000000000 R09: 0000000000000000 [ 425.347132][T21704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 425.347142][T21704] R13: 00007fa9873e6038 R14: 00007fa9873e5fa0 R15: 00007ffd27407e58 [ 425.347156][T21704] [ 425.438438][ T31] usb 5-1: new low-speed USB device number 8 using dummy_hcd [ 425.609819][T21710] random: crng reseeded on system resumption [ 425.675308][T21714] FAULT_INJECTION: forcing a failure. [ 425.675308][T21714] name failslab, interval 1, probability 0, space 0, times 0 [ 425.688315][T21714] CPU: 0 UID: 0 PID: 21714 Comm: syz.1.9813 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 425.688362][T21714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 425.688377][T21714] Call Trace: [ 425.688385][T21714] [ 425.688395][T21714] __dump_stack+0x21/0x30 [ 425.688432][T21714] dump_stack_lvl+0x10c/0x190 [ 425.688462][T21714] ? __cfi_dump_stack_lvl+0x10/0x10 [ 425.688493][T21714] ? release_sock+0x171/0x1f0 [ 425.688521][T21714] dump_stack+0x19/0x20 [ 425.688549][T21714] should_fail_ex+0x3d9/0x530 [ 425.688572][T21714] should_failslab+0xac/0x100 [ 425.688598][T21714] kmem_cache_alloc_node_noprof+0x45/0x440 [ 425.688620][T21714] ? netlink_data_ready+0x20/0x20 [ 425.688650][T21714] ? __alloc_skb+0x10c/0x370 [ 425.688677][T21714] __alloc_skb+0x10c/0x370 [ 425.688705][T21714] netlink_alloc_large_skb+0xf7/0x1b0 [ 425.688735][T21714] netlink_sendmsg+0x586/0xaf0 [ 425.688769][T21714] ? __cfi_netlink_sendmsg+0x10/0x10 [ 425.688802][T21714] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 425.688830][T21714] ? security_socket_sendmsg+0x33/0xd0 [ 425.688852][T21714] ? __cfi_netlink_sendmsg+0x10/0x10 [ 425.688885][T21714] ____sys_sendmsg+0xa15/0xa70 [ 425.688924][T21714] ? __sys_sendmsg_sock+0x50/0x50 [ 425.688989][T21714] ? import_iovec+0x81/0xb0 [ 425.689020][T21714] ___sys_sendmsg+0x220/0x2a0 [ 425.689054][T21714] ? __sys_sendmsg+0x280/0x280 [ 425.689089][T21714] ? proc_fail_nth_write+0x17e/0x210 [ 425.689120][T21714] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 425.689158][T21714] __x64_sys_sendmsg+0x1eb/0x2c0 [ 425.689192][T21714] ? fput+0x1a5/0x240 [ 425.689220][T21714] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 425.689254][T21714] ? ksys_write+0x1ef/0x250 [ 425.689277][T21714] ? __kasan_check_read+0x15/0x20 [ 425.689313][T21714] x64_sys_call+0x2a4c/0x2ee0 [ 425.689356][T21714] do_syscall_64+0x58/0xf0 [ 425.689386][T21714] ? clear_bhb_loop+0x50/0xa0 [ 425.689413][T21714] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 425.689438][T21714] RIP: 0033:0x7f0eb2f8f6c9 [ 425.689457][T21714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 425.689477][T21714] RSP: 002b:00007f0eb3df4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 425.689502][T21714] RAX: ffffffffffffffda RBX: 00007f0eb31e5fa0 RCX: 00007f0eb2f8f6c9 [ 425.689521][T21714] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000005 [ 425.689537][T21714] RBP: 00007f0eb3df4090 R08: 0000000000000000 R09: 0000000000000000 [ 425.689552][T21714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 425.689567][T21714] R13: 00007f0eb31e6038 R14: 00007f0eb31e5fa0 R15: 00007ffd41735288 [ 425.689588][T21714] [ 425.799548][ T31] usb 5-1: config 1 interface 0 has no altsetting 0 [ 425.964860][ T31] usb 5-1: string descriptor 0 read error: -22 [ 425.978399][ T31] usb 5-1: New USB device found, idVendor=0458, idProduct=5015, bcdDevice= 0.40 [ 425.987559][ T31] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 426.217534][ T31] usbhid 5-1:1.0: can't add hid device: -71 [ 426.238387][ T31] usbhid 5-1:1.0: probe with driver usbhid failed with error -71 [ 426.258444][ T31] usb 5-1: USB disconnect, device number 8 [ 426.350434][T21731] random: crng reseeded on system resumption [ 426.739334][ T36] audit: type=1400 audit(2000000316.957:541): avc: denied { open } for pid=21739 comm="syz.4.9826" path=2F7365637265746D656D202864656C6574656429 dev="secretmem" ino=111024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 426.962437][T21751] random: crng reseeded on system resumption [ 427.610494][T21780] netlink: 3 bytes leftover after parsing attributes in process `syz.5.9844'. [ 427.719759][ T36] audit: type=1400 audit(2000000317.937:542): avc: denied { ioctl } for pid=21781 comm="syz.5.9846" path="socket:[110537]" dev="sockfs" ino=110537 ioctlcmd=0x9423 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 427.759235][T21784] FAULT_INJECTION: forcing a failure. [ 427.759235][T21784] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 427.779446][T21784] CPU: 0 UID: 0 PID: 21784 Comm: syz.5.9847 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 427.779482][T21784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 427.779497][T21784] Call Trace: [ 427.779505][T21784] [ 427.779514][T21784] __dump_stack+0x21/0x30 [ 427.779549][T21784] dump_stack_lvl+0x10c/0x190 [ 427.779579][T21784] ? __cfi_dump_stack_lvl+0x10/0x10 [ 427.779611][T21784] ? check_stack_object+0x12c/0x140 [ 427.779635][T21784] dump_stack+0x19/0x20 [ 427.779664][T21784] should_fail_ex+0x3d9/0x530 [ 427.779688][T21784] should_fail+0xf/0x20 [ 427.779709][T21784] should_fail_usercopy+0x1e/0x30 [ 427.779734][T21784] _copy_to_user+0x24/0xa0 [ 427.779762][T21784] simple_read_from_buffer+0xed/0x160 [ 427.779792][T21784] proc_fail_nth_read+0x19e/0x210 [ 427.779822][T21784] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 427.779852][T21784] ? bpf_lsm_file_permission+0xd/0x20 [ 427.779884][T21784] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 427.779914][T21784] vfs_read+0x27d/0xc70 [ 427.779935][T21784] ? __cfi_vfs_read+0x10/0x10 [ 427.779964][T21784] ? __kasan_check_write+0x18/0x20 [ 427.779997][T21784] ? mutex_lock+0x92/0x1c0 [ 427.780018][T21784] ? __cfi_mutex_lock+0x10/0x10 [ 427.780039][T21784] ? __fget_files+0x2c5/0x340 [ 427.780066][T21784] ksys_read+0x141/0x250 [ 427.780087][T21784] ? __cfi_ksys_read+0x10/0x10 [ 427.780120][T21784] ? __kasan_check_read+0x15/0x20 [ 427.780153][T21784] __x64_sys_read+0x7f/0x90 [ 427.780173][T21784] x64_sys_call+0x2638/0x2ee0 [ 427.780206][T21784] do_syscall_64+0x58/0xf0 [ 427.780234][T21784] ? clear_bhb_loop+0x50/0xa0 [ 427.780258][T21784] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 427.780327][T21784] RIP: 0033:0x7f6de458e0dc [ 427.780346][T21784] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 427.780367][T21784] RSP: 002b:00007f6de547b030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 427.780392][T21784] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458e0dc [ 427.780410][T21784] RDX: 000000000000000f RSI: 00007f6de547b0a0 RDI: 0000000000000005 [ 427.780425][T21784] RBP: 00007f6de547b090 R08: 0000000000000000 R09: 0000000000000000 [ 427.780451][T21784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 427.780464][T21784] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 427.780483][T21784] [ 428.125256][T21803] FAULT_INJECTION: forcing a failure. [ 428.125256][T21803] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 428.138578][T21803] CPU: 0 UID: 0 PID: 21803 Comm: syz.5.9853 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 428.138615][T21803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 428.138630][T21803] Call Trace: [ 428.138638][T21803] [ 428.138647][T21803] __dump_stack+0x21/0x30 [ 428.138683][T21803] dump_stack_lvl+0x10c/0x190 [ 428.138713][T21803] ? __cfi_dump_stack_lvl+0x10/0x10 [ 428.138744][T21803] ? __alloc_pages_noprof+0x7b0/0x7b0 [ 428.138775][T21803] dump_stack+0x19/0x20 [ 428.138781][T21805] bridge0: port 5(veth0_to_bond) entered blocking state [ 428.138804][T21803] should_fail_ex+0x3d9/0x530 [ 428.138827][T21803] should_fail_alloc_page+0xeb/0x110 [ 428.138854][T21803] __alloc_pages_noprof+0x19b/0x7b0 [ 428.138890][T21803] ? _raw_spin_lock+0x8c/0x120 [ 428.138939][T21803] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 428.138977][T21803] ? __pte_offset_map+0x1b0/0x230 [ 428.139020][T21803] ? move_pages_ptes+0x1b1d/0x2540 [ 428.139060][T21803] pte_alloc_one+0x97/0x520 [ 428.139085][T21803] ? __cfi_pte_alloc_one+0x10/0x10 [ 428.139111][T21803] ? pmd_trans_huge_lock+0xf0/0xf0 [ 428.139148][T21803] ? downgrade_write+0x440/0x440 [ 428.139182][T21803] __pte_alloc+0x79/0x420 [ 428.139205][T21803] ? __cfi___pte_alloc+0x10/0x10 [ 428.139229][T21803] ? pmd_trans_huge_lock+0xad/0xf0 [ 428.139267][T21803] move_pages+0xc1f/0x1020 [ 428.139307][T21803] userfaultfd_ioctl+0x37d8/0x4750 [ 428.139334][T21803] ? do_vfs_ioctl+0xeda/0x1e30 [ 428.139363][T21803] ? __ia32_compat_sys_ioctl+0x850/0x850 [ 428.139393][T21803] ? __cfi_userfaultfd_ioctl+0x10/0x10 [ 428.139420][T21803] ? _parse_integer+0x2e/0x40 [ 428.139463][T21803] ? ioctl_has_perm+0x384/0x4d0 [ 428.139496][T21803] ? has_cap_mac_admin+0xd0/0xd0 [ 428.139527][T21803] ? proc_fail_nth_write+0x17e/0x210 [ 428.139562][T21803] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 428.139598][T21803] ? selinux_file_ioctl+0x6e0/0x1360 [ 428.139628][T21803] ? vfs_write+0x93e/0xf30 [ 428.139651][T21803] ? __cfi_selinux_file_ioctl+0x10/0x10 [ 428.139682][T21803] ? __cfi_vfs_write+0x10/0x10 [ 428.139706][T21803] ? __kasan_check_write+0x18/0x20 [ 428.139745][T21803] ? mutex_unlock+0x8b/0x240 [ 428.139769][T21803] ? __cfi_mutex_unlock+0x10/0x10 [ 428.139791][T21803] ? __fget_files+0x2c5/0x340 [ 428.139821][T21803] ? __fget_files+0x2c5/0x340 [ 428.139850][T21803] ? bpf_lsm_file_ioctl+0xd/0x20 [ 428.139886][T21803] ? security_file_ioctl+0x34/0xd0 [ 428.139923][T21803] ? __cfi_userfaultfd_ioctl+0x10/0x10 [ 428.139947][T21803] __se_sys_ioctl+0x135/0x1b0 [ 428.139977][T21803] __x64_sys_ioctl+0x7f/0xa0 [ 428.140005][T21803] x64_sys_call+0x1878/0x2ee0 [ 428.140043][T21803] do_syscall_64+0x58/0xf0 [ 428.140075][T21803] ? clear_bhb_loop+0x50/0xa0 [ 428.140104][T21803] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 428.140131][T21803] RIP: 0033:0x7f6de458f6c9 [ 428.140155][T21803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 428.140178][T21803] RSP: 002b:00007f6de547b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 428.140206][T21803] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458f6c9 [ 428.140227][T21803] RDX: 0000200000000180 RSI: 00000000c028aa05 RDI: 0000000000000005 [ 428.140246][T21803] RBP: 00007f6de547b090 R08: 0000000000000000 R09: 0000000000000000 [ 428.140264][T21803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 428.140281][T21803] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 428.140307][T21803] [ 428.384618][T21820] netlink: 'syz.5.9858': attribute type 29 has an invalid length. [ 428.390204][T21805] bridge0: port 5(veth0_to_bond) entered disabled state [ 428.504234][T21805] veth0_to_bond: entered allmulticast mode [ 428.510808][T21805] veth0_to_bond: entered promiscuous mode [ 428.658053][T21842] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9870'. [ 428.674980][T21845] netlink: 96 bytes leftover after parsing attributes in process `syz.1.9871'. [ 428.699854][T21848] netlink: 'syz.2.9872': attribute type 29 has an invalid length. [ 428.839951][T21868] netlink: 96 bytes leftover after parsing attributes in process `syz.5.9882'. [ 428.871614][T21870] netlink: 'syz.1.9883': attribute type 29 has an invalid length. [ 429.048583][T21892] netlink: 96 bytes leftover after parsing attributes in process `syz.1.9893'. [ 429.258311][T21918] FAULT_INJECTION: forcing a failure. [ 429.258311][T21918] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 429.273338][T21918] CPU: 1 UID: 0 PID: 21918 Comm: syz.5.9903 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 429.273377][T21918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 429.273392][T21918] Call Trace: [ 429.273400][T21918] [ 429.273409][T21918] __dump_stack+0x21/0x30 [ 429.273444][T21918] dump_stack_lvl+0x10c/0x190 [ 429.273474][T21918] ? __cfi_dump_stack_lvl+0x10/0x10 [ 429.273510][T21918] dump_stack+0x19/0x20 [ 429.273538][T21918] should_fail_ex+0x3d9/0x530 [ 429.273561][T21918] should_fail+0xf/0x20 [ 429.273581][T21918] should_fail_usercopy+0x1e/0x30 [ 429.273605][T21918] _copy_from_user+0x22/0xb0 [ 429.273632][T21918] proc_ioctl_default+0x8f/0x110 [ 429.273655][T21918] ? proc_releaseinterface+0x500/0x500 [ 429.273679][T21918] ? __cfi_vfs_write+0x10/0x10 [ 429.273701][T21918] usbdev_ioctl+0x1376/0x20a0 [ 429.273724][T21918] ? __cfi_usbdev_ioctl+0x10/0x10 [ 429.273745][T21918] ? __fget_files+0x2c5/0x340 [ 429.273769][T21918] ? bpf_lsm_file_ioctl+0xd/0x20 [ 429.273799][T21918] ? security_file_ioctl+0x34/0xd0 [ 429.273825][T21918] ? __cfi_usbdev_ioctl+0x10/0x10 [ 429.273845][T21918] __se_sys_ioctl+0x135/0x1b0 [ 429.273870][T21918] __x64_sys_ioctl+0x7f/0xa0 [ 429.273893][T21918] x64_sys_call+0x1878/0x2ee0 [ 429.273925][T21918] do_syscall_64+0x58/0xf0 [ 429.273952][T21918] ? clear_bhb_loop+0x50/0xa0 [ 429.273977][T21918] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 429.274000][T21918] RIP: 0033:0x7f6de458f6c9 [ 429.274018][T21918] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.274039][T21918] RSP: 002b:00007f6de547b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 429.274070][T21918] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458f6c9 [ 429.274087][T21918] RDX: 0000000000000000 RSI: 00000000c0105512 RDI: 0000000000000005 [ 429.274103][T21918] RBP: 00007f6de547b090 R08: 0000000000000000 R09: 0000000000000000 [ 429.274117][T21918] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.274132][T21918] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 429.274152][T21918] [ 429.504986][T21922] netlink: 96 bytes leftover after parsing attributes in process `syz.5.9905'. [ 429.575367][T21934] FAULT_INJECTION: forcing a failure. [ 429.575367][T21934] name failslab, interval 1, probability 0, space 0, times 0 [ 429.589676][T21934] CPU: 1 UID: 0 PID: 21934 Comm: syz.1.9912 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 429.589714][T21934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 429.589729][T21934] Call Trace: [ 429.589737][T21934] [ 429.589747][T21934] __dump_stack+0x21/0x30 [ 429.589784][T21934] dump_stack_lvl+0x10c/0x190 [ 429.589815][T21934] ? __cfi_dump_stack_lvl+0x10/0x10 [ 429.589846][T21934] ? __cfi_ipv6_dev_get_saddr+0x10/0x10 [ 429.589874][T21934] dump_stack+0x19/0x20 [ 429.589904][T21934] should_fail_ex+0x3d9/0x530 [ 429.589929][T21934] should_failslab+0xac/0x100 [ 429.589955][T21934] __kmalloc_cache_noprof+0x41/0x490 [ 429.589979][T21934] ? xfrm_lookup_with_ifid+0x1a13/0x2400 [ 429.590004][T21934] ? ip6_setup_cork+0x1c8/0x1390 [ 429.590036][T21934] ip6_setup_cork+0x1c8/0x1390 [ 429.590060][T21934] ? __cfi_xfrm_lookup_with_ifid+0x10/0x10 [ 429.590086][T21934] ip6_make_skb+0x1a2/0x720 [ 429.590110][T21934] ? __cfi_ip_generic_getfrag+0x10/0x10 [ 429.590141][T21934] ? __cfi_ip6_make_skb+0x10/0x10 [ 429.590178][T21934] ? ip6_sk_dst_lookup_flow+0x463/0x790 [ 429.590203][T21934] udpv6_sendmsg+0x1cb7/0x27b0 [ 429.590226][T21934] ? __cfi_ip_generic_getfrag+0x10/0x10 [ 429.590256][T21934] ? __cfi_udpv6_sendmsg+0x10/0x10 [ 429.590281][T21934] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 429.590312][T21934] ? _raw_spin_unlock_bh+0x54/0x60 [ 429.590340][T21934] ? release_sock+0x171/0x1f0 [ 429.590367][T21934] ? inet_send_prepare+0x1e7/0x4f0 [ 429.590389][T21934] ? __cfi_udpv6_sendmsg+0x10/0x10 [ 429.590409][T21934] inet6_sendmsg+0xef/0x120 [ 429.590440][T21934] ____sys_sendmsg+0x5db/0xa70 [ 429.590473][T21934] ? __sys_sendmsg_sock+0x50/0x50 [ 429.590508][T21934] ? import_iovec+0x81/0xb0 [ 429.590537][T21934] ___sys_sendmsg+0x220/0x2a0 [ 429.590569][T21934] ? __sys_sendmsg+0x280/0x280 [ 429.590600][T21934] ? kstrtouint+0x78/0xf0 [ 429.590627][T21934] __sys_sendmmsg+0x271/0x470 [ 429.590660][T21934] ? __cfi___sys_sendmmsg+0x10/0x10 [ 429.590698][T21934] ? __cfi_ksys_write+0x10/0x10 [ 429.590721][T21934] __x64_sys_sendmmsg+0xa4/0xc0 [ 429.590753][T21934] x64_sys_call+0xfec/0x2ee0 [ 429.590786][T21934] do_syscall_64+0x58/0xf0 [ 429.590814][T21934] ? clear_bhb_loop+0x50/0xa0 [ 429.590839][T21934] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 429.590862][T21934] RIP: 0033:0x7f0eb2f8f6c9 [ 429.590880][T21934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.590899][T21934] RSP: 002b:00007f0eb3df4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 429.590923][T21934] RAX: ffffffffffffffda RBX: 00007f0eb31e5fa0 RCX: 00007f0eb2f8f6c9 [ 429.590941][T21934] RDX: 0000000000000001 RSI: 0000200000006b80 RDI: 0000000000000005 [ 429.590956][T21934] RBP: 00007f0eb3df4090 R08: 0000000000000000 R09: 0000000000000000 [ 429.590972][T21934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.590986][T21934] R13: 00007f0eb31e6038 R14: 00007f0eb31e5fa0 R15: 00007ffd41735288 [ 429.591006][T21934] [ 430.028499][T21949] netlink: 352 bytes leftover after parsing attributes in process `syz.1.9915'. [ 430.249699][T21962] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9925'. [ 430.368139][ T1676] usb 5-1: new high-speed USB device number 9 using dummy_hcd [ 430.388309][T21968] netlink: 352 bytes leftover after parsing attributes in process `syz.1.9928'. [ 430.481361][T21980] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9934'. [ 430.518109][ T1676] usb 5-1: Using ep0 maxpacket: 8 [ 430.529218][ T1676] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 430.540264][ T1676] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 2 [ 430.558289][ T1676] usb 5-1: config 1 interface 0 altsetting 0 has an endpoint descriptor with address 0x76, changing to 0x6 [ 430.588100][ T1676] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x6 has an invalid bInterval 100, changing to 10 [ 430.608094][ T1676] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x6 has invalid maxpacket 24936, setting to 1024 [ 430.628116][ T1676] usb 5-1: New USB device found, idVendor=0225, idProduct=0000, bcdDevice= 0.00 [ 430.644951][ T1676] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 430.664957][ T1676] hub 5-1:1.0: bad descriptor, ignoring hub [ 430.680092][ T1676] hub 5-1:1.0: probe with driver hub failed with error -5 [ 430.690068][ T1676] cdc_wdm 5-1:1.0: skipping garbage [ 430.695342][ T1676] cdc_wdm 5-1:1.0: skipping garbage [ 430.701056][ T1676] cdc_wdm 5-1:1.0: probe with driver cdc_wdm failed with error -22 [ 430.753496][T21994] netlink: 96 bytes leftover after parsing attributes in process `syz.2.9940'. [ 431.068199][ T330] usb 5-1: USB disconnect, device number 9 [ 431.302973][T22021] bridge0: port 5(veth1_to_bridge) entered blocking state [ 431.310226][T22021] bridge0: port 5(veth1_to_bridge) entered disabled state [ 431.317469][T22021] veth1_to_bridge: entered allmulticast mode [ 431.324272][T22021] veth1_to_bridge: entered promiscuous mode [ 431.330665][T22021] bridge0: adding interface veth1_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 431.343447][T22021] bridge0: port 5(veth1_to_bridge) entered blocking state [ 431.350621][T22021] bridge0: port 5(veth1_to_bridge) entered forwarding state [ 431.598255][ T330] usb 5-1: new full-speed USB device number 10 using dummy_hcd [ 431.625139][ T36] audit: type=1400 audit(2000000321.838:543): avc: denied { setopt } for pid=22040 comm="syz.2.9956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 431.699503][T22051] FAULT_INJECTION: forcing a failure. [ 431.699503][T22051] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 431.712646][T22051] CPU: 0 UID: 0 PID: 22051 Comm: syz.1.9965 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 431.712681][T22051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 431.712695][T22051] Call Trace: [ 431.712701][T22051] [ 431.712708][T22051] __dump_stack+0x21/0x30 [ 431.712733][T22051] dump_stack_lvl+0x10c/0x190 [ 431.712754][T22051] ? __cfi_dump_stack_lvl+0x10/0x10 [ 431.712776][T22051] ? find_vma+0xcd/0x110 [ 431.712791][T22051] dump_stack+0x19/0x20 [ 431.712811][T22051] should_fail_ex+0x3d9/0x530 [ 431.712827][T22051] should_fail+0xf/0x20 [ 431.712841][T22051] should_fail_usercopy+0x1e/0x30 [ 431.712860][T22051] _copy_from_user+0x22/0xb0 [ 431.712879][T22051] io_submit_one+0xca/0x18c0 [ 431.712900][T22051] ? lookup_ioctx+0x360/0x360 [ 431.712918][T22051] ? asm_exc_page_fault+0x2b/0x30 [ 431.712936][T22051] ? __get_user_4+0x1a/0x40 [ 431.712952][T22051] ? lookup_ioctx+0x208/0x360 [ 431.712982][T22051] __se_sys_io_submit+0x164/0x3c0 [ 431.712997][T22051] ? __x64_sys_io_submit+0xa0/0xa0 [ 431.713013][T22051] ? ksys_write+0x1ef/0x250 [ 431.713028][T22051] ? __kasan_check_read+0x15/0x20 [ 431.713050][T22051] __x64_sys_io_submit+0x7f/0xa0 [ 431.713066][T22051] x64_sys_call+0x1c95/0x2ee0 [ 431.713087][T22051] do_syscall_64+0x58/0xf0 [ 431.713105][T22051] ? clear_bhb_loop+0x50/0xa0 [ 431.713122][T22051] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 431.713137][T22051] RIP: 0033:0x7f0eb2f8f6c9 [ 431.713150][T22051] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 431.713162][T22051] RSP: 002b:00007f0eb3df4038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 431.713178][T22051] RAX: ffffffffffffffda RBX: 00007f0eb31e5fa0 RCX: 00007f0eb2f8f6c9 [ 431.713189][T22051] RDX: 0000200000000940 RSI: 0000000000000001 RDI: 00007f0eb3db3000 [ 431.713199][T22051] RBP: 00007f0eb3df4090 R08: 0000000000000000 R09: 0000000000000000 [ 431.713209][T22051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 431.713218][T22051] R13: 00007f0eb31e6038 R14: 00007f0eb31e5fa0 R15: 00007ffd41735288 [ 431.713231][T22051] [ 431.849648][ T330] usb 5-1: not running at top speed; connect to a high speed hub [ 431.938571][ T330] usb 5-1: config 1 interface 0 altsetting 5 endpoint 0x2 has invalid maxpacket 1024, setting to 64 [ 431.949463][ T330] usb 5-1: config 1 interface 0 has no altsetting 0 [ 431.957491][ T330] usb 5-1: New USB device found, idVendor=20bc, idProduct=5500, bcdDevice= 0.40 [ 431.966582][ T330] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 431.974659][ T330] usb 5-1: Product: syz [ 431.978858][ T330] usb 5-1: Manufacturer: á [ 431.983489][ T330] usb 5-1: SerialNumber: syz [ 431.989123][T22022] raw-gadget.1 gadget.4: fail, usb_ep_enable returned -22 [ 432.206847][T22070] random: crng reseeded on system resumption [ 432.592033][T22108] random: crng reseeded on system resumption [ 432.604741][T22110] FAULT_INJECTION: forcing a failure. [ 432.604741][T22110] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 432.618211][T22110] CPU: 0 UID: 0 PID: 22110 Comm: syz.1.9992 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 432.618249][T22110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 432.618265][T22110] Call Trace: [ 432.618274][T22110] [ 432.618283][T22110] __dump_stack+0x21/0x30 [ 432.618319][T22110] dump_stack_lvl+0x10c/0x190 [ 432.618351][T22110] ? __cfi_dump_stack_lvl+0x10/0x10 [ 432.618383][T22110] ? check_stack_object+0x12c/0x140 [ 432.618407][T22110] dump_stack+0x19/0x20 [ 432.618437][T22110] should_fail_ex+0x3d9/0x530 [ 432.618461][T22110] should_fail+0xf/0x20 [ 432.618483][T22110] should_fail_usercopy+0x1e/0x30 [ 432.618508][T22110] _copy_to_user+0x24/0xa0 [ 432.618536][T22110] simple_read_from_buffer+0xed/0x160 [ 432.618567][T22110] proc_fail_nth_read+0x19e/0x210 [ 432.618599][T22110] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 432.618629][T22110] ? bpf_lsm_file_permission+0xd/0x20 [ 432.618660][T22110] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 432.618691][T22110] vfs_read+0x27d/0xc70 [ 432.618714][T22110] ? __cfi_vfs_read+0x10/0x10 [ 432.618733][T22110] ? __kasan_check_write+0x18/0x20 [ 432.618767][T22110] ? mutex_lock+0x92/0x1c0 [ 432.618788][T22110] ? __cfi_mutex_lock+0x10/0x10 [ 432.618809][T22110] ? __fget_files+0x2c5/0x340 [ 432.618846][T22110] ksys_read+0x141/0x250 [ 432.618867][T22110] ? __cfi_ksys_read+0x10/0x10 [ 432.618887][T22110] ? __kasan_check_write+0x18/0x20 [ 432.618920][T22110] ? fput+0x1a5/0x240 [ 432.618947][T22110] ? __kasan_check_read+0x15/0x20 [ 432.618982][T22110] __x64_sys_read+0x7f/0x90 [ 432.619003][T22110] x64_sys_call+0x2638/0x2ee0 [ 432.619036][T22110] do_syscall_64+0x58/0xf0 [ 432.619065][T22110] ? clear_bhb_loop+0x50/0xa0 [ 432.619091][T22110] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 432.619116][T22110] RIP: 0033:0x7f0eb2f8e0dc [ 432.619135][T22110] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 432.619155][T22110] RSP: 002b:00007f0eb3df4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 432.619181][T22110] RAX: ffffffffffffffda RBX: 00007f0eb31e5fa0 RCX: 00007f0eb2f8e0dc [ 432.619199][T22110] RDX: 000000000000000f RSI: 00007f0eb3df40a0 RDI: 0000000000000006 [ 432.619214][T22110] RBP: 00007f0eb3df4090 R08: 0000000000000000 R09: 0000000000000000 [ 432.619230][T22110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 432.619244][T22110] R13: 00007f0eb31e6038 R14: 00007f0eb31e5fa0 R15: 00007ffd41735288 [ 432.619264][T22110] [ 432.882649][T22124] FAULT_INJECTION: forcing a failure. [ 432.882649][T22124] name failslab, interval 1, probability 0, space 0, times 0 [ 432.895702][T22124] CPU: 1 UID: 0 PID: 22124 Comm: syz.2.10000 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 432.895752][T22124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 432.895769][T22124] Call Trace: [ 432.895777][T22124] [ 432.895787][T22124] __dump_stack+0x21/0x30 [ 432.895824][T22124] dump_stack_lvl+0x10c/0x190 [ 432.895855][T22124] ? __cfi_dump_stack_lvl+0x10/0x10 [ 432.895889][T22124] dump_stack+0x19/0x20 [ 432.895917][T22124] should_fail_ex+0x3d9/0x530 [ 432.895941][T22124] should_failslab+0xac/0x100 [ 432.895966][T22124] kmem_cache_alloc_noprof+0x42/0x430 [ 432.895987][T22124] ? skb_clone+0x229/0x460 [ 432.896017][T22124] ? kmem_cache_alloc_node_noprof+0x1f9/0x440 [ 432.896040][T22124] skb_clone+0x229/0x460 [ 432.896072][T22124] pfkey_broadcast_one+0xa2/0x3b0 [ 432.896108][T22124] pfkey_broadcast+0x2d9/0x320 [ 432.896142][T22124] pfkey_sendmsg+0xdfd/0x1030 [ 432.896164][T22124] ? __cfi_avc_has_perm+0x10/0x10 [ 432.896198][T22124] ? __cfi_pfkey_sendmsg+0x10/0x10 [ 432.896218][T22124] ? selinux_socket_sendmsg+0x284/0x380 [ 432.896258][T22124] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 432.896287][T22124] ? security_socket_sendmsg+0x33/0xd0 [ 432.896308][T22124] ? __cfi_pfkey_sendmsg+0x10/0x10 [ 432.896329][T22124] ____sys_sendmsg+0xa15/0xa70 [ 432.896364][T22124] ? __sys_sendmsg_sock+0x50/0x50 [ 432.896399][T22124] ? import_iovec+0x81/0xb0 [ 432.896431][T22124] ___sys_sendmsg+0x220/0x2a0 [ 432.896464][T22124] ? __sys_sendmsg+0x280/0x280 [ 432.896497][T22124] ? proc_fail_nth_write+0x17e/0x210 [ 432.896528][T22124] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 432.896566][T22124] __x64_sys_sendmsg+0x1eb/0x2c0 [ 432.896601][T22124] ? fput+0x1a5/0x240 [ 432.896627][T22124] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 432.896660][T22124] ? ksys_write+0x1ef/0x250 [ 432.896681][T22124] ? __kasan_check_read+0x15/0x20 [ 432.896714][T22124] x64_sys_call+0x2a4c/0x2ee0 [ 432.896757][T22124] do_syscall_64+0x58/0xf0 [ 432.896785][T22124] ? clear_bhb_loop+0x50/0xa0 [ 432.896809][T22124] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 432.896834][T22124] RIP: 0033:0x7fa98718f6c9 [ 432.896853][T22124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 432.896883][T22124] RSP: 002b:00007fa9880e6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 432.896906][T22124] RAX: ffffffffffffffda RBX: 00007fa9873e5fa0 RCX: 00007fa98718f6c9 [ 432.896924][T22124] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000005 [ 432.896939][T22124] RBP: 00007fa9880e6090 R08: 0000000000000000 R09: 0000000000000000 [ 432.896954][T22124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 432.896968][T22124] R13: 00007fa9873e6038 R14: 00007fa9873e5fa0 R15: 00007ffd27407e58 [ 432.896987][T22124] [ 433.173229][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 433.185453][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 433.197613][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 433.209796][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 433.221919][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 433.234044][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 433.246180][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 433.258313][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 433.270420][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 433.282527][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 434.110272][T22167] random: crng reseeded on system resumption [ 434.358100][ T330] usbhid 5-1:1.0: can't add hid device: -71 [ 434.364059][ T330] usbhid 5-1:1.0: probe with driver usbhid failed with error -71 [ 434.408677][ T330] usb 5-1: USB disconnect, device number 10 [ 434.451192][T22184] netlink: 'syz.5.10027': attribute type 29 has an invalid length. [ 434.507148][T22189] netlink: 'syz.1.10030': attribute type 32 has an invalid length. [ 434.515427][T22189] __nla_validate_parse: 4 callbacks suppressed [ 434.515448][T22189] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10030'. [ 434.953432][T22210] netlink: 'syz.2.10038': attribute type 29 has an invalid length. [ 435.002759][T22212] netlink: 4432 bytes leftover after parsing attributes in process `syz.2.10039'. [ 435.332234][T22234] rust_binder: Error in use_page_slow: ESRCH [ 435.332266][T22234] rust_binder: use_range failure ESRCH [ 435.352606][T22234] rust_binder: Failed to allocate buffer. len:176, is_oneway:false [ 435.367853][T22234] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: ESRCH } [ 435.393405][T22237] rust_binder: 409: no such ref 3 [ 435.437998][T22234] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ESRCH } my_pid:409 [ 435.438492][T22237] rust_binder: BC_REQUEST_DEATH_NOTIFICATION invalid ref 3 [ 435.495493][T22237] rust_binder: BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 [ 435.516570][T22237] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ENOENT } my_pid:409 [ 435.550622][T22242] bridge0: port 5(veth1_to_bridge) entered blocking state [ 435.595619][T22242] bridge0: port 5(veth1_to_bridge) entered disabled state [ 435.625277][T22242] veth1_to_bridge: entered allmulticast mode [ 435.655292][T22242] veth1_to_bridge: entered promiscuous mode [ 435.681500][T22242] bridge0: adding interface veth1_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 435.751428][T22242] bridge0: port 5(veth1_to_bridge) entered blocking state [ 435.758639][T22242] bridge0: port 5(veth1_to_bridge) entered forwarding state [ 435.956928][T22251] FAULT_INJECTION: forcing a failure. [ 435.956928][T22251] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 435.980019][T22251] CPU: 0 UID: 0 PID: 22251 Comm: syz.1.10050 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 435.980057][T22251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 435.980074][T22251] Call Trace: [ 435.980081][T22251] [ 435.980091][T22251] __dump_stack+0x21/0x30 [ 435.980128][T22251] dump_stack_lvl+0x10c/0x190 [ 435.980159][T22251] ? __cfi_dump_stack_lvl+0x10/0x10 [ 435.980192][T22251] dump_stack+0x19/0x20 [ 435.980222][T22251] should_fail_ex+0x3d9/0x530 [ 435.980247][T22251] should_fail+0xf/0x20 [ 435.980269][T22251] should_fail_usercopy+0x1e/0x30 [ 435.980295][T22251] _copy_from_user+0x22/0xb0 [ 435.980324][T22251] do_fcntl+0x8b2/0x1500 [ 435.980353][T22251] ? __cfi_selinux_file_fcntl+0x10/0x10 [ 435.980382][T22251] ? check_fcntl_cmd+0xb0/0xb0 [ 435.980404][T22251] ? __cfi_mutex_unlock+0x10/0x10 [ 435.980426][T22251] ? __fget_files+0x2c5/0x340 [ 435.980453][T22251] ? bpf_lsm_file_fcntl+0xd/0x20 [ 435.980493][T22251] ? security_file_fcntl+0x34/0xd0 [ 435.980521][T22251] __se_sys_fcntl+0xe4/0x180 [ 435.980544][T22251] __x64_sys_fcntl+0x7f/0xa0 [ 435.980566][T22251] x64_sys_call+0x1cb3/0x2ee0 [ 435.980601][T22251] do_syscall_64+0x58/0xf0 [ 435.980630][T22251] ? clear_bhb_loop+0x50/0xa0 [ 435.980656][T22251] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 435.980681][T22251] RIP: 0033:0x7f0eb2f8f6c9 [ 435.980701][T22251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 435.980722][T22251] RSP: 002b:00007f0eb3df4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 435.980748][T22251] RAX: ffffffffffffffda RBX: 00007f0eb31e5fa0 RCX: 00007f0eb2f8f6c9 [ 435.980767][T22251] RDX: 00002000000000c0 RSI: 0000000000000024 RDI: 0000000000000005 [ 435.980783][T22251] RBP: 00007f0eb3df4090 R08: 0000000000000000 R09: 0000000000000000 [ 435.980799][T22251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 435.980814][T22251] R13: 00007f0eb31e6038 R14: 00007f0eb31e5fa0 R15: 00007ffd41735288 [ 435.980835][T22251] [ 437.787963][T22320] FAULT_INJECTION: forcing a failure. [ 437.787963][T22320] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 437.801144][ T10] usb 6-1: new full-speed USB device number 5 using dummy_hcd [ 437.834232][T22320] CPU: 0 UID: 0 PID: 22320 Comm: syz.2.10085 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 437.834269][T22320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 437.834284][T22320] Call Trace: [ 437.834292][T22320] [ 437.834301][T22320] __dump_stack+0x21/0x30 [ 437.834349][T22320] dump_stack_lvl+0x10c/0x190 [ 437.834379][T22320] ? __cfi_dump_stack_lvl+0x10/0x10 [ 437.834410][T22320] ? find_vma+0xcd/0x110 [ 437.834432][T22320] dump_stack+0x19/0x20 [ 437.834460][T22320] should_fail_ex+0x3d9/0x530 [ 437.834484][T22320] should_fail+0xf/0x20 [ 437.834504][T22320] should_fail_usercopy+0x1e/0x30 [ 437.834529][T22320] _copy_from_user+0x22/0xb0 [ 437.834557][T22320] io_submit_one+0xca/0x18c0 [ 437.834588][T22320] ? lookup_ioctx+0x360/0x360 [ 437.834614][T22320] ? asm_exc_page_fault+0x2b/0x30 [ 437.834639][T22320] ? __get_user_4+0x1a/0x40 [ 437.834663][T22320] ? lookup_ioctx+0x208/0x360 [ 437.834689][T22320] __se_sys_io_submit+0x164/0x3c0 [ 437.834714][T22320] ? __x64_sys_io_submit+0xa0/0xa0 [ 437.834738][T22320] ? ksys_write+0x1ef/0x250 [ 437.834760][T22320] ? __kasan_check_read+0x15/0x20 [ 437.834794][T22320] __x64_sys_io_submit+0x7f/0xa0 [ 437.834818][T22320] x64_sys_call+0x1c95/0x2ee0 [ 437.834852][T22320] do_syscall_64+0x58/0xf0 [ 437.834879][T22320] ? clear_bhb_loop+0x50/0xa0 [ 437.834905][T22320] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 437.834929][T22320] RIP: 0033:0x7fa98718f6c9 [ 437.834948][T22320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 437.834969][T22320] RSP: 002b:00007fa9880e6038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 437.834994][T22320] RAX: ffffffffffffffda RBX: 00007fa9873e5fa0 RCX: 00007fa98718f6c9 [ 437.835011][T22320] RDX: 0000200000000280 RSI: 0000000000000001 RDI: 00007fa988045000 [ 437.835027][T22320] RBP: 00007fa9880e6090 R08: 0000000000000000 R09: 0000000000000000 [ 437.835043][T22320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 437.835057][T22320] R13: 00007fa9873e6038 R14: 00007fa9873e5fa0 R15: 00007ffd27407e58 [ 437.835076][T22320] [ 438.177840][ C1] net_ratelimit: 31399 callbacks suppressed [ 438.177861][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 438.196382][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 438.208714][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 438.221098][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 438.233468][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 438.245963][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 438.258313][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 438.270647][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 438.282976][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 438.288251][ T10] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 438.295361][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 438.350511][ T10] usb 6-1: New USB device found, idVendor=056e, idProduct=010c, bcdDevice= 0.00 [ 438.374111][ T10] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 438.391890][T22336] bridge0: port 6(veth1_to_bridge) entered blocking state [ 438.408417][ T10] usb 6-1: config 0 descriptor?? [ 438.416721][T22336] bridge0: port 6(veth1_to_bridge) entered disabled state [ 438.444434][T22336] veth1_to_bridge: entered allmulticast mode [ 438.467826][T22336] veth1_to_bridge: entered promiscuous mode [ 438.497280][T22336] bridge0: adding interface veth1_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 438.537711][T22336] bridge0: port 6(veth1_to_bridge) entered blocking state [ 438.544916][T22336] bridge0: port 6(veth1_to_bridge) entered forwarding state [ 438.893159][ T10] elecom 0003:056E:010C.000B: collection stack underflow [ 438.924238][ T10] elecom 0003:056E:010C.000B: item 0 0 0 12 parsing failed [ 438.954721][ T10] elecom 0003:056E:010C.000B: probe with driver elecom failed with error -22 [ 439.091943][ T10] usb 6-1: USB disconnect, device number 5 [ 439.251941][T22369] random: crng reseeded on system resumption [ 439.441243][T22386] binder: Unknown parameter ' ' [ 440.330491][T22423] FAULT_INJECTION: forcing a failure. [ 440.330491][T22423] name failslab, interval 1, probability 0, space 0, times 0 [ 440.383531][T22423] CPU: 0 UID: 0 PID: 22423 Comm: syz.5.10127 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 440.383572][T22423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 440.383589][T22423] Call Trace: [ 440.383597][T22423] [ 440.383607][T22423] __dump_stack+0x21/0x30 [ 440.383644][T22423] dump_stack_lvl+0x10c/0x190 [ 440.383676][T22423] ? __cfi_dump_stack_lvl+0x10/0x10 [ 440.383708][T22423] ? is_bpf_text_address+0x17b/0x1a0 [ 440.383736][T22423] dump_stack+0x19/0x20 [ 440.383766][T22423] should_fail_ex+0x3d9/0x530 [ 440.383791][T22423] should_failslab+0xac/0x100 [ 440.383818][T22423] __kmalloc_cache_noprof+0x41/0x490 [ 440.383841][T22423] ? alloc_pipe_info+0xfb/0x600 [ 440.383876][T22423] alloc_pipe_info+0xfb/0x600 [ 440.383911][T22423] splice_direct_to_actor+0x96d/0xbc0 [ 440.383940][T22423] ? kstrtouint+0x78/0xf0 [ 440.383961][T22423] ? kstrtouint_from_user+0xfb/0x150 [ 440.383983][T22423] ? __x64_sys_openat+0x13a/0x170 [ 440.384013][T22423] ? x64_sys_call+0xe69/0x2ee0 [ 440.384047][T22423] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 440.384070][T22423] ? selinux_file_permission+0x309/0xb30 [ 440.384099][T22423] ? avc_policy_seqno+0xd/0x30 [ 440.384130][T22423] ? __cfi_direct_splice_actor+0x10/0x10 [ 440.384166][T22423] ? __cfi_splice_direct_to_actor+0x10/0x10 [ 440.384196][T22423] do_splice_direct+0x182/0x270 [ 440.384224][T22423] ? __cfi_do_splice_direct+0x10/0x10 [ 440.384251][T22423] ? __cfi_direct_file_splice_eof+0x10/0x10 [ 440.384282][T22423] ? security_file_permission+0x2e/0xc0 [ 440.384309][T22423] ? rw_verify_area+0xac/0x230 [ 440.384344][T22423] do_sendfile+0x5c8/0xfb0 [ 440.384374][T22423] ? vfs_writev+0xcf0/0xcf0 [ 440.384400][T22423] ? __kasan_check_write+0x18/0x20 [ 440.384436][T22423] ? ksys_write+0x1ef/0x250 [ 440.384457][T22423] __x64_sys_sendfile64+0x193/0x1f0 [ 440.384485][T22423] ? __cfi___x64_sys_sendfile64+0x10/0x10 [ 440.384511][T22423] ? __kasan_check_read+0x15/0x20 [ 440.384566][T22423] x64_sys_call+0xa26/0x2ee0 [ 440.384601][T22423] do_syscall_64+0x58/0xf0 [ 440.384632][T22423] ? clear_bhb_loop+0x50/0xa0 [ 440.384658][T22423] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 440.384683][T22423] RIP: 0033:0x7f6de458f6c9 [ 440.384702][T22423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 440.384725][T22423] RSP: 002b:00007f6de547b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 440.384751][T22423] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458f6c9 [ 440.384770][T22423] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000005 [ 440.384786][T22423] RBP: 00007f6de547b090 R08: 0000000000000000 R09: 0000000000000000 [ 440.384802][T22423] R10: 0000000024002de8 R11: 0000000000000246 R12: 0000000000000001 [ 440.384818][T22423] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 440.384840][T22423] [ 441.222012][T22443] FAULT_INJECTION: forcing a failure. [ 441.222012][T22443] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 441.242352][T22443] CPU: 0 UID: 0 PID: 22443 Comm: syz.5.10136 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 441.242392][T22443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 441.242407][T22443] Call Trace: [ 441.242415][T22443] [ 441.242425][T22443] __dump_stack+0x21/0x30 [ 441.242462][T22443] dump_stack_lvl+0x10c/0x190 [ 441.242492][T22443] ? __cfi_dump_stack_lvl+0x10/0x10 [ 441.242523][T22443] ? check_stack_object+0x82/0x140 [ 441.242547][T22443] dump_stack+0x19/0x20 [ 441.242575][T22443] should_fail_ex+0x3d9/0x530 [ 441.242600][T22443] should_fail+0xf/0x20 [ 441.242620][T22443] should_fail_usercopy+0x1e/0x30 [ 441.242645][T22443] _copy_from_user+0x22/0xb0 [ 441.242674][T22443] memdup_user+0x81/0x180 [ 441.242707][T22443] ? strndup_user+0x40/0xd0 [ 441.242739][T22443] strndup_user+0x6c/0xd0 [ 441.242773][T22443] __se_sys_mount+0x9f/0x480 [ 441.242794][T22443] ? ksys_write+0x1ef/0x250 [ 441.242823][T22443] ? __x64_sys_mount+0xf0/0xf0 [ 441.242845][T22443] __x64_sys_mount+0xc3/0xf0 [ 441.242867][T22443] x64_sys_call+0x2021/0x2ee0 [ 441.242901][T22443] do_syscall_64+0x58/0xf0 [ 441.242932][T22443] ? clear_bhb_loop+0x50/0xa0 [ 441.242958][T22443] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 441.242982][T22443] RIP: 0033:0x7f6de458f6c9 [ 441.243002][T22443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.243022][T22443] RSP: 002b:00007f6de547b038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 441.243048][T22443] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458f6c9 [ 441.243067][T22443] RDX: 0000200000000180 RSI: 0000200000000140 RDI: 0000000000000000 [ 441.243084][T22443] RBP: 00007f6de547b090 R08: 0000200000000040 R09: 0000000000000000 [ 441.243101][T22443] R10: 0000000000000088 R11: 0000000000000246 R12: 0000000000000001 [ 441.243117][T22443] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 441.243138][T22443] [ 441.520438][T22450] netlink: 556 bytes leftover after parsing attributes in process `syz.1.10138'. [ 441.831259][T22469] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10149'. [ 441.918475][T22475] netlink: 556 bytes leftover after parsing attributes in process `syz.1.10151'. [ 441.957548][ T10] usb 5-1: new low-speed USB device number 11 using dummy_hcd [ 442.120517][ T10] usb 5-1: config 1 interface 0 has no altsetting 0 [ 442.129498][ T10] usb 5-1: string descriptor 0 read error: -22 [ 442.135833][ T10] usb 5-1: New USB device found, idVendor=0458, idProduct=5015, bcdDevice= 0.40 [ 442.149407][T22486] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10157'. [ 442.169077][ T10] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 442.189618][T22486] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.237280][T22486] bridge_slave_0 (unregistering): left allmulticast mode [ 442.247490][T22486] bridge_slave_0 (unregistering): left promiscuous mode [ 442.265130][T22486] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.384940][T22491] bridge0: port 1(veth1_to_bridge) entered blocking state [ 442.400388][T22491] bridge0: port 1(veth1_to_bridge) entered disabled state [ 442.417359][ T10] usbhid 5-1:1.0: can't add hid device: -71 [ 442.425070][ T10] usbhid 5-1:1.0: probe with driver usbhid failed with error -71 [ 442.432937][T22491] veth1_to_bridge: entered allmulticast mode [ 442.441674][T22491] veth1_to_bridge: entered promiscuous mode [ 442.452808][ T10] usb 5-1: USB disconnect, device number 11 [ 442.459605][T22491] bridge0: adding interface veth1_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 442.477067][T22491] bridge0: port 1(veth1_to_bridge) entered blocking state [ 442.484387][T22491] bridge0: port 1(veth1_to_bridge) entered forwarding state [ 442.787432][ T1676] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 442.927465][ T1676] usb 2-1: device descriptor read/64, error -71 [ 442.988185][T22502] FAULT_INJECTION: forcing a failure. [ 442.988185][T22502] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 443.031674][T22502] CPU: 0 UID: 0 PID: 22502 Comm: syz.2.10163 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 443.031715][T22502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 443.031731][T22502] Call Trace: [ 443.031739][T22502] [ 443.031749][T22502] __dump_stack+0x21/0x30 [ 443.031785][T22502] dump_stack_lvl+0x10c/0x190 [ 443.031817][T22502] ? __cfi_dump_stack_lvl+0x10/0x10 [ 443.031850][T22502] dump_stack+0x19/0x20 [ 443.031879][T22502] should_fail_ex+0x3d9/0x530 [ 443.031904][T22502] should_fail+0xf/0x20 [ 443.031926][T22502] should_fail_usercopy+0x1e/0x30 [ 443.031952][T22502] strncpy_from_user+0x28/0x270 [ 443.031977][T22502] getname_flags+0x102/0x710 [ 443.032000][T22502] ? build_open_flags+0x487/0x600 [ 443.032032][T22502] getname+0x1b/0x30 [ 443.032054][T22502] do_sys_openat2+0xcb/0x1c0 [ 443.032083][T22502] ? fput+0x1a5/0x240 [ 443.032109][T22502] ? do_sys_open+0x100/0x100 [ 443.032138][T22502] ? ksys_write+0x1ef/0x250 [ 443.032159][T22502] ? __cfi_ksys_write+0x10/0x10 [ 443.032182][T22502] __x64_sys_openat+0x13a/0x170 [ 443.032213][T22502] x64_sys_call+0xe69/0x2ee0 [ 443.032247][T22502] do_syscall_64+0x58/0xf0 [ 443.032277][T22502] ? clear_bhb_loop+0x50/0xa0 [ 443.032305][T22502] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 443.032330][T22502] RIP: 0033:0x7fa98718f6c9 [ 443.032349][T22502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 443.032370][T22502] RSP: 002b:00007fa9880e6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 443.032396][T22502] RAX: ffffffffffffffda RBX: 00007fa9873e5fa0 RCX: 00007fa98718f6c9 [ 443.032415][T22502] RDX: 0000000000000000 RSI: 0000200000004280 RDI: ffffffffffffff9c [ 443.032444][T22502] RBP: 00007fa9880e6090 R08: 0000000000000000 R09: 0000000000000000 [ 443.032460][T22502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 443.032474][T22502] R13: 00007fa9873e6038 R14: 00007fa9873e5fa0 R15: 00007ffd27407e58 [ 443.032494][T22502] [ 443.187505][ C1] net_ratelimit: 18213 callbacks suppressed [ 443.187533][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 443.216954][T22509] FAULT_INJECTION: forcing a failure. [ 443.216954][T22509] name failslab, interval 1, probability 0, space 0, times 0 [ 443.220527][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 443.228254][T22509] CPU: 0 UID: 0 PID: 22509 Comm: syz.4.10167 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 443.228287][T22509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 443.228305][T22509] Call Trace: [ 443.228315][T22509] [ 443.228327][T22509] __dump_stack+0x21/0x30 [ 443.228374][T22509] dump_stack_lvl+0x10c/0x190 [ 443.228408][T22509] ? __cfi_dump_stack_lvl+0x10/0x10 [ 443.228443][T22509] ? avc_has_extended_perms+0x921/0xdd0 [ 443.228480][T22509] dump_stack+0x19/0x20 [ 443.228511][T22509] should_fail_ex+0x3d9/0x530 [ 443.228537][T22509] should_failslab+0xac/0x100 [ 443.228565][T22509] __kmalloc_cache_node_noprof+0x46/0x450 [ 443.228591][T22509] ? __get_vm_area_node+0x154/0x3a0 [ 443.228635][T22509] __get_vm_area_node+0x154/0x3a0 [ 443.228667][T22509] __vmalloc_node_range_noprof+0x33c/0x1420 [ 443.228703][T22509] ? kvm_dev_ioctl+0x125/0x14d0 [ 443.228739][T22509] ? number+0xd21/0xf80 [ 443.228772][T22509] ? pointer+0xdd0/0xdd0 [ 443.228807][T22509] ? __cfi___vmalloc_node_range_noprof+0x10/0x10 [ 443.228843][T22509] ? vsnprintf+0x19b8/0x1aa0 [ 443.228874][T22509] ? kvm_dev_ioctl+0x125/0x14d0 [ 443.228908][T22509] __vmalloc_noprof+0xfe/0x1d0 [ 443.228959][T22509] ? kvm_dev_ioctl+0x125/0x14d0 [ 443.228995][T22509] ? alloc_fd+0x4e7/0x5a0 [ 443.229020][T22509] ? __cfi___vmalloc_noprof+0x10/0x10 [ 443.229058][T22509] kvm_dev_ioctl+0x125/0x14d0 [ 443.229095][T22509] ? __fget_files+0x2c5/0x340 [ 443.229121][T22509] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 443.229158][T22509] ? bpf_lsm_file_ioctl+0xd/0x20 [ 443.229193][T22509] ? security_file_ioctl+0x34/0xd0 [ 443.229222][T22509] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 443.229263][T22509] __se_sys_ioctl+0x135/0x1b0 [ 443.229293][T22509] __x64_sys_ioctl+0x7f/0xa0 [ 443.229320][T22509] x64_sys_call+0x1878/0x2ee0 [ 443.229360][T22509] do_syscall_64+0x58/0xf0 [ 443.229391][T22509] ? clear_bhb_loop+0x50/0xa0 [ 443.229421][T22509] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 443.229450][T22509] RIP: 0033:0x7fa90c58f6c9 [ 443.229471][T22509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 443.229496][T22509] RSP: 002b:00007fa90d392038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 443.229524][T22509] RAX: ffffffffffffffda RBX: 00007fa90c7e5fa0 RCX: 00007fa90c58f6c9 [ 443.229544][T22509] RDX: 000000000000001f RSI: 000000000000ae01 RDI: 0000000000000005 [ 443.229562][T22509] RBP: 00007fa90d392090 R08: 0000000000000000 R09: 0000000000000000 [ 443.229579][T22509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 443.229596][T22509] R13: 00007fa90c7e6038 R14: 00007fa90c7e5fa0 R15: 00007ffe31571a38 [ 443.229619][T22509] [ 443.229654][T22509] syz.4.10167: vmalloc error: size 39304, vm_struct allocation failed, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 443.236532][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 443.239301][T22509] ,cpuset= [ 443.245447][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 443.257439][T22509] syz4 [ 443.270708][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 443.282033][T22509] ,mems_allowed=0 [ 443.293899][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 443.303672][T22509] [ 443.307222][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 443.309930][T22509] CPU: 0 UID: 0 PID: 22509 Comm: syz.4.10167 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 443.309967][T22509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 443.309985][T22509] Call Trace: [ 443.309996][T22509] [ 443.310007][T22509] __dump_stack+0x21/0x30 [ 443.310056][T22509] dump_stack_lvl+0x10c/0x190 [ 443.310091][T22509] ? __cfi_dump_stack_lvl+0x10/0x10 [ 443.310129][T22509] dump_stack+0x19/0x20 [ 443.310160][T22509] warn_alloc+0x1bc/0x2a0 [ 443.310194][T22509] ? __kasan_kmalloc+0x28/0xb0 [ 443.310225][T22509] ? __cfi_warn_alloc+0x10/0x10 [ 443.310260][T22509] ? __get_vm_area_node+0x392/0x3a0 [ 443.310297][T22509] __vmalloc_node_range_noprof+0x361/0x1420 [ 443.310334][T22509] ? number+0xd21/0xf80 [ 443.310379][T22509] ? pointer+0xdd0/0xdd0 [ 443.310409][T22509] ? __cfi___vmalloc_node_range_noprof+0x10/0x10 [ 443.310446][T22509] ? vsnprintf+0x19b8/0x1aa0 [ 443.310478][T22509] ? kvm_dev_ioctl+0x125/0x14d0 [ 443.310514][T22509] __vmalloc_noprof+0xfe/0x1d0 [ 443.310549][T22509] ? kvm_dev_ioctl+0x125/0x14d0 [ 443.310584][T22509] ? alloc_fd+0x4e7/0x5a0 [ 443.310609][T22509] ? __cfi___vmalloc_noprof+0x10/0x10 [ 443.310653][T22509] kvm_dev_ioctl+0x125/0x14d0 [ 443.310691][T22509] ? __fget_files+0x2c5/0x340 [ 443.310717][T22509] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 443.310753][T22509] ? bpf_lsm_file_ioctl+0xd/0x20 [ 443.310788][T22509] ? security_file_ioctl+0x34/0xd0 [ 443.310816][T22509] ? __cfi_kvm_dev_ioctl+0x10/0x10 [ 443.310852][T22509] __se_sys_ioctl+0x135/0x1b0 [ 443.310890][T22509] __x64_sys_ioctl+0x7f/0xa0 [ 443.310915][T22509] x64_sys_call+0x1878/0x2ee0 [ 443.310949][T22509] do_syscall_64+0x58/0xf0 [ 443.310979][T22509] ? clear_bhb_loop+0x50/0xa0 [ 443.311005][T22509] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 443.311030][T22509] RIP: 0033:0x7fa90c58f6c9 [ 443.311051][T22509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 443.311074][T22509] RSP: 002b:00007fa90d392038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 443.311099][T22509] RAX: ffffffffffffffda RBX: 00007fa90c7e5fa0 RCX: 00007fa90c58f6c9 [ 443.311118][T22509] RDX: 000000000000001f RSI: 000000000000ae01 RDI: 0000000000000005 [ 443.311134][T22509] RBP: 00007fa90d392090 R08: 0000000000000000 R09: 0000000000000000 [ 443.311149][T22509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 443.311165][T22509] R13: 00007fa90c7e6038 R14: 00007fa90c7e5fa0 R15: 00007ffe31571a38 [ 443.311186][T22509] [ 443.311220][T22509] Mem-Info: [ 443.314512][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 443.318969][T22509] active_anon:83500 inactive_anon:80 isolated_anon:0 [ 443.318969][T22509] active_file:27534 inactive_file:2718 isolated_file:0 [ 443.318969][T22509] unevictable:16395 dirty:265 writeback:0 [ 443.318969][T22509] slab_reclaimable:6440 slab_unreclaimable:84138 [ 443.318969][T22509] mapped:40529 shmem:78032 pagetables:810 [ 443.318969][T22509] sec_pagetables:0 bounce:0 [ 443.318969][T22509] kernel_misc_reclaimable:0 [ 443.318969][T22509] free:1401191 free_pcp:1894 free_cma:0 [ 443.324425][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 443.329735][T22509] Node 0 active_anon:334000kB inactive_anon:320kB active_file:110136kB inactive_file:10872kB unevictable:65580kB isolated(anon):0kB isolated(file):0kB mapped:162116kB dirty:1060kB writeback:0kB shmem:312128kB shmem_thp:0kB shmem_pmdmapped:0kB anon_thp:0kB writeback_tmp:0kB kernel_stack:5340kB pagetables:3240kB sec_pagetables:0kB all_unreclaimable? no [ 443.334151][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 443.338651][T22509] DMA32 free:2960212kB boost:0kB min:19088kB low:23860kB high:28632kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2965936kB mlocked:0kB bounce:0kB free_pcp:5724kB local_pcp:68kB free_cma:0kB [ 444.038295][T22509] lowmem_reserve[]: 0 3921 3921 [ 444.043322][T22509] Normal free:2629048kB boost:0kB min:25964kB low:32452kB high:38940kB reserved_highatomic:0KB free_highatomic:0KB active_anon:350176kB inactive_anon:320kB active_file:110136kB inactive_file:10872kB unevictable:65580kB writepending:1060kB present:5242880kB managed:4016120kB mlocked:0kB bounce:0kB free_pcp:1144kB local_pcp:172kB free_cma:0kB [ 444.082980][T22509] lowmem_reserve[]: 0 0 0 [ 444.093083][T22509] DMA32: 5*4kB (M) 2*8kB (M) 3*16kB (M) 4*32kB (M) 4*64kB (M) 3*128kB (M) 4*256kB (M) 4*512kB (M) 5*1024kB (UM) 5*2048kB (M) 718*4096kB (M) = 2960212kB [ 444.127370][T22509] Normal: 206*4kB (ME) 121*8kB (UE) 356*16kB (UME) 421*32kB (UME) 64*64kB (UME) 16*128kB (UME) 86*256kB (UME) 153*512kB (ME) 132*1024kB (UME) 43*2048kB (M) 556*4096kB (ME) = 2628064kB [ 444.171085][T22509] 127999 total pagecache pages [ 444.176295][T22509] 106 pages in swap cache [ 444.181086][T22509] Free swap = 124132kB [ 444.185633][T22509] Total swap = 124996kB [ 444.189959][T22509] 2097051 pages RAM [ 444.193830][T22509] 0 pages HighMem/MovableOnly [ 444.203947][T22509] 351537 pages reserved [ 444.208184][ T1676] usb 2-1: device descriptor read/64, error -71 [ 444.224622][T22509] 0 pages cma reserved [ 444.231562][T22509] Memory allocations: [ 444.245794][T22509] 0 B 0 init/main.c:1370 func:do_initcalls [ 444.255884][T22509] 0 B 0 init/do_mounts.c:186 func:mount_root_generic [ 444.276107][T22509] 0 B 0 init/do_mounts.c:158 func:do_mount_root [ 444.296278][T22509] 0 B 0 init/do_mounts.c:352 func:mount_nodev_root [ 444.304408][T22509] 0 B 0 init/do_mounts_rd.c:241 func:rd_load_image [ 444.322558][T22509] 0 B 0 init/do_mounts_rd.c:72 func:identify_ramdisk_image [ 444.347367][T22509] 0 B 0 init/initramfs.c:507 func:unpack_to_rootfs [ 444.355493][T22509] 0 B 0 init/initramfs.c:508 func:unpack_to_rootfs [ 444.405174][T22509] 0 B 0 init/initramfs.c:509 func:unpack_to_rootfs [ 444.438149][T22509] 0 B 0 init/initramfs.c:101 func:find_link [ 444.467371][ T1676] usb 2-1: new high-speed USB device number 12 using dummy_hcd [ 444.627335][ T1676] usb 2-1: device descriptor read/64, error -71 [ 444.747319][ T9] usb 5-1: new low-speed USB device number 12 using dummy_hcd [ 444.877370][ T1676] usb 2-1: device descriptor read/64, error -71 [ 444.898438][ T9] usb 5-1: config 1 interface 0 has no altsetting 0 [ 444.907234][ T9] usb 5-1: string descriptor 0 read error: -22 [ 444.913735][ T9] usb 5-1: New USB device found, idVendor=0458, idProduct=5015, bcdDevice= 0.40 [ 444.937335][ T9] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 444.997418][ T1676] usb usb2-port1: attempt power cycle [ 445.007879][T22525] netlink: 536 bytes leftover after parsing attributes in process `syz.5.10175'. [ 445.171431][ T9] usbhid 5-1:1.0: can't add hid device: -71 [ 445.190996][ T9] usbhid 5-1:1.0: probe with driver usbhid failed with error -71 [ 445.220799][ T9] usb 5-1: USB disconnect, device number 12 [ 445.377312][ T1676] usb 2-1: new high-speed USB device number 13 using dummy_hcd [ 445.408296][ T1676] usb 2-1: device descriptor read/8, error -71 [ 445.558236][ T1676] usb 2-1: device descriptor read/8, error -71 [ 445.701241][T22537] netlink: 20 bytes leftover after parsing attributes in process `syz.4.10180'. [ 445.801723][ T36] audit: type=1400 audit(2000000335.948:544): avc: denied { mount } for pid=22536 comm="syz.4.10180" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 445.880826][T22550] netlink: 536 bytes leftover after parsing attributes in process `syz.4.10185'. [ 445.924492][T22552] rust_binder: Failure when writing BR_NOOP at beginning of buffer. [ 445.924519][T22552] rust_binder: Read failure Err(EFAULT) in pid:796 [ 446.007290][T22558] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22558 comm=syz.1.10188 [ 446.079319][T22558] overlayfs: missing 'lowerdir' [ 446.140282][T22558] netlink: 'syz.1.10188': attribute type 13 has an invalid length. [ 446.473605][T22571] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 446.498339][T22571] SELinux: failed to load policy [ 446.547315][T22571] can0: slcan on ttyS3. [ 446.629045][T22574] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10189'. [ 446.667462][T22571] can0 (unregistered): slcan off ttyS3. [ 446.677215][T22574] bridge0: port 4(dummy0) entered disabled state [ 446.719087][T22574] dummy0 (unregistering): left allmulticast mode [ 446.740983][T22574] dummy0 (unregistering): left promiscuous mode [ 446.759420][T22574] bridge0: port 4(dummy0) entered disabled state [ 447.471643][T22598] FAULT_INJECTION: forcing a failure. [ 447.471643][T22598] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 447.521625][T22598] CPU: 0 UID: 0 PID: 22598 Comm: syz.5.10201 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 447.521667][T22598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 447.521683][T22598] Call Trace: [ 447.521691][T22598] [ 447.521701][T22598] __dump_stack+0x21/0x30 [ 447.521737][T22598] dump_stack_lvl+0x10c/0x190 [ 447.521767][T22598] ? __cfi_dump_stack_lvl+0x10/0x10 [ 447.521799][T22598] dump_stack+0x19/0x20 [ 447.521828][T22598] should_fail_ex+0x3d9/0x530 [ 447.521852][T22598] should_fail+0xf/0x20 [ 447.521873][T22598] should_fail_usercopy+0x1e/0x30 [ 447.521897][T22598] strncpy_from_user+0x28/0x270 [ 447.521921][T22598] getname_flags+0x102/0x710 [ 447.521945][T22598] __x64_sys_mkdirat+0x7e/0xa0 [ 447.521973][T22598] x64_sys_call+0x2ba8/0x2ee0 [ 447.522007][T22598] do_syscall_64+0x58/0xf0 [ 447.522038][T22598] ? clear_bhb_loop+0x50/0xa0 [ 447.522063][T22598] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 447.522087][T22598] RIP: 0033:0x7f6de458f6c9 [ 447.522106][T22598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 447.522126][T22598] RSP: 002b:00007f6de547b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 447.522150][T22598] RAX: ffffffffffffffda RBX: 00007f6de47e5fa0 RCX: 00007f6de458f6c9 [ 447.522168][T22598] RDX: 00000000000001c0 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 447.522185][T22598] RBP: 00007f6de547b090 R08: 0000000000000000 R09: 0000000000000000 [ 447.522200][T22598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.522215][T22598] R13: 00007f6de47e6038 R14: 00007f6de47e5fa0 R15: 00007fff485b25c8 [ 447.522235][T22598] [ 448.072656][T22610] netlink: 96 bytes leftover after parsing attributes in process `syz.5.10204'. [ 448.197151][ C1] net_ratelimit: 18675 callbacks suppressed [ 448.197175][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 448.215473][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 448.227762][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 448.240065][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 448.253987][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 448.266326][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 448.278662][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 448.290973][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 448.298512][T22634] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10212'. [ 448.303302][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 448.324252][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 448.542285][T22646] netlink: 96 bytes leftover after parsing attributes in process `syz.1.10216'. [ 448.757580][T22664] rust_binder: Failed to allocate buffer. len:224, is_oneway:true [ 448.761416][T22664] overlayfs: failed to resolve './cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 448.977119][ T1676] usb 2-1: new high-speed USB device number 15 using dummy_hcd [ 449.238235][ T36] audit: type=1400 audit(2000000339.459:545): avc: denied { shutdown } for pid=22677 comm="syz.4.10231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 449.350902][ T1676] usb 2-1: Using ep0 maxpacket: 16 [ 449.372565][ T1676] usb 2-1: unable to get BOS descriptor or descriptor too short [ 449.381036][ T1676] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 449.402353][ T1676] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 449.425998][ T1676] usb 2-1: string descriptor 0 read error: -22 [ 449.432506][ T1676] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 449.453199][ T1676] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 449.482143][ T1676] usb 2-1: 0:2 : does not exist [ 449.684473][ T1676] usb 2-1: 5:0: failed to get current value for ch 0 (-22) [ 449.720755][ T1676] usb 2-1: 5:0: cannot get min/max values for control 2 (id 5) [ 449.746045][ T1676] usb 2-1: 5:0: cannot get min/max values for control 3 (id 5) [ 449.774581][ T1676] usb 2-1: 5:0: failed to get current value for ch 1 (-22) [ 449.811954][ T1676] usb 2-1: USB disconnect, device number 15 [ 450.715541][ T36] audit: type=1326 audit(2000000340.929:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22731 comm="syz.1.10254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eb2f8f6c9 code=0x7ffc0000 [ 450.789688][ T36] audit: type=1326 audit(2000000340.929:547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22731 comm="syz.1.10254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eb2f8f6c9 code=0x7ffc0000 [ 450.872038][T22736] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 450.889201][ T36] audit: type=1326 audit(2000000340.969:548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22731 comm="syz.1.10254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0eb2f8df10 code=0x7ffc0000 [ 450.926344][T22736] SELinux: failed to load policy [ 450.977008][ T36] audit: type=1326 audit(2000000340.969:549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22731 comm="syz.1.10254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0eb2f8df10 code=0x7ffc0000 [ 451.045033][ T36] audit: type=1326 audit(2000000340.969:550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22731 comm="syz.1.10254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eb2f8f6c9 code=0x7ffc0000 [ 451.101633][T22742] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 451.124367][T22742] SELinux: failed to load policy [ 451.142655][ T36] audit: type=1326 audit(2000000340.969:551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22731 comm="syz.1.10254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=78 compat=0 ip=0x7f0eb2f8f6c9 code=0x7ffc0000 [ 451.173435][T22746] rust_binder: Error in use_page_slow: ESRCH [ 451.173462][T22746] rust_binder: use_range failure ESRCH [ 451.220738][T22746] rust_binder: Failed to allocate buffer. len:8, is_oneway:false [ 451.238042][ T36] audit: type=1326 audit(2000000340.979:552): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22731 comm="syz.1.10254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eb2f8f6c9 code=0x7ffc0000 [ 451.264651][T22746] rust_binder: Failure in copy_transaction_data: BR_FAILED_REPLY { source: ESRCH } [ 451.317020][T22746] rust_binder: Transaction failed: BR_FAILED_REPLY { source: ESRCH } my_pid:1258 [ 451.345334][ T36] audit: type=1326 audit(2000000340.979:553): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22731 comm="syz.1.10254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f0eb2f8f6c9 code=0x7ffc0000 [ 451.425711][T22757] FAULT_INJECTION: forcing a failure. [ 451.425711][T22757] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 451.475542][T22757] CPU: 0 UID: 0 PID: 22757 Comm: syz.1.10264 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 451.475581][T22757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 451.475597][T22757] Call Trace: [ 451.475605][T22757] [ 451.475615][T22757] __dump_stack+0x21/0x30 [ 451.475649][T22757] dump_stack_lvl+0x10c/0x190 [ 451.475679][T22757] ? __cfi_dump_stack_lvl+0x10/0x10 [ 451.475710][T22757] dump_stack+0x19/0x20 [ 451.475739][T22757] should_fail_ex+0x3d9/0x530 [ 451.475764][T22757] should_fail+0xf/0x20 [ 451.475784][T22757] should_fail_usercopy+0x1e/0x30 [ 451.475809][T22757] _copy_from_iter+0x1a3/0x14d0 [ 451.475834][T22757] ? __kasan_slab_alloc+0x73/0x90 [ 451.475859][T22757] ? kmem_cache_alloc_node_noprof+0x1f9/0x440 [ 451.475880][T22757] ? __virt_addr_valid+0x2a6/0x380 [ 451.475906][T22757] ? __cfi__copy_from_iter+0x10/0x10 [ 451.475932][T22757] ? __check_object_size+0x50a/0x810 [ 451.475954][T22757] ? __cfi___check_object_size+0x10/0x10 [ 451.475976][T22757] ? __alloc_skb+0x1bc/0x370 [ 451.476003][T22757] ? skb_put+0x112/0x1f0 [ 451.476031][T22757] pfkey_sendmsg+0x1e0/0x1030 [ 451.476052][T22757] ? __cfi_avc_has_perm+0x10/0x10 [ 451.476085][T22757] ? __cfi_pfkey_sendmsg+0x10/0x10 [ 451.476106][T22757] ? selinux_socket_sendmsg+0x284/0x380 [ 451.476141][T22757] ? __cfi_selinux_socket_sendmsg+0x10/0x10 [ 451.476192][T22757] ? bpf_lsm_socket_sendmsg+0xd/0x20 [ 451.476220][T22757] ? security_socket_sendmsg+0x33/0xd0 [ 451.476242][T22757] ? __cfi_pfkey_sendmsg+0x10/0x10 [ 451.476264][T22757] ____sys_sendmsg+0xa15/0xa70 [ 451.476299][T22757] ? __sys_sendmsg_sock+0x50/0x50 [ 451.476334][T22757] ? import_iovec+0x81/0xb0 [ 451.476364][T22757] ___sys_sendmsg+0x220/0x2a0 [ 451.476396][T22757] ? __sys_sendmsg+0x280/0x280 [ 451.476429][T22757] ? kstrtouint+0x78/0xf0 [ 451.476458][T22757] __sys_sendmmsg+0x271/0x470 [ 451.476492][T22757] ? __cfi___sys_sendmmsg+0x10/0x10 [ 451.476531][T22757] ? __cfi_ksys_write+0x10/0x10 [ 451.476554][T22757] __x64_sys_sendmmsg+0xa4/0xc0 [ 451.476588][T22757] x64_sys_call+0xfec/0x2ee0 [ 451.476621][T22757] do_syscall_64+0x58/0xf0 [ 451.476650][T22757] ? clear_bhb_loop+0x50/0xa0 [ 451.476675][T22757] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 451.476699][T22757] RIP: 0033:0x7f0eb2f8f6c9 [ 451.476718][T22757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 451.476739][T22757] RSP: 002b:00007f0eb3df4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 451.476764][T22757] RAX: ffffffffffffffda RBX: 00007f0eb31e5fa0 RCX: 00007f0eb2f8f6c9 [ 451.476782][T22757] RDX: 00000000000003ef RSI: 0000200000000180 RDI: 0000000000000005 [ 451.476798][T22757] RBP: 00007f0eb3df4090 R08: 0000000000000000 R09: 0000000000000000 [ 451.476814][T22757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 451.476828][T22757] R13: 00007f0eb31e6038 R14: 00007f0eb31e5fa0 R15: 00007ffd41735288 [ 451.476848][T22757] [ 451.768775][ T36] audit: type=1326 audit(2000000340.979:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22731 comm="syz.1.10254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eb2f8f6c9 code=0x7ffc0000 [ 451.792338][ T36] audit: type=1326 audit(2000000340.979:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22731 comm="syz.1.10254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7f0eb2f8f6c9 code=0x7ffc0000 [ 451.815958][ T36] audit: type=1326 audit(2000000340.979:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22731 comm="syz.1.10254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0eb2f8f6c9 code=0x7ffc0000 [ 451.839522][ T36] audit: type=1326 audit(2000000340.979:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22731 comm="syz.1.10254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=154 compat=0 ip=0x7f0eb2f8f6c9 code=0x7ffc0000 [ 452.175404][T22763] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 452.216826][T22763] SELinux: failed to load policy [ 452.560859][T22790] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 452.576806][T22790] SELinux: failed to load policy [ 452.602024][T22791] FAULT_INJECTION: forcing a failure. [ 452.602024][T22791] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 452.650986][T22791] CPU: 0 UID: 0 PID: 22791 Comm: syz.4.10277 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 452.651024][T22791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 452.651040][T22791] Call Trace: [ 452.651049][T22791] [ 452.651082][T22791] __dump_stack+0x21/0x30 [ 452.651118][T22791] dump_stack_lvl+0x10c/0x190 [ 452.651149][T22791] ? __cfi_dump_stack_lvl+0x10/0x10 [ 452.651182][T22791] dump_stack+0x19/0x20 [ 452.651210][T22791] should_fail_ex+0x3d9/0x530 [ 452.651234][T22791] should_fail+0xf/0x20 [ 452.651255][T22791] should_fail_usercopy+0x1e/0x30 [ 452.651278][T22791] _copy_from_user+0x22/0xb0 [ 452.651305][T22791] sk_getsockopt+0x198/0x2130 [ 452.651335][T22791] ? __cfi_sk_getsockopt+0x10/0x10 [ 452.651367][T22791] ? selinux_socket_getsockopt+0x284/0x380 [ 452.651401][T22791] ? __cfi_selinux_socket_getsockopt+0x10/0x10 [ 452.651435][T22791] ? bpf_lsm_file_permission+0xd/0x20 [ 452.651466][T22791] ? vfs_write+0x93e/0xf30 [ 452.651489][T22791] do_sock_getsockopt+0x28f/0x6d0 [ 452.651521][T22791] ? __cfi_do_sock_getsockopt+0x10/0x10 [ 452.651552][T22791] ? __fget_files+0x2c5/0x340 [ 452.651577][T22791] __x64_sys_getsockopt+0x1d5/0x280 [ 452.651610][T22791] x64_sys_call+0x10db/0x2ee0 [ 452.651641][T22791] do_syscall_64+0x58/0xf0 [ 452.651669][T22791] ? clear_bhb_loop+0x50/0xa0 [ 452.651693][T22791] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 452.651717][T22791] RIP: 0033:0x7fa90c58f6c9 [ 452.651736][T22791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 452.651754][T22791] RSP: 002b:00007fa90d392038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 452.651778][T22791] RAX: ffffffffffffffda RBX: 00007fa90c7e5fa0 RCX: 00007fa90c58f6c9 [ 452.651795][T22791] RDX: 0000000000000003 RSI: 0000000000000001 RDI: 0000000000000006 [ 452.651808][T22791] RBP: 00007fa90d392090 R08: 0000200000000040 R09: 0000000000000000 [ 452.651824][T22791] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 452.651838][T22791] R13: 00007fa90c7e6038 R14: 00007fa90c7e5fa0 R15: 00007ffe31571a38 [ 452.651857][T22791] [ 453.206819][ C1] net_ratelimit: 27419 callbacks suppressed [ 453.206843][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 453.225080][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 453.237222][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 453.249549][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 453.261706][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 453.274024][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 453.286170][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 453.298469][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 453.310603][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 453.322935][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 453.397114][T22816] random: crng reseeded on system resumption [ 453.427087][T22817] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 453.434745][T22817] SELinux: failed to load policy [ 453.905940][T22838] FAULT_INJECTION: forcing a failure. [ 453.905940][T22838] name failslab, interval 1, probability 0, space 0, times 0 [ 453.959345][T22838] CPU: 0 UID: 0 PID: 22838 Comm: syz.4.10297 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 453.959385][T22838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 453.959400][T22838] Call Trace: [ 453.959408][T22838] [ 453.959418][T22838] __dump_stack+0x21/0x30 [ 453.959455][T22838] dump_stack_lvl+0x10c/0x190 [ 453.959486][T22838] ? __cfi_dump_stack_lvl+0x10/0x10 [ 453.959518][T22838] ? x64_sys_call+0xa26/0x2ee0 [ 453.959553][T22838] ? entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 453.959580][T22838] dump_stack+0x19/0x20 [ 453.959609][T22838] should_fail_ex+0x3d9/0x530 [ 453.959634][T22838] ? copy_splice_read+0x161/0xc30 [ 453.959662][T22838] should_failslab+0xac/0x100 [ 453.959688][T22838] __kmalloc_noprof+0x69/0x530 [ 453.959711][T22838] ? copy_splice_read+0x161/0xc30 [ 453.959750][T22838] copy_splice_read+0x161/0xc30 [ 453.959777][T22838] ? unwind_get_return_address+0x51/0x90 [ 453.959806][T22838] ? __cfi_copy_splice_read+0x10/0x10 [ 453.959833][T22838] ? __kmalloc_noprof+0x271/0x530 [ 453.959856][T22838] ? __mutex_init+0xa6/0x1a0 [ 453.959885][T22838] ? alloc_pipe_info+0x362/0x600 [ 453.959919][T22838] ? __cfi_copy_splice_read+0x10/0x10 [ 453.959946][T22838] splice_direct_to_actor+0x407/0xbc0 [ 453.959977][T22838] ? __cfi_direct_splice_actor+0x10/0x10 [ 453.960006][T22838] ? __cfi_splice_direct_to_actor+0x10/0x10 [ 453.960037][T22838] do_splice_direct+0x182/0x270 [ 453.960065][T22838] ? __cfi_do_splice_direct+0x10/0x10 [ 453.960104][T22838] ? __cfi_direct_file_splice_eof+0x10/0x10 [ 453.960134][T22838] ? security_file_permission+0x2e/0xc0 [ 453.960160][T22838] ? rw_verify_area+0xac/0x230 [ 453.960194][T22838] do_sendfile+0x5c8/0xfb0 [ 453.960222][T22838] ? vfs_writev+0xcf0/0xcf0 [ 453.960248][T22838] ? __kasan_check_write+0x18/0x20 [ 453.960282][T22838] ? ksys_write+0x1ef/0x250 [ 453.960304][T22838] __x64_sys_sendfile64+0x193/0x1f0 [ 453.960330][T22838] ? __cfi___x64_sys_sendfile64+0x10/0x10 [ 453.960356][T22838] ? __kasan_check_read+0x15/0x20 [ 453.960390][T22838] x64_sys_call+0xa26/0x2ee0 [ 453.960423][T22838] do_syscall_64+0x58/0xf0 [ 453.960452][T22838] ? clear_bhb_loop+0x50/0xa0 [ 453.960476][T22838] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 453.960501][T22838] RIP: 0033:0x7fa90c58f6c9 [ 453.960520][T22838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 453.960540][T22838] RSP: 002b:00007fa90d392038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 453.960564][T22838] RAX: ffffffffffffffda RBX: 00007fa90c7e5fa0 RCX: 00007fa90c58f6c9 [ 453.960583][T22838] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000006 [ 453.960597][T22838] RBP: 00007fa90d392090 R08: 0000000000000000 R09: 0000000000000000 [ 453.960612][T22838] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 453.960627][T22838] R13: 00007fa90c7e6038 R14: 00007fa90c7e5fa0 R15: 00007ffe31571a38 [ 453.960647][T22838] [ 454.265935][T22842] random: crng reseeded on system resumption [ 454.633210][T22846] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 454.651189][T22846] SELinux: failed to load policy [ 454.828376][T22853] netlink: 4 bytes leftover after parsing attributes in process `syz.4.10304'. [ 455.088982][T22870] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 455.114630][T22870] SELinux: failed to load policy [ 458.216570][ C0] net_ratelimit: 97542 callbacks suppressed [ 458.216596][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 458.216602][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 458.216673][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 458.222601][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 458.234543][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 458.246436][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 458.258593][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 458.270444][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 458.282375][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 458.294251][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 459.480114][ C0] sched: DL replenish lagged too much [ 463.226287][ C1] net_ratelimit: 159234 callbacks suppressed [ 463.226310][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.226351][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.232391][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.244436][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 463.256430][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.268292][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 463.280453][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 463.292201][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 463.304200][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 463.316107][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.236005][ C0] net_ratelimit: 133897 callbacks suppressed [ 468.236029][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 468.236081][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.242142][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.254142][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.266122][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.277984][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.289975][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 468.301954][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 468.313813][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 468.325739][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 473.245713][ C0] net_ratelimit: 125426 callbacks suppressed [ 473.245739][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 473.245796][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 473.251859][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 473.263835][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 473.275737][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 473.287707][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 473.299725][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.311918][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.323667][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 473.335567][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.255466][ C1] net_ratelimit: 108511 callbacks suppressed [ 478.255490][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 478.255507][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 478.255592][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.261791][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 478.273538][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 478.285502][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 478.297444][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 478.309316][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 478.321331][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 478.333526][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 479.226402][T22900] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 479.234040][T22900] SELinux: failed to load policy [ 483.265160][ C1] net_ratelimit: 96410 callbacks suppressed [ 483.265184][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 483.265297][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 483.271203][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 483.283242][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.295556][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 483.307125][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 483.319031][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 483.330927][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 483.343084][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 483.355104][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 485.912502][T22901] ttyS ttyS3: ldisc open failed (-12), clearing slot 3 [ 488.274811][ C0] net_ratelimit: 97147 callbacks suppressed [ 488.274890][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 488.280800][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.292809][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.304972][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 488.316776][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 488.328764][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.340800][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 488.352662][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 488.364754][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 488.376644][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 489.234962][ T45] usb 3-1: new low-speed USB device number 16 using dummy_hcd [ 489.529081][ T45] usb 3-1: config 1 interface 0 has no altsetting 0 [ 489.650764][ T45] usb 3-1: string descriptor 0 read error: -22 [ 489.659740][ T45] usb 3-1: New USB device found, idVendor=0458, idProduct=5015, bcdDevice= 0.40 [ 489.692351][ T45] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 490.269345][ T45] usbhid 3-1:1.0: can't add hid device: -71 [ 490.297572][ T45] usbhid 3-1:1.0: probe with driver usbhid failed with error -71 [ 490.459344][ T45] usb 3-1: USB disconnect, device number 16 [ 493.284596][ C0] net_ratelimit: 98162 callbacks suppressed [ 493.284617][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 493.286830][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 493.290665][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 493.302650][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.314608][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.326506][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 493.338511][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 493.350370][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 493.362614][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 493.374645][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 498.294277][ C1] net_ratelimit: 103720 callbacks suppressed [ 498.294301][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.294362][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 498.300413][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.312363][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.324294][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.336332][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.348406][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 498.360495][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 498.372279][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 498.384157][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.304011][ C0] net_ratelimit: 101978 callbacks suppressed [ 503.304034][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 503.304102][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 503.310166][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.322188][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.334163][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 503.346111][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 503.358037][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 503.370115][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 503.382156][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 503.394325][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 508.313838][ C1] net_ratelimit: 102988 callbacks suppressed [ 508.313863][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 508.313896][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.320074][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 508.332044][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.343911][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 508.355904][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 508.368091][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.379873][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 508.391827][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 508.403704][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.323459][ C1] net_ratelimit: 104121 callbacks suppressed [ 513.323484][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 513.323653][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 513.329598][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 513.341618][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.353817][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 513.365591][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 513.377464][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 513.389376][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 513.401467][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 513.413563][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 518.333167][ C1] net_ratelimit: 103212 callbacks suppressed [ 518.333192][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 518.333208][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.333462][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 518.339501][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 518.351348][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.363317][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 518.375397][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 518.387302][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 518.399315][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 518.411519][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.342888][ C0] net_ratelimit: 107856 callbacks suppressed [ 523.342912][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.342963][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.349028][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.361000][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 523.373191][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 523.385027][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 523.397040][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.408991][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 523.420896][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 523.432853][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 528.352588][ C1] net_ratelimit: 117527 callbacks suppressed [ 528.352617][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 528.352712][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 528.358748][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.370694][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.382756][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 528.394733][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.406700][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 528.418682][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 528.430685][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 528.442566][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.362317][ C0] net_ratelimit: 115606 callbacks suppressed [ 533.362340][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 533.362401][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.368491][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.380393][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.392386][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.404215][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.416438][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 533.428496][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 533.440200][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 533.452169][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.372022][ C1] net_ratelimit: 113104 callbacks suppressed [ 538.372045][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 538.372100][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.378594][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.390305][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 538.402372][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.414309][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 538.426259][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 538.438237][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 538.450400][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 538.462083][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 543.381716][ C0] net_ratelimit: 111274 callbacks suppressed [ 543.381738][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.381839][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 543.387839][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.399766][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.412009][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 543.424021][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 543.435914][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 543.447885][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 543.459833][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 543.471798][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:92:ac:d8:41:3c:3e, vlan:0) [ 546.828696][ T1598] veth1_to_bridge: left allmulticast mode [ 546.852445][ T1598] veth1_to_bridge: left promiscuous mode [ 547.043174][ T1598] bridge0: port 1(veth1_to_bridge) entered disabled state [ 547.083121][ T1598] veth0_to_bond: left allmulticast mode [ 548.181768][ T1598] veth0_to_bond: left promiscuous mode [ 548.232096][ T1598] bridge0: port 5(veth0_to_bond) entered disabled state [ 548.391460][ C0] net_ratelimit: 104852 callbacks suppressed [ 548.391481][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.391551][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 548.397663][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.409654][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 548.421904][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 548.433633][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 548.445559][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.457847][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.469603][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 548.481715][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 548.732016][ T1598] dummy0: left allmulticast mode [ 548.753629][ T1598] dummy0: left promiscuous mode [ 548.792479][ T1598] bridge0: port 4(dummy0) entered disabled state [ 548.892284][ T1598] bond_slave_0: left allmulticast mode [ 548.914588][ T1598] bond_slave_0: left promiscuous mode [ 548.931888][ T1598] bridge0: port 3(bond_slave_0) entered disabled state [ 548.982828][ T1598] bridge_slave_1: left allmulticast mode [ 549.001692][ T1598] bridge_slave_1: left promiscuous mode [ 549.031930][ T1598] bridge0: port 2(bridge_slave_1) entered disabled state [ 553.401337][ C1] net_ratelimit: 96343 callbacks suppressed [ 553.401360][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 553.401361][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 553.401450][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.407474][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 553.419595][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.431561][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 553.443464][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.455545][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.467310][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 553.479479][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 558.410912][ C0] net_ratelimit: 94608 callbacks suppressed [ 558.410936][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.410978][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 558.417215][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 558.429252][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.441060][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.453377][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 558.465088][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.477011][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.488907][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 558.500947][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 563.420642][ C0] net_ratelimit: 94265 callbacks suppressed [ 563.420668][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.420757][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 563.426727][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.438655][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 563.450890][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 563.462719][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 563.474638][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.486822][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.498591][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 563.510843][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 568.430321][ C0] net_ratelimit: 95121 callbacks suppressed [ 568.430346][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.430469][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 568.436556][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 568.448465][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 568.460472][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.472440][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 568.484386][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.496450][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.508283][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 568.520495][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 573.440084][ C1] net_ratelimit: 94086 callbacks suppressed [ 573.440108][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 573.440167][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.446333][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 573.458082][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.470187][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.482039][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.494183][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.506084][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 573.518243][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 573.530091][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 578.449747][ C0] net_ratelimit: 89637 callbacks suppressed [ 578.449772][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 578.449988][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.455801][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.468037][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 578.479824][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.491731][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.503598][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.515571][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 578.527545][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 578.539538][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 583.459491][ C1] net_ratelimit: 93176 callbacks suppressed [ 583.459515][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 583.459744][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 583.465539][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 583.477599][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.489589][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 583.501492][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.513654][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 583.525273][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.537486][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 583.549250][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.469328][ C1] net_ratelimit: 92607 callbacks suppressed [ 588.469353][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 588.469399][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.475383][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.487383][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.499285][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 588.511280][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.523248][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 588.535273][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 588.547264][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 588.559287][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 593.478968][ C0] net_ratelimit: 95393 callbacks suppressed [ 593.478992][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 593.479065][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 593.485067][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 593.497091][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.509018][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.521040][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 593.533059][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 593.544918][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 593.557309][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 593.569105][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 598.488634][ C0] net_ratelimit: 92828 callbacks suppressed [ 598.488666][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.488666][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 598.488747][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 598.494927][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 598.506716][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 598.518734][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.530825][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.542569][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 598.554725][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 598.566453][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.498485][ C1] net_ratelimit: 96975 callbacks suppressed [ 603.498511][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 603.498525][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.498597][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.504744][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.516525][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 603.528517][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 603.540517][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 603.552565][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 603.564374][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 603.576367][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 608.508081][ C1] net_ratelimit: 85788 callbacks suppressed [ 608.508106][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.508226][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.514211][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 608.526254][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 608.538150][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 608.550156][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 608.562109][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 608.574105][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 608.586268][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 608.598079][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 613.517766][ C1] net_ratelimit: 88650 callbacks suppressed [ 613.517789][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 613.517801][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.518070][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 613.523815][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 613.535882][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.547869][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 613.559854][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.571947][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 613.583896][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 613.595699][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.527507][ C1] net_ratelimit: 87817 callbacks suppressed [ 618.527536][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 618.527581][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.533831][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 618.545828][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.557909][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.569896][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 618.581822][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.593791][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 618.606021][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 618.617906][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.537283][ C0] net_ratelimit: 88163 callbacks suppressed [ 623.537306][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.537319][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.537587][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 623.543385][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.555372][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.567485][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.579152][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 623.591156][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 623.603253][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 623.615150][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 628.546953][ C1] net_ratelimit: 90647 callbacks suppressed [ 628.546976][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.548311][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.553170][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 628.565050][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 628.576973][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 628.589001][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 628.600952][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 628.612853][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 628.624921][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 628.636819][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 633.556657][ C0] net_ratelimit: 92581 callbacks suppressed [ 633.556682][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.556854][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 633.562938][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 633.574898][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.586699][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.598658][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.610581][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.622649][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 633.634733][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 633.646462][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 638.566386][ C0] net_ratelimit: 92455 callbacks suppressed [ 638.566410][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 638.566455][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.572439][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.584462][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.596388][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.608404][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.620507][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 638.632196][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.644197][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 638.656176][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 643.576134][ C0] net_ratelimit: 95295 callbacks suppressed [ 643.576157][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.576222][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.582177][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.594126][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 643.606112][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 643.618072][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 643.630135][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 643.642110][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 643.654157][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 643.666133][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 648.585865][ C0] net_ratelimit: 92178 callbacks suppressed [ 648.585887][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.585896][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.586176][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 648.591918][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 648.603976][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 648.615864][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 648.627825][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 648.645842][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 648.651901][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 648.663940][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.595508][ C1] net_ratelimit: 97204 callbacks suppressed [ 653.595532][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.595613][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 653.601755][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 653.613756][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.625709][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 653.637702][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 653.649585][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 653.661507][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 653.673573][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 653.685554][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 658.605251][ C1] net_ratelimit: 94184 callbacks suppressed [ 658.605276][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.605279][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.605355][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.611339][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 658.623415][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.635402][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 658.647369][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.659266][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 658.671321][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 658.683304][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 661.745563][ T1598] veth1_macvtap: left promiscuous mode [ 661.827711][ T1598] veth0_vlan: left promiscuous mode [ 663.615061][ C0] net_ratelimit: 95674 callbacks suppressed [ 663.615086][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 663.615151][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.621168][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.633212][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 663.645379][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.657257][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 663.669511][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 663.681251][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 663.693226][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 663.705194][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 668.624683][ C0] net_ratelimit: 96939 callbacks suppressed [ 668.624714][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.624817][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.630927][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 668.642760][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.654728][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.666673][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 668.678779][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 668.690639][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 668.702915][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 668.714710][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 673.634416][ C0] net_ratelimit: 97897 callbacks suppressed [ 673.634438][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.634563][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 673.640468][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 673.652634][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.664418][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 673.676490][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 673.688413][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 673.700423][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.712307][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 673.724448][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.644129][ C0] net_ratelimit: 96577 callbacks suppressed [ 678.644154][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 678.644189][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 678.650226][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 678.662182][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.674181][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 678.686314][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.698144][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.710093][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.722116][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 678.734010][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 683.653839][ C0] net_ratelimit: 94310 callbacks suppressed [ 683.653865][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 683.653973][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.659922][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.671914][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.683891][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.695759][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 683.708018][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 683.719809][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 683.731822][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 683.743797][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 688.663530][ C1] net_ratelimit: 92505 callbacks suppressed [ 688.663557][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 688.663608][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.669666][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 688.681701][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 688.693714][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 688.705937][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 688.718130][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 688.729943][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 688.742277][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 688.754032][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.673390][ C1] net_ratelimit: 92628 callbacks suppressed [ 693.673416][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.673515][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 693.679470][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 693.691432][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.703430][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.715407][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.727513][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.739328][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 693.751291][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 693.763272][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 698.683009][ C1] net_ratelimit: 93156 callbacks suppressed [ 698.683033][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.683076][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.689072][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 698.701091][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.713034][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 698.725084][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 698.737085][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 698.748991][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 698.761105][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 698.772998][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 703.692742][ C0] net_ratelimit: 88518 callbacks suppressed [ 703.692766][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.692852][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.698796][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.710706][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 703.722676][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.734629][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.746570][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.758602][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 703.770690][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 703.782397][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.702414][ C1] net_ratelimit: 87828 callbacks suppressed [ 708.702440][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 708.702581][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 708.708743][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.720404][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.732638][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 708.744395][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.756297][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 708.768188][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 708.780256][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 708.792171][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 713.712145][ C0] net_ratelimit: 92363 callbacks suppressed [ 713.712169][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 713.712399][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.718199][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.730412][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 713.742180][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.754060][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.766255][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 713.782169][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 713.790031][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 713.802102][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 718.721856][ C1] net_ratelimit: 92808 callbacks suppressed [ 718.721879][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 718.722053][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 718.727956][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 718.739827][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.752088][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 718.763732][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.775917][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 718.787803][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 718.799594][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 718.811530][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.731560][ C1] net_ratelimit: 89656 callbacks suppressed [ 723.731584][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 723.731634][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 723.737594][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 723.749542][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.761763][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 723.773533][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.785792][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.797329][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 723.809501][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 723.821230][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.741271][ C0] net_ratelimit: 94298 callbacks suppressed [ 728.741295][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.741340][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 728.747510][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 728.759320][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.771253][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.783399][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.795199][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.807137][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 728.819244][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 728.830958][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 733.750999][ C1] net_ratelimit: 90556 callbacks suppressed [ 733.751025][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 733.751095][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 733.757062][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.768996][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.781222][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.793025][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.804937][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 733.816897][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 733.828874][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 733.840972][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 738.760785][ C1] net_ratelimit: 93618 callbacks suppressed [ 738.760810][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 738.760867][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 738.766844][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.778779][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.800829][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 738.802788][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 738.814754][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 738.826648][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 738.838612][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 738.850526][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 743.770454][ C0] net_ratelimit: 93454 callbacks suppressed [ 743.770477][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.770516][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 743.776505][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.788639][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 743.800367][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.813077][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.824254][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.836126][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 743.848245][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 743.860229][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.780154][ C1] net_ratelimit: 93157 callbacks suppressed [ 748.780180][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.780253][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 748.786215][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 748.798193][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.820213][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.822137][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.834243][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.846003][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 748.858004][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 748.869900][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 753.789855][ C1] net_ratelimit: 93698 callbacks suppressed [ 753.789878][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 753.789985][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 753.796037][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 753.807976][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.819964][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 753.831885][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 753.843764][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 753.855992][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 753.867763][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 753.879636][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.799596][ C1] net_ratelimit: 93796 callbacks suppressed [ 758.799620][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 758.799680][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.805657][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 758.817612][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.829512][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 758.841745][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 758.853469][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 758.865357][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 758.877563][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 758.889254][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.809314][ C0] net_ratelimit: 87061 callbacks suppressed [ 763.809338][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.809398][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.815386][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.827389][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 763.839334][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.851205][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.863088][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.875253][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.887071][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 763.898934][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.819021][ C1] net_ratelimit: 92074 callbacks suppressed [ 768.819057][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 768.819121][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.825086][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 768.837131][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.849051][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 768.860955][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 768.873160][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 768.884851][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 768.897052][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 768.908813][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 773.828750][ C0] net_ratelimit: 87882 callbacks suppressed [ 773.828780][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 773.828875][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 773.834814][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 773.846929][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 773.858674][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 773.870674][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 773.882589][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 773.894496][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 773.906719][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 773.918720][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 778.838443][ C0] net_ratelimit: 94420 callbacks suppressed [ 778.838466][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 778.838565][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 778.844507][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 778.856514][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 778.878502][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 778.880528][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 778.892436][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 778.904474][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 778.916498][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 778.928450][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 783.848168][ C0] net_ratelimit: 92410 callbacks suppressed [ 783.848192][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.848389][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.854211][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 783.866412][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 783.878218][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 783.890190][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.902053][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 783.914167][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 783.926049][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 783.938170][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 788.857898][ C0] net_ratelimit: 92380 callbacks suppressed [ 788.857922][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 788.858006][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.863979][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 788.875964][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.887896][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.899861][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 788.911846][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.923733][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 788.935784][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 788.947709][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 793.867598][ C0] net_ratelimit: 90697 callbacks suppressed [ 793.867622][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.867666][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 793.873664][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.885689][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.897653][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.909627][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 793.921743][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:6e:37:ba:a1:93:28, vlan:0) [ 793.933581][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 793.945514][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 793.957473][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 798.877366][ C0] net_ratelimit: 92372 callbacks suppressed [ 798.877391][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 798.877438][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 798.883444][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:a2:54:4b:04:07:ae, vlan:0) [ 798.895538][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 798.907456][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 798.919498][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 798.931447][ C0] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 798.943412][ C1] bridge0: received packet on veth1_to_bridge with own address as source address (addr:de:9e:e5:29:bf:ad, vlan:0) [ 798.955317][ C0] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 798.967334][ C1] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0)