Warning: Permanently added '10.128.1.63' (ECDSA) to the list of known hosts.
[   40.463908] IPVS: ftp: loaded support on port[0] = 21
[   40.528728] chnl_net:caif_netlink_parms(): no params data found
[   40.572292] bridge0: port 1(bridge_slave_0) entered blocking state
[   40.578834] bridge0: port 1(bridge_slave_0) entered disabled state
[   40.586422] device bridge_slave_0 entered promiscuous mode
[   40.593838] bridge0: port 2(bridge_slave_1) entered blocking state
[   40.600183] bridge0: port 2(bridge_slave_1) entered disabled state
[   40.607681] device bridge_slave_1 entered promiscuous mode
[   40.624163] bond0: Enslaving bond_slave_0 as an active interface with an up link
[   40.632908] bond0: Enslaving bond_slave_1 as an active interface with an up link
[   40.650414] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[   40.657558] team0: Port device team_slave_0 added
[   40.663577] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[   40.670558] team0: Port device team_slave_1 added
[   40.685432] batman_adv: batadv0: Adding interface: batadv_slave_0
[   40.691724] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   40.717539] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   40.729207] batman_adv: batadv0: Adding interface: batadv_slave_1
[   40.735984] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   40.761223] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   40.775148] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[   40.782549] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[   40.799832] device hsr_slave_0 entered promiscuous mode
[   40.805833] device hsr_slave_1 entered promiscuous mode
[   40.812432] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[   40.819290] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[   40.876573] bridge0: port 2(bridge_slave_1) entered blocking state
[   40.882972] bridge0: port 2(bridge_slave_1) entered forwarding state
[   40.889702] bridge0: port 1(bridge_slave_0) entered blocking state
[   40.896079] bridge0: port 1(bridge_slave_0) entered forwarding state
[   40.923497] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[   40.929554] 8021q: adding VLAN 0 to HW filter on device bond0
[   40.938036] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[   40.946362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[   40.965283] bridge0: port 1(bridge_slave_0) entered disabled state
[   40.972261] bridge0: port 2(bridge_slave_1) entered disabled state
[   40.981492] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[   40.987546] 8021q: adding VLAN 0 to HW filter on device team0
[   40.995878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[   41.004243] bridge0: port 1(bridge_slave_0) entered blocking state
[   41.010630] bridge0: port 1(bridge_slave_0) entered forwarding state
[   41.019402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[   41.027260] bridge0: port 2(bridge_slave_1) entered blocking state
[   41.033623] bridge0: port 2(bridge_slave_1) entered forwarding state
[   41.051228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[   41.058787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[   41.066465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[   41.074286] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[   41.083403] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   41.093901] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[   41.099872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[   41.107400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[   41.120798] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready
[   41.127777] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[   41.134671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[   41.144542] 8021q: adding VLAN 0 to HW filter on device batadv0
[   41.192256] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready
[   41.203036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[   41.226459] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready
[   41.233410] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready
[   41.239744] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready
[   41.248904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[   41.256325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[   41.263272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[   41.271830] device veth0_vlan entered promiscuous mode
[   41.280314] device veth1_vlan entered promiscuous mode
[   41.286421] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready
[   41.294483] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready
[   41.305493] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready
[   41.314237] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[   41.321653] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[   41.328723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[   41.338229] device veth0_macvtap entered promiscuous mode
[   41.344459] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready
[   41.353347] device veth1_macvtap entered promiscuous mode
[   41.361823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready
[   41.370538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready
[   41.379721] batman_adv: batadv0: Interface activated: batadv_slave_0
[   41.387616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[   41.395729] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready
[   41.405518] batman_adv: batadv0: Interface activated: batadv_slave_1
[   41.413010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
executing program
[   41.493525] FAULT_INJECTION: forcing a failure.
[   41.493525] name failslab, interval 1, probability 0, space 0, times 1
[   41.505148] CPU: 1 PID: 8238 Comm: syz-executor114 Not tainted 4.14.302-syzkaller #0
[   41.513002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
[   41.522328] Call Trace:
[   41.524892]  dump_stack+0x1b2/0x281
[   41.528492]  should_fail.cold+0x10a/0x149
[   41.532616]  should_failslab+0xd6/0x130
[   41.536567]  __kmalloc+0x6d/0x400
[   41.539991]  ? tty_buffer_alloc+0xc0/0x270
[   41.544199]  tty_buffer_alloc+0xc0/0x270
[   41.548796]  __tty_buffer_request_room+0x12c/0x290
[   41.553696]  tty_insert_flip_string_fixed_flag+0x8b/0x210
[   41.559207]  tty_insert_flip_string_and_push_buffer+0x3e/0x160
[   41.565149]  pty_write+0xc3/0xf0
[   41.568489]  n_tty_write+0x85e/0xda0
[   41.572178]  ? n_tty_open+0x160/0x160
[   41.575957]  ? do_wait_intr_irq+0x270/0x270
[   41.580250]  ? __might_fault+0x177/0x1b0
[   41.584281]  tty_write+0x410/0x740
[   41.587798]  ? n_tty_open+0x160/0x160
[   41.591571]  __vfs_write+0xe4/0x630
[   41.595168]  ? tty_compat_ioctl+0x240/0x240
[   41.599458]  ? __handle_mm_fault+0x80f/0x4620
[   41.603922]  ? kernel_read+0x110/0x110
[   41.607798]  ? common_file_perm+0x3ee/0x580
[   41.612091]  ? security_file_permission+0x82/0x1e0
[   41.616992]  ? rw_verify_area+0xe1/0x2a0
[   41.621022]  vfs_write+0x17f/0x4d0
[   41.624534]  SyS_write+0xf2/0x210
[   41.627961]  ? SyS_read+0x210/0x210
[   41.631558]  ? __do_page_fault+0x159/0xad0
[   41.635764]  ? do_syscall_64+0x4c/0x640
[   41.639864]  ? SyS_read+0x210/0x210
[   41.643471]  do_syscall_64+0x1d5/0x640
[   41.647337]  entry_SYSCALL_64_after_hwframe+0x5e/0xd3
[   41.652514] RIP: 0033:0x7efe98debb99
[   41.656198] RSP: 002b:00007fff790853c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[   41.663875] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007efe98debb99
[   41.671118] RDX: 0000000000000004 RSI: 0000000020000040 RDI: 0000000000000003
[   41.678450] RBP: 00007fff790853e0 R08: 0000000000000001 R09: 0000000000000001
[   41.685695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[   41.692937] R13: 00000000000f4240 R14: 0000000000000000 R15: 0000000000000000
[   41.700186] 
[   41.700188] ======================================================
[   41.700190] WARNING: possible circular locking dependency detected
[   41.700192] 4.14.302-syzkaller #0 Not tainted
[   41.700193] ------------------------------------------------------
[   41.700195] syz-executor114/8238 is trying to acquire lock:
[   41.700196]  (console_owner){....}, at: [<ffffffff81440a47>] console_unlock+0x307/0xf20
[   41.700200] 
[   41.700201] but task is already holding lock:
[   41.700202]  (&(&port->lock)->rlock){-.-.}, at: [<ffffffff835603ab>] tty_insert_flip_string_and_push_buffer+0x2b/0x160
[   41.700206] 
[   41.700208] which lock already depends on the new lock.
[   41.700209] 
[   41.700209] 
[   41.700211] the existing dependency chain (in reverse order) is:
[   41.700212] 
[   41.700212] -> #2 (&(&port->lock)->rlock){-.-.}:
[   41.700217]        _raw_spin_lock_irqsave+0x8c/0xc0
[   41.700218]        tty_port_tty_get+0x1d/0x80
[   41.700219]        tty_port_default_wakeup+0x11/0x40
[   41.700221]        serial8250_tx_chars+0x3fe/0xc70
[   41.700222]        serial8250_handle_irq.part.0+0x2c7/0x390
[   41.700224]        serial8250_default_handle_irq+0x8a/0x1f0
[   41.700225]        serial8250_interrupt+0xf3/0x210
[   41.700227]        __handle_irq_event_percpu+0xee/0x7f0
[   41.700228]        handle_irq_event+0xed/0x240
[   41.700229]        handle_edge_irq+0x224/0xc40
[   41.700230]        handle_irq+0x35/0x50
[   41.700231]        do_IRQ+0x93/0x1d0
[   41.700233]        ret_from_intr+0x0/0x1e
[   41.700234]        native_safe_halt+0xe/0x10
[   41.700235]        default_idle+0x47/0x370
[   41.700236]        do_idle+0x250/0x3c0
[   41.700237]        cpu_startup_entry+0x14/0x20
[   41.700238]        start_kernel+0x743/0x763
[   41.700240]        secondary_startup_64+0xa5/0xb0
[   41.700240] 
[   41.700241] -> #1 (&port_lock_key){-.-.}:
[   41.700247]        _raw_spin_lock_irqsave+0x8c/0xc0
[   41.700249]        serial8250_console_write+0x8cb/0xb40
[   41.700252]        console_unlock+0x99d/0xf20
[   41.700253]        vprintk_emit+0x224/0x620
[   41.700256]        vprintk_func+0x58/0x160
[   41.700257]        printk+0x9e/0xbc
[   41.700260]        register_console+0x6f4/0xad0
[   41.700262]        univ8250_console_init+0x2f/0x3a
[   41.700264]        console_init+0x46/0x53
[   41.700266]        start_kernel+0x521/0x763
[   41.700268]        secondary_startup_64+0xa5/0xb0
[   41.700269] 
[   41.700271] -> #0 (console_owner){....}:
[   41.700277]        lock_acquire+0x170/0x3f0
[   41.700278]        console_unlock+0x36f/0xf20
[   41.700279]        vprintk_emit+0x224/0x620
[   41.700281]        vprintk_func+0x58/0x160
[   41.700282]        printk+0x9e/0xbc
[   41.700283]        should_fail.cold+0xdf/0x149
[   41.700284]        should_failslab+0xd6/0x130
[   41.700285]        __kmalloc+0x6d/0x400
[   41.700287]        tty_buffer_alloc+0xc0/0x270
[   41.700288]        __tty_buffer_request_room+0x12c/0x290
[   41.700290]        tty_insert_flip_string_fixed_flag+0x8b/0x210
[   41.700292]        tty_insert_flip_string_and_push_buffer+0x3e/0x160
[   41.700293]        pty_write+0xc3/0xf0
[   41.700294]        n_tty_write+0x85e/0xda0
[   41.700295]        tty_write+0x410/0x740
[   41.700296]        __vfs_write+0xe4/0x630
[   41.700297]        vfs_write+0x17f/0x4d0
[   41.700298]        SyS_write+0xf2/0x210
[   41.700300]        do_syscall_64+0x1d5/0x640
[   41.700301]        entry_SYSCALL_64_after_hwframe+0x5e/0xd3
[   41.700302] 
[   41.700303] other info that might help us debug this:
[   41.700304] 
[   41.700305] Chain exists of:
[   41.700306]   console_owner --> &port_lock_key --> &(&port->lock)->rlock
[   41.700311] 
[   41.700312]  Possible unsafe locking scenario:
[   41.700313] 
[   41.700314]        CPU0                    CPU1
[   41.700315]        ----                    ----
[   41.700316]   lock(&(&port->lock)->rlock);
[   41.700319]                                lock(&port_lock_key);
[   41.700322]                                lock(&(&port->lock)->rlock);
[   41.700324]   lock(console_owner);
[   41.700326] 
[   41.700327]  *** DEADLOCK ***
[   41.700328] 
[   41.700329] 6 locks held by syz-executor114/8238:
[   41.700330]  #0:  (&tty->ldisc_sem){++++}, at: [<ffffffff8355c822>] tty_ldisc_ref_wait+0x22/0x80
[   41.700334]  #1:  (&tty->atomic_write_lock){+.+.}, at: [<ffffffff8354549d>] tty_write+0x22d/0x740
[   41.700339]  #2:  (&tty->termios_rwsem){++++}, at: [<ffffffff835506da>] n_tty_write+0x18a/0xda0
[   41.700343]  #3:  (&ldata->output_lock){+.+.}, at: [<ffffffff83550d7b>] n_tty_write+0x82b/0xda0
[   41.700348]  #4:  (&(&port->lock)->rlock){-.-.}, at: [<ffffffff835603ab>] tty_insert_flip_string_and_push_buffer+0x2b/0x160
[   41.700353]  #5:  (console_lock){+.+.}, at: [<ffffffff814443a8>] vprintk_func+0x58/0x160
[   41.700357] 
[   41.700358] stack backtrace:
[   41.700360] CPU: 1 PID: 8238 Comm: syz-executor114 Not tainted 4.14.302-syzkaller #0
[   41.700362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
[   41.700363] Call Trace:
[   41.700364]  dump_stack+0x1b2/0x281
[   41.700366]  print_circular_bug.constprop.0.cold+0x2d7/0x41e
[   41.700367]  __lock_acquire+0x2e0e/0x3f20
[   41.700369]  ? trace_hardirqs_on+0x10/0x10
[   41.700370]  ? snprintf+0xd0/0xd0
[   41.700371]  ? console_unlock+0x34a/0xf20
[   41.700372]  lock_acquire+0x170/0x3f0
[   41.700373]  ? console_unlock+0x307/0xf20
[   41.700374]  console_unlock+0x36f/0xf20
[   41.700376]  ? console_unlock+0x307/0xf20
[   41.700377]  vprintk_emit+0x224/0x620
[   41.700378]  vprintk_func+0x58/0x160
[   41.700379]  printk+0x9e/0xbc
[   41.700380]  ? log_store.cold+0x16/0x16
[   41.700381]  ? ___ratelimit+0x2b5/0x510
[   41.700383]  should_fail.cold+0xdf/0x149
[   41.700384]  should_failslab+0xd6/0x130
[   41.700385]  __kmalloc+0x6d/0x400
[   41.700386]  ? tty_buffer_alloc+0xc0/0x270
[   41.700387]  tty_buffer_alloc+0xc0/0x270
[   41.700389]  __tty_buffer_request_room+0x12c/0x290
[   41.700390]  tty_insert_flip_string_fixed_flag+0x8b/0x210
[   41.700392]  tty_insert_flip_string_and_push_buffer+0x3e/0x160
[   41.700393]  pty_write+0xc3/0xf0
[   41.700394]  n_tty_write+0x85e/0xda0
[   41.700395]  ? n_tty_open+0x160/0x160
[   41.700396]  ? do_wait_intr_irq+0x270/0x270
[   41.700398]  ? __might_fault+0x177/0x1b0
[   41.700399]  tty_write+0x410/0x740
[   41.700400]  ? n_tty_open+0x160/0x160
[   41.700401]  __vfs_write+0xe4/0x630
[   41.700402]  ? tty_compat_ioctl+0x240/0x240
[   41.700404]  ? __handle_mm_fault+0x80f/0x4620
[   41.700405]  ? kernel_read+0x110/0x110
[   41.700406]  ? common_file_perm+0x3ee/0x580
[   41.700407]  ? security_file_permission+0x82/0x1e0
[   41.700409]  ? rw_verify_area+0xe1/0x2a0
[   41.700410]  vfs_write+0x17f/0x4d0
[   41.700411]  SyS_write+0xf2/0x210
[   41.700412]  ? SyS_read+0x210/0x210
[   41.700413]  ? __do_page_fault+0x159/0xad0
[   41.700414]  ? do_syscall_64+0x4c/0x640
[   41.700415]  ? SyS_read+0x210/0x210
[   41.700417]  do_syscall_64+0x1d5/0x640
[   41.700418]  entry_SYSCALL_64_after_hwframe+0x5e/0xd3
[   41.700419] RIP: 0033:0x7efe98debb99
[   41.700421] RSP: 002b:00007fff790853c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[   41.700424] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007efe98debb99
[   41.700426] RDX: 0000000000000004 RSI: 0000000020000040 RDI: 0000000000000003
[   41.700428] RBP: 00007fff790853e0 R08: 0000000000000001 R09: 0000000000000001
[   41.700430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[   41.700432] R13: 00000000000f4240 R14: 0000000000000000 R15: 0000000000000000
[   42.401653] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
executing program
[   46.491577] FAULT_INJECTION: forcing a failure.
[   46.491577] name failslab, interval 1, probability 0, space 0, times 0
[   46.502757] CPU: 0 PID: 8239 Comm: syz-executor114 Not tainted 4.14.302-syzkaller #0
[   46.510607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
[   46.519933] Call Trace:
[   46.522495]  dump_stack+0x1b2/0x281
[   46.526100]  should_fail.cold+0x10a/0x149
[   46.530229]  should_failslab+0xd6/0x130
[   46.534181]  __kmalloc+0x6d/0x400
[   46.537717]  ? tty_buffer_alloc+0xc0/0x270
[   46.541933]  tty_buffer_alloc+0xc0/0x270
[   46.545968]  __tty_buffer_request_room+0x12c/0x290
[   46.550891]  tty_insert_flip_string_fixed_flag+0x8b/0x210
[   46.556412]  tty_insert_flip_string_and_push_buffer+0x3e/0x160
[   46.562361]  pty_write+0xc3/0xf0
[   46.565702]  n_tty_write+0x85e/0xda0
[   46.569397]  ? lock_downgrade+0x740/0x740
[   46.573520]  ? n_tty_open+0x160/0x160
[   46.577297]  ? do_wait_intr_irq+0x270/0x270
[   46.581591]  ? __might_fault+0x177/0x1b0
[   46.585626]  tty_write+0x410/0x740
[   46.589144]  ? n_tty_open+0x160/0x160
[   46.592920]  __vfs_write+0xe4/0x630
[   46.596522]  ? tty_compat_ioctl+0x240/0x240
[   46.600820]  ? __handle_mm_fault+0x80f/0x4620
[   46.605292]  ? kernel_read+0x110/0x110
[   46.609152]  ? common_file_perm+0x3ee/0x580
[   46.613447]  ? __fsnotify_inode_delete+0x20/0x20
[   46.618174]  ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0
[   46.624813]  ? security_file_permission+0x82/0x1e0
[   46.629713]  ? rw_verify_area+0xe1/0x2a0
[   46.633753]  vfs_write+0x17f/0x4d0
[   46.637265]  SyS_write+0xf2/0x210
[   46.640780]  ? SyS_read+0x210/0x210
[   46.644379]  ? __do_page_fault+0x159/0xad0
[   46.648590]  ? SyS_read+0x210/0x210
[   46.652193]  do_syscall_64+0x1d5/0x640
[   46.656061]  entry_SYSCALL_64_after_hwframe+0x5e/0xd3
[   46.661223] RIP: 0033:0x7efe98debb99
[   46.664906] RSP: 002b:00007fff790853c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[   46.672584] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007efe98debb99
[   46.679831] RDX: 0000000000000004 RSI: 0000000020000040 RDI: 0000000000000003
[   46.687073] RBP: 00007fff790853e0 R08: 0000000000000001 R09: 0000000900000001
[   46.694332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004
[   46.701571] R13: 00000000000f4240 R14: 000000000000a22f R15: 00007fff790853d4
executing program
[   51.491658] FAULT_INJECTION: forcing a failure.
[   51.491658] name fail_page_alloc, interval 1, probability 0, space 0, times 1
[   51.503447] CPU: 0 PID: 8240 Comm: syz-executor114 Not tainted 4.14.302-syzkaller #0
[   51.511304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022
[   51.520630] Call Trace:
[   51.523192]  dump_stack+0x1b2/0x281
[   51.526793]  should_fail.cold+0x10a/0x149
[   51.530922]  ? trace_hardirqs_on+0x10/0x10
[   51.535131]  __alloc_pages_nodemask+0x21e/0x2900
[   51.539867]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[   51.544945]  ? trace_hardirqs_on+0x10/0x10
[   51.549168]  ? __read_once_size_nocheck.constprop.0+0x10/0x10
[   51.555028]  ? kasan_kmalloc+0x139/0x160
[   51.559071]  ? unwind_next_frame+0xe54/0x17d0
[   51.563540]  ? __save_stack_trace+0x63/0x160
[   51.567924]  ? gfp_pfmemalloc_allowed+0x150/0x150
[   51.572831]  ? __read_once_size_nocheck.constprop.0+0x10/0x10
[   51.578698]  ? entry_SYSCALL_64_after_hwframe+0x5e/0xd3
[   51.584035]  ? is_bpf_text_address+0xb8/0x150
[   51.588508]  ? kernel_text_address+0xbd/0xf0
[   51.592893]  alloc_pages_current+0x155/0x260
[   51.597284]  depot_save_stack+0x3ae/0x3f0
[   51.601410]  kasan_slab_free+0x117/0x1a0
[   51.605445]  ? kasan_slab_free+0xc3/0x1a0
[   51.609571]  ? kfree+0xc9/0x250
[   51.612825]  ? kvfree+0x45/0x50
[   51.616079]  ? __vunmap+0x20f/0x300
[   51.619704]  ? vfree+0x4b/0xd0
[   51.622876]  ? n_tty_close+0xb2/0x1f0
[   51.626650]  ? tty_ldisc_close+0x8c/0xc0
[   51.630684]  ? tty_ldisc_hangup+0x269/0x6c0
[   51.634977]  ? __tty_hangup.part.0+0x31a/0x730
[   51.639529]  ? tty_vhangup+0x1d/0x30
[   51.643220]  ? pty_close+0x35f/0x4b0
[   51.646911]  ? tty_release+0x40b/0x10d0
[   51.650859]  ? __fput+0x25f/0x7a0
[   51.654372]  ? task_work_run+0x11f/0x190
[   51.658406]  ? exit_to_usermode_loop+0x1ad/0x200
[   51.663145]  ? do_syscall_64+0x4a3/0x640
[   51.667181]  ? entry_SYSCALL_64_after_hwframe+0x5e/0xd3
[   51.672527]  ? lock_acquire+0x170/0x3f0
[   51.676475]  ? lock_downgrade+0x740/0x740
[   51.680596]  ? do_raw_spin_unlock+0x164/0x220
[   51.685068]  ? _raw_spin_unlock_irqrestore+0x66/0xe0
[   51.690149]  ? debug_check_no_obj_freed+0x2c0/0x680
[   51.695139]  ? debug_object_activate+0x490/0x490
[   51.699870]  ? debug_object_activate+0x490/0x490
[   51.704601]  ? kvfree+0x45/0x50
[   51.707983]  kfree+0xc9/0x250
[   51.711070]  kvfree+0x45/0x50
[   51.714149]  __vunmap+0x20f/0x300
[   51.717574]  vfree+0x4b/0xd0
[   51.720569]  n_tty_close+0xb2/0x1f0
[   51.724169]  ? n_tty_receive_signal_char+0x130/0x130
[   51.729248]  tty_ldisc_close+0x8c/0xc0
[   51.733111]  tty_ldisc_hangup+0x269/0x6c0
[   51.737233]  ? do_tty_hangup+0x30/0x30