last executing test programs: 2m35.313528306s ago: executing program 3 (id=1463): mmap$auto(0x0, 0x400005, 0xfffffffffffffffe, 0x9b72, 0x2, 0x7fffffffffffffff) r0 = io_uring_setup$auto(0x6, 0x0) mmap$auto(0x0, 0x9, 0xffb, 0x8000000008011, r0, 0x0) socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) io_uring_setup$auto(0x1, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x2) socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$auto(0x8000000000000001, 0x7, 0x0) fcntl$auto(r1, 0x7, 0x4) 2m34.835501398s ago: executing program 2 (id=1465): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_tipcv2(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$auto_TIPC_NL_MEDIA_GET(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)={0x18, r1, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x4}]}, 0x18}}, 0x2000c880) 2m34.68516461s ago: executing program 3 (id=1467): ioctl$auto(0xffffffffffffffff, 0xc0045401, 0xffffffffffffffff) 2m34.646352016s ago: executing program 2 (id=1468): r0 = pidfd_open$auto(0xffffffffffffffff, 0x5) mmap$auto(0x0, 0xffffffffffffffff, 0xdf, 0x9b72, r0, 0x7) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) write$auto(0x3, 0x0, 0x7fffffff) write$auto(0x1, 0x0, 0x80000000) preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xfffffffd}, 0x6, 0x8, 0x5) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/controlC1\x00', 0x60800, 0x0) newfstatat$auto(0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x5, 0x6, 0xa9, 0x4, 0x0, 0xee01, 0x0, 0x2000000006, 0x1fffffffffffff, 0x0, 0x3, 0x8, 0x5, 0xcc, 0x4, 0x1, 0x53}, 0x1) ppoll$auto(&(0x7f0000000140)={0xffffffffffffffff, 0x3ff, 0x4}, 0x7f, 0x0, 0x0, 0x8) openat$auto_nsim_dev_max_vfs_fops_dev(0xffffffffffffff9c, &(0x7f00000089c0)='/sys/kernel/debug/netdevsim/netdevsim1/max_vfs\x00', 0x101000, 0x0) socket(0x3, 0x80000, 0x6) prctl$auto(0x21, 0x0, 0x1, 0x0, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x2, 0x0, 0xfffffffffffffffe, 0x8) socketpair$auto(0x1, 0x2164, 0x8000000000000000, 0x0) mmap$auto(0x3, 0x3ff, 0xb3, 0x9b72, 0xffffffffffffffff, 0x27ffd) write$auto(0x3, 0x0, 0x7fffffff) lseek$auto(0x3, 0x0, 0x1) munmap$auto(0x8000, 0xffffffff) openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2a801, 0x0) socket(0x2, 0x1, 0x0) 2m34.165228197s ago: executing program 3 (id=1471): socket(0x10, 0x2, 0x0) (async) open(&(0x7f0000000040)='./file0/file0\x00', 0x1470c1, 0x84) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) socket(0x11, 0x3, 0x9) mmap$auto(0x0, 0x400008, 0xdf, 0x38, 0x6, 0x8000) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptyq4\x00', 0xf62885fab3a7a66f, 0x0) (async, rerun: 32) openat$auto_ima_measure_policy_ops_ima_fs(0xffffffffffffff9c, 0x0, 0x2dc08f24db173410, 0x0) (rerun: 32) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, r0, 0x8000) fsopen$auto(0x0, 0x1) (async, rerun: 32) adjtimex$auto(&(0x7f00000005c0)={0xf332b6b, 0x0, 0xcea4, 0xfffffffffffffffd, 0xb3, 0x1, 0x0, 0x0, 0x18db, 0x2, 0x2, {0x100000000, 0x10000}, 0x5, 0x6, 0xfffffffffffffffd, 0x1007bfe, 0x0, 0x91dc, 0x4, 0xdfffffffffff628c, 0xfffffffffffffffe, 0xdeae, 0x808}) (async, rerun: 32) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) (async, rerun: 32) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mtdblock0\x00', 0x14f602, 0x0) (rerun: 32) capget$auto(&(0x7f0000000000)={0x19980330}, 0x0) (async, rerun: 32) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) (async, rerun: 32) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) (async, rerun: 64) close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) (async, rerun: 64) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop2\x00', 0x82, 0x0) r1 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop6\x00', 0x18dd01, 0x0) ioctl$auto_SG_GET_RESERVED_SIZE(r1, 0x4c0a, 0x0) (async, rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000002500), 0xffffffffffffffff) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000040), 0xffffffffffffffff) msgget$auto(0x0, 0x77d9) (async) sendmsg$auto_OVS_DP_CMD_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000200)={0x2c, r3, 0x1, 0x2070bd26, 0x25dfdbf8, {}, [@OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x4}, @OVS_DP_ATTR_NAME={0x8, 0x1, 'HfR\x00'}, @OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x801}, 0x80) (async) syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000080), 0xffffffffffffffff) (async, rerun: 32) socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32) 2m33.010692615s ago: executing program 3 (id=1474): r0 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/cec18\x00', 0x900, 0x0) r1 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snd/controlC1\x00', 0x802, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000100)={{@inferred, 0x85, 0x20e, 0x9, "669cbbd9e9756f227dffa188e0f1a560e2a1facac1f00b2f4ab8633824f2d2252ca5f200"}, 0x0, @integer64=@value=[0x9, 0x4, 0xc2bf, 0x3, 0x100000002, 0x7, 0x4, 0x7, 0xcf6c, 0x7ff, 0xfffffffffffffff9, 0x8000000000000001, 0x0, 0x9, 0x86, 0x8, 0x8, 0x5, 0x7ffffffffffffffc, 0x58a2, 0x5, 0x8, 0x4, 0x1000ffffe, 0x800002, 0x7, 0xc01, 0x7fffffff, 0x5, 0xfd, 0x7fc5, 0x19, 0x4, 0xfffffffefffffffd, 0x10000000000007, 0x0, 0x1, 0x9, 0x6, 0x8000000000000000, 0xfff, 0x9, 0xa, 0x4, 0x8001, 0x3, 0x3, 0x3, 0x80000001, 0x81, 0x10002, 0x4, 0x5cd, 0x7, 0xfffffffffffffffd, 0x7fff, 0xd426, 0x9, 0x612, 0xffff, 0x8, 0x5, 0x6, 0x8000000000000001], "282f77b07e718ed4d99a34617774e3a82f982e0f05e516c299a28a585e87e0d908e2c8e50de5016f1de5d432da2cc20e951d8fcdc4f791a11996aad5af504c0d9927e62ef70b23a13735a4fe805c1ce1b6b1d83d21bb42794ec925b4547a3d52d4b5210392111e181719fef9d685b6534b171d76ad633f94a608b818600a6c85"}) mmap$auto(0x0, 0x20008, 0xe3, 0x100000eb1, r1, 0x8000) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8400) openat$auto_tap_fops_tap(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) socket(0xa, 0x1, 0x100) r2 = openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/lru_gen\x00', 0xc0000, 0x0) pread64$auto(r2, 0x0, 0x7ff, 0x400) socket(0x1a, 0x1, 0x0) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bus/usb/024/001\x00', 0x40001, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f0000000040)={[0x1ff, 0x7, 0xd, 0x8fd6, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x62, 0x80000001, 0x5, 0x1, 0x9, 0x1, 0xfffffffffffffffe]}, 0x0) write$auto(r3, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1fc, 0x7, 0xd, 0x1, 0xc5e1, 0x3, 0x88, 0x3, 0x0, 0x62, 0x8, 0x10, 0x6d3e, 0xc, 0x2, 0x6]}, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004810}, 0x8800) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) msync$auto(0x1ffff000, 0x1800000000000fe, 0x400000004) openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sg0\x00', 0x82802, 0x0) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000600)='/dev/audio1\x00', 0x8000, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x1e, 0x805, 0x0) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snd/controlC1\x00', 0x60840, 0x0) ioctl$auto(0x3, 0x40045532, 0x38) openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/pcmC1D0c\x00', 0x129600, 0x0) close_range$auto(0x2, 0x8, 0x0) ioctl$auto_CEC_ADAP_S_LOG_ADDRS(r0, 0xc05c6104, &(0x7f0000000100)={"fda25684", 0xffff, 0x6, 0x2, 0x9b4, 0x9, "0800aafc241cd010c7543bfbca2ce1", "0200", "00000600", "2ff43123", ["2a047aee570987488e564d62", "f8ffffffffffffff00000001", "00d800", "5fe10eedab2c4b353c392a92"]}) socket$nl_generic(0x10, 0x3, 0x10) 2m32.445650765s ago: executing program 2 (id=1478): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff) r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/oom_adj\x00', 0x48402, 0x0) read$auto(r0, 0x0, 0x1f40) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r1, &(0x7f0000000200)={0x0, 0x7}, 0x3) madvise$auto(0xf400000000000000, 0xffffffffffff0005, 0x19) 2m31.902641803s ago: executing program 2 (id=1482): mlockall$auto(0x3) statmount$auto(0x0, &(0x7f0000000180)={0xa, 0x1, 0x44f, 0x7, 0x5, 0x1007181, 0x8a0d, 0x7, 0x7, 0x7ff, 0x89, 0x26, 0x4, 0x200000000001, 0x384, 0xfffffffffffffffa, 0x8, 0x0, 0x30, 0x0, 0x864, 0xe, 0x22000, 0x9, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x9, 0xd) mmap$auto(0x0, 0x7, 0xfffffffffffffffe, 0x9b72, 0x2, 0x8000) r0 = socket(0xa, 0x1, 0x84) getsockopt$auto(r0, 0x84, 0x80, 0x0, &(0x7f00000000c0)=0x97) r1 = openat$auto__ctl_fops_dm_ioctl(0xffffffffffffff9c, &(0x7f0000000180), 0x1541, 0x0) ioctl$auto__ctl_fops_dm_ioctl(r1, 0xfffffff7effffd05, &(0x7f00000001c0)) 2m31.169566398s ago: executing program 0 (id=1483): openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) writev$auto(0xffffffffffffffff, 0x0, 0x8) write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) madvise$auto(0x0, 0x2003f0, 0x15) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r1 = openat$auto_urandom_fops_random(0xffffffffffffff9c, &(0x7f0000006700), 0x181c00, 0x0) ioctl$auto_RNDADDTOENTCNT2(r1, 0x40045201, 0x0) r2 = socket(0xa, 0x2, 0x3a) setsockopt$auto(r2, 0x29, 0x3e, 0x0, 0x1ff) finit_module$auto(0x3, 0xfffffffffffffffe, 0x2) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) madvise$auto(0x0, 0xffffffffffff0005, 0x19) madvise$auto(0x0, 0xffffffffffff0001, 0x15) madvise$auto(0x0, 0xffffffffffff0005, 0x19) setns$auto(0x0, 0xb) cachestat$auto(0x1, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x5) r3 = socket(0x2b, 0x1, 0x0) sendmmsg$auto(r3, &(0x7f0000000000)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800009}, 0x5, 0x20000000) syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000080), r3) mmap$auto(0x0, 0x2a, 0xdf, 0x9b72, r3, 0xa) getpid() mmap$auto(0x0, 0xfff, 0xdf, 0x9b72, 0x400, 0x28000) close_range$auto(0x2, 0x8, 0x0) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) fanotify_init$auto(0x65, 0x2) pipe$auto(0x0) 2m30.807123994s ago: executing program 3 (id=1484): mmap$auto(0x0, 0x400005, 0xfffffffffffffffe, 0x9b72, 0x2, 0x7fffffffffffffff) io_uring_setup$auto(0x6, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) io_uring_setup$auto(0x1, 0x0) close_range$auto(0x0, 0xfffffffffffff000, 0x2) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$auto(0x8000000000000001, 0x7, 0x0) fcntl$auto(r0, 0x7, 0x4) 2m30.578659347s ago: executing program 1 (id=1486): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8400) (async) openat$auto_tap_fops_tap(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) socket(0xa, 0x1, 0x100) r0 = openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/lru_gen\x00', 0xc0000, 0x0) pread64$auto(r0, 0x0, 0x7ff, 0x400) (async, rerun: 64) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) (async, rerun: 64) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) (async) select$auto(0xe, 0x0, 0x0, &(0x7f0000000040)={[0x1ff, 0x7, 0xd, 0x8fd6, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x62, 0x80000001, 0x7, 0x1, 0x9, 0x1, 0xfffffffffffffffe]}, 0x0) write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) (async) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/conf/ip6tnl0/bootp_relay\x00', 0x5014c0, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x1, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x62, 0x8000001f, 0x7, 0x6d3e, 0xc, 0x2, 0x6]}, 0x0) mmap$auto(0xc, 0x20009, 0x5, 0xeb1, 0x405, 0x8000) (async, rerun: 64) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004810}, 0x8800) (async, rerun: 64) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) (async) msync$auto(0x1ffff000, 0x1800000000000fe, 0x400000004) (async, rerun: 64) openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sg0\x00', 0x82802, 0x0) (async, rerun: 64) ioctl$auto(0x3, 0x2287, 0xffffffffffffffff) (async) r2 = openat$auto_proc_mem_operations_base(0xffffffffffffff9c, &(0x7f0000001640)='/proc/self/mem\x00', 0x401, 0x0) (async, rerun: 32) r3 = openat$auto_page_owner_stack_operations_page_owner(0xffffffffffffff9c, &(0x7f0000001540), 0x2, 0x0) (rerun: 32) read$auto_page_owner_stack_operations_page_owner(r3, &(0x7f0000001580)=""/91, 0x5b) (async) write$auto_proc_mem_operations_base(r2, &(0x7f0000001680)="a7", 0x80000) (async) madvise$auto(0x0, 0x20200, 0x15) (async, rerun: 32) prctl$auto(0x43, 0x17, 0x0, 0x0, 0x0) (async, rerun: 32) prctl$auto(0x43, 0x0, 0x0, 0x0, 0x0) (async) r4 = openat$auto_minstrel_ht_stat_csv_fops_rc80211_minstrel_ht_debugfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/ieee80211/phy3/netdev:wlan0/stations/08:02:11:00:00:01/rc_stats_csv\x00', 0x80, 0x0) read$auto_minstrel_ht_stat_csv_fops_rc80211_minstrel_ht_debugfs(r4, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) 2m30.415937409s ago: executing program 3 (id=1487): iopl$auto(0x2) syz_genetlink_get_family_id$auto_tipcv2(0x0, 0xffffffffffffffff) unshare$auto(0x40000080) semctl$auto_SETALL(0x3ff, 0x1000, 0x11, 0x2) r0 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) write$auto(r1, &(0x7f0000000400)='/dev/audio1\x00', 0xa3d9) set_mempolicy$auto(0x2, 0x0, 0x8) mmap$auto(0x0, 0x40009, 0xa, 0x9b72, 0x2, 0x28000) r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS1\x00', 0x20000, 0x0) ioctl$auto_TCSBRKP2(r2, 0x5425, 0x0) r3 = openat$auto_mtd_fops_mtdchar(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mtd0\x00', 0x28082, 0x0) ioctl$auto(r3, 0xc0304d18, 0x8) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) close_range$auto(r0, 0x8, 0xfffffff8) io_uring_setup$auto(0x9, 0x0) socket(0x2, 0x5, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x1, 0x84) mmap$auto(0x0, 0x4020009, 0xdb, 0xeb1, 0x401, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) seccomp$auto(0x2, 0x0, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) r4 = openat$auto_userio_fops_userio(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) read$auto_userio_fops_userio(r4, 0x0, 0x0) shutdown$auto(0x200000003, 0x2) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x1c03, 0x0, 0x9, 0x0, 0x0, 0x9}, 0x7}, 0x6, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 2m30.257401626s ago: executing program 1 (id=1488): mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) pipe$auto(&(0x7f0000001480)) ioperm$auto(0x3, 0x5, 0x149) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual/net/bond0/bonding/primary_reselect\x00', 0x1e2142, 0x0) sendfile$auto(r0, r0, 0x0, 0x7fff) write$auto(0x3, 0x0, 0xffd8) 2m30.159126703s ago: executing program 2 (id=1489): r0 = openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/pagemap\x00', 0x0, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) mmap$auto(0x7, 0xe97f, 0x7f, 0xeb1, r0, 0x8000) r1 = socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000) syz_genetlink_get_family_id$auto_batadv(0x0, 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$auto_ovs_ct_limit(&(0x7f0000000840), r2) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) setgroups$auto(0xe32, 0x0) madvise$auto(0x0, 0x200007, 0x19) ioctl$auto_SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x4c04, 0x0) mmap$auto(0x0, 0x128009, 0xdf, 0x410, r1, 0x8000) capget$auto(0x0, 0xfffffffffffffffe) r3 = openat$auto_proc_pid_maps_operations_internal(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/smaps_rollup\x00', 0x40000, 0x0) remap_file_pages$auto(0x6a2b, 0x1000, 0x0, 0x5, 0x66a) madvise$auto(0x0, 0xffffffffffff0001, 0x15) read$auto_proc_pid_maps_operations_internal(r3, &(0x7f00000010c0)=""/4082, 0xff2) r4 = socket(0x2b, 0x2, 0x0) bind$auto(r4, 0x0, 0x67) mmap$auto(0x1, 0x5, 0xfffffffffffffe01, 0x8011, 0xffffffffffffffff, 0x8000) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket(0x2, 0x1, 0xfffffff8) r5 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/cec1\x00', 0x0, 0x0) ioctl$auto_CEC_ADAP_S_LOG_ADDRS(r5, 0xc05c6104, &(0x7f0000000100)={"fda25684", 0xffff, 0x6, 0x2, 0x9b4, 0x9, "0800aafc241cd010c7543bfbca2ce1", "0200", "00000600", "2ff43123", ["2a047aee570987488e564d62", "f8ffffffffffffff00000001", "00d800", "5fe10eedab2c4b353c392a92"]}) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/platform/dummy_hcd.7/usb8/bConfigurationValue\x00', 0x10b042, 0x0) sendfile$auto(r5, r0, 0x0, 0x4) 2m30.112528273s ago: executing program 1 (id=1490): r0 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, 0x0, 0x1c8342, 0x0) ioctl$auto(r0, 0xc0045401, 0xffffffffffffffff) 2m30.059292814s ago: executing program 0 (id=1491): setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9) connect$auto(0xffffffffffffffff, 0x0, 0x55) setsockopt$auto(0xffffffffffffffff, 0x1, 0x9, 0x0, 0xeb66) unshare$auto(0x40000080) open(0x0, 0xe4201, 0x17c) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000640), r0) sendmsg$auto_NL80211_CMD_GET_WIPHY(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000140)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="810400ae000000000000000000"], 0x18}, 0x1, 0x0, 0x0, 0x20080011}, 0x4000c050) unshare$auto(0x40000080) mmap$auto(0x0, 0x3, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) r2 = socket(0xa, 0x1, 0x100) mmap$auto(0x0, 0x4020009, 0x100000005, 0xeb1, 0x401, 0x8000000000000003) r3 = socket(0x15, 0x5, 0x0) getsockopt$auto(r3, 0x114, 0x2713, 0xfffffffffffffffc, 0x0) setsockopt$auto(0x400000000000003, 0x29, 0x1b, 0x0, 0x56b) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20b42, 0x0) syz_clone(0x90800000, 0x0, 0xffffffffffffffdf, 0x0, 0x0, 0x0) mmap$auto(0x6, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000002) move_pages$auto(0x1, 0xf54, 0x0, 0x0, 0x0, 0x8000000000000000) r4 = getpgid(0x0) socket$nl_generic(0x10, 0x3, 0x10) rt_tgsigqueueinfo$auto(0x0, r4, 0x1, &(0x7f0000000100)={@_si_pad}) mmap$auto(0x0, 0x2000d, 0x4080000200df, 0xeb1, 0x404, 0x8000) mmap$auto(0x0, 0x2000c, 0x0, 0x20eb1, 0xff1, 0x8000) io_uring_setup$auto(0x6, 0x0) r5 = socket(0x11, 0x3, 0x2) getsockopt$auto(r5, 0x107, 0xc, 0x0, 0x0) syz_genetlink_get_family_id$auto_ovs_vport(&(0x7f0000000040), r2) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x40) execve$auto(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=&(0x7f0000000080)='\xac\x00', &(0x7f0000000000)=&(0x7f0000000200)=' ') 2m29.870772749s ago: executing program 1 (id=1492): r0 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/cec18\x00', 0x900, 0x0) r1 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snd/controlC1\x00', 0x802, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000100)={{@inferred, 0x85, 0x20e, 0x9, "669cbbd9e9756f227dffa188e0f1a560e2a1facac1f00b2f4ab8633824f2d2252ca5f200"}, 0x0, @integer64=@value=[0x9, 0x4, 0xc2bf, 0x3, 0x100000002, 0x7, 0x4, 0x7, 0xcf6c, 0x7ff, 0xfffffffffffffff9, 0x8000000000000001, 0x0, 0x9, 0x86, 0x8, 0x8, 0x5, 0x7ffffffffffffffc, 0x58a2, 0x5, 0x8, 0x4, 0x1000ffffe, 0x800002, 0x7, 0xc01, 0x7fffffff, 0x5, 0xfd, 0x7fc5, 0x19, 0x4, 0xfffffffefffffffd, 0x10000000000007, 0x0, 0x1, 0x9, 0x6, 0x8000000000000000, 0xfff, 0x9, 0xa, 0x4, 0x8001, 0x3, 0x3, 0x3, 0x80000001, 0x81, 0x10002, 0x4, 0x5cd, 0x7, 0xfffffffffffffffd, 0x7fff, 0xd426, 0x9, 0x612, 0xffff, 0x8, 0x5, 0x6, 0x8000000000000001], "282f77b07e718ed4d99a34617774e3a82f982e0f05e516c299a28a585e87e0d908e2c8e50de5016f1de5d432da2cc20e951d8fcdc4f791a11996aad5af504c0d9927e62ef70b23a13735a4fe805c1ce1b6b1d83d21bb42794ec925b4547a3d52d4b5210392111e181719fef9d685b6534b171d76ad633f94a608b818600a6c85"}) mmap$auto(0x0, 0x20008, 0xe3, 0x100000eb1, r1, 0x8000) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8400) openat$auto_tap_fops_tap(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) socket(0xa, 0x1, 0x100) r2 = openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/lru_gen\x00', 0xc0000, 0x0) pread64$auto(r2, 0x0, 0x7ff, 0x400) socket(0x1a, 0x1, 0x0) r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bus/usb/024/001\x00', 0x40001, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f0000000040)={[0x1ff, 0x7, 0xd, 0x8fd6, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x62, 0x80000001, 0x5, 0x1, 0x9, 0x1, 0xfffffffffffffffe]}, 0x0) write$auto(r3, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1fc, 0x7, 0xd, 0x1, 0xc5e1, 0x3, 0x88, 0x3, 0x0, 0x62, 0x8, 0x10, 0x6d3e, 0xc, 0x2, 0x6]}, 0x0) sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004810}, 0x8800) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) msync$auto(0x1ffff000, 0x1800000000000fe, 0x400000004) openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sg0\x00', 0x82802, 0x0) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000600)='/dev/audio1\x00', 0x8000, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x1e, 0x805, 0x0) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snd/controlC1\x00', 0x60840, 0x0) ioctl$auto(0x3, 0x40045532, 0x38) openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/pcmC1D0c\x00', 0x129600, 0x0) close_range$auto(0x2, 0x8, 0x0) ioctl$auto_CEC_ADAP_S_LOG_ADDRS(r0, 0xc05c6104, &(0x7f0000000100)={"fda25684", 0xffff, 0x6, 0x2, 0x9b4, 0x9, "0800aafc241cd010c7543bfbca2ce1", "0200", "00000600", "2ff43123", ["2a047aee570987488e564d62", "f8ffffffffffffff00000001", "00d800", "5fe10eedab2c4b353c392a92"]}) socket$nl_generic(0x10, 0x3, 0x10) 2m28.559723794s ago: executing program 1 (id=1493): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$auto_OVS_DP_CMD_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x2c, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x4}, @OVS_DP_ATTR_NAME={0x8, 0x1, 'HSR\xff'}, @OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000800}, 0x80) 2m28.326886189s ago: executing program 0 (id=1494): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) syz_genetlink_get_family_id$auto_net_shaper(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$auto_NET_SHAPER_CMD_GROUP(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2004c804}, 0x14) (async) sendmsg$auto_NET_SHAPER_CMD_GROUP(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2004c804}, 0x14) close_range$auto(0x2, 0x8, 0x0) (async) close_range$auto(0x2, 0x8, 0x0) socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0) r0 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/ip_vs_conn\x00', 0x62240, 0x0) read$auto_proc_reg_file_ops_compat_inode(r0, &(0x7f0000000240)=""/7, 0x7) recvfrom$auto(0x4, 0x0, 0x101d0, 0x3ffffd, 0x0, 0x0) (async) recvfrom$auto(0x4, 0x0, 0x101d0, 0x3ffffd, 0x0, 0x0) r1 = prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) syz_genetlink_get_family_id$auto_nlctrl(&(0x7f00000003c0), r1) madvise$auto(0x0, 0xffffffffffff0005, 0x19) syz_genetlink_get_family_id$auto_ovs_flow(&(0x7f0000000180), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$auto_OVS_FLOW_CMD_GET(r2, 0x0, 0x800) socket(0xa, 0x1, 0x84) (async) socket(0xa, 0x1, 0x84) listen$auto(0x3, 0x81) accept$auto(0x3, 0xffffffffffffffff, 0xffffffffffffffff) (async) accept$auto(0x3, 0xffffffffffffffff, 0xffffffffffffffff) mmap$auto(0x0, 0x9, 0x2, 0x40eb2, 0x401, 0x300000000000) (async) mmap$auto(0x0, 0x9, 0x2, 0x40eb2, 0x401, 0x300000000000) getsockopt$auto(0xffffffffffffffff, 0x11c, 0x1, 0x0, 0x0) (async) getsockopt$auto(0xffffffffffffffff, 0x11c, 0x1, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) fanotify_init$auto(0x65, 0x2) socket(0x1d, 0x2, 0x2) connect$auto(0x3, 0x0, 0x55) socket(0x10, 0x3, 0x6) (async) socket(0x10, 0x3, 0x6) socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0) write$auto(0x3, 0x0, 0x5c8) madvise$auto(0x0, 0x2003f0, 0x15) madvise$auto(0x0, 0x200007, 0x19) (async) madvise$auto(0x0, 0x200007, 0x19) timerfd_create$auto(0x9, 0x0) openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) 2m28.243393913s ago: executing program 1 (id=1495): r0 = pidfd_open$auto(0xffffffffffffffff, 0x5) mmap$auto(0x0, 0xffffffffffffffff, 0xdf, 0x9b72, r0, 0x7) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0) mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000) write$auto(0x3, 0x0, 0x7fffffff) write$auto(0x1, 0x0, 0x80000000) preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xfffffffd}, 0x6, 0x8, 0x5) openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/controlC1\x00', 0x60800, 0x0) newfstatat$auto(0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x5, 0x6, 0xa9, 0x4, 0x0, 0xee01, 0x0, 0x2000000006, 0x1fffffffffffff, 0x0, 0x3, 0x8, 0x5, 0xcc, 0x4, 0x1, 0x53}, 0x1) ppoll$auto(&(0x7f0000000140)={0xffffffffffffffff, 0x3ff, 0x4}, 0x7f, 0x0, 0x0, 0x8) openat$auto_nsim_dev_max_vfs_fops_dev(0xffffffffffffff9c, &(0x7f00000089c0)='/sys/kernel/debug/netdevsim/netdevsim1/max_vfs\x00', 0x101000, 0x0) socket(0x3, 0x80000, 0x6) prctl$auto(0x21, 0x0, 0x1, 0x0, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) write$auto(r1, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) mmap$auto(0x3, 0x3ff, 0xb3, 0x9b72, 0xffffffffffffffff, 0x27ffd) write$auto(0x3, 0x0, 0x7fffffff) lseek$auto(0x3, 0x0, 0x1) munmap$auto(0x8000, 0xffffffff) openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2a801, 0x0) socket(0x2, 0x1, 0x0) 2m28.073568819s ago: executing program 0 (id=1496): mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) mmap$auto(0x0, 0xa00006, 0x2, 0x40eb1, 0x602, 0x3000ffffbf00) 2m27.873700188s ago: executing program 2 (id=1497): openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x40000008000) r0 = socket(0x10, 0x2, 0x0) sendmmsg$auto(r0, 0x0, 0x7, 0x8) openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) r2 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) select$auto(0x8, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x1, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x62, 0x80000001, 0x7, 0x6d3f, 0x9, 0x2, 0xfffffffffffffffe]}, 0x0) write$auto(r1, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9) r3 = getpid() process_vm_readv$auto(r3, &(0x7f0000000000)={0x0, 0xfff}, 0x40000000001, &(0x7f0000000180)={&(0x7f0000000140), 0x40000000001243}, 0xa, 0x0) ioctl$auto(0x3, 0x400454ca, 0x38) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, 0x0, 0x80502, 0x0) bpf$auto(0x0, 0x0, 0x6f3) close_range$auto(0x2, 0x8, 0x0) ioctl$auto_BLKIOMIN(r2, 0x1278, 0x0) syz_genetlink_get_family_id$auto_tipcv2(&(0x7f0000000040), 0xffffffffffffffff) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) unshare$auto(0x40000080) mlockall$auto(0x3) r4 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, 0x0, 0x6ab82, 0x0) ioctl$auto(0x3, 0xae41, r4) listmount$auto(&(0x7f0000000100)={0xba, @raw=0x1b96da36, 0xffffffffffffffff, 0xc, 0x2}, 0x0, 0x5, 0x1) semctl$auto_IPC_INFO(0xffc9, 0xfffff801, 0x3, 0xfffffffffffffffa) mlockall$auto(0x5) getsockopt$auto(0xffffffffffffffff, 0x3, 0x3, 0x0, 0x0) geteuid() 2m27.76518085s ago: executing program 0 (id=1498): mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000) pipe$auto(&(0x7f0000001480)) ioperm$auto(0x3, 0x5, 0x149) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual/net/bond0/bonding/primary_reselect\x00', 0x1e2142, 0x0) sendfile$auto(r0, r0, 0x0, 0x7fff) write$auto(0x3, 0x0, 0xffd8) 2m25.412422223s ago: executing program 0 (id=1499): r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS0\x00', 0x48140, 0x0) r1 = prctl$auto_PR_SCHED_CORE_CREATE(0x0, 0x1, 0x0, 0x249b, 0xb) getsockopt$auto_SO_SNDBUF(r1, 0x0, 0x7, &(0x7f00000000c0)='/dev/ttyS0\x00', &(0x7f0000000140)=0x5) readv$auto(r0, &(0x7f0000000100)={0x0, 0x5}, 0x3) ioctl$auto_TIOCVHANGUP2(r0, 0x5437, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r2 = gettid() lsm_list_modules$auto(0x0, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0xa, 0x5, 0x0) signalfd4$auto(0xffffffff, 0x0, 0x8, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) tkill$auto(r2, 0x7) r3 = socket(0x1e, 0x4, 0x0) get_robust_list$auto(0x0, 0x0, 0x0) setsockopt$auto(r3, 0x10f, 0x87, 0x0, 0x14) mmap$auto(0xf, 0x1, 0x400, 0xf11, r0, 0x6) r4 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r5 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card1/timer_source\x00', 0x189001, 0x0) write$auto(r5, 0x0, 0xe) setrlimit$auto(0x7, &(0x7f0000000080)={0x0, 0x6}) socket(0x23, 0x80805, 0x0) close_range$auto(0x2, r1, 0xfffffffe) pread64$auto(r4, &(0x7f0000000080)='/dev/ttyS0\x00', 0x8, 0x80000000) getrlimit$auto(0x1, &(0x7f0000000180)={0xa38, 0xfffffffffffff09a}) 0s ago: executing program 32 (id=1487): iopl$auto(0x2) syz_genetlink_get_family_id$auto_tipcv2(0x0, 0xffffffffffffffff) unshare$auto(0x40000080) semctl$auto_SETALL(0x3ff, 0x1000, 0x11, 0x2) r0 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0) r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) write$auto(r1, &(0x7f0000000400)='/dev/audio1\x00', 0xa3d9) set_mempolicy$auto(0x2, 0x0, 0x8) mmap$auto(0x0, 0x40009, 0xa, 0x9b72, 0x2, 0x28000) r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS1\x00', 0x20000, 0x0) ioctl$auto_TCSBRKP2(r2, 0x5425, 0x0) r3 = openat$auto_mtd_fops_mtdchar(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mtd0\x00', 0x28082, 0x0) ioctl$auto(r3, 0xc0304d18, 0x8) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) close_range$auto(r0, 0x8, 0xfffffff8) io_uring_setup$auto(0x9, 0x0) socket(0x2, 0x5, 0x0) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x1, 0x84) mmap$auto(0x0, 0x4020009, 0xdb, 0xeb1, 0x401, 0x8000) prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7) seccomp$auto(0x2, 0x0, 0x0) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a) r4 = openat$auto_userio_fops_userio(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0) read$auto_userio_fops_userio(r4, 0x0, 0x0) shutdown$auto(0x200000003, 0x2) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x1c03, 0x0, 0x9, 0x0, 0x0, 0x9}, 0x7}, 0x6, 0x0) socket$nl_generic(0x10, 0x3, 0x10) kernel console output (not intermixed with test programs): ? __pfx___x64_sys_openat+0x10/0x10 [ 402.010605][T10218] ? rcu_is_watching+0x12/0xc0 [ 402.010646][T10218] do_syscall_64+0xcd/0x230 [ 402.010697][T10218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 402.010729][T10218] RIP: 0033:0x7ff93d58d2d0 [ 402.010754][T10218] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 402.010784][T10218] RSP: 002b:00007ff93e4b0fe0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 402.010812][T10218] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ff93d58d2d0 [ 402.010830][T10218] RDX: 0000000000000002 RSI: 00007ff93d610d96 RDI: 00000000ffffff9c [ 402.010847][T10218] RBP: 00007ff93d610d96 R08: 0000000000000000 R09: 00007ff93e4b2000 [ 402.010866][T10218] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 402.010883][T10218] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78 [ 402.010924][T10218] [ 402.263690][T10218] FAULT_INJECTION: forcing a failure. [ 402.263690][T10218] name failslab, interval 1, probability 0, space 0, times 0 [ 402.281031][T10218] CPU: 0 UID: 0 PID: 10218 Comm: syz.3.987 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 402.281083][T10218] Tainted: [U]=USER [ 402.281093][T10218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 402.281109][T10218] Call Trace: [ 402.281119][T10218] [ 402.281131][T10218] dump_stack_lvl+0x16c/0x1f0 [ 402.281186][T10218] should_fail_ex+0x512/0x640 [ 402.281246][T10218] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 402.281290][T10218] should_failslab+0xc2/0x120 [ 402.281332][T10218] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 402.281372][T10218] ? dup_fd+0x4e/0xb90 [ 402.281408][T10218] dup_fd+0x4e/0xb90 [ 402.281436][T10218] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 402.281490][T10218] ? __fget_files+0x20e/0x3c0 [ 402.281515][T10218] ? rcu_watching_snap_stopped_since+0x60/0x110 [ 402.281554][T10218] ksys_unshare+0x831/0xa40 [ 402.281600][T10218] ? __pfx_ksys_unshare+0x10/0x10 [ 402.281644][T10218] ? ksys_write+0x1b9/0x240 [ 402.281677][T10218] ? rcu_is_watching+0x12/0xc0 [ 402.281721][T10218] __x64_sys_unshare+0x31/0x40 [ 402.281769][T10218] do_syscall_64+0xcd/0x230 [ 402.281822][T10218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 402.281856][T10218] RIP: 0033:0x7ff93d58e969 [ 402.281882][T10218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.281912][T10218] RSP: 002b:00007ff93e4b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 402.281943][T10218] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa0 RCX: 00007ff93d58e969 [ 402.281964][T10218] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 402.281983][T10218] RBP: 00007ff93e4b1090 R08: 0000000000000000 R09: 0000000000000000 [ 402.282003][T10218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.282023][T10218] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78 [ 402.282064][T10218] [ 405.621905][T10277] FAULT_INJECTION: forcing a failure. [ 405.621905][T10277] name failslab, interval 1, probability 0, space 0, times 0 [ 405.669920][T10277] CPU: 0 UID: 0 PID: 10277 Comm: syz.3.997 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 405.669987][T10277] Tainted: [U]=USER [ 405.669998][T10277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 405.670018][T10277] Call Trace: [ 405.670029][T10277] [ 405.670040][T10277] dump_stack_lvl+0x16c/0x1f0 [ 405.670095][T10277] should_fail_ex+0x512/0x640 [ 405.670143][T10277] ? __kmalloc_noprof+0xbf/0x510 [ 405.670182][T10277] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xc8/0x290 [ 405.670241][T10277] should_failslab+0xc2/0x120 [ 405.670283][T10277] __kmalloc_noprof+0xd2/0x510 [ 405.670321][T10277] ? kasan_quarantine_put+0x10a/0x240 [ 405.670365][T10277] genl_family_rcv_msg_attrs_parse.constprop.0+0xc8/0x290 [ 405.670427][T10277] genl_family_rcv_msg_doit+0xbf/0x2f0 [ 405.670483][T10277] ? __pfx_genl_family_rcv_msg_doit+0x10/0x10 [ 405.670533][T10277] ? trace_cap_capable+0x18d/0x200 [ 405.670579][T10277] ? bpf_lsm_capable+0x9/0x10 [ 405.670613][T10277] ? security_capable+0x7e/0x260 [ 405.670648][T10277] ? ns_capable+0xd7/0x110 [ 405.670687][T10277] genl_rcv_msg+0x55c/0x800 [ 405.670742][T10277] ? __pfx_genl_rcv_msg+0x10/0x10 [ 405.670790][T10277] ? __pfx___dev_queue_xmit+0x10/0x10 [ 405.670823][T10277] ? __pfx_ovs_dp_cmd_new+0x10/0x10 [ 405.670874][T10277] ? __lock_acquire+0xaa4/0x1ba0 [ 405.670925][T10277] netlink_rcv_skb+0x16a/0x440 [ 405.670981][T10277] ? __pfx_genl_rcv_msg+0x10/0x10 [ 405.671033][T10277] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 405.671102][T10277] ? __pfx_down_read+0x10/0x10 [ 405.671137][T10277] ? netlink_deliver_tap+0x1ae/0xd30 [ 405.671186][T10277] genl_rcv+0x28/0x40 [ 405.671231][T10277] netlink_unicast+0x53d/0x7f0 [ 405.671286][T10277] ? __pfx_netlink_unicast+0x10/0x10 [ 405.671328][T10277] ? __lock_acquire+0xaa4/0x1ba0 [ 405.671381][T10277] netlink_sendmsg+0x8d1/0xdd0 [ 405.671433][T10277] ? __pfx_netlink_sendmsg+0x10/0x10 [ 405.671496][T10277] ____sys_sendmsg+0xa95/0xc70 [ 405.671547][T10277] ? copy_msghdr_from_user+0x10a/0x160 [ 405.671587][T10277] ? __pfx_____sys_sendmsg+0x10/0x10 [ 405.671643][T10277] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 405.671701][T10277] ___sys_sendmsg+0x134/0x1d0 [ 405.671746][T10277] ? __pfx____sys_sendmsg+0x10/0x10 [ 405.671842][T10277] __sys_sendmsg+0x16d/0x220 [ 405.671884][T10277] ? __pfx___sys_sendmsg+0x10/0x10 [ 405.671923][T10277] ? __x64_sys_futex+0x1e0/0x4c0 [ 405.671980][T10277] ? rcu_is_watching+0x12/0xc0 [ 405.672021][T10277] do_syscall_64+0xcd/0x230 [ 405.672073][T10277] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 405.672107][T10277] RIP: 0033:0x7ff93d58e969 [ 405.672134][T10277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.672165][T10277] RSP: 002b:00007ff93e490038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 405.672195][T10277] RAX: ffffffffffffffda RBX: 00007ff93d7b6080 RCX: 00007ff93d58e969 [ 405.672216][T10277] RDX: 0000000002000000 RSI: 0000200000000080 RDI: 0000000000000007 [ 405.672235][T10277] RBP: 00007ff93d610ab1 R08: 0000000000000000 R09: 0000000000000000 [ 405.672255][T10277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 405.672273][T10277] R13: 0000000000000000 R14: 00007ff93d7b6080 R15: 00007ffcf09a3d78 [ 405.672315][T10277] [ 407.060289][T10283] hub 8-0:1.0: USB hub found [ 407.065742][T10283] hub 8-0:1.0: 1 port detected [ 407.400211][T10296] FAULT_INJECTION: forcing a failure. [ 407.400211][T10296] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 407.446586][T10296] CPU: 0 UID: 0 PID: 10296 Comm: syz.3.1004 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 407.446642][T10296] Tainted: [U]=USER [ 407.446654][T10296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 407.446673][T10296] Call Trace: [ 407.446684][T10296] [ 407.446699][T10296] dump_stack_lvl+0x16c/0x1f0 [ 407.446757][T10296] should_fail_ex+0x512/0x640 [ 407.446813][T10296] core_sys_select+0x921/0xbe0 [ 407.446887][T10296] ? __pfx_core_sys_select+0x10/0x10 [ 407.446984][T10296] ? set_user_sigmask+0x21b/0x2b0 [ 407.447019][T10296] ? __pfx_set_user_sigmask+0x10/0x10 [ 407.447051][T10296] ? find_held_lock+0x2b/0x80 [ 407.447092][T10296] do_pselect.constprop.0+0x19f/0x1e0 [ 407.447147][T10296] ? __pfx_do_pselect.constprop.0+0x10/0x10 [ 407.447209][T10296] ? __x64_sys_futex+0x1e0/0x4c0 [ 407.447250][T10296] __x64_sys_pselect6+0x182/0x240 [ 407.447283][T10296] ? __pfx___x64_sys_pselect6+0x10/0x10 [ 407.447312][T10296] ? rcu_is_watching+0x12/0xc0 [ 407.447355][T10296] do_syscall_64+0xcd/0x230 [ 407.447406][T10296] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 407.447439][T10296] RIP: 0033:0x7ff93d58e969 [ 407.447466][T10296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.447500][T10296] RSP: 002b:00007ff93e4b1038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 407.447532][T10296] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa0 RCX: 00007ff93d58e969 [ 407.447552][T10296] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000009 [ 407.447571][T10296] RBP: 00007ff93d610ab1 R08: 0000000000000000 R09: 0000000000000000 [ 407.447590][T10296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 407.447608][T10296] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78 [ 407.447649][T10296] [ 407.928975][T10303] FAULT_INJECTION: forcing a failure. [ 407.928975][T10303] name failslab, interval 1, probability 0, space 0, times 0 [ 407.946346][T10303] CPU: 1 UID: 0 PID: 10303 Comm: syz.3.1006 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 407.946400][T10303] Tainted: [U]=USER [ 407.946412][T10303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 407.946431][T10303] Call Trace: [ 407.946443][T10303] [ 407.946457][T10303] dump_stack_lvl+0x16c/0x1f0 [ 407.946515][T10303] should_fail_ex+0x512/0x640 [ 407.946573][T10303] should_failslab+0xc2/0x120 [ 407.946617][T10303] __kmalloc_cache_noprof+0x6a/0x3e0 [ 407.946654][T10303] ? sctp_add_bind_addr+0xae/0x3f0 [ 407.946711][T10303] sctp_add_bind_addr+0xae/0x3f0 [ 407.946765][T10303] sctp_copy_local_addr_list+0x39d/0x5a0 [ 407.946829][T10303] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 407.946894][T10303] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360 [ 407.946940][T10303] ? sctp_bind_addr_copy+0xe0/0x530 [ 407.946989][T10303] sctp_bind_addr_copy+0xe0/0x530 [ 407.947062][T10303] sctp_connect_new_asoc+0x1d7/0x790 [ 407.947107][T10303] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 407.947151][T10303] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 407.947202][T10303] __sctp_connect+0x3f3/0xc60 [ 407.947249][T10303] ? do_raw_spin_lock+0x12c/0x2b0 [ 407.947304][T10303] ? __pfx___sctp_connect+0x10/0x10 [ 407.947352][T10303] ? __pfx_sctp_inet_connect+0x10/0x10 [ 407.947395][T10303] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 407.947447][T10303] ? __pfx_sctp_inet_connect+0x10/0x10 [ 407.947486][T10303] sctp_inet_connect+0x15f/0x200 [ 407.947529][T10303] __sys_connect_file+0x141/0x1a0 [ 407.947589][T10303] __sys_connect+0x14d/0x170 [ 407.947623][T10303] ? __pfx___sys_connect+0x10/0x10 [ 407.947675][T10303] ? __pfx_ksys_write+0x10/0x10 [ 407.947706][T10303] ? rcu_is_watching+0x12/0xc0 [ 407.947746][T10303] __x64_sys_connect+0x72/0xb0 [ 407.947778][T10303] ? lockdep_hardirqs_on+0x7c/0x110 [ 407.947827][T10303] do_syscall_64+0xcd/0x230 [ 407.947880][T10303] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 407.947914][T10303] RIP: 0033:0x7ff93d58e969 [ 407.947941][T10303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.947973][T10303] RSP: 002b:00007ff93e4b1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 407.948003][T10303] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa0 RCX: 00007ff93d58e969 [ 407.948030][T10303] RDX: 0000000000000054 RSI: 0000200000000080 RDI: 0000000000000003 [ 407.948051][T10303] RBP: 00007ff93e4b1090 R08: 0000000000000000 R09: 0000000000000000 [ 407.948071][T10303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.948090][T10303] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78 [ 407.948135][T10303] [ 409.308897][T10318] FAULT_INJECTION: forcing a failure. [ 409.308897][T10318] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 409.358934][T10318] CPU: 1 UID: 0 PID: 10318 Comm: syz.2.1010 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 409.358985][T10318] Tainted: [U]=USER [ 409.358996][T10318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 409.359015][T10318] Call Trace: [ 409.359029][T10318] [ 409.359043][T10318] dump_stack_lvl+0x16c/0x1f0 [ 409.359099][T10318] should_fail_ex+0x512/0x640 [ 409.359152][T10318] _copy_from_user+0x2e/0xd0 [ 409.359182][T10318] copy_msghdr_from_user+0x98/0x160 [ 409.359235][T10318] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 409.359281][T10318] ? kfree+0x252/0x4d0 [ 409.359307][T10318] ? __lock_acquire+0x5ca/0x1ba0 [ 409.359354][T10318] ___sys_recvmsg+0xdb/0x1a0 [ 409.359393][T10318] ? __pfx____sys_recvmsg+0x10/0x10 [ 409.359457][T10318] ? __pfx___might_resched+0x10/0x10 [ 409.359502][T10318] do_recvmmsg+0x2fe/0x740 [ 409.359547][T10318] ? __pfx_do_recvmmsg+0x10/0x10 [ 409.359596][T10318] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 409.359659][T10318] ? __fget_files+0x20e/0x3c0 [ 409.359697][T10318] __x64_sys_recvmmsg+0x22a/0x280 [ 409.359740][T10318] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 409.359779][T10318] ? rcu_is_watching+0x12/0xc0 [ 409.359818][T10318] do_syscall_64+0xcd/0x230 [ 409.359867][T10318] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 409.359899][T10318] RIP: 0033:0x7fc829f8e969 [ 409.359931][T10318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 409.359962][T10318] RSP: 002b:00007fc82add4038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 409.359992][T10318] RAX: ffffffffffffffda RBX: 00007fc82a1b5fa0 RCX: 00007fc829f8e969 [ 409.360012][T10318] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 409.360031][T10318] RBP: 00007fc82add4090 R08: 0000000000000000 R09: 0000000000000000 [ 409.360050][T10318] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002 [ 409.360068][T10318] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28 [ 409.360110][T10318] [ 415.591214][T10379] Process accounting paused [ 420.043167][T10458] FAULT_INJECTION: forcing a failure. [ 420.043167][T10458] name failslab, interval 1, probability 0, space 0, times 0 [ 420.059588][T10458] CPU: 1 UID: 0 PID: 10458 Comm: syz.2.1037 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 420.059646][T10458] Tainted: [U]=USER [ 420.059657][T10458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 420.059676][T10458] Call Trace: [ 420.059687][T10458] [ 420.059700][T10458] dump_stack_lvl+0x16c/0x1f0 [ 420.059760][T10458] should_fail_ex+0x512/0x640 [ 420.059812][T10458] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 420.059864][T10458] should_failslab+0xc2/0x120 [ 420.059911][T10458] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 420.059952][T10458] ? trace_cap_capable+0x18d/0x200 [ 420.059989][T10458] ? create_new_namespaces+0x30/0xad0 [ 420.060036][T10458] create_new_namespaces+0x30/0xad0 [ 420.060084][T10458] ? bpf_lsm_capable+0x9/0x10 [ 420.060124][T10458] ? security_capable+0x7e/0x260 [ 420.060186][T10458] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 420.060236][T10458] ksys_unshare+0x45b/0xa40 [ 420.060287][T10458] ? __pfx_ksys_unshare+0x10/0x10 [ 420.060333][T10458] ? xfd_validate_state+0x5d/0x180 [ 420.060371][T10458] ? rcu_is_watching+0x12/0xc0 [ 420.060415][T10458] __x64_sys_unshare+0x31/0x40 [ 420.060464][T10458] do_syscall_64+0xcd/0x230 [ 420.060521][T10458] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 420.060558][T10458] RIP: 0033:0x7fc829f8e969 [ 420.060587][T10458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 420.060621][T10458] RSP: 002b:00007fc82add4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 420.060655][T10458] RAX: ffffffffffffffda RBX: 00007fc82a1b5fa0 RCX: 00007fc829f8e969 [ 420.060679][T10458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 420.060700][T10458] RBP: 00007fc82a010ab1 R08: 0000000000000000 R09: 0000000000000000 [ 420.060721][T10458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 420.060742][T10458] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28 [ 420.060786][T10458] [ 420.365896][T10461] FAULT_INJECTION: forcing a failure. [ 420.365896][T10461] name failslab, interval 1, probability 0, space 0, times 0 [ 420.379399][T10461] CPU: 0 UID: 0 PID: 10461 Comm: syz.0.1039 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 420.379446][T10461] Tainted: [U]=USER [ 420.379456][T10461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 420.379473][T10461] Call Trace: [ 420.379482][T10461] [ 420.379493][T10461] dump_stack_lvl+0x16c/0x1f0 [ 420.379551][T10461] should_fail_ex+0x512/0x640 [ 420.379614][T10461] ? fs_reclaim_acquire+0xae/0x150 [ 420.379662][T10461] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 420.379710][T10461] should_failslab+0xc2/0x120 [ 420.379761][T10461] __kmalloc_noprof+0xd2/0x510 [ 420.379805][T10461] tomoyo_realpath_from_path+0xc2/0x6e0 [ 420.379862][T10461] tomoyo_check_open_permission+0x2ab/0x3c0 [ 420.379902][T10461] ? __pfx_tomoyo_check_open_permission+0x10/0x10 [ 420.379979][T10461] ? find_held_lock+0x2b/0x80 [ 420.380028][T10461] tomoyo_file_open+0x6b/0x90 [ 420.380060][T10461] security_file_open+0x84/0x1e0 [ 420.380104][T10461] do_dentry_open+0x596/0x1c10 [ 420.380148][T10461] vfs_open+0x82/0x3f0 [ 420.380192][T10461] path_openat+0x1e5e/0x2d40 [ 420.380236][T10461] ? __pfx_path_openat+0x10/0x10 [ 420.380277][T10461] do_filp_open+0x20b/0x470 [ 420.380308][T10461] ? __pfx_do_filp_open+0x10/0x10 [ 420.380353][T10461] ? __pfx_kfree_link+0x10/0x10 [ 420.380406][T10461] ? alloc_fd+0x471/0x7d0 [ 420.380443][T10461] do_sys_openat2+0x11b/0x1d0 [ 420.380483][T10461] ? __pfx_do_sys_openat2+0x10/0x10 [ 420.380540][T10461] __x64_sys_openat+0x174/0x210 [ 420.380582][T10461] ? __pfx___x64_sys_openat+0x10/0x10 [ 420.380626][T10461] ? rcu_is_watching+0x12/0xc0 [ 420.380666][T10461] do_syscall_64+0xcd/0x230 [ 420.380715][T10461] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 420.380745][T10461] RIP: 0033:0x7f8596f8d2d0 [ 420.380771][T10461] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 420.380800][T10461] RSP: 002b:00007f8597daffe0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 420.380828][T10461] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f8596f8d2d0 [ 420.380847][T10461] RDX: 0000000000000002 RSI: 00007f8597010d96 RDI: 00000000ffffff9c [ 420.380865][T10461] RBP: 00007f8597010d96 R08: 0000000000000000 R09: 00007f8597db1000 [ 420.380882][T10461] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 420.380900][T10461] R13: 0000000000000000 R14: 00007f85971b5fa0 R15: 00007ffe077188d8 [ 420.380939][T10461] [ 420.652877][T10461] ERROR: Out of memory at tomoyo_realpath_from_path. [ 420.660231][T10461] FAULT_INJECTION: forcing a failure. [ 420.660231][T10461] name failslab, interval 1, probability 0, space 0, times 0 [ 420.673317][T10461] CPU: 1 UID: 0 PID: 10461 Comm: syz.0.1039 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 420.673363][T10461] Tainted: [U]=USER [ 420.673374][T10461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 420.673392][T10461] Call Trace: [ 420.673401][T10461] [ 420.673411][T10461] dump_stack_lvl+0x16c/0x1f0 [ 420.673463][T10461] should_fail_ex+0x512/0x640 [ 420.673508][T10461] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 420.673543][T10461] should_failslab+0xc2/0x120 [ 420.673583][T10461] __kmalloc_cache_noprof+0x6a/0x3e0 [ 420.673611][T10461] ? do_raw_spin_lock+0x12c/0x2b0 [ 420.673656][T10461] ? find_held_lock+0x2b/0x80 [ 420.673684][T10461] ? alloc_fdtable+0xa0/0x2b0 [ 420.673771][T10461] alloc_fdtable+0xa0/0x2b0 [ 420.673819][T10461] dup_fd+0x83b/0xb90 [ 420.673854][T10461] ? __fget_files+0x20e/0x3c0 [ 420.673879][T10461] ? rcu_watching_snap_stopped_since+0x60/0x110 [ 420.673919][T10461] ksys_unshare+0x831/0xa40 [ 420.673964][T10461] ? __pfx_ksys_unshare+0x10/0x10 [ 420.674008][T10461] ? ksys_write+0x1b9/0x240 [ 420.674039][T10461] ? rcu_is_watching+0x12/0xc0 [ 420.674078][T10461] __x64_sys_unshare+0x31/0x40 [ 420.674120][T10461] do_syscall_64+0xcd/0x230 [ 420.674170][T10461] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 420.674201][T10461] RIP: 0033:0x7f8596f8e969 [ 420.674224][T10461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 420.674254][T10461] RSP: 002b:00007f8597db0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 420.674283][T10461] RAX: ffffffffffffffda RBX: 00007f85971b5fa0 RCX: 00007f8596f8e969 [ 420.674303][T10461] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 420.674321][T10461] RBP: 00007f8597db0090 R08: 0000000000000000 R09: 0000000000000000 [ 420.674339][T10461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 420.674357][T10461] R13: 0000000000000000 R14: 00007f85971b5fa0 R15: 00007ffe077188d8 [ 420.674397][T10461] [ 421.016939][T10465] bridge0: port 4(team0) entered blocking state [ 421.023501][T10465] bridge0: port 4(team0) entered disabled state [ 421.030123][T10465] team0: entered allmulticast mode [ 421.035309][T10465] team_slave_0: entered allmulticast mode [ 421.041187][T10465] team_slave_1: entered allmulticast mode [ 421.050058][T10465] team0: entered promiscuous mode [ 421.055193][T10465] team_slave_0: entered promiscuous mode [ 421.061248][T10465] team_slave_1: entered promiscuous mode [ 421.067928][T10465] bridge0: port 4(team0) entered blocking state [ 421.074430][T10465] bridge0: port 4(team0) entered forwarding state [ 421.108026][T10466] hub 8-0:1.0: USB hub found [ 421.119151][T10466] hub 8-0:1.0: 1 port detected [ 422.693480][T10486] FAULT_INJECTION: forcing a failure. [ 422.693480][T10486] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 422.707056][T10486] CPU: 1 UID: 0 PID: 10486 Comm: syz.1.1044 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 422.707096][T10486] Tainted: [U]=USER [ 422.707104][T10486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 422.707120][T10486] Call Trace: [ 422.707129][T10486] [ 422.707138][T10486] dump_stack_lvl+0x16c/0x1f0 [ 422.707182][T10486] should_fail_ex+0x512/0x640 [ 422.707227][T10486] _copy_from_user+0x2e/0xd0 [ 422.707251][T10486] memdup_user+0x6b/0xe0 [ 422.707286][T10486] strndup_user+0x78/0xe0 [ 422.707320][T10486] __x64_sys_fsopen+0x9c/0x240 [ 422.707353][T10486] do_syscall_64+0xcd/0x230 [ 422.707395][T10486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 422.707422][T10486] RIP: 0033:0x7f09fdd8e969 [ 422.707442][T10486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.707468][T10486] RSP: 002b:00007f09fec92038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ae [ 422.707491][T10486] RAX: ffffffffffffffda RBX: 00007f09fdfb6080 RCX: 00007f09fdd8e969 [ 422.707508][T10486] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 422.707523][T10486] RBP: 00007f09fde10ab1 R08: 0000000000000000 R09: 0000000000000000 [ 422.707539][T10486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 422.707555][T10486] R13: 0000000000000000 R14: 00007f09fdfb6080 R15: 00007fff3638dc98 [ 422.707586][T10486] [ 423.847188][ T30] audit: type=1800 audit(6043254557.734:10): pid=10502 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.1048" name="dummy_udc" dev="gadgetfs" ino=5840 res=0 errno=0 [ 425.932081][T10536] FAULT_INJECTION: forcing a failure. [ 425.932081][T10536] name failslab, interval 1, probability 0, space 0, times 0 [ 426.011682][T10536] CPU: 0 UID: 0 PID: 10536 Comm: syz.1.1057 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 426.011742][T10536] Tainted: [U]=USER [ 426.011754][T10536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 426.011773][T10536] Call Trace: [ 426.011785][T10536] [ 426.011798][T10536] dump_stack_lvl+0x16c/0x1f0 [ 426.011855][T10536] should_fail_ex+0x512/0x640 [ 426.011914][T10536] should_failslab+0xc2/0x120 [ 426.011961][T10536] __kmalloc_cache_noprof+0x6a/0x3e0 [ 426.011999][T10536] ? sctp_add_bind_addr+0xae/0x3f0 [ 426.012071][T10536] sctp_add_bind_addr+0xae/0x3f0 [ 426.012128][T10536] sctp_copy_local_addr_list+0x39d/0x5a0 [ 426.012193][T10536] ? __pfx_sctp_copy_local_addr_list+0x10/0x10 [ 426.012258][T10536] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360 [ 426.012304][T10536] ? sctp_bind_addr_copy+0xe0/0x530 [ 426.012355][T10536] sctp_bind_addr_copy+0xe0/0x530 [ 426.012412][T10536] sctp_connect_new_asoc+0x1d7/0x790 [ 426.012455][T10536] ? __pfx_sctp_connect_new_asoc+0x10/0x10 [ 426.012498][T10536] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0 [ 426.012547][T10536] __sctp_connect+0x3f3/0xc60 [ 426.012599][T10536] ? do_raw_spin_lock+0x12c/0x2b0 [ 426.012658][T10536] ? __pfx___sctp_connect+0x10/0x10 [ 426.012703][T10536] ? __pfx_sctp_inet_connect+0x10/0x10 [ 426.012749][T10536] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 426.012803][T10536] ? __pfx_sctp_inet_connect+0x10/0x10 [ 426.012841][T10536] sctp_inet_connect+0x15f/0x200 [ 426.012885][T10536] __sys_connect_file+0x141/0x1a0 [ 426.012927][T10536] __sys_connect+0x14d/0x170 [ 426.012962][T10536] ? __pfx___sys_connect+0x10/0x10 [ 426.013017][T10536] ? __pfx_ksys_write+0x10/0x10 [ 426.013048][T10536] ? rcu_is_watching+0x12/0xc0 [ 426.013091][T10536] __x64_sys_connect+0x72/0xb0 [ 426.013125][T10536] ? lockdep_hardirqs_on+0x7c/0x110 [ 426.013175][T10536] do_syscall_64+0xcd/0x230 [ 426.013227][T10536] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 426.013262][T10536] RIP: 0033:0x7f09fdd8e969 [ 426.013290][T10536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 426.013341][T10536] RSP: 002b:00007f09fecb3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 426.013374][T10536] RAX: ffffffffffffffda RBX: 00007f09fdfb5fa0 RCX: 00007f09fdd8e969 [ 426.013396][T10536] RDX: 0000000000000054 RSI: 0000200000000080 RDI: 0000000000000003 [ 426.013415][T10536] RBP: 00007f09fecb3090 R08: 0000000000000000 R09: 0000000000000000 [ 426.013434][T10536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 426.013454][T10536] R13: 0000000000000000 R14: 00007f09fdfb5fa0 R15: 00007fff3638dc98 [ 426.013499][T10536] [ 427.066903][T10548] FAULT_INJECTION: forcing a failure. [ 427.066903][T10548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 427.085096][T10548] CPU: 1 UID: 0 PID: 10548 Comm: syz.2.1061 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 427.085145][T10548] Tainted: [U]=USER [ 427.085154][T10548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 427.085168][T10548] Call Trace: [ 427.085176][T10548] [ 427.085187][T10548] dump_stack_lvl+0x16c/0x1f0 [ 427.085232][T10548] should_fail_ex+0x512/0x640 [ 427.085277][T10548] _copy_from_user+0x2e/0xd0 [ 427.085301][T10548] copy_msghdr_from_user+0x98/0x160 [ 427.085352][T10548] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 427.085402][T10548] ? kfree+0x252/0x4d0 [ 427.085431][T10548] ? __lock_acquire+0x5ca/0x1ba0 [ 427.085470][T10548] ___sys_recvmsg+0xdb/0x1a0 [ 427.085501][T10548] ? __pfx____sys_recvmsg+0x10/0x10 [ 427.085549][T10548] ? __pfx___might_resched+0x10/0x10 [ 427.085586][T10548] do_recvmmsg+0x2fe/0x740 [ 427.085623][T10548] ? __pfx_do_recvmmsg+0x10/0x10 [ 427.085662][T10548] ? __mutex_unlock_slowpath+0x161/0x6a0 [ 427.085713][T10548] ? __fget_files+0x20e/0x3c0 [ 427.085744][T10548] __x64_sys_recvmmsg+0x22a/0x280 [ 427.085798][T10548] ? __pfx___x64_sys_recvmmsg+0x10/0x10 [ 427.085829][T10548] ? rcu_is_watching+0x12/0xc0 [ 427.085860][T10548] do_syscall_64+0xcd/0x230 [ 427.085898][T10548] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 427.085922][T10548] RIP: 0033:0x7fc829f8e969 [ 427.085941][T10548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 427.085966][T10548] RSP: 002b:00007fc82add4038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 427.085989][T10548] RAX: ffffffffffffffda RBX: 00007fc82a1b5fa0 RCX: 00007fc829f8e969 [ 427.086005][T10548] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003 [ 427.086020][T10548] RBP: 00007fc82add4090 R08: 0000000000000000 R09: 0000000000000000 [ 427.086035][T10548] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002 [ 427.086050][T10548] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28 [ 427.086080][T10548] [ 427.904938][T10575] netlink: 294 bytes leftover after parsing attributes in process `syz.2.1065'. [ 428.187191][T10580] dmxdev: DVB (dvb_dmxdev_filter_start): could not set feed [ 428.197987][T10580] dvb_demux: dvb_demux_feed_del: feed not in list (type=1 state=0 pid=ffff) [ 428.251268][T10554] Process accounting paused [ 432.813718][T10635] HSR: entered promiscuous mode [ 432.982066][T10605] Process accounting paused [ 433.750002][T10659] FAULT_INJECTION: forcing a failure. [ 433.750002][T10659] name failslab, interval 1, probability 0, space 0, times 0 [ 433.899424][T10659] CPU: 0 UID: 0 PID: 10659 Comm: syz.1.1082 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 433.899476][T10659] Tainted: [U]=USER [ 433.899486][T10659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 433.899507][T10659] Call Trace: [ 433.899518][T10659] [ 433.899532][T10659] dump_stack_lvl+0x16c/0x1f0 [ 433.899595][T10659] should_fail_ex+0x512/0x640 [ 433.899642][T10659] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 433.899678][T10659] should_failslab+0xc2/0x120 [ 433.899719][T10659] __kmalloc_cache_noprof+0x6a/0x3e0 [ 433.899751][T10659] ? lockdep_init_map_type+0x5c/0x280 [ 433.899794][T10659] ? rfkill_fop_open+0x1b6/0x750 [ 433.899841][T10659] ? __pfx_rfkill_fop_open+0x10/0x10 [ 433.899878][T10659] rfkill_fop_open+0x1b6/0x750 [ 433.899925][T10659] ? __pfx_rfkill_fop_open+0x10/0x10 [ 433.899966][T10659] misc_open+0x35d/0x420 [ 433.899999][T10659] ? __pfx_misc_open+0x10/0x10 [ 433.900039][T10659] chrdev_open+0x234/0x6a0 [ 433.900076][T10659] ? __pfx_apparmor_file_open+0x10/0x10 [ 433.900123][T10659] ? __pfx_chrdev_open+0x10/0x10 [ 433.900166][T10659] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 433.900226][T10659] do_dentry_open+0x741/0x1c10 [ 433.900260][T10659] ? __pfx_chrdev_open+0x10/0x10 [ 433.900303][T10659] vfs_open+0x82/0x3f0 [ 433.900352][T10659] path_openat+0x1e5e/0x2d40 [ 433.900399][T10659] ? __pfx_path_openat+0x10/0x10 [ 433.900442][T10659] do_filp_open+0x20b/0x470 [ 433.900475][T10659] ? __pfx_do_filp_open+0x10/0x10 [ 433.900543][T10659] ? alloc_fd+0x471/0x7d0 [ 433.900586][T10659] do_sys_openat2+0x11b/0x1d0 [ 433.900632][T10659] ? __pfx_do_sys_openat2+0x10/0x10 [ 433.900695][T10659] __x64_sys_openat+0x174/0x210 [ 433.900740][T10659] ? __pfx___x64_sys_openat+0x10/0x10 [ 433.900789][T10659] ? rcu_is_watching+0x12/0xc0 [ 433.900832][T10659] do_syscall_64+0xcd/0x230 [ 433.900887][T10659] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 433.900920][T10659] RIP: 0033:0x7f09fdd8e969 [ 433.900948][T10659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 433.900981][T10659] RSP: 002b:00007f09fec71038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 433.901023][T10659] RAX: ffffffffffffffda RBX: 00007f09fdfb6160 RCX: 00007f09fdd8e969 [ 433.901045][T10659] RDX: 0000000000000400 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 433.901080][T10659] RBP: 00007f09fde10ab1 R08: 0000000000000000 R09: 0000000000000000 [ 433.901101][T10659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 433.901120][T10659] R13: 0000000000000000 R14: 00007f09fdfb6160 R15: 00007fff3638dc98 [ 433.901165][T10659] [ 436.226383][T10685] FAULT_INJECTION: forcing a failure. [ 436.226383][T10685] name failslab, interval 1, probability 0, space 0, times 0 [ 436.240744][T10685] CPU: 1 UID: 0 PID: 10685 Comm: syz.2.1091 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 436.240808][T10685] Tainted: [U]=USER [ 436.240819][T10685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 436.240838][T10685] Call Trace: [ 436.240848][T10685] [ 436.240860][T10685] dump_stack_lvl+0x16c/0x1f0 [ 436.240914][T10685] should_fail_ex+0x512/0x640 [ 436.240971][T10685] should_failslab+0xc2/0x120 [ 436.241012][T10685] __kmalloc_cache_noprof+0x6a/0x3e0 [ 436.241046][T10685] ? proc_thread_self_get_link+0x1c6/0x240 [ 436.241086][T10685] proc_thread_self_get_link+0x1c6/0x240 [ 436.241122][T10685] ? __pfx_proc_thread_self_get_link+0x10/0x10 [ 436.241154][T10685] step_into+0x19e7/0x2270 [ 436.241214][T10685] ? __pfx_step_into+0x10/0x10 [ 436.241270][T10685] ? lookup_fast+0x156/0x610 [ 436.241325][T10685] walk_component+0xfc/0x5b0 [ 436.241383][T10685] link_path_walk.part.0.constprop.0+0x685/0xd60 [ 436.241453][T10685] path_openat+0x227/0x2d40 [ 436.241482][T10685] ? __x64_sys_openat+0x174/0x210 [ 436.241544][T10685] ? __pfx_path_openat+0x10/0x10 [ 436.241603][T10685] do_filp_open+0x20b/0x470 [ 436.241637][T10685] ? __pfx_do_filp_open+0x10/0x10 [ 436.241717][T10685] ? alloc_fd+0x471/0x7d0 [ 436.241764][T10685] do_sys_openat2+0x11b/0x1d0 [ 436.241810][T10685] ? __pfx_do_sys_openat2+0x10/0x10 [ 436.241855][T10685] __x64_sys_openat+0x174/0x210 [ 436.241890][T10685] ? __pfx___x64_sys_openat+0x10/0x10 [ 436.241926][T10685] ? rcu_is_watching+0x12/0xc0 [ 436.241958][T10685] do_syscall_64+0xcd/0x230 [ 436.241999][T10685] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 436.242023][T10685] RIP: 0033:0x7fc829f8d2d0 [ 436.242043][T10685] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 436.242067][T10685] RSP: 002b:00007fc82add3fe0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 436.242089][T10685] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fc829f8d2d0 [ 436.242105][T10685] RDX: 0000000000000002 RSI: 00007fc82a010d96 RDI: 00000000ffffff9c [ 436.242120][T10685] RBP: 00007fc82a010d96 R08: 0000000000000000 R09: 00007fc82add5000 [ 436.242135][T10685] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003 [ 436.242149][T10685] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28 [ 436.242180][T10685] [ 436.242641][T10685] FAULT_INJECTION: forcing a failure. [ 436.242641][T10685] name failslab, interval 1, probability 0, space 0, times 0 [ 436.517199][T10685] CPU: 0 UID: 0 PID: 10685 Comm: syz.2.1091 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 436.517237][T10685] Tainted: [U]=USER [ 436.517244][T10685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 436.517257][T10685] Call Trace: [ 436.517265][T10685] [ 436.517275][T10685] dump_stack_lvl+0x16c/0x1f0 [ 436.517315][T10685] should_fail_ex+0x512/0x640 [ 436.517352][T10685] ? __kvmalloc_node_noprof+0x122/0x600 [ 436.517382][T10685] should_failslab+0xc2/0x120 [ 436.517413][T10685] __kvmalloc_node_noprof+0x135/0x600 [ 436.517439][T10685] ? alloc_fdtable+0xee/0x2b0 [ 436.517481][T10685] ? alloc_fdtable+0xee/0x2b0 [ 436.517515][T10685] alloc_fdtable+0xee/0x2b0 [ 436.517557][T10685] dup_fd+0x83b/0xb90 [ 436.517586][T10685] ? __fget_files+0x20e/0x3c0 [ 436.517611][T10685] ksys_unshare+0x831/0xa40 [ 436.517645][T10685] ? __pfx_ksys_unshare+0x10/0x10 [ 436.517679][T10685] ? ksys_write+0x1b9/0x240 [ 436.517703][T10685] ? rcu_is_watching+0x12/0xc0 [ 436.517732][T10685] __x64_sys_unshare+0x31/0x40 [ 436.517762][T10685] do_syscall_64+0xcd/0x230 [ 436.517809][T10685] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 436.517834][T10685] RIP: 0033:0x7fc829f8e969 [ 436.517853][T10685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 436.517876][T10685] RSP: 002b:00007fc82add4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 436.517898][T10685] RAX: ffffffffffffffda RBX: 00007fc82a1b5fa0 RCX: 00007fc829f8e969 [ 436.517914][T10685] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 436.517928][T10685] RBP: 00007fc82add4090 R08: 0000000000000000 R09: 0000000000000000 [ 436.517943][T10685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 436.517957][T10685] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28 [ 436.517987][T10685] [ 436.829898][T10686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7fe00 [ 436.908615][T10686] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 436.917684][T10686] anon flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff) [ 436.927721][T10686] page_type: f5(slab) [ 436.931889][T10686] raw: 00fff00000000040 ffff88801b442140 0000000000000000 dead000000000001 [ 436.962461][T10686] raw: 0000000000000000 0000000000040004 00000000f5000000 0000000000000000 [ 436.971425][T10686] head: 00fff00000000040 ffff88801b442140 0000000000000000 dead000000000001 [ 436.980991][T10686] head: 0000000000000000 0000000000040004 00000000f5000000 0000000000000000 [ 437.036555][T10686] head: 00fff00000000003 ffffea0001ff8001 00000000ffffffff 00000000ffffffff [ 437.045917][T10686] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008 [ 437.055038][T10686] page dumped because: unmovable page [ 437.065529][T10686] page_owner tracks the page as allocated [ 437.075366][T10686] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 13, tgid 13 (kworker/u8:1), ts 156840013447, free_ts 156773849294 [ 437.181076][T10693] FAULT_INJECTION: forcing a failure. [ 437.181076][T10693] name failslab, interval 1, probability 0, space 0, times 0 [ 437.194981][T10686] post_alloc_hook+0x181/0x1b0 [ 437.200812][T10686] get_page_from_freelist+0x135c/0x3920 [ 437.215343][T10686] __alloc_frozen_pages_noprof+0x261/0x23f0 [ 437.241782][T10693] CPU: 1 UID: 0 PID: 10693 Comm: syz.2.1092 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 437.241856][T10693] Tainted: [U]=USER [ 437.241867][T10693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 437.241889][T10693] Call Trace: [ 437.241900][T10693] [ 437.241914][T10693] dump_stack_lvl+0x16c/0x1f0 [ 437.241974][T10693] should_fail_ex+0x512/0x640 [ 437.242027][T10693] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 437.242073][T10693] should_failslab+0xc2/0x120 [ 437.242120][T10693] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 437.242159][T10693] ? trace_cap_capable+0x18d/0x200 [ 437.242195][T10693] ? create_new_namespaces+0x30/0xad0 [ 437.242242][T10693] create_new_namespaces+0x30/0xad0 [ 437.242281][T10693] ? bpf_lsm_capable+0x9/0x10 [ 437.242320][T10693] ? security_capable+0x7e/0x260 [ 437.242366][T10693] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 437.242411][T10693] ksys_unshare+0x45b/0xa40 [ 437.242460][T10693] ? __pfx_ksys_unshare+0x10/0x10 [ 437.242507][T10693] ? xfd_validate_state+0x5d/0x180 [ 437.242544][T10693] ? rcu_is_watching+0x12/0xc0 [ 437.242588][T10693] __x64_sys_unshare+0x31/0x40 [ 437.242637][T10693] do_syscall_64+0xcd/0x230 [ 437.242694][T10693] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 437.242759][T10693] RIP: 0033:0x7fc829f8e969 [ 437.242787][T10693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 437.242822][T10693] RSP: 002b:00007fc82add4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 437.242878][T10693] RAX: ffffffffffffffda RBX: 00007fc82a1b5fa0 RCX: 00007fc829f8e969 [ 437.242903][T10693] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 437.242924][T10693] RBP: 00007fc82a010ab1 R08: 0000000000000000 R09: 0000000000000000 [ 437.242944][T10693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 437.242971][T10693] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28 [ 437.243016][T10693] [ 437.447297][T10686] alloc_pages_mpol+0x1fb/0x550 [ 437.457459][T10686] new_slab+0x244/0x340 [ 437.461733][T10686] ___slab_alloc+0xd9c/0x1940 [ 437.484597][T10686] __slab_alloc.constprop.0+0x56/0xb0 [ 437.490174][T10686] __kmalloc_node_track_caller_noprof+0x2ee/0x510 [ 437.514163][T10686] kmalloc_reserve+0xef/0x2c0 [ 437.537846][T10686] __alloc_skb+0x166/0x380 [ 437.542371][T10686] nsim_dev_trap_report_work+0x2b1/0xcf0 [ 437.636374][T10686] process_one_work+0x9cf/0x1b70 [ 437.641432][T10686] worker_thread+0x6c8/0xf10 [ 437.646498][T10686] kthread+0x3c2/0x780 [ 437.650661][T10686] ret_from_fork+0x48/0x80 [ 437.664589][T10686] ret_from_fork_asm+0x1a/0x30 [ 437.689896][T10686] page last free pid 5817 tgid 5817 stack trace: [ 437.768735][T10686] __free_frozen_pages+0x69d/0xff0 [ 437.773960][T10686] __folio_put+0x329/0x450 [ 437.831653][T10686] skb_release_data+0x618/0x960 [ 437.840474][T10686] __kfree_skb+0x4f/0x70 [ 437.864710][T10686] tcp_ack+0x19b2/0x5c90 [ 437.881047][T10686] tcp_rcv_established+0xcf0/0x2180 [ 437.907534][T10686] tcp_v4_do_rcv+0x5ca/0xa90 [ 437.917684][T10686] __release_sock+0x31b/0x400 [ 437.922437][T10686] release_sock+0x5a/0x220 [ 437.942907][T10686] tcp_sendmsg+0x38/0x50 [ 437.957865][T10686] inet_sendmsg+0xb9/0x140 [ 437.963962][T10686] sock_write_iter+0x4aa/0x5b0 [ 437.969505][T10686] vfs_write+0x5bd/0x1180 [ 437.974131][T10686] ksys_write+0x205/0x240 [ 437.985455][T10686] do_syscall_64+0xcd/0x230 [ 437.998872][T10686] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 439.566151][T10725] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1099'. [ 439.598330][T10725] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1099'. [ 439.750431][T10727] [U] [ 439.753606][T10727] [U] [ 439.756383][T10727] [U] [ 439.759139][T10727] [U] [ 439.773909][T10727] [U] [ 439.776730][T10727] [U] [ 439.779498][T10727] [U] [ 439.782260][T10727] [U] [ 439.786831][T10727] [U] [ 439.789635][T10727] [U] [ 439.792411][T10727] [U] [ 439.795186][T10727] [U] [ 439.814721][T10727] [U] [ 439.817542][T10727] [U] [ 439.820327][T10727] [U] [ 439.823169][T10727] [U] [ 439.891176][T10727] [U] [ 439.894000][T10727] [U] [ 439.896799][T10727] [U] [ 439.899573][T10727] [U] [ 439.936930][T10727] [U] [ 439.939755][T10727] [U] [ 439.942608][T10727] [U] [ 439.945378][T10727] [U] [ 439.956655][T10727] [U] [ 439.959459][T10727] [U] [ 439.962209][T10727] [U] [ 439.964951][T10727] [U] [ 440.008478][T10727] [U] [ 440.011296][T10727] [U] [ 440.014059][T10727] [U] [ 440.016829][T10727] [U] [ 440.046635][T10727] [U] [ 440.049402][T10727] [U] [ 440.052126][T10727] [U] [ 440.054933][T10727] [U] [ 440.061083][T10727] [U] [ 440.063890][T10727] [U] [ 440.066642][T10727] [U] [ 440.069361][T10727] [U] [ 440.076580][T10727] [U] [ 440.079405][T10727] [U] [ 440.082167][T10727] [U] [ 440.084938][T10727] [U] [ 440.124137][T10727] [U] [ 440.126952][T10727] [U] [ 440.129733][T10727] [U] [ 440.132501][T10727] [U] [ 440.159028][T10735] [U] [ 442.044097][T10760] FAULT_INJECTION: forcing a failure. [ 442.044097][T10760] name failslab, interval 1, probability 0, space 0, times 0 [ 442.073436][T10760] CPU: 0 UID: 0 PID: 10760 Comm: syz.3.1106 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 442.073486][T10760] Tainted: [U]=USER [ 442.073496][T10760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 442.073514][T10760] Call Trace: [ 442.073524][T10760] [ 442.073537][T10760] dump_stack_lvl+0x16c/0x1f0 [ 442.073592][T10760] should_fail_ex+0x512/0x640 [ 442.073641][T10760] ? kmem_cache_alloc_node_noprof+0x5e/0x3b0 [ 442.073685][T10760] should_failslab+0xc2/0x120 [ 442.073728][T10760] kmem_cache_alloc_node_noprof+0x71/0x3b0 [ 442.073768][T10760] ? __alloc_skb+0x2b2/0x380 [ 442.073812][T10760] __alloc_skb+0x2b2/0x380 [ 442.073848][T10760] ? __pfx___alloc_skb+0x10/0x10 [ 442.073889][T10760] ? apparmor_file_permission+0x251/0x400 [ 442.073940][T10760] virtual_ncidev_write+0x50/0x210 [ 442.073995][T10760] vfs_write+0x25c/0x1180 [ 442.074025][T10760] ? __pfx_virtual_ncidev_write+0x10/0x10 [ 442.074094][T10760] ? __pfx_vfs_write+0x10/0x10 [ 442.074121][T10760] ? find_held_lock+0x2b/0x80 [ 442.074152][T10760] ? __fget_files+0x204/0x3c0 [ 442.074185][T10760] ? __fget_files+0x20e/0x3c0 [ 442.074226][T10760] ksys_write+0x12a/0x240 [ 442.074259][T10760] ? __pfx_ksys_write+0x10/0x10 [ 442.074290][T10760] ? rcu_is_watching+0x12/0xc0 [ 442.074331][T10760] do_syscall_64+0xcd/0x230 [ 442.074388][T10760] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 442.074420][T10760] RIP: 0033:0x7ff93d58e969 [ 442.074444][T10760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 442.074492][T10760] RSP: 002b:00007ff93e490038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 442.074522][T10760] RAX: ffffffffffffffda RBX: 00007ff93d7b6080 RCX: 00007ff93d58e969 [ 442.074543][T10760] RDX: 000000000000b4d3 RSI: 0000000000000000 RDI: 0000000000000003 [ 442.074561][T10760] RBP: 00007ff93e490090 R08: 0000000000000000 R09: 0000000000000000 [ 442.074580][T10760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 442.074599][T10760] R13: 0000000000000000 R14: 00007ff93d7b6080 R15: 00007ffcf09a3d78 [ 442.074638][T10760] [ 443.613166][T10798] vivid-003: ================= START STATUS ================= [ 443.622046][T10798] vivid-003: Radio HW Seek Mode: Bounded [ 443.630963][T10798] vivid-003: Radio Programmable HW Seek: false [ 443.637969][T10798] vivid-003: RDS Rx I/O Mode: Block I/O [ 443.643787][T10798] vivid-003: Generate RBDS Instead of RDS: false [ 443.678026][T10798] vivid-003: RDS Reception: true [ 443.693391][T10798] vivid-003: RDS Program Type: 0 inactive [ 443.710096][T10798] vivid-003: RDS PS Name: inactive [ 443.728662][T10798] vivid-003: RDS Radio Text: inactive [ 443.731387][T10800] hub 8-0:1.0: USB hub found [ 443.741533][T10800] hub 8-0:1.0: 1 port detected [ 443.807921][T10798] vivid-003: RDS Traffic Announcement: false inactive [ 443.814972][T10798] vivid-003: RDS Traffic Program: false inactive [ 443.821429][T10798] vivid-003: RDS Music: false inactive [ 443.827200][T10798] vivid-003: ================== END STATUS ================== [ 445.250497][T10820] block nbd7: not configured, cannot reconfigure [ 446.794607][T10824] Process accounting resumed [ 450.454119][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 450.464574][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 450.640269][T10880] netlink: 'syz.1.1133': attribute type 1 has an invalid length. [ 450.648334][T10880] netlink: 33 bytes leftover after parsing attributes in process `syz.1.1133'. [ 451.260846][T10889] HSR: entered promiscuous mode [ 455.271165][T10936] FAULT_INJECTION: forcing a failure. [ 455.271165][T10936] name failslab, interval 1, probability 0, space 0, times 0 [ 455.388444][T10936] CPU: 0 UID: 0 PID: 10936 Comm: syz.0.1145 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 455.388502][T10936] Tainted: [U]=USER [ 455.388514][T10936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 455.388535][T10936] Call Trace: [ 455.388546][T10936] [ 455.388560][T10936] dump_stack_lvl+0x16c/0x1f0 [ 455.388619][T10936] should_fail_ex+0x512/0x640 [ 455.388671][T10936] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 455.388710][T10936] should_failslab+0xc2/0x120 [ 455.388754][T10936] __kmalloc_cache_noprof+0x6a/0x3e0 [ 455.388789][T10936] ? rfkill_fop_open+0x56/0x750 [ 455.388834][T10936] ? __pfx_rfkill_fop_open+0x10/0x10 [ 455.388872][T10936] rfkill_fop_open+0x56/0x750 [ 455.388908][T10936] ? kobject_get_unless_zero+0x156/0x1e0 [ 455.388969][T10936] ? __pfx_rfkill_fop_open+0x10/0x10 [ 455.389012][T10936] misc_open+0x35d/0x420 [ 455.389045][T10936] ? __pfx_misc_open+0x10/0x10 [ 455.389076][T10936] chrdev_open+0x234/0x6a0 [ 455.389115][T10936] ? __pfx_apparmor_file_open+0x10/0x10 [ 455.389162][T10936] ? __pfx_chrdev_open+0x10/0x10 [ 455.389204][T10936] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 455.389265][T10936] do_dentry_open+0x741/0x1c10 [ 455.389304][T10936] ? __pfx_chrdev_open+0x10/0x10 [ 455.389359][T10936] vfs_open+0x82/0x3f0 [ 455.389413][T10936] path_openat+0x1e5e/0x2d40 [ 455.389469][T10936] ? __pfx_path_openat+0x10/0x10 [ 455.389516][T10936] do_filp_open+0x20b/0x470 [ 455.389552][T10936] ? __pfx_do_filp_open+0x10/0x10 [ 455.389622][T10936] ? alloc_fd+0x471/0x7d0 [ 455.389667][T10936] do_sys_openat2+0x11b/0x1d0 [ 455.389713][T10936] ? __pfx_do_sys_openat2+0x10/0x10 [ 455.389789][T10936] __x64_sys_openat+0x174/0x210 [ 455.389837][T10936] ? __pfx___x64_sys_openat+0x10/0x10 [ 455.389888][T10936] ? rcu_is_watching+0x12/0xc0 [ 455.389935][T10936] do_syscall_64+0xcd/0x230 [ 455.389991][T10936] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 455.390027][T10936] RIP: 0033:0x7f8596f8e969 [ 455.390054][T10936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 455.390095][T10936] RSP: 002b:00007f8597d6e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 455.390130][T10936] RAX: ffffffffffffffda RBX: 00007f85971b6160 RCX: 00007f8596f8e969 [ 455.390153][T10936] RDX: 0000000000000400 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 455.390175][T10936] RBP: 00007f8597010ab1 R08: 0000000000000000 R09: 0000000000000000 [ 455.390198][T10936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 455.390219][T10936] R13: 0000000000000000 R14: 00007f85971b6160 R15: 00007ffe077188d8 [ 455.390265][T10936] [ 456.346652][ T30] audit: type=1800 audit(6043254590.231:11): pid=10953 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.1149" name="dummy_udc" dev="gadgetfs" ino=5840 res=0 errno=0 [ 458.642017][T10987] FAULT_INJECTION: forcing a failure. [ 458.642017][T10987] name failslab, interval 1, probability 0, space 0, times 0 [ 458.804713][T10987] CPU: 1 UID: 0 PID: 10987 Comm: syz.3.1158 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 458.804757][T10987] Tainted: [U]=USER [ 458.804766][T10987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 458.804782][T10987] Call Trace: [ 458.804790][T10987] [ 458.804801][T10987] dump_stack_lvl+0x16c/0x1f0 [ 458.804857][T10987] should_fail_ex+0x512/0x640 [ 458.804899][T10987] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 458.804929][T10987] should_failslab+0xc2/0x120 [ 458.804963][T10987] __kmalloc_cache_noprof+0x6a/0x3e0 [ 458.804990][T10987] ? rfkill_fop_open+0x56/0x750 [ 458.805026][T10987] ? __pfx_rfkill_fop_open+0x10/0x10 [ 458.805055][T10987] rfkill_fop_open+0x56/0x750 [ 458.805085][T10987] ? kobject_get_unless_zero+0x156/0x1e0 [ 458.805132][T10987] ? __pfx_rfkill_fop_open+0x10/0x10 [ 458.805164][T10987] misc_open+0x35d/0x420 [ 458.805190][T10987] ? __pfx_misc_open+0x10/0x10 [ 458.805214][T10987] chrdev_open+0x234/0x6a0 [ 458.805243][T10987] ? __pfx_apparmor_file_open+0x10/0x10 [ 458.805280][T10987] ? __pfx_chrdev_open+0x10/0x10 [ 458.805312][T10987] ? file_set_fsnotify_mode_from_watchers+0x163/0x640 [ 458.805360][T10987] do_dentry_open+0x741/0x1c10 [ 458.805389][T10987] ? __pfx_chrdev_open+0x10/0x10 [ 458.805424][T10987] vfs_open+0x82/0x3f0 [ 458.805463][T10987] path_openat+0x1e5e/0x2d40 [ 458.805502][T10987] ? __pfx_path_openat+0x10/0x10 [ 458.805537][T10987] do_filp_open+0x20b/0x470 [ 458.805563][T10987] ? __pfx_do_filp_open+0x10/0x10 [ 458.805614][T10987] ? alloc_fd+0x471/0x7d0 [ 458.805646][T10987] do_sys_openat2+0x11b/0x1d0 [ 458.805682][T10987] ? __pfx_do_sys_openat2+0x10/0x10 [ 458.805737][T10987] __x64_sys_openat+0x174/0x210 [ 458.805775][T10987] ? __pfx___x64_sys_openat+0x10/0x10 [ 458.805814][T10987] ? rcu_is_watching+0x12/0xc0 [ 458.805859][T10987] do_syscall_64+0xcd/0x230 [ 458.805902][T10987] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 458.805930][T10987] RIP: 0033:0x7ff93d58e969 [ 458.805951][T10987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 458.805978][T10987] RSP: 002b:00007ff93e4b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 458.806002][T10987] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa0 RCX: 00007ff93d58e969 [ 458.806020][T10987] RDX: 0000000000000400 RSI: 0000200000000040 RDI: ffffffffffffff9c [ 458.806037][T10987] RBP: 00007ff93d610ab1 R08: 0000000000000000 R09: 0000000000000000 [ 458.806052][T10987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 458.806069][T10987] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78 [ 458.806101][T10987] [ 460.322600][T10988] Process accounting resumed [ 461.497041][ T30] audit: type=1800 audit(6043254595.361:12): pid=11031 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.2.1166" name="dummy_udc" dev="gadgetfs" ino=5840 res=0 errno=0 [ 463.147349][T11033] hub 8-0:1.0: USB hub found [ 463.159656][T11033] hub 8-0:1.0: 1 port detected [ 464.425401][T11047] Process accounting resumed [ 466.336660][T11088] i2c i2c-0: delete_device: Extra parameters [ 466.376940][T11088] netlink: 98 bytes leftover after parsing attributes in process `syz.1.1179'. [ 466.422702][T11088] netlink: 50 bytes leftover after parsing attributes in process `syz.1.1179'. [ 467.360644][T11093] hub 8-0:1.0: USB hub found [ 467.365935][T11093] hub 8-0:1.0: 1 port detected [ 468.414869][T11109] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1185'. [ 470.513546][T11135] netlink: 25 bytes leftover after parsing attributes in process `syz.3.1190'. [ 471.601010][T11157] hub 8-0:1.0: USB hub found [ 471.625498][T11157] hub 8-0:1.0: 1 port detected [ 471.640616][T11158] HSR: entered promiscuous mode [ 474.481502][T11203] vivid-002: ================= START STATUS ================= [ 474.556170][T11203] vivid-002: ================== END STATUS ================== [ 477.680301][T11248] Process accounting paused [ 490.752097][T11405] Process accounting paused [ 490.800451][T11436] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input8 [ 491.526098][T11452] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1264'. [ 494.598761][T11504] FAULT_INJECTION: forcing a failure. [ 494.598761][T11504] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 494.626558][T11504] CPU: 0 UID: 0 PID: 11504 Comm: syz.0.1275 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 494.626608][T11504] Tainted: [U]=USER [ 494.626618][T11504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 494.626635][T11504] Call Trace: [ 494.626645][T11504] [ 494.626657][T11504] dump_stack_lvl+0x16c/0x1f0 [ 494.626710][T11504] should_fail_ex+0x512/0x640 [ 494.626789][T11504] _copy_from_user+0x2e/0xd0 [ 494.626820][T11504] virtual_ncidev_write+0xa5/0x210 [ 494.626874][T11504] vfs_write+0x25c/0x1180 [ 494.626903][T11504] ? __pfx_virtual_ncidev_write+0x10/0x10 [ 494.626960][T11504] ? __pfx_vfs_write+0x10/0x10 [ 494.626988][T11504] ? find_held_lock+0x2b/0x80 [ 494.627020][T11504] ? __fget_files+0x204/0x3c0 [ 494.627055][T11504] ? __fget_files+0x20e/0x3c0 [ 494.627094][T11504] ksys_write+0x12a/0x240 [ 494.627124][T11504] ? __pfx_ksys_write+0x10/0x10 [ 494.627153][T11504] ? rcu_is_watching+0x12/0xc0 [ 494.627194][T11504] do_syscall_64+0xcd/0x230 [ 494.627242][T11504] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 494.627272][T11504] RIP: 0033:0x7f8596f8e969 [ 494.627298][T11504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 494.627328][T11504] RSP: 002b:00007f8597d6e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 494.627366][T11504] RAX: ffffffffffffffda RBX: 00007f85971b6160 RCX: 00007f8596f8e969 [ 494.627386][T11504] RDX: 000000000000b4d3 RSI: 0000000000000000 RDI: 0000000000000003 [ 494.627404][T11504] RBP: 00007f8597d6e090 R08: 0000000000000000 R09: 0000000000000000 [ 494.627423][T11504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 494.627442][T11504] R13: 0000000000000000 R14: 00007f85971b6160 R15: 00007ffe077188d8 [ 494.627484][T11504] [ 495.201403][T11504] Process accounting paused [ 495.426107][T11519] openvswitch: netlink: Message has 20 unknown bytes. [ 503.134782][T11654] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1315'. [ 504.423312][T11685] openvswitch: HSR: Dropping previously announced user features [ 504.959470][T11699] FAULT_INJECTION: forcing a failure. [ 504.959470][T11699] name fail_futex, interval 1, probability 0, space 0, times 0 [ 505.053260][T11699] CPU: 1 UID: 0 PID: 11699 Comm: syz.3.1325 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 505.053327][T11699] Tainted: [U]=USER [ 505.053339][T11699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 505.053360][T11699] Call Trace: [ 505.053371][T11699] [ 505.053384][T11699] dump_stack_lvl+0x16c/0x1f0 [ 505.053444][T11699] should_fail_ex+0x512/0x640 [ 505.053504][T11699] get_futex_key+0x49e/0x1000 [ 505.053538][T11699] ? __pfx_core_sys_select+0x10/0x10 [ 505.053599][T11699] ? __pfx_get_futex_key+0x10/0x10 [ 505.053651][T11699] futex_wake+0xe7/0x4e0 [ 505.053700][T11699] ? __pfx_futex_wake+0x10/0x10 [ 505.053741][T11699] ? __pfx_poll_select_finish+0x10/0x10 [ 505.053799][T11699] ? __pfx_set_user_sigmask+0x10/0x10 [ 505.053833][T11699] ? find_held_lock+0x2b/0x80 [ 505.053871][T11699] do_futex+0x1e3/0x350 [ 505.053909][T11699] ? __pfx_do_futex+0x10/0x10 [ 505.053947][T11699] ? __pfx_do_pselect.constprop.0+0x10/0x10 [ 505.054012][T11699] __x64_sys_futex+0x1e0/0x4c0 [ 505.054055][T11699] ? __pfx___x64_sys_futex+0x10/0x10 [ 505.054094][T11699] ? __pfx___x64_sys_pselect6+0x10/0x10 [ 505.054125][T11699] ? rcu_is_watching+0x12/0xc0 [ 505.054183][T11699] do_syscall_64+0xcd/0x230 [ 505.054241][T11699] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 505.054304][T11699] RIP: 0033:0x7ff93d58e969 [ 505.054334][T11699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 505.054373][T11699] RSP: 002b:00007ff93e4b10e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 505.054403][T11699] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa8 RCX: 00007ff93d58e969 [ 505.054425][T11699] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff93d7b5fac [ 505.054447][T11699] RBP: 00007ff93d7b5fa0 R08: 00007ff93e4b2000 R09: 0000000000000000 [ 505.054468][T11699] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff93d7b5fac [ 505.054488][T11699] R13: 0000000000000000 R14: 00007ffcf09a3c90 R15: 00007ffcf09a3d78 [ 505.054532][T11699] [ 508.932063][T11738] Process accounting resumed [ 509.074781][T11756] FAULT_INJECTION: forcing a failure. [ 509.074781][T11756] name fail_futex, interval 1, probability 0, space 0, times 0 [ 509.080375][T11758] device-mapper: ioctl: Unable to rename non-existent device, to uuid „ [ 509.088402][T11756] CPU: 1 UID: 0 PID: 11756 Comm: syz.3.1336 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 509.088460][T11756] Tainted: [U]=USER [ 509.088471][T11756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 509.088491][T11756] Call Trace: [ 509.088501][T11756] [ 509.088513][T11756] dump_stack_lvl+0x16c/0x1f0 [ 509.088569][T11756] should_fail_ex+0x512/0x640 [ 509.088626][T11756] get_futex_key+0x49e/0x1000 [ 509.088660][T11756] ? __pfx_core_sys_select+0x10/0x10 [ 509.088726][T11756] ? __pfx_get_futex_key+0x10/0x10 [ 509.088789][T11756] futex_wake+0xe7/0x4e0 [ 509.088844][T11756] ? __pfx_futex_wake+0x10/0x10 [ 509.088896][T11756] ? __pfx_poll_select_finish+0x10/0x10 [ 509.088963][T11756] ? __pfx_set_user_sigmask+0x10/0x10 [ 509.089001][T11756] ? find_held_lock+0x2b/0x80 [ 509.089046][T11756] do_futex+0x1e3/0x350 [ 509.089089][T11756] ? __pfx_do_futex+0x10/0x10 [ 509.089133][T11756] ? __pfx_do_pselect.constprop.0+0x10/0x10 [ 509.089219][T11756] __x64_sys_futex+0x1e0/0x4c0 [ 509.089271][T11756] ? __pfx___x64_sys_futex+0x10/0x10 [ 509.089317][T11756] ? __pfx___x64_sys_pselect6+0x10/0x10 [ 509.089353][T11756] ? rcu_is_watching+0x12/0xc0 [ 509.089405][T11756] do_syscall_64+0xcd/0x230 [ 509.089470][T11756] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 509.089510][T11756] RIP: 0033:0x7ff93d58e969 [ 509.089543][T11756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 509.089580][T11756] RSP: 002b:00007ff93e4b10e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 509.089617][T11756] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa8 RCX: 00007ff93d58e969 [ 509.089645][T11756] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff93d7b5fac [ 509.089669][T11756] RBP: 00007ff93d7b5fa0 R08: 00007ff93e4b2000 R09: 0000000000000000 [ 509.089694][T11756] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff93d7b5fac [ 509.089719][T11756] R13: 0000000000000000 R14: 00007ffcf09a3c90 R15: 00007ffcf09a3d78 [ 509.089769][T11756] [ 509.405113][T11758] device-mapper: ioctl: ioctl interface mismatch: kernel(4.49.0), user(0.0.0), cmd(5) [ 511.879442][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 511.886027][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 512.570305][T11795] FAULT_INJECTION: forcing a failure. [ 512.570305][T11795] name fail_futex, interval 1, probability 0, space 0, times 0 [ 512.636561][T11795] CPU: 1 UID: 0 PID: 11795 Comm: syz.1.1347 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 512.636617][T11795] Tainted: [U]=USER [ 512.636630][T11795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 512.636651][T11795] Call Trace: [ 512.636673][T11795] [ 512.636688][T11795] dump_stack_lvl+0x16c/0x1f0 [ 512.636745][T11795] should_fail_ex+0x512/0x640 [ 512.636806][T11795] get_futex_key+0x49e/0x1000 [ 512.636841][T11795] ? __pfx_core_sys_select+0x10/0x10 [ 512.636902][T11795] ? __pfx_get_futex_key+0x10/0x10 [ 512.636955][T11795] futex_wake+0xe7/0x4e0 [ 512.637006][T11795] ? __pfx_futex_wake+0x10/0x10 [ 512.637051][T11795] ? __pfx_poll_select_finish+0x10/0x10 [ 512.637114][T11795] ? __pfx_set_user_sigmask+0x10/0x10 [ 512.637150][T11795] ? find_held_lock+0x2b/0x80 [ 512.637190][T11795] do_futex+0x1e3/0x350 [ 512.637230][T11795] ? __pfx_do_futex+0x10/0x10 [ 512.637267][T11795] ? __pfx_do_pselect.constprop.0+0x10/0x10 [ 512.637333][T11795] __x64_sys_futex+0x1e0/0x4c0 [ 512.637380][T11795] ? __pfx___x64_sys_futex+0x10/0x10 [ 512.637422][T11795] ? __pfx___x64_sys_pselect6+0x10/0x10 [ 512.637454][T11795] ? rcu_is_watching+0x12/0xc0 [ 512.637500][T11795] do_syscall_64+0xcd/0x230 [ 512.637560][T11795] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 512.637596][T11795] RIP: 0033:0x7f09fdd8e969 [ 512.637624][T11795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 512.637669][T11795] RSP: 002b:00007f09fecb30e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 512.637704][T11795] RAX: ffffffffffffffda RBX: 00007f09fdfb5fa8 RCX: 00007f09fdd8e969 [ 512.637728][T11795] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f09fdfb5fac [ 512.637750][T11795] RBP: 00007f09fdfb5fa0 R08: 00007f09fecb4000 R09: 0000000000000000 [ 512.637773][T11795] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f09fdfb5fac [ 512.637796][T11795] R13: 0000000000000000 R14: 00007fff3638dbb0 R15: 00007fff3638dc98 [ 512.637842][T11795] [ 513.160920][T11807] FAULT_INJECTION: forcing a failure. [ 513.160920][T11807] name failslab, interval 1, probability 0, space 0, times 0 [ 513.219135][T11807] CPU: 0 UID: 0 PID: 11807 Comm: syz.3.1351 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 513.219184][T11807] Tainted: [U]=USER [ 513.219195][T11807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 513.219213][T11807] Call Trace: [ 513.219222][T11807] [ 513.219234][T11807] dump_stack_lvl+0x16c/0x1f0 [ 513.219285][T11807] should_fail_ex+0x512/0x640 [ 513.219337][T11807] should_failslab+0xc2/0x120 [ 513.219377][T11807] __kmalloc_cache_noprof+0x6a/0x3e0 [ 513.219410][T11807] ? proc_thread_self_get_link+0x1c6/0x240 [ 513.219451][T11807] proc_thread_self_get_link+0x1c6/0x240 [ 513.219484][T11807] ? __pfx_proc_thread_self_get_link+0x10/0x10 [ 513.219533][T11807] step_into+0x19e7/0x2270 [ 513.219591][T11807] ? __pfx_step_into+0x10/0x10 [ 513.219643][T11807] ? lookup_fast+0x156/0x610 [ 513.219693][T11807] walk_component+0xfc/0x5b0 [ 513.219746][T11807] link_path_walk.part.0.constprop.0+0x685/0xd60 [ 513.219808][T11807] path_openat+0x227/0x2d40 [ 513.219835][T11807] ? __x64_sys_openat+0x174/0x210 [ 513.219900][T11807] ? __pfx_path_openat+0x10/0x10 [ 513.219937][T11807] do_filp_open+0x20b/0x470 [ 513.219964][T11807] ? __pfx_do_filp_open+0x10/0x10 [ 513.220017][T11807] ? alloc_fd+0x471/0x7d0 [ 513.220050][T11807] do_sys_openat2+0x11b/0x1d0 [ 513.220087][T11807] ? __pfx_do_sys_openat2+0x10/0x10 [ 513.220137][T11807] __x64_sys_openat+0x174/0x210 [ 513.220175][T11807] ? __pfx___x64_sys_openat+0x10/0x10 [ 513.220214][T11807] ? rcu_is_watching+0x12/0xc0 [ 513.220250][T11807] do_syscall_64+0xcd/0x230 [ 513.220295][T11807] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 513.220323][T11807] RIP: 0033:0x7ff93d58d2d0 [ 513.220344][T11807] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 513.220371][T11807] RSP: 002b:00007ff93e4b0fe0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 513.220397][T11807] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ff93d58d2d0 [ 513.220414][T11807] RDX: 0000000000000002 RSI: 00007ff93d610d96 RDI: 00000000ffffff9c [ 513.220431][T11807] RBP: 00007ff93d610d96 R08: 0000000000000000 R09: 00007ff93e4b2000 [ 513.220447][T11807] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000007 [ 513.220463][T11807] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78 [ 513.220503][T11807] [ 513.221223][T11807] FAULT_INJECTION: forcing a failure. [ 513.221223][T11807] name failslab, interval 1, probability 0, space 0, times 0 [ 513.544944][T11807] CPU: 0 UID: 0 PID: 11807 Comm: syz.3.1351 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 513.544993][T11807] Tainted: [U]=USER [ 513.545002][T11807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 513.545017][T11807] Call Trace: [ 513.545032][T11807] [ 513.545044][T11807] dump_stack_lvl+0x16c/0x1f0 [ 513.545091][T11807] should_fail_ex+0x512/0x640 [ 513.545132][T11807] ? __kmalloc_cache_noprof+0x57/0x3e0 [ 513.545162][T11807] should_failslab+0xc2/0x120 [ 513.545197][T11807] __kmalloc_cache_noprof+0x6a/0x3e0 [ 513.545224][T11807] ? alloc_fs_context+0x57/0x9c0 [ 513.545255][T11807] alloc_fs_context+0x57/0x9c0 [ 513.545288][T11807] mq_init_ns+0x172/0x620 [ 513.545323][T11807] copy_ipcs+0x383/0x610 [ 513.545352][T11807] ? copy_utsname+0xab/0x470 [ 513.545388][T11807] create_new_namespaces+0x20a/0xad0 [ 513.545421][T11807] ? security_capable+0x7e/0x260 [ 513.545452][T11807] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 513.545486][T11807] ksys_unshare+0x45b/0xa40 [ 513.545524][T11807] ? __pfx_ksys_unshare+0x10/0x10 [ 513.545569][T11807] ? ksys_write+0x1b9/0x240 [ 513.545596][T11807] ? rcu_is_watching+0x12/0xc0 [ 513.545629][T11807] __x64_sys_unshare+0x31/0x40 [ 513.545666][T11807] do_syscall_64+0xcd/0x230 [ 513.545709][T11807] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 513.545737][T11807] RIP: 0033:0x7ff93d58e969 [ 513.545758][T11807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 513.545787][T11807] RSP: 002b:00007ff93e4b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 513.545811][T11807] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa0 RCX: 00007ff93d58e969 [ 513.545829][T11807] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 513.545844][T11807] RBP: 00007ff93e4b1090 R08: 0000000000000000 R09: 0000000000000000 [ 513.545860][T11807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 513.545875][T11807] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78 [ 513.545908][T11807] [ 513.942231][T11819] FAULT_INJECTION: forcing a failure. [ 513.942231][T11819] name failslab, interval 1, probability 0, space 0, times 0 [ 513.964070][T11819] CPU: 0 UID: 0 PID: 11819 Comm: syz.1.1355 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 513.964122][T11819] Tainted: [U]=USER [ 513.964134][T11819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 513.964153][T11819] Call Trace: [ 513.964165][T11819] [ 513.964177][T11819] dump_stack_lvl+0x16c/0x1f0 [ 513.964236][T11819] should_fail_ex+0x512/0x640 [ 513.964285][T11819] ? __kmalloc_node_track_caller_noprof+0xc3/0x510 [ 513.964333][T11819] should_failslab+0xc2/0x120 [ 513.964379][T11819] __kmalloc_node_track_caller_noprof+0xd6/0x510 [ 513.964420][T11819] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 513.964464][T11819] ? fib_notifier_ops_register+0x32/0x270 [ 513.964527][T11819] kmemdup_noprof+0x29/0x60 [ 513.964575][T11819] fib_notifier_ops_register+0x32/0x270 [ 513.964622][T11819] fib4_notifier_init+0x4f/0xd0 [ 513.964664][T11819] fib_net_init+0xbf/0x3f0 [ 513.964704][T11819] ? __pfx___register_sysctl_table+0x10/0x10 [ 513.964744][T11819] ? __pfx_fib_net_init+0x10/0x10 [ 513.964785][T11819] ? lockdep_init_map_type+0x5c/0x280 [ 513.964832][T11819] ? do_init_timer+0xc9/0x110 [ 513.964869][T11819] ? devinet_init_net+0x5c2/0x910 [ 513.964920][T11819] ? __pfx_fib_net_init+0x10/0x10 [ 513.964961][T11819] ops_init+0x1e2/0x5f0 [ 513.965011][T11819] setup_net+0x21e/0x850 [ 513.965060][T11819] ? __pfx_setup_net+0x10/0x10 [ 513.965101][T11819] ? lockdep_init_map_type+0x5c/0x280 [ 513.965148][T11819] ? __pfx_down_read_killable+0x10/0x10 [ 513.965188][T11819] ? debug_mutex_init+0x37/0x70 [ 513.965224][T11819] copy_net_ns+0x2a6/0x5f0 [ 513.965276][T11819] create_new_namespaces+0x3ea/0xad0 [ 513.965326][T11819] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 513.965368][T11819] ksys_unshare+0x45b/0xa40 [ 513.965416][T11819] ? __pfx_ksys_unshare+0x10/0x10 [ 513.965460][T11819] ? xfd_validate_state+0x5d/0x180 [ 513.965495][T11819] ? rcu_is_watching+0x12/0xc0 [ 513.965547][T11819] __x64_sys_unshare+0x31/0x40 [ 513.965594][T11819] do_syscall_64+0xcd/0x230 [ 513.965652][T11819] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 513.965686][T11819] RIP: 0033:0x7f09fdd8e969 [ 513.965714][T11819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 513.965747][T11819] RSP: 002b:00007f09fec92038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 513.965779][T11819] RAX: ffffffffffffffda RBX: 00007f09fdfb6080 RCX: 00007f09fdd8e969 [ 513.965800][T11819] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 513.965820][T11819] RBP: 00007f09fde10ab1 R08: 0000000000000000 R09: 0000000000000000 [ 513.965839][T11819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 513.965857][T11819] R13: 0000000000000000 R14: 00007f09fdfb6080 R15: 00007fff3638dc98 [ 513.965899][T11819] [ 515.889946][T11842] FAULT_INJECTION: forcing a failure. [ 515.889946][T11842] name failslab, interval 1, probability 0, space 0, times 0 [ 515.903185][T11842] CPU: 1 UID: 0 PID: 11842 Comm: syz.1.1361 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 515.903237][T11842] Tainted: [U]=USER [ 515.903248][T11842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 515.903267][T11842] Call Trace: [ 515.903277][T11842] [ 515.903289][T11842] dump_stack_lvl+0x16c/0x1f0 [ 515.903345][T11842] should_fail_ex+0x512/0x640 [ 515.903386][T11842] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 515.903419][T11842] should_failslab+0xc2/0x120 [ 515.903451][T11842] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 515.903479][T11842] ? d_instantiate+0x77/0x90 [ 515.903506][T11842] ? alloc_empty_file+0x55/0x1e0 [ 515.903542][T11842] alloc_empty_file+0x55/0x1e0 [ 515.903576][T11842] alloc_file_pseudo+0x13a/0x230 [ 515.903617][T11842] ? __pfx_alloc_file_pseudo+0x10/0x10 [ 515.903661][T11842] ioctx_alloc+0x5ab/0x2060 [ 515.903710][T11842] ? find_held_lock+0x2b/0x80 [ 515.903735][T11842] ? __pfx_ioctx_alloc+0x10/0x10 [ 515.903783][T11842] ? __might_fault+0x13b/0x190 [ 515.903821][T11842] __x64_sys_io_setup+0xc9/0x210 [ 515.903860][T11842] do_syscall_64+0xcd/0x230 [ 515.903901][T11842] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 515.903926][T11842] RIP: 0033:0x7f09fdd8e969 [ 515.903946][T11842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 515.903972][T11842] RSP: 002b:00007f09fec92038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 515.903995][T11842] RAX: ffffffffffffffda RBX: 00007f09fdfb6080 RCX: 00007f09fdd8e969 [ 515.904011][T11842] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 000000000000ffff [ 515.904027][T11842] RBP: 00007f09fde10ab1 R08: 0000000000000000 R09: 0000000000000000 [ 515.904042][T11842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 515.904057][T11842] R13: 0000000000000000 R14: 00007f09fdfb6080 R15: 00007fff3638dc98 [ 515.904088][T11842] [ 516.315913][T11842] program syz.1.1361 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 517.229722][T11875] FAULT_INJECTION: forcing a failure. [ 517.229722][T11875] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 517.301495][ T5847] Bluetooth: hci3: unexpected event 0x3e length: 728 > 260 [ 517.301546][ T5847] Bluetooth: hci3: unexpected subevent 0x03 length: 727 > 9 [ 517.366382][T11875] CPU: 1 UID: 0 PID: 11875 Comm: syz.1.1368 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 517.366438][T11875] Tainted: [U]=USER [ 517.366450][T11875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 517.366470][T11875] Call Trace: [ 517.366481][T11875] [ 517.366495][T11875] dump_stack_lvl+0x16c/0x1f0 [ 517.366554][T11875] should_fail_ex+0x512/0x640 [ 517.366616][T11875] core_sys_select+0x921/0xbe0 [ 517.366685][T11875] ? __pfx_core_sys_select+0x10/0x10 [ 517.366778][T11875] ? set_user_sigmask+0x21b/0x2b0 [ 517.366813][T11875] ? __pfx_set_user_sigmask+0x10/0x10 [ 517.366843][T11875] ? find_held_lock+0x2b/0x80 [ 517.366886][T11875] do_pselect.constprop.0+0x19f/0x1e0 [ 517.366944][T11875] ? __pfx_do_pselect.constprop.0+0x10/0x10 [ 517.367009][T11875] ? __x64_sys_futex+0x1e0/0x4c0 [ 517.367054][T11875] __x64_sys_pselect6+0x182/0x240 [ 517.367087][T11875] ? __pfx___x64_sys_pselect6+0x10/0x10 [ 517.367117][T11875] ? rcu_is_watching+0x12/0xc0 [ 517.367162][T11875] do_syscall_64+0xcd/0x230 [ 517.367218][T11875] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 517.367252][T11875] RIP: 0033:0x7f09fdd8e969 [ 517.367279][T11875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 517.367327][T11875] RSP: 002b:00007f09fecb3038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 517.367360][T11875] RAX: ffffffffffffffda RBX: 00007f09fdfb5fa0 RCX: 00007f09fdd8e969 [ 517.367382][T11875] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000009 [ 517.367403][T11875] RBP: 00007f09fde10ab1 R08: 0000000000000000 R09: 0000000000000000 [ 517.367424][T11875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 517.367438][T11875] R13: 0000000000000000 R14: 00007f09fdfb5fa0 R15: 00007fff3638dc98 [ 517.367469][T11875] [ 518.129658][T11868] Process accounting resumed [ 518.416987][T11888] hub 8-0:1.0: USB hub found [ 518.437270][T11888] hub 8-0:1.0: 1 port detected [ 521.351079][T11922] Process accounting resumed [ 521.881645][T11939] hub 8-0:1.0: USB hub found [ 521.894910][T11939] hub 8-0:1.0: 1 port detected [ 521.923792][T11944] netlink: 'syz.0.1387': attribute type 1 has an invalid length. [ 521.932096][T11944] netlink: 33 bytes leftover after parsing attributes in process `syz.0.1387'. [ 522.170470][T11934] FAULT_INJECTION: forcing a failure. [ 522.170470][T11934] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 522.211358][T11934] CPU: 0 UID: 0 PID: 11934 Comm: syz.3.1383 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 522.211413][T11934] Tainted: [U]=USER [ 522.211425][T11934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 522.211445][T11934] Call Trace: [ 522.211456][T11934] [ 522.211468][T11934] dump_stack_lvl+0x16c/0x1f0 [ 522.211526][T11934] should_fail_ex+0x512/0x640 [ 522.211584][T11934] core_sys_select+0x921/0xbe0 [ 522.211647][T11934] ? __pfx_core_sys_select+0x10/0x10 [ 522.211746][T11934] ? set_user_sigmask+0x21b/0x2b0 [ 522.211782][T11934] ? __pfx_set_user_sigmask+0x10/0x10 [ 522.211815][T11934] ? find_held_lock+0x2b/0x80 [ 522.211857][T11934] do_pselect.constprop.0+0x19f/0x1e0 [ 522.211944][T11934] ? __pfx_do_pselect.constprop.0+0x10/0x10 [ 522.212008][T11934] ? __x64_sys_futex+0x1e0/0x4c0 [ 522.212051][T11934] __x64_sys_pselect6+0x182/0x240 [ 522.212086][T11934] ? __pfx___x64_sys_pselect6+0x10/0x10 [ 522.212116][T11934] ? rcu_is_watching+0x12/0xc0 [ 522.212164][T11934] do_syscall_64+0xcd/0x230 [ 522.212221][T11934] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 522.212255][T11934] RIP: 0033:0x7ff93d58e969 [ 522.212281][T11934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 522.212313][T11934] RSP: 002b:00007ff93e4b1038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 522.212344][T11934] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa0 RCX: 00007ff93d58e969 [ 522.212365][T11934] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000009 [ 522.212386][T11934] RBP: 00007ff93d610ab1 R08: 0000000000000000 R09: 0000000000000000 [ 522.212406][T11934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 522.212427][T11934] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78 [ 522.212472][T11934] [ 522.853635][T11962] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1391'. [ 523.755015][T11982] HSR: entered promiscuous mode [ 524.240309][T11970] i2c i2c-0: DVB: adapter 0 frontend 0 frequency 0 out of range (51000000..2150000000) [ 524.300573][T11997] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1401'. [ 524.714596][T11987] FAULT_INJECTION: forcing a failure. [ 524.714596][T11987] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 524.741516][T11987] CPU: 1 UID: 0 PID: 11987 Comm: syz.2.1398 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 524.741572][T11987] Tainted: [U]=USER [ 524.741584][T11987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 524.741604][T11987] Call Trace: [ 524.741616][T11987] [ 524.741629][T11987] dump_stack_lvl+0x16c/0x1f0 [ 524.741687][T11987] should_fail_ex+0x512/0x640 [ 524.741746][T11987] core_sys_select+0x921/0xbe0 [ 524.741811][T11987] ? __pfx_core_sys_select+0x10/0x10 [ 524.741909][T11987] ? set_user_sigmask+0x21b/0x2b0 [ 524.741954][T11987] ? __pfx_set_user_sigmask+0x10/0x10 [ 524.741988][T11987] ? find_held_lock+0x2b/0x80 [ 524.742032][T11987] do_pselect.constprop.0+0x19f/0x1e0 [ 524.742103][T11987] ? __pfx_do_pselect.constprop.0+0x10/0x10 [ 524.742168][T11987] ? __x64_sys_futex+0x1e0/0x4c0 [ 524.742213][T11987] __x64_sys_pselect6+0x182/0x240 [ 524.742248][T11987] ? __pfx___x64_sys_pselect6+0x10/0x10 [ 524.742278][T11987] ? rcu_is_watching+0x12/0xc0 [ 524.742324][T11987] do_syscall_64+0xcd/0x230 [ 524.742379][T11987] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 524.742414][T11987] RIP: 0033:0x7fc829f8e969 [ 524.742442][T11987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 524.742476][T11987] RSP: 002b:00007fc82add4038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 524.742508][T11987] RAX: ffffffffffffffda RBX: 00007fc82a1b5fa0 RCX: 00007fc829f8e969 [ 524.742530][T11987] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000009 [ 524.742550][T11987] RBP: 00007fc82a010ab1 R08: 0000000000000000 R09: 0000000000000000 [ 524.742569][T11987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 524.742587][T11987] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28 [ 524.742629][T11987] [ 525.979133][T12026] FAULT_INJECTION: forcing a failure. [ 525.979133][T12026] name failslab, interval 1, probability 0, space 0, times 0 [ 526.054478][T12026] CPU: 1 UID: 0 PID: 12026 Comm: syz.1.1411 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 526.054532][T12026] Tainted: [U]=USER [ 526.054543][T12026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 526.054561][T12026] Call Trace: [ 526.054572][T12026] [ 526.054585][T12026] dump_stack_lvl+0x16c/0x1f0 [ 526.054642][T12026] should_fail_ex+0x512/0x640 [ 526.054692][T12026] ? kmem_cache_alloc_noprof+0x5a/0x3b0 [ 526.054736][T12026] should_failslab+0xc2/0x120 [ 526.054778][T12026] kmem_cache_alloc_noprof+0x6d/0x3b0 [ 526.054814][T12026] ? trace_cap_capable+0x18d/0x200 [ 526.054847][T12026] ? create_new_namespaces+0x30/0xad0 [ 526.054891][T12026] create_new_namespaces+0x30/0xad0 [ 526.054938][T12026] ? bpf_lsm_capable+0x9/0x10 [ 526.054979][T12026] ? security_capable+0x7e/0x260 [ 526.055021][T12026] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 526.055064][T12026] ksys_unshare+0x45b/0xa40 [ 526.055109][T12026] ? __pfx_ksys_unshare+0x10/0x10 [ 526.055152][T12026] ? xfd_validate_state+0x5d/0x180 [ 526.055187][T12026] ? rcu_is_watching+0x12/0xc0 [ 526.055228][T12026] __x64_sys_unshare+0x31/0x40 [ 526.055273][T12026] do_syscall_64+0xcd/0x230 [ 526.055326][T12026] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 526.055361][T12026] RIP: 0033:0x7f09fdd8e969 [ 526.055387][T12026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 526.055420][T12026] RSP: 002b:00007f09fecb3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 526.055452][T12026] RAX: ffffffffffffffda RBX: 00007f09fdfb5fa0 RCX: 00007f09fdd8e969 [ 526.055474][T12026] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400 [ 526.055495][T12026] RBP: 00007f09fde10ab1 R08: 0000000000000000 R09: 0000000000000000 [ 526.055516][T12026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 526.055536][T12026] R13: 0000000000000000 R14: 00007f09fdfb5fa0 R15: 00007fff3638dc98 [ 526.055580][T12026] [ 529.292013][T12084] FAULT_INJECTION: forcing a failure. [ 529.292013][T12084] name failslab, interval 1, probability 0, space 0, times 0 [ 529.325429][T12084] CPU: 0 UID: 0 PID: 12084 Comm: syz.2.1423 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 529.325483][T12084] Tainted: [U]=USER [ 529.325494][T12084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 529.325512][T12084] Call Trace: [ 529.325522][T12084] [ 529.325535][T12084] dump_stack_lvl+0x16c/0x1f0 [ 529.325602][T12084] should_fail_ex+0x512/0x640 [ 529.325652][T12084] ? __kmalloc_noprof+0xbf/0x510 [ 529.325694][T12084] ? fib_default_rule_add+0x4f/0x420 [ 529.325736][T12084] should_failslab+0xc2/0x120 [ 529.325779][T12084] __kmalloc_noprof+0xd2/0x510 [ 529.325828][T12084] fib_default_rule_add+0x4f/0x420 [ 529.325873][T12084] fib4_rules_init+0x52/0x1c0 [ 529.325905][T12084] fib_net_init+0x1dc/0x3f0 [ 529.325945][T12084] ? __pfx___register_sysctl_table+0x10/0x10 [ 529.325987][T12084] ? __pfx_fib_net_init+0x10/0x10 [ 529.326028][T12084] ? lockdep_init_map_type+0x5c/0x280 [ 529.326075][T12084] ? do_init_timer+0xc9/0x110 [ 529.326112][T12084] ? devinet_init_net+0x5c2/0x910 [ 529.326162][T12084] ? __pfx_fib_net_init+0x10/0x10 [ 529.326201][T12084] ops_init+0x1e2/0x5f0 [ 529.326249][T12084] setup_net+0x21e/0x850 [ 529.326297][T12084] ? __pfx_setup_net+0x10/0x10 [ 529.326337][T12084] ? lockdep_init_map_type+0x5c/0x280 [ 529.326383][T12084] ? __pfx_down_read_killable+0x10/0x10 [ 529.326422][T12084] ? debug_mutex_init+0x37/0x70 [ 529.326459][T12084] copy_net_ns+0x2a6/0x5f0 [ 529.326513][T12084] create_new_namespaces+0x3ea/0xad0 [ 529.326561][T12084] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 529.326612][T12084] ksys_unshare+0x45b/0xa40 [ 529.326661][T12084] ? __pfx_ksys_unshare+0x10/0x10 [ 529.326703][T12084] ? xfd_validate_state+0x5d/0x180 [ 529.326738][T12084] ? rcu_is_watching+0x12/0xc0 [ 529.326779][T12084] __x64_sys_unshare+0x31/0x40 [ 529.326825][T12084] do_syscall_64+0xcd/0x230 [ 529.326880][T12084] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 529.326913][T12084] RIP: 0033:0x7fc829f8e969 [ 529.326940][T12084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 529.326973][T12084] RSP: 002b:00007fc82adb3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 529.327005][T12084] RAX: ffffffffffffffda RBX: 00007fc82a1b6080 RCX: 00007fc829f8e969 [ 529.327027][T12084] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 529.327048][T12084] RBP: 00007fc82a010ab1 R08: 0000000000000000 R09: 0000000000000000 [ 529.327068][T12084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 529.327089][T12084] R13: 0000000000000000 R14: 00007fc82a1b6080 R15: 00007fffc4ec8a28 [ 529.327133][T12084] [ 530.017031][T12091] hub 8-0:1.0: USB hub found [ 530.023105][T12091] hub 8-0:1.0: 1 port detected [ 532.429466][T12130] FAULT_INJECTION: forcing a failure. [ 532.429466][T12130] name failslab, interval 1, probability 0, space 0, times 0 [ 532.455950][ T5847] Bluetooth: hci2: unexpected event 0x3e length: 728 > 260 [ 532.455999][ T5847] Bluetooth: hci2: unexpected subevent 0x03 length: 727 > 9 [ 532.474709][T12130] CPU: 0 UID: 0 PID: 12130 Comm: syz.2.1435 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 532.474765][T12130] Tainted: [U]=USER [ 532.474777][T12130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 532.474796][T12130] Call Trace: [ 532.474806][T12130] [ 532.474820][T12130] dump_stack_lvl+0x16c/0x1f0 [ 532.474876][T12130] should_fail_ex+0x512/0x640 [ 532.474925][T12130] ? kmem_cache_alloc_node_noprof+0x5e/0x3b0 [ 532.474969][T12130] should_failslab+0xc2/0x120 [ 532.475010][T12130] kmem_cache_alloc_node_noprof+0x71/0x3b0 [ 532.475051][T12130] ? __alloc_skb+0x2b2/0x380 [ 532.475099][T12130] __alloc_skb+0x2b2/0x380 [ 532.475138][T12130] ? __pfx___alloc_skb+0x10/0x10 [ 532.475184][T12130] ? __pfx___register_sysctl_table+0x10/0x10 [ 532.475224][T12130] ? is_module_address+0x69/0xf0 [ 532.475277][T12130] inet_netconf_notify_devconf+0x8b/0x1f0 [ 532.475321][T12130] __devinet_sysctl_register+0x227/0x360 [ 532.475364][T12130] ? __pfx___devinet_sysctl_register+0x10/0x10 [ 532.475402][T12130] ? trace_kmalloc+0x2b/0xd0 [ 532.475449][T12130] ? devinet_init_net+0xeb/0x910 [ 532.475491][T12130] ? __asan_memcpy+0x3c/0x60 [ 532.475521][T12130] devinet_init_net+0x347/0x910 [ 532.475561][T12130] ? __pfx_devinet_init_net+0x10/0x10 [ 532.475600][T12130] ops_init+0x1e2/0x5f0 [ 532.475640][T12130] setup_net+0x21e/0x850 [ 532.475680][T12130] ? __pfx_setup_net+0x10/0x10 [ 532.475714][T12130] ? lockdep_init_map_type+0x5c/0x280 [ 532.475752][T12130] ? __pfx_down_read_killable+0x10/0x10 [ 532.475784][T12130] ? debug_mutex_init+0x37/0x70 [ 532.475814][T12130] copy_net_ns+0x2a6/0x5f0 [ 532.475857][T12130] create_new_namespaces+0x3ea/0xad0 [ 532.475896][T12130] unshare_nsproxy_namespaces+0xc0/0x1f0 [ 532.475931][T12130] ksys_unshare+0x45b/0xa40 [ 532.475970][T12130] ? __pfx_ksys_unshare+0x10/0x10 [ 532.476008][T12130] ? ksys_mmap_pgoff+0x85/0x5c0 [ 532.476060][T12130] __x64_sys_unshare+0x31/0x40 [ 532.476098][T12130] do_syscall_64+0xcd/0x230 [ 532.476142][T12130] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 532.476171][T12130] RIP: 0033:0x7fc829f8e969 [ 532.476195][T12130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 532.476224][T12130] RSP: 002b:00007fc82adb3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 532.476250][T12130] RAX: ffffffffffffffda RBX: 00007fc82a1b6080 RCX: 00007fc829f8e969 [ 532.476268][T12130] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 532.476284][T12130] RBP: 00007fc82a010ab1 R08: 0000000000000000 R09: 0000000000000000 [ 532.476300][T12130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 532.476317][T12130] R13: 0000000000000000 R14: 00007fc82a1b6080 R15: 00007fffc4ec8a28 [ 532.476352][T12130] [ 533.287149][T12121] Process accounting resumed [ 533.474126][T12138] hub 8-0:1.0: USB hub found [ 533.482473][T12138] hub 8-0:1.0: 1 port detected [ 535.916507][ T5847] Bluetooth: hci1: unexpected event 0x3e length: 728 > 260 [ 535.916553][ T5847] Bluetooth: hci1: unexpected subevent 0x03 length: 727 > 9 [ 536.257199][T12164] Process accounting resumed [ 537.425421][T12193] openvswitch: HSR: Dropping previously announced user features [ 537.617028][T12195] can: request_module (can-proto-0) failed. [ 538.432844][T12219] FAULT_INJECTION: forcing a failure. [ 538.432844][T12219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 538.464458][T12219] CPU: 1 UID: 0 PID: 12219 Comm: syz.3.1458 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full) [ 538.464510][T12219] Tainted: [U]=USER [ 538.464521][T12219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 538.464539][T12219] Call Trace: [ 538.464549][T12219] [ 538.464561][T12219] dump_stack_lvl+0x16c/0x1f0 [ 538.464630][T12219] should_fail_ex+0x512/0x640 [ 538.464737][T12219] _copy_from_user+0x2e/0xd0 [ 538.464769][T12219] io_uring_setup+0xb4/0x1ff0 [ 538.464819][T12219] ? __pfx_io_uring_setup+0x10/0x10 [ 538.464861][T12219] ? do_futex+0x122/0x350 [ 538.464897][T12219] ? __pfx_do_futex+0x10/0x10 [ 538.464929][T12219] ? find_held_lock+0x2b/0x80 [ 538.464962][T12219] ? rcu_read_unlock+0x17/0x60 [ 538.465025][T12219] ? rcu_is_watching+0x12/0xc0 [ 538.465063][T12219] __x64_sys_io_uring_setup+0xc2/0x170 [ 538.465109][T12219] do_syscall_64+0xcd/0x230 [ 538.465160][T12219] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 538.465191][T12219] RIP: 0033:0x7ff93d58e969 [ 538.465217][T12219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 538.465249][T12219] RSP: 002b:00007ff93e490038 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 538.465279][T12219] RAX: ffffffffffffffda RBX: 00007ff93d7b6080 RCX: 00007ff93d58e969 [ 538.465300][T12219] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000048 [ 538.465317][T12219] RBP: 00007ff93d610ab1 R08: 0000000000000000 R09: 0000000000000000 [ 538.465336][T12219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 538.465353][T12219] R13: 0000000000000000 R14: 00007ff93d7b6080 R15: 00007ffcf09a3d78 [ 538.465393][T12219] [ 538.662781][T12225] bridge0: port 5(veth0_to_bridge) entered blocking state [ 538.670519][T12225] bridge0: port 5(veth0_to_bridge) entered disabled state [ 538.677968][T12225] veth0_to_bridge: entered allmulticast mode [ 538.700636][T12225] veth0_to_bridge: entered promiscuous mode [ 538.710609][T12225] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 538.744921][T12225] bridge0: port 5(veth0_to_bridge) entered blocking state [ 538.752292][T12225] bridge0: port 5(veth0_to_bridge) entered forwarding state [ 543.476523][T12304] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 543.483201][T12301] syz.1.1481 (12301) used greatest stack depth: 19912 bytes left [ 543.505313][T12304] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 543.542906][T12304] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 543.557714][T12304] Bluetooth: hci3: Opcode 0x0406 failed: -4 [ 543.581937][T12304] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 545.078741][ T5847] Bluetooth: hci0: command 0x0406 tx timeout [ 545.553810][ T5847] Bluetooth: hci3: command 0x0406 tx timeout [ 545.560297][ T5847] Bluetooth: hci1: command 0x0406 tx timeout [ 545.624645][T12345] Bluetooth: hci2: command 0x0406 tx timeout [ 547.834432][T12345] Bluetooth: hci3: command 0x0406 tx timeout [ 556.764354][ C0] sched: DL replenish lagged too much [ 576.366394][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 576.620929][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 587.542799][T12228] Process accounting paused [ 604.047936][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 604.064250][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 604.080510][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 604.096546][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 604.112616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 604.128559][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 604.144711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 604.161417][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 604.177411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 604.193450][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 609.056812][ C1] net_ratelimit: 1180 callbacks suppressed [ 609.056842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 609.079046][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 609.095194][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 609.111374][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 609.128199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 609.144548][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 609.167366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 609.185105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 609.201670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 609.218575][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 614.067489][ C1] net_ratelimit: 1208 callbacks suppressed [ 614.067517][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 614.089481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 614.105768][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 614.122638][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 614.139647][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 614.156191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 614.172393][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 614.188670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 614.205433][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 614.221402][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 619.075834][ C1] net_ratelimit: 1181 callbacks suppressed [ 619.075863][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 619.097920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 619.114664][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 619.130760][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 619.147495][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 619.163756][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 619.179807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 619.195981][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 619.212609][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 619.229253][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 624.087980][ C1] net_ratelimit: 1215 callbacks suppressed [ 624.088009][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 624.109988][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 624.126530][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 624.142812][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 624.158986][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 624.176467][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 624.192835][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 624.209227][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 624.225935][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 624.242041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 629.094882][ C1] net_ratelimit: 1143 callbacks suppressed [ 629.094919][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 629.117185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 629.134065][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 629.151175][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 629.167588][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 629.185534][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 629.202081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 629.219525][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 629.235748][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 629.252204][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 634.105187][ C1] net_ratelimit: 2431 callbacks suppressed [ 634.105215][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 634.124001][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 634.140639][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 634.153738][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 634.166683][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 634.182573][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 634.195528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 634.208469][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 634.224413][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 634.237506][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 636.186417][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 636.215465][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 639.115145][ C1] net_ratelimit: 2610 callbacks suppressed [ 639.115174][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 639.137714][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.150754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.163740][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 639.179699][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.192712][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.205781][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 639.221824][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.234967][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 639.248112][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 644.125029][ C1] net_ratelimit: 2568 callbacks suppressed [ 644.125057][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.144109][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.157204][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 644.172931][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.185813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.199320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 644.214881][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.227826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 644.240734][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 644.256391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.135242][ C1] net_ratelimit: 2537 callbacks suppressed [ 649.135272][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.154256][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.167252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 649.182925][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.195902][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.209054][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 649.224911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.237847][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 649.250891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 649.266499][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 654.146906][ C1] net_ratelimit: 2684 callbacks suppressed [ 654.146933][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 654.165827][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 654.178782][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 654.194570][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 654.207471][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 654.220605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 654.236617][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 654.249657][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 654.262565][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 654.278132][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 659.155341][ C1] net_ratelimit: 2844 callbacks suppressed [ 659.155371][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.175104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 659.188049][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 659.201017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 659.215944][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.229973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 659.243023][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 659.256024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 659.270849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 659.294565][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 664.166765][ C1] net_ratelimit: 3066 callbacks suppressed [ 664.166794][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.186385][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 664.199275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 664.212272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 664.227269][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.241317][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 664.254385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 664.267458][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 664.282215][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 664.295991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 669.174385][ C1] net_ratelimit: 3301 callbacks suppressed [ 669.174414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 669.195288][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 669.209423][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 669.222387][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 669.235347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 669.250327][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 669.264355][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 669.277056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 669.290221][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 669.305365][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 674.184895][ C1] net_ratelimit: 2903 callbacks suppressed [ 674.184923][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 674.204788][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 674.217733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 674.230805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 674.246387][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 674.260312][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 674.273325][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 674.286337][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 674.301296][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 674.315273][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 679.195545][ C1] net_ratelimit: 2938 callbacks suppressed [ 679.195574][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 679.215230][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 679.228165][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 679.241196][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 679.256097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 679.269933][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 679.282914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 679.295842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 679.310559][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 679.324361][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 684.205771][ C1] net_ratelimit: 2863 callbacks suppressed [ 684.205802][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 684.224588][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 684.237587][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 684.256407][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 684.270405][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 684.284246][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 684.297472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 684.312543][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 684.326355][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 684.339405][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 689.215185][ C1] net_ratelimit: 2760 callbacks suppressed [ 689.215213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 689.237547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 689.251716][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 689.264813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 689.278008][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 689.293176][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 689.307144][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 689.320840][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 689.334031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 689.349416][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 694.224612][ C1] net_ratelimit: 2847 callbacks suppressed [ 694.224643][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 694.244593][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 694.258043][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 694.271600][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 694.288578][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 694.305048][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 694.318174][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 694.331424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 694.346846][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 694.361293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 698.573117][ T1300] ieee802154 phy0 wpan0: encryption failed: -22 [ 699.234596][ C1] net_ratelimit: 2850 callbacks suppressed [ 699.234622][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 699.254660][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 699.268015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 699.281091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 699.296214][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 699.310423][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 699.323618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 699.337055][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 699.352277][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 699.367352][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 704.245010][ C1] net_ratelimit: 2884 callbacks suppressed [ 704.245037][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 704.263899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 704.279110][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 704.293029][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 704.306058][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 704.319081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 704.334179][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 704.348149][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 704.361185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 704.374185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 704.655526][ T1300] ieee802154 phy1 wpan1: encryption failed: -22 [ 709.254343][ C1] net_ratelimit: 2876 callbacks suppressed [ 709.254373][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 709.274167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 709.287332][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 709.300430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 709.316793][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 709.331300][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 709.344452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 709.357918][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 709.373081][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 709.387058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 714.264553][ C1] net_ratelimit: 2931 callbacks suppressed [ 714.264581][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 714.283452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 714.296447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 714.311641][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 714.325807][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 714.338845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 714.352216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 714.367489][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 714.381419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 714.394649][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 717.804277][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 717.811316][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P12215/1:b..l [ 717.819893][ C0] rcu: (detected by 0, t=10503 jiffies, g=64853, q=1637 ncpus=2) [ 717.827771][ C0] task:syz.3.1458 state:R running task stack:23608 pid:12215 tgid:12215 ppid:5837 task_flags:0x40064c flags:0x00404002 [ 717.842787][ C0] Call Trace: [ 717.846134][ C0] [ 717.849119][ C0] __schedule+0x116f/0x5de0 [ 717.853820][ C0] ? lock_acquire+0x179/0x350 [ 717.858581][ C0] ? __pfx___schedule+0x10/0x10 [ 717.863531][ C0] preempt_schedule_irq+0x51/0x90 [ 717.868679][ C0] irqentry_exit+0x36/0x90 [ 717.873251][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 717.879295][ C0] RIP: 0010:lock_release+0x183/0x2f0 [ 717.884660][ C0] Code: 0f c1 05 28 23 0c 12 83 f8 01 0f 85 1d 01 00 00 9c 58 f6 c4 02 0f 85 08 01 00 00 41 f7 c5 00 02 00 00 74 01 fb 48 8b 44 24 10 <65> 48 2b 05 7d e5 0b 12 0f 85 58 01 00 00 48 83 c4 18 5b 41 5c 41 [ 717.904338][ C0] RSP: 0018:ffffc9000b47ef88 EFLAGS: 00000206 [ 717.910647][ C0] RAX: 29bed4a2d642fd00 RBX: ffffffff8e3bfa80 RCX: ffffc9000b47ef94 [ 717.918702][ C0] RDX: 0000000000000000 RSI: ffffffff8dbb8f28 RDI: ffffffff8bf48da0 [ 717.926997][ C0] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000 [ 717.935151][ C0] R10: 0000000000000000 R11: 000000000000fc71 R12: ffffffff81699d54 [ 717.943357][ C0] R13: 0000000000000206 R14: ffff88802735da00 R15: 0000000000000001 [ 717.951388][ C0] ? unwind_next_frame+0x3f4/0x20a0 [ 717.956681][ C0] unwind_next_frame+0x3f9/0x20a0 [ 717.961801][ C0] ? shmem_undo_range+0x58f/0x1150 [ 717.966989][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10 [ 717.973206][ C0] arch_stack_walk+0x94/0x100 [ 717.977961][ C0] ? shmem_evict_inode+0x3a1/0xbe0 [ 717.983144][ C0] stack_trace_save+0x8e/0xc0 [ 717.987888][ C0] ? __pfx_stack_trace_save+0x10/0x10 [ 717.993421][ C0] ? __lock_acquire+0x5ca/0x1ba0 [ 717.998441][ C0] save_stack+0x160/0x1f0 [ 718.003268][ C0] ? __pfx_save_stack+0x10/0x10 [ 718.008181][ C0] ? free_unref_folios+0x999/0x1630 [ 718.013437][ C0] ? folios_put_refs+0x56f/0x740 [ 718.018451][ C0] ? shmem_undo_range+0x58f/0x1150 [ 718.023648][ C0] ? page_ext_put+0x3e/0xd0 [ 718.028229][ C0] __reset_page_owner+0x84/0x1a0 [ 718.033241][ C0] free_unref_folios+0x999/0x1630 [ 718.038331][ C0] ? rcu_is_watching+0x12/0xc0 [ 718.043149][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 718.049031][ C0] folios_put_refs+0x56f/0x740 [ 718.053965][ C0] ? __pfx_folios_put_refs+0x10/0x10 [ 718.059330][ C0] ? folio_batch_remove_exceptionals+0x115/0x1a0 [ 718.065745][ C0] shmem_undo_range+0x58f/0x1150 [ 718.070762][ C0] ? __pfx_shmem_undo_range+0x10/0x10 [ 718.076241][ C0] ? find_held_lock+0x2b/0x80 [ 718.080980][ C0] ? is_bpf_text_address+0x8a/0x1a0 [ 718.086332][ C0] ? bpf_ksym_find+0x124/0x1c0 [ 718.091217][ C0] ? stack_trace_save+0x8e/0xc0 [ 718.096135][ C0] shmem_evict_inode+0x3a1/0xbe0 [ 718.101146][ C0] ? __pfx_shmem_evict_inode+0x10/0x10 [ 718.106945][ C0] ? __pfx_inode_wait_for_writeback+0x10/0x10 [ 718.113084][ C0] ? find_held_lock+0x2b/0x80 [ 718.117826][ C0] ? evict+0x3a2/0x920 [ 718.121981][ C0] ? __pfx_shmem_evict_inode+0x10/0x10 [ 718.127524][ C0] evict+0x3e3/0x920 [ 718.131486][ C0] ? __pfx_evict+0x10/0x10 [ 718.135973][ C0] ? iput+0x519/0x880 [ 718.140021][ C0] iput+0x521/0x880 [ 718.143886][ C0] ? __pfx_generic_delete_inode+0x10/0x10 [ 718.149700][ C0] dentry_unlink_inode+0x29c/0x480 [ 718.154881][ C0] __dentry_kill+0x1d0/0x600 [ 718.159629][ C0] dput.part.0+0x4b1/0x9b0 [ 718.164210][ C0] dput+0x1f/0x30 [ 718.167898][ C0] __fput+0x51c/0xb70 [ 718.171970][ C0] task_work_run+0x150/0x240 [ 718.176632][ C0] ? __pfx_task_work_run+0x10/0x10 [ 718.181821][ C0] ? do_raw_spin_unlock+0x172/0x230 [ 718.187109][ C0] do_exit+0xafb/0x2c30 [ 718.191347][ C0] ? proc_coredump_connector+0x2d1/0x4f0 [ 718.197059][ C0] ? __pfx_do_exit+0x10/0x10 [ 718.201732][ C0] do_group_exit+0xd3/0x2a0 [ 718.206321][ C0] get_signal+0x2673/0x26d0 [ 718.210924][ C0] ? force_sig_fault+0xc4/0x100 [ 718.215894][ C0] ? __pfx_get_signal+0x10/0x10 [ 718.220923][ C0] arch_do_signal_or_restart+0x8f/0x7a0 [ 718.226554][ C0] ? trace_irq_disable.constprop.0+0xd4/0x120 [ 718.232722][ C0] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 718.239163][ C0] irqentry_exit_to_user_mode+0x13f/0x280 [ 718.244974][ C0] asm_exc_page_fault+0x26/0x30 [ 718.249882][ C0] RIP: 0033:0x20fff [ 718.253757][ C0] RSP: 002b:0000000000000010 EFLAGS: 00010286 [ 718.259884][ C0] RAX: 0000000000000000 RBX: 00007ff93d7bbea0 RCX: 00007ff93d58e969 [ 718.267914][ C0] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000005 [ 718.276379][ C0] RBP: 00007ff93d610ab1 R08: 0000000000000008 R09: 0000000000000000 [ 718.284410][ C0] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000000 [ 718.292524][ C0] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78 [ 718.300575][ C0] [ 718.493315][ T31] INFO: task kworker/u8:2:36 blocked for more than 146 seconds. [ 718.526504][ T31] Tainted: G U 6.15.0-syzkaller #0 [ 718.533693][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 719.274755][ C1] net_ratelimit: 2918 callbacks suppressed [ 719.274782][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.293630][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.306626][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 719.321519][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 719.335466][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.348532][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.361720][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 719.376894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 719.391239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 719.404210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 724.287202][ C1] net_ratelimit: 2949 callbacks suppressed [ 724.287232][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.306966][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 724.319970][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 724.332931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 724.348245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.362340][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 724.375407][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 724.388379][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0) [ 724.403653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 724.417505][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)