last executing test programs:
2m35.313528306s ago: executing program 3 (id=1463):
mmap$auto(0x0, 0x400005, 0xfffffffffffffffe, 0x9b72, 0x2, 0x7fffffffffffffff)
r0 = io_uring_setup$auto(0x6, 0x0)
mmap$auto(0x0, 0x9, 0xffb, 0x8000000008011, r0, 0x0)
socketpair$auto(0x1e, 0x5, 0x8000000000000000, 0x0)
mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000)
io_uring_setup$auto(0x1, 0x0)
close_range$auto(0x0, 0xfffffffffffff000, 0x2)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
fcntl$auto(0x8000000000000001, 0x7, 0x0)
fcntl$auto(r1, 0x7, 0x4)
2m34.835501398s ago: executing program 2 (id=1465):
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$auto_tipcv2(&(0x7f0000000140), 0xffffffffffffffff)
sendmsg$auto_TIPC_NL_MEDIA_GET(r0, &(0x7f0000001c00)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)={0x18, r1, 0x1, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x4}]}, 0x18}}, 0x2000c880)
2m34.68516461s ago: executing program 3 (id=1467):
ioctl$auto(0xffffffffffffffff, 0xc0045401, 0xffffffffffffffff)
2m34.646352016s ago: executing program 2 (id=1468):
r0 = pidfd_open$auto(0xffffffffffffffff, 0x5)
mmap$auto(0x0, 0xffffffffffffffff, 0xdf, 0x9b72, r0, 0x7)
mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0)
openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0)
mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000)
write$auto(0x3, 0x0, 0x7fffffff)
write$auto(0x1, 0x0, 0x80000000)
preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xfffffffd}, 0x6, 0x8, 0x5)
openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/controlC1\x00', 0x60800, 0x0)
newfstatat$auto(0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x5, 0x6, 0xa9, 0x4, 0x0, 0xee01, 0x0, 0x2000000006, 0x1fffffffffffff, 0x0, 0x3, 0x8, 0x5, 0xcc, 0x4, 0x1, 0x53}, 0x1)
ppoll$auto(&(0x7f0000000140)={0xffffffffffffffff, 0x3ff, 0x4}, 0x7f, 0x0, 0x0, 0x8)
openat$auto_nsim_dev_max_vfs_fops_dev(0xffffffffffffff9c, &(0x7f00000089c0)='/sys/kernel/debug/netdevsim/netdevsim1/max_vfs\x00', 0x101000, 0x0)
socket(0x3, 0x80000, 0x6)
prctl$auto(0x21, 0x0, 0x1, 0x0, 0x0)
openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0)
prctl$auto(0x3e, 0x2, 0x0, 0xfffffffffffffffe, 0x8)
socketpair$auto(0x1, 0x2164, 0x8000000000000000, 0x0)
mmap$auto(0x3, 0x3ff, 0xb3, 0x9b72, 0xffffffffffffffff, 0x27ffd)
write$auto(0x3, 0x0, 0x7fffffff)
lseek$auto(0x3, 0x0, 0x1)
munmap$auto(0x8000, 0xffffffff)
openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2a801, 0x0)
socket(0x2, 0x1, 0x0)
2m34.165228197s ago: executing program 3 (id=1471):
socket(0x10, 0x2, 0x0) (async)
open(&(0x7f0000000040)='./file0/file0\x00', 0x1470c1, 0x84) (async)
socket$nl_generic(0x10, 0x3, 0x10) (async)
socket(0x11, 0x3, 0x9)
mmap$auto(0x0, 0x400008, 0xdf, 0x38, 0x6, 0x8000) (async)
r0 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32)
socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32)
openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptyq4\x00', 0xf62885fab3a7a66f, 0x0) (async, rerun: 32)
openat$auto_ima_measure_policy_ops_ima_fs(0xffffffffffffff9c, 0x0, 0x2dc08f24db173410, 0x0) (rerun: 32)
mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, r0, 0x8000)
fsopen$auto(0x0, 0x1) (async, rerun: 32)
adjtimex$auto(&(0x7f00000005c0)={0xf332b6b, 0x0, 0xcea4, 0xfffffffffffffffd, 0xb3, 0x1, 0x0, 0x0, 0x18db, 0x2, 0x2, {0x100000000, 0x10000}, 0x5, 0x6, 0xfffffffffffffffd, 0x1007bfe, 0x0, 0x91dc, 0x4, 0xdfffffffffff628c, 0xfffffffffffffffe, 0xdeae, 0x808}) (async, rerun: 32)
openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x2, 0x0) (async, rerun: 32)
openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mtdblock0\x00', 0x14f602, 0x0) (rerun: 32)
capget$auto(&(0x7f0000000000)={0x19980330}, 0x0) (async, rerun: 32)
sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) (async, rerun: 32)
mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x8000) (async, rerun: 64)
close_range$auto(0x0, 0xfffffffffffff000, 0x4000000000002) (async, rerun: 64)
mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000)
openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop2\x00', 0x82, 0x0)
r1 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop6\x00', 0x18dd01, 0x0)
ioctl$auto_SG_GET_RESERVED_SIZE(r1, 0x4c0a, 0x0) (async, rerun: 32)
socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32)
syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000002500), 0xffffffffffffffff) (async)
r2 = socket$nl_generic(0x10, 0x3, 0x10) (async)
r3 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000040), 0xffffffffffffffff)
msgget$auto(0x0, 0x77d9) (async)
sendmsg$auto_OVS_DP_CMD_NEW(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000200)={0x2c, r3, 0x1, 0x2070bd26, 0x25dfdbf8, {}, [@OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x4}, @OVS_DP_ATTR_NAME={0x8, 0x1, 'HfR\x00'}, @OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x801}, 0x80) (async)
syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000080), 0xffffffffffffffff) (async, rerun: 32)
socket$nl_generic(0x10, 0x3, 0x10) (rerun: 32)
2m33.010692615s ago: executing program 3 (id=1474):
r0 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/cec18\x00', 0x900, 0x0)
r1 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snd/controlC1\x00', 0x802, 0x0)
ioctl$auto_SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000100)={{@inferred, 0x85, 0x20e, 0x9, "669cbbd9e9756f227dffa188e0f1a560e2a1facac1f00b2f4ab8633824f2d2252ca5f200"}, 0x0, @integer64=@value=[0x9, 0x4, 0xc2bf, 0x3, 0x100000002, 0x7, 0x4, 0x7, 0xcf6c, 0x7ff, 0xfffffffffffffff9, 0x8000000000000001, 0x0, 0x9, 0x86, 0x8, 0x8, 0x5, 0x7ffffffffffffffc, 0x58a2, 0x5, 0x8, 0x4, 0x1000ffffe, 0x800002, 0x7, 0xc01, 0x7fffffff, 0x5, 0xfd, 0x7fc5, 0x19, 0x4, 0xfffffffefffffffd, 0x10000000000007, 0x0, 0x1, 0x9, 0x6, 0x8000000000000000, 0xfff, 0x9, 0xa, 0x4, 0x8001, 0x3, 0x3, 0x3, 0x80000001, 0x81, 0x10002, 0x4, 0x5cd, 0x7, 0xfffffffffffffffd, 0x7fff, 0xd426, 0x9, 0x612, 0xffff, 0x8, 0x5, 0x6, 0x8000000000000001], "282f77b07e718ed4d99a34617774e3a82f982e0f05e516c299a28a585e87e0d908e2c8e50de5016f1de5d432da2cc20e951d8fcdc4f791a11996aad5af504c0d9927e62ef70b23a13735a4fe805c1ce1b6b1d83d21bb42794ec925b4547a3d52d4b5210392111e181719fef9d685b6534b171d76ad633f94a608b818600a6c85"})
mmap$auto(0x0, 0x20008, 0xe3, 0x100000eb1, r1, 0x8000)
mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8400)
openat$auto_tap_fops_tap(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0)
socket(0xa, 0x1, 0x100)
r2 = openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/lru_gen\x00', 0xc0000, 0x0)
pread64$auto(r2, 0x0, 0x7ff, 0x400)
socket(0x1a, 0x1, 0x0)
r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0)
prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0)
openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bus/usb/024/001\x00', 0x40001, 0x0)
select$auto(0xe, 0x0, 0x0, &(0x7f0000000040)={[0x1ff, 0x7, 0xd, 0x8fd6, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x62, 0x80000001, 0x5, 0x1, 0x9, 0x1, 0xfffffffffffffffe]}, 0x0)
write$auto(r3, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9)
select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1fc, 0x7, 0xd, 0x1, 0xc5e1, 0x3, 0x88, 0x3, 0x0, 0x62, 0x8, 0x10, 0x6d3e, 0xc, 0x2, 0x6]}, 0x0)
sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004810}, 0x8800)
mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000)
msync$auto(0x1ffff000, 0x1800000000000fe, 0x400000004)
openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sg0\x00', 0x82802, 0x0)
openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000600)='/dev/audio1\x00', 0x8000, 0x0)
close_range$auto(0x2, 0x8, 0x0)
socket(0x1e, 0x805, 0x0)
openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snd/controlC1\x00', 0x60840, 0x0)
ioctl$auto(0x3, 0x40045532, 0x38)
openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/pcmC1D0c\x00', 0x129600, 0x0)
close_range$auto(0x2, 0x8, 0x0)
ioctl$auto_CEC_ADAP_S_LOG_ADDRS(r0, 0xc05c6104, &(0x7f0000000100)={"fda25684", 0xffff, 0x6, 0x2, 0x9b4, 0x9, "0800aafc241cd010c7543bfbca2ce1", "0200", "00000600", "2ff43123", ["2a047aee570987488e564d62", "f8ffffffffffffff00000001", "00d800", "5fe10eedab2c4b353c392a92"]})
socket$nl_generic(0x10, 0x3, 0x10)
2m32.445650765s ago: executing program 2 (id=1478):
mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000)
syz_genetlink_get_family_id$auto_nl80211(0x0, 0xffffffffffffffff)
r0 = openat$auto_proc_oom_adj_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/oom_adj\x00', 0x48402, 0x0)
read$auto(r0, 0x0, 0x1f40)
r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0)
writev$auto(r1, &(0x7f0000000200)={0x0, 0x7}, 0x3)
madvise$auto(0xf400000000000000, 0xffffffffffff0005, 0x19)
2m31.902641803s ago: executing program 2 (id=1482):
mlockall$auto(0x3)
statmount$auto(0x0, &(0x7f0000000180)={0xa, 0x1, 0x44f, 0x7, 0x5, 0x1007181, 0x8a0d, 0x7, 0x7, 0x7ff, 0x89, 0x26, 0x4, 0x200000000001, 0x384, 0xfffffffffffffffa, 0x8, 0x0, 0x30, 0x0, 0x864, 0xe, 0x22000, 0x9, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x9, 0xd)
mmap$auto(0x0, 0x7, 0xfffffffffffffffe, 0x9b72, 0x2, 0x8000)
r0 = socket(0xa, 0x1, 0x84)
getsockopt$auto(r0, 0x84, 0x80, 0x0, &(0x7f00000000c0)=0x97)
r1 = openat$auto__ctl_fops_dm_ioctl(0xffffffffffffff9c, &(0x7f0000000180), 0x1541, 0x0)
ioctl$auto__ctl_fops_dm_ioctl(r1, 0xfffffff7effffd05, &(0x7f00000001c0))
2m31.169566398s ago: executing program 0 (id=1483):
openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0)
r0 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0)
prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0)
writev$auto(0xffffffffffffffff, 0x0, 0x8)
write$auto(r0, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9)
mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000)
madvise$auto(0x0, 0x2003f0, 0x15)
mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000)
r1 = openat$auto_urandom_fops_random(0xffffffffffffff9c, &(0x7f0000006700), 0x181c00, 0x0)
ioctl$auto_RNDADDTOENTCNT2(r1, 0x40045201, 0x0)
r2 = socket(0xa, 0x2, 0x3a)
setsockopt$auto(r2, 0x29, 0x3e, 0x0, 0x1ff)
finit_module$auto(0x3, 0xfffffffffffffffe, 0x2)
mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000)
prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7)
madvise$auto(0x0, 0xffffffffffff0005, 0x19)
madvise$auto(0x0, 0xffffffffffff0001, 0x15)
madvise$auto(0x0, 0xffffffffffff0005, 0x19)
setns$auto(0x0, 0xb)
cachestat$auto(0x1, 0xfffffffffffffffc, 0xfffffffffffffffe, 0x5)
r3 = socket(0x2b, 0x1, 0x0)
sendmmsg$auto(r3, &(0x7f0000000000)={{&(0x7f0000000040), 0x12, 0x0, 0x9, 0x0, 0x1f, 0xb}, 0x800009}, 0x5, 0x20000000)
syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000080), r3)
mmap$auto(0x0, 0x2a, 0xdf, 0x9b72, r3, 0xa)
getpid()
mmap$auto(0x0, 0xfff, 0xdf, 0x9b72, 0x400, 0x28000)
close_range$auto(0x2, 0x8, 0x0)
socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0)
fanotify_init$auto(0x65, 0x2)
pipe$auto(0x0)
2m30.807123994s ago: executing program 3 (id=1484):
mmap$auto(0x0, 0x400005, 0xfffffffffffffffe, 0x9b72, 0x2, 0x7fffffffffffffff)
io_uring_setup$auto(0x6, 0x0)
mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000)
io_uring_setup$auto(0x1, 0x0)
close_range$auto(0x0, 0xfffffffffffff000, 0x2)
socket$nl_generic(0x10, 0x3, 0x10)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
fcntl$auto(0x8000000000000001, 0x7, 0x0)
fcntl$auto(r0, 0x7, 0x4)
2m30.578659347s ago: executing program 1 (id=1486):
mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8400) (async)
openat$auto_tap_fops_tap(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0)
socket(0xa, 0x1, 0x100)
r0 = openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/lru_gen\x00', 0xc0000, 0x0)
pread64$auto(r0, 0x0, 0x7ff, 0x400) (async, rerun: 64)
r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) (async, rerun: 64)
prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) (async)
select$auto(0xe, 0x0, 0x0, &(0x7f0000000040)={[0x1ff, 0x7, 0xd, 0x8fd6, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x62, 0x80000001, 0x7, 0x1, 0x9, 0x1, 0xfffffffffffffffe]}, 0x0)
write$auto(r1, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9) (async)
openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/conf/ip6tnl0/bootp_relay\x00', 0x5014c0, 0x0)
select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x1, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x62, 0x8000001f, 0x7, 0x6d3e, 0xc, 0x2, 0x6]}, 0x0)
mmap$auto(0xc, 0x20009, 0x5, 0xeb1, 0x405, 0x8000) (async, rerun: 64)
sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004810}, 0x8800) (async, rerun: 64)
mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000) (async)
msync$auto(0x1ffff000, 0x1800000000000fe, 0x400000004) (async, rerun: 64)
openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sg0\x00', 0x82802, 0x0) (async, rerun: 64)
ioctl$auto(0x3, 0x2287, 0xffffffffffffffff) (async)
r2 = openat$auto_proc_mem_operations_base(0xffffffffffffff9c, &(0x7f0000001640)='/proc/self/mem\x00', 0x401, 0x0) (async, rerun: 32)
r3 = openat$auto_page_owner_stack_operations_page_owner(0xffffffffffffff9c, &(0x7f0000001540), 0x2, 0x0) (rerun: 32)
read$auto_page_owner_stack_operations_page_owner(r3, &(0x7f0000001580)=""/91, 0x5b) (async)
write$auto_proc_mem_operations_base(r2, &(0x7f0000001680)="a7", 0x80000) (async)
madvise$auto(0x0, 0x20200, 0x15) (async, rerun: 32)
prctl$auto(0x43, 0x17, 0x0, 0x0, 0x0) (async, rerun: 32)
prctl$auto(0x43, 0x0, 0x0, 0x0, 0x0) (async)
r4 = openat$auto_minstrel_ht_stat_csv_fops_rc80211_minstrel_ht_debugfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/ieee80211/phy3/netdev:wlan0/stations/08:02:11:00:00:01/rc_stats_csv\x00', 0x80, 0x0)
read$auto_minstrel_ht_stat_csv_fops_rc80211_minstrel_ht_debugfs(r4, 0x0, 0x0)
close_range$auto(0x2, 0x8, 0x0)
2m30.415937409s ago: executing program 3 (id=1487):
iopl$auto(0x2)
syz_genetlink_get_family_id$auto_tipcv2(0x0, 0xffffffffffffffff)
unshare$auto(0x40000080)
semctl$auto_SETALL(0x3ff, 0x1000, 0x11, 0x2)
r0 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0)
r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0)
write$auto(r1, &(0x7f0000000400)='/dev/audio1\x00', 0xa3d9)
set_mempolicy$auto(0x2, 0x0, 0x8)
mmap$auto(0x0, 0x40009, 0xa, 0x9b72, 0x2, 0x28000)
r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS1\x00', 0x20000, 0x0)
ioctl$auto_TCSBRKP2(r2, 0x5425, 0x0)
r3 = openat$auto_mtd_fops_mtdchar(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mtd0\x00', 0x28082, 0x0)
ioctl$auto(r3, 0xc0304d18, 0x8)
mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000)
close_range$auto(r0, 0x8, 0xfffffff8)
io_uring_setup$auto(0x9, 0x0)
socket(0x2, 0x5, 0x0)
close_range$auto(0x2, 0x8, 0x0)
socket(0x2, 0x1, 0x84)
mmap$auto(0x0, 0x4020009, 0xdb, 0xeb1, 0x401, 0x8000)
prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7)
seccomp$auto(0x2, 0x0, 0x0)
bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a)
r4 = openat$auto_userio_fops_userio(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0)
read$auto_userio_fops_userio(r4, 0x0, 0x0)
shutdown$auto(0x200000003, 0x2)
sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x1c03, 0x0, 0x9, 0x0, 0x0, 0x9}, 0x7}, 0x6, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
2m30.257401626s ago: executing program 1 (id=1488):
mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000)
pipe$auto(&(0x7f0000001480))
ioperm$auto(0x3, 0x5, 0x149)
r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual/net/bond0/bonding/primary_reselect\x00', 0x1e2142, 0x0)
sendfile$auto(r0, r0, 0x0, 0x7fff)
write$auto(0x3, 0x0, 0xffd8)
2m30.159126703s ago: executing program 2 (id=1489):
r0 = openat$auto_proc_pagemap_operations_internal(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/pagemap\x00', 0x0, 0x0)
prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0)
mmap$auto(0x7, 0xe97f, 0x7f, 0xeb1, r0, 0x8000)
r1 = socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0)
sendmmsg$auto(0x3, 0x0, 0x9a6, 0x7000000)
syz_genetlink_get_family_id$auto_batadv(0x0, 0xffffffffffffffff)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$auto_ovs_ct_limit(&(0x7f0000000840), r2)
mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000)
madvise$auto(0x0, 0xffffffffffff0005, 0x17)
setgroups$auto(0xe32, 0x0)
madvise$auto(0x0, 0x200007, 0x19)
ioctl$auto_SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x4c04, 0x0)
mmap$auto(0x0, 0x128009, 0xdf, 0x410, r1, 0x8000)
capget$auto(0x0, 0xfffffffffffffffe)
r3 = openat$auto_proc_pid_maps_operations_internal(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/smaps_rollup\x00', 0x40000, 0x0)
remap_file_pages$auto(0x6a2b, 0x1000, 0x0, 0x5, 0x66a)
madvise$auto(0x0, 0xffffffffffff0001, 0x15)
read$auto_proc_pid_maps_operations_internal(r3, &(0x7f00000010c0)=""/4082, 0xff2)
r4 = socket(0x2b, 0x2, 0x0)
bind$auto(r4, 0x0, 0x67)
mmap$auto(0x1, 0x5, 0xfffffffffffffe01, 0x8011, 0xffffffffffffffff, 0x8000)
mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000)
openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, 0x0, 0x2, 0x0)
socket(0x2, 0x1, 0xfffffff8)
r5 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/cec1\x00', 0x0, 0x0)
ioctl$auto_CEC_ADAP_S_LOG_ADDRS(r5, 0xc05c6104, &(0x7f0000000100)={"fda25684", 0xffff, 0x6, 0x2, 0x9b4, 0x9, "0800aafc241cd010c7543bfbca2ce1", "0200", "00000600", "2ff43123", ["2a047aee570987488e564d62", "f8ffffffffffffff00000001", "00d800", "5fe10eedab2c4b353c392a92"]})
openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000000)='/sys/devices/platform/dummy_hcd.7/usb8/bConfigurationValue\x00', 0x10b042, 0x0)
sendfile$auto(r5, r0, 0x0, 0x4)
2m30.112528273s ago: executing program 1 (id=1490):
r0 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, 0x0, 0x1c8342, 0x0)
ioctl$auto(r0, 0xc0045401, 0xffffffffffffffff)
2m30.059292814s ago: executing program 0 (id=1491):
setsockopt$auto(0x3, 0x1, 0x3e, 0x0, 0x9)
connect$auto(0xffffffffffffffff, 0x0, 0x55)
setsockopt$auto(0xffffffffffffffff, 0x1, 0x9, 0x0, 0xeb66)
unshare$auto(0x40000080)
open(0x0, 0xe4201, 0x17c)
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$auto_nl80211(&(0x7f0000000640), r0)
sendmsg$auto_NL80211_CMD_GET_WIPHY(r0, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000140)=ANY=[@ANYBLOB="18000000", @ANYRES16=r1, @ANYBLOB="810400ae000000000000000000"], 0x18}, 0x1, 0x0, 0x0, 0x20080011}, 0x4000c050)
unshare$auto(0x40000080)
mmap$auto(0x0, 0x3, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000)
r2 = socket(0xa, 0x1, 0x100)
mmap$auto(0x0, 0x4020009, 0x100000005, 0xeb1, 0x401, 0x8000000000000003)
r3 = socket(0x15, 0x5, 0x0)
getsockopt$auto(r3, 0x114, 0x2713, 0xfffffffffffffffc, 0x0)
setsockopt$auto(0x400000000000003, 0x29, 0x1b, 0x0, 0x56b)
openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x20b42, 0x0)
syz_clone(0x90800000, 0x0, 0xffffffffffffffdf, 0x0, 0x0, 0x0)
mmap$auto(0x6, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000002)
move_pages$auto(0x1, 0xf54, 0x0, 0x0, 0x0, 0x8000000000000000)
r4 = getpgid(0x0)
socket$nl_generic(0x10, 0x3, 0x10)
rt_tgsigqueueinfo$auto(0x0, r4, 0x1, &(0x7f0000000100)={@_si_pad})
mmap$auto(0x0, 0x2000d, 0x4080000200df, 0xeb1, 0x404, 0x8000)
mmap$auto(0x0, 0x2000c, 0x0, 0x20eb1, 0xff1, 0x8000)
io_uring_setup$auto(0x6, 0x0)
r5 = socket(0x11, 0x3, 0x2)
getsockopt$auto(r5, 0x107, 0xc, 0x0, 0x0)
syz_genetlink_get_family_id$auto_ovs_vport(&(0x7f0000000040), r2)
open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x40)
execve$auto(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=&(0x7f0000000080)='\xac\x00', &(0x7f0000000000)=&(0x7f0000000200)=' ')
2m29.870772749s ago: executing program 1 (id=1492):
r0 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000002c00)='/dev/cec18\x00', 0x900, 0x0)
r1 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snd/controlC1\x00', 0x802, 0x0)
ioctl$auto_SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000100)={{@inferred, 0x85, 0x20e, 0x9, "669cbbd9e9756f227dffa188e0f1a560e2a1facac1f00b2f4ab8633824f2d2252ca5f200"}, 0x0, @integer64=@value=[0x9, 0x4, 0xc2bf, 0x3, 0x100000002, 0x7, 0x4, 0x7, 0xcf6c, 0x7ff, 0xfffffffffffffff9, 0x8000000000000001, 0x0, 0x9, 0x86, 0x8, 0x8, 0x5, 0x7ffffffffffffffc, 0x58a2, 0x5, 0x8, 0x4, 0x1000ffffe, 0x800002, 0x7, 0xc01, 0x7fffffff, 0x5, 0xfd, 0x7fc5, 0x19, 0x4, 0xfffffffefffffffd, 0x10000000000007, 0x0, 0x1, 0x9, 0x6, 0x8000000000000000, 0xfff, 0x9, 0xa, 0x4, 0x8001, 0x3, 0x3, 0x3, 0x80000001, 0x81, 0x10002, 0x4, 0x5cd, 0x7, 0xfffffffffffffffd, 0x7fff, 0xd426, 0x9, 0x612, 0xffff, 0x8, 0x5, 0x6, 0x8000000000000001], "282f77b07e718ed4d99a34617774e3a82f982e0f05e516c299a28a585e87e0d908e2c8e50de5016f1de5d432da2cc20e951d8fcdc4f791a11996aad5af504c0d9927e62ef70b23a13735a4fe805c1ce1b6b1d83d21bb42794ec925b4547a3d52d4b5210392111e181719fef9d685b6534b171d76ad633f94a608b818600a6c85"})
mmap$auto(0x0, 0x20008, 0xe3, 0x100000eb1, r1, 0x8000)
mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8400)
openat$auto_tap_fops_tap(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0)
socket(0xa, 0x1, 0x100)
r2 = openat$auto_lru_gen_rw_fops_vmscan(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/lru_gen\x00', 0xc0000, 0x0)
pread64$auto(r2, 0x0, 0x7ff, 0x400)
socket(0x1a, 0x1, 0x0)
r3 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0)
prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0)
openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bus/usb/024/001\x00', 0x40001, 0x0)
select$auto(0xe, 0x0, 0x0, &(0x7f0000000040)={[0x1ff, 0x7, 0xd, 0x8fd6, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x62, 0x80000001, 0x5, 0x1, 0x9, 0x1, 0xfffffffffffffffe]}, 0x0)
write$auto(r3, &(0x7f00000000c0)='/Eev/audio1\x00VI\xa3\xaa\xb1;\x9dJ\xc6\xc0\'\xdbV\xd4\xee\xc2\xdd\xa7\xee$\x8d\xc4\xe9d\x03\rF\xec\xb8\xb1Z|\xffGP\x97)\xcf\a\xfb\\n\x89C:\x84D\x1du\xb4\x9ab\xce\xa7tU\x14w\xb4\x14\x1dU\x9d\x8b\xa4U\x953.O\xab\"4\x8a\xbbY8@Z5`\xa4m\xffb\x17\xbb\x7f\xea4*\xa4\xf4\xb4\x90\xc0\xbf\xd4m\xbf\xc7\x15\xbe\x01\x98\xd7lD\x97)}\xfaK\xdf>f\xb8&\x959-\n\xccWw\xe2\x9cK\fE\a\xca\xd36\xe8\xcb?(\xfaI\xe2\xae,\x95k8\x83\xcf\xc5D\xcc', 0x100000a3d9)
select$auto(0xe, 0x0, 0x0, &(0x7f00000002c0)={[0x1fc, 0x7, 0xd, 0x1, 0xc5e1, 0x3, 0x88, 0x3, 0x0, 0x62, 0x8, 0x10, 0x6d3e, 0xc, 0x2, 0x6]}, 0x0)
sendmsg$auto_NL80211_CMD_GET_REG(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4004810}, 0x8800)
mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0xffffffffffffffff, 0x8000)
msync$auto(0x1ffff000, 0x1800000000000fe, 0x400000004)
openat$auto_sg_fops_sg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sg0\x00', 0x82802, 0x0)
openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f0000000600)='/dev/audio1\x00', 0x8000, 0x0)
close_range$auto(0x2, 0x8, 0x0)
socket(0x1e, 0x805, 0x0)
openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/snd/controlC1\x00', 0x60840, 0x0)
ioctl$auto(0x3, 0x40045532, 0x38)
openat$auto_snd_pcm_f_ops_pcm1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snd/pcmC1D0c\x00', 0x129600, 0x0)
close_range$auto(0x2, 0x8, 0x0)
ioctl$auto_CEC_ADAP_S_LOG_ADDRS(r0, 0xc05c6104, &(0x7f0000000100)={"fda25684", 0xffff, 0x6, 0x2, 0x9b4, 0x9, "0800aafc241cd010c7543bfbca2ce1", "0200", "00000600", "2ff43123", ["2a047aee570987488e564d62", "f8ffffffffffffff00000001", "00d800", "5fe10eedab2c4b353c392a92"]})
socket$nl_generic(0x10, 0x3, 0x10)
2m28.559723794s ago: executing program 1 (id=1493):
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$auto_ovs_datapath(&(0x7f0000000040), 0xffffffffffffffff)
sendmsg$auto_OVS_DP_CMD_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x2c, r1, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x4}, @OVS_DP_ATTR_NAME={0x8, 0x1, 'HSR\xff'}, @OVS_DP_ATTR_UPCALL_PID={0x8, 0x2, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000800}, 0x80)
2m28.326886189s ago: executing program 0 (id=1494):
mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) (async)
mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000)
syz_genetlink_get_family_id$auto_net_shaper(&(0x7f0000001500), 0xffffffffffffffff)
sendmsg$auto_NET_SHAPER_CMD_GROUP(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2004c804}, 0x14) (async)
sendmsg$auto_NET_SHAPER_CMD_GROUP(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2004c804}, 0x14)
close_range$auto(0x2, 0x8, 0x0) (async)
close_range$auto(0x2, 0x8, 0x0)
socketpair$auto(0x1, 0x1, 0x8000000000000000, 0x0)
r0 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/ip_vs_conn\x00', 0x62240, 0x0)
read$auto_proc_reg_file_ops_compat_inode(r0, &(0x7f0000000240)=""/7, 0x7)
recvfrom$auto(0x4, 0x0, 0x101d0, 0x3ffffd, 0x0, 0x0) (async)
recvfrom$auto(0x4, 0x0, 0x101d0, 0x3ffffd, 0x0, 0x0)
r1 = prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7)
syz_genetlink_get_family_id$auto_nlctrl(&(0x7f00000003c0), r1)
madvise$auto(0x0, 0xffffffffffff0005, 0x19)
syz_genetlink_get_family_id$auto_ovs_flow(&(0x7f0000000180), 0xffffffffffffffff)
r2 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$auto_OVS_FLOW_CMD_GET(r2, 0x0, 0x800)
socket(0xa, 0x1, 0x84) (async)
socket(0xa, 0x1, 0x84)
listen$auto(0x3, 0x81)
accept$auto(0x3, 0xffffffffffffffff, 0xffffffffffffffff) (async)
accept$auto(0x3, 0xffffffffffffffff, 0xffffffffffffffff)
mmap$auto(0x0, 0x9, 0x2, 0x40eb2, 0x401, 0x300000000000) (async)
mmap$auto(0x0, 0x9, 0x2, 0x40eb2, 0x401, 0x300000000000)
getsockopt$auto(0xffffffffffffffff, 0x11c, 0x1, 0x0, 0x0) (async)
getsockopt$auto(0xffffffffffffffff, 0x11c, 0x1, 0x0, 0x0)
close_range$auto(0x2, 0x8, 0x0)
fanotify_init$auto(0x65, 0x2)
socket(0x1d, 0x2, 0x2)
connect$auto(0x3, 0x0, 0x55)
socket(0x10, 0x3, 0x6) (async)
socket(0x10, 0x3, 0x6)
socketpair$auto(0x1e, 0x4, 0x8000000000000000, 0x0)
write$auto(0x3, 0x0, 0x5c8)
madvise$auto(0x0, 0x2003f0, 0x15)
madvise$auto(0x0, 0x200007, 0x19) (async)
madvise$auto(0x0, 0x200007, 0x19)
timerfd_create$auto(0x9, 0x0)
openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0)
2m28.243393913s ago: executing program 1 (id=1495):
r0 = pidfd_open$auto(0xffffffffffffffff, 0x5)
mmap$auto(0x0, 0xffffffffffffffff, 0xdf, 0x9b72, r0, 0x7)
mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0)
openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nullb0\x00', 0x60742, 0x0)
mmap$auto(0x0, 0x40009, 0xdf, 0x9b72, 0x7, 0x28000)
write$auto(0x3, 0x0, 0x7fffffff)
write$auto(0x1, 0x0, 0x80000000)
preadv$auto(0x40000000000003, &(0x7f0000000080)={0x0, 0xfffffffd}, 0x6, 0x8, 0x5)
openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snd/controlC1\x00', 0x60800, 0x0)
newfstatat$auto(0xffffffffffffffff, 0x0, &(0x7f0000000380)={0x5, 0x6, 0xa9, 0x4, 0x0, 0xee01, 0x0, 0x2000000006, 0x1fffffffffffff, 0x0, 0x3, 0x8, 0x5, 0xcc, 0x4, 0x1, 0x53}, 0x1)
ppoll$auto(&(0x7f0000000140)={0xffffffffffffffff, 0x3ff, 0x4}, 0x7f, 0x0, 0x0, 0x8)
openat$auto_nsim_dev_max_vfs_fops_dev(0xffffffffffffff9c, &(0x7f00000089c0)='/sys/kernel/debug/netdevsim/netdevsim1/max_vfs\x00', 0x101000, 0x0)
socket(0x3, 0x80000, 0x6)
prctl$auto(0x21, 0x0, 0x1, 0x0, 0x0)
r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0)
write$auto(r1, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9)
mmap$auto(0x3, 0x3ff, 0xb3, 0x9b72, 0xffffffffffffffff, 0x27ffd)
write$auto(0x3, 0x0, 0x7fffffff)
lseek$auto(0x3, 0x0, 0x1)
munmap$auto(0x8000, 0xffffffff)
openat$auto_vcs_fops_vc_screen(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2a801, 0x0)
socket(0x2, 0x1, 0x0)
2m28.073568819s ago: executing program 0 (id=1496):
mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000)
mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000)
prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0)
mmap$auto(0x0, 0xa00006, 0x2, 0x40eb1, 0x602, 0x3000ffffbf00)
2m27.873700188s ago: executing program 2 (id=1497):
openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0)
mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x40000008000)
r0 = socket(0x10, 0x2, 0x0)
sendmmsg$auto(r0, 0x0, 0x7, 0x8)
openat$auto_tun_fops_tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0)
r2 = prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0)
select$auto(0x8, 0x0, 0x0, &(0x7f00000002c0)={[0x1ff, 0x7, 0xd, 0x1, 0x948b, 0x3, 0x15f4da0a, 0x3, 0x3, 0x62, 0x80000001, 0x7, 0x6d3f, 0x9, 0x2, 0xfffffffffffffffe]}, 0x0)
write$auto(r1, &(0x7f0000000400)='/dev/audio1\x00', 0x100000a3d9)
r3 = getpid()
process_vm_readv$auto(r3, &(0x7f0000000000)={0x0, 0xfff}, 0x40000000001, &(0x7f0000000180)={&(0x7f0000000140), 0x40000000001243}, 0xa, 0x0)
ioctl$auto(0x3, 0x400454ca, 0x38)
openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, 0x0, 0x80502, 0x0)
bpf$auto(0x0, 0x0, 0x6f3)
close_range$auto(0x2, 0x8, 0x0)
ioctl$auto_BLKIOMIN(r2, 0x1278, 0x0)
syz_genetlink_get_family_id$auto_tipcv2(&(0x7f0000000040), 0xffffffffffffffff)
mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000)
unshare$auto(0x40000080)
mlockall$auto(0x3)
r4 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, 0x0, 0x6ab82, 0x0)
ioctl$auto(0x3, 0xae41, r4)
listmount$auto(&(0x7f0000000100)={0xba, @raw=0x1b96da36, 0xffffffffffffffff, 0xc, 0x2}, 0x0, 0x5, 0x1)
semctl$auto_IPC_INFO(0xffc9, 0xfffff801, 0x3, 0xfffffffffffffffa)
mlockall$auto(0x5)
getsockopt$auto(0xffffffffffffffff, 0x3, 0x3, 0x0, 0x0)
geteuid()
2m27.76518085s ago: executing program 0 (id=1498):
mmap$auto(0x0, 0xe983, 0xdf, 0xeb1, 0x401, 0x8000)
pipe$auto(&(0x7f0000001480))
ioperm$auto(0x3, 0x5, 0x149)
r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual/net/bond0/bonding/primary_reselect\x00', 0x1e2142, 0x0)
sendfile$auto(r0, r0, 0x0, 0x7fff)
write$auto(0x3, 0x0, 0xffd8)
2m25.412422223s ago: executing program 0 (id=1499):
r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS0\x00', 0x48140, 0x0)
r1 = prctl$auto_PR_SCHED_CORE_CREATE(0x0, 0x1, 0x0, 0x249b, 0xb)
getsockopt$auto_SO_SNDBUF(r1, 0x0, 0x7, &(0x7f00000000c0)='/dev/ttyS0\x00', &(0x7f0000000140)=0x5)
readv$auto(r0, &(0x7f0000000100)={0x0, 0x5}, 0x3)
ioctl$auto_TIOCVHANGUP2(r0, 0x5437, 0x0)
mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000)
r2 = gettid()
lsm_list_modules$auto(0x0, 0x0, 0x0)
close_range$auto(0x2, 0x8, 0x0)
socket(0xa, 0x5, 0x0)
signalfd4$auto(0xffffffff, 0x0, 0x8, 0x0)
readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1)
tkill$auto(r2, 0x7)
r3 = socket(0x1e, 0x4, 0x0)
get_robust_list$auto(0x0, 0x0, 0x0)
setsockopt$auto(r3, 0x10f, 0x87, 0x0, 0x14)
mmap$auto(0xf, 0x1, 0x400, 0xf11, r0, 0x6)
r4 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0)
r5 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/card1/timer_source\x00', 0x189001, 0x0)
write$auto(r5, 0x0, 0xe)
setrlimit$auto(0x7, &(0x7f0000000080)={0x0, 0x6})
socket(0x23, 0x80805, 0x0)
close_range$auto(0x2, r1, 0xfffffffe)
pread64$auto(r4, &(0x7f0000000080)='/dev/ttyS0\x00', 0x8, 0x80000000)
getrlimit$auto(0x1, &(0x7f0000000180)={0xa38, 0xfffffffffffff09a})
0s ago: executing program 32 (id=1487):
iopl$auto(0x2)
syz_genetlink_get_family_id$auto_tipcv2(0x0, 0xffffffffffffffff)
unshare$auto(0x40000080)
semctl$auto_SETALL(0x3ff, 0x1000, 0x11, 0x2)
r0 = openat$auto_seq_oss_f_ops_seq_oss(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2, 0x0)
r1 = openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0)
write$auto(r1, &(0x7f0000000400)='/dev/audio1\x00', 0xa3d9)
set_mempolicy$auto(0x2, 0x0, 0x8)
mmap$auto(0x0, 0x40009, 0xa, 0x9b72, 0x2, 0x28000)
r2 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyS1\x00', 0x20000, 0x0)
ioctl$auto_TCSBRKP2(r2, 0x5425, 0x0)
r3 = openat$auto_mtd_fops_mtdchar(0xffffffffffffff9c, &(0x7f0000000400)='/dev/mtd0\x00', 0x28082, 0x0)
ioctl$auto(r3, 0xc0304d18, 0x8)
mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000)
close_range$auto(r0, 0x8, 0xfffffff8)
io_uring_setup$auto(0x9, 0x0)
socket(0x2, 0x5, 0x0)
close_range$auto(0x2, 0x8, 0x0)
socket(0x2, 0x1, 0x84)
mmap$auto(0x0, 0x4020009, 0xdb, 0xeb1, 0x401, 0x8000)
prctl$auto(0x1000000003b, 0x1, 0x4, 0x5, 0x7)
seccomp$auto(0x2, 0x0, 0x0)
bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @remote}, 0x6a)
r4 = openat$auto_userio_fops_userio(0xffffffffffffff9c, &(0x7f0000000000), 0x2000, 0x0)
read$auto_userio_fops_userio(r4, 0x0, 0x0)
shutdown$auto(0x200000003, 0x2)
sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x1c03, 0x0, 0x9, 0x0, 0x0, 0x9}, 0x7}, 0x6, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
kernel console output (not intermixed with test programs):
? __pfx___x64_sys_openat+0x10/0x10
[ 402.010605][T10218] ? rcu_is_watching+0x12/0xc0
[ 402.010646][T10218] do_syscall_64+0xcd/0x230
[ 402.010697][T10218] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 402.010729][T10218] RIP: 0033:0x7ff93d58d2d0
[ 402.010754][T10218] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44
[ 402.010784][T10218] RSP: 002b:00007ff93e4b0fe0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 402.010812][T10218] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ff93d58d2d0
[ 402.010830][T10218] RDX: 0000000000000002 RSI: 00007ff93d610d96 RDI: 00000000ffffff9c
[ 402.010847][T10218] RBP: 00007ff93d610d96 R08: 0000000000000000 R09: 00007ff93e4b2000
[ 402.010866][T10218] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
[ 402.010883][T10218] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78
[ 402.010924][T10218]
[ 402.263690][T10218] FAULT_INJECTION: forcing a failure.
[ 402.263690][T10218] name failslab, interval 1, probability 0, space 0, times 0
[ 402.281031][T10218] CPU: 0 UID: 0 PID: 10218 Comm: syz.3.987 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 402.281083][T10218] Tainted: [U]=USER
[ 402.281093][T10218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 402.281109][T10218] Call Trace:
[ 402.281119][T10218]
[ 402.281131][T10218] dump_stack_lvl+0x16c/0x1f0
[ 402.281186][T10218] should_fail_ex+0x512/0x640
[ 402.281246][T10218] ? kmem_cache_alloc_noprof+0x5a/0x3b0
[ 402.281290][T10218] should_failslab+0xc2/0x120
[ 402.281332][T10218] kmem_cache_alloc_noprof+0x6d/0x3b0
[ 402.281372][T10218] ? dup_fd+0x4e/0xb90
[ 402.281408][T10218] dup_fd+0x4e/0xb90
[ 402.281436][T10218] ? __pfx___mutex_unlock_slowpath+0x10/0x10
[ 402.281490][T10218] ? __fget_files+0x20e/0x3c0
[ 402.281515][T10218] ? rcu_watching_snap_stopped_since+0x60/0x110
[ 402.281554][T10218] ksys_unshare+0x831/0xa40
[ 402.281600][T10218] ? __pfx_ksys_unshare+0x10/0x10
[ 402.281644][T10218] ? ksys_write+0x1b9/0x240
[ 402.281677][T10218] ? rcu_is_watching+0x12/0xc0
[ 402.281721][T10218] __x64_sys_unshare+0x31/0x40
[ 402.281769][T10218] do_syscall_64+0xcd/0x230
[ 402.281822][T10218] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 402.281856][T10218] RIP: 0033:0x7ff93d58e969
[ 402.281882][T10218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 402.281912][T10218] RSP: 002b:00007ff93e4b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 402.281943][T10218] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa0 RCX: 00007ff93d58e969
[ 402.281964][T10218] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400
[ 402.281983][T10218] RBP: 00007ff93e4b1090 R08: 0000000000000000 R09: 0000000000000000
[ 402.282003][T10218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 402.282023][T10218] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78
[ 402.282064][T10218]
[ 405.621905][T10277] FAULT_INJECTION: forcing a failure.
[ 405.621905][T10277] name failslab, interval 1, probability 0, space 0, times 0
[ 405.669920][T10277] CPU: 0 UID: 0 PID: 10277 Comm: syz.3.997 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 405.669987][T10277] Tainted: [U]=USER
[ 405.669998][T10277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 405.670018][T10277] Call Trace:
[ 405.670029][T10277]
[ 405.670040][T10277] dump_stack_lvl+0x16c/0x1f0
[ 405.670095][T10277] should_fail_ex+0x512/0x640
[ 405.670143][T10277] ? __kmalloc_noprof+0xbf/0x510
[ 405.670182][T10277] ? genl_family_rcv_msg_attrs_parse.constprop.0+0xc8/0x290
[ 405.670241][T10277] should_failslab+0xc2/0x120
[ 405.670283][T10277] __kmalloc_noprof+0xd2/0x510
[ 405.670321][T10277] ? kasan_quarantine_put+0x10a/0x240
[ 405.670365][T10277] genl_family_rcv_msg_attrs_parse.constprop.0+0xc8/0x290
[ 405.670427][T10277] genl_family_rcv_msg_doit+0xbf/0x2f0
[ 405.670483][T10277] ? __pfx_genl_family_rcv_msg_doit+0x10/0x10
[ 405.670533][T10277] ? trace_cap_capable+0x18d/0x200
[ 405.670579][T10277] ? bpf_lsm_capable+0x9/0x10
[ 405.670613][T10277] ? security_capable+0x7e/0x260
[ 405.670648][T10277] ? ns_capable+0xd7/0x110
[ 405.670687][T10277] genl_rcv_msg+0x55c/0x800
[ 405.670742][T10277] ? __pfx_genl_rcv_msg+0x10/0x10
[ 405.670790][T10277] ? __pfx___dev_queue_xmit+0x10/0x10
[ 405.670823][T10277] ? __pfx_ovs_dp_cmd_new+0x10/0x10
[ 405.670874][T10277] ? __lock_acquire+0xaa4/0x1ba0
[ 405.670925][T10277] netlink_rcv_skb+0x16a/0x440
[ 405.670981][T10277] ? __pfx_genl_rcv_msg+0x10/0x10
[ 405.671033][T10277] ? __pfx_netlink_rcv_skb+0x10/0x10
[ 405.671102][T10277] ? __pfx_down_read+0x10/0x10
[ 405.671137][T10277] ? netlink_deliver_tap+0x1ae/0xd30
[ 405.671186][T10277] genl_rcv+0x28/0x40
[ 405.671231][T10277] netlink_unicast+0x53d/0x7f0
[ 405.671286][T10277] ? __pfx_netlink_unicast+0x10/0x10
[ 405.671328][T10277] ? __lock_acquire+0xaa4/0x1ba0
[ 405.671381][T10277] netlink_sendmsg+0x8d1/0xdd0
[ 405.671433][T10277] ? __pfx_netlink_sendmsg+0x10/0x10
[ 405.671496][T10277] ____sys_sendmsg+0xa95/0xc70
[ 405.671547][T10277] ? copy_msghdr_from_user+0x10a/0x160
[ 405.671587][T10277] ? __pfx_____sys_sendmsg+0x10/0x10
[ 405.671643][T10277] ? _raw_spin_unlock_irqrestore+0x3b/0x80
[ 405.671701][T10277] ___sys_sendmsg+0x134/0x1d0
[ 405.671746][T10277] ? __pfx____sys_sendmsg+0x10/0x10
[ 405.671842][T10277] __sys_sendmsg+0x16d/0x220
[ 405.671884][T10277] ? __pfx___sys_sendmsg+0x10/0x10
[ 405.671923][T10277] ? __x64_sys_futex+0x1e0/0x4c0
[ 405.671980][T10277] ? rcu_is_watching+0x12/0xc0
[ 405.672021][T10277] do_syscall_64+0xcd/0x230
[ 405.672073][T10277] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 405.672107][T10277] RIP: 0033:0x7ff93d58e969
[ 405.672134][T10277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 405.672165][T10277] RSP: 002b:00007ff93e490038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 405.672195][T10277] RAX: ffffffffffffffda RBX: 00007ff93d7b6080 RCX: 00007ff93d58e969
[ 405.672216][T10277] RDX: 0000000002000000 RSI: 0000200000000080 RDI: 0000000000000007
[ 405.672235][T10277] RBP: 00007ff93d610ab1 R08: 0000000000000000 R09: 0000000000000000
[ 405.672255][T10277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 405.672273][T10277] R13: 0000000000000000 R14: 00007ff93d7b6080 R15: 00007ffcf09a3d78
[ 405.672315][T10277]
[ 407.060289][T10283] hub 8-0:1.0: USB hub found
[ 407.065742][T10283] hub 8-0:1.0: 1 port detected
[ 407.400211][T10296] FAULT_INJECTION: forcing a failure.
[ 407.400211][T10296] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 407.446586][T10296] CPU: 0 UID: 0 PID: 10296 Comm: syz.3.1004 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 407.446642][T10296] Tainted: [U]=USER
[ 407.446654][T10296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 407.446673][T10296] Call Trace:
[ 407.446684][T10296]
[ 407.446699][T10296] dump_stack_lvl+0x16c/0x1f0
[ 407.446757][T10296] should_fail_ex+0x512/0x640
[ 407.446813][T10296] core_sys_select+0x921/0xbe0
[ 407.446887][T10296] ? __pfx_core_sys_select+0x10/0x10
[ 407.446984][T10296] ? set_user_sigmask+0x21b/0x2b0
[ 407.447019][T10296] ? __pfx_set_user_sigmask+0x10/0x10
[ 407.447051][T10296] ? find_held_lock+0x2b/0x80
[ 407.447092][T10296] do_pselect.constprop.0+0x19f/0x1e0
[ 407.447147][T10296] ? __pfx_do_pselect.constprop.0+0x10/0x10
[ 407.447209][T10296] ? __x64_sys_futex+0x1e0/0x4c0
[ 407.447250][T10296] __x64_sys_pselect6+0x182/0x240
[ 407.447283][T10296] ? __pfx___x64_sys_pselect6+0x10/0x10
[ 407.447312][T10296] ? rcu_is_watching+0x12/0xc0
[ 407.447355][T10296] do_syscall_64+0xcd/0x230
[ 407.447406][T10296] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 407.447439][T10296] RIP: 0033:0x7ff93d58e969
[ 407.447466][T10296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 407.447500][T10296] RSP: 002b:00007ff93e4b1038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e
[ 407.447532][T10296] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa0 RCX: 00007ff93d58e969
[ 407.447552][T10296] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000009
[ 407.447571][T10296] RBP: 00007ff93d610ab1 R08: 0000000000000000 R09: 0000000000000000
[ 407.447590][T10296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 407.447608][T10296] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78
[ 407.447649][T10296]
[ 407.928975][T10303] FAULT_INJECTION: forcing a failure.
[ 407.928975][T10303] name failslab, interval 1, probability 0, space 0, times 0
[ 407.946346][T10303] CPU: 1 UID: 0 PID: 10303 Comm: syz.3.1006 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 407.946400][T10303] Tainted: [U]=USER
[ 407.946412][T10303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 407.946431][T10303] Call Trace:
[ 407.946443][T10303]
[ 407.946457][T10303] dump_stack_lvl+0x16c/0x1f0
[ 407.946515][T10303] should_fail_ex+0x512/0x640
[ 407.946573][T10303] should_failslab+0xc2/0x120
[ 407.946617][T10303] __kmalloc_cache_noprof+0x6a/0x3e0
[ 407.946654][T10303] ? sctp_add_bind_addr+0xae/0x3f0
[ 407.946711][T10303] sctp_add_bind_addr+0xae/0x3f0
[ 407.946765][T10303] sctp_copy_local_addr_list+0x39d/0x5a0
[ 407.946829][T10303] ? __pfx_sctp_copy_local_addr_list+0x10/0x10
[ 407.946894][T10303] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360
[ 407.946940][T10303] ? sctp_bind_addr_copy+0xe0/0x530
[ 407.946989][T10303] sctp_bind_addr_copy+0xe0/0x530
[ 407.947062][T10303] sctp_connect_new_asoc+0x1d7/0x790
[ 407.947107][T10303] ? __pfx_sctp_connect_new_asoc+0x10/0x10
[ 407.947151][T10303] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0
[ 407.947202][T10303] __sctp_connect+0x3f3/0xc60
[ 407.947249][T10303] ? do_raw_spin_lock+0x12c/0x2b0
[ 407.947304][T10303] ? __pfx___sctp_connect+0x10/0x10
[ 407.947352][T10303] ? __pfx_sctp_inet_connect+0x10/0x10
[ 407.947395][T10303] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 407.947447][T10303] ? __pfx_sctp_inet_connect+0x10/0x10
[ 407.947486][T10303] sctp_inet_connect+0x15f/0x200
[ 407.947529][T10303] __sys_connect_file+0x141/0x1a0
[ 407.947589][T10303] __sys_connect+0x14d/0x170
[ 407.947623][T10303] ? __pfx___sys_connect+0x10/0x10
[ 407.947675][T10303] ? __pfx_ksys_write+0x10/0x10
[ 407.947706][T10303] ? rcu_is_watching+0x12/0xc0
[ 407.947746][T10303] __x64_sys_connect+0x72/0xb0
[ 407.947778][T10303] ? lockdep_hardirqs_on+0x7c/0x110
[ 407.947827][T10303] do_syscall_64+0xcd/0x230
[ 407.947880][T10303] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 407.947914][T10303] RIP: 0033:0x7ff93d58e969
[ 407.947941][T10303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 407.947973][T10303] RSP: 002b:00007ff93e4b1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[ 407.948003][T10303] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa0 RCX: 00007ff93d58e969
[ 407.948030][T10303] RDX: 0000000000000054 RSI: 0000200000000080 RDI: 0000000000000003
[ 407.948051][T10303] RBP: 00007ff93e4b1090 R08: 0000000000000000 R09: 0000000000000000
[ 407.948071][T10303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 407.948090][T10303] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78
[ 407.948135][T10303]
[ 409.308897][T10318] FAULT_INJECTION: forcing a failure.
[ 409.308897][T10318] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 409.358934][T10318] CPU: 1 UID: 0 PID: 10318 Comm: syz.2.1010 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 409.358985][T10318] Tainted: [U]=USER
[ 409.358996][T10318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 409.359015][T10318] Call Trace:
[ 409.359029][T10318]
[ 409.359043][T10318] dump_stack_lvl+0x16c/0x1f0
[ 409.359099][T10318] should_fail_ex+0x512/0x640
[ 409.359152][T10318] _copy_from_user+0x2e/0xd0
[ 409.359182][T10318] copy_msghdr_from_user+0x98/0x160
[ 409.359235][T10318] ? __pfx_copy_msghdr_from_user+0x10/0x10
[ 409.359281][T10318] ? kfree+0x252/0x4d0
[ 409.359307][T10318] ? __lock_acquire+0x5ca/0x1ba0
[ 409.359354][T10318] ___sys_recvmsg+0xdb/0x1a0
[ 409.359393][T10318] ? __pfx____sys_recvmsg+0x10/0x10
[ 409.359457][T10318] ? __pfx___might_resched+0x10/0x10
[ 409.359502][T10318] do_recvmmsg+0x2fe/0x740
[ 409.359547][T10318] ? __pfx_do_recvmmsg+0x10/0x10
[ 409.359596][T10318] ? __mutex_unlock_slowpath+0x161/0x6a0
[ 409.359659][T10318] ? __fget_files+0x20e/0x3c0
[ 409.359697][T10318] __x64_sys_recvmmsg+0x22a/0x280
[ 409.359740][T10318] ? __pfx___x64_sys_recvmmsg+0x10/0x10
[ 409.359779][T10318] ? rcu_is_watching+0x12/0xc0
[ 409.359818][T10318] do_syscall_64+0xcd/0x230
[ 409.359867][T10318] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 409.359899][T10318] RIP: 0033:0x7fc829f8e969
[ 409.359931][T10318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 409.359962][T10318] RSP: 002b:00007fc82add4038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 409.359992][T10318] RAX: ffffffffffffffda RBX: 00007fc82a1b5fa0 RCX: 00007fc829f8e969
[ 409.360012][T10318] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003
[ 409.360031][T10318] RBP: 00007fc82add4090 R08: 0000000000000000 R09: 0000000000000000
[ 409.360050][T10318] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 409.360068][T10318] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28
[ 409.360110][T10318]
[ 415.591214][T10379] Process accounting paused
[ 420.043167][T10458] FAULT_INJECTION: forcing a failure.
[ 420.043167][T10458] name failslab, interval 1, probability 0, space 0, times 0
[ 420.059588][T10458] CPU: 1 UID: 0 PID: 10458 Comm: syz.2.1037 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 420.059646][T10458] Tainted: [U]=USER
[ 420.059657][T10458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 420.059676][T10458] Call Trace:
[ 420.059687][T10458]
[ 420.059700][T10458] dump_stack_lvl+0x16c/0x1f0
[ 420.059760][T10458] should_fail_ex+0x512/0x640
[ 420.059812][T10458] ? kmem_cache_alloc_noprof+0x5a/0x3b0
[ 420.059864][T10458] should_failslab+0xc2/0x120
[ 420.059911][T10458] kmem_cache_alloc_noprof+0x6d/0x3b0
[ 420.059952][T10458] ? trace_cap_capable+0x18d/0x200
[ 420.059989][T10458] ? create_new_namespaces+0x30/0xad0
[ 420.060036][T10458] create_new_namespaces+0x30/0xad0
[ 420.060084][T10458] ? bpf_lsm_capable+0x9/0x10
[ 420.060124][T10458] ? security_capable+0x7e/0x260
[ 420.060186][T10458] unshare_nsproxy_namespaces+0xc0/0x1f0
[ 420.060236][T10458] ksys_unshare+0x45b/0xa40
[ 420.060287][T10458] ? __pfx_ksys_unshare+0x10/0x10
[ 420.060333][T10458] ? xfd_validate_state+0x5d/0x180
[ 420.060371][T10458] ? rcu_is_watching+0x12/0xc0
[ 420.060415][T10458] __x64_sys_unshare+0x31/0x40
[ 420.060464][T10458] do_syscall_64+0xcd/0x230
[ 420.060521][T10458] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 420.060558][T10458] RIP: 0033:0x7fc829f8e969
[ 420.060587][T10458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 420.060621][T10458] RSP: 002b:00007fc82add4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 420.060655][T10458] RAX: ffffffffffffffda RBX: 00007fc82a1b5fa0 RCX: 00007fc829f8e969
[ 420.060679][T10458] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400
[ 420.060700][T10458] RBP: 00007fc82a010ab1 R08: 0000000000000000 R09: 0000000000000000
[ 420.060721][T10458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 420.060742][T10458] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28
[ 420.060786][T10458]
[ 420.365896][T10461] FAULT_INJECTION: forcing a failure.
[ 420.365896][T10461] name failslab, interval 1, probability 0, space 0, times 0
[ 420.379399][T10461] CPU: 0 UID: 0 PID: 10461 Comm: syz.0.1039 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 420.379446][T10461] Tainted: [U]=USER
[ 420.379456][T10461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 420.379473][T10461] Call Trace:
[ 420.379482][T10461]
[ 420.379493][T10461] dump_stack_lvl+0x16c/0x1f0
[ 420.379551][T10461] should_fail_ex+0x512/0x640
[ 420.379614][T10461] ? fs_reclaim_acquire+0xae/0x150
[ 420.379662][T10461] ? tomoyo_realpath_from_path+0xc2/0x6e0
[ 420.379710][T10461] should_failslab+0xc2/0x120
[ 420.379761][T10461] __kmalloc_noprof+0xd2/0x510
[ 420.379805][T10461] tomoyo_realpath_from_path+0xc2/0x6e0
[ 420.379862][T10461] tomoyo_check_open_permission+0x2ab/0x3c0
[ 420.379902][T10461] ? __pfx_tomoyo_check_open_permission+0x10/0x10
[ 420.379979][T10461] ? find_held_lock+0x2b/0x80
[ 420.380028][T10461] tomoyo_file_open+0x6b/0x90
[ 420.380060][T10461] security_file_open+0x84/0x1e0
[ 420.380104][T10461] do_dentry_open+0x596/0x1c10
[ 420.380148][T10461] vfs_open+0x82/0x3f0
[ 420.380192][T10461] path_openat+0x1e5e/0x2d40
[ 420.380236][T10461] ? __pfx_path_openat+0x10/0x10
[ 420.380277][T10461] do_filp_open+0x20b/0x470
[ 420.380308][T10461] ? __pfx_do_filp_open+0x10/0x10
[ 420.380353][T10461] ? __pfx_kfree_link+0x10/0x10
[ 420.380406][T10461] ? alloc_fd+0x471/0x7d0
[ 420.380443][T10461] do_sys_openat2+0x11b/0x1d0
[ 420.380483][T10461] ? __pfx_do_sys_openat2+0x10/0x10
[ 420.380540][T10461] __x64_sys_openat+0x174/0x210
[ 420.380582][T10461] ? __pfx___x64_sys_openat+0x10/0x10
[ 420.380626][T10461] ? rcu_is_watching+0x12/0xc0
[ 420.380666][T10461] do_syscall_64+0xcd/0x230
[ 420.380715][T10461] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 420.380745][T10461] RIP: 0033:0x7f8596f8d2d0
[ 420.380771][T10461] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44
[ 420.380800][T10461] RSP: 002b:00007f8597daffe0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 420.380828][T10461] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f8596f8d2d0
[ 420.380847][T10461] RDX: 0000000000000002 RSI: 00007f8597010d96 RDI: 00000000ffffff9c
[ 420.380865][T10461] RBP: 00007f8597010d96 R08: 0000000000000000 R09: 00007f8597db1000
[ 420.380882][T10461] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002
[ 420.380900][T10461] R13: 0000000000000000 R14: 00007f85971b5fa0 R15: 00007ffe077188d8
[ 420.380939][T10461]
[ 420.652877][T10461] ERROR: Out of memory at tomoyo_realpath_from_path.
[ 420.660231][T10461] FAULT_INJECTION: forcing a failure.
[ 420.660231][T10461] name failslab, interval 1, probability 0, space 0, times 0
[ 420.673317][T10461] CPU: 1 UID: 0 PID: 10461 Comm: syz.0.1039 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 420.673363][T10461] Tainted: [U]=USER
[ 420.673374][T10461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 420.673392][T10461] Call Trace:
[ 420.673401][T10461]
[ 420.673411][T10461] dump_stack_lvl+0x16c/0x1f0
[ 420.673463][T10461] should_fail_ex+0x512/0x640
[ 420.673508][T10461] ? __kmalloc_cache_noprof+0x57/0x3e0
[ 420.673543][T10461] should_failslab+0xc2/0x120
[ 420.673583][T10461] __kmalloc_cache_noprof+0x6a/0x3e0
[ 420.673611][T10461] ? do_raw_spin_lock+0x12c/0x2b0
[ 420.673656][T10461] ? find_held_lock+0x2b/0x80
[ 420.673684][T10461] ? alloc_fdtable+0xa0/0x2b0
[ 420.673771][T10461] alloc_fdtable+0xa0/0x2b0
[ 420.673819][T10461] dup_fd+0x83b/0xb90
[ 420.673854][T10461] ? __fget_files+0x20e/0x3c0
[ 420.673879][T10461] ? rcu_watching_snap_stopped_since+0x60/0x110
[ 420.673919][T10461] ksys_unshare+0x831/0xa40
[ 420.673964][T10461] ? __pfx_ksys_unshare+0x10/0x10
[ 420.674008][T10461] ? ksys_write+0x1b9/0x240
[ 420.674039][T10461] ? rcu_is_watching+0x12/0xc0
[ 420.674078][T10461] __x64_sys_unshare+0x31/0x40
[ 420.674120][T10461] do_syscall_64+0xcd/0x230
[ 420.674170][T10461] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 420.674201][T10461] RIP: 0033:0x7f8596f8e969
[ 420.674224][T10461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 420.674254][T10461] RSP: 002b:00007f8597db0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 420.674283][T10461] RAX: ffffffffffffffda RBX: 00007f85971b5fa0 RCX: 00007f8596f8e969
[ 420.674303][T10461] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400
[ 420.674321][T10461] RBP: 00007f8597db0090 R08: 0000000000000000 R09: 0000000000000000
[ 420.674339][T10461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 420.674357][T10461] R13: 0000000000000000 R14: 00007f85971b5fa0 R15: 00007ffe077188d8
[ 420.674397][T10461]
[ 421.016939][T10465] bridge0: port 4(team0) entered blocking state
[ 421.023501][T10465] bridge0: port 4(team0) entered disabled state
[ 421.030123][T10465] team0: entered allmulticast mode
[ 421.035309][T10465] team_slave_0: entered allmulticast mode
[ 421.041187][T10465] team_slave_1: entered allmulticast mode
[ 421.050058][T10465] team0: entered promiscuous mode
[ 421.055193][T10465] team_slave_0: entered promiscuous mode
[ 421.061248][T10465] team_slave_1: entered promiscuous mode
[ 421.067928][T10465] bridge0: port 4(team0) entered blocking state
[ 421.074430][T10465] bridge0: port 4(team0) entered forwarding state
[ 421.108026][T10466] hub 8-0:1.0: USB hub found
[ 421.119151][T10466] hub 8-0:1.0: 1 port detected
[ 422.693480][T10486] FAULT_INJECTION: forcing a failure.
[ 422.693480][T10486] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 422.707056][T10486] CPU: 1 UID: 0 PID: 10486 Comm: syz.1.1044 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 422.707096][T10486] Tainted: [U]=USER
[ 422.707104][T10486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 422.707120][T10486] Call Trace:
[ 422.707129][T10486]
[ 422.707138][T10486] dump_stack_lvl+0x16c/0x1f0
[ 422.707182][T10486] should_fail_ex+0x512/0x640
[ 422.707227][T10486] _copy_from_user+0x2e/0xd0
[ 422.707251][T10486] memdup_user+0x6b/0xe0
[ 422.707286][T10486] strndup_user+0x78/0xe0
[ 422.707320][T10486] __x64_sys_fsopen+0x9c/0x240
[ 422.707353][T10486] do_syscall_64+0xcd/0x230
[ 422.707395][T10486] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 422.707422][T10486] RIP: 0033:0x7f09fdd8e969
[ 422.707442][T10486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 422.707468][T10486] RSP: 002b:00007f09fec92038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ae
[ 422.707491][T10486] RAX: ffffffffffffffda RBX: 00007f09fdfb6080 RCX: 00007f09fdd8e969
[ 422.707508][T10486] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
[ 422.707523][T10486] RBP: 00007f09fde10ab1 R08: 0000000000000000 R09: 0000000000000000
[ 422.707539][T10486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 422.707555][T10486] R13: 0000000000000000 R14: 00007f09fdfb6080 R15: 00007fff3638dc98
[ 422.707586][T10486]
[ 423.847188][ T30] audit: type=1800 audit(6043254557.734:10): pid=10502 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.0.1048" name="dummy_udc" dev="gadgetfs" ino=5840 res=0 errno=0
[ 425.932081][T10536] FAULT_INJECTION: forcing a failure.
[ 425.932081][T10536] name failslab, interval 1, probability 0, space 0, times 0
[ 426.011682][T10536] CPU: 0 UID: 0 PID: 10536 Comm: syz.1.1057 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 426.011742][T10536] Tainted: [U]=USER
[ 426.011754][T10536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 426.011773][T10536] Call Trace:
[ 426.011785][T10536]
[ 426.011798][T10536] dump_stack_lvl+0x16c/0x1f0
[ 426.011855][T10536] should_fail_ex+0x512/0x640
[ 426.011914][T10536] should_failslab+0xc2/0x120
[ 426.011961][T10536] __kmalloc_cache_noprof+0x6a/0x3e0
[ 426.011999][T10536] ? sctp_add_bind_addr+0xae/0x3f0
[ 426.012071][T10536] sctp_add_bind_addr+0xae/0x3f0
[ 426.012128][T10536] sctp_copy_local_addr_list+0x39d/0x5a0
[ 426.012193][T10536] ? __pfx_sctp_copy_local_addr_list+0x10/0x10
[ 426.012258][T10536] ? sctp_auth_asoc_copy_shkeys+0x2a5/0x360
[ 426.012304][T10536] ? sctp_bind_addr_copy+0xe0/0x530
[ 426.012355][T10536] sctp_bind_addr_copy+0xe0/0x530
[ 426.012412][T10536] sctp_connect_new_asoc+0x1d7/0x790
[ 426.012455][T10536] ? __pfx_sctp_connect_new_asoc+0x10/0x10
[ 426.012498][T10536] ? sctp_endpoint_lookup_assoc+0x15c/0x2a0
[ 426.012547][T10536] __sctp_connect+0x3f3/0xc60
[ 426.012599][T10536] ? do_raw_spin_lock+0x12c/0x2b0
[ 426.012658][T10536] ? __pfx___sctp_connect+0x10/0x10
[ 426.012703][T10536] ? __pfx_sctp_inet_connect+0x10/0x10
[ 426.012749][T10536] ? __sanitizer_cov_trace_switch+0x54/0x90
[ 426.012803][T10536] ? __pfx_sctp_inet_connect+0x10/0x10
[ 426.012841][T10536] sctp_inet_connect+0x15f/0x200
[ 426.012885][T10536] __sys_connect_file+0x141/0x1a0
[ 426.012927][T10536] __sys_connect+0x14d/0x170
[ 426.012962][T10536] ? __pfx___sys_connect+0x10/0x10
[ 426.013017][T10536] ? __pfx_ksys_write+0x10/0x10
[ 426.013048][T10536] ? rcu_is_watching+0x12/0xc0
[ 426.013091][T10536] __x64_sys_connect+0x72/0xb0
[ 426.013125][T10536] ? lockdep_hardirqs_on+0x7c/0x110
[ 426.013175][T10536] do_syscall_64+0xcd/0x230
[ 426.013227][T10536] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 426.013262][T10536] RIP: 0033:0x7f09fdd8e969
[ 426.013290][T10536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 426.013341][T10536] RSP: 002b:00007f09fecb3038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[ 426.013374][T10536] RAX: ffffffffffffffda RBX: 00007f09fdfb5fa0 RCX: 00007f09fdd8e969
[ 426.013396][T10536] RDX: 0000000000000054 RSI: 0000200000000080 RDI: 0000000000000003
[ 426.013415][T10536] RBP: 00007f09fecb3090 R08: 0000000000000000 R09: 0000000000000000
[ 426.013434][T10536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 426.013454][T10536] R13: 0000000000000000 R14: 00007f09fdfb5fa0 R15: 00007fff3638dc98
[ 426.013499][T10536]
[ 427.066903][T10548] FAULT_INJECTION: forcing a failure.
[ 427.066903][T10548] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 427.085096][T10548] CPU: 1 UID: 0 PID: 10548 Comm: syz.2.1061 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 427.085145][T10548] Tainted: [U]=USER
[ 427.085154][T10548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 427.085168][T10548] Call Trace:
[ 427.085176][T10548]
[ 427.085187][T10548] dump_stack_lvl+0x16c/0x1f0
[ 427.085232][T10548] should_fail_ex+0x512/0x640
[ 427.085277][T10548] _copy_from_user+0x2e/0xd0
[ 427.085301][T10548] copy_msghdr_from_user+0x98/0x160
[ 427.085352][T10548] ? __pfx_copy_msghdr_from_user+0x10/0x10
[ 427.085402][T10548] ? kfree+0x252/0x4d0
[ 427.085431][T10548] ? __lock_acquire+0x5ca/0x1ba0
[ 427.085470][T10548] ___sys_recvmsg+0xdb/0x1a0
[ 427.085501][T10548] ? __pfx____sys_recvmsg+0x10/0x10
[ 427.085549][T10548] ? __pfx___might_resched+0x10/0x10
[ 427.085586][T10548] do_recvmmsg+0x2fe/0x740
[ 427.085623][T10548] ? __pfx_do_recvmmsg+0x10/0x10
[ 427.085662][T10548] ? __mutex_unlock_slowpath+0x161/0x6a0
[ 427.085713][T10548] ? __fget_files+0x20e/0x3c0
[ 427.085744][T10548] __x64_sys_recvmmsg+0x22a/0x280
[ 427.085798][T10548] ? __pfx___x64_sys_recvmmsg+0x10/0x10
[ 427.085829][T10548] ? rcu_is_watching+0x12/0xc0
[ 427.085860][T10548] do_syscall_64+0xcd/0x230
[ 427.085898][T10548] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 427.085922][T10548] RIP: 0033:0x7fc829f8e969
[ 427.085941][T10548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 427.085966][T10548] RSP: 002b:00007fc82add4038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[ 427.085989][T10548] RAX: ffffffffffffffda RBX: 00007fc82a1b5fa0 RCX: 00007fc829f8e969
[ 427.086005][T10548] RDX: 0000000000010000 RSI: 0000000000000000 RDI: 0000000000000003
[ 427.086020][T10548] RBP: 00007fc82add4090 R08: 0000000000000000 R09: 0000000000000000
[ 427.086035][T10548] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000002
[ 427.086050][T10548] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28
[ 427.086080][T10548]
[ 427.904938][T10575] netlink: 294 bytes leftover after parsing attributes in process `syz.2.1065'.
[ 428.187191][T10580] dmxdev: DVB (dvb_dmxdev_filter_start): could not set feed
[ 428.197987][T10580] dvb_demux: dvb_demux_feed_del: feed not in list (type=1 state=0 pid=ffff)
[ 428.251268][T10554] Process accounting paused
[ 432.813718][T10635] HSR: entered promiscuous mode
[ 432.982066][T10605] Process accounting paused
[ 433.750002][T10659] FAULT_INJECTION: forcing a failure.
[ 433.750002][T10659] name failslab, interval 1, probability 0, space 0, times 0
[ 433.899424][T10659] CPU: 0 UID: 0 PID: 10659 Comm: syz.1.1082 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 433.899476][T10659] Tainted: [U]=USER
[ 433.899486][T10659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 433.899507][T10659] Call Trace:
[ 433.899518][T10659]
[ 433.899532][T10659] dump_stack_lvl+0x16c/0x1f0
[ 433.899595][T10659] should_fail_ex+0x512/0x640
[ 433.899642][T10659] ? __kmalloc_cache_noprof+0x57/0x3e0
[ 433.899678][T10659] should_failslab+0xc2/0x120
[ 433.899719][T10659] __kmalloc_cache_noprof+0x6a/0x3e0
[ 433.899751][T10659] ? lockdep_init_map_type+0x5c/0x280
[ 433.899794][T10659] ? rfkill_fop_open+0x1b6/0x750
[ 433.899841][T10659] ? __pfx_rfkill_fop_open+0x10/0x10
[ 433.899878][T10659] rfkill_fop_open+0x1b6/0x750
[ 433.899925][T10659] ? __pfx_rfkill_fop_open+0x10/0x10
[ 433.899966][T10659] misc_open+0x35d/0x420
[ 433.899999][T10659] ? __pfx_misc_open+0x10/0x10
[ 433.900039][T10659] chrdev_open+0x234/0x6a0
[ 433.900076][T10659] ? __pfx_apparmor_file_open+0x10/0x10
[ 433.900123][T10659] ? __pfx_chrdev_open+0x10/0x10
[ 433.900166][T10659] ? file_set_fsnotify_mode_from_watchers+0x163/0x640
[ 433.900226][T10659] do_dentry_open+0x741/0x1c10
[ 433.900260][T10659] ? __pfx_chrdev_open+0x10/0x10
[ 433.900303][T10659] vfs_open+0x82/0x3f0
[ 433.900352][T10659] path_openat+0x1e5e/0x2d40
[ 433.900399][T10659] ? __pfx_path_openat+0x10/0x10
[ 433.900442][T10659] do_filp_open+0x20b/0x470
[ 433.900475][T10659] ? __pfx_do_filp_open+0x10/0x10
[ 433.900543][T10659] ? alloc_fd+0x471/0x7d0
[ 433.900586][T10659] do_sys_openat2+0x11b/0x1d0
[ 433.900632][T10659] ? __pfx_do_sys_openat2+0x10/0x10
[ 433.900695][T10659] __x64_sys_openat+0x174/0x210
[ 433.900740][T10659] ? __pfx___x64_sys_openat+0x10/0x10
[ 433.900789][T10659] ? rcu_is_watching+0x12/0xc0
[ 433.900832][T10659] do_syscall_64+0xcd/0x230
[ 433.900887][T10659] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 433.900920][T10659] RIP: 0033:0x7f09fdd8e969
[ 433.900948][T10659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 433.900981][T10659] RSP: 002b:00007f09fec71038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[ 433.901023][T10659] RAX: ffffffffffffffda RBX: 00007f09fdfb6160 RCX: 00007f09fdd8e969
[ 433.901045][T10659] RDX: 0000000000000400 RSI: 0000200000000040 RDI: ffffffffffffff9c
[ 433.901080][T10659] RBP: 00007f09fde10ab1 R08: 0000000000000000 R09: 0000000000000000
[ 433.901101][T10659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 433.901120][T10659] R13: 0000000000000000 R14: 00007f09fdfb6160 R15: 00007fff3638dc98
[ 433.901165][T10659]
[ 436.226383][T10685] FAULT_INJECTION: forcing a failure.
[ 436.226383][T10685] name failslab, interval 1, probability 0, space 0, times 0
[ 436.240744][T10685] CPU: 1 UID: 0 PID: 10685 Comm: syz.2.1091 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 436.240808][T10685] Tainted: [U]=USER
[ 436.240819][T10685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 436.240838][T10685] Call Trace:
[ 436.240848][T10685]
[ 436.240860][T10685] dump_stack_lvl+0x16c/0x1f0
[ 436.240914][T10685] should_fail_ex+0x512/0x640
[ 436.240971][T10685] should_failslab+0xc2/0x120
[ 436.241012][T10685] __kmalloc_cache_noprof+0x6a/0x3e0
[ 436.241046][T10685] ? proc_thread_self_get_link+0x1c6/0x240
[ 436.241086][T10685] proc_thread_self_get_link+0x1c6/0x240
[ 436.241122][T10685] ? __pfx_proc_thread_self_get_link+0x10/0x10
[ 436.241154][T10685] step_into+0x19e7/0x2270
[ 436.241214][T10685] ? __pfx_step_into+0x10/0x10
[ 436.241270][T10685] ? lookup_fast+0x156/0x610
[ 436.241325][T10685] walk_component+0xfc/0x5b0
[ 436.241383][T10685] link_path_walk.part.0.constprop.0+0x685/0xd60
[ 436.241453][T10685] path_openat+0x227/0x2d40
[ 436.241482][T10685] ? __x64_sys_openat+0x174/0x210
[ 436.241544][T10685] ? __pfx_path_openat+0x10/0x10
[ 436.241603][T10685] do_filp_open+0x20b/0x470
[ 436.241637][T10685] ? __pfx_do_filp_open+0x10/0x10
[ 436.241717][T10685] ? alloc_fd+0x471/0x7d0
[ 436.241764][T10685] do_sys_openat2+0x11b/0x1d0
[ 436.241810][T10685] ? __pfx_do_sys_openat2+0x10/0x10
[ 436.241855][T10685] __x64_sys_openat+0x174/0x210
[ 436.241890][T10685] ? __pfx___x64_sys_openat+0x10/0x10
[ 436.241926][T10685] ? rcu_is_watching+0x12/0xc0
[ 436.241958][T10685] do_syscall_64+0xcd/0x230
[ 436.241999][T10685] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 436.242023][T10685] RIP: 0033:0x7fc829f8d2d0
[ 436.242043][T10685] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44
[ 436.242067][T10685] RSP: 002b:00007fc82add3fe0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 436.242089][T10685] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fc829f8d2d0
[ 436.242105][T10685] RDX: 0000000000000002 RSI: 00007fc82a010d96 RDI: 00000000ffffff9c
[ 436.242120][T10685] RBP: 00007fc82a010d96 R08: 0000000000000000 R09: 00007fc82add5000
[ 436.242135][T10685] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000003
[ 436.242149][T10685] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28
[ 436.242180][T10685]
[ 436.242641][T10685] FAULT_INJECTION: forcing a failure.
[ 436.242641][T10685] name failslab, interval 1, probability 0, space 0, times 0
[ 436.517199][T10685] CPU: 0 UID: 0 PID: 10685 Comm: syz.2.1091 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 436.517237][T10685] Tainted: [U]=USER
[ 436.517244][T10685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 436.517257][T10685] Call Trace:
[ 436.517265][T10685]
[ 436.517275][T10685] dump_stack_lvl+0x16c/0x1f0
[ 436.517315][T10685] should_fail_ex+0x512/0x640
[ 436.517352][T10685] ? __kvmalloc_node_noprof+0x122/0x600
[ 436.517382][T10685] should_failslab+0xc2/0x120
[ 436.517413][T10685] __kvmalloc_node_noprof+0x135/0x600
[ 436.517439][T10685] ? alloc_fdtable+0xee/0x2b0
[ 436.517481][T10685] ? alloc_fdtable+0xee/0x2b0
[ 436.517515][T10685] alloc_fdtable+0xee/0x2b0
[ 436.517557][T10685] dup_fd+0x83b/0xb90
[ 436.517586][T10685] ? __fget_files+0x20e/0x3c0
[ 436.517611][T10685] ksys_unshare+0x831/0xa40
[ 436.517645][T10685] ? __pfx_ksys_unshare+0x10/0x10
[ 436.517679][T10685] ? ksys_write+0x1b9/0x240
[ 436.517703][T10685] ? rcu_is_watching+0x12/0xc0
[ 436.517732][T10685] __x64_sys_unshare+0x31/0x40
[ 436.517762][T10685] do_syscall_64+0xcd/0x230
[ 436.517809][T10685] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 436.517834][T10685] RIP: 0033:0x7fc829f8e969
[ 436.517853][T10685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 436.517876][T10685] RSP: 002b:00007fc82add4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 436.517898][T10685] RAX: ffffffffffffffda RBX: 00007fc82a1b5fa0 RCX: 00007fc829f8e969
[ 436.517914][T10685] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400
[ 436.517928][T10685] RBP: 00007fc82add4090 R08: 0000000000000000 R09: 0000000000000000
[ 436.517943][T10685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 436.517957][T10685] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28
[ 436.517987][T10685]
[ 436.829898][T10686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x7fe00
[ 436.908615][T10686] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 436.917684][T10686] anon flags: 0xfff00000000040(head|node=0|zone=1|lastcpupid=0x7ff)
[ 436.927721][T10686] page_type: f5(slab)
[ 436.931889][T10686] raw: 00fff00000000040 ffff88801b442140 0000000000000000 dead000000000001
[ 436.962461][T10686] raw: 0000000000000000 0000000000040004 00000000f5000000 0000000000000000
[ 436.971425][T10686] head: 00fff00000000040 ffff88801b442140 0000000000000000 dead000000000001
[ 436.980991][T10686] head: 0000000000000000 0000000000040004 00000000f5000000 0000000000000000
[ 437.036555][T10686] head: 00fff00000000003 ffffea0001ff8001 00000000ffffffff 00000000ffffffff
[ 437.045917][T10686] head: ffffffffffffffff 0000000000000000 00000000ffffffff 0000000000000008
[ 437.055038][T10686] page dumped because: unmovable page
[ 437.065529][T10686] page_owner tracks the page as allocated
[ 437.075366][T10686] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC), pid 13, tgid 13 (kworker/u8:1), ts 156840013447, free_ts 156773849294
[ 437.181076][T10693] FAULT_INJECTION: forcing a failure.
[ 437.181076][T10693] name failslab, interval 1, probability 0, space 0, times 0
[ 437.194981][T10686] post_alloc_hook+0x181/0x1b0
[ 437.200812][T10686] get_page_from_freelist+0x135c/0x3920
[ 437.215343][T10686] __alloc_frozen_pages_noprof+0x261/0x23f0
[ 437.241782][T10693] CPU: 1 UID: 0 PID: 10693 Comm: syz.2.1092 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 437.241856][T10693] Tainted: [U]=USER
[ 437.241867][T10693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 437.241889][T10693] Call Trace:
[ 437.241900][T10693]
[ 437.241914][T10693] dump_stack_lvl+0x16c/0x1f0
[ 437.241974][T10693] should_fail_ex+0x512/0x640
[ 437.242027][T10693] ? kmem_cache_alloc_noprof+0x5a/0x3b0
[ 437.242073][T10693] should_failslab+0xc2/0x120
[ 437.242120][T10693] kmem_cache_alloc_noprof+0x6d/0x3b0
[ 437.242159][T10693] ? trace_cap_capable+0x18d/0x200
[ 437.242195][T10693] ? create_new_namespaces+0x30/0xad0
[ 437.242242][T10693] create_new_namespaces+0x30/0xad0
[ 437.242281][T10693] ? bpf_lsm_capable+0x9/0x10
[ 437.242320][T10693] ? security_capable+0x7e/0x260
[ 437.242366][T10693] unshare_nsproxy_namespaces+0xc0/0x1f0
[ 437.242411][T10693] ksys_unshare+0x45b/0xa40
[ 437.242460][T10693] ? __pfx_ksys_unshare+0x10/0x10
[ 437.242507][T10693] ? xfd_validate_state+0x5d/0x180
[ 437.242544][T10693] ? rcu_is_watching+0x12/0xc0
[ 437.242588][T10693] __x64_sys_unshare+0x31/0x40
[ 437.242637][T10693] do_syscall_64+0xcd/0x230
[ 437.242694][T10693] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 437.242759][T10693] RIP: 0033:0x7fc829f8e969
[ 437.242787][T10693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 437.242822][T10693] RSP: 002b:00007fc82add4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 437.242878][T10693] RAX: ffffffffffffffda RBX: 00007fc82a1b5fa0 RCX: 00007fc829f8e969
[ 437.242903][T10693] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400
[ 437.242924][T10693] RBP: 00007fc82a010ab1 R08: 0000000000000000 R09: 0000000000000000
[ 437.242944][T10693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 437.242971][T10693] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28
[ 437.243016][T10693]
[ 437.447297][T10686] alloc_pages_mpol+0x1fb/0x550
[ 437.457459][T10686] new_slab+0x244/0x340
[ 437.461733][T10686] ___slab_alloc+0xd9c/0x1940
[ 437.484597][T10686] __slab_alloc.constprop.0+0x56/0xb0
[ 437.490174][T10686] __kmalloc_node_track_caller_noprof+0x2ee/0x510
[ 437.514163][T10686] kmalloc_reserve+0xef/0x2c0
[ 437.537846][T10686] __alloc_skb+0x166/0x380
[ 437.542371][T10686] nsim_dev_trap_report_work+0x2b1/0xcf0
[ 437.636374][T10686] process_one_work+0x9cf/0x1b70
[ 437.641432][T10686] worker_thread+0x6c8/0xf10
[ 437.646498][T10686] kthread+0x3c2/0x780
[ 437.650661][T10686] ret_from_fork+0x48/0x80
[ 437.664589][T10686] ret_from_fork_asm+0x1a/0x30
[ 437.689896][T10686] page last free pid 5817 tgid 5817 stack trace:
[ 437.768735][T10686] __free_frozen_pages+0x69d/0xff0
[ 437.773960][T10686] __folio_put+0x329/0x450
[ 437.831653][T10686] skb_release_data+0x618/0x960
[ 437.840474][T10686] __kfree_skb+0x4f/0x70
[ 437.864710][T10686] tcp_ack+0x19b2/0x5c90
[ 437.881047][T10686] tcp_rcv_established+0xcf0/0x2180
[ 437.907534][T10686] tcp_v4_do_rcv+0x5ca/0xa90
[ 437.917684][T10686] __release_sock+0x31b/0x400
[ 437.922437][T10686] release_sock+0x5a/0x220
[ 437.942907][T10686] tcp_sendmsg+0x38/0x50
[ 437.957865][T10686] inet_sendmsg+0xb9/0x140
[ 437.963962][T10686] sock_write_iter+0x4aa/0x5b0
[ 437.969505][T10686] vfs_write+0x5bd/0x1180
[ 437.974131][T10686] ksys_write+0x205/0x240
[ 437.985455][T10686] do_syscall_64+0xcd/0x230
[ 437.998872][T10686] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 439.566151][T10725] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1099'.
[ 439.598330][T10725] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1099'.
[ 439.750431][T10727] [U]
[ 439.753606][T10727] [U]
[ 439.756383][T10727] [U]
[ 439.759139][T10727] [U]
[ 439.773909][T10727] [U]
[ 439.776730][T10727] [U]
[ 439.779498][T10727] [U]
[ 439.782260][T10727] [U]
[ 439.786831][T10727] [U]
[ 439.789635][T10727] [U]
[ 439.792411][T10727] [U]
[ 439.795186][T10727] [U]
[ 439.814721][T10727] [U]
[ 439.817542][T10727] [U]
[ 439.820327][T10727] [U]
[ 439.823169][T10727] [U]
[ 439.891176][T10727] [U]
[ 439.894000][T10727] [U]
[ 439.896799][T10727] [U]
[ 439.899573][T10727] [U]
[ 439.936930][T10727] [U]
[ 439.939755][T10727] [U]
[ 439.942608][T10727] [U]
[ 439.945378][T10727] [U]
[ 439.956655][T10727] [U]
[ 439.959459][T10727] [U]
[ 439.962209][T10727] [U]
[ 439.964951][T10727] [U]
[ 440.008478][T10727] [U]
[ 440.011296][T10727] [U]
[ 440.014059][T10727] [U]
[ 440.016829][T10727] [U]
[ 440.046635][T10727] [U]
[ 440.049402][T10727] [U]
[ 440.052126][T10727] [U]
[ 440.054933][T10727] [U]
[ 440.061083][T10727] [U]
[ 440.063890][T10727] [U]
[ 440.066642][T10727] [U]
[ 440.069361][T10727] [U]
[ 440.076580][T10727] [U]
[ 440.079405][T10727] [U]
[ 440.082167][T10727] [U]
[ 440.084938][T10727] [U]
[ 440.124137][T10727] [U]
[ 440.126952][T10727] [U]
[ 440.129733][T10727] [U]
[ 440.132501][T10727] [U]
[ 440.159028][T10735] [U]
[ 442.044097][T10760] FAULT_INJECTION: forcing a failure.
[ 442.044097][T10760] name failslab, interval 1, probability 0, space 0, times 0
[ 442.073436][T10760] CPU: 0 UID: 0 PID: 10760 Comm: syz.3.1106 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 442.073486][T10760] Tainted: [U]=USER
[ 442.073496][T10760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 442.073514][T10760] Call Trace:
[ 442.073524][T10760]
[ 442.073537][T10760] dump_stack_lvl+0x16c/0x1f0
[ 442.073592][T10760] should_fail_ex+0x512/0x640
[ 442.073641][T10760] ? kmem_cache_alloc_node_noprof+0x5e/0x3b0
[ 442.073685][T10760] should_failslab+0xc2/0x120
[ 442.073728][T10760] kmem_cache_alloc_node_noprof+0x71/0x3b0
[ 442.073768][T10760] ? __alloc_skb+0x2b2/0x380
[ 442.073812][T10760] __alloc_skb+0x2b2/0x380
[ 442.073848][T10760] ? __pfx___alloc_skb+0x10/0x10
[ 442.073889][T10760] ? apparmor_file_permission+0x251/0x400
[ 442.073940][T10760] virtual_ncidev_write+0x50/0x210
[ 442.073995][T10760] vfs_write+0x25c/0x1180
[ 442.074025][T10760] ? __pfx_virtual_ncidev_write+0x10/0x10
[ 442.074094][T10760] ? __pfx_vfs_write+0x10/0x10
[ 442.074121][T10760] ? find_held_lock+0x2b/0x80
[ 442.074152][T10760] ? __fget_files+0x204/0x3c0
[ 442.074185][T10760] ? __fget_files+0x20e/0x3c0
[ 442.074226][T10760] ksys_write+0x12a/0x240
[ 442.074259][T10760] ? __pfx_ksys_write+0x10/0x10
[ 442.074290][T10760] ? rcu_is_watching+0x12/0xc0
[ 442.074331][T10760] do_syscall_64+0xcd/0x230
[ 442.074388][T10760] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 442.074420][T10760] RIP: 0033:0x7ff93d58e969
[ 442.074444][T10760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 442.074492][T10760] RSP: 002b:00007ff93e490038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 442.074522][T10760] RAX: ffffffffffffffda RBX: 00007ff93d7b6080 RCX: 00007ff93d58e969
[ 442.074543][T10760] RDX: 000000000000b4d3 RSI: 0000000000000000 RDI: 0000000000000003
[ 442.074561][T10760] RBP: 00007ff93e490090 R08: 0000000000000000 R09: 0000000000000000
[ 442.074580][T10760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 442.074599][T10760] R13: 0000000000000000 R14: 00007ff93d7b6080 R15: 00007ffcf09a3d78
[ 442.074638][T10760]
[ 443.613166][T10798] vivid-003: ================= START STATUS =================
[ 443.622046][T10798] vivid-003: Radio HW Seek Mode: Bounded
[ 443.630963][T10798] vivid-003: Radio Programmable HW Seek: false
[ 443.637969][T10798] vivid-003: RDS Rx I/O Mode: Block I/O
[ 443.643787][T10798] vivid-003: Generate RBDS Instead of RDS: false
[ 443.678026][T10798] vivid-003: RDS Reception: true
[ 443.693391][T10798] vivid-003: RDS Program Type: 0 inactive
[ 443.710096][T10798] vivid-003: RDS PS Name: inactive
[ 443.728662][T10798] vivid-003: RDS Radio Text: inactive
[ 443.731387][T10800] hub 8-0:1.0: USB hub found
[ 443.741533][T10800] hub 8-0:1.0: 1 port detected
[ 443.807921][T10798] vivid-003: RDS Traffic Announcement: false inactive
[ 443.814972][T10798] vivid-003: RDS Traffic Program: false inactive
[ 443.821429][T10798] vivid-003: RDS Music: false inactive
[ 443.827200][T10798] vivid-003: ================== END STATUS ==================
[ 445.250497][T10820] block nbd7: not configured, cannot reconfigure
[ 446.794607][T10824] Process accounting resumed
[ 450.454119][ T1300] ieee802154 phy0 wpan0: encryption failed: -22
[ 450.464574][ T1300] ieee802154 phy1 wpan1: encryption failed: -22
[ 450.640269][T10880] netlink: 'syz.1.1133': attribute type 1 has an invalid length.
[ 450.648334][T10880] netlink: 33 bytes leftover after parsing attributes in process `syz.1.1133'.
[ 451.260846][T10889] HSR: entered promiscuous mode
[ 455.271165][T10936] FAULT_INJECTION: forcing a failure.
[ 455.271165][T10936] name failslab, interval 1, probability 0, space 0, times 0
[ 455.388444][T10936] CPU: 0 UID: 0 PID: 10936 Comm: syz.0.1145 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 455.388502][T10936] Tainted: [U]=USER
[ 455.388514][T10936] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 455.388535][T10936] Call Trace:
[ 455.388546][T10936]
[ 455.388560][T10936] dump_stack_lvl+0x16c/0x1f0
[ 455.388619][T10936] should_fail_ex+0x512/0x640
[ 455.388671][T10936] ? __kmalloc_cache_noprof+0x57/0x3e0
[ 455.388710][T10936] should_failslab+0xc2/0x120
[ 455.388754][T10936] __kmalloc_cache_noprof+0x6a/0x3e0
[ 455.388789][T10936] ? rfkill_fop_open+0x56/0x750
[ 455.388834][T10936] ? __pfx_rfkill_fop_open+0x10/0x10
[ 455.388872][T10936] rfkill_fop_open+0x56/0x750
[ 455.388908][T10936] ? kobject_get_unless_zero+0x156/0x1e0
[ 455.388969][T10936] ? __pfx_rfkill_fop_open+0x10/0x10
[ 455.389012][T10936] misc_open+0x35d/0x420
[ 455.389045][T10936] ? __pfx_misc_open+0x10/0x10
[ 455.389076][T10936] chrdev_open+0x234/0x6a0
[ 455.389115][T10936] ? __pfx_apparmor_file_open+0x10/0x10
[ 455.389162][T10936] ? __pfx_chrdev_open+0x10/0x10
[ 455.389204][T10936] ? file_set_fsnotify_mode_from_watchers+0x163/0x640
[ 455.389265][T10936] do_dentry_open+0x741/0x1c10
[ 455.389304][T10936] ? __pfx_chrdev_open+0x10/0x10
[ 455.389359][T10936] vfs_open+0x82/0x3f0
[ 455.389413][T10936] path_openat+0x1e5e/0x2d40
[ 455.389469][T10936] ? __pfx_path_openat+0x10/0x10
[ 455.389516][T10936] do_filp_open+0x20b/0x470
[ 455.389552][T10936] ? __pfx_do_filp_open+0x10/0x10
[ 455.389622][T10936] ? alloc_fd+0x471/0x7d0
[ 455.389667][T10936] do_sys_openat2+0x11b/0x1d0
[ 455.389713][T10936] ? __pfx_do_sys_openat2+0x10/0x10
[ 455.389789][T10936] __x64_sys_openat+0x174/0x210
[ 455.389837][T10936] ? __pfx___x64_sys_openat+0x10/0x10
[ 455.389888][T10936] ? rcu_is_watching+0x12/0xc0
[ 455.389935][T10936] do_syscall_64+0xcd/0x230
[ 455.389991][T10936] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 455.390027][T10936] RIP: 0033:0x7f8596f8e969
[ 455.390054][T10936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 455.390095][T10936] RSP: 002b:00007f8597d6e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[ 455.390130][T10936] RAX: ffffffffffffffda RBX: 00007f85971b6160 RCX: 00007f8596f8e969
[ 455.390153][T10936] RDX: 0000000000000400 RSI: 0000200000000040 RDI: ffffffffffffff9c
[ 455.390175][T10936] RBP: 00007f8597010ab1 R08: 0000000000000000 R09: 0000000000000000
[ 455.390198][T10936] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 455.390219][T10936] R13: 0000000000000000 R14: 00007f85971b6160 R15: 00007ffe077188d8
[ 455.390265][T10936]
[ 456.346652][ T30] audit: type=1800 audit(6043254590.231:11): pid=10953 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.3.1149" name="dummy_udc" dev="gadgetfs" ino=5840 res=0 errno=0
[ 458.642017][T10987] FAULT_INJECTION: forcing a failure.
[ 458.642017][T10987] name failslab, interval 1, probability 0, space 0, times 0
[ 458.804713][T10987] CPU: 1 UID: 0 PID: 10987 Comm: syz.3.1158 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 458.804757][T10987] Tainted: [U]=USER
[ 458.804766][T10987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 458.804782][T10987] Call Trace:
[ 458.804790][T10987]
[ 458.804801][T10987] dump_stack_lvl+0x16c/0x1f0
[ 458.804857][T10987] should_fail_ex+0x512/0x640
[ 458.804899][T10987] ? __kmalloc_cache_noprof+0x57/0x3e0
[ 458.804929][T10987] should_failslab+0xc2/0x120
[ 458.804963][T10987] __kmalloc_cache_noprof+0x6a/0x3e0
[ 458.804990][T10987] ? rfkill_fop_open+0x56/0x750
[ 458.805026][T10987] ? __pfx_rfkill_fop_open+0x10/0x10
[ 458.805055][T10987] rfkill_fop_open+0x56/0x750
[ 458.805085][T10987] ? kobject_get_unless_zero+0x156/0x1e0
[ 458.805132][T10987] ? __pfx_rfkill_fop_open+0x10/0x10
[ 458.805164][T10987] misc_open+0x35d/0x420
[ 458.805190][T10987] ? __pfx_misc_open+0x10/0x10
[ 458.805214][T10987] chrdev_open+0x234/0x6a0
[ 458.805243][T10987] ? __pfx_apparmor_file_open+0x10/0x10
[ 458.805280][T10987] ? __pfx_chrdev_open+0x10/0x10
[ 458.805312][T10987] ? file_set_fsnotify_mode_from_watchers+0x163/0x640
[ 458.805360][T10987] do_dentry_open+0x741/0x1c10
[ 458.805389][T10987] ? __pfx_chrdev_open+0x10/0x10
[ 458.805424][T10987] vfs_open+0x82/0x3f0
[ 458.805463][T10987] path_openat+0x1e5e/0x2d40
[ 458.805502][T10987] ? __pfx_path_openat+0x10/0x10
[ 458.805537][T10987] do_filp_open+0x20b/0x470
[ 458.805563][T10987] ? __pfx_do_filp_open+0x10/0x10
[ 458.805614][T10987] ? alloc_fd+0x471/0x7d0
[ 458.805646][T10987] do_sys_openat2+0x11b/0x1d0
[ 458.805682][T10987] ? __pfx_do_sys_openat2+0x10/0x10
[ 458.805737][T10987] __x64_sys_openat+0x174/0x210
[ 458.805775][T10987] ? __pfx___x64_sys_openat+0x10/0x10
[ 458.805814][T10987] ? rcu_is_watching+0x12/0xc0
[ 458.805859][T10987] do_syscall_64+0xcd/0x230
[ 458.805902][T10987] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 458.805930][T10987] RIP: 0033:0x7ff93d58e969
[ 458.805951][T10987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 458.805978][T10987] RSP: 002b:00007ff93e4b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[ 458.806002][T10987] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa0 RCX: 00007ff93d58e969
[ 458.806020][T10987] RDX: 0000000000000400 RSI: 0000200000000040 RDI: ffffffffffffff9c
[ 458.806037][T10987] RBP: 00007ff93d610ab1 R08: 0000000000000000 R09: 0000000000000000
[ 458.806052][T10987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 458.806069][T10987] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78
[ 458.806101][T10987]
[ 460.322600][T10988] Process accounting resumed
[ 461.497041][ T30] audit: type=1800 audit(6043254595.361:12): pid=11031 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.2.1166" name="dummy_udc" dev="gadgetfs" ino=5840 res=0 errno=0
[ 463.147349][T11033] hub 8-0:1.0: USB hub found
[ 463.159656][T11033] hub 8-0:1.0: 1 port detected
[ 464.425401][T11047] Process accounting resumed
[ 466.336660][T11088] i2c i2c-0: delete_device: Extra parameters
[ 466.376940][T11088] netlink: 98 bytes leftover after parsing attributes in process `syz.1.1179'.
[ 466.422702][T11088] netlink: 50 bytes leftover after parsing attributes in process `syz.1.1179'.
[ 467.360644][T11093] hub 8-0:1.0: USB hub found
[ 467.365935][T11093] hub 8-0:1.0: 1 port detected
[ 468.414869][T11109] netlink: 28 bytes leftover after parsing attributes in process `syz.3.1185'.
[ 470.513546][T11135] netlink: 25 bytes leftover after parsing attributes in process `syz.3.1190'.
[ 471.601010][T11157] hub 8-0:1.0: USB hub found
[ 471.625498][T11157] hub 8-0:1.0: 1 port detected
[ 471.640616][T11158] HSR: entered promiscuous mode
[ 474.481502][T11203] vivid-002: ================= START STATUS =================
[ 474.556170][T11203] vivid-002: ================== END STATUS ==================
[ 477.680301][T11248] Process accounting paused
[ 490.752097][T11405] Process accounting paused
[ 490.800451][T11436] input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input8
[ 491.526098][T11452] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1264'.
[ 494.598761][T11504] FAULT_INJECTION: forcing a failure.
[ 494.598761][T11504] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 494.626558][T11504] CPU: 0 UID: 0 PID: 11504 Comm: syz.0.1275 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 494.626608][T11504] Tainted: [U]=USER
[ 494.626618][T11504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 494.626635][T11504] Call Trace:
[ 494.626645][T11504]
[ 494.626657][T11504] dump_stack_lvl+0x16c/0x1f0
[ 494.626710][T11504] should_fail_ex+0x512/0x640
[ 494.626789][T11504] _copy_from_user+0x2e/0xd0
[ 494.626820][T11504] virtual_ncidev_write+0xa5/0x210
[ 494.626874][T11504] vfs_write+0x25c/0x1180
[ 494.626903][T11504] ? __pfx_virtual_ncidev_write+0x10/0x10
[ 494.626960][T11504] ? __pfx_vfs_write+0x10/0x10
[ 494.626988][T11504] ? find_held_lock+0x2b/0x80
[ 494.627020][T11504] ? __fget_files+0x204/0x3c0
[ 494.627055][T11504] ? __fget_files+0x20e/0x3c0
[ 494.627094][T11504] ksys_write+0x12a/0x240
[ 494.627124][T11504] ? __pfx_ksys_write+0x10/0x10
[ 494.627153][T11504] ? rcu_is_watching+0x12/0xc0
[ 494.627194][T11504] do_syscall_64+0xcd/0x230
[ 494.627242][T11504] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 494.627272][T11504] RIP: 0033:0x7f8596f8e969
[ 494.627298][T11504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 494.627328][T11504] RSP: 002b:00007f8597d6e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[ 494.627366][T11504] RAX: ffffffffffffffda RBX: 00007f85971b6160 RCX: 00007f8596f8e969
[ 494.627386][T11504] RDX: 000000000000b4d3 RSI: 0000000000000000 RDI: 0000000000000003
[ 494.627404][T11504] RBP: 00007f8597d6e090 R08: 0000000000000000 R09: 0000000000000000
[ 494.627423][T11504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 494.627442][T11504] R13: 0000000000000000 R14: 00007f85971b6160 R15: 00007ffe077188d8
[ 494.627484][T11504]
[ 495.201403][T11504] Process accounting paused
[ 495.426107][T11519] openvswitch: netlink: Message has 20 unknown bytes.
[ 503.134782][T11654] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1315'.
[ 504.423312][T11685] openvswitch: HSR: Dropping previously announced user features
[ 504.959470][T11699] FAULT_INJECTION: forcing a failure.
[ 504.959470][T11699] name fail_futex, interval 1, probability 0, space 0, times 0
[ 505.053260][T11699] CPU: 1 UID: 0 PID: 11699 Comm: syz.3.1325 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 505.053327][T11699] Tainted: [U]=USER
[ 505.053339][T11699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 505.053360][T11699] Call Trace:
[ 505.053371][T11699]
[ 505.053384][T11699] dump_stack_lvl+0x16c/0x1f0
[ 505.053444][T11699] should_fail_ex+0x512/0x640
[ 505.053504][T11699] get_futex_key+0x49e/0x1000
[ 505.053538][T11699] ? __pfx_core_sys_select+0x10/0x10
[ 505.053599][T11699] ? __pfx_get_futex_key+0x10/0x10
[ 505.053651][T11699] futex_wake+0xe7/0x4e0
[ 505.053700][T11699] ? __pfx_futex_wake+0x10/0x10
[ 505.053741][T11699] ? __pfx_poll_select_finish+0x10/0x10
[ 505.053799][T11699] ? __pfx_set_user_sigmask+0x10/0x10
[ 505.053833][T11699] ? find_held_lock+0x2b/0x80
[ 505.053871][T11699] do_futex+0x1e3/0x350
[ 505.053909][T11699] ? __pfx_do_futex+0x10/0x10
[ 505.053947][T11699] ? __pfx_do_pselect.constprop.0+0x10/0x10
[ 505.054012][T11699] __x64_sys_futex+0x1e0/0x4c0
[ 505.054055][T11699] ? __pfx___x64_sys_futex+0x10/0x10
[ 505.054094][T11699] ? __pfx___x64_sys_pselect6+0x10/0x10
[ 505.054125][T11699] ? rcu_is_watching+0x12/0xc0
[ 505.054183][T11699] do_syscall_64+0xcd/0x230
[ 505.054241][T11699] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 505.054304][T11699] RIP: 0033:0x7ff93d58e969
[ 505.054334][T11699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 505.054373][T11699] RSP: 002b:00007ff93e4b10e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 505.054403][T11699] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa8 RCX: 00007ff93d58e969
[ 505.054425][T11699] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff93d7b5fac
[ 505.054447][T11699] RBP: 00007ff93d7b5fa0 R08: 00007ff93e4b2000 R09: 0000000000000000
[ 505.054468][T11699] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff93d7b5fac
[ 505.054488][T11699] R13: 0000000000000000 R14: 00007ffcf09a3c90 R15: 00007ffcf09a3d78
[ 505.054532][T11699]
[ 508.932063][T11738] Process accounting resumed
[ 509.074781][T11756] FAULT_INJECTION: forcing a failure.
[ 509.074781][T11756] name fail_futex, interval 1, probability 0, space 0, times 0
[ 509.080375][T11758] device-mapper: ioctl: Unable to rename non-existent device, to uuid „
[ 509.088402][T11756] CPU: 1 UID: 0 PID: 11756 Comm: syz.3.1336 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 509.088460][T11756] Tainted: [U]=USER
[ 509.088471][T11756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 509.088491][T11756] Call Trace:
[ 509.088501][T11756]
[ 509.088513][T11756] dump_stack_lvl+0x16c/0x1f0
[ 509.088569][T11756] should_fail_ex+0x512/0x640
[ 509.088626][T11756] get_futex_key+0x49e/0x1000
[ 509.088660][T11756] ? __pfx_core_sys_select+0x10/0x10
[ 509.088726][T11756] ? __pfx_get_futex_key+0x10/0x10
[ 509.088789][T11756] futex_wake+0xe7/0x4e0
[ 509.088844][T11756] ? __pfx_futex_wake+0x10/0x10
[ 509.088896][T11756] ? __pfx_poll_select_finish+0x10/0x10
[ 509.088963][T11756] ? __pfx_set_user_sigmask+0x10/0x10
[ 509.089001][T11756] ? find_held_lock+0x2b/0x80
[ 509.089046][T11756] do_futex+0x1e3/0x350
[ 509.089089][T11756] ? __pfx_do_futex+0x10/0x10
[ 509.089133][T11756] ? __pfx_do_pselect.constprop.0+0x10/0x10
[ 509.089219][T11756] __x64_sys_futex+0x1e0/0x4c0
[ 509.089271][T11756] ? __pfx___x64_sys_futex+0x10/0x10
[ 509.089317][T11756] ? __pfx___x64_sys_pselect6+0x10/0x10
[ 509.089353][T11756] ? rcu_is_watching+0x12/0xc0
[ 509.089405][T11756] do_syscall_64+0xcd/0x230
[ 509.089470][T11756] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 509.089510][T11756] RIP: 0033:0x7ff93d58e969
[ 509.089543][T11756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 509.089580][T11756] RSP: 002b:00007ff93e4b10e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 509.089617][T11756] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa8 RCX: 00007ff93d58e969
[ 509.089645][T11756] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007ff93d7b5fac
[ 509.089669][T11756] RBP: 00007ff93d7b5fa0 R08: 00007ff93e4b2000 R09: 0000000000000000
[ 509.089694][T11756] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007ff93d7b5fac
[ 509.089719][T11756] R13: 0000000000000000 R14: 00007ffcf09a3c90 R15: 00007ffcf09a3d78
[ 509.089769][T11756]
[ 509.405113][T11758] device-mapper: ioctl: ioctl interface mismatch: kernel(4.49.0), user(0.0.0), cmd(5)
[ 511.879442][ T1300] ieee802154 phy0 wpan0: encryption failed: -22
[ 511.886027][ T1300] ieee802154 phy1 wpan1: encryption failed: -22
[ 512.570305][T11795] FAULT_INJECTION: forcing a failure.
[ 512.570305][T11795] name fail_futex, interval 1, probability 0, space 0, times 0
[ 512.636561][T11795] CPU: 1 UID: 0 PID: 11795 Comm: syz.1.1347 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 512.636617][T11795] Tainted: [U]=USER
[ 512.636630][T11795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 512.636651][T11795] Call Trace:
[ 512.636673][T11795]
[ 512.636688][T11795] dump_stack_lvl+0x16c/0x1f0
[ 512.636745][T11795] should_fail_ex+0x512/0x640
[ 512.636806][T11795] get_futex_key+0x49e/0x1000
[ 512.636841][T11795] ? __pfx_core_sys_select+0x10/0x10
[ 512.636902][T11795] ? __pfx_get_futex_key+0x10/0x10
[ 512.636955][T11795] futex_wake+0xe7/0x4e0
[ 512.637006][T11795] ? __pfx_futex_wake+0x10/0x10
[ 512.637051][T11795] ? __pfx_poll_select_finish+0x10/0x10
[ 512.637114][T11795] ? __pfx_set_user_sigmask+0x10/0x10
[ 512.637150][T11795] ? find_held_lock+0x2b/0x80
[ 512.637190][T11795] do_futex+0x1e3/0x350
[ 512.637230][T11795] ? __pfx_do_futex+0x10/0x10
[ 512.637267][T11795] ? __pfx_do_pselect.constprop.0+0x10/0x10
[ 512.637333][T11795] __x64_sys_futex+0x1e0/0x4c0
[ 512.637380][T11795] ? __pfx___x64_sys_futex+0x10/0x10
[ 512.637422][T11795] ? __pfx___x64_sys_pselect6+0x10/0x10
[ 512.637454][T11795] ? rcu_is_watching+0x12/0xc0
[ 512.637500][T11795] do_syscall_64+0xcd/0x230
[ 512.637560][T11795] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 512.637596][T11795] RIP: 0033:0x7f09fdd8e969
[ 512.637624][T11795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 512.637669][T11795] RSP: 002b:00007f09fecb30e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[ 512.637704][T11795] RAX: ffffffffffffffda RBX: 00007f09fdfb5fa8 RCX: 00007f09fdd8e969
[ 512.637728][T11795] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f09fdfb5fac
[ 512.637750][T11795] RBP: 00007f09fdfb5fa0 R08: 00007f09fecb4000 R09: 0000000000000000
[ 512.637773][T11795] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007f09fdfb5fac
[ 512.637796][T11795] R13: 0000000000000000 R14: 00007fff3638dbb0 R15: 00007fff3638dc98
[ 512.637842][T11795]
[ 513.160920][T11807] FAULT_INJECTION: forcing a failure.
[ 513.160920][T11807] name failslab, interval 1, probability 0, space 0, times 0
[ 513.219135][T11807] CPU: 0 UID: 0 PID: 11807 Comm: syz.3.1351 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 513.219184][T11807] Tainted: [U]=USER
[ 513.219195][T11807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 513.219213][T11807] Call Trace:
[ 513.219222][T11807]
[ 513.219234][T11807] dump_stack_lvl+0x16c/0x1f0
[ 513.219285][T11807] should_fail_ex+0x512/0x640
[ 513.219337][T11807] should_failslab+0xc2/0x120
[ 513.219377][T11807] __kmalloc_cache_noprof+0x6a/0x3e0
[ 513.219410][T11807] ? proc_thread_self_get_link+0x1c6/0x240
[ 513.219451][T11807] proc_thread_self_get_link+0x1c6/0x240
[ 513.219484][T11807] ? __pfx_proc_thread_self_get_link+0x10/0x10
[ 513.219533][T11807] step_into+0x19e7/0x2270
[ 513.219591][T11807] ? __pfx_step_into+0x10/0x10
[ 513.219643][T11807] ? lookup_fast+0x156/0x610
[ 513.219693][T11807] walk_component+0xfc/0x5b0
[ 513.219746][T11807] link_path_walk.part.0.constprop.0+0x685/0xd60
[ 513.219808][T11807] path_openat+0x227/0x2d40
[ 513.219835][T11807] ? __x64_sys_openat+0x174/0x210
[ 513.219900][T11807] ? __pfx_path_openat+0x10/0x10
[ 513.219937][T11807] do_filp_open+0x20b/0x470
[ 513.219964][T11807] ? __pfx_do_filp_open+0x10/0x10
[ 513.220017][T11807] ? alloc_fd+0x471/0x7d0
[ 513.220050][T11807] do_sys_openat2+0x11b/0x1d0
[ 513.220087][T11807] ? __pfx_do_sys_openat2+0x10/0x10
[ 513.220137][T11807] __x64_sys_openat+0x174/0x210
[ 513.220175][T11807] ? __pfx___x64_sys_openat+0x10/0x10
[ 513.220214][T11807] ? rcu_is_watching+0x12/0xc0
[ 513.220250][T11807] do_syscall_64+0xcd/0x230
[ 513.220295][T11807] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 513.220323][T11807] RIP: 0033:0x7ff93d58d2d0
[ 513.220344][T11807] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44
[ 513.220371][T11807] RSP: 002b:00007ff93e4b0fe0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101
[ 513.220397][T11807] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007ff93d58d2d0
[ 513.220414][T11807] RDX: 0000000000000002 RSI: 00007ff93d610d96 RDI: 00000000ffffff9c
[ 513.220431][T11807] RBP: 00007ff93d610d96 R08: 0000000000000000 R09: 00007ff93e4b2000
[ 513.220447][T11807] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000007
[ 513.220463][T11807] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78
[ 513.220503][T11807]
[ 513.221223][T11807] FAULT_INJECTION: forcing a failure.
[ 513.221223][T11807] name failslab, interval 1, probability 0, space 0, times 0
[ 513.544944][T11807] CPU: 0 UID: 0 PID: 11807 Comm: syz.3.1351 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 513.544993][T11807] Tainted: [U]=USER
[ 513.545002][T11807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 513.545017][T11807] Call Trace:
[ 513.545032][T11807]
[ 513.545044][T11807] dump_stack_lvl+0x16c/0x1f0
[ 513.545091][T11807] should_fail_ex+0x512/0x640
[ 513.545132][T11807] ? __kmalloc_cache_noprof+0x57/0x3e0
[ 513.545162][T11807] should_failslab+0xc2/0x120
[ 513.545197][T11807] __kmalloc_cache_noprof+0x6a/0x3e0
[ 513.545224][T11807] ? alloc_fs_context+0x57/0x9c0
[ 513.545255][T11807] alloc_fs_context+0x57/0x9c0
[ 513.545288][T11807] mq_init_ns+0x172/0x620
[ 513.545323][T11807] copy_ipcs+0x383/0x610
[ 513.545352][T11807] ? copy_utsname+0xab/0x470
[ 513.545388][T11807] create_new_namespaces+0x20a/0xad0
[ 513.545421][T11807] ? security_capable+0x7e/0x260
[ 513.545452][T11807] unshare_nsproxy_namespaces+0xc0/0x1f0
[ 513.545486][T11807] ksys_unshare+0x45b/0xa40
[ 513.545524][T11807] ? __pfx_ksys_unshare+0x10/0x10
[ 513.545569][T11807] ? ksys_write+0x1b9/0x240
[ 513.545596][T11807] ? rcu_is_watching+0x12/0xc0
[ 513.545629][T11807] __x64_sys_unshare+0x31/0x40
[ 513.545666][T11807] do_syscall_64+0xcd/0x230
[ 513.545709][T11807] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 513.545737][T11807] RIP: 0033:0x7ff93d58e969
[ 513.545758][T11807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 513.545787][T11807] RSP: 002b:00007ff93e4b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 513.545811][T11807] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa0 RCX: 00007ff93d58e969
[ 513.545829][T11807] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400
[ 513.545844][T11807] RBP: 00007ff93e4b1090 R08: 0000000000000000 R09: 0000000000000000
[ 513.545860][T11807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 513.545875][T11807] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78
[ 513.545908][T11807]
[ 513.942231][T11819] FAULT_INJECTION: forcing a failure.
[ 513.942231][T11819] name failslab, interval 1, probability 0, space 0, times 0
[ 513.964070][T11819] CPU: 0 UID: 0 PID: 11819 Comm: syz.1.1355 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 513.964122][T11819] Tainted: [U]=USER
[ 513.964134][T11819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 513.964153][T11819] Call Trace:
[ 513.964165][T11819]
[ 513.964177][T11819] dump_stack_lvl+0x16c/0x1f0
[ 513.964236][T11819] should_fail_ex+0x512/0x640
[ 513.964285][T11819] ? __kmalloc_node_track_caller_noprof+0xc3/0x510
[ 513.964333][T11819] should_failslab+0xc2/0x120
[ 513.964379][T11819] __kmalloc_node_track_caller_noprof+0xd6/0x510
[ 513.964420][T11819] ? _raw_spin_unlock_irqrestore+0x3b/0x80
[ 513.964464][T11819] ? fib_notifier_ops_register+0x32/0x270
[ 513.964527][T11819] kmemdup_noprof+0x29/0x60
[ 513.964575][T11819] fib_notifier_ops_register+0x32/0x270
[ 513.964622][T11819] fib4_notifier_init+0x4f/0xd0
[ 513.964664][T11819] fib_net_init+0xbf/0x3f0
[ 513.964704][T11819] ? __pfx___register_sysctl_table+0x10/0x10
[ 513.964744][T11819] ? __pfx_fib_net_init+0x10/0x10
[ 513.964785][T11819] ? lockdep_init_map_type+0x5c/0x280
[ 513.964832][T11819] ? do_init_timer+0xc9/0x110
[ 513.964869][T11819] ? devinet_init_net+0x5c2/0x910
[ 513.964920][T11819] ? __pfx_fib_net_init+0x10/0x10
[ 513.964961][T11819] ops_init+0x1e2/0x5f0
[ 513.965011][T11819] setup_net+0x21e/0x850
[ 513.965060][T11819] ? __pfx_setup_net+0x10/0x10
[ 513.965101][T11819] ? lockdep_init_map_type+0x5c/0x280
[ 513.965148][T11819] ? __pfx_down_read_killable+0x10/0x10
[ 513.965188][T11819] ? debug_mutex_init+0x37/0x70
[ 513.965224][T11819] copy_net_ns+0x2a6/0x5f0
[ 513.965276][T11819] create_new_namespaces+0x3ea/0xad0
[ 513.965326][T11819] unshare_nsproxy_namespaces+0xc0/0x1f0
[ 513.965368][T11819] ksys_unshare+0x45b/0xa40
[ 513.965416][T11819] ? __pfx_ksys_unshare+0x10/0x10
[ 513.965460][T11819] ? xfd_validate_state+0x5d/0x180
[ 513.965495][T11819] ? rcu_is_watching+0x12/0xc0
[ 513.965547][T11819] __x64_sys_unshare+0x31/0x40
[ 513.965594][T11819] do_syscall_64+0xcd/0x230
[ 513.965652][T11819] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 513.965686][T11819] RIP: 0033:0x7f09fdd8e969
[ 513.965714][T11819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 513.965747][T11819] RSP: 002b:00007f09fec92038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 513.965779][T11819] RAX: ffffffffffffffda RBX: 00007f09fdfb6080 RCX: 00007f09fdd8e969
[ 513.965800][T11819] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080
[ 513.965820][T11819] RBP: 00007f09fde10ab1 R08: 0000000000000000 R09: 0000000000000000
[ 513.965839][T11819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 513.965857][T11819] R13: 0000000000000000 R14: 00007f09fdfb6080 R15: 00007fff3638dc98
[ 513.965899][T11819]
[ 515.889946][T11842] FAULT_INJECTION: forcing a failure.
[ 515.889946][T11842] name failslab, interval 1, probability 0, space 0, times 0
[ 515.903185][T11842] CPU: 1 UID: 0 PID: 11842 Comm: syz.1.1361 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 515.903237][T11842] Tainted: [U]=USER
[ 515.903248][T11842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 515.903267][T11842] Call Trace:
[ 515.903277][T11842]
[ 515.903289][T11842] dump_stack_lvl+0x16c/0x1f0
[ 515.903345][T11842] should_fail_ex+0x512/0x640
[ 515.903386][T11842] ? kmem_cache_alloc_noprof+0x5a/0x3b0
[ 515.903419][T11842] should_failslab+0xc2/0x120
[ 515.903451][T11842] kmem_cache_alloc_noprof+0x6d/0x3b0
[ 515.903479][T11842] ? d_instantiate+0x77/0x90
[ 515.903506][T11842] ? alloc_empty_file+0x55/0x1e0
[ 515.903542][T11842] alloc_empty_file+0x55/0x1e0
[ 515.903576][T11842] alloc_file_pseudo+0x13a/0x230
[ 515.903617][T11842] ? __pfx_alloc_file_pseudo+0x10/0x10
[ 515.903661][T11842] ioctx_alloc+0x5ab/0x2060
[ 515.903710][T11842] ? find_held_lock+0x2b/0x80
[ 515.903735][T11842] ? __pfx_ioctx_alloc+0x10/0x10
[ 515.903783][T11842] ? __might_fault+0x13b/0x190
[ 515.903821][T11842] __x64_sys_io_setup+0xc9/0x210
[ 515.903860][T11842] do_syscall_64+0xcd/0x230
[ 515.903901][T11842] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 515.903926][T11842] RIP: 0033:0x7f09fdd8e969
[ 515.903946][T11842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 515.903972][T11842] RSP: 002b:00007f09fec92038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce
[ 515.903995][T11842] RAX: ffffffffffffffda RBX: 00007f09fdfb6080 RCX: 00007f09fdd8e969
[ 515.904011][T11842] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 000000000000ffff
[ 515.904027][T11842] RBP: 00007f09fde10ab1 R08: 0000000000000000 R09: 0000000000000000
[ 515.904042][T11842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 515.904057][T11842] R13: 0000000000000000 R14: 00007f09fdfb6080 R15: 00007fff3638dc98
[ 515.904088][T11842]
[ 516.315913][T11842] program syz.1.1361 is using a deprecated SCSI ioctl, please convert it to SG_IO
[ 517.229722][T11875] FAULT_INJECTION: forcing a failure.
[ 517.229722][T11875] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 517.301495][ T5847] Bluetooth: hci3: unexpected event 0x3e length: 728 > 260
[ 517.301546][ T5847] Bluetooth: hci3: unexpected subevent 0x03 length: 727 > 9
[ 517.366382][T11875] CPU: 1 UID: 0 PID: 11875 Comm: syz.1.1368 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 517.366438][T11875] Tainted: [U]=USER
[ 517.366450][T11875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 517.366470][T11875] Call Trace:
[ 517.366481][T11875]
[ 517.366495][T11875] dump_stack_lvl+0x16c/0x1f0
[ 517.366554][T11875] should_fail_ex+0x512/0x640
[ 517.366616][T11875] core_sys_select+0x921/0xbe0
[ 517.366685][T11875] ? __pfx_core_sys_select+0x10/0x10
[ 517.366778][T11875] ? set_user_sigmask+0x21b/0x2b0
[ 517.366813][T11875] ? __pfx_set_user_sigmask+0x10/0x10
[ 517.366843][T11875] ? find_held_lock+0x2b/0x80
[ 517.366886][T11875] do_pselect.constprop.0+0x19f/0x1e0
[ 517.366944][T11875] ? __pfx_do_pselect.constprop.0+0x10/0x10
[ 517.367009][T11875] ? __x64_sys_futex+0x1e0/0x4c0
[ 517.367054][T11875] __x64_sys_pselect6+0x182/0x240
[ 517.367087][T11875] ? __pfx___x64_sys_pselect6+0x10/0x10
[ 517.367117][T11875] ? rcu_is_watching+0x12/0xc0
[ 517.367162][T11875] do_syscall_64+0xcd/0x230
[ 517.367218][T11875] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 517.367252][T11875] RIP: 0033:0x7f09fdd8e969
[ 517.367279][T11875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 517.367327][T11875] RSP: 002b:00007f09fecb3038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e
[ 517.367360][T11875] RAX: ffffffffffffffda RBX: 00007f09fdfb5fa0 RCX: 00007f09fdd8e969
[ 517.367382][T11875] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000009
[ 517.367403][T11875] RBP: 00007f09fde10ab1 R08: 0000000000000000 R09: 0000000000000000
[ 517.367424][T11875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 517.367438][T11875] R13: 0000000000000000 R14: 00007f09fdfb5fa0 R15: 00007fff3638dc98
[ 517.367469][T11875]
[ 518.129658][T11868] Process accounting resumed
[ 518.416987][T11888] hub 8-0:1.0: USB hub found
[ 518.437270][T11888] hub 8-0:1.0: 1 port detected
[ 521.351079][T11922] Process accounting resumed
[ 521.881645][T11939] hub 8-0:1.0: USB hub found
[ 521.894910][T11939] hub 8-0:1.0: 1 port detected
[ 521.923792][T11944] netlink: 'syz.0.1387': attribute type 1 has an invalid length.
[ 521.932096][T11944] netlink: 33 bytes leftover after parsing attributes in process `syz.0.1387'.
[ 522.170470][T11934] FAULT_INJECTION: forcing a failure.
[ 522.170470][T11934] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 522.211358][T11934] CPU: 0 UID: 0 PID: 11934 Comm: syz.3.1383 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 522.211413][T11934] Tainted: [U]=USER
[ 522.211425][T11934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 522.211445][T11934] Call Trace:
[ 522.211456][T11934]
[ 522.211468][T11934] dump_stack_lvl+0x16c/0x1f0
[ 522.211526][T11934] should_fail_ex+0x512/0x640
[ 522.211584][T11934] core_sys_select+0x921/0xbe0
[ 522.211647][T11934] ? __pfx_core_sys_select+0x10/0x10
[ 522.211746][T11934] ? set_user_sigmask+0x21b/0x2b0
[ 522.211782][T11934] ? __pfx_set_user_sigmask+0x10/0x10
[ 522.211815][T11934] ? find_held_lock+0x2b/0x80
[ 522.211857][T11934] do_pselect.constprop.0+0x19f/0x1e0
[ 522.211944][T11934] ? __pfx_do_pselect.constprop.0+0x10/0x10
[ 522.212008][T11934] ? __x64_sys_futex+0x1e0/0x4c0
[ 522.212051][T11934] __x64_sys_pselect6+0x182/0x240
[ 522.212086][T11934] ? __pfx___x64_sys_pselect6+0x10/0x10
[ 522.212116][T11934] ? rcu_is_watching+0x12/0xc0
[ 522.212164][T11934] do_syscall_64+0xcd/0x230
[ 522.212221][T11934] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 522.212255][T11934] RIP: 0033:0x7ff93d58e969
[ 522.212281][T11934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 522.212313][T11934] RSP: 002b:00007ff93e4b1038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e
[ 522.212344][T11934] RAX: ffffffffffffffda RBX: 00007ff93d7b5fa0 RCX: 00007ff93d58e969
[ 522.212365][T11934] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000009
[ 522.212386][T11934] RBP: 00007ff93d610ab1 R08: 0000000000000000 R09: 0000000000000000
[ 522.212406][T11934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 522.212427][T11934] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78
[ 522.212472][T11934]
[ 522.853635][T11962] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1391'.
[ 523.755015][T11982] HSR: entered promiscuous mode
[ 524.240309][T11970] i2c i2c-0: DVB: adapter 0 frontend 0 frequency 0 out of range (51000000..2150000000)
[ 524.300573][T11997] netlink: 24 bytes leftover after parsing attributes in process `syz.3.1401'.
[ 524.714596][T11987] FAULT_INJECTION: forcing a failure.
[ 524.714596][T11987] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 524.741516][T11987] CPU: 1 UID: 0 PID: 11987 Comm: syz.2.1398 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 524.741572][T11987] Tainted: [U]=USER
[ 524.741584][T11987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 524.741604][T11987] Call Trace:
[ 524.741616][T11987]
[ 524.741629][T11987] dump_stack_lvl+0x16c/0x1f0
[ 524.741687][T11987] should_fail_ex+0x512/0x640
[ 524.741746][T11987] core_sys_select+0x921/0xbe0
[ 524.741811][T11987] ? __pfx_core_sys_select+0x10/0x10
[ 524.741909][T11987] ? set_user_sigmask+0x21b/0x2b0
[ 524.741954][T11987] ? __pfx_set_user_sigmask+0x10/0x10
[ 524.741988][T11987] ? find_held_lock+0x2b/0x80
[ 524.742032][T11987] do_pselect.constprop.0+0x19f/0x1e0
[ 524.742103][T11987] ? __pfx_do_pselect.constprop.0+0x10/0x10
[ 524.742168][T11987] ? __x64_sys_futex+0x1e0/0x4c0
[ 524.742213][T11987] __x64_sys_pselect6+0x182/0x240
[ 524.742248][T11987] ? __pfx___x64_sys_pselect6+0x10/0x10
[ 524.742278][T11987] ? rcu_is_watching+0x12/0xc0
[ 524.742324][T11987] do_syscall_64+0xcd/0x230
[ 524.742379][T11987] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 524.742414][T11987] RIP: 0033:0x7fc829f8e969
[ 524.742442][T11987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 524.742476][T11987] RSP: 002b:00007fc82add4038 EFLAGS: 00000246 ORIG_RAX: 000000000000010e
[ 524.742508][T11987] RAX: ffffffffffffffda RBX: 00007fc82a1b5fa0 RCX: 00007fc829f8e969
[ 524.742530][T11987] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000009
[ 524.742550][T11987] RBP: 00007fc82a010ab1 R08: 0000000000000000 R09: 0000000000000000
[ 524.742569][T11987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 524.742587][T11987] R13: 0000000000000000 R14: 00007fc82a1b5fa0 R15: 00007fffc4ec8a28
[ 524.742629][T11987]
[ 525.979133][T12026] FAULT_INJECTION: forcing a failure.
[ 525.979133][T12026] name failslab, interval 1, probability 0, space 0, times 0
[ 526.054478][T12026] CPU: 1 UID: 0 PID: 12026 Comm: syz.1.1411 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 526.054532][T12026] Tainted: [U]=USER
[ 526.054543][T12026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 526.054561][T12026] Call Trace:
[ 526.054572][T12026]
[ 526.054585][T12026] dump_stack_lvl+0x16c/0x1f0
[ 526.054642][T12026] should_fail_ex+0x512/0x640
[ 526.054692][T12026] ? kmem_cache_alloc_noprof+0x5a/0x3b0
[ 526.054736][T12026] should_failslab+0xc2/0x120
[ 526.054778][T12026] kmem_cache_alloc_noprof+0x6d/0x3b0
[ 526.054814][T12026] ? trace_cap_capable+0x18d/0x200
[ 526.054847][T12026] ? create_new_namespaces+0x30/0xad0
[ 526.054891][T12026] create_new_namespaces+0x30/0xad0
[ 526.054938][T12026] ? bpf_lsm_capable+0x9/0x10
[ 526.054979][T12026] ? security_capable+0x7e/0x260
[ 526.055021][T12026] unshare_nsproxy_namespaces+0xc0/0x1f0
[ 526.055064][T12026] ksys_unshare+0x45b/0xa40
[ 526.055109][T12026] ? __pfx_ksys_unshare+0x10/0x10
[ 526.055152][T12026] ? xfd_validate_state+0x5d/0x180
[ 526.055187][T12026] ? rcu_is_watching+0x12/0xc0
[ 526.055228][T12026] __x64_sys_unshare+0x31/0x40
[ 526.055273][T12026] do_syscall_64+0xcd/0x230
[ 526.055326][T12026] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 526.055361][T12026] RIP: 0033:0x7f09fdd8e969
[ 526.055387][T12026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 526.055420][T12026] RSP: 002b:00007f09fecb3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 526.055452][T12026] RAX: ffffffffffffffda RBX: 00007f09fdfb5fa0 RCX: 00007f09fdd8e969
[ 526.055474][T12026] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000008000400
[ 526.055495][T12026] RBP: 00007f09fde10ab1 R08: 0000000000000000 R09: 0000000000000000
[ 526.055516][T12026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 526.055536][T12026] R13: 0000000000000000 R14: 00007f09fdfb5fa0 R15: 00007fff3638dc98
[ 526.055580][T12026]
[ 529.292013][T12084] FAULT_INJECTION: forcing a failure.
[ 529.292013][T12084] name failslab, interval 1, probability 0, space 0, times 0
[ 529.325429][T12084] CPU: 0 UID: 0 PID: 12084 Comm: syz.2.1423 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 529.325483][T12084] Tainted: [U]=USER
[ 529.325494][T12084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 529.325512][T12084] Call Trace:
[ 529.325522][T12084]
[ 529.325535][T12084] dump_stack_lvl+0x16c/0x1f0
[ 529.325602][T12084] should_fail_ex+0x512/0x640
[ 529.325652][T12084] ? __kmalloc_noprof+0xbf/0x510
[ 529.325694][T12084] ? fib_default_rule_add+0x4f/0x420
[ 529.325736][T12084] should_failslab+0xc2/0x120
[ 529.325779][T12084] __kmalloc_noprof+0xd2/0x510
[ 529.325828][T12084] fib_default_rule_add+0x4f/0x420
[ 529.325873][T12084] fib4_rules_init+0x52/0x1c0
[ 529.325905][T12084] fib_net_init+0x1dc/0x3f0
[ 529.325945][T12084] ? __pfx___register_sysctl_table+0x10/0x10
[ 529.325987][T12084] ? __pfx_fib_net_init+0x10/0x10
[ 529.326028][T12084] ? lockdep_init_map_type+0x5c/0x280
[ 529.326075][T12084] ? do_init_timer+0xc9/0x110
[ 529.326112][T12084] ? devinet_init_net+0x5c2/0x910
[ 529.326162][T12084] ? __pfx_fib_net_init+0x10/0x10
[ 529.326201][T12084] ops_init+0x1e2/0x5f0
[ 529.326249][T12084] setup_net+0x21e/0x850
[ 529.326297][T12084] ? __pfx_setup_net+0x10/0x10
[ 529.326337][T12084] ? lockdep_init_map_type+0x5c/0x280
[ 529.326383][T12084] ? __pfx_down_read_killable+0x10/0x10
[ 529.326422][T12084] ? debug_mutex_init+0x37/0x70
[ 529.326459][T12084] copy_net_ns+0x2a6/0x5f0
[ 529.326513][T12084] create_new_namespaces+0x3ea/0xad0
[ 529.326561][T12084] unshare_nsproxy_namespaces+0xc0/0x1f0
[ 529.326612][T12084] ksys_unshare+0x45b/0xa40
[ 529.326661][T12084] ? __pfx_ksys_unshare+0x10/0x10
[ 529.326703][T12084] ? xfd_validate_state+0x5d/0x180
[ 529.326738][T12084] ? rcu_is_watching+0x12/0xc0
[ 529.326779][T12084] __x64_sys_unshare+0x31/0x40
[ 529.326825][T12084] do_syscall_64+0xcd/0x230
[ 529.326880][T12084] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 529.326913][T12084] RIP: 0033:0x7fc829f8e969
[ 529.326940][T12084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 529.326973][T12084] RSP: 002b:00007fc82adb3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 529.327005][T12084] RAX: ffffffffffffffda RBX: 00007fc82a1b6080 RCX: 00007fc829f8e969
[ 529.327027][T12084] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080
[ 529.327048][T12084] RBP: 00007fc82a010ab1 R08: 0000000000000000 R09: 0000000000000000
[ 529.327068][T12084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 529.327089][T12084] R13: 0000000000000000 R14: 00007fc82a1b6080 R15: 00007fffc4ec8a28
[ 529.327133][T12084]
[ 530.017031][T12091] hub 8-0:1.0: USB hub found
[ 530.023105][T12091] hub 8-0:1.0: 1 port detected
[ 532.429466][T12130] FAULT_INJECTION: forcing a failure.
[ 532.429466][T12130] name failslab, interval 1, probability 0, space 0, times 0
[ 532.455950][ T5847] Bluetooth: hci2: unexpected event 0x3e length: 728 > 260
[ 532.455999][ T5847] Bluetooth: hci2: unexpected subevent 0x03 length: 727 > 9
[ 532.474709][T12130] CPU: 0 UID: 0 PID: 12130 Comm: syz.2.1435 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 532.474765][T12130] Tainted: [U]=USER
[ 532.474777][T12130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 532.474796][T12130] Call Trace:
[ 532.474806][T12130]
[ 532.474820][T12130] dump_stack_lvl+0x16c/0x1f0
[ 532.474876][T12130] should_fail_ex+0x512/0x640
[ 532.474925][T12130] ? kmem_cache_alloc_node_noprof+0x5e/0x3b0
[ 532.474969][T12130] should_failslab+0xc2/0x120
[ 532.475010][T12130] kmem_cache_alloc_node_noprof+0x71/0x3b0
[ 532.475051][T12130] ? __alloc_skb+0x2b2/0x380
[ 532.475099][T12130] __alloc_skb+0x2b2/0x380
[ 532.475138][T12130] ? __pfx___alloc_skb+0x10/0x10
[ 532.475184][T12130] ? __pfx___register_sysctl_table+0x10/0x10
[ 532.475224][T12130] ? is_module_address+0x69/0xf0
[ 532.475277][T12130] inet_netconf_notify_devconf+0x8b/0x1f0
[ 532.475321][T12130] __devinet_sysctl_register+0x227/0x360
[ 532.475364][T12130] ? __pfx___devinet_sysctl_register+0x10/0x10
[ 532.475402][T12130] ? trace_kmalloc+0x2b/0xd0
[ 532.475449][T12130] ? devinet_init_net+0xeb/0x910
[ 532.475491][T12130] ? __asan_memcpy+0x3c/0x60
[ 532.475521][T12130] devinet_init_net+0x347/0x910
[ 532.475561][T12130] ? __pfx_devinet_init_net+0x10/0x10
[ 532.475600][T12130] ops_init+0x1e2/0x5f0
[ 532.475640][T12130] setup_net+0x21e/0x850
[ 532.475680][T12130] ? __pfx_setup_net+0x10/0x10
[ 532.475714][T12130] ? lockdep_init_map_type+0x5c/0x280
[ 532.475752][T12130] ? __pfx_down_read_killable+0x10/0x10
[ 532.475784][T12130] ? debug_mutex_init+0x37/0x70
[ 532.475814][T12130] copy_net_ns+0x2a6/0x5f0
[ 532.475857][T12130] create_new_namespaces+0x3ea/0xad0
[ 532.475896][T12130] unshare_nsproxy_namespaces+0xc0/0x1f0
[ 532.475931][T12130] ksys_unshare+0x45b/0xa40
[ 532.475970][T12130] ? __pfx_ksys_unshare+0x10/0x10
[ 532.476008][T12130] ? ksys_mmap_pgoff+0x85/0x5c0
[ 532.476060][T12130] __x64_sys_unshare+0x31/0x40
[ 532.476098][T12130] do_syscall_64+0xcd/0x230
[ 532.476142][T12130] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 532.476171][T12130] RIP: 0033:0x7fc829f8e969
[ 532.476195][T12130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 532.476224][T12130] RSP: 002b:00007fc82adb3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110
[ 532.476250][T12130] RAX: ffffffffffffffda RBX: 00007fc82a1b6080 RCX: 00007fc829f8e969
[ 532.476268][T12130] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080
[ 532.476284][T12130] RBP: 00007fc82a010ab1 R08: 0000000000000000 R09: 0000000000000000
[ 532.476300][T12130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 532.476317][T12130] R13: 0000000000000000 R14: 00007fc82a1b6080 R15: 00007fffc4ec8a28
[ 532.476352][T12130]
[ 533.287149][T12121] Process accounting resumed
[ 533.474126][T12138] hub 8-0:1.0: USB hub found
[ 533.482473][T12138] hub 8-0:1.0: 1 port detected
[ 535.916507][ T5847] Bluetooth: hci1: unexpected event 0x3e length: 728 > 260
[ 535.916553][ T5847] Bluetooth: hci1: unexpected subevent 0x03 length: 727 > 9
[ 536.257199][T12164] Process accounting resumed
[ 537.425421][T12193] openvswitch: HSR: Dropping previously announced user features
[ 537.617028][T12195] can: request_module (can-proto-0) failed.
[ 538.432844][T12219] FAULT_INJECTION: forcing a failure.
[ 538.432844][T12219] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 538.464458][T12219] CPU: 1 UID: 0 PID: 12219 Comm: syz.3.1458 Tainted: G U 6.15.0-syzkaller #0 PREEMPT(full)
[ 538.464510][T12219] Tainted: [U]=USER
[ 538.464521][T12219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
[ 538.464539][T12219] Call Trace:
[ 538.464549][T12219]
[ 538.464561][T12219] dump_stack_lvl+0x16c/0x1f0
[ 538.464630][T12219] should_fail_ex+0x512/0x640
[ 538.464737][T12219] _copy_from_user+0x2e/0xd0
[ 538.464769][T12219] io_uring_setup+0xb4/0x1ff0
[ 538.464819][T12219] ? __pfx_io_uring_setup+0x10/0x10
[ 538.464861][T12219] ? do_futex+0x122/0x350
[ 538.464897][T12219] ? __pfx_do_futex+0x10/0x10
[ 538.464929][T12219] ? find_held_lock+0x2b/0x80
[ 538.464962][T12219] ? rcu_read_unlock+0x17/0x60
[ 538.465025][T12219] ? rcu_is_watching+0x12/0xc0
[ 538.465063][T12219] __x64_sys_io_uring_setup+0xc2/0x170
[ 538.465109][T12219] do_syscall_64+0xcd/0x230
[ 538.465160][T12219] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 538.465191][T12219] RIP: 0033:0x7ff93d58e969
[ 538.465217][T12219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[ 538.465249][T12219] RSP: 002b:00007ff93e490038 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9
[ 538.465279][T12219] RAX: ffffffffffffffda RBX: 00007ff93d7b6080 RCX: 00007ff93d58e969
[ 538.465300][T12219] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000048
[ 538.465317][T12219] RBP: 00007ff93d610ab1 R08: 0000000000000000 R09: 0000000000000000
[ 538.465336][T12219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 538.465353][T12219] R13: 0000000000000000 R14: 00007ff93d7b6080 R15: 00007ffcf09a3d78
[ 538.465393][T12219]
[ 538.662781][T12225] bridge0: port 5(veth0_to_bridge) entered blocking state
[ 538.670519][T12225] bridge0: port 5(veth0_to_bridge) entered disabled state
[ 538.677968][T12225] veth0_to_bridge: entered allmulticast mode
[ 538.700636][T12225] veth0_to_bridge: entered promiscuous mode
[ 538.710609][T12225] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 538.744921][T12225] bridge0: port 5(veth0_to_bridge) entered blocking state
[ 538.752292][T12225] bridge0: port 5(veth0_to_bridge) entered forwarding state
[ 543.476523][T12304] Bluetooth: hci0: Opcode 0x0c1a failed: -4
[ 543.483201][T12301] syz.1.1481 (12301) used greatest stack depth: 19912 bytes left
[ 543.505313][T12304] Bluetooth: hci1: Opcode 0x0c1a failed: -4
[ 543.542906][T12304] Bluetooth: hci3: Opcode 0x0c1a failed: -4
[ 543.557714][T12304] Bluetooth: hci3: Opcode 0x0406 failed: -4
[ 543.581937][T12304] Bluetooth: hci2: Opcode 0x0c1a failed: -4
[ 545.078741][ T5847] Bluetooth: hci0: command 0x0406 tx timeout
[ 545.553810][ T5847] Bluetooth: hci3: command 0x0406 tx timeout
[ 545.560297][ T5847] Bluetooth: hci1: command 0x0406 tx timeout
[ 545.624645][T12345] Bluetooth: hci2: command 0x0406 tx timeout
[ 547.834432][T12345] Bluetooth: hci3: command 0x0406 tx timeout
[ 556.764354][ C0] sched: DL replenish lagged too much
[ 576.366394][ T1300] ieee802154 phy0 wpan0: encryption failed: -22
[ 576.620929][ T1300] ieee802154 phy1 wpan1: encryption failed: -22
[ 587.542799][T12228] Process accounting paused
[ 604.047936][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 604.064250][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 604.080510][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 604.096546][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 604.112616][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 604.128559][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 604.144711][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 604.161417][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 604.177411][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 604.193450][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 609.056812][ C1] net_ratelimit: 1180 callbacks suppressed
[ 609.056842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 609.079046][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 609.095194][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 609.111374][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 609.128199][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 609.144548][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 609.167366][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 609.185105][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 609.201670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 609.218575][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 614.067489][ C1] net_ratelimit: 1208 callbacks suppressed
[ 614.067517][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 614.089481][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 614.105768][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 614.122638][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 614.139647][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 614.156191][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 614.172393][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 614.188670][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 614.205433][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 614.221402][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 619.075834][ C1] net_ratelimit: 1181 callbacks suppressed
[ 619.075863][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 619.097920][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 619.114664][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 619.130760][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 619.147495][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 619.163756][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 619.179807][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 619.195981][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 619.212609][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 619.229253][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 624.087980][ C1] net_ratelimit: 1215 callbacks suppressed
[ 624.088009][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 624.109988][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 624.126530][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 624.142812][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 624.158986][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 624.176467][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 624.192835][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 624.209227][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 624.225935][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 624.242041][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 629.094882][ C1] net_ratelimit: 1143 callbacks suppressed
[ 629.094919][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 629.117185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 629.134065][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 629.151175][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 629.167588][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 629.185534][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 629.202081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 629.219525][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 629.235748][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 629.252204][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 634.105187][ C1] net_ratelimit: 2431 callbacks suppressed
[ 634.105215][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 634.124001][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 634.140639][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 634.153738][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 634.166683][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 634.182573][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 634.195528][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 634.208469][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 634.224413][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 634.237506][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 636.186417][ T1300] ieee802154 phy0 wpan0: encryption failed: -22
[ 636.215465][ T1300] ieee802154 phy1 wpan1: encryption failed: -22
[ 639.115145][ C1] net_ratelimit: 2610 callbacks suppressed
[ 639.115174][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 639.137714][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 639.150754][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 639.163740][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 639.179699][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 639.192712][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 639.205781][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 639.221824][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 639.234967][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 639.248112][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 644.125029][ C1] net_ratelimit: 2568 callbacks suppressed
[ 644.125057][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 644.144109][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 644.157204][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 644.172931][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 644.185813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 644.199320][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 644.214881][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 644.227826][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 644.240734][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 644.256391][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 649.135242][ C1] net_ratelimit: 2537 callbacks suppressed
[ 649.135272][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 649.154256][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 649.167252][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 649.182925][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 649.195902][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 649.209054][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 649.224911][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 649.237847][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 649.250891][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 649.266499][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 654.146906][ C1] net_ratelimit: 2684 callbacks suppressed
[ 654.146933][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 654.165827][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 654.178782][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 654.194570][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 654.207471][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 654.220605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 654.236617][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 654.249657][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 654.262565][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 654.278132][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 659.155341][ C1] net_ratelimit: 2844 callbacks suppressed
[ 659.155371][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 659.175104][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 659.188049][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 659.201017][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 659.215944][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 659.229973][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 659.243023][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 659.256024][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 659.270849][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 659.294565][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 664.166765][ C1] net_ratelimit: 3066 callbacks suppressed
[ 664.166794][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 664.186385][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 664.199275][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 664.212272][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 664.227269][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 664.241317][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 664.254385][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 664.267458][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 664.282215][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 664.295991][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 669.174385][ C1] net_ratelimit: 3301 callbacks suppressed
[ 669.174414][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 669.195288][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 669.209423][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 669.222387][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 669.235347][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 669.250327][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 669.264355][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 669.277056][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 669.290221][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 669.305365][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 674.184895][ C1] net_ratelimit: 2903 callbacks suppressed
[ 674.184923][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 674.204788][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 674.217733][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 674.230805][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 674.246387][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 674.260312][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 674.273325][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 674.286337][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 674.301296][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 674.315273][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 679.195545][ C1] net_ratelimit: 2938 callbacks suppressed
[ 679.195574][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 679.215230][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 679.228165][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 679.241196][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 679.256097][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 679.269933][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 679.282914][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 679.295842][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 679.310559][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 679.324361][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 684.205771][ C1] net_ratelimit: 2863 callbacks suppressed
[ 684.205802][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 684.224588][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 684.237587][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 684.256407][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 684.270405][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 684.284246][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 684.297472][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 684.312543][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 684.326355][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 684.339405][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 689.215185][ C1] net_ratelimit: 2760 callbacks suppressed
[ 689.215213][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 689.237547][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 689.251716][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 689.264813][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 689.278008][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 689.293176][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 689.307144][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 689.320840][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 689.334031][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 689.349416][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 694.224612][ C1] net_ratelimit: 2847 callbacks suppressed
[ 694.224643][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 694.244593][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 694.258043][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 694.271600][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 694.288578][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 694.305048][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 694.318174][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 694.331424][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 694.346846][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 694.361293][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 698.573117][ T1300] ieee802154 phy0 wpan0: encryption failed: -22
[ 699.234596][ C1] net_ratelimit: 2850 callbacks suppressed
[ 699.234622][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 699.254660][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 699.268015][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 699.281091][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 699.296214][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 699.310423][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 699.323618][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 699.337055][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 699.352277][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 699.367352][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 704.245010][ C1] net_ratelimit: 2884 callbacks suppressed
[ 704.245037][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 704.263899][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 704.279110][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 704.293029][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 704.306058][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 704.319081][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 704.334179][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 704.348149][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 704.361185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 704.374185][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 704.655526][ T1300] ieee802154 phy1 wpan1: encryption failed: -22
[ 709.254343][ C1] net_ratelimit: 2876 callbacks suppressed
[ 709.254373][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 709.274167][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 709.287332][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 709.300430][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 709.316793][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 709.331300][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 709.344452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 709.357918][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 709.373081][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 709.387058][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 714.264553][ C1] net_ratelimit: 2931 callbacks suppressed
[ 714.264581][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 714.283452][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 714.296447][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 714.311641][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 714.325807][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 714.338845][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 714.352216][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 714.367489][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 714.381419][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 714.394649][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 717.804277][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
[ 717.811316][ C0] rcu: Tasks blocked on level-0 rcu_node (CPUs 0-1): P12215/1:b..l
[ 717.819893][ C0] rcu: (detected by 0, t=10503 jiffies, g=64853, q=1637 ncpus=2)
[ 717.827771][ C0] task:syz.3.1458 state:R running task stack:23608 pid:12215 tgid:12215 ppid:5837 task_flags:0x40064c flags:0x00404002
[ 717.842787][ C0] Call Trace:
[ 717.846134][ C0]
[ 717.849119][ C0] __schedule+0x116f/0x5de0
[ 717.853820][ C0] ? lock_acquire+0x179/0x350
[ 717.858581][ C0] ? __pfx___schedule+0x10/0x10
[ 717.863531][ C0] preempt_schedule_irq+0x51/0x90
[ 717.868679][ C0] irqentry_exit+0x36/0x90
[ 717.873251][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20
[ 717.879295][ C0] RIP: 0010:lock_release+0x183/0x2f0
[ 717.884660][ C0] Code: 0f c1 05 28 23 0c 12 83 f8 01 0f 85 1d 01 00 00 9c 58 f6 c4 02 0f 85 08 01 00 00 41 f7 c5 00 02 00 00 74 01 fb 48 8b 44 24 10 <65> 48 2b 05 7d e5 0b 12 0f 85 58 01 00 00 48 83 c4 18 5b 41 5c 41
[ 717.904338][ C0] RSP: 0018:ffffc9000b47ef88 EFLAGS: 00000206
[ 717.910647][ C0] RAX: 29bed4a2d642fd00 RBX: ffffffff8e3bfa80 RCX: ffffc9000b47ef94
[ 717.918702][ C0] RDX: 0000000000000000 RSI: ffffffff8dbb8f28 RDI: ffffffff8bf48da0
[ 717.926997][ C0] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000
[ 717.935151][ C0] R10: 0000000000000000 R11: 000000000000fc71 R12: ffffffff81699d54
[ 717.943357][ C0] R13: 0000000000000206 R14: ffff88802735da00 R15: 0000000000000001
[ 717.951388][ C0] ? unwind_next_frame+0x3f4/0x20a0
[ 717.956681][ C0] unwind_next_frame+0x3f9/0x20a0
[ 717.961801][ C0] ? shmem_undo_range+0x58f/0x1150
[ 717.966989][ C0] ? __pfx_stack_trace_consume_entry+0x10/0x10
[ 717.973206][ C0] arch_stack_walk+0x94/0x100
[ 717.977961][ C0] ? shmem_evict_inode+0x3a1/0xbe0
[ 717.983144][ C0] stack_trace_save+0x8e/0xc0
[ 717.987888][ C0] ? __pfx_stack_trace_save+0x10/0x10
[ 717.993421][ C0] ? __lock_acquire+0x5ca/0x1ba0
[ 717.998441][ C0] save_stack+0x160/0x1f0
[ 718.003268][ C0] ? __pfx_save_stack+0x10/0x10
[ 718.008181][ C0] ? free_unref_folios+0x999/0x1630
[ 718.013437][ C0] ? folios_put_refs+0x56f/0x740
[ 718.018451][ C0] ? shmem_undo_range+0x58f/0x1150
[ 718.023648][ C0] ? page_ext_put+0x3e/0xd0
[ 718.028229][ C0] __reset_page_owner+0x84/0x1a0
[ 718.033241][ C0] free_unref_folios+0x999/0x1630
[ 718.038331][ C0] ? rcu_is_watching+0x12/0xc0
[ 718.043149][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80
[ 718.049031][ C0] folios_put_refs+0x56f/0x740
[ 718.053965][ C0] ? __pfx_folios_put_refs+0x10/0x10
[ 718.059330][ C0] ? folio_batch_remove_exceptionals+0x115/0x1a0
[ 718.065745][ C0] shmem_undo_range+0x58f/0x1150
[ 718.070762][ C0] ? __pfx_shmem_undo_range+0x10/0x10
[ 718.076241][ C0] ? find_held_lock+0x2b/0x80
[ 718.080980][ C0] ? is_bpf_text_address+0x8a/0x1a0
[ 718.086332][ C0] ? bpf_ksym_find+0x124/0x1c0
[ 718.091217][ C0] ? stack_trace_save+0x8e/0xc0
[ 718.096135][ C0] shmem_evict_inode+0x3a1/0xbe0
[ 718.101146][ C0] ? __pfx_shmem_evict_inode+0x10/0x10
[ 718.106945][ C0] ? __pfx_inode_wait_for_writeback+0x10/0x10
[ 718.113084][ C0] ? find_held_lock+0x2b/0x80
[ 718.117826][ C0] ? evict+0x3a2/0x920
[ 718.121981][ C0] ? __pfx_shmem_evict_inode+0x10/0x10
[ 718.127524][ C0] evict+0x3e3/0x920
[ 718.131486][ C0] ? __pfx_evict+0x10/0x10
[ 718.135973][ C0] ? iput+0x519/0x880
[ 718.140021][ C0] iput+0x521/0x880
[ 718.143886][ C0] ? __pfx_generic_delete_inode+0x10/0x10
[ 718.149700][ C0] dentry_unlink_inode+0x29c/0x480
[ 718.154881][ C0] __dentry_kill+0x1d0/0x600
[ 718.159629][ C0] dput.part.0+0x4b1/0x9b0
[ 718.164210][ C0] dput+0x1f/0x30
[ 718.167898][ C0] __fput+0x51c/0xb70
[ 718.171970][ C0] task_work_run+0x150/0x240
[ 718.176632][ C0] ? __pfx_task_work_run+0x10/0x10
[ 718.181821][ C0] ? do_raw_spin_unlock+0x172/0x230
[ 718.187109][ C0] do_exit+0xafb/0x2c30
[ 718.191347][ C0] ? proc_coredump_connector+0x2d1/0x4f0
[ 718.197059][ C0] ? __pfx_do_exit+0x10/0x10
[ 718.201732][ C0] do_group_exit+0xd3/0x2a0
[ 718.206321][ C0] get_signal+0x2673/0x26d0
[ 718.210924][ C0] ? force_sig_fault+0xc4/0x100
[ 718.215894][ C0] ? __pfx_get_signal+0x10/0x10
[ 718.220923][ C0] arch_do_signal_or_restart+0x8f/0x7a0
[ 718.226554][ C0] ? trace_irq_disable.constprop.0+0xd4/0x120
[ 718.232722][ C0] ? __pfx_arch_do_signal_or_restart+0x10/0x10
[ 718.239163][ C0] irqentry_exit_to_user_mode+0x13f/0x280
[ 718.244974][ C0] asm_exc_page_fault+0x26/0x30
[ 718.249882][ C0] RIP: 0033:0x20fff
[ 718.253757][ C0] RSP: 002b:0000000000000010 EFLAGS: 00010286
[ 718.259884][ C0] RAX: 0000000000000000 RBX: 00007ff93d7bbea0 RCX: 00007ff93d58e969
[ 718.267914][ C0] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000005
[ 718.276379][ C0] RBP: 00007ff93d610ab1 R08: 0000000000000008 R09: 0000000000000000
[ 718.284410][ C0] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000000
[ 718.292524][ C0] R13: 0000000000000000 R14: 00007ff93d7b5fa0 R15: 00007ffcf09a3d78
[ 718.300575][ C0]
[ 718.493315][ T31] INFO: task kworker/u8:2:36 blocked for more than 146 seconds.
[ 718.526504][ T31] Tainted: G U 6.15.0-syzkaller #0
[ 718.533693][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 719.274755][ C1] net_ratelimit: 2918 callbacks suppressed
[ 719.274782][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 719.293630][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 719.306626][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 719.321519][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 719.335466][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 719.348532][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 719.361720][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 719.376894][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 719.391239][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 719.404210][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 724.287202][ C1] net_ratelimit: 2949 callbacks suppressed
[ 724.287232][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 724.306966][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 724.319970][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 724.332931][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 724.348245][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 724.362340][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 724.375407][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)
[ 724.388379][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:46:b4:61:60:e7:e6, vlan:0)
[ 724.403653][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0)
[ 724.417505][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0)