last executing test programs: 6m48.269316133s ago: executing program 0 (id=6734): mmap$auto(0x0, 0x2000d, 0x4000000200df, 0xeb1, 0x404, 0x8000) close_range$auto(0x2, 0x8, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000040)='/proc/fs/cifs/SecurityFlags\x00', 0x48041, 0x0) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000180)='/sys/devices/virtual/net/bond0/bonding/peer_notif_delay\x00', 0x68880, 0x0) sendmmsg$auto(r0, &(0x7f0000000080)={{0x0, 0x1c03, 0x0, 0x3, 0x0, 0x0, 0xd}, 0x7}, 0x1, 0x6) read$auto(r1, 0x0, 0x3) writev$auto(0x3, &(0x7f0000000080)={0x0, 0x1}, 0x3) 6m47.999222528s ago: executing program 0 (id=6737): openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x0) madvise$auto(0x0, 0xffffffffffff0001, 0x15) madvise$auto(0x0, 0x2000040080000004, 0xe) socket$auto(0x80000000, 0x497e, 0x6) r0 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cec8\x00', 0x0, 0x0) ioctl$auto_CEC_DQEVENT(r0, 0xc0506107, 0x0) ioctl$auto_CEC_DQEVENT(r0, 0xc0506107, 0x0) 6m46.384567839s ago: executing program 0 (id=6754): openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ram7\x00', 0x14f602, 0x0) mmap$auto(0x0, 0x810004, 0xffb, 0x8000000008011, 0x3, 0x0) madvise$auto(0x0, 0xffffffffffff0001, 0x15) madvise$auto(0x0, 0x2000040080000004, 0xe) socket$auto(0x80000000, 0x497e, 0x6) r0 = openat$auto_cec_devnode_fops_cec_priv(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cec8\x00', 0x0, 0x0) ioctl$auto_CEC_DQEVENT(r0, 0xc0506107, 0x0) ioctl$auto_CEC_DQEVENT(r0, 0xc0506107, 0x0) 6m45.167777378s ago: executing program 0 (id=6751): close_range$auto(0x2, 0x8, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = socket(0x2, 0x3, 0x6) lsm_list_modules$auto(0x0, 0x0, 0x0) close_range$auto(0x2, 0x8, 0x0) open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x401c5820, 0x0) mkdir$auto(0x0, 0x353) 6m44.296862448s ago: executing program 0 (id=6758): mmap$auto(0x0, 0xa, 0xdb, 0x9b72, 0x5, 0x8000) syz_clone3(&(0x7f00000004c0)={0x2000000, 0x0, 0x0, 0x0, {0x21}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket(0x1d, 0x2, 0x6) r1 = socket(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$auto(r0, &(0x7f0000000040)=@can={0x1d, r2, 0xfd}, 0x6a) sendmsg$auto_NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={0x0, 0x21}}, 0x40) sendmsg$auto_GTP_CMD_NEWPDP(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x200, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x48000}, 0x800) 6m42.994226296s ago: executing program 0 (id=6764): socket(0x2, 0x1, 0x0) mmap$auto(0x0, 0x400008, 0x5f, 0x9b72, 0x2, 0x8000) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) shmctl$auto_SHM_UNLOCK(0xfffffffc, 0xc, 0x0) io_uring_setup$auto(0x3, 0x0) setsockopt$auto(0x3, 0x1, 0xd, 0x0, 0x9) close_range$auto(0x2, 0xffffffffffffffff, 0x0) 6m42.757350368s ago: executing program 32 (id=6764): socket(0x2, 0x1, 0x0) mmap$auto(0x0, 0x400008, 0x5f, 0x9b72, 0x2, 0x8000) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x54) shmctl$auto_SHM_UNLOCK(0xfffffffc, 0xc, 0x0) io_uring_setup$auto(0x3, 0x0) setsockopt$auto(0x3, 0x1, 0xd, 0x0, 0x9) close_range$auto(0x2, 0xffffffffffffffff, 0x0) 9.66025057s ago: executing program 3 (id=8627): close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual/tty/ttyaa/power/control\x00', 0x141042, 0x0) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) close_range$auto(0x2, 0x8, 0x0) r1 = socketcall$auto(0x4000009, 0x0) r2 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f00000011c0), 0xe0180, 0x0) ioctl$auto_KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$auto(0x3, 0xae41, r1) ioctl$auto_KVM_GET_MSRS(r0, 0x4008ae89, &(0x7f00000000c0)={0xdf, 0x0, [{0x40000003, 0x3ff, 0x2}]}) 9.168521763s ago: executing program 3 (id=8629): r0 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x20342, 0x0) ioctl$auto_SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) write$auto(0xca, &(0x7f00000001c0)='\x04>V\x1b\x89\x0ek\x19&\xb4?[\x00\x00\x01\x00\xb6\x00'/31, 0x169) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) io_uring_setup$auto(0xa, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) r1 = socket(0xa, 0x801, 0x84) getsockopt$auto(r1, 0x84, 0x84, 0x0, &(0x7f0000000000)=0x9000c) socket(0x26, 0x80805, 0x0) socket(0xa, 0x3, 0x6) 8.935654189s ago: executing program 4 (id=8630): unshare$auto(0x40000080) mmap$auto(0x0, 0x4020009, 0x3, 0xeb1, 0xffffffffffffffff, 0x8000) socket(0x2, 0x80002, 0x73) clone$auto(0x20003b46, 0x2, 0x0, 0x0, 0x2) close_range$auto(0x2, 0x8, 0x0) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, 0x0, 0x140, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x161342, 0x130) fallocate$auto(0x8000000000000003, 0x0, 0x9, 0x4cbd5d) fchmod$auto(r0, 0xa) open(&(0x7f0000000000)='./file0\x00', 0x161342, 0x100) 7.981095297s ago: executing program 3 (id=8631): mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) socket(0xa, 0x1, 0x84) bind$auto(0x3, &(0x7f0000000040)=@in={0x2, 0x3, @empty}, 0x6a) r0 = pidfd_open$auto(0x1, 0x0) setns(r0, 0x60020000) madvise$auto(0x0, 0x7fffffffffffffff, 0xa) syz_clone3(&(0x7f0000000300)={0x153326100, 0x0, 0x0, 0x0, {0x23}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0xa7) connect$auto(0x3, &(0x7f0000000080)=@in={0x2, 0x3, @dev={0xac, 0x14, 0x14, 0x10}}, 0x55) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) setsockopt$auto(0x3, 0x1, 0x20, 0x0, 0x9) 7.140886627s ago: executing program 4 (id=8638): openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$auto_posix_clock_file_operations_posix_clock(0xffffffffffffffff, 0xc0403d11, 0x0) prctl$auto(0x3e, 0x1, 0x0, 0x1, 0x0) openat$auto_snd_rawmidi_f_ops_rawmidi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/midiC2D0\x00', 0x1, 0x0) close_range$auto(0x0, 0xfffffffffffff001, 0x2) socket(0x11, 0x80003, 0x300) socket(0x29, 0x5, 0x0) open(&(0x7f0000000040)='./cgroup\x00', 0x80, 0xb5d1af1605322de0) openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sda1\x00', 0x0, 0x0) sendfile$auto(0x1, 0x3, 0x0, 0x7ffff000) 5.234846103s ago: executing program 4 (id=8642): r0 = openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x20342, 0x0) ioctl$auto_SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000000)) write$auto(0xca, &(0x7f00000001c0)='\x04>V\x1b\x89\x0ek\x19&\xb4?[\x00\x00\x01\x00\xb6\x00'/31, 0x169) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) io_uring_setup$auto(0xa, 0x0) readv$auto(0x3, &(0x7f0000000a80)={0x0, 0xffff}, 0x1) r1 = socket(0xa, 0x801, 0x84) getsockopt$auto(r1, 0x84, 0x84, 0x0, &(0x7f0000000000)=0x9000c) socket(0x26, 0x80805, 0x0) socket(0xa, 0x3, 0x6) 4.510445491s ago: executing program 3 (id=8646): mmap$auto(0x0, 0x2020009, 0x3, 0x800000000000eb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) io_uring_setup$auto(0x82, 0x0) socket(0x2, 0x1, 0x0) socket(0x2, 0x5, 0x0) r0 = epoll_create$auto(0x7) r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$auto(0x5, 0x1, r1, 0x0) mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) epoll_wait$auto(r0, 0x0, 0xe007, 0x1) 4.099151749s ago: executing program 3 (id=8649): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) close_range$auto(0x2, 0x8, 0x0) memfd_create$auto(0x0, 0xe) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ram10\x00', 0x60742, 0x0) write$auto(r0, &(0x7f0000000000)='//\xf2\x00', 0x80000000) mmap$auto(0x0, 0x810006, 0xffb, 0x8000000008011, 0x3, 0x0) close_range$auto(0x2, 0x8, 0x0) sendmsg$auto_NETDEV_CMD_DEV_GET(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x48004}, 0x4050) io_uring_setup$auto(0x6, 0x0) io_uring_register$auto(0x2, 0x0, &(0x7f0000000000), 0x3) 3.874114086s ago: executing program 4 (id=8650): openat$auto_proc_iter_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000400)='/proc/comedi\x00', 0xa0000, 0x0) mmap$auto(0x0, 0x4020009, 0xdf, 0xeb1, 0x401, 0x8000) syz_genetlink_get_family_id$auto_l2tp(0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000100)='.\x00', 0x595002, 0x408) write$auto(r0, 0x0, 0xfffffdf1) linkat$auto(r0, 0x0, 0xffffffffffffff9c, &(0x7f0000000080)='&&\x00', 0x1000) mount$auto(0x0, &(0x7f00000000c0)='.\x00', &(0x7f0000000100)='nfsd\x00\xee\x1a\x8f\xa2~?\xe2\x82fg\xb3G\xbe\xc8\x12\xae\xc3\xc0@[\x99\xec\xbf(\xec\xc3\xb2\xf2\x15Zi\xc4S6\'\x14\x05\t\x8c\xd5?\xa0\x00\xd8\xe4\xafW\xcc\xa3\xce\tI\x95\xe12\xaclJ\xba\xeb\xe4\x83Z\xaev\xd7\xd9\xdd_\x14O\x84\xaa\x13W\xb7\x06\'fvQ\x95\xc5\xd1\x98\xe3T\xcdfk\xc7\xe9\x96\r\x91\xb0\xc46\xf2\xfc\xef\xfe\xa0\xc9d\xb3h$\xeb\xad\xa4P\x8f\xc3bM{4RQ\x00\x9d)_\xd81(\x03\xfd\rw\xca1\x88|\xe5\x1e\x10\x89X\x01\xe9\xf6g\x95xx\xaf\xa9~m\x05\xe1\xa8\xda\x80\xc5\x8f\xb41\x81\xf0\xa3\xa2\xe4\x81\xb9\x92\xda\x13\xfe5\xfb\xc6\xd8>\x01\xd4\x14', 0x7, 0x0) mount$auto(0x0, &(0x7f00000000c0)='.\x00', &(0x7f0000000180)='nfsd\x00', 0x8, 0x0) getxattrat$auto(r0, 0x0, 0x47d, 0x0, &(0x7f0000000200)={0xc, 0x1, 0x5}, 0x1ff) mprotect$auto(0x0, 0x8000000000000001, 0x8) 3.552598247s ago: executing program 2 (id=8652): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0xb60) pwrite64$auto(0xffffffffffffffff, 0x0, 0x400000, 0xc) socket(0xa, 0x5, 0x84) r0 = gettid() prlimit64$auto(r0, 0x6, &(0x7f00000000c0)={0x5, 0x945}, &(0x7f0000000240)={0x4f7}) mbind$auto(0x2000, 0x100000008, 0x2100000000, 0x0, 0x6, 0x2) accept4$auto(0xffffffffffffffff, 0x0, 0x0, 0xffffffff) mprotect$auto(0x0, 0x806121, 0x8) 3.549956255s ago: executing program 1 (id=8660): sendmmsg$auto(0xffffffffffffffff, &(0x7f00000006c0)={{0x0, 0x5ac, &(0x7f0000000100)={&(0x7f0000000200), 0x49}, 0x5, 0x0, 0x5, 0x1}, 0x5}, 0x2, 0x100) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket(0x1e, 0x4, 0x0) r0 = socket(0x1e, 0x4, 0x0) get_robust_list$auto(0x0, 0x0, 0x0) setsockopt$auto(r0, 0x10f, 0x87, 0x0, 0x14) setsockopt$auto(0x3, 0x10f, 0x87, 0x0, 0x14) sendmmsg$auto(0x3, &(0x7f0000000080)={{0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x9}, 0x7}, 0x3, 0x0) 3.007159604s ago: executing program 1 (id=8653): mmap$auto(0x0, 0x20009, 0x7, 0x40000000000eb1, 0xffffffffffffffff, 0x8000) write$auto(0xffffffffffffffff, &(0x7f0000000080)='0\x00\xa6\xcc\r\x91QU\x9dI\xda\x1b\xad\xb1\x9e\xc8Tt\xa8\x94\x9c\x8a\xe2\xc7cOM\xb6\xa3,!o\x9e\xb0\xadT\xfbR\xa1Y\x94V[8\x04c\xdf:]\xd9\x94&\x81\xe2\x13\x8f\xea#\xf8F\xbbOO]e[\xbb\xf9\xcd\xc0\xc9\x00\xda\xac\xdd\x1a\xdd\xdd\xb9o\x1a\xab\xd5\b\xc1\x04z\xd0I>\x8f\x00\xe5\x1c*\xed`\xfd\x15\x88\x0f\x9a\xd5\xa7\x14\f};\xabt\xd1ak\xe5\x98\xea\xe3}\x10\xab\f_\x19\x9b\x11\xb25VUK\x93\xcdd\x17\xe4\xcbA\xa5[\b\xb8;\x02tcf\x06\xfbD\x91\xcaG\xdaa:k[r\x06\xeb\xf0\xc4\xcb\x10\xae\xc8\xe9u\x9f\xdeK\xa5\x8e\xd6\x8f\xd0UV\x11\xcb\xdd\x81\xbe\xdeL/\x06(\x1d\xa5\xc5\x9b\xb2\x96\x05`\xe7\xd5Y\a\xc1\xe9(', 0xa) bind$auto(0x3, &(0x7f0000000040)=@tipc=@name={0x1e, 0x2, 0x3, {{0x41, 0x3}, 0x4}}, 0x6a) r0 = getpid() process_vm_readv$auto(r0, &(0x7f0000000000)={0x0, 0xfff}, 0x1, &(0x7f0000000280)={&(0x7f0000000040), 0xffffffff}, 0x6, 0x0) close_range$auto(0x2, 0x8, 0x0) openat$auto_snd_pcm_oss_f_reg_pcm_oss(0xffffffffffffff9c, 0x0, 0x20b42, 0x0) r1 = socket(0x1d, 0x3, 0x1) setsockopt$auto(r1, 0x65, 0x1, 0x0, 0x800) bind$auto(0x3, &(0x7f0000000040)=@can={0x1d, 0x0, 0xfd}, 0x6a) 2.693502209s ago: executing program 2 (id=8654): mmap$auto(0x0, 0x4, 0x4000000000df, 0x78, 0xffffffffffffffff, 0x300000000000) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x1, 0x0) socket(0xa, 0x3, 0x3a) epoll_create$auto(0x2) r0 = epoll_create$auto(0x2) epoll_pwait2$auto(r0, 0x0, 0x8, &(0x7f0000002780)={0x10000000000, 0x5}, 0x0, 0x8) sysfs$auto(0x2, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$auto(0x5, 0x1, r1, 0x0) 2.616959585s ago: executing program 1 (id=8655): openat$auto_console_fops_tty_io(0xffffffffffffff9c, 0x0, 0x4000, 0x0) mmap$auto(0x0, 0x4, 0x4000000000df, 0x40eb1, 0x401, 0x300000000000) sysfs$auto(0x2, 0x23, 0x0) openat$auto_ftrace_set_event_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/tracing/set_event\x00', 0x20201, 0x0) mmap$auto(0x0, 0x20009, 0x10000000000df, 0xeb2, 0x8000000401, 0x8000) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, 0x0, 0x840, 0x0) ioctl$auto(r0, 0x5608, 0x7) r1 = socket(0x11, 0x80003, 0x300) setsockopt$auto(r1, 0x107, 0x14, 0x0, 0x4) sendto$auto(r1, 0x0, 0x13, 0xc, &(0x7f0000000000)=@tipc=@name={0x1e, 0x2, 0x3, {{0x41, 0x4}, 0x2}}, 0x1e) 2.513433066s ago: executing program 4 (id=8656): socket$nl_generic(0x10, 0x3, 0x10) write$auto_proc_mem_operations_base(0xffffffffffffffff, &(0x7f0000000880)="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", 0x9e1) mmap$auto(0x0, 0x20009, 0xdf, 0xeb1, 0x40000000000a5, 0x8) ioctl$auto_FIOASYNC(0xffffffffffffffff, 0x5452, 0x80000000000000) mbind$auto(0x2e, 0x8, 0x3, 0x0, 0xfffffffffffff001, 0x5) sendmsg$auto_NL80211_CMD_DEL_PMKSA(0xffffffffffffffff, 0x0, 0x20048080) openat$auto_mon_fops_text_t_mon_text(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/usb/usbmon/9t\x00', 0x800, 0x0) r0 = openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zram0\x00', 0x6e642, 0x0) openat$auto_autofs_root_operations_autofs_i(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/ieee80211/phy16\x00', 0x120100, 0x0) write$auto(r0, &(0x7f0000000400)='odev/audio1\x00', 0x100000a3d9) 2.340435889s ago: executing program 2 (id=8657): mmap$auto(0x0, 0x2020009, 0x3, 0x90, 0x8000000000000000, 0x8000) capget$auto(0x0, 0xfffffffffffffffe) capset$auto(0x0, &(0x7f0000000180)={0x1, 0x7, 0x6}) r0 = openat$auto_tty_fops_tty_io(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty12\x00', 0x20800, 0x0) ioctl$auto(r0, 0x4b64, r0) r1 = openat$auto_usbdev_file_operations_usb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/bus/usb/038/001\x00', 0x201, 0x0) r2 = openat$auto_proc_mem_operations_base(0xffffffffffffff9c, &(0x7f0000001640)='/proc/self/mem\x00', 0x401, 0x0) writev$auto(r2, &(0x7f0000000140)={0x0, 0x8}, 0x3) ioctl$auto_USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000540)={0x0, 0x6, "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"}) ioctl$auto_USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000040)={0x0, 0x10001}) 2.284819032s ago: executing program 3 (id=8658): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) r0 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual/block/ram6/queue/max_hw_sectors_kb\x00', 0x80000, 0x0) read$auto(r0, 0x0, 0x20) r1 = openat$auto_proc_fail_nth_operations_base(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/fail-nth\x00', 0x802, 0x0) writev$auto(r1, &(0x7f0000000200)={0x0, 0x7}, 0x3) openat$auto_tracing_err_log_fops_trace(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r2 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snd/controlC2\x00', 0x8100, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000180)=0x7) r3 = openat$auto_snd_ctl_f_ops_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snd/controlC2\x00', 0x80, 0x0) ioctl$auto_SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000580)={{@raw=0x7fffffff, 0xf0ee, 0x20009, 0x3, "790eaa00ffff8eac2cdafc1f64010043eeb0b053030001ffff000e00", @raw=0x5}, 0x4, 0x966, 0x3, @raw=0x404, @integer64={0xc, 0xeb1e, 0x34}, "6cc1294d63a4f1b4285854c5368de438f8cc142ef6df12bf3373a1183bedbd31b642b4051b078fa1c1c61c329794e5311121c760cb9611c78e6947a99807bcc1"}) 2.14357219s ago: executing program 1 (id=8659): unshare$auto(0x40000080) unshare$auto(0x93a3) socket(0x2c, 0x1, 0x0) mmap$auto(0x0, 0x400008, 0xdf, 0x9b72, 0x2, 0x8000) r0 = openat$auto_kvm_chardev_ops_kvm_main(0xffffffffffffff9c, &(0x7f0000000140), 0x8f00, 0x0) ioctl$auto_KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$auto_NL80211_CMD_SET_COALESCE(0xffffffffffffffff, 0x0, 0x80) r1 = openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/memory.limit_in_bytes\x00', 0x182b02, 0x0) sendfile$auto(r1, r1, 0x0, 0x3) close_range$auto(0x2, 0x8, 0x0) 1.500498013s ago: executing program 2 (id=8661): statmount$auto(0x0, &(0x7f0000000180)={0xa, 0x1, 0xb267, 0x759, 0x5, 0x81, 0x1ffde, 0x7, 0xfffffffffffffffd, 0x8, 0x9, 0x80003, 0x4, 0x200000000005, 0x384, 0x9, 0xb14, 0x10006, 0x4000083, 0x7, 0x0, 0xe, 0x21ff9, 0x200, 0x0, 0x84, 0x0, 0x0, 0x3, 0x0, 0xac79, [0x0, 0x7, 0x0, 0x25c3, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x3, 0x3, 0x0, 0x0, 0x80000000, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x40000000000004ac, 0x100000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x196fc46e, 0x2, 0xffffffffffffdfff, 0x0, 0x80000001, 0x0, 0x40000000000, 0x4, 0x0, 0x101, 0x0, 0x0, 0xffffffffffdffffd]}, 0x1fa, 0x11) r0 = openat$auto__ctl_fops_dm_ioctl(0xffffffffffffff9c, &(0x7f0000000000), 0x28002, 0x0) r1 = openat$auto_ftrace_event_format_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000640)='/sys/kernel/tracing/events/vmalloc/alloc_vmap_area/format\x00', 0x40, 0x3f) pread64$auto(r1, &(0x7f0000000300)='/sys/kernel/tracing/events/vmalloc/allop_area/format\x00\x00\x00\x00\x00\x00\x0f:\xe23j\xb2\x93\x99\r\x02\xd0f\x87Wz\x1b\xc7\x9f\x0f7\xe8\x94\xac(,\x03\x03\xff\xc4*o\xcbf\xe4\x8a\x10\xf3\x7fA\x02:Y\xcf\x1b\x8e\x91%\x00\xf9\xff6\xa6\\\x80\x0f\xfa\xd4\xec\xa6\x0e\x1c,\'\\Aq\xae\x8e\x9c_ \x0f\v\xd3\xcb\xe4\"\xf2\x95\x8e\xc0q\x03;\x16\x84apq\xb4\x88o\xe2\x8c\xb2\xbf\x18z\xee\x8f\x05\x84\xdb\xcbP\xfa\xcec\xa4\xec\xd3\xa9[\x91xV\xd5g\xdf)\xfbJ\xaeNI\x13o\xb8\x98\xc9\x06yP>N\xe7\xf4e\xc2\x97\x02_\xeaV\xc9Vk\xaff\v\xc7\x7f\xdc\xd4\xca\xcf\x94\xb6\x1dK\xc0\xdd\x83w\xe0\x8dx\f\x17>\xa1\riQ\xb7\x03=1\xb7\xed\x1e&t\xffHx>\xc9\xac\x17/\x16\x92y\x87\xc6\x90\x8c\xcb\x86H5\n\xa2\xe8\x03\x92\xc3\xa9\xfb\x9eh\xec\xa9\x8d\xb80\x86\xa6\xa5\xd4I\xfe\xc6]F\xbe\xa0\xda\xa2\x13\xc6\xfb\xe6\xee\xf4Z,\x10\x10C0\x8b\xfd\xfb\xee\x93\x125\xfe\xc4z\"\xc6=Z\xacM\x14\x8f?w\x88S;eNL\xcd.(\xccT\xfaI\a\x1c\xb5\x8d\xf8\xccd\x1f\x1b\xb48\xb1\xbc\xfb\x13f\xa5\xd2\xfb\x17\xff\xe8\xd9\b3\x95\xa7\x85\xb1\x98\xd0\xcf\xbf=\xf7\xd0q1\b\xd2|\xc1B\xcc#5', 0x5, 0x7) mmap$auto(0x0, 0x20009, 0x4000000000df, 0x40000000000eb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket(0x2, 0x80002, 0x73) openat$auto_snd_seq_f_ops_seq_clientmgr(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) ioctl$auto(0x3, 0xc08c5335, 0x38) ioctl$auto__ctl_fops_dm_ioctl(r0, 0xfffffff7effffd05, &(0x7f00000001c0)) 1.314495679s ago: executing program 2 (id=8662): r0 = openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x8a240, 0x0) ioctl$auto(r0, 0x5646, r0) socket(0xa, 0x3, 0x3b) r1 = openat$auto_v4l2_fops_v4l2_dev(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vbi15\x00', 0x802, 0x0) getsockopt$auto_SO_RCVPRIORITY(r0, 0x7, 0x52, 0x0, 0x0) write$auto(r1, &(0x7f0000000040)='%]{\fZ', 0xefffffff) r2 = openat$auto_tracing_fops_trace(0xffffffffffffff9c, 0x0, 0x1a9103, 0x0) ioctl$auto_SNDRV_PCM_IOCTL_REWIND2(0xffffffffffffffff, 0x40084146, 0x0) close_range$auto(0x2, 0x8, 0x0) ioctl$auto(r2, 0xae41, 0xffffffffffffffff) 809.065305ms ago: executing program 2 (id=8663): mmap$auto(0x0, 0x20009, 0x4000000000df, 0xeb1, 0x401, 0x8000) close_range$auto(0x2, 0x8, 0x0) socket(0x10, 0x2, 0x0) socketpair$auto(0x1, 0x2, 0x8000000000000000, 0x0) recvmmsg$auto(0x3, 0x0, 0x10000, 0x0, 0x0) io_uring_setup$auto(0x6, 0x0) mmap$auto(0x0, 0x400007, 0xdf, 0x9b72, 0xffffffffffffffff, 0x0) connect$auto(0x3, 0x0, 0x54) sendmmsg$auto(0x4, 0x0, 0x9a6, 0x6) close_range$auto(0x2, 0x8, 0x0) 195.599391ms ago: executing program 4 (id=8664): mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) madvise$auto(0x0, 0xffffffffffff0005, 0x17) mmap$auto(0x0, 0x8, 0xdf, 0x9b72, 0x2, 0xb60) pwrite64$auto(0xffffffffffffffff, 0x0, 0x400000, 0xc) socket(0xa, 0x5, 0x84) r0 = gettid() prlimit64$auto(r0, 0x6, &(0x7f00000000c0)={0x5, 0x945}, &(0x7f0000000240)={0x4f7}) mbind$auto(0x2000, 0x100000008, 0x2100000000, 0x0, 0x6, 0x2) accept4$auto(0xffffffffffffffff, 0x0, 0x0, 0xffffffff) mprotect$auto(0x0, 0x806121, 0x8) 195.479255ms ago: executing program 1 (id=8665): r0 = openat$auto_proc_reg_file_ops_compat_inode(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x1c1080, 0x0) openat$auto_ftrace_enable_fops_trace_events(0xffffffffffffff9c, &(0x7f0000000340)='/sys/kernel/tracing/events/vmalloc/purge_vmap_area_lazy/enable\x00', 0x883, 0x0) mmap$auto(0x0, 0x2020009, 0x3, 0xeb1, 0xfffffffffffffffa, 0x8000) openat$auto_proc_sys_file_operations_proc_sysctl(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/vrf/strict_mode\x00', 0x80202, 0x0) sendfile$auto(0xffffffffffffffff, r0, 0x0, 0x400000000000) socket$nl_generic(0x10, 0x3, 0x10) openat$auto_kernfs_file_fops_kernfs_internal(0xffffffffffffff9c, 0x0, 0xa001, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x800, 0x10) io_uring_setup$auto(0x59, 0x0) select$auto(0xe, 0x0, 0x0, &(0x7f0000000200)={[0x8, 0xffffffffffffff49, 0x5, 0x1823, 0x47, 0x1, 0xfffffffffffffff3, 0x19, 0x10, 0x5, 0x2dde, 0x8, 0xfffffffffffffffa, 0xab, 0x7, 0x1]}, &(0x7f0000000040)={0x0, 0x7}) 0s ago: executing program 1 (id=8666): openat$auto_def_blk_fops_fs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x14fa02, 0x0) mmap$auto(0x0, 0x810004, 0x400000000ffb, 0x8000000008011, 0x3, 0x8000) close_range$auto(0x0, 0xffffffffffffffff, 0x4000000000002) socket(0x2, 0x80002, 0x73) remap_file_pages$auto(0x6a27, 0x1000, 0x0, 0x6, 0x4) openat$auto_kernel_debug_fops_orangefs_debugfs(0xffffffffffffff9c, 0x0, 0x200e01, 0x0) prctl$auto(0x23, 0x40, 0x7fffffffefff, 0x0, 0x0) socket(0x2, 0xa, 0x1) statx$auto(0xffffff9c, 0x0, 0x1000, 0x0, 0x0) ioctl$auto(0x1, 0x890c, 0x8) kernel console output (not intermixed with test programs): _class+0x10/0x10 [ 1293.127427][T28364] ? __pfx_probe_sched_switch+0x10/0x10 [ 1293.127455][T28364] ? __lock_acquire+0x4a5/0x2630 [ 1293.127488][T28364] trace_event_reg+0x209/0x350 [ 1293.127513][T28364] __ftrace_event_enable_disable+0x211/0x6f0 [ 1293.127545][T28364] __ftrace_set_clr_event_nolock+0x390/0xc30 [ 1293.127571][T28364] ftrace_set_clr_event+0x1b7/0x3f0 [ 1293.127594][T28364] ? __pfx_ftrace_set_clr_event+0x10/0x10 [ 1293.127614][T28364] ? trace_get_user+0x3ae/0xa70 [ 1293.127647][T28364] ftrace_event_write+0x259/0x2c0 [ 1293.127668][T28364] ? __pfx_ftrace_event_write+0x10/0x10 [ 1293.127727][T28364] vfs_write+0x2aa/0x1070 [ 1293.127753][T28364] ? __pfx_ftrace_event_write+0x10/0x10 [ 1293.127777][T28364] ? __pfx_vfs_write+0x10/0x10 [ 1293.127798][T28364] ? __fget_files+0x215/0x3d0 [ 1293.127827][T28364] ? __fget_files+0x21f/0x3d0 [ 1293.127855][T28364] ksys_write+0x12a/0x250 [ 1293.127876][T28364] ? __pfx_ksys_write+0x10/0x10 [ 1293.127899][T28364] ? rcu_is_watching+0x12/0xc0 [ 1293.127924][T28364] do_syscall_64+0x10b/0xf80 [ 1293.127957][T28364] ? clear_bhb_loop+0x40/0x90 [ 1293.127980][T28364] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1293.127999][T28364] RIP: 0033:0x7f7ec199c819 [ 1293.128017][T28364] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1293.128035][T28364] RSP: 002b:00007f7ec286f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1293.128054][T28364] RAX: ffffffffffffffda RBX: 00007f7ec1c15fa0 RCX: 00007f7ec199c819 [ 1293.128066][T28364] RDX: 0000000000000af0 RSI: 0000000000000000 RDI: 0000000000000005 [ 1293.128077][T28364] RBP: 00007f7ec1a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1293.128088][T28364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1293.128099][T28364] R13: 00007f7ec1c16038 R14: 00007f7ec1c15fa0 R15: 00007fff4f7a44a8 [ 1293.128123][T28364] [ 1293.150432][T28364] event trace: Could not enable event nfsd_file_gc_in_use [ 1294.152927][T28367] zswap: compressor not available [ 1295.686064][T28390] netlink: 326 bytes leftover after parsing attributes in process `syz.3.7874'. [ 1295.737100][T28384] FAULT_INJECTION: forcing a failure. [ 1295.737100][T28384] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.761032][T28392] netlink: 342 bytes leftover after parsing attributes in process `syz.1.7873'. [ 1295.770766][T28384] CPU: 0 UID: 0 PID: 28384 Comm: syz.2.7871 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1295.770800][T28384] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1295.770807][T28384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1295.770818][T28384] Call Trace: [ 1295.770826][T28384] [ 1295.770834][T28384] dump_stack_lvl+0x100/0x190 [ 1295.770871][T28384] should_fail_ex.cold+0x5/0xa [ 1295.770896][T28384] should_failslab+0xc2/0x120 [ 1295.770918][T28384] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1295.770947][T28384] ? __kernfs_new_node+0xd2/0x9f0 [ 1295.770972][T28384] __kernfs_new_node+0xd2/0x9f0 [ 1295.770995][T28384] ? __pfx___kernfs_new_node+0x10/0x10 [ 1295.771020][T28384] ? find_held_lock+0x2b/0x80 [ 1295.771043][T28384] ? kernfs_root+0xee/0x2a0 [ 1295.771061][T28384] ? kernfs_root+0xee/0x2a0 [ 1295.771085][T28384] kernfs_new_node+0x11b/0x1a0 [ 1295.771118][T28384] __kernfs_create_file+0x53/0x350 [ 1295.771152][T28384] sysfs_add_file_mode_ns+0x207/0x3c0 [ 1295.771187][T28384] internal_create_group+0x593/0xf40 [ 1295.771213][T28384] ? __pfx_internal_create_group+0x10/0x10 [ 1295.771243][T28384] ? kernfs_create_link+0x1bd/0x240 [ 1295.771273][T28384] internal_create_groups+0x9d/0x150 [ 1295.771296][T28384] device_add+0x71a/0x1950 [ 1295.771317][T28384] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1295.771344][T28384] ? __pfx_device_add+0x10/0x10 [ 1295.771364][T28384] ? lockdep_init_map_type+0x5c/0x250 [ 1295.771385][T28384] ? __init_waitqueue_head+0xca/0x150 [ 1295.771412][T28384] netdev_register_kobject+0x1a9/0x3d0 [ 1295.771440][T28384] register_netdevice+0x151c/0x24b0 [ 1295.771466][T28384] ? __pfx_register_netdevice+0x10/0x10 [ 1295.771493][T28384] __ip_tunnel_create+0x52b/0x670 [ 1295.771517][T28384] ? __pfx___ip_tunnel_create+0x10/0x10 [ 1295.771539][T28384] ? net_generic+0xea/0x2a0 [ 1295.771567][T28384] ip_tunnel_init_net+0x230/0x780 [ 1295.771602][T28384] ? __pfx_ip_tunnel_init_net+0x10/0x10 [ 1295.771631][T28384] ? __kmalloc_noprof+0x320/0x850 [ 1295.771662][T28384] ? __pfx_ipgre_tap_init_net+0x10/0x10 [ 1295.771682][T28384] ops_init+0x1e2/0x5f0 [ 1295.771705][T28384] setup_net+0x118/0x3a0 [ 1295.771726][T28384] ? __pfx_setup_net+0x10/0x10 [ 1295.771746][T28384] ? mutex_init_lockdep+0xf1/0x120 [ 1295.771770][T28384] copy_net_ns+0x46f/0x7c0 [ 1295.771794][T28384] create_new_namespaces+0x3ea/0xac0 [ 1295.771824][T28384] unshare_nsproxy_namespaces+0xf2/0x220 [ 1295.771851][T28384] ksys_unshare+0x438/0xab0 [ 1295.771879][T28384] ? __pfx_ksys_unshare+0x10/0x10 [ 1295.771905][T28384] ? xfd_validate_state+0x129/0x190 [ 1295.771931][T28384] __x64_sys_unshare+0x31/0x40 [ 1295.771958][T28384] do_syscall_64+0x10b/0xf80 [ 1295.771985][T28384] ? clear_bhb_loop+0x40/0x90 [ 1295.772007][T28384] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1295.772027][T28384] RIP: 0033:0x7f4422d9c819 [ 1295.772045][T28384] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1295.772064][T28384] RSP: 002b:00007f4423b82028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1295.772084][T28384] RAX: ffffffffffffffda RBX: 00007f4423015fa0 RCX: 00007f4422d9c819 [ 1295.772096][T28384] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1295.772108][T28384] RBP: 00007f4422e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1295.772119][T28384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1295.772129][T28384] R13: 00007f4423016038 R14: 00007f4423015fa0 R15: 00007ffc7eef17d8 [ 1295.772153][T28384] [ 1296.240615][T28393] netlink: 166 bytes leftover after parsing attributes in process `syz.1.7873'. [ 1298.033627][T28426] netlink: 28 bytes leftover after parsing attributes in process `syz.3.7882'. [ 1300.682872][ T1314] ieee802154 phy0 wpan0: encryption failed: -22 [ 1300.689705][ T1314] ieee802154 phy1 wpan1: encryption failed: -22 [ 1306.373091][T28551] Invalid ELF header magic: != ELF [ 1306.425021][T28553] netlink: 290 bytes leftover after parsing attributes in process `syz.4.7923'. [ 1307.267495][T28559] FAULT_INJECTION: forcing a failure. [ 1307.267495][T28559] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.540826][T28559] CPU: 0 UID: 0 PID: 28559 Comm: syz.1.7924 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1307.540860][T28559] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1307.540867][T28559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1307.540878][T28559] Call Trace: [ 1307.540885][T28559] [ 1307.540893][T28559] dump_stack_lvl+0x100/0x190 [ 1307.540918][T28559] should_fail_ex.cold+0x5/0xa [ 1307.540948][T28559] should_failslab+0xc2/0x120 [ 1307.540970][T28559] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1307.540997][T28559] ? tomoyo_init_log+0x1a0/0x20c0 [ 1307.541021][T28559] tomoyo_init_log+0x1a0/0x20c0 [ 1307.541040][T28559] ? __pfx_format_decode+0x10/0x10 [ 1307.541067][T28559] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1307.541098][T28559] ? __pfx_tomoyo_init_log+0x10/0x10 [ 1307.541124][T28559] tomoyo_write_log2+0x2ed/0xbc0 [ 1307.541149][T28559] tomoyo_supervisor+0x15e/0x1340 [ 1307.541176][T28559] ? __pfx_tomoyo_supervisor+0x10/0x10 [ 1307.541214][T28559] ? tomoyo_check_path_acl+0x141/0x210 [ 1307.541243][T28559] ? tomoyo_check_acl+0x1f7/0x410 [ 1307.541272][T28559] tomoyo_path_permission+0x270/0x3b0 [ 1307.541303][T28559] tomoyo_check_open_permission+0x34d/0x3c0 [ 1307.541333][T28559] ? __pfx_tomoyo_check_open_permission+0x10/0x10 [ 1307.541361][T28559] ? pidfs_alloc_file+0x18f/0x290 [ 1307.541382][T28559] ? do_syscall_64+0x10b/0xf80 [ 1307.541409][T28559] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1307.541434][T28559] ? hook_file_open+0x24e/0x7a0 [ 1307.541462][T28559] ? lock_acquire+0x1b1/0x370 [ 1307.541494][T28559] tomoyo_file_open+0x6b/0x90 [ 1307.541518][T28559] security_file_open+0xb5/0x1e0 [ 1307.541537][T28559] do_dentry_open+0x5aa/0x1660 [ 1307.541568][T28559] vfs_open+0x82/0x3f0 [ 1307.541603][T28559] dentry_open+0x71/0xd0 [ 1307.541633][T28559] pidfs_alloc_file+0x18f/0x290 [ 1307.541654][T28559] ? __pfx_pidfs_alloc_file+0x10/0x10 [ 1307.541682][T28559] pidfd_prepare+0x10c/0x1b0 [ 1307.541708][T28559] __x64_sys_pidfd_open+0x105/0x1a0 [ 1307.541738][T28559] ? __pfx___x64_sys_pidfd_open+0x10/0x10 [ 1307.541771][T28559] ? rcu_is_watching+0x12/0xc0 [ 1307.541795][T28559] do_syscall_64+0x10b/0xf80 [ 1307.541822][T28559] ? clear_bhb_loop+0x40/0x90 [ 1307.541845][T28559] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1307.541864][T28559] RIP: 0033:0x7fedd8d9c819 [ 1307.541880][T28559] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1307.541898][T28559] RSP: 002b:00007fedd9c62028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b2 [ 1307.541917][T28559] RAX: ffffffffffffffda RBX: 00007fedd9015fa0 RCX: 00007fedd8d9c819 [ 1307.541930][T28559] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 1307.541941][T28559] RBP: 00007fedd8e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1307.541952][T28559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1307.541962][T28559] R13: 00007fedd9016038 R14: 00007fedd9015fa0 R15: 00007ffe9012dc68 [ 1307.541985][T28559] [ 1308.374343][T28582] netlink: 202 bytes leftover after parsing attributes in process `syz.3.7936'. [ 1309.636100][T28607] FAULT_INJECTION: forcing a failure. [ 1309.636100][T28607] name failslab, interval 1, probability 0, space 0, times 0 [ 1309.713576][T28607] CPU: 0 UID: 0 PID: 28607 Comm: syz.2.7945 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1309.713610][T28607] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1309.713617][T28607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1309.713628][T28607] Call Trace: [ 1309.713636][T28607] [ 1309.713644][T28607] dump_stack_lvl+0x100/0x190 [ 1309.713669][T28607] should_fail_ex.cold+0x5/0xa [ 1309.713692][T28607] should_failslab+0xc2/0x120 [ 1309.713715][T28607] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1309.713747][T28607] ? nfc_genl_rcv_nl_event+0xc1/0x300 [ 1309.713772][T28607] nfc_genl_rcv_nl_event+0xc1/0x300 [ 1309.713794][T28607] notifier_call_chain+0x99/0x400 [ 1309.713827][T28607] blocking_notifier_call_chain+0x69/0xa0 [ 1309.713858][T28607] netlink_release+0x1674/0x2020 [ 1309.713887][T28607] ? netlink_release+0x1dd/0x2020 [ 1309.713912][T28607] ? __pfx_netlink_release+0x10/0x10 [ 1309.713938][T28607] ? __pfx_locks_remove_file+0x10/0x10 [ 1309.713966][T28607] __sock_release+0xb3/0x260 [ 1309.713986][T28607] ? __pfx_sock_close+0x10/0x10 [ 1309.714005][T28607] sock_close+0x1c/0x30 [ 1309.714023][T28607] __fput+0x3ff/0xb50 [ 1309.714054][T28607] task_work_run+0x150/0x240 [ 1309.714073][T28607] ? __pfx_task_work_run+0x10/0x10 [ 1309.714093][T28607] ? rcu_is_watching+0x12/0xc0 [ 1309.714118][T28607] exit_to_user_mode_loop+0x100/0x4a0 [ 1309.714135][T28607] ? do_syscall_64+0x519/0xf80 [ 1309.714165][T28607] do_syscall_64+0x6f2/0xf80 [ 1309.714192][T28607] ? clear_bhb_loop+0x40/0x90 [ 1309.714215][T28607] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1309.714233][T28607] RIP: 0033:0x7f4422d9c819 [ 1309.714250][T28607] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1309.714268][T28607] RSP: 002b:00007f4423b82028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 1309.714287][T28607] RAX: 0000000000000000 RBX: 00007f4423015fa0 RCX: 00007f4422d9c819 [ 1309.714299][T28607] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000002 [ 1309.714310][T28607] RBP: 00007f4422e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1309.714321][T28607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1309.714332][T28607] R13: 00007f4423016038 R14: 00007f4423015fa0 R15: 00007ffc7eef17d8 [ 1309.714355][T28607] [ 1310.451385][T28614] netlink: 266 bytes leftover after parsing attributes in process `syz.4.7946'. [ 1310.501468][T28614] IPv6: NLM_F_CREATE should be specified when creating new route [ 1310.725645][T28617] FAULT_INJECTION: forcing a failure. [ 1310.725645][T28617] name failslab, interval 1, probability 0, space 0, times 0 [ 1310.768401][T28617] CPU: 0 UID: 0 PID: 28617 Comm: syz.4.7948 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1310.768435][T28617] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1310.768443][T28617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1310.768455][T28617] Call Trace: [ 1310.768461][T28617] [ 1310.768470][T28617] dump_stack_lvl+0x100/0x190 [ 1310.768496][T28617] should_fail_ex.cold+0x5/0xa [ 1310.768519][T28617] ? tracepoint_add_func+0x3a8/0x1150 [ 1310.768547][T28617] should_failslab+0xc2/0x120 [ 1310.768569][T28617] __kmalloc_noprof+0xe0/0x850 [ 1310.768600][T28617] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1310.768624][T28617] tracepoint_add_func+0x3a8/0x1150 [ 1310.768649][T28617] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1310.768676][T28617] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1310.768698][T28617] tracepoint_probe_register+0xc4/0x110 [ 1310.768734][T28617] ? __pfx_tracepoint_probe_register+0x10/0x10 [ 1310.768761][T28617] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1310.768790][T28617] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1310.768812][T28617] ? __pfx_probe_sched_switch+0x10/0x10 [ 1310.768845][T28617] ? __lock_acquire+0x4a5/0x2630 [ 1310.768877][T28617] trace_event_reg+0x209/0x350 [ 1310.768902][T28617] __ftrace_event_enable_disable+0x211/0x6f0 [ 1310.768934][T28617] __ftrace_set_clr_event_nolock+0x390/0xc30 [ 1310.768961][T28617] ftrace_set_clr_event+0x1b7/0x3f0 [ 1310.768984][T28617] ? __pfx_ftrace_set_clr_event+0x10/0x10 [ 1310.769004][T28617] ? trace_get_user+0x3ae/0xa70 [ 1310.769037][T28617] ftrace_event_write+0x259/0x2c0 [ 1310.769058][T28617] ? __pfx_ftrace_event_write+0x10/0x10 [ 1310.769088][T28617] vfs_write+0x2aa/0x1070 [ 1310.769109][T28617] ? __pfx_ftrace_event_write+0x10/0x10 [ 1310.769132][T28617] ? __pfx_vfs_write+0x10/0x10 [ 1310.769151][T28617] ? __fget_files+0x215/0x3d0 [ 1310.769177][T28617] ? __fget_files+0x21f/0x3d0 [ 1310.769204][T28617] ksys_write+0x12a/0x250 [ 1310.769224][T28617] ? __pfx_ksys_write+0x10/0x10 [ 1310.769246][T28617] ? rcu_is_watching+0x12/0xc0 [ 1310.769271][T28617] do_syscall_64+0x10b/0xf80 [ 1310.769298][T28617] ? clear_bhb_loop+0x40/0x90 [ 1310.769321][T28617] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1310.769340][T28617] RIP: 0033:0x7f7ec199c819 [ 1310.769357][T28617] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1310.769375][T28617] RSP: 002b:00007f7ec286f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1310.769394][T28617] RAX: ffffffffffffffda RBX: 00007f7ec1c15fa0 RCX: 00007f7ec199c819 [ 1310.769406][T28617] RDX: 0000000000000af0 RSI: 0000000000000000 RDI: 0000000000000005 [ 1310.769417][T28617] RBP: 00007f7ec1a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1310.769428][T28617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1310.769439][T28617] R13: 00007f7ec1c16038 R14: 00007f7ec1c15fa0 R15: 00007fff4f7a44a8 [ 1310.769463][T28617] [ 1310.769543][T28617] event trace: Could not enable event nfsd_file_gc_aged [ 1312.215527][T28640] netlink: 346 bytes leftover after parsing attributes in process `syz.2.7957'. [ 1312.799353][T28655] netlink: 146 bytes leftover after parsing attributes in process `syz.2.7962'. [ 1313.100575][T28661] netlink: 326 bytes leftover after parsing attributes in process `syz.3.7965'. [ 1316.163174][T28727] FAULT_INJECTION: forcing a failure. [ 1316.163174][T28727] name failslab, interval 1, probability 0, space 0, times 0 [ 1316.337437][T28727] CPU: 0 UID: 0 PID: 28727 Comm: syz.4.7990 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1316.337471][T28727] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1316.337479][T28727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1316.337491][T28727] Call Trace: [ 1316.337497][T28727] [ 1316.337506][T28727] dump_stack_lvl+0x100/0x190 [ 1316.337531][T28727] should_fail_ex.cold+0x5/0xa [ 1316.337554][T28727] should_failslab+0xc2/0x120 [ 1316.337576][T28727] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1316.337604][T28727] ? alloc_empty_file+0x5b/0x1c0 [ 1316.337630][T28727] ? __pfx_stack_trace_save+0x10/0x10 [ 1316.337658][T28727] alloc_empty_file+0x5b/0x1c0 [ 1316.337684][T28727] path_openat+0xe8/0x31a0 [ 1316.337705][T28727] ? kasan_save_stack+0x3f/0x50 [ 1316.337721][T28727] ? kasan_save_stack+0x30/0x50 [ 1316.337737][T28727] ? kasan_save_track+0x14/0x30 [ 1316.337753][T28727] ? __kasan_slab_alloc+0x89/0x90 [ 1316.337771][T28727] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 1316.337798][T28727] ? do_getname+0x35/0x390 [ 1316.337822][T28727] ? do_sys_openat2+0xc5/0x1e0 [ 1316.337847][T28727] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1316.337869][T28727] ? __pfx_path_openat+0x10/0x10 [ 1316.337899][T28727] do_file_open+0x20e/0x430 [ 1316.337923][T28727] ? __pfx_do_file_open+0x10/0x10 [ 1316.337959][T28727] ? alloc_fd+0x476/0x790 [ 1316.337982][T28727] ? do_getname+0x191/0x390 [ 1316.338010][T28727] do_sys_openat2+0x10d/0x1e0 [ 1316.338037][T28727] ? __pfx_do_sys_openat2+0x10/0x10 [ 1316.338071][T28727] __x64_sys_openat+0x12d/0x210 [ 1316.338099][T28727] ? __pfx___x64_sys_openat+0x10/0x10 [ 1316.338130][T28727] ? rcu_is_watching+0x12/0xc0 [ 1316.338159][T28727] do_syscall_64+0x10b/0xf80 [ 1316.338187][T28727] ? clear_bhb_loop+0x40/0x90 [ 1316.338209][T28727] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1316.338228][T28727] RIP: 0033:0x7f7ec195d04e [ 1316.338244][T28727] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1316.338263][T28727] RSP: 002b:00007f7ec286eec8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1316.338282][T28727] RAX: ffffffffffffffda RBX: 00007f7ec286f6c0 RCX: 00007f7ec195d04e [ 1316.338295][T28727] RDX: 0000000000000002 RSI: 00007f7ec286ef90 RDI: ffffffffffffff9c [ 1316.338307][T28727] RBP: 00007f7ec1a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1316.338318][T28727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1316.338329][T28727] R13: 00007f7ec1c16038 R14: 00007f7ec1c15fa0 R15: 00007fff4f7a44a8 [ 1316.338353][T28727] [ 1317.442240][T28738] random: crng reseeded on system resumption [ 1317.508560][T28738] FAULT_INJECTION: forcing a failure. [ 1317.508560][T28738] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1317.628178][T28738] CPU: 0 UID: 0 PID: 28738 Comm: syz.4.7995 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1317.628212][T28738] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1317.628220][T28738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1317.628231][T28738] Call Trace: [ 1317.628238][T28738] [ 1317.628245][T28738] dump_stack_lvl+0x100/0x190 [ 1317.628271][T28738] should_fail_ex.cold+0x5/0xa [ 1317.628292][T28738] ? prepare_alloc_pages+0x16d/0x5f0 [ 1317.628318][T28738] should_fail_alloc_page+0xeb/0x140 [ 1317.628342][T28738] prepare_alloc_pages+0x1f0/0x5f0 [ 1317.628375][T28738] __alloc_frozen_pages_noprof+0x19a/0x2bc0 [ 1317.628407][T28738] ? rcu_is_watching+0x12/0xc0 [ 1317.628429][T28738] ? trace_sched_exit_tp+0x11c/0x160 [ 1317.628457][T28738] ? __schedule+0x10fb/0x6820 [ 1317.628489][T28738] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1317.628521][T28738] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1317.628555][T28738] ? __pfx___schedule+0x10/0x10 [ 1317.628585][T28738] ? irqentry_exit+0x246/0x790 [ 1317.628612][T28738] ? lockdep_hardirqs_on+0x78/0x100 [ 1317.628640][T28738] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1317.628668][T28738] ? policy_nodemask+0xed/0x4f0 [ 1317.628691][T28738] alloc_pages_mpol+0x1fb/0x540 [ 1317.628712][T28738] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1317.628732][T28738] ? alloc_frozen_pages_noprof+0x16/0x160 [ 1317.628757][T28738] ? __sanitizer_cov_trace_pc+0x64/0x70 [ 1317.628787][T28738] alloc_pages_noprof+0x1a/0x160 [ 1317.628811][T28738] get_zeroed_page_noprof+0x18/0xb0 [ 1317.628837][T28738] get_image_page+0x18/0x1a0 [ 1317.628869][T28738] alloc_rtree_node+0x3c/0xb0 [ 1317.628893][T28738] memory_bm_create+0x65e/0xba0 [ 1317.628926][T28738] create_basic_memory_bitmaps+0xbd/0x350 [ 1317.628954][T28738] snapshot_open+0x230/0x2a0 [ 1317.628981][T28738] ? __pfx_snapshot_open+0x10/0x10 [ 1317.629008][T28738] misc_open+0x26d/0x450 [ 1317.629029][T28738] ? __pfx_misc_open+0x10/0x10 [ 1317.629047][T28738] chrdev_open+0x234/0x6a0 [ 1317.629069][T28738] ? __pfx_apparmor_file_open+0x10/0x10 [ 1317.629095][T28738] ? __pfx_chrdev_open+0x10/0x10 [ 1317.629119][T28738] ? fsnotify_open_perm_and_set_mode+0x17a/0xa80 [ 1317.629147][T28738] do_dentry_open+0x6d8/0x1660 [ 1317.629168][T28738] ? __pfx_chrdev_open+0x10/0x10 [ 1317.629195][T28738] vfs_open+0x82/0x3f0 [ 1317.629228][T28738] path_openat+0x208c/0x31a0 [ 1317.629259][T28738] ? __pfx_path_openat+0x10/0x10 [ 1317.629291][T28738] do_file_open+0x20e/0x430 [ 1317.629315][T28738] ? __pfx_do_file_open+0x10/0x10 [ 1317.629354][T28738] ? alloc_fd+0x476/0x790 [ 1317.629384][T28738] ? do_getname+0x191/0x390 [ 1317.629412][T28738] do_sys_openat2+0x10d/0x1e0 [ 1317.629439][T28738] ? __pfx_do_sys_openat2+0x10/0x10 [ 1317.629475][T28738] __x64_sys_openat+0x12d/0x210 [ 1317.629503][T28738] ? __pfx___x64_sys_openat+0x10/0x10 [ 1317.629534][T28738] ? rcu_is_watching+0x12/0xc0 [ 1317.629559][T28738] do_syscall_64+0x10b/0xf80 [ 1317.629587][T28738] ? clear_bhb_loop+0x40/0x90 [ 1317.629609][T28738] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1317.629628][T28738] RIP: 0033:0x7f7ec199c819 [ 1317.629649][T28738] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1317.629670][T28738] RSP: 002b:00007f7ec286f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1317.629688][T28738] RAX: ffffffffffffffda RBX: 00007f7ec1c15fa0 RCX: 00007f7ec199c819 [ 1317.629701][T28738] RDX: 0000000000008001 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 1317.629713][T28738] RBP: 00007f7ec1a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1317.629724][T28738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1317.629736][T28738] R13: 00007f7ec1c16038 R14: 00007f7ec1c15fa0 R15: 00007fff4f7a44a8 [ 1317.629760][T28738] [ 1319.864781][T28772] netlink: 21 bytes leftover after parsing attributes in process `syz.2.8005'. [ 1320.984692][T28759] kexec: Could not allocate control_code_buffer [ 1321.566237][T28797] netlink: 354 bytes leftover after parsing attributes in process `syz.3.8013'. [ 1324.093390][T28820] FAULT_INJECTION: forcing a failure. [ 1324.093390][T28820] name failslab, interval 1, probability 0, space 0, times 0 [ 1324.170996][T28827] mkiss: ax0: crc mode is auto. [ 1324.252891][T28820] CPU: 0 UID: 0 PID: 28820 Comm: syz.4.8021 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1324.252931][T28820] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1324.252939][T28820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1324.252950][T28820] Call Trace: [ 1324.252957][T28820] [ 1324.252966][T28820] dump_stack_lvl+0x100/0x190 [ 1324.252992][T28820] should_fail_ex.cold+0x5/0xa [ 1324.253017][T28820] ? tracepoint_add_func+0x3a8/0x1150 [ 1324.253043][T28820] should_failslab+0xc2/0x120 [ 1324.253065][T28820] __kmalloc_noprof+0xe0/0x850 [ 1324.253097][T28820] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1324.253121][T28820] tracepoint_add_func+0x3a8/0x1150 [ 1324.253147][T28820] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1324.253173][T28820] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1324.253195][T28820] tracepoint_probe_register+0xc4/0x110 [ 1324.253223][T28820] ? __pfx_tracepoint_probe_register+0x10/0x10 [ 1324.253250][T28820] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1324.253289][T28820] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1324.253311][T28820] ? __pfx_probe_sched_switch+0x10/0x10 [ 1324.253340][T28820] ? __lock_acquire+0x4a5/0x2630 [ 1324.253374][T28820] trace_event_reg+0x209/0x350 [ 1324.253399][T28820] __ftrace_event_enable_disable+0x211/0x6f0 [ 1324.253431][T28820] __ftrace_set_clr_event_nolock+0x390/0xc30 [ 1324.253458][T28820] ftrace_set_clr_event+0x1b7/0x3f0 [ 1324.253481][T28820] ? __pfx_ftrace_set_clr_event+0x10/0x10 [ 1324.253501][T28820] ? trace_get_user+0x3ae/0xa70 [ 1324.253535][T28820] ftrace_event_write+0x259/0x2c0 [ 1324.253555][T28820] ? __pfx_ftrace_event_write+0x10/0x10 [ 1324.253585][T28820] vfs_write+0x2aa/0x1070 [ 1324.253606][T28820] ? __pfx_ftrace_event_write+0x10/0x10 [ 1324.253629][T28820] ? __pfx_vfs_write+0x10/0x10 [ 1324.253648][T28820] ? __fget_files+0x215/0x3d0 [ 1324.253674][T28820] ? __fget_files+0x21f/0x3d0 [ 1324.253701][T28820] ksys_write+0x12a/0x250 [ 1324.253722][T28820] ? __pfx_ksys_write+0x10/0x10 [ 1324.253744][T28820] ? rcu_is_watching+0x12/0xc0 [ 1324.253769][T28820] do_syscall_64+0x10b/0xf80 [ 1324.253796][T28820] ? clear_bhb_loop+0x40/0x90 [ 1324.253819][T28820] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1324.253838][T28820] RIP: 0033:0x7f7ec199c819 [ 1324.253854][T28820] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1324.253872][T28820] RSP: 002b:00007f7ec286f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1324.253891][T28820] RAX: ffffffffffffffda RBX: 00007f7ec1c15fa0 RCX: 00007f7ec199c819 [ 1324.253903][T28820] RDX: 0000000000000af0 RSI: 0000000000000000 RDI: 0000000000000005 [ 1324.253914][T28820] RBP: 00007f7ec1a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1324.253925][T28820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1324.253936][T28820] R13: 00007f7ec1c16038 R14: 00007f7ec1c15fa0 R15: 00007fff4f7a44a8 [ 1324.253960][T28820] [ 1324.867731][T28820] event trace: Could not enable event nfsd_file_gc_in_use [ 1326.263290][T28845] FAULT_INJECTION: forcing a failure. [ 1326.263290][T28845] name failslab, interval 1, probability 0, space 0, times 0 [ 1326.326422][T28845] CPU: 0 UID: 0 PID: 28845 Comm: syz.2.8028 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1326.326456][T28845] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1326.326463][T28845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1326.326474][T28845] Call Trace: [ 1326.326481][T28845] [ 1326.326489][T28845] dump_stack_lvl+0x100/0x190 [ 1326.326514][T28845] should_fail_ex.cold+0x5/0xa [ 1326.326537][T28845] ? tomoyo_init_log+0x1224/0x20c0 [ 1326.326557][T28845] should_failslab+0xc2/0x120 [ 1326.326579][T28845] __kmalloc_noprof+0xe0/0x850 [ 1326.326612][T28845] tomoyo_init_log+0x1224/0x20c0 [ 1326.326636][T28845] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1326.326668][T28845] ? __pfx_tomoyo_init_log+0x10/0x10 [ 1326.326694][T28845] tomoyo_write_log2+0x2ed/0xbc0 [ 1326.326717][T28845] tomoyo_supervisor+0x15e/0x1340 [ 1326.326745][T28845] ? __pfx_tomoyo_supervisor+0x10/0x10 [ 1326.326782][T28845] ? tomoyo_check_path_acl+0x141/0x210 [ 1326.326811][T28845] ? tomoyo_check_acl+0x1f7/0x410 [ 1326.326839][T28845] tomoyo_path_permission+0x270/0x3b0 [ 1326.326869][T28845] tomoyo_check_open_permission+0x34d/0x3c0 [ 1326.326899][T28845] ? __pfx_tomoyo_check_open_permission+0x10/0x10 [ 1326.326927][T28845] ? pidfs_alloc_file+0x18f/0x290 [ 1326.326949][T28845] ? do_syscall_64+0x10b/0xf80 [ 1326.326976][T28845] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1326.327001][T28845] ? hook_file_open+0x24e/0x7a0 [ 1326.327028][T28845] ? lock_acquire+0x1b1/0x370 [ 1326.327052][T28845] tomoyo_file_open+0x6b/0x90 [ 1326.327076][T28845] security_file_open+0xb5/0x1e0 [ 1326.327095][T28845] do_dentry_open+0x5aa/0x1660 [ 1326.327124][T28845] vfs_open+0x82/0x3f0 [ 1326.327153][T28845] dentry_open+0x71/0xd0 [ 1326.327179][T28845] pidfs_alloc_file+0x18f/0x290 [ 1326.327200][T28845] ? __pfx_pidfs_alloc_file+0x10/0x10 [ 1326.327239][T28845] pidfd_prepare+0x10c/0x1b0 [ 1326.327266][T28845] __x64_sys_pidfd_open+0x105/0x1a0 [ 1326.327296][T28845] ? __pfx___x64_sys_pidfd_open+0x10/0x10 [ 1326.327327][T28845] ? rcu_is_watching+0x12/0xc0 [ 1326.327353][T28845] do_syscall_64+0x10b/0xf80 [ 1326.327381][T28845] ? clear_bhb_loop+0x40/0x90 [ 1326.327403][T28845] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1326.327423][T28845] RIP: 0033:0x7f4422d9c819 [ 1326.327439][T28845] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1326.327458][T28845] RSP: 002b:00007f4423b82028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b2 [ 1326.327476][T28845] RAX: ffffffffffffffda RBX: 00007f4423015fa0 RCX: 00007f4422d9c819 [ 1326.327488][T28845] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 1326.327499][T28845] RBP: 00007f4422e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1326.327510][T28845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1326.327521][T28845] R13: 00007f4423016038 R14: 00007f4423015fa0 R15: 00007ffc7eef17d8 [ 1326.327545][T28845] [ 1327.236643][T28860] netlink: 146 bytes leftover after parsing attributes in process `syz.1.8032'. [ 1327.251636][T28857] netlink: 330 bytes leftover after parsing attributes in process `syz.2.8039'. [ 1327.347192][T28857] gretap0: refused to change device tx_queue_len [ 1327.852387][T28875] mkiss: ax0: crc mode is auto. [ 1328.146147][T28865] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 1328.153763][T28865] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 1328.176530][T28865] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 1328.200667][T28865] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 1328.467817][T28888] netlink: 28 bytes leftover after parsing attributes in process `syz.2.8042'. [ 1328.587817][T28888] ipvlan0: entered promiscuous mode [ 1328.637228][T28888] ipvlan0: entered allmulticast mode [ 1328.687822][T28888] veth0_vlan: entered allmulticast mode [ 1329.574062][T23780] Bluetooth: hci0: command 0x0406 tx timeout [ 1330.211786][T23780] Bluetooth: hci2: command 0x0c1a tx timeout [ 1330.218322][T15137] Bluetooth: hci3: command 0x0406 tx timeout [ 1330.224775][T15137] Bluetooth: hci1: command 0x0406 tx timeout [ 1333.289998][T28934] FAULT_INJECTION: forcing a failure. [ 1333.289998][T28934] name failslab, interval 1, probability 0, space 0, times 0 [ 1333.360349][T28934] CPU: 0 UID: 0 PID: 28934 Comm: syz.2.8055 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1333.360383][T28934] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1333.360390][T28934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1333.360402][T28934] Call Trace: [ 1333.360409][T28934] [ 1333.360417][T28934] dump_stack_lvl+0x100/0x190 [ 1333.360442][T28934] should_fail_ex.cold+0x5/0xa [ 1333.360466][T28934] ? tracepoint_add_func+0x3a8/0x1150 [ 1333.360494][T28934] should_failslab+0xc2/0x120 [ 1333.360515][T28934] __kmalloc_noprof+0xe0/0x850 [ 1333.360547][T28934] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1333.360570][T28934] tracepoint_add_func+0x3a8/0x1150 [ 1333.360597][T28934] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1333.360623][T28934] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1333.360645][T28934] tracepoint_probe_register+0xc4/0x110 [ 1333.360673][T28934] ? __pfx_tracepoint_probe_register+0x10/0x10 [ 1333.360699][T28934] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1333.360729][T28934] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1333.360750][T28934] ? __pfx_probe_sched_switch+0x10/0x10 [ 1333.360782][T28934] ? __lock_acquire+0x4a5/0x2630 [ 1333.360814][T28934] trace_event_reg+0x209/0x350 [ 1333.360839][T28934] __ftrace_event_enable_disable+0x211/0x6f0 [ 1333.360871][T28934] __ftrace_set_clr_event_nolock+0x390/0xc30 [ 1333.360897][T28934] ftrace_set_clr_event+0x1b7/0x3f0 [ 1333.360919][T28934] ? __pfx_ftrace_set_clr_event+0x10/0x10 [ 1333.360939][T28934] ? trace_get_user+0x3ae/0xa70 [ 1333.360972][T28934] ftrace_event_write+0x259/0x2c0 [ 1333.360993][T28934] ? __pfx_ftrace_event_write+0x10/0x10 [ 1333.361023][T28934] vfs_write+0x2aa/0x1070 [ 1333.361043][T28934] ? __pfx_ftrace_event_write+0x10/0x10 [ 1333.361066][T28934] ? __pfx_vfs_write+0x10/0x10 [ 1333.361085][T28934] ? __fget_files+0x215/0x3d0 [ 1333.361111][T28934] ? __fget_files+0x21f/0x3d0 [ 1333.361147][T28934] ksys_write+0x12a/0x250 [ 1333.361167][T28934] ? __pfx_ksys_write+0x10/0x10 [ 1333.361189][T28934] ? rcu_is_watching+0x12/0xc0 [ 1333.361215][T28934] do_syscall_64+0x10b/0xf80 [ 1333.361244][T28934] ? clear_bhb_loop+0x40/0x90 [ 1333.361267][T28934] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1333.361286][T28934] RIP: 0033:0x7f4422d9c819 [ 1333.361303][T28934] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1333.361321][T28934] RSP: 002b:00007f4423b82028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1333.361345][T28934] RAX: ffffffffffffffda RBX: 00007f4423015fa0 RCX: 00007f4422d9c819 [ 1333.361357][T28934] RDX: 0000000000000af0 RSI: 0000000000000000 RDI: 0000000000000005 [ 1333.361368][T28934] RBP: 00007f4422e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1333.361379][T28934] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1333.361390][T28934] R13: 00007f4423016038 R14: 00007f4423015fa0 R15: 00007ffc7eef17d8 [ 1333.361414][T28934] [ 1333.657037][T28934] event trace: Could not enable event nfsd_file_gc_referenced [ 1339.684875][T29037] zswap: compressor not available [ 1339.948331][T29047] Invalid ELF header magic: != ELF [ 1341.340199][T29071] i2c i2c-0: dtv_property_process_set: SET cmd 0x00000000 undefined [ 1341.851819][T29085] netlink: 28 bytes leftover after parsing attributes in process `syz.1.8088'. [ 1341.940763][T29085] ipvlan0: entered promiscuous mode [ 1342.002172][T29085] ipvlan0: entered allmulticast mode [ 1344.717705][T29136] FAULT_INJECTION: forcing a failure. [ 1344.717705][T29136] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.803850][T29136] CPU: 0 UID: 0 PID: 29136 Comm: syz.4.8100 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1344.803888][T29136] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1344.803895][T29136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1344.803906][T29136] Call Trace: [ 1344.803914][T29136] [ 1344.803922][T29136] dump_stack_lvl+0x100/0x190 [ 1344.803947][T29136] should_fail_ex.cold+0x5/0xa [ 1344.803972][T29136] ? tracepoint_add_func+0x3a8/0x1150 [ 1344.803999][T29136] should_failslab+0xc2/0x120 [ 1344.804021][T29136] __kmalloc_noprof+0xe0/0x850 [ 1344.804053][T29136] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1344.804077][T29136] tracepoint_add_func+0x3a8/0x1150 [ 1344.804103][T29136] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1344.804129][T29136] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1344.804150][T29136] tracepoint_probe_register+0xc4/0x110 [ 1344.804186][T29136] ? __pfx_tracepoint_probe_register+0x10/0x10 [ 1344.804212][T29136] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 1344.804243][T29136] ? __pfx_trace_event_raw_event_nfsd_file_gc_class+0x10/0x10 [ 1344.804266][T29136] ? irqentry_exit+0x246/0x790 [ 1344.804300][T29136] trace_event_reg+0x209/0x350 [ 1344.804326][T29136] __ftrace_event_enable_disable+0x211/0x6f0 [ 1344.804357][T29136] __ftrace_set_clr_event_nolock+0x390/0xc30 [ 1344.804383][T29136] ftrace_set_clr_event+0x1b7/0x3f0 [ 1344.804406][T29136] ? __pfx_ftrace_set_clr_event+0x10/0x10 [ 1344.804427][T29136] ? trace_get_user+0x3ae/0xa70 [ 1344.804460][T29136] ftrace_event_write+0x259/0x2c0 [ 1344.804481][T29136] ? __pfx_ftrace_event_write+0x10/0x10 [ 1344.804516][T29136] vfs_write+0x2aa/0x1070 [ 1344.804537][T29136] ? __pfx_ftrace_event_write+0x10/0x10 [ 1344.804560][T29136] ? __pfx_vfs_write+0x10/0x10 [ 1344.804579][T29136] ? __fget_files+0x215/0x3d0 [ 1344.804605][T29136] ? __fget_files+0x21f/0x3d0 [ 1344.804632][T29136] ksys_write+0x12a/0x250 [ 1344.804652][T29136] ? __pfx_ksys_write+0x10/0x10 [ 1344.804674][T29136] ? rcu_is_watching+0x12/0xc0 [ 1344.804699][T29136] do_syscall_64+0x10b/0xf80 [ 1344.804726][T29136] ? clear_bhb_loop+0x40/0x90 [ 1344.804748][T29136] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1344.804767][T29136] RIP: 0033:0x7f7ec199c819 [ 1344.804784][T29136] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1344.804803][T29136] RSP: 002b:00007f7ec286f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1344.804822][T29136] RAX: ffffffffffffffda RBX: 00007f7ec1c15fa0 RCX: 00007f7ec199c819 [ 1344.804834][T29136] RDX: 0000000000000af0 RSI: 0000000000000000 RDI: 0000000000000005 [ 1344.804846][T29136] RBP: 00007f7ec1a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1344.804857][T29136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1344.804867][T29136] R13: 00007f7ec1c16038 R14: 00007f7ec1c15fa0 R15: 00007fff4f7a44a8 [ 1344.804892][T29136] [ 1345.094228][T29136] event trace: Could not enable event nfsd_file_lru_del [ 1345.780765][T29149] netlink: 28 bytes leftover after parsing attributes in process `syz.4.8103'. [ 1345.926812][T29149] bond0: (slave bond_slave_1): Releasing backup interface [ 1346.107148][T29152] netlink: 330 bytes leftover after parsing attributes in process `syz.3.8104'. [ 1346.197987][T29152] gretap0: refused to change device tx_queue_len [ 1346.667696][T29166] kvm: kvm [29165]: vcpu0, guest rIP: 0xfff0 Unhandled WRMSR(0x11e) = 0x1 [ 1347.075753][T29173] binder: BINDER_SET_CONTEXT_MGR already set [ 1347.106544][T29173] binder: 29172:29173 ioctl 4018620d 2000000027c0 returned -16 [ 1348.847872][T29192] zswap: compressor not available [ 1350.082011][T29217] FAULT_INJECTION: forcing a failure. [ 1350.082011][T29217] name failslab, interval 1, probability 0, space 0, times 0 [ 1350.139058][T29217] CPU: 0 UID: 0 PID: 29217 Comm: syz.4.8121 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1350.139093][T29217] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1350.139100][T29217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1350.139112][T29217] Call Trace: [ 1350.139127][T29217] [ 1350.139135][T29217] dump_stack_lvl+0x100/0x190 [ 1350.139160][T29217] should_fail_ex.cold+0x5/0xa [ 1350.139184][T29217] should_failslab+0xc2/0x120 [ 1350.139206][T29217] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1350.139235][T29217] ? security_inode_alloc+0x3b/0x2c0 [ 1350.139261][T29217] ? lockdep_init_map_type+0x5c/0x250 [ 1350.139283][T29217] security_inode_alloc+0x3b/0x2c0 [ 1350.139310][T29217] inode_init_always_gfp+0xcc0/0x1000 [ 1350.139335][T29217] alloc_inode+0x8e/0x250 [ 1350.139362][T29217] create_pipe_files+0x4c/0x970 [ 1350.139387][T29217] do_pipe2+0xbd/0x1e0 [ 1350.139409][T29217] ? __pfx_do_pipe2+0x10/0x10 [ 1350.139432][T29217] ? ksys_write+0x1ac/0x250 [ 1350.139457][T29217] __x64_sys_pipe2+0x54/0x80 [ 1350.139480][T29217] do_syscall_64+0x10b/0xf80 [ 1350.139508][T29217] ? clear_bhb_loop+0x40/0x90 [ 1350.139531][T29217] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1350.139550][T29217] RIP: 0033:0x7f7ec199c819 [ 1350.139566][T29217] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1350.139584][T29217] RSP: 002b:00007f7ec286f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000125 [ 1350.139603][T29217] RAX: ffffffffffffffda RBX: 00007f7ec1c15fa0 RCX: 00007f7ec199c819 [ 1350.139615][T29217] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1350.139631][T29217] RBP: 00007f7ec1a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1350.139642][T29217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1350.139653][T29217] R13: 00007f7ec1c16038 R14: 00007f7ec1c15fa0 R15: 00007fff4f7a44a8 [ 1350.139677][T29217] [ 1353.908867][T29258] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 1353.965479][T29258] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 1354.032533][T29258] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 1354.108880][T29258] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 1354.181835][T29269] FAULT_INJECTION: forcing a failure. [ 1354.181835][T29269] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1354.326189][T29269] CPU: 0 UID: 0 PID: 29269 Comm: syz.3.8133 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1354.326223][T29269] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1354.326231][T29269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1354.326242][T29269] Call Trace: [ 1354.326249][T29269] [ 1354.326257][T29269] dump_stack_lvl+0x100/0x190 [ 1354.326282][T29269] should_fail_ex.cold+0x5/0xa [ 1354.326302][T29269] ? prepare_alloc_pages+0x16d/0x5f0 [ 1354.326327][T29269] should_fail_alloc_page+0xeb/0x140 [ 1354.326350][T29269] prepare_alloc_pages+0x1f0/0x5f0 [ 1354.326377][T29269] __alloc_frozen_pages_noprof+0x19a/0x2bc0 [ 1354.326410][T29269] ? __pfx___up_read+0x10/0x10 [ 1354.326429][T29269] ? validate_mm+0x261/0x4e0 [ 1354.326455][T29269] ? validate_mm+0x261/0x4e0 [ 1354.326482][T29269] ? mas_find+0x2dd/0x740 [ 1354.326501][T29269] ? validate_mm+0x392/0x4e0 [ 1354.326528][T29269] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 1354.326572][T29269] ? up_write+0x28c/0x4f0 [ 1354.326594][T29269] ? vma_link+0x5ee/0x8d0 [ 1354.326619][T29269] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1354.326647][T29269] ? policy_nodemask+0xed/0x4f0 [ 1354.326669][T29269] alloc_pages_mpol+0x1fb/0x540 [ 1354.326691][T29269] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 1354.326719][T29269] alloc_pages_noprof+0x1a/0x160 [ 1354.326744][T29269] __pmd_alloc+0x3b/0x950 [ 1354.326769][T29269] move_page_tables+0x3224/0x4500 [ 1354.326800][T29269] ? __pfx_copy_vma+0x10/0x10 [ 1354.326842][T29269] ? __pfx_move_page_tables+0x10/0x10 [ 1354.326887][T29269] copy_vma_and_data+0x25c/0x7c0 [ 1354.326918][T29269] ? __pfx_copy_vma_and_data+0x10/0x10 [ 1354.326956][T29269] ? __vma_start_write+0x17f/0x280 [ 1354.326981][T29269] ? __pfx___vma_start_write+0x10/0x10 [ 1354.327005][T29269] ? __pfx_arch_get_unmapped_area_topdown+0x10/0x10 [ 1354.327034][T29269] move_vma+0x574/0x1920 [ 1354.327066][T29269] ? __pfx_move_vma+0x10/0x10 [ 1354.327096][T29269] ? thp_get_unmapped_area_vmflags+0x27f/0x2d0 [ 1354.327123][T29269] ? cap_mmap_addr+0x4b/0x120 [ 1354.327146][T29269] ? bpf_lsm_mmap_addr+0x9/0x30 [ 1354.327163][T29269] ? security_mmap_addr+0x71/0x1e0 [ 1354.327181][T29269] ? __get_unmapped_area+0x255/0x3e0 [ 1354.327206][T29269] ? vrm_set_new_addr+0x204/0x290 [ 1354.327236][T29269] mremap_to+0x234/0x4c0 [ 1354.327263][T29269] ? mas_walk+0x6ef/0x9b0 [ 1354.327289][T29269] ? __pfx_mremap_to+0x10/0x10 [ 1354.327322][T29269] __do_sys_mremap+0xa7a/0x1850 [ 1354.327358][T29269] ? __pfx___do_sys_mremap+0x10/0x10 [ 1354.327390][T29269] ? do_futex+0x192/0x350 [ 1354.327410][T29269] ? __pfx_do_futex+0x10/0x10 [ 1354.327436][T29269] ? __x64_sys_futex+0x34f/0x4d0 [ 1354.327465][T29269] ? rcu_is_watching+0x12/0xc0 [ 1354.327489][T29269] do_syscall_64+0x10b/0xf80 [ 1354.327517][T29269] ? clear_bhb_loop+0x40/0x90 [ 1354.327539][T29269] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1354.327558][T29269] RIP: 0033:0x7f78c019c819 [ 1354.327576][T29269] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1354.327595][T29269] RSP: 002b:00007f78c0f93028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 1354.327614][T29269] RAX: ffffffffffffffda RBX: 00007f78c0415fa0 RCX: 00007f78c019c819 [ 1354.327627][T29269] RDX: 0000000000000004 RSI: 0000000000000004 RDI: 000000110c231000 [ 1354.327637][T29269] RBP: 00007f78c0232c91 R08: 0000000100000000 R09: 0000000000000000 [ 1354.327648][T29269] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000000 [ 1354.327660][T29269] R13: 00007f78c0416038 R14: 00007f78c0415fa0 R15: 00007fff5d241098 [ 1354.327683][T29269] [ 1355.196332][T28916] Bluetooth: hci0: command 0x0406 tx timeout [ 1355.984520][ T5845] Bluetooth: hci1: command 0x0406 tx timeout [ 1356.011310][T29286] netlink: 28 bytes leftover after parsing attributes in process `syz.2.8140'. [ 1356.064759][ T5845] Bluetooth: hci3: command 0x0406 tx timeout [ 1356.144727][ T5845] Bluetooth: hci2: command 0x0c1a tx timeout [ 1356.171405][T29286] : (slave bond_slave_1): Releasing backup interface [ 1357.042032][T29296] zswap: compressor not available [ 1359.397870][T29335] netlink: 'syz.4.8153': attribute type 1 has an invalid length. [ 1359.453202][T29335] netlink: 'syz.4.8153': attribute type 6 has an invalid length. [ 1361.428889][T29368] netlink: 28 bytes leftover after parsing attributes in process `syz.1.8162'. [ 1361.583453][T29368] : (slave bond_slave_1): Releasing backup interface [ 1361.801836][T29373] netlink: 'syz.3.8164': attribute type 21 has an invalid length. [ 1361.846860][T29373] netlink: 326 bytes leftover after parsing attributes in process `syz.3.8164'. [ 1362.154046][ T1314] ieee802154 phy0 wpan0: encryption failed: -22 [ 1362.160504][ T1314] ieee802154 phy1 wpan1: encryption failed: -22 [ 1362.731852][T29365] kexec: Could not allocate control_code_buffer [ 1364.178794][T29405] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8173'. [ 1364.225532][T29405] netlink: 13 bytes leftover after parsing attributes in process `syz.4.8173'. [ 1364.442949][T29402] zswap: compressor not available [ 1365.181172][T29428] netlink: 342 bytes leftover after parsing attributes in process `syz.4.8183'. [ 1365.533401][T29431] kvm: kvm [29430]: vcpu0, guest rIP: 0xfff0 Unhandled WRMSR(0x11e) = 0x1 [ 1367.287047][T29451] zswap: compressor not available [ 1369.713703][T29490] netlink: 186 bytes leftover after parsing attributes in process `syz.4.8199'. [ 1369.775696][T29490] netlink: 186 bytes leftover after parsing attributes in process `syz.4.8199'. [ 1373.422653][T29555] netlink: 28 bytes leftover after parsing attributes in process `syz.3.8219'. [ 1373.903733][T29558] netlink: 266 bytes leftover after parsing attributes in process `syz.1.8221'. [ 1374.901998][T29570] netlink: 504 bytes leftover after parsing attributes in process `syz.4.8226'. [ 1374.963222][T29570] netlink: 350 bytes leftover after parsing attributes in process `syz.4.8226'. [ 1377.384278][T29595] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 1377.468301][T29595] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 1377.551595][T29595] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 1377.683108][T29595] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 1378.715730][ T5845] Bluetooth: hci0: command 0x0406 tx timeout [ 1378.921417][T29618] netlink: 306 bytes leftover after parsing attributes in process `syz.4.8242'. [ 1379.516083][ T5845] Bluetooth: hci1: command 0x0406 tx timeout [ 1379.597609][ T5845] Bluetooth: hci3: command 0x0406 tx timeout [ 1379.756841][ T5845] Bluetooth: hci2: command 0x0c1a tx timeout [ 1380.093133][T29639] netlink: 28 bytes leftover after parsing attributes in process `syz.2.8248'. [ 1380.506103][T29642] netlink: 17 bytes leftover after parsing attributes in process `syz.2.8249'. [ 1382.011955][T29671] netlink: 186 bytes leftover after parsing attributes in process `syz.1.8256'. [ 1382.180374][T29674] netlink: 186 bytes leftover after parsing attributes in process `syz.1.8256'. [ 1382.926557][T29680] vhci_hcd vhci_hcd.2: invalid port number 255 [ 1384.827154][T29709] ERROR: Out of memory at tomoyo_memory_ok. [ 1387.551309][T29750] netlink: 330 bytes leftover after parsing attributes in process `syz.2.8279'. [ 1389.963541][T29767] openvswitch: netlink: IP tunnel dst address not specified [ 1390.218297][T29772] FAULT_INJECTION: forcing a failure. [ 1390.218297][T29772] name failslab, interval 1, probability 0, space 0, times 0 [ 1390.279657][T29772] CPU: 0 UID: 0 PID: 29772 Comm: syz.2.8286 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1390.279691][T29772] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1390.279699][T29772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1390.279709][T29772] Call Trace: [ 1390.279717][T29772] [ 1390.279724][T29772] dump_stack_lvl+0x100/0x190 [ 1390.279749][T29772] should_fail_ex.cold+0x5/0xa [ 1390.279773][T29772] should_failslab+0xc2/0x120 [ 1390.279795][T29772] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 1390.279824][T29772] ? __d_alloc+0x34/0xa40 [ 1390.279853][T29772] __d_alloc+0x34/0xa40 [ 1390.279880][T29772] d_alloc+0x4a/0x1e0 [ 1390.279904][T29772] lookup_one_qstr_excl+0x171/0x250 [ 1390.279934][T29772] start_dirop+0x59/0xb0 [ 1390.279955][T29772] simple_start_creating+0xf9/0x110 [ 1390.279976][T29772] ? __pfx_simple_start_creating+0x10/0x10 [ 1390.279999][T29772] ? mntput+0x70/0xa0 [ 1390.280017][T29772] ? simple_pin_fs+0xa3/0x190 [ 1390.280036][T29772] debugfs_start_creating.part.0+0x82/0x170 [ 1390.280064][T29772] debugfs_create_symlink+0x7f/0x220 [ 1390.280092][T29772] ref_tracker_dir_symlink+0x257/0x3b0 [ 1390.280114][T29772] ? __pfx_ref_tracker_dir_symlink+0x10/0x10 [ 1390.280153][T29772] ? find_held_lock+0x2b/0x80 [ 1390.280184][T29772] ? __pfx_net_ns_net_init+0x10/0x10 [ 1390.280205][T29772] net_ns_net_init+0xd2/0x120 [ 1390.280225][T29772] ops_init+0x1e2/0x5f0 [ 1390.280247][T29772] setup_net+0x118/0x3a0 [ 1390.280267][T29772] ? __pfx_setup_net+0x10/0x10 [ 1390.280287][T29772] ? mutex_init_lockdep+0xf1/0x120 [ 1390.280311][T29772] copy_net_ns+0x46f/0x7c0 [ 1390.280340][T29772] create_new_namespaces+0x3ea/0xac0 [ 1390.280375][T29772] unshare_nsproxy_namespaces+0xf2/0x220 [ 1390.280401][T29772] ksys_unshare+0x438/0xab0 [ 1390.280428][T29772] ? __pfx_ksys_unshare+0x10/0x10 [ 1390.280454][T29772] ? xfd_validate_state+0x129/0x190 [ 1390.280482][T29772] __x64_sys_unshare+0x31/0x40 [ 1390.280509][T29772] do_syscall_64+0x10b/0xf80 [ 1390.280537][T29772] ? clear_bhb_loop+0x40/0x90 [ 1390.280559][T29772] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1390.280579][T29772] RIP: 0033:0x7f4422d9c819 [ 1390.280595][T29772] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1390.280614][T29772] RSP: 002b:00007f4423b82028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1390.280633][T29772] RAX: ffffffffffffffda RBX: 00007f4423015fa0 RCX: 00007f4422d9c819 [ 1390.280645][T29772] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1390.280656][T29772] RBP: 00007f4422e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1390.280667][T29772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1390.280678][T29772] R13: 00007f4423016038 R14: 00007f4423015fa0 R15: 00007ffc7eef17d8 [ 1390.280703][T29772] [ 1391.461222][T29776] zswap: compressor not available [ 1393.131180][T29795] : Can't lookup blockdev [ 1394.300764][T29812] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8299'. [ 1394.415398][T29813] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8299'. [ 1395.999283][T29831] FAULT_INJECTION: forcing a failure. [ 1395.999283][T29831] name failslab, interval 1, probability 0, space 0, times 0 [ 1396.186646][T29831] CPU: 0 UID: 0 PID: 29831 Comm: syz.4.8306 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1396.186679][T29831] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1396.186687][T29831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1396.186699][T29831] Call Trace: [ 1396.186706][T29831] [ 1396.186714][T29831] dump_stack_lvl+0x100/0x190 [ 1396.186739][T29831] should_fail_ex.cold+0x5/0xa [ 1396.186763][T29831] should_failslab+0xc2/0x120 [ 1396.186785][T29831] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1396.186812][T29831] ? tomoyo_write_log2+0x333/0xbc0 [ 1396.186836][T29831] tomoyo_write_log2+0x333/0xbc0 [ 1396.186859][T29831] tomoyo_supervisor+0x15e/0x1340 [ 1396.186886][T29831] ? __pfx_tomoyo_supervisor+0x10/0x10 [ 1396.186920][T29831] ? kasan_quarantine_put+0x104/0x240 [ 1396.186951][T29831] ? tomoyo_check_path_acl+0x141/0x210 [ 1396.186979][T29831] ? tomoyo_check_acl+0x1f7/0x410 [ 1396.187007][T29831] tomoyo_path_permission+0x270/0x3b0 [ 1396.187037][T29831] tomoyo_check_open_permission+0x37f/0x3c0 [ 1396.187075][T29831] ? __pfx_tomoyo_check_open_permission+0x10/0x10 [ 1396.187113][T29831] ? hook_file_open+0x24e/0x7a0 [ 1396.187145][T29831] ? path_get+0x61/0x80 [ 1396.187172][T29831] tomoyo_file_open+0x6b/0x90 [ 1396.187196][T29831] security_file_open+0xb5/0x1e0 [ 1396.187217][T29831] do_dentry_open+0x5aa/0x1660 [ 1396.187247][T29831] ? security_inode_permission+0xbf/0x250 [ 1396.187278][T29831] vfs_open+0x82/0x3f0 [ 1396.187307][T29831] path_openat+0x208c/0x31a0 [ 1396.187337][T29831] ? __pfx_path_openat+0x10/0x10 [ 1396.187368][T29831] do_file_open+0x20e/0x430 [ 1396.187392][T29831] ? __pfx_do_file_open+0x10/0x10 [ 1396.187430][T29831] ? alloc_fd+0x476/0x790 [ 1396.187455][T29831] ? do_getname+0x191/0x390 [ 1396.187482][T29831] do_sys_openat2+0x10d/0x1e0 [ 1396.187509][T29831] ? __pfx_do_sys_openat2+0x10/0x10 [ 1396.187544][T29831] __x64_sys_openat+0x12d/0x210 [ 1396.187572][T29831] ? __pfx___x64_sys_openat+0x10/0x10 [ 1396.187598][T29831] ? ksys_write+0x1ac/0x250 [ 1396.187626][T29831] ? rcu_is_watching+0x12/0xc0 [ 1396.187651][T29831] do_syscall_64+0x10b/0xf80 [ 1396.187679][T29831] ? clear_bhb_loop+0x40/0x90 [ 1396.187702][T29831] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1396.187721][T29831] RIP: 0033:0x7f7ec199c819 [ 1396.187737][T29831] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1396.187755][T29831] RSP: 002b:00007f7ec286f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1396.187774][T29831] RAX: ffffffffffffffda RBX: 00007f7ec1c15fa0 RCX: 00007f7ec199c819 [ 1396.187787][T29831] RDX: 0000000000000000 RSI: 00002000000055c0 RDI: ffffffffffffff9c [ 1396.187799][T29831] RBP: 00007f7ec1a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1396.187810][T29831] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1396.187821][T29831] R13: 00007f7ec1c16038 R14: 00007f7ec1c15fa0 R15: 00007fff4f7a44a8 [ 1396.187845][T29831] [ 1398.397034][T29864] device-mapper: ioctl: ioctl interface mismatch: kernel(4.50.0), user(4.128.4294967291), cmd(3) [ 1399.032985][T29868] netlink: 326 bytes leftover after parsing attributes in process `syz.2.8317'. [ 1399.556329][T29881] futex_wake_op: syz.2.8320 tries to shift op by -2048; fix this program [ 1399.603393][T29881] futex_wake_op: syz.2.8320 tries to shift op by -2048; fix this program [ 1402.942622][T29912] sd 0:0:1:0: PR command failed: 1026 [ 1402.992022][T29912] sd 0:0:1:0: Sense Key : Illegal Request [current] [ 1403.042472][T29912] sd 0:0:1:0: Add. Sense: Invalid command operation code [ 1403.491325][ T5845] Bluetooth: hci0: unexpected event 0x08 length: 435 > 4 [ 1404.376451][T29948] ERROR: Out of memory at tomoyo_memory_ok. [ 1407.164407][T29982] netlink: 138 bytes leftover after parsing attributes in process `syz.3.8348'. [ 1407.258858][T29980] FAULT_INJECTION: forcing a failure. [ 1407.258858][T29980] name failslab, interval 1, probability 0, space 0, times 0 [ 1407.393312][T29980] CPU: 0 UID: 0 PID: 29980 Comm: syz.2.8346 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1407.393347][T29980] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1407.393355][T29980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1407.393368][T29980] Call Trace: [ 1407.393380][T29980] [ 1407.393388][T29980] dump_stack_lvl+0x100/0x190 [ 1407.393414][T29980] should_fail_ex.cold+0x5/0xa [ 1407.393439][T29980] should_failslab+0xc2/0x120 [ 1407.393461][T29980] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1407.393489][T29980] ? kobject_uevent_env+0x263/0x18b0 [ 1407.393520][T29980] kobject_uevent_env+0x263/0x18b0 [ 1407.393547][T29980] ? kernfs_remove_by_name_ns+0xbb/0x120 [ 1407.393577][T29980] __kobject_del+0x168/0x220 [ 1407.393601][T29980] kobject_put+0x348/0x640 [ 1407.393622][T29980] net_rx_queue_update_kobjects+0x544/0x760 [ 1407.393654][T29980] netdev_unregister_kobject+0x154/0x540 [ 1407.393677][T29980] ? rtmsg_ifinfo_send+0xcc/0x110 [ 1407.393702][T29980] unregister_netdevice_many_notify+0x179e/0x24f0 [ 1407.393731][T29980] ? __pfx_unregister_netdevice_many_notify+0x10/0x10 [ 1407.393754][T29980] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1407.393789][T29980] unregister_netdevice_queue+0x30b/0x3c0 [ 1407.393812][T29980] ? __pfx_unregister_netdevice_queue+0x10/0x10 [ 1407.393834][T29980] ? __pfx_locks_remove_file+0x10/0x10 [ 1407.393865][T29980] ppp_release+0x125/0x150 [ 1407.393892][T29980] ? __pfx_ppp_release+0x10/0x10 [ 1407.393938][T29980] __fput+0x3ff/0xb50 [ 1407.393968][T29980] task_work_run+0x150/0x240 [ 1407.393989][T29980] ? __pfx_task_work_run+0x10/0x10 [ 1407.394009][T29980] ? rcu_is_watching+0x12/0xc0 [ 1407.394036][T29980] exit_to_user_mode_loop+0x100/0x4a0 [ 1407.394054][T29980] ? do_syscall_64+0x519/0xf80 [ 1407.394084][T29980] do_syscall_64+0x6f2/0xf80 [ 1407.394110][T29980] ? clear_bhb_loop+0x40/0x90 [ 1407.394162][T29980] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1407.394181][T29980] RIP: 0033:0x7f4422d9c819 [ 1407.394198][T29980] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1407.394217][T29980] RSP: 002b:00007f4423b82028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 1407.394236][T29980] RAX: 0000000000000000 RBX: 00007f4423015fa0 RCX: 00007f4422d9c819 [ 1407.394248][T29980] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000002 [ 1407.394259][T29980] RBP: 00007f4422e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1407.394271][T29980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1407.394283][T29980] R13: 00007f4423016038 R14: 00007f4423015fa0 R15: 00007ffc7eef17d8 [ 1407.394307][T29980] [ 1411.447864][T30031] netlink: 'syz.1.8362': attribute type 1 has an invalid length. [ 1411.489445][T30031] netlink: 198 bytes leftover after parsing attributes in process `syz.1.8362'. [ 1411.887946][T30036] FAULT_INJECTION: forcing a failure. [ 1411.887946][T30036] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.974531][T30036] CPU: 0 UID: 0 PID: 30036 Comm: syz.3.8365 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1411.974568][T30036] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1411.974577][T30036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1411.974588][T30036] Call Trace: [ 1411.974595][T30036] [ 1411.974603][T30036] dump_stack_lvl+0x100/0x190 [ 1411.974628][T30036] should_fail_ex.cold+0x5/0xa [ 1411.974652][T30036] should_failslab+0xc2/0x120 [ 1411.974674][T30036] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1411.974704][T30036] ? ptlock_alloc+0x1f/0x70 [ 1411.974734][T30036] ptlock_alloc+0x1f/0x70 [ 1411.974759][T30036] pte_alloc_one+0x82/0x3d0 [ 1411.974784][T30036] __pte_alloc+0x6d/0x3e0 [ 1411.974804][T30036] ? __pfx___pte_alloc+0x10/0x10 [ 1411.974825][T30036] ? _raw_spin_unlock+0x28/0x50 [ 1411.974849][T30036] ? __pmd_alloc+0x3fb/0x950 [ 1411.974874][T30036] move_page_tables+0x257e/0x4500 [ 1411.974904][T30036] ? __pfx_copy_vma+0x10/0x10 [ 1411.974941][T30036] ? __pfx_move_page_tables+0x10/0x10 [ 1411.974987][T30036] copy_vma_and_data+0x25c/0x7c0 [ 1411.975023][T30036] ? __pfx_copy_vma_and_data+0x10/0x10 [ 1411.975062][T30036] ? __vma_start_write+0x17f/0x280 [ 1411.975087][T30036] ? __pfx___vma_start_write+0x10/0x10 [ 1411.975122][T30036] move_vma+0x574/0x1920 [ 1411.975154][T30036] ? __pfx_move_vma+0x10/0x10 [ 1411.975184][T30036] ? mm_get_unmapped_area_vmflags+0xd7/0x130 [ 1411.975207][T30036] ? cap_mmap_addr+0x4b/0x120 [ 1411.975231][T30036] ? bpf_lsm_mmap_addr+0x9/0x30 [ 1411.975249][T30036] ? security_mmap_addr+0x71/0x1e0 [ 1411.975268][T30036] ? __get_unmapped_area+0x255/0x3e0 [ 1411.975293][T30036] ? vrm_set_new_addr+0x204/0x290 [ 1411.975323][T30036] mremap_to+0x234/0x4c0 [ 1411.975349][T30036] ? mas_walk+0x6ef/0x9b0 [ 1411.975375][T30036] ? __pfx_mremap_to+0x10/0x10 [ 1411.975409][T30036] __do_sys_mremap+0xa7a/0x1850 [ 1411.975445][T30036] ? __pfx___do_sys_mremap+0x10/0x10 [ 1411.975477][T30036] ? do_futex+0x192/0x350 [ 1411.975497][T30036] ? __pfx_do_futex+0x10/0x10 [ 1411.975523][T30036] ? __x64_sys_futex+0x34f/0x4d0 [ 1411.975551][T30036] ? rcu_is_watching+0x12/0xc0 [ 1411.975576][T30036] do_syscall_64+0x10b/0xf80 [ 1411.975604][T30036] ? clear_bhb_loop+0x40/0x90 [ 1411.975626][T30036] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1411.975645][T30036] RIP: 0033:0x7f78c019c819 [ 1411.975662][T30036] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1411.975681][T30036] RSP: 002b:00007f78c0f72028 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 1411.975699][T30036] RAX: ffffffffffffffda RBX: 00007f78c0416090 RCX: 00007f78c019c819 [ 1411.975711][T30036] RDX: 0000000000000004 RSI: 0000000000000004 RDI: 0000000000000000 [ 1411.975722][T30036] RBP: 00007f78c0232c91 R08: 0000000100000000 R09: 0000000000000000 [ 1411.975735][T30036] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000000 [ 1411.975746][T30036] R13: 00007f78c0416128 R14: 00007f78c0416090 R15: 00007fff5d241098 [ 1411.975770][T30036] [ 1413.386393][T30060] futex_wake_op: syz.1.8371 tries to shift op by -2048; fix this program [ 1413.479990][T30060] futex_wake_op: syz.1.8371 tries to shift op by -2048; fix this program [ 1422.028688][T30166] FAULT_INJECTION: forcing a failure. [ 1422.028688][T30166] name failslab, interval 1, probability 0, space 0, times 0 [ 1422.088977][T30166] CPU: 0 UID: 0 PID: 30166 Comm: syz.3.8406 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1422.089012][T30166] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1422.089019][T30166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1422.089030][T30166] Call Trace: [ 1422.089037][T30166] [ 1422.089046][T30166] dump_stack_lvl+0x100/0x190 [ 1422.089071][T30166] should_fail_ex.cold+0x5/0xa [ 1422.089095][T30166] should_failslab+0xc2/0x120 [ 1422.089116][T30166] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1422.089143][T30166] ? mqueue_init_fs_context+0x4b/0x690 [ 1422.089172][T30166] mqueue_init_fs_context+0x4b/0x690 [ 1422.089199][T30166] alloc_fs_context+0x60c/0xf40 [ 1422.089229][T30166] mq_init_ns+0x16e/0x820 [ 1422.089255][T30166] copy_ipcs+0x3dd/0x7e0 [ 1422.089283][T30166] create_new_namespaces+0x20a/0xac0 [ 1422.089307][T30166] ? security_capable+0x80/0x260 [ 1422.089332][T30166] unshare_nsproxy_namespaces+0xf2/0x220 [ 1422.089358][T30166] ksys_unshare+0x438/0xab0 [ 1422.089386][T30166] ? __pfx_ksys_unshare+0x10/0x10 [ 1422.089411][T30166] ? xfd_validate_state+0x129/0x190 [ 1422.089437][T30166] __x64_sys_unshare+0x31/0x40 [ 1422.089463][T30166] do_syscall_64+0x10b/0xf80 [ 1422.089491][T30166] ? clear_bhb_loop+0x40/0x90 [ 1422.089513][T30166] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1422.089532][T30166] RIP: 0033:0x7f78c019c819 [ 1422.089547][T30166] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1422.089566][T30166] RSP: 002b:00007f78c0f93028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1422.089585][T30166] RAX: ffffffffffffffda RBX: 00007f78c0415fa0 RCX: 00007f78c019c819 [ 1422.089597][T30166] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c000000 [ 1422.089608][T30166] RBP: 00007f78c0232c91 R08: 0000000000000000 R09: 0000000000000000 [ 1422.089620][T30166] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1422.089631][T30166] R13: 00007f78c0416038 R14: 00007f78c0415fa0 R15: 00007fff5d241098 [ 1422.089653][T30166] [ 1423.188822][T30180] netlink: 138 bytes leftover after parsing attributes in process `syz.1.8410'. [ 1423.486566][T30186] bridge0: port 2(bond0) entered blocking state [ 1423.537796][T30186] bridge0: port 2(bond0) entered disabled state [ 1423.576127][T30186] bond0: entered allmulticast mode [ 1423.607468][T30186] bond_slave_0: entered allmulticast mode [ 1423.632914][ T1314] ieee802154 phy0 wpan0: encryption failed: -22 [ 1423.641399][ T1314] ieee802154 phy1 wpan1: encryption failed: -22 [ 1423.659992][T30186] bond_slave_1: entered allmulticast mode [ 1423.685418][T30186] bond0: entered promiscuous mode [ 1423.706665][T30186] bond_slave_0: entered promiscuous mode [ 1423.731214][T30186] bond_slave_1: entered promiscuous mode [ 1423.751101][T30186] bridge0: port 2(bond0) entered blocking state [ 1423.757518][T30186] bridge0: port 2(bond0) entered forwarding state [ 1424.295898][T30194] netlink: 4 bytes leftover after parsing attributes in process `syz.2.8414'. [ 1424.346726][T30194] netlink: 25 bytes leftover after parsing attributes in process `syz.2.8414'. [ 1424.585968][T30199] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8416'. [ 1424.739851][T30203] netlink: 28 bytes leftover after parsing attributes in process `syz.2.8417'. [ 1424.944395][T30205] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8419'. [ 1426.849174][ T5845] Bluetooth: hci3: unexpected event 0x3e length: 358 > 260 [ 1426.849203][ T5845] Bluetooth: hci3: unexpected subevent 0x1b length: 357 > 260 [ 1427.879938][T30253] netlink: 186 bytes leftover after parsing attributes in process `syz.2.8435'. [ 1431.769807][T30308] zswap: compressor 000 not available [ 1435.297204][T30366] FAULT_INJECTION: forcing a failure. [ 1435.297204][T30366] name failslab, interval 1, probability 0, space 0, times 0 [ 1435.366456][T30366] CPU: 0 UID: 0 PID: 30366 Comm: syz.3.8471 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1435.366490][T30366] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1435.366498][T30366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1435.366509][T30366] Call Trace: [ 1435.366516][T30366] [ 1435.366525][T30366] dump_stack_lvl+0x100/0x190 [ 1435.366549][T30366] should_fail_ex.cold+0x5/0xa [ 1435.366574][T30366] should_failslab+0xc2/0x120 [ 1435.366595][T30366] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1435.366622][T30366] ? alloc_super+0x52/0xd20 [ 1435.366644][T30366] alloc_super+0x52/0xd20 [ 1435.366664][T30366] ? __pfx_mqueue_fill_super+0x10/0x10 [ 1435.366687][T30366] sget_fc+0x117/0xc70 [ 1435.366705][T30366] ? __pfx_set_anon_super_fc+0x10/0x10 [ 1435.366743][T30366] ? __pfx_mqueue_fill_super+0x10/0x10 [ 1435.366766][T30366] get_tree_nodev+0x28/0x190 [ 1435.366786][T30366] mqueue_get_tree+0xf1/0x130 [ 1435.366809][T30366] vfs_get_tree+0x92/0x320 [ 1435.366837][T30366] fc_mount_longterm+0x1a/0x270 [ 1435.366856][T30366] mq_init_ns+0x482/0x820 [ 1435.366883][T30366] copy_ipcs+0x3dd/0x7e0 [ 1435.366910][T30366] create_new_namespaces+0x20a/0xac0 [ 1435.366934][T30366] ? security_capable+0x80/0x260 [ 1435.366960][T30366] unshare_nsproxy_namespaces+0xf2/0x220 [ 1435.366985][T30366] ksys_unshare+0x438/0xab0 [ 1435.367013][T30366] ? __pfx_ksys_unshare+0x10/0x10 [ 1435.367039][T30366] ? xfd_validate_state+0x129/0x190 [ 1435.367065][T30366] __x64_sys_unshare+0x31/0x40 [ 1435.367092][T30366] do_syscall_64+0x10b/0xf80 [ 1435.367119][T30366] ? clear_bhb_loop+0x40/0x90 [ 1435.367141][T30366] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1435.367160][T30366] RIP: 0033:0x7f78c019c819 [ 1435.367177][T30366] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1435.367196][T30366] RSP: 002b:00007f78c0f93028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1435.367215][T30366] RAX: ffffffffffffffda RBX: 00007f78c0415fa0 RCX: 00007f78c019c819 [ 1435.367227][T30366] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006c000000 [ 1435.367238][T30366] RBP: 00007f78c0232c91 R08: 0000000000000000 R09: 0000000000000000 [ 1435.367249][T30366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1435.367261][T30366] R13: 00007f78c0416038 R14: 00007f78c0415fa0 R15: 00007fff5d241098 [ 1435.367283][T30366] [ 1436.073974][ T30] audit: type=1800 audit(4294969578.077:46): pid=30374 uid=0 auid=4294967295 ses=4294967295 subj=unconfined op=collect_data cause=failed comm="syz.1.8474" name="trace_marker" dev="tracefs" ino=3932 res=0 errno=0 [ 1436.546836][T30378] netlink: 326 bytes leftover after parsing attributes in process `syz.3.8476'. [ 1436.736030][T30385] netlink: 330 bytes leftover after parsing attributes in process `syz.1.8479'. [ 1438.729520][T30430] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8495'. [ 1438.770787][T30430] netlink: 25 bytes leftover after parsing attributes in process `syz.1.8495'. [ 1438.863120][T30433] netlink: 28 bytes leftover after parsing attributes in process `syz.2.8493'. [ 1438.913468][T30433] veth1_vlan: entered allmulticast mode [ 1440.019272][T30456] block2mtd: error: cannot open device  [ 1443.687134][T30500] netlink: 334 bytes leftover after parsing attributes in process `syz.4.8517'. [ 1443.945339][T30513] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1443.973943][T30513] bridge0: port 3(veth0_to_bridge) entered disabled state [ 1443.999559][T30513] veth0_to_bridge: entered allmulticast mode [ 1444.024587][T30513] veth0_to_bridge: entered promiscuous mode [ 1444.045668][T30513] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 1444.093635][T30513] bridge0: port 3(veth0_to_bridge) entered blocking state [ 1444.100928][T30513] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 1446.061857][T30546] FAULT_INJECTION: forcing a failure. [ 1446.061857][T30546] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.136383][T30546] CPU: 0 UID: 0 PID: 30546 Comm: syz.1.8532 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1446.136417][T30546] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1446.136425][T30546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1446.136435][T30546] Call Trace: [ 1446.136443][T30546] [ 1446.136450][T30546] dump_stack_lvl+0x100/0x190 [ 1446.136476][T30546] should_fail_ex.cold+0x5/0xa [ 1446.136499][T30546] should_failslab+0xc2/0x120 [ 1446.136521][T30546] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1446.136550][T30546] ? security_file_alloc+0x34/0x2c0 [ 1446.136574][T30546] ? trace_kmem_cache_alloc+0xd5/0x100 [ 1446.136600][T30546] security_file_alloc+0x34/0x2c0 [ 1446.136618][T30546] init_file+0x95/0x480 [ 1446.136643][T30546] alloc_empty_file+0x79/0x1c0 [ 1446.136670][T30546] dentry_open+0x46/0xd0 [ 1446.136695][T30546] pidfs_alloc_file+0x18f/0x290 [ 1446.136718][T30546] ? __pfx_pidfs_alloc_file+0x10/0x10 [ 1446.136745][T30546] pidfd_prepare+0x10c/0x1b0 [ 1446.136771][T30546] __x64_sys_pidfd_open+0x105/0x1a0 [ 1446.136800][T30546] ? __pfx___x64_sys_pidfd_open+0x10/0x10 [ 1446.136831][T30546] ? rcu_is_watching+0x12/0xc0 [ 1446.136855][T30546] do_syscall_64+0x10b/0xf80 [ 1446.136883][T30546] ? clear_bhb_loop+0x40/0x90 [ 1446.136905][T30546] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1446.136924][T30546] RIP: 0033:0x7fedd8d9c819 [ 1446.136941][T30546] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1446.136959][T30546] RSP: 002b:00007fedd9c62028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b2 [ 1446.136978][T30546] RAX: ffffffffffffffda RBX: 00007fedd9015fa0 RCX: 00007fedd8d9c819 [ 1446.136991][T30546] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 1446.137002][T30546] RBP: 00007fedd8e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1446.137013][T30546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1446.137024][T30546] R13: 00007fedd9016038 R14: 00007fedd9015fa0 R15: 00007ffe9012dc68 [ 1446.137047][T30546] [ 1446.524774][T30552] openvswitch: netlink: Flow get message rejected, Key attribute missing. [ 1447.414116][T30559] netlink: 334 bytes leftover after parsing attributes in process `syz.4.8545'. [ 1449.524098][T30587] netlink: 28 bytes leftover after parsing attributes in process `syz.3.8544'. [ 1449.573939][T30587] veth1_vlan: entered allmulticast mode [ 1449.828399][T30580] FAULT_INJECTION: forcing a failure. [ 1449.828399][T30580] name failslab, interval 1, probability 0, space 0, times 0 [ 1449.979647][T30580] CPU: 0 UID: 0 PID: 30580 Comm: syz.2.8542 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1449.979680][T30580] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1449.979688][T30580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1449.979699][T30580] Call Trace: [ 1449.979706][T30580] [ 1449.979714][T30580] dump_stack_lvl+0x100/0x190 [ 1449.979739][T30580] should_fail_ex.cold+0x5/0xa [ 1449.979764][T30580] should_failslab+0xc2/0x120 [ 1449.979786][T30580] kmem_cache_alloc_lru_noprof+0x80/0x6e0 [ 1449.979815][T30580] ? proc_alloc_inode+0x25/0x200 [ 1449.979835][T30580] ? find_held_lock+0x2b/0x80 [ 1449.979860][T30580] ? __pfx_proc_alloc_inode+0x10/0x10 [ 1449.979881][T30580] proc_alloc_inode+0x25/0x200 [ 1449.979901][T30580] alloc_inode+0x68/0x250 [ 1449.979928][T30580] new_inode+0x22/0x1c0 [ 1449.979953][T30580] ? proc_sys_lookup+0x266/0x430 [ 1449.979977][T30580] proc_sys_make_inode+0x47/0x5c0 [ 1449.980000][T30580] proc_sys_lookup+0x307/0x430 [ 1449.980022][T30580] ? __pfx_proc_sys_lookup+0x10/0x10 [ 1449.980046][T30580] ? lockdep_init_map_type+0x5c/0x250 [ 1449.980066][T30580] ? lockdep_init_map_type+0x5c/0x250 [ 1449.980088][T30580] __lookup_slow+0x251/0x460 [ 1449.980116][T30580] ? __pfx___lookup_slow+0x10/0x10 [ 1449.980154][T30580] ? __d_lookup+0x266/0x4a0 [ 1449.980175][T30580] lookup_slow+0x50/0x70 [ 1449.980202][T30580] link_path_walk+0x1377/0x1cc0 [ 1449.980229][T30580] path_openat+0x1be/0x31a0 [ 1449.980250][T30580] ? kasan_save_stack+0x3f/0x50 [ 1449.980266][T30580] ? kasan_save_stack+0x30/0x50 [ 1449.980282][T30580] ? kasan_save_track+0x14/0x30 [ 1449.980299][T30580] ? kmem_cache_alloc_noprof+0x241/0x6e0 [ 1449.980333][T30580] ? __pfx_path_openat+0x10/0x10 [ 1449.980362][T30580] do_file_open+0x20e/0x430 [ 1449.980386][T30580] ? __pfx_do_file_open+0x10/0x10 [ 1449.980423][T30580] ? alloc_fd+0x476/0x790 [ 1449.980446][T30580] ? do_getname+0x191/0x390 [ 1449.980483][T30580] do_sys_openat2+0x10d/0x1e0 [ 1449.980510][T30580] ? __pfx_do_sys_openat2+0x10/0x10 [ 1449.980544][T30580] ? capable+0xd3/0xf0 [ 1449.980571][T30580] __x64_sys_openat+0x12d/0x210 [ 1449.980599][T30580] ? __pfx___x64_sys_openat+0x10/0x10 [ 1449.980632][T30580] ? rcu_is_watching+0x12/0xc0 [ 1449.980657][T30580] do_syscall_64+0x10b/0xf80 [ 1449.980685][T30580] ? clear_bhb_loop+0x40/0x90 [ 1449.980708][T30580] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1449.980726][T30580] RIP: 0033:0x7f4422d9c819 [ 1449.980743][T30580] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1449.980762][T30580] RSP: 002b:00007f4423b82028 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 1449.980782][T30580] RAX: ffffffffffffffda RBX: 00007f4423015fa0 RCX: 00007f4422d9c819 [ 1449.980795][T30580] RDX: 0000000000101202 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 1449.980806][T30580] RBP: 00007f4422e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1449.980818][T30580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1449.980829][T30580] R13: 00007f4423016038 R14: 00007f4423015fa0 R15: 00007ffc7eef17d8 [ 1449.980853][T30580] [ 1451.600252][ T5845] Bluetooth: hci0: unexpected event 0x3e length: 358 > 260 [ 1451.600282][ T5845] Bluetooth: hci0: unexpected subevent 0x1b length: 357 > 260 [ 1452.778405][T30615] input: jJǸ-9%vlQ J86 as /devices/virtual/input/input21 [ 1453.349731][T30623] netlink: 338 bytes leftover after parsing attributes in process `syz.4.8556'. [ 1453.407429][T30623] bond_slave_0: entered allmulticast mode [ 1453.850193][T30634] FAULT_INJECTION: forcing a failure. [ 1453.850193][T30634] name failslab, interval 1, probability 0, space 0, times 0 [ 1453.929627][T30634] CPU: 0 UID: 8 PID: 30634 Comm: syz.1.8560 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1453.929663][T30634] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1453.929671][T30634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1453.929682][T30634] Call Trace: [ 1453.929689][T30634] [ 1453.929697][T30634] dump_stack_lvl+0x100/0x190 [ 1453.929722][T30634] should_fail_ex.cold+0x5/0xa [ 1453.929745][T30634] should_failslab+0xc2/0x120 [ 1453.929767][T30634] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1453.929796][T30634] ? cred_alloc_blank+0x1c/0xa0 [ 1453.929815][T30634] ? __x64_sys_futex+0x34f/0x4d0 [ 1453.929834][T30634] ? __x64_sys_futex+0x358/0x4d0 [ 1453.929857][T30634] cred_alloc_blank+0x1c/0xa0 [ 1453.929877][T30634] keyctl_session_to_parent+0x55/0xae0 [ 1453.929908][T30634] __do_sys_keyctl+0x2b1/0x5a0 [ 1453.929936][T30634] do_syscall_64+0x10b/0xf80 [ 1453.929963][T30634] ? clear_bhb_loop+0x40/0x90 [ 1453.929985][T30634] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1453.930005][T30634] RIP: 0033:0x7fedd8d9c819 [ 1453.930023][T30634] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1453.930040][T30634] RSP: 002b:00007fedd9c62028 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 1453.930059][T30634] RAX: ffffffffffffffda RBX: 00007fedd9015fa0 RCX: 00007fedd8d9c819 [ 1453.930072][T30634] RDX: fffffffffffffffd RSI: fffffffffffffffc RDI: 0000000000000012 [ 1453.930083][T30634] RBP: 00007fedd8e32c91 R08: 0000000000000001 R09: 0000000000000000 [ 1453.930094][T30634] R10: fffffffffffffffd R11: 0000000000000246 R12: 0000000000000000 [ 1453.930105][T30634] R13: 00007fedd9016038 R14: 00007fedd9015fa0 R15: 00007ffe9012dc68 [ 1453.930127][T30634] [ 1454.517835][T30638] FAULT_INJECTION: forcing a failure. [ 1454.517835][T30638] name failslab, interval 1, probability 0, space 0, times 0 [ 1454.583671][T30638] CPU: 0 UID: 0 PID: 30638 Comm: syz.1.8561 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1454.583706][T30638] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1454.583713][T30638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1454.583724][T30638] Call Trace: [ 1454.583731][T30638] [ 1454.583740][T30638] dump_stack_lvl+0x100/0x190 [ 1454.583764][T30638] should_fail_ex.cold+0x5/0xa [ 1454.583788][T30638] ? lsm_blob_alloc+0x68/0x90 [ 1454.583809][T30638] should_failslab+0xc2/0x120 [ 1454.583831][T30638] __kmalloc_noprof+0xe0/0x850 [ 1454.583858][T30638] ? trace_kmem_cache_alloc+0xd5/0x100 [ 1454.583884][T30638] lsm_blob_alloc+0x68/0x90 [ 1454.583905][T30638] security_prepare_creds+0x2d/0x290 [ 1454.583926][T30638] prepare_creds+0x5d6/0x950 [ 1454.583948][T30638] lookup_user_key+0xfb2/0x1300 [ 1454.583977][T30638] ? __pfx_lookup_user_key+0x10/0x10 [ 1454.584007][T30638] ? do_raw_spin_lock+0x128/0x260 [ 1454.584029][T30638] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1454.584060][T30638] ? _raw_spin_unlock_irq+0x2e/0x50 [ 1454.584085][T30638] ? do_sigaltstack.constprop.0+0x4c0/0x670 [ 1454.584118][T30638] keyctl_restrict_keyring+0x99/0x250 [ 1454.584144][T30638] ? __pfx_keyctl_restrict_keyring+0x10/0x10 [ 1454.584171][T30638] ? ksys_write+0x1ac/0x250 [ 1454.584196][T30638] __do_sys_keyctl+0x2e8/0x5a0 [ 1454.584222][T30638] do_syscall_64+0x10b/0xf80 [ 1454.584249][T30638] ? clear_bhb_loop+0x40/0x90 [ 1454.584272][T30638] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1454.584291][T30638] RIP: 0033:0x7fedd8d9c819 [ 1454.584308][T30638] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1454.584325][T30638] RSP: 002b:00007fedd9c62028 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 1454.584345][T30638] RAX: ffffffffffffffda RBX: 00007fedd9015fa0 RCX: 00007fedd8d9c819 [ 1454.584357][T30638] RDX: 0000000000000002 RSI: fffffffffffffffd RDI: 000000000000001d [ 1454.584368][T30638] RBP: 00007fedd8e32c91 R08: fffffffffffffffd R09: 0000000000000000 [ 1454.584379][T30638] R10: 0000000000000628 R11: 0000000000000246 R12: 0000000000000000 [ 1454.584390][T30638] R13: 00007fedd9016038 R14: 00007fedd9015fa0 R15: 00007ffe9012dc68 [ 1454.584413][T30638] [ 1455.978942][T30643] netlink: 82 bytes leftover after parsing attributes in process `syz.2.8563'. [ 1457.921814][T30681] zswap: compressor not available [ 1458.581990][T30697] netlink: 330 bytes leftover after parsing attributes in process `syz.3.8581'. [ 1460.923481][T30720] zswap: compressor not available [ 1461.065777][T30731] input: jJǸ-9%vlQ J86 as /devices/virtual/input/input22 [ 1462.666402][T30766] block2mtd: error: cannot open device  [ 1463.837448][T30782] FAULT_INJECTION: forcing a failure. [ 1463.837448][T30782] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.903703][T30782] CPU: 0 UID: 0 PID: 30782 Comm: syz.4.8607 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1463.903737][T30782] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1463.903745][T30782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1463.903757][T30782] Call Trace: [ 1463.903764][T30782] [ 1463.903772][T30782] dump_stack_lvl+0x100/0x190 [ 1463.903797][T30782] should_fail_ex.cold+0x5/0xa [ 1463.903821][T30782] ? sk_prot_alloc+0x10b/0x2a0 [ 1463.903844][T30782] should_failslab+0xc2/0x120 [ 1463.903865][T30782] __kmalloc_noprof+0xe0/0x850 [ 1463.903901][T30782] ? lockdep_init_map_type+0x5c/0x250 [ 1463.903924][T30782] sk_prot_alloc+0x10b/0x2a0 [ 1463.903948][T30782] sk_alloc+0x36/0xe80 [ 1463.903965][T30782] pppoe_create+0x32/0x360 [ 1463.903992][T30782] pppox_create+0x15c/0x2c0 [ 1463.904018][T30782] __sock_create+0x339/0x860 [ 1463.904045][T30782] __sys_socket+0x14d/0x260 [ 1463.904075][T30782] ? __pfx___sys_socket+0x10/0x10 [ 1463.904109][T30782] __x64_sys_socket+0x72/0xb0 [ 1463.904133][T30782] ? lockdep_hardirqs_on+0x78/0x100 [ 1463.904162][T30782] do_syscall_64+0x10b/0xf80 [ 1463.904189][T30782] ? clear_bhb_loop+0x40/0x90 [ 1463.904212][T30782] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1463.904231][T30782] RIP: 0033:0x7f7ec199c819 [ 1463.904247][T30782] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1463.904272][T30782] RSP: 002b:00007f7ec286f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 1463.904291][T30782] RAX: ffffffffffffffda RBX: 00007f7ec1c15fa0 RCX: 00007f7ec199c819 [ 1463.904303][T30782] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000018 [ 1463.904313][T30782] RBP: 00007f7ec1a32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1463.904325][T30782] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1463.904335][T30782] R13: 00007f7ec1c16038 R14: 00007f7ec1c15fa0 R15: 00007fff4f7a44a8 [ 1463.904358][T30782] [ 1466.167639][T30810] FAULT_INJECTION: forcing a failure. [ 1466.167639][T30810] name failslab, interval 1, probability 0, space 0, times 0 [ 1466.346247][T30810] CPU: 0 UID: 0 PID: 30810 Comm: syz.3.8615 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1466.346281][T30810] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1466.346297][T30810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1466.346308][T30810] Call Trace: [ 1466.346315][T30810] [ 1466.346323][T30810] dump_stack_lvl+0x100/0x190 [ 1466.346348][T30810] should_fail_ex.cold+0x5/0xa [ 1466.346373][T30810] should_failslab+0xc2/0x120 [ 1466.346396][T30810] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1466.346424][T30810] ? __kernfs_new_node+0xd2/0x9f0 [ 1466.346449][T30810] __kernfs_new_node+0xd2/0x9f0 [ 1466.346468][T30810] ? __kernel_text_address+0xd/0x30 [ 1466.346489][T30810] ? __pfx___kernfs_new_node+0x10/0x10 [ 1466.346514][T30810] ? find_held_lock+0x2b/0x80 [ 1466.346536][T30810] ? kernfs_root+0xee/0x2a0 [ 1466.346554][T30810] ? kernfs_root+0xee/0x2a0 [ 1466.346577][T30810] kernfs_new_node+0x11b/0x1a0 [ 1466.346602][T30810] kernfs_create_dir_ns+0x4c/0x1a0 [ 1466.346628][T30810] sysfs_create_dir_ns+0x13a/0x2b0 [ 1466.346647][T30810] ? __pfx_sysfs_create_dir_ns+0x10/0x10 [ 1466.346664][T30810] ? find_held_lock+0x2b/0x80 [ 1466.346687][T30810] ? kobject_add_internal+0x25f/0x930 [ 1466.346707][T30810] ? kobject_add_internal+0x25f/0x930 [ 1466.346729][T30810] ? nfs_netns_namespace+0xd/0x40 [ 1466.346749][T30810] kobject_add_internal+0x2c8/0x930 [ 1466.346774][T30810] kobject_init_and_add+0x121/0x180 [ 1466.346797][T30810] ? __pfx_kobject_init_and_add+0x10/0x10 [ 1466.346830][T30810] nfs_netns_sysfs_setup+0xf9/0x200 [ 1466.346851][T30810] nfs_net_init+0x10a/0x340 [ 1466.346871][T30810] ? __pfx_nfs_net_init+0x10/0x10 [ 1466.346890][T30810] ops_init+0x1e2/0x5f0 [ 1466.346912][T30810] setup_net+0x118/0x3a0 [ 1466.346932][T30810] ? __pfx_setup_net+0x10/0x10 [ 1466.346952][T30810] ? mutex_init_lockdep+0xf1/0x120 [ 1466.346975][T30810] copy_net_ns+0x46f/0x7c0 [ 1466.346999][T30810] create_new_namespaces+0x3ea/0xac0 [ 1466.347027][T30810] unshare_nsproxy_namespaces+0xf2/0x220 [ 1466.347053][T30810] ksys_unshare+0x438/0xab0 [ 1466.347083][T30810] ? __pfx_ksys_unshare+0x10/0x10 [ 1466.347109][T30810] ? xfd_validate_state+0x129/0x190 [ 1466.347135][T30810] __x64_sys_unshare+0x31/0x40 [ 1466.347161][T30810] do_syscall_64+0x10b/0xf80 [ 1466.347196][T30810] ? clear_bhb_loop+0x40/0x90 [ 1466.347219][T30810] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1466.347238][T30810] RIP: 0033:0x7f78c019c819 [ 1466.347255][T30810] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1466.347277][T30810] RSP: 002b:00007f78c0f93028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1466.347301][T30810] RAX: ffffffffffffffda RBX: 00007f78c0415fa0 RCX: 00007f78c019c819 [ 1466.347314][T30810] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1466.347325][T30810] RBP: 00007f78c0232c91 R08: 0000000000000000 R09: 0000000000000000 [ 1466.347336][T30810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1466.347347][T30810] R13: 00007f78c0416038 R14: 00007f78c0415fa0 R15: 00007fff5d241098 [ 1466.347371][T30810] [ 1466.999025][T30810] kobject: kobject_add_internal failed for net (error: -12 parent: nfs) [ 1469.514727][T30844] netlink: 342 bytes leftover after parsing attributes in process `syz.1.8623'. [ 1469.730727][T30844] netlink: 342 bytes leftover after parsing attributes in process `syz.1.8623'. [ 1471.017712][ T5845] Bluetooth: hci1: unexpected event 0x3e length: 358 > 260 [ 1471.017741][ T5845] Bluetooth: hci1: unexpected subevent 0x1b length: 357 > 260 [ 1472.557673][T30884] netlink: 342 bytes leftover after parsing attributes in process `syz.1.8634'. [ 1473.027052][T30889] FAULT_INJECTION: forcing a failure. [ 1473.027052][T30889] name failslab, interval 1, probability 0, space 0, times 0 [ 1473.107710][T30889] CPU: 0 UID: 0 PID: 30889 Comm: syz.1.8637 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1473.107744][T30889] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1473.107752][T30889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1473.107762][T30889] Call Trace: [ 1473.107770][T30889] [ 1473.107777][T30889] dump_stack_lvl+0x100/0x190 [ 1473.107802][T30889] should_fail_ex.cold+0x5/0xa [ 1473.107826][T30889] should_failslab+0xc2/0x120 [ 1473.107848][T30889] kmem_cache_alloc_noprof+0x7b/0x6e0 [ 1473.107877][T30889] ? __proc_create+0x2cb/0x8c0 [ 1473.107903][T30889] __proc_create+0x2cb/0x8c0 [ 1473.107926][T30889] ? __pfx___proc_create+0x10/0x10 [ 1473.107951][T30889] ? _raw_write_unlock+0x28/0x50 [ 1473.107978][T30889] ? proc_register+0x559/0x8a0 [ 1473.108004][T30889] proc_create_reg+0x75/0x170 [ 1473.108029][T30889] proc_create_data+0x86/0x110 [ 1473.108053][T30889] ? __pfx_proc_create_data+0x10/0x10 [ 1473.108076][T30889] ? cache_register_net+0x137/0x5e0 [ 1473.108098][T30889] ? cache_register_net+0x137/0x5e0 [ 1473.108124][T30889] cache_register_net+0x2d6/0x5e0 [ 1473.108148][T30889] nfsd_export_init+0x16e/0x250 [ 1473.108177][T30889] ? __pfx_nfsd_net_init+0x10/0x10 [ 1473.108210][T30889] nfsd_net_init+0x69/0x3e0 [ 1473.108237][T30889] ? __pfx_nfsd_net_init+0x10/0x10 [ 1473.108262][T30889] ops_init+0x1e2/0x5f0 [ 1473.108286][T30889] setup_net+0x118/0x3a0 [ 1473.108307][T30889] ? __pfx_setup_net+0x10/0x10 [ 1473.108328][T30889] ? mutex_init_lockdep+0xf1/0x120 [ 1473.108351][T30889] copy_net_ns+0x46f/0x7c0 [ 1473.108376][T30889] create_new_namespaces+0x3ea/0xac0 [ 1473.108405][T30889] unshare_nsproxy_namespaces+0xf2/0x220 [ 1473.108431][T30889] ksys_unshare+0x438/0xab0 [ 1473.108461][T30889] ? __pfx_ksys_unshare+0x10/0x10 [ 1473.108486][T30889] ? xfd_validate_state+0x129/0x190 [ 1473.108512][T30889] __x64_sys_unshare+0x31/0x40 [ 1473.108538][T30889] do_syscall_64+0x10b/0xf80 [ 1473.108566][T30889] ? clear_bhb_loop+0x40/0x90 [ 1473.108588][T30889] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1473.108607][T30889] RIP: 0033:0x7fedd8d9c819 [ 1473.108624][T30889] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1473.108642][T30889] RSP: 002b:00007fedd9c62028 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 1473.108661][T30889] RAX: ffffffffffffffda RBX: 00007fedd9015fa0 RCX: 00007fedd8d9c819 [ 1473.108673][T30889] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000080 [ 1473.108683][T30889] RBP: 00007fedd8e32c91 R08: 0000000000000000 R09: 0000000000000000 [ 1473.108694][T30889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1473.108710][T30889] R13: 00007fedd9016038 R14: 00007fedd9015fa0 R15: 00007ffe9012dc68 [ 1473.108733][T30889] [ 1475.044062][ T5845] Bluetooth: hci2: unexpected event 0x3e length: 358 > 260 [ 1475.044093][ T5845] Bluetooth: hci2: unexpected subevent 0x1b length: 357 > 260 [ 1475.236110][T30900] netlink: 186 bytes leftover after parsing attributes in process `syz.1.8643'. [ 1475.300430][T30900] netlink: 186 bytes leftover after parsing attributes in process `syz.1.8643'. [ 1476.255347][T30923] netlink: 28 bytes leftover after parsing attributes in process `syz.2.8651'. [ 1477.959971][T30952] FAULT_INJECTION: forcing a failure. [ 1477.959971][T30952] name failslab, interval 1, probability 0, space 0, times 0 [ 1477.972976][T30952] CPU: 0 UID: 0 PID: 30952 Comm: syz.3.8658 Tainted: G U L syzkaller #0 PREEMPT(full) [ 1477.973011][T30952] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1477.973018][T30952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1477.973029][T30952] Call Trace: [ 1477.973038][T30952] [ 1477.973046][T30952] dump_stack_lvl+0x100/0x190 [ 1477.973071][T30952] should_fail_ex.cold+0x5/0xa [ 1477.973103][T30952] should_failslab+0xc2/0x120 [ 1477.973125][T30952] __kmalloc_cache_noprof+0x7a/0x6f0 [ 1477.973150][T30952] ? snd_ctl_notify+0x38a/0x6b0 [ 1477.973175][T30952] snd_ctl_notify+0x38a/0x6b0 [ 1477.973201][T30952] snd_ctl_notify_one+0x15a/0x250 [ 1477.973221][T30952] ? __pfx_snd_ctl_notify_one+0x10/0x10 [ 1477.973246][T30952] ? mark_held_locks+0x40/0x70 [ 1477.973278][T30952] __snd_ctl_add_replace+0x5f3/0x830 [ 1477.973304][T30952] ? __pfx___snd_ctl_add_replace+0x10/0x10 [ 1477.973329][T30952] ? __kmalloc_noprof+0x320/0x850 [ 1477.973359][T30952] ? snd_ctl_new+0x13c/0x1a0 [ 1477.973380][T30952] snd_ctl_elem_add+0x83c/0x1470 [ 1477.973407][T30952] ? __might_fault+0xc5/0x140 [ 1477.973433][T30952] ? __might_fault+0xc5/0x140 [ 1477.973460][T30952] ? __pfx_snd_ctl_elem_add+0x10/0x10 [ 1477.973488][T30952] snd_ctl_elem_add_user+0xc5/0x170 [ 1477.973510][T30952] ? __pfx_snd_ctl_elem_add_user+0x10/0x10 [ 1477.973532][T30952] ? find_held_lock+0x2b/0x80 [ 1477.973572][T30952] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1477.973600][T30952] ? do_vfs_ioctl+0x226/0x13e0 [ 1477.973632][T30952] snd_ctl_ioctl+0xb68/0x1290 [ 1477.973653][T30952] ? __pfx_snd_ctl_ioctl+0x10/0x10 [ 1477.973677][T30952] ? find_held_lock+0x2b/0x80 [ 1477.973700][T30952] ? __fget_files+0x215/0x3d0 [ 1477.973719][T30952] ? hook_file_ioctl_common+0x149/0x410 [ 1477.973752][T30952] ? __fget_files+0x21f/0x3d0 [ 1477.973775][T30952] ? __pfx_snd_ctl_ioctl+0x10/0x10 [ 1477.973798][T30952] __x64_sys_ioctl+0x18e/0x210 [ 1477.973817][T30952] do_syscall_64+0x10b/0xf80 [ 1477.973844][T30952] ? clear_bhb_loop+0x40/0x90 [ 1477.973867][T30952] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1477.973886][T30952] RIP: 0033:0x7f78c019c819 [ 1477.973903][T30952] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1477.973922][T30952] RSP: 002b:00007f78c0f93028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1477.973941][T30952] RAX: ffffffffffffffda RBX: 00007f78c0415fa0 RCX: 00007f78c019c819 [ 1477.973953][T30952] RDX: 0000200000000580 RSI: 00000000c1105517 RDI: 0000000000000006 [ 1477.973965][T30952] RBP: 00007f78c0232c91 R08: 0000000000000000 R09: 0000000000000000 [ 1477.973976][T30952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1477.973987][T30952] R13: 00007f78c0416038 R14: 00007f78c0415fa0 R15: 00007fff5d241098 [ 1477.974009][T30952] [ 1477.974023][T30952] snd_virmidi snd_virmidi.0: No memory available to allocate event [ 1478.317797][T30953] usb usb38: selecting invalid altsetting 65537 [ 1478.704920][T30962] vivid-007: ================= START STATUS ================= [ 1478.727624][T30962] vivid-007: Generate PTS: true [ 1478.755668][T30962] vivid-007: Generate SCR: true [ 1478.794108][T30962] tpg source WxH: 320x240 (Y'CbCr) [ 1478.816122][T30962] tpg field: 1 [ 1478.828822][T30962] tpg crop: (0,0)/320x240 [ 1478.850430][T30962] tpg compose: (0,0)/320x240 [ 1478.868846][T30962] tpg colorspace: 8 [ 1478.884853][T30962] tpg transfer function: 0/0 [ 1478.896334][T30962] tpg Y'CbCr encoding: 0/0 [ 1478.911015][T30962] tpg quantization: 0/0 [ 1478.928122][T30962] tpg RGB range: 0/2 [ 1478.946355][T30962] vivid-007: ================== END STATUS ================== [ 1479.966767][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1479.979235][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1479.991615][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1480.004309][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1480.016639][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1480.028874][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1480.041326][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1480.053557][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1480.065798][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1480.078070][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1484.978775][ C0] net_ratelimit: 20933 callbacks suppressed [ 1484.978795][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1484.997081][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1485.009459][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1485.021726][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1485.033919][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1485.046218][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1485.058405][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1485.070615][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1485.083337][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1485.095578][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1485.334334][ T1314] ieee802154 phy0 wpan0: encryption failed: -22 [ 1485.354600][ T1314] ieee802154 phy1 wpan1: encryption failed: -22 [ 1486.208782][ C0] sched: DL replenish lagged too much [ 1489.991310][ C0] net_ratelimit: 20999 callbacks suppressed [ 1489.991331][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1490.009472][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1490.021770][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1490.034090][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1490.046349][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1490.058681][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1490.070896][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1490.083137][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1490.095342][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1490.107688][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1495.003775][ C0] net_ratelimit: 21539 callbacks suppressed [ 1495.003796][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1495.022067][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1495.034406][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1495.046650][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1495.058904][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1495.071221][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1495.083428][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1495.095814][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1495.108134][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1495.120357][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1500.016291][ C0] net_ratelimit: 20698 callbacks suppressed [ 1500.016312][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1500.034571][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1500.046932][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1500.059291][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1500.071887][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1500.084220][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1500.096437][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1500.108647][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1500.120825][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1500.133023][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1505.028736][ C0] net_ratelimit: 21386 callbacks suppressed [ 1505.028755][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1505.046937][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1505.059209][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1505.071843][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1505.084898][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1505.097118][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1505.109414][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1505.121609][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1505.133782][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1505.146061][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1510.041360][ C0] net_ratelimit: 21758 callbacks suppressed [ 1510.041382][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1510.059544][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1510.071889][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1510.084265][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1510.096492][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1510.108727][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1510.120958][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1510.133163][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1510.145381][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1510.157604][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1515.053882][ C0] net_ratelimit: 21789 callbacks suppressed [ 1515.053903][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1515.072159][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1515.084428][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1515.096709][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1515.109223][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1515.121676][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1515.134031][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1515.146283][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1515.158537][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1515.170767][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1520.066323][ C0] net_ratelimit: 21763 callbacks suppressed [ 1520.066343][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1520.084814][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1520.097022][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1520.109360][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1520.121568][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1520.133881][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1520.146066][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1520.158373][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1520.170705][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1520.183063][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1525.078845][ C0] net_ratelimit: 21708 callbacks suppressed [ 1525.078871][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1525.097201][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1525.109500][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1525.121757][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1525.134100][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1525.146315][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1525.158559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1525.170777][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1525.183149][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1525.195605][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1530.091265][ C0] net_ratelimit: 21781 callbacks suppressed [ 1530.091287][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1530.109528][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1530.121886][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1530.134469][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1530.146702][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1530.158902][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1530.171211][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1530.183632][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1530.196019][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1530.208323][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1535.103865][ C0] net_ratelimit: 21698 callbacks suppressed [ 1535.103886][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1535.122340][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1535.134574][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1535.146833][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1535.159289][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1535.171608][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1535.183859][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1535.196172][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1535.208663][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1535.221143][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1540.116397][ C0] net_ratelimit: 21812 callbacks suppressed [ 1540.116418][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1540.134547][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1540.146755][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1540.158995][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1540.171188][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1540.183351][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1540.195549][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1540.207736][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1540.219926][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1540.232099][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1545.128881][ C0] net_ratelimit: 21731 callbacks suppressed [ 1545.128903][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1545.147187][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1545.159435][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1545.171677][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1545.183885][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1545.199107][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1545.211428][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1545.223708][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1545.236183][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1545.248565][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1546.674649][ T1314] ieee802154 phy0 wpan0: encryption failed: -22 [ 1546.688188][ T1314] ieee802154 phy1 wpan1: encryption failed: -22 [ 1550.141371][ C0] net_ratelimit: 21440 callbacks suppressed [ 1550.141392][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1550.159665][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1550.172027][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1550.184425][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1550.196695][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1550.209041][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1550.221373][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1550.233617][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1550.246288][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1550.258534][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1555.153898][ C0] net_ratelimit: 21508 callbacks suppressed [ 1555.153920][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1555.172082][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1555.184401][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1555.196601][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1555.209020][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1555.221281][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1555.233479][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1555.245788][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1555.258052][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1555.270301][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1560.166422][ C0] net_ratelimit: 21741 callbacks suppressed [ 1560.166442][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1560.184547][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1560.196765][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1560.208963][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1560.221178][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1560.233365][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1560.245651][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1560.257933][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1560.270127][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1560.282302][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1565.178796][ C0] net_ratelimit: 21535 callbacks suppressed [ 1565.178817][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1565.197063][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1565.209377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1565.221737][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1565.233984][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1565.246245][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1565.260749][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1565.273103][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1565.285377][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1565.297580][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1570.191447][ C0] net_ratelimit: 21176 callbacks suppressed [ 1570.191468][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1570.209653][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1570.221855][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1570.234063][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1570.246303][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1570.258506][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1570.270705][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1570.283438][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1570.295641][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1570.307852][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1575.203787][ C0] net_ratelimit: 20490 callbacks suppressed [ 1575.203814][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1575.222005][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1575.234332][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1575.246572][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1575.258769][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1575.271119][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1575.283394][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1575.295671][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1575.307872][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1575.320113][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1580.216380][ C0] net_ratelimit: 21604 callbacks suppressed [ 1580.216401][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1580.234656][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1580.247047][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1580.259331][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1580.271559][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1580.283790][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1580.295994][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1580.308198][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1580.320381][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1580.332596][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1585.228771][ C0] net_ratelimit: 21684 callbacks suppressed [ 1585.228793][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1585.247011][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1585.259288][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1585.271492][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1585.283656][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1585.295843][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1585.308012][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1585.320197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1585.332402][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1585.344593][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1590.241403][ C0] net_ratelimit: 21861 callbacks suppressed [ 1590.241424][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1590.259997][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1590.272197][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1590.284418][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1590.296660][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1590.308898][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1590.321095][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1590.333266][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1590.345468][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1590.357756][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1593.602930][ C0] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 1593.609928][ C0] rcu: (detected by 0, t=10502 jiffies, g=390029, q=1043 ncpus=1) [ 1593.617820][ C0] rcu: All QSes seen, last rcu_preempt kthread activity 2125 (4295096414-4295094289), jiffies_till_next_fqs=1, root ->qsmask 0x0 [ 1593.631089][ C0] rcu: rcu_preempt kthread starved for 2125 jiffies! g390029 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 1593.642274][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 1593.652233][ C0] rcu: RCU grace-period kthread stack dump: [ 1593.658117][ C0] task:rcu_preempt state:R running task stack:26472 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00080000 [ 1593.671594][ C0] Call Trace: [ 1593.674866][ C0] [ 1593.677794][ C0] __schedule+0x10e9/0x6820 [ 1593.682337][ C0] ? __pfx___schedule+0x10/0x10 [ 1593.687186][ C0] ? find_held_lock+0x2b/0x80 [ 1593.691867][ C0] ? schedule+0x2bf/0x390 [ 1593.696212][ C0] schedule+0xdd/0x390 [ 1593.700284][ C0] schedule_timeout+0x127/0x280 [ 1593.705156][ C0] ? __pfx_schedule_timeout+0x10/0x10 [ 1593.710529][ C0] ? __pfx_process_timeout+0x10/0x10 [ 1593.715826][ C0] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 1593.721646][ C0] ? prepare_to_swait_event+0xdf/0x4a0 [ 1593.727114][ C0] rcu_gp_fqs_loop+0x1a9/0x900 [ 1593.731897][ C0] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 1593.737206][ C0] ? prepare_to_swait_event+0xae/0x4a0 [ 1593.742683][ C0] ? __pfx_rcu_gp_init+0x10/0x10 [ 1593.747650][ C0] ? rcu_is_watching+0x12/0xc0 [ 1593.752468][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1593.758327][ C0] rcu_gp_kthread+0x179/0x230 [ 1593.763012][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 1593.768225][ C0] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 1593.774034][ C0] ? __kthread_parkme+0x18c/0x230 [ 1593.779064][ C0] ? kthread+0x13a/0x450 [ 1593.783312][ C0] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 1593.788511][ C0] kthread+0x370/0x450 [ 1593.792615][ C0] ? __pfx_kthread+0x10/0x10 [ 1593.797216][ C0] ret_from_fork+0x72b/0xd50 [ 1593.801802][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 1593.806911][ C0] ? __switch_to+0x800/0x1100 [ 1593.811586][ C0] ? __switch_to_asm+0x39/0x70 [ 1593.816352][ C0] ? __pfx_kthread+0x10/0x10 [ 1593.820947][ C0] ret_from_fork_asm+0x1a/0x30 [ 1593.825721][ C0] [ 1593.828734][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 1593.835061][ C0] CPU: 0 UID: 0 PID: 3426 Comm: kworker/R-bat_e Tainted: G U L syzkaller #0 PREEMPT(full) [ 1593.846340][ C0] Tainted: [U]=USER, [L]=SOFTLOCKUP [ 1593.851525][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 [ 1593.861597][ C0] Workqueue: bat_events batadv_tt_purge [ 1593.867257][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 [ 1593.873346][ C0] Code: 16 67 5b 00 48 89 df 5b e9 bd f1 60 00 be 03 00 00 00 5b e9 22 92 ee 02 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 65 8b 05 05 19 0b 12 48 8b 34 24 65 48 8b 15 e1 18 0b [ 1593.892969][ C0] RSP: 0018:ffffc90000006e18 EFLAGS: 00000202 [ 1593.899086][ C0] RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffffffff8a6efa3f [ 1593.907060][ C0] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff88803377dc40 [ 1593.915049][ C0] RBP: ffff88805ccb8000 R08: 0000000000000005 R09: 0000000000000000 [ 1593.923020][ C0] R10: 0000000000000001 R11: 0000000000000000 R12: ffff888020f4b000 [ 1593.931008][ C0] R13: ffff88814fc6d334 R14: 1ffff92000000dcd R15: ffff88814fc6d31c [ 1593.938976][ C0] FS: 0000000000000000(0000) GS:ffff8881242e2000(0000) knlGS:0000000000000000 [ 1593.947900][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1593.954491][ C0] CR2: 00007ffc7eef0a5c CR3: 00000000213d2000 CR4: 00000000003526f0 [ 1593.962484][ C0] Call Trace: [ 1593.965773][ C0] [ 1593.968617][ C0] net_generic+0x18c/0x2a0 [ 1593.973043][ C0] br_nf_post_routing+0x30a/0x16a0 [ 1593.978178][ C0] ? __pfx_br_nf_post_routing+0x10/0x10 [ 1593.983729][ C0] ? __pfx_ebt_do_table+0x10/0x10 [ 1593.988762][ C0] ? lock_acquire+0x1b1/0x370 [ 1593.993436][ C0] nf_hook_slow+0xbf/0x220 [ 1593.997856][ C0] br_forward_finish+0x261/0x4d0 [ 1594.002797][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 1594.008258][ C0] ? __pfx_br_dev_queue_push_xmit+0x10/0x10 [ 1594.014154][ C0] ? nf_hook_slow+0x167/0x220 [ 1594.018929][ C0] br_nf_hook_thresh+0x30d/0x420 [ 1594.023887][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 1594.029430][ C0] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 1594.034977][ C0] ? lock_acquire+0x1b1/0x370 [ 1594.039685][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 1594.045154][ C0] ? net_generic+0xea/0x2a0 [ 1594.049677][ C0] br_nf_forward_finish+0x693/0xb30 [ 1594.054884][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 1594.060374][ C0] br_nf_forward_ip.part.0+0x61e/0x820 [ 1594.065860][ C0] br_nf_forward+0xfe5/0x19f0 [ 1594.070561][ C0] nf_hook_slow+0xbf/0x220 [ 1594.074985][ C0] __br_forward+0x2f7/0x970 [ 1594.079496][ C0] ? __pfx___br_forward+0x10/0x10 [ 1594.084537][ C0] ? __asan_memcpy+0x3c/0x60 [ 1594.089147][ C0] ? __pfx_br_forward_finish+0x10/0x10 [ 1594.094607][ C0] ? __skb_clone+0x570/0x760 [ 1594.099208][ C0] br_flood+0x37f/0x650 [ 1594.103373][ C0] br_handle_frame_finish+0xff4/0x1f60 [ 1594.108856][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1594.114931][ C0] ? __local_bh_enable_ip+0x9e/0x120 [ 1594.120222][ C0] ? ip6t_do_table+0xc1d/0x1c90 [ 1594.125075][ C0] ? __pfx_ip6t_do_table+0x10/0x10 [ 1594.130202][ C0] ? nf_hook_slow+0x167/0x220 [ 1594.134982][ C0] br_nf_hook_thresh+0x30d/0x420 [ 1594.139942][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1594.145845][ C0] ? __pfx_br_nf_hook_thresh+0x10/0x10 [ 1594.151312][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1594.157226][ C0] ? __pfx_nf_nat_ipv6_in+0x10/0x10 [ 1594.162421][ C0] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1594.168315][ C0] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1594.174210][ C0] br_nf_pre_routing_finish_ipv6+0x659/0xdd0 [ 1594.180187][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1594.186103][ C0] br_nf_pre_routing_ipv6+0x39c/0x8b0 [ 1594.191480][ C0] ? __pfx_br_nf_pre_routing_ipv6+0x10/0x10 [ 1594.197381][ C0] ? lock_acquire+0x1b1/0x370 [ 1594.202055][ C0] ? __pfx_br_nf_pre_routing_finish_ipv6+0x10/0x10 [ 1594.208570][ C0] ? net_generic+0xea/0x2a0 [ 1594.213110][ C0] br_nf_pre_routing+0x90f/0x1560 [ 1594.218162][ C0] br_handle_frame+0xcdd/0x1520 [ 1594.223049][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 1594.228370][ C0] ? __pfx_br_handle_frame_finish+0x10/0x10 [ 1594.234299][ C0] ? __pfx_br_handle_frame+0x10/0x10 [ 1594.239607][ C0] __netif_receive_skb_core.constprop.0+0x6c5/0x3530 [ 1594.246308][ C0] ? kmem_cache_free+0x127/0x6c0 [ 1594.251262][ C0] ? skb_release_data+0x6ca/0x8e0 [ 1594.256306][ C0] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10 [ 1594.263429][ C0] ? kfree_skbmem+0x19f/0x210 [ 1594.268119][ C0] ? sk_skb_reason_drop+0x114/0x1b0 [ 1594.273332][ C0] ? ip6_mc_input+0x51a/0xf50 [ 1594.278033][ C0] ? __pfx_ip6_mc_input+0x10/0x10 [ 1594.283108][ C0] ? __lock_acquire+0x4a5/0x2630 [ 1594.288066][ C0] ? process_backlog+0x32a/0x1580 [ 1594.293094][ C0] __netif_receive_skb_one_core+0xb0/0x1e0 [ 1594.298905][ C0] ? __pfx___netif_receive_skb_one_core+0x10/0x10 [ 1594.305325][ C0] ? lock_acquire+0x1b1/0x370 [ 1594.310002][ C0] ? process_backlog+0x32a/0x1580 [ 1594.315056][ C0] ? process_backlog+0x32a/0x1580 [ 1594.320083][ C0] __netif_receive_skb+0x1f/0x120 [ 1594.325111][ C0] process_backlog+0x37a/0x1580 [ 1594.329973][ C0] __napi_poll.constprop.0+0xaf/0x450 [ 1594.335349][ C0] net_rx_action+0xa40/0xf20 [ 1594.339950][ C0] ? __pfx_net_rx_action+0x10/0x10 [ 1594.345080][ C0] ? mark_held_locks+0x40/0x70 [ 1594.349936][ C0] ? lockdep_hardirqs_on+0x78/0x100 [ 1594.355159][ C0] ? tmigr_handle_remote+0x132/0x380 [ 1594.360455][ C0] ? run_timer_base+0x121/0x190 [ 1594.365318][ C0] ? __pfx_run_timer_base+0x10/0x10 [ 1594.370529][ C0] handle_softirqs+0x1ea/0xa00 [ 1594.375298][ C0] ? __pfx_handle_softirqs+0x10/0x10 [ 1594.380631][ C0] ? __hrtimer_rearm_deferred+0x9b/0x740 [ 1594.386265][ C0] ? batadv_tt_purge+0x25d/0xbd0 [ 1594.391204][ C0] do_softirq+0xac/0xe0 [ 1594.395362][ C0] [ 1594.398294][ C0] [ 1594.401221][ C0] __local_bh_enable_ip+0xf8/0x120 [ 1594.406427][ C0] batadv_tt_purge+0x25d/0xbd0 [ 1594.411193][ C0] ? __pfx_batadv_tt_purge+0x10/0x10 [ 1594.416507][ C0] ? rcu_is_watching+0x12/0xc0 [ 1594.421314][ C0] process_one_work+0xa0e/0x1980 [ 1594.426267][ C0] ? __pfx_process_one_work+0x10/0x10 [ 1594.431648][ C0] ? __pfx_batadv_tt_purge+0x10/0x10 [ 1594.436950][ C0] rescuer_thread+0x905/0x14a0 [ 1594.441743][ C0] ? rescuer_thread+0x240/0x14a0 [ 1594.446689][ C0] ? rescuer_thread+0x118/0x14a0 [ 1594.451634][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 1594.456837][ C0] ? __kthread_parkme+0x18c/0x230 [ 1594.461900][ C0] ? kthread+0x13a/0x450 [ 1594.466178][ C0] ? __pfx_rescuer_thread+0x10/0x10 [ 1594.471379][ C0] kthread+0x370/0x450 [ 1594.475466][ C0] ? __pfx_kthread+0x10/0x10 [ 1594.480083][ C0] ret_from_fork+0x72b/0xd50 [ 1594.484677][ C0] ? __pfx_ret_from_fork+0x10/0x10 [ 1594.489787][ C0] ? __switch_to+0x800/0x1100 [ 1594.494464][ C0] ? __switch_to_asm+0x39/0x70 [ 1594.499234][ C0] ? __pfx_kthread+0x10/0x10 [ 1594.503833][ C0] ret_from_fork_asm+0x1a/0x30 [ 1594.508621][ C0] [ 1595.253882][ C0] net_ratelimit: 16788 callbacks suppressed [ 1595.253903][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1595.272343][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1595.284609][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1595.296909][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1595.309139][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1595.321558][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1595.334137][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1595.346440][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1595.358749][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1595.371180][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1600.266422][ C0] net_ratelimit: 18577 callbacks suppressed [ 1600.266443][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1600.284639][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1600.296883][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1600.309110][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1600.321406][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1600.333676][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1600.346143][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1600.358479][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1600.370718][ C0] bridge0: received packet on veth0_to_bridge with own address as source address (addr:00:00:00:00:07:00, vlan:0) [ 1600.382949][ C0] bridge0: received packet on bridge_slave_0 with own address as source address (addr:00:00:00:00:07:00, vlan:0)